{"id":2192,"date":"2021-08-10T20:20:07","date_gmt":"2021-08-10T20:20:07","guid":{"rendered":"https:\/\/osintme.com\/?p=2192"},"modified":"2021-08-10T20:23:47","modified_gmt":"2021-08-10T20:23:47","slug":"analysis-of-the-leaked-conti-ransomware-manuals","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2021\/08\/10\/analysis-of-the-leaked-conti-ransomware-manuals\/","title":{"rendered":"Analysis of the leaked Conti ransomware manuals"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2192\" class=\"elementor elementor-2192\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2874959 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2874959\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c337ecc\" data-id=\"c337ecc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-479758c elementor-widget elementor-widget-text-editor\" data-id=\"479758c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Several days ago, as a result of a disagreement about the fair distribution of ransomware proceeds of crime within the Conti cybercriminal fraternity, one of the group&#8217;s affiliates publicised close to 60 files containing manuals and resources for Conti ransomware operators.<\/p><p>This information dump provides a unique insider glimpse into how ransomware groups function, how they go about picking their targets, what methods they use, what resources they share and what defenders can look out for when trying to stop an intrusion.<\/p><p>There probably isn&#8217;t that much of new content here, as some of the techniques and software have been used by cybercriminals for a while. Yet it&#8217;s pretty rare to witness a complete information dump such as this, originating from within the actual ransomware operator community.<\/p><p><strong>NOTE:<\/strong> The original documents are all in Russian &#8211; any discrepancies or inaccuracies that might arise result from my own translatory shortcomings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a571447 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a571447\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6b0a82c\" data-id=\"6b0a82c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0248df9 elementor-widget elementor-widget-heading\" data-id=\"0248df9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preparation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c11ac68 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c11ac68\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36ef426\" data-id=\"36ef426\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-abe034b elementor-widget elementor-widget-text-editor\" data-id=\"abe034b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>The attackers set up a virtual machine using a VeraCrypt encrypted volume for their own security.<\/li><li>Disabling webrtc, Javascript and Flash is NOT recommended &#8211; as this could result in an operator attracting more attention when connecting to target systems.<\/li><li>The manual advises against using Kali Linux in favour of Debian or another custom built system.<\/li><li>Connections to target systems are established through proxy IP addresses owing to the usage of Proxifier, Tor and Whonix.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4251a01 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4251a01\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-596ab4e\" data-id=\"596ab4e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03a7709 elementor-widget elementor-widget-heading\" data-id=\"03a7709\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reconnaissance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbcf694 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbcf694\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-778e977\" data-id=\"778e977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-509fc09 elementor-widget elementor-widget-text-editor\" data-id=\"509fc09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Automated pings are sent out to target systems using a batch file and a list of machines.<\/li><li>RouterScan is used to, nomen omen, identify routers on a specific IP address range. It will also attempt to connect to those using a list of known default credentials.<\/li><li>A cracked version of Cobalt Strike (legitimate pentesting software) is being used to conduct system profiling and establish covert communication.<\/li><li>Internal network scans are conducted using NetScan, which focuses on finding information such as host names, open ports, groups and domains, device and OS information, etc.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ae2c4df elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae2c4df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f87ac6d\" data-id=\"f87ac6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3954ecd elementor-widget elementor-widget-heading\" data-id=\"3954ecd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exploitation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e7a69d4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7a69d4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a73bcb\" data-id=\"6a73bcb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3810df6 elementor-widget elementor-widget-text-editor\" data-id=\"3810df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Access to victim machines takes place using the RDP port (Remote Desktop Protocol) by abusing Ngrok, a legitimate remote access software.