threatintel
actor tracker
All actors

Conti

conti · primary source: MITRE · first observed 2020 · last observed 2022
RU · RussiaRansomwareModerate confidencelast cited Feb 26, 2022 · 4y ago

Russian-speaking ransomware operation that ran the dominant double-extortion brand of 2020-2022. After the group publicly declared support for the Russian invasion of Ukraine in February 2022, an insider leaked the operation's complete Jabber chat archive ('Conti Leaks', 27 February 2022), exposing operator identities, salaries, an org chart, and the Conti v2 builder source code. The Conti brand wound down by mid-2022; operators dispersed into Black Basta, Royal/BlackSuit, BlackByte, Karakurt, Quantum, and other successor operations.

Aliases

Wizard SpiderCrowdStrikeTrickBot GroupOtherGold UlrickOther

Motivations

financial gain

Target sectors

healthcaregovernmentmanufacturingfinancial

Target countries

USGBDEFRITCR

Lineage & relationships

full graph →
Predecessor ofPredecessor ofContithis actorBlack Basta??RansomwareBlackSuit??Ransomware

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Conti
  • Russia
  • financial gain
Infrastructure
  • badiwaw.com
  • 185.141.63.120
  • 162.244.80.235
Victim
  • healthcare
  • government
  • manufacturing
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Tools & malware

5 entries

Timeline

1 event

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
Domain
badiwaw[.]com
family · Conti
One of 98 lookalike domains sharing registration and naming characteristics of Conti-distribution infrastructure published by CISA in the February-March 2022 update to AA21-265A.
Mar 8, 2022CISA
IPv4
185[.]141[.]63[.]120
family · Conti
Cobalt Strike C2 server IP attributed to Conti operators in the leaked-playbook artifacts referenced in the March 2022 update to AA21-265A. Conti relied on Cobalt Strike alongside TrickBot for post-exploitation.
Sep 21, 2021CISA
IPv4
162[.]244[.]80[.]235
family · Conti
Cobalt Strike C2 server IP identified in artifacts leaked with the Conti 'playbook' and republished in the March 9, 2022 update to joint CISA/FBI/NSA/USSS advisory AA21-265A as previously used by Conti affiliates.
Sep 21, 2021CISA

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Conti — actor profile. Retrieved from https://threatintel.local/actors/conti

latest cited activity · 2022-02-27 · 3 cataloged indicators