Conti ransomware group has internal chats leaked after siding with Russia

Data Breach
Image Credit: Shutterstock (Image credit: Shutterstock)

Russian ransomware operators Conti has had thousands of sensitive internal chat logs leaked to journalists, law enforcement agencies and cybersecurity researchers, apparently by a disgruntled employee. 

The leak reportedly comes as retaliation for the group recently choosing to side with the Russian government following its invasion of Ukraine. 

The news was first broken by BleepingComputer, which said the ransomware group published a short announcement in the first days of the invasion expressing its full support for the Russian government, and threatening any cybersecurity or cybercrime groups who decide to use their skills to disrupt the Russian operation.

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Bitcoin addresses and previously unreported victims

However, Conti seems to have plenty of Ukraine-based affiliates, and after what seems to be a severe backlash, the group changed its stance, condemning the ongoing war and claiming not to be taking any sides. However it did add that it will utilize its full force in the battle against “western warmongering and American threats”.

The as-yet-unnamed Ukrainian culprit behind the leak said the Conti gang has “lost all their sh*t”, before dumping more than 60,000 internal chat messages, the authenticity of which has now been confirmed by independent cybersecurity researchers.

For now the media have only shared relatively benign chat logs in order to prove the authenticity of the leak. 

However, there seems to be plenty of dirty laundry among the chat logs, some of which might even lead to arrests. Initial investigations suggest the chat logs disclose details such as previously unreported victims, private data leak URLs, bitcoin addresses, and discussions about their operations.

Conti is an active ransomware group, which only recently hit American cookware distributor Meyer, stealing sensitive employee information. The group seems to have taken Meyer employees’ full names, physical addresses, birthdates, gender and ethnicity information, Social Security numbers, health insurance information and data on employee medical conditions, random drug screening results, Covid vaccination cards, driver’s licenses, passport data, government ID numbers, permanent resident cards, immigration status information, and information on dependents.

It was also reported that some of the top members of the notorious TrickBot malware family have also recently joined Conti’s ranks. 

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Ransomware
Top ransomware gang's internal chat logs leaked online
Cl0p ransomware group says it was behind Cleo attacks
Lock on Laptop Screen
Clop ransomware lists Cleo cyberattack victims
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
59 organizations reportedly victim to breaches caused by Cleo software bug
Data leak
Ransomware attackers leak stolen Rhode Island private info following hack
Image of laptop infected with malware
Ransomware criminals are now sending their demands...by snail mail?
Latest in Security
Data leak
Hacked Tata Technologies data leaked by ransomware gang
A close-up photo of an iPhone, with the App Store icon prominent in the center of the image.
Thousands of iOS apps found to expose user data and leak Stripe keys
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Avast cybersecurity
UK cybersecurity sector could be worth £13bn, research shows
Latest in News
UK Prime Minister Sir Kier Starmer
UK PM says AI should soon replace civil servants
Eight Samsung TVs mounted to the wall showing different basketball games
Samsung is offering you 8 new TVs in one bundle for March Madness, in case you want to watch all games at once like a Bond villain’s lair
The Steam Logo on a mobile phone in front of a wall of games.
Today’s Steam Spring Sale features my absolute favorite game of all time - here's when the sale starts and all the key info
Apple iPhone 16 Pro Max REVIEW
The latest iPhone 17 Pro Max leak may have given us another look at its upcoming redesign
Half-Life running on a smartwatch
This Redditor installed a game engine on their smartwatch, and now it runs Doom, Quake, and Half-Life
Samsung Galaxy Z Fold 6
The Samsung Galaxy Z Fold 7 could be in line for a Galaxy S25 Ultra-level camera upgrade