{"id":18223,"date":"2022-07-01T16:30:00","date_gmt":"2022-07-01T15:30:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=18223"},"modified":"2022-07-04T14:46:08","modified_gmt":"2022-07-04T13:46:08","slug":"ransomware-inside-the-former-conti-group","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/","title":{"rendered":"Ransomware: Inside the former CONTI group"},"content":{"rendered":"\n<p style=\"text-align: justify;\">We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete.<a href=\"#_ftn1\"><sup>[1] <\/sup><\/a>This announcement comes only a few months after it was the center of attention of the specialized press following the &#8220;<strong>Conti Leaks<\/strong>&#8220;.<\/p>\n<p style=\"text-align: justify;\">Last February, a Ukrainian researcher released more than 60,000 messages from inside conversations between different members of the group. Through these discussions, several revelations are made about their operations, allowing us to understand the RaaS ecosystem (<em>Ransomware-as-a-Service)<\/em>.<\/p>\n<p style=\"text-align: justify;\">Through this article, let&#8217;s take a look at how a Ransomware platform operates, then let&#8217;s question the organizational structure and the benefits generated by former CONTI group.<\/p>\n<h1>\u00a0<\/h1>\n<h1 style=\"text-align: justify;\"><strong>Ransomware platform ecosystem<\/strong><\/h1>\n<p style=\"text-align: justify;\">The proliferation of articles on the Ransomware threat over the last few years gives the impression that the sector is flourishing. There are <strong>several players involved<\/strong>, and data theft amounts to <strong>hundreds of millions of dollars<\/strong> per year. For instance, CERT-Wavestone shared that <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\">about 60% of its incident responses in 2021 were for ransomware attacks<\/a>.<a href=\"#_ftn2\"><sup>[2]<\/sup><\/a><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18227 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN1.jpg\" alt=\"\" width=\"605\" height=\"419\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN1.jpg 605w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN1-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN1-56x39.jpg 56w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p style=\"text-align: justify;\">As described in the figure, ransomware platforms <strong>do not work alone<\/strong>. It receives help from different <strong>service providers<\/strong> or other platforms and offers its services (in the form of ransomware) to different groups of attackers. Finally, the platform can also directly extract data from its victims: individuals, companies, states&#8230;<\/p>\n<p style=\"text-align: justify;\">These platforms have fueled the growth of a RaaS economy. <strong>Approximately $5.2 billion of BTC transactions<\/strong> have been identified by the US Treasury with the <strong>payment<\/strong> of the most commonly reported <strong>ransomware platforms<\/strong>.<a href=\"#_ftn3\"><sup>[3]<\/sup><\/a> This makes it a <strong>highly profitable business<\/strong>.<\/p>\n<p style=\"text-align: justify;\">At the same time, it is also an activity where there is a <strong>significant number of established groups<\/strong> of players that seem to frequently appear and disappear and which generally last several months. Behind these multiple platforms usually hide the same individuals. If the CONTI franchise, supposed successor of the Ryuk<a href=\"#_ftn4\"><sup>[4]<\/sup><\/a>,has only survived 2 years, its former members still seem to be active.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18229 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN2.jpg\" alt=\"\" width=\"605\" height=\"419\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN2.jpg 605w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN2-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN2-56x39.jpg 56w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p style=\"text-align: justify;\">In this fragmented and complex environment, it is difficult to retrieve consistent information on the functioning of the platforms. The internal discord that followed the war in Ukraine and the publication of the Conti Leaks allowed us to investigate the functioning of this secretive group before its dissolution.<\/p>\n<h1>\u00a0<\/h1>\n<h1 style=\"text-align: justify;\"><strong>Conti enterprise ?<\/strong><\/h1>\n<p style=\"text-align: justify;\">On February 27th, 2022 we discover the underside of CONTI organization. The disclosures are made within a few days and soon reveal :<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Well-established recruitment processes<\/strong>, that can even go as far as advertising on legitimate recruitment sites<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18231 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN3.jpg\" alt=\"\" width=\"605\" height=\"419\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN3.jpg 605w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN3-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN3-56x39.jpg 56w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>A vertical organization <\/strong>with its own HR, financial and operational departments<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18233 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN4.jpg\" alt=\"\" width=\"605\" height=\"419\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN4.jpg 605w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN4-276x191.jpg 276w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN4-56x39.jpg 56w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<ul style=\"text-align: justify;\">\n<li>A <strong>salary policy<\/strong> established according to the different functions in the organization, including bonuses per position after a successful ransom (See. <a href=\"\/wp-content\/uploads\/2022\/06\/Note-de-synthese-groupes-de-ransomware-ANG.pdf\">Full study<\/a>)<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">This thoughtful and efficient organization seems to be one of the secrets to the profitability of the group.