We are kicking off a new theme this week focusing on Conti ransomware. We have released some Conti TTPs previously, but plan to expand it to include an entire adversary attack from beginning to end. The Conti theme will contain the following kill-chains:
Conti is considered Ransomware-as-a-Service (RaaS) and has an elaborate chain of events from initial access to execution of the ransomware. For this week, we are focusing on the initial access. Conti tends to use three methods to gain initial access; spearphishing, weak RDP credentials, and search engine promoted application installs. We are specifically focusing on spearphishing to gain initial access. In this chain, we use Pneuma agent as a stager then open both a phishing email and malicious PDF which will execute Jambi as our Conti agent moving forward.
Check it out on the Prelude chains website.
Watch a demonstration: Conti Recon & Initial Access
Thanks for reading our latest TTP Tuesday release! Please subscribe and reach out with any feedback. We love to hear from our community!
There are several ways to follow us and learn more about Prelude and our team members:
Download Prelude Operator: https://www.prelude.org/download/current
See the latest kill chain and TTP Releases: https://chains.prelude.org/
See our open-source repositories: https://github.com/preludeorg
Listen to our Podcast: https://anchor.fm/preludeorg
Read our blog: https://feed.prelude.org
Watch our live streams: https://www.twitch.tv/preludeorg
Watch our pre-recorded content: https://www.youtube.com/c/preludeorg