<\/li><li>Once connection is established, remote access to the target machine is maintained using AnyDesk.<\/li><li>Metasploit is used to check for exploits and vulnerabilities.<\/li><li>When exploiting Windows operating systems, the attackers set out to create a list of Active Directory users (ad_users) and save it as a text file. This file will later be used to run automated scripts aimed at injecting a malicious process and bypass an AV program.<\/li><li>Mimikatz \/ LSASS are used to extract passwords and password hashes from memory.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8653dab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8653dab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a7b0cb0\" data-id=\"a7b0cb0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0427184 elementor-widget elementor-widget-heading\" data-id=\"0427184\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Post-Exploitation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f4e38f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0f4e38f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7abceda\" data-id=\"7abceda\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7a83fa elementor-widget elementor-widget-text-editor\" data-id=\"a7a83fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Domain controller enumeration and data extraction is facilitated using PowerView.<\/li><li>Windows Defender is turned off (manually, if necessary) and shadow volume copies are deleted from the system.<\/li><li>Data exfiltration takes place using Rclone and MEGA.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d09479 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d09479\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddb1f12\" data-id=\"ddb1f12\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c55ce68 elementor-widget elementor-widget-heading\" data-id=\"c55ce68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intelligence<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-855f353 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"855f353\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a638fb\" data-id=\"9a638fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e9279be elementor-widget elementor-widget-text-editor\" data-id=\"e9279be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>So much for the techniques used by Conti operators, in a snapshot.<\/p><p>Also interesting are parts of the manuals that include some pieces of digital intel, as follows:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d32ade elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d32ade\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-683e226\" data-id=\"683e226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ef57ab elementor-widget elementor-widget-text-editor\" data-id=\"0ef57ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Admin details:<\/strong><\/p><p>Nickname: Tokyo<\/p><p>Jabber: cicada3301@strong.pm\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da6143c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"da6143c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70242d1\" data-id=\"70242d1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fecaf9 elementor-widget elementor-widget-text-editor\" data-id=\"8fecaf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>IP addresses of command &amp; control servers:<\/strong><\/p><ul><li>162.244.80.235<\/li><li>85.93.88.165<\/li><li>185.141.63.120<\/li><li>82.118.21.1<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-472efc6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"472efc6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-afcb340\" data-id=\"afcb340\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6368831 elementor-widget elementor-widget-text-editor\" data-id=\"6368831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>NOTE:<\/strong> It&#8217;s reasonable to expect that at this stage the above IP addresses have been changed &#8211; but this information can still be useful for analysing past events and connection attempts from these addresses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a479299 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a479299\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9211bf\" data-id=\"f9211bf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-898999a elementor-widget elementor-widget-text-editor\" data-id=\"898999a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>List of machine names used to connect to target systems:<\/strong><\/p><p>CLeichty<br \/>sd-cernst-vista<br \/>SDBUILD11<br \/>sd-books-01<br \/>sdt-xp-04<br \/>DEV-SPARE<br \/>MININT-N3JOUQL<br \/>SDBUILD10<br \/>sdmmarshall02<br \/>gary-x60<br \/>laptop07<br \/>gary-x61<br \/>cernstdesktop<br \/>pkomosin01<br \/>MININT-50C2BP7<br \/>DESKTOP-PC<br \/>SGRAY-PC<br \/>MattHLaptop<br \/>MattLauth-PC<br \/>jimbendt<br \/>laptop05<br \/>sdbuild13<br \/>nholli-laptop01<br \/>rthomp01<br \/>sdlaptop02<br \/>SDT-Vista-01<br \/>SDBuild19<br \/>GHARPST-LAPTOP<br \/>sdt-xp-01<br \/>dedds01<br \/>sdt-xp-02<br \/>SDT-WIN7X64-01<br \/>DKECK-OUTLOOK<br \/>vern-laptop<br \/>GHARPST01<br \/>mheidepriem<br \/>CWETHERILL2<br \/>PKOMOSINSKI01<br \/>GHARPST-X200<br \/>six-d9db82df276<br \/>jridge01<br \/>banderson02<br \/>SDT-Win8x64-01<br \/>SDT-XP-03<br \/>SD-EMailVerifier-01<br \/>russ-PC<br \/>bclark03<br \/>SDD-Win8x64-01<br \/>GMHII<br \/>casey-PC<br \/>GH-SURFACE<br \/>mheidepriem01<br \/>DKECK-WIN7<br \/>SDT-Win81x64-01<br \/>jbendt-01<br \/>dkeck-VM<br \/>sdt-vista-02<br \/>sdt-xp-05<br \/>VERN-THINK<br \/>SDT-WIN7X86-02<br \/>perload02<br \/>MLAUTH01<br \/>cernst-desktop<br \/>XPS<br \/>cernst01<br \/>PHARTMAN01<br \/>CASEY-D810<br \/>SGRAY-PC1<br \/>DellLatD830<br \/>mheidepriemDesk<br \/>DLOCKET01<br \/>dlockert<br \/>AutomatedTest<br \/>COREYL-DESKTOP<br \/>d410loaner<br \/>DKECK-DESKTOP<br \/>GH11<br \/>WIN-DSICSJFMGTJ<br \/>WIN-9CH5144SG63<br \/>NStrong<br \/>BLARK-E5530<br \/>CASEY-ASUS<br \/>Casey-Desktop<br \/>SDT-Win10x64-01<br \/>CWETHERILL<br \/>DESKTOP-T6363GF<br \/>GH-PC<br \/>MHeidepriem03<br \/>MHEIDEPRIEM02<br \/>SDT-Win10x64-02<br \/>SDBUILD-01<br \/>SDT-Win8x86-01<br \/>SDBUILD-02<br \/>SS-SLATE<br \/>Gary-Yoga<br \/>SDT-WIN7X86-01<br \/>BSI-PWD-01<br \/>LOANER<br \/>Wetherill<br \/>SurfacePro3<br \/>DESKTOP-K66L1AA<br \/>SDS-NKOMOSINSKI<br \/>blortied420<br \/>casey-laptop<br \/>Wetherill-Acer<br \/>SDBUILD-LAP1<br \/>davids-macbook<br \/>SDBUILD14<br \/>lenovocarbon<br \/>VSTRONG-LENOVO<br \/>SD-VERN-01<br \/>CaseyAcer<br \/>casey-dev<br \/>DKECK-WORK<br \/>dkeck-dev<br \/>6D-JHARPST-02<br \/>Cory-Asus<br \/>SIXD-TMACKE-L1<br \/>rmortensen1<br \/>6d-jharpst-01<br \/>CoreyL-Laptop<br \/>rmortensen<br \/>CoreyL-Dev<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-baaa405 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"baaa405\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b8ab377\" data-id=\"b8ab377\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8f2182 elementor-widget elementor-widget-text-editor\" data-id=\"e8f2182\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>List of passwords commonly targeted for brute forcing by the operators using SMB Autobrut (yes, people still use such weak passwords&#8230;):<\/b><\/p><p>Password1<br \/>Hello123<br \/>password<br \/>Welcome1<br \/>banco@1<br \/>training<br \/>Password123<br \/>job12345<br \/>spring<br \/>food1234<\/p><p>June2020<br \/>July2020<br \/>August20<br \/>August2020<br \/>Summer20<br \/>Summer2020<br \/>June2020!<br \/>July2020!<br \/>August20!<br \/>August2020!<br \/>Summer20!<br \/>Summer2020!<\/p><p><strong>NOTE:<\/strong> The point of listing these is to highlight how pathetically weak such passwords are. Also, attackers actively scan for domain controller information and no lockout threshold set on the account &#8211; which means that the account does not lock after a specified number of failed authentication attempts, therefore it can be brute forced without any constraints.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7f0229 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7f0229\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-83ac726\" data-id=\"83ac726\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47814a0 elementor-widget elementor-widget-text-editor\" data-id=\"47814a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Site used for creating and editing commands:<\/strong><\/p><p>http:\/\/tobbot.com\/data\/<\/p><p><em>(flagged as malicious by some scanners)<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ed07fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ed07fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d26d827\" data-id=\"d26d827\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4101367 elementor-widget elementor-widget-text-editor\" data-id=\"4101367\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>List of recommended Telegram forums:<\/strong><\/p><ul><li>https:\/\/t.me\/peass<\/li><li>https:\/\/t.me\/antichat<\/li><li>https:\/\/t.me\/thebugbountyhunter<\/li><li>https:\/\/t.me\/club1337<\/li><li>https:\/\/t.me\/infosec1<\/li><li>https:\/\/t.me\/RalfHackerChannel<\/li><li>https:\/\/t.me\/in51d3<\/li><li>https:\/\/t.me\/exploithacker<\/li><li>https:\/\/t.me\/Premium_Hacking<\/li><li>https:\/\/t.me\/DownloadCourse14<\/li><li>https:\/\/t.me\/ViperZCrew<\/li><li>https:\/\/t.me\/techpwnews<\/li><li>https:\/\/t.me\/cyb3rhunt3r<\/li><li>https:\/\/t.me\/cveNotify<\/li><li>https:\/\/t.me\/MalwareResearch<\/li><li>https:\/\/t.me\/BugCrowd<\/li><li>https:\/\/t.me\/itsecalert<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>An angry Conti ransomware affiliate dumped a bunch of manuals &#8211; here is a synopsis of what can be found within.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[76,84,132,83,134,71],"class_list":["post-2192","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-cybercrime","tag-documents","tag-leak","tag-manuals","tag-ransomware","tag-russia"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/2192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=2192"}],"version-history":[{"count":28,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/2192\/revisions"}],"predecessor-version":[{"id":2241,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/2192\/revisions\/2241"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=2192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=2192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=2192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}