Conti Operates Like A Sophisticated Corporation

After analysing leaked documents, Check Point Research (CPR) can give new details on the inside operations of Conti, the notorious Russian ransomware group. 

Conti is structured like a high-technology company, with clear management, finance and HR functions. Conti recruits not only from underground, but legitimate sources, borrowing CV pools without permission.

Indeed, some employees have no clue that they are part of a cyber criminal operation andCPR has also learned that Conti has business expansion plans for a crypto exchange and a Darknet social network.

CPR has gained new details into the inside-operations of Conti ransomware group which operates a ransomware-as-a-service (RaaS) business model, which allows affiliates to rent access to its infrastructure to launch attacks.

Industry experts have said Conti is based in Russia and may have ties to Russian intelligence. Conti has been blamed for ransomware attacks targeting dozens of businesses and critical infrastructure, like the Irish Health service. The Conti group has several physical offices, including in Russia where the HR team offers monthly bonuses, fines, nominates the employee of the month and undertakes performance reviews. 

On February 27 of this year, a cache of chat logs belonging to the Conti were leaked online at the hands of an alleged insider, who claimed to have objected to the group’s support for the Russian invasion of Ukraine. CPR analysed the leaked files, learning that the ransomware groups operates like a large technology company.

Conti has an HR department, a hiring process, offline office premises, salaries and bonus payments.

Details of Conti’s Inside-Operations

Conti operates like a technology company with a defined hierarchical structure. CPR identified the main people involved with their names: Stern (big boss), Bentley (technical lead), Mango (manager of general questions), Buza (technical manager), Target (manager responsible for coders and their products), Veron aka Mors (focal point of the group’s operations with Emotet).

  • Team leaders who report to upper management.
  • Main groups observed: HR, coders, testers, crypters, sysadmins, reverse engineers, offensive team, OSINT Specialists and Negotiation Staff.

Staff Work In A Physical Office

The Conti group has several physical offices. These are curated by "Target", Stern's partner and effective head of office operations, who is also responsible for the wage fund, office technical equipment, the hiring process and personnel training. 

During 2020, offline offices were mainly used by testers, offensive teams and negotiators; Target mentions 2 offices dedicated to operators who are speaking directly with victim representatives.

  •  In August 2020, an additional office was opened for sysadmins and programmers, under the purview of "Professor, who is responsible for the whole technical process of securing a victim infection.
  • Compensation: monthly bonuses, fines, employee of the month, performance reviews.
  • Members of Conti's negotiating team (including OSINT specialists) are paid by commissions, calculated as a percentage of the paid ransom amount that ranges from 0.5% to 1%. Coders and some of the managers are paid a salary in bitcoin, transferred once or twice a month.
  • Conti employees are not protected by their local labor boards, and so have to endure some practices that typical tech employees are exempt from, such as being fined for underperforming.
  • While fines are mostly used as an established tool in the coder department, they are sporadically employed on in other departments - for example, in IT and DevOps, where one person responsible for depositing money was fined $100 for a missed payment:

Talent Is Recruited From Both Legitimate & Criminal Sources  

For recruiting business staff used by Conti, the HR team use Russian-speaking headhunting services such as headhunter.ru. They have slso used other sites, but reportedly with less success.

Conti corporate policy forbids leaving traces of developer job openings on such websites, a regulation stringently enforced by one of the higher-ups, "Stern" For hiring developers, Conti bypasses the headhunter.ru job system, instead directly accessing the CV pool and contacting candidates by email. You might wonder "why does headhunter.ru offer such a service?", and the answer is, they don't. Conti simply "borrowed" the CV pool without permission, which seems to be standard practice in the cybercrime world.

Some Conti Employees Don’t Know It Is A Cyber Crime Business

In one online job interview, a manager tells a potential hire for the coding team: "everything is anonymous here, the main direction of the company is software for pen-testers". In another example, a group member known by the moniker "Zulas", most likely the person who developed Trickbot's backend in the Erlang programming language. Zulas is passionate about Erlang, eager to show examples of his other work, and even mentions his real name.

When his manager mentions that his "trick" (Trickbot) project was seen by "half of the world", Zulas does not understand the reference, calls the system "lero" and reveals that he has no idea what his software is doing and why the team goes to such lengths to protect member identities. His interlocutor tells him that he is working on a backend for an ad analytics system.

Conti Is Working On Plans For A Crypto Exchange & A Darknet Social Network

One of the ideas discussed was creating a crypto exchange in the group's own ecosystem. Another project is the “darknet social network” (also: "VK for darknet" or "Carbon Black for hackers"), a project inspired by Stern and carried out by Mango, planned to be developed as a commercial project. In July 2021 Conti was already in contact with a designer, who produced a few mockups.

Lotem Finkelstein, Head of Threat Intelligence and Research, at Check Point Research commented, “For the first time, we have a glass door to a group that has been known to be the face of ransomware. Conti acts like a high-tech company. We see hundreds of employees in a hierarchy of managers. We see an HR function, with people responsible for different departments."

Even when employees find out the truth  they decide to stay, revealing that the Conti management team has developed a process for retaining employees. Conti has developed an internal culture to develop profits, as well as fining employees for undesirable behaviour. 

Check Point Research

You Might Also Read: 

Russian Hackers Account For 74% Of Ransomware Proceeds:

 

 

« Operating Technology Security Issues Are Increasing
LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.