<\/p>\n<h1>\u00a0<\/h1>\n<h1 style=\"text-align: justify;\"><strong>A highly profitable business model<\/strong><\/h1>\n<p style=\"text-align: justify;\">We have endeavored to recreate the cash flow statement of CONTI from scratch.<\/p>\n<p style=\"text-align: justify;\">Each line of profit and cost is researched to be estimated as accurately as possible over a year.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18235 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN5.jpg\" alt=\"\" width=\"605\" height=\"417\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN5.jpg 605w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN5-277x191.jpg 277w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/EN5-57x39.jpg 57w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\n<p style=\"text-align: justify;\">According to The 2022 Crypto Crime Report<a href=\"#_ftn5\"><sup>[5]<\/sup><\/a>, in 2021, CONTI and its affiliates held at least <strong>$180M in bitcoins<\/strong> for ransom from <strong>addresses traceable <\/strong>on the blockchain. It is estimated that <strong>70% is paid back to its affiliates<\/strong>, and the remaining $45M is the group&#8217;s revenue.<\/p>\n<p style=\"text-align: justify;\">CONTI then has to deal with traditional expenses, which are common in traditional companies. The main ones are: <strong>money laundering<\/strong>, which represents up to 50% of the earnings, purchases of <strong>third party services and maintenance costs<\/strong>, and finally.<\/p>\n<p style=\"text-align: justify;\">CONTI would therefore generate <strong>a net profit of $16M<\/strong> (if we assume that the group does not pay Russian taxes). The <strong>ROI<\/strong> of the group is estimated at about <strong>+163%<\/strong>, according to the same information.<\/p>\n<h1>\u00a0<\/h1>\n<h1 style=\"text-align: justify;\"><strong>Conclusion<\/strong><\/h1>\n<p style=\"text-align: justify;\">The Conti Leaks enabled to better understand the organization and ecosystem of Ransomware-as-a-Service platforms through the study of a group. This work thus provides a solid foundation for the popularization of the RaaS threat.<\/p>\n<p style=\"text-align: justify;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18261 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1441\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-scaled.jpg 2560w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-339x191.jpg 339w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-69x39.jpg 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-768x432.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-1536x865.jpg 1536w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-2048x1153.jpg 2048w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/info-EN-800x450.jpg 800w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\u00a0<\/strong><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\"><strong>About our method<\/strong><\/h3>\n<p style=\"text-align: justify;\">All of the information presented in this study comes from Wavestone&#8217;s field observations as well as multiple sources &#8211; both public and private such as: the National Cyber Security Center, Check Point Research, Palo Alto Networks, Breachquest and Chainalysis.<\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Sources :<\/h3>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref1\">[1]<\/a> \u00ab Conti ransomware shuts down operation, rebrands into smaller units \u00bb, Bleeping Computer, May 2022<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-shuts-down-operation-rebrands-into-smaller-units\/\">Conti ransomware shuts down operation, rebrands into smaller units (bleepingcomputer.com)<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\">[2]<\/a> \u00ab\u00a0Cyberattacks in 2021: ransomwares, still threat n\u00b01 \u00bb, Risk Insight, October 2021<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/2021\/10\/cyberattaques-en-france-le-ransomware-menace-numero-1\/\">https:\/\/www.riskinsight-wavestone.com\/2021\/10\/cyberattaques-en-france-le-ransomware-menace-numero-1\/<\/a>\u00a0<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\">[3]<\/a> \u00ab US links $5.2 billion worth of Bitcoin transactions to ransomware \u00bb, Bleeping Computer, October 2021<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-links-52-billion-worth-of-bitcoin-transactions-to-ransomware\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/us-links-52-billion-worth-of-bitcoin-transactions-to-ransomware\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref4\">[4]<\/a> \u00ab Le ran\u00e7ongiciel Ryuk \u00bb, ANSSI, September 2021<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cert.ssi.gouv.fr\/uploads\/CERTFR-2020-CTI-011.pdf\">CERTFR-2020-CTI-011.pdf (ssi.gouv.fr)<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref5\">[5]<\/a> \u00ab THE 2022 CRYPTO CRIME REPORT \u00bb, Chainalysis, F\u00e9vrier 2022<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/go.chainalysis.com\/rs\/503-FAP-074\/images\/Crypto-Crime-Report-2022.pdf\">Crypto-Crime-Report-2022.pdf (chainalysis.com)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete.[1] This announcement comes only a few months after it was the center of attention of the specialized press&#8230;<\/p>\n","protected":false},"author":1439,"featured_media":18216,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3922],"tags":[4094,3486,3387,3838],"coauthors":[4093,4092],"class_list":["post-18223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-deep-dive-en","tag-conti-2","tag-cybercrime","tag-cybercriminality","tag-ransomware-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: Inside the former CONTI group - RiskInsight<\/title>\n<meta name=\"description\" content=\"We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete. This announcement comes only a few months after it was the center of attention of the specialized press following the &quot;Conti Leaks&quot;.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Inside the former CONTI group - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete. This announcement comes only a few months after it was the center of attention of the specialized press following the &quot;Conti Leaks&quot;.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-01T15:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-04T13:46:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tristan Puech, Laurenne-Sya Luce\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tristan Puech, Laurenne-Sya Luce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\"},\"author\":{\"name\":\"Laurenne-Sya Luce\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/39b03f4c54a90c6d7b8bf267c7d87478\"},\"headline\":\"Ransomware: Inside the former CONTI group\",\"datePublished\":\"2022-07-01T15:30:00+00:00\",\"dateModified\":\"2022-07-04T13:46:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\"},\"wordCount\":770,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg\",\"keywords\":[\"CONTI\",\"cybercrime\",\"cybercriminality\",\"ransomware\"],\"articleSection\":[\"Deep-dive\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\",\"name\":\"Ransomware: Inside the former CONTI group - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg\",\"datePublished\":\"2022-07-01T15:30:00+00:00\",\"dateModified\":\"2022-07-04T13:46:08+00:00\",\"description\":\"We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete. This announcement comes only a few months after it was the center of attention of the specialized press following the \\\"Conti Leaks\\\".\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg\",\"width\":2000,\"height\":1333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Inside the former CONTI group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/39b03f4c54a90c6d7b8bf267c7d87478\",\"name\":\"Laurenne-Sya Luce\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/laurenne-sya-luce\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Inside the former CONTI group - RiskInsight","description":"We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete. This announcement comes only a few months after it was the center of attention of the specialized press following the \"Conti Leaks\".","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: Inside the former CONTI group - RiskInsight","og_description":"We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete. This announcement comes only a few months after it was the center of attention of the specialized press following the \"Conti Leaks\".","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/","og_site_name":"RiskInsight","article_published_time":"2022-07-01T15:30:00+00:00","article_modified_time":"2022-07-04T13:46:08+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg","type":"image\/jpeg"}],"author":"Tristan Puech, Laurenne-Sya Luce","twitter_misc":{"Written by":"Tristan Puech, Laurenne-Sya Luce","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/"},"author":{"name":"Laurenne-Sya Luce","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/39b03f4c54a90c6d7b8bf267c7d87478"},"headline":"Ransomware: Inside the former CONTI group","datePublished":"2022-07-01T15:30:00+00:00","dateModified":"2022-07-04T13:46:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/"},"wordCount":770,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg","keywords":["CONTI","cybercrime","cybercriminality","ransomware"],"articleSection":["Deep-dive"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/","name":"Ransomware: Inside the former CONTI group - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg","datePublished":"2022-07-01T15:30:00+00:00","dateModified":"2022-07-04T13:46:08+00:00","description":"We recently learned from AdvIntel researcher Yelisey Boguslavskiy that the Russian group Conti shut down its operation, thereby making the brand obsolete. This announcement comes only a few months after it was the center of attention of the specialized press following the \"Conti Leaks\".","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/06\/couverture.jpg","width":2000,"height":1333},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/07\/ransomware-inside-the-former-conti-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Inside the former CONTI group"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/39b03f4c54a90c6d7b8bf267c7d87478","name":"Laurenne-Sya Luce","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/laurenne-sya-luce\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/18223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1439"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=18223"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/18223\/revisions"}],"predecessor-version":[{"id":18265,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/18223\/revisions\/18265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/18216"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=18223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=18223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=18223"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=18223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}