cl0p

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
Cl0p is a threat actor group that has emerged as the most used ransomware in March 2023, dethroning LockBit. The group has successfully exploited zero-day vulnerabilities in the past, but such attacks are relatively rare. Recent research by Malwarebytes highlights the bias of ransomware gangs for attacking English-speaking countries, and the Cl0p campaign follows the same trend. The Cl0p ransomware syndicate launched a cyberattack against several federal agencies and organizations in the US by exploiting weaknesses in MOVEit Transfer, a common file transfer platform. The group claims credit for several other cyberattacks in the past, including British Airways, Shell, and the governments in Minnesota and Illinois. The victims of the recent attack were given until Wednesday to negotiate a ransom or risk having sensitive stolen data dumped online. Many experts believe that the attacks are coming from the Cl0p Ransomware Gang, which is known to demand multimillion-dollar ransoms. The group has also been observed emailing stakeholders and customers of their victims, informing them that even their data will be leaked. Despite the successful attacks by Cl0p, the use of zero-day vulnerabilities remains relatively rare.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
TA505
3
TA505, also known as Cl0p Ransomware Gang and Lace Tempest, is a highly active and sophisticated cybercriminal group. The group has been associated with various high-profile cyber-attacks, demonstrating adaptability through a multi-vector approach to their operations. In June 2023, the U.S. Cybersec
Clop
2
Clop is a notorious malware, short for malicious software, known for its disruptive and damaging effects on computer systems. It primarily infiltrates systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, Clop can steal personal information, disrupt o
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Moveit
Vulnerability
exploited
Ransom
Mft
Extortion
exploitation
Papercut
CISA
flaw
Malware
Payload
Government
Phishing
T1190
Linux
Microsoft
Cybercrime
Encryption
Cobalt Strike
Backdoor
Exploit
Windows
RaaS
bugs
Solarwinds
Remote Code ...
Bitcoin
Financial
russian
Azure
Goanywhere
Huntress
Implant
Ransomware P...
Fortiguard
Sentinelone
Fbi
British
Sentinellabs
State Sponso...
Cybereason
Malwarebytes
Scam
Uk
Webshell
Spam
Poc
Ofcom
Apt
Federal
ftp
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Get2Unspecified
2
Get2 is a type of malware, harmful software designed to infiltrate and damage computer systems or devices. It can be unknowingly downloaded through suspicious emails, downloads, or websites, enabling it to steal personal information, disrupt operations, or hold data hostage for ransom. Among the mos
FlawedAmmyyUnspecified
2
FlawedAmmyy is a notable malware, specifically a Remote Access Trojan (RAT), that has been leveraged by threat actors for malicious purposes. The malware is designed to exploit and damage computer systems, often infiltrating through suspicious downloads, emails, or websites unbeknownst to the user.
FlawedGraceUnspecified
2
FlawedGrace is a notorious malware, a remote access trojan (RAT), that has been used extensively in cyberattacks. It was first brought to light in June 2023 when The DFIR Report revealed its use in Truebot operations. In these operations, following the successful download of a malicious file, Truebo
LemurlootUnspecified
2
LemurLoot is a malicious software, or malware, specifically a web shell written in C# that targets the MOVEit Transfer platform. It was developed and deployed by the CL0P ransomware group to exploit vulnerabilities in systems and steal data. In May 2023, the group exploited a SQL injection zero-day
HiveUnspecified
1
Hive is a malicious software, or malware, that infiltrates systems to exploit and damage them. This malware has been associated with Volt Typhoon, who exfiltrated NTDS.dit and SYSTEM registry hive to crack passwords offline. The Hive operation was primarily involved in port scanning, credential thef
REvilUnspecified
1
REvil is a notorious form of malware, specifically ransomware, that infiltrates systems to disrupt operations and steal data. The ransomware operates on a Ransomware as a Service (RaaS) model, which gained traction in 2020. In this model, REvil, like other first-stage malware such as Dridex and Goot
SDBbotUnspecified
1
SDBbot is a malicious software (malware) that infiltrates computer systems typically through deceptive downloads, emails, or websites. In the context of cyber threats, it falls under the category of custom malware, used by threat groups such as GOLD TAHOE. Other common offensive security tools and c
IcedIDUnspecified
1
IcedID is a malicious software (malware) designed to exploit and damage computer systems. It infects systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Volt TyphoonUnspecified
1
Volt Typhoon, a threat actor linked to China, has been identified as a significant cyber threat with strong operational security. Known for their sophisticated Advanced Persistent Threat (APT) activities, this group has been associated with the KV-Botnet and has remained undetected within U.S. infra
SnakeUnspecified
1
Snake, also known as EKANS, is a significant threat actor that has been active since at least 2004, with its activities potentially dating back to the late 1990s. This group, which may have ties to Iran, targets diplomatic and government organizations as well as private businesses across various reg
Evil CorpUnspecified
1
Evil Corp, a threat actor group based in Russia, has been identified as a significant cybercrime entity responsible for the execution of malicious actions. The alleged leader of this group is Maksim Yakubets, who is notably associated with Dridex malware operations. The U.S. Treasury imposed sanctio
Lace TempestUnspecified
1
Lace Tempest, a threat actor known for executing actions with malicious intent, has been identified as the orchestrator behind a series of cyber attacks exploiting a zero-day vulnerability in SysAid. The exploit was first brought to light by SysAid and further detailed in a blog post on TuxCare. Thi
FIN7Unspecified
1
FIN7, a notorious threat actor group known for its malicious activities, has recently been identified as targeting a large U.S. carmaker with phishing attacks. This group, which has previously operated behind fake cybersecurity companies such as Combi Security and Bastion Secure to recruit security
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CVE-2023-34362Unspecified
5
CVE-2023-34362 is a critical SQL injection vulnerability discovered in Progress Software's managed file transfer (MFT) solution known as MOVEit Transfer. This flaw in software design or implementation was first exploited by the CL0P Ransomware Gang, also known as TA505, beginning on May 27, 2023. Th
CVE-2023-0669Unspecified
2
CVE-2023-0669 is a software vulnerability that originated in Fortra's GoAnywhere Managed File Transfer (MFT) tool, which is a secure file transfer solution. This flaw, a remote code execution (RCE) vulnerability, allows unauthorized users to execute arbitrary commands on the affected system. The Clo
CVE-2023-3436Unspecified
1
None
CVE-2023-27350Unspecified
1
CVE-2023-27350 is a significant software vulnerability discovered in PaperCut NG/MF, a popular print management software. This flaw in software design or implementation allows attackers to bypass authentication and execute code with system privileges, posing a serious threat to both server and inter
CVE-2023-3462Unspecified
1
None
CVE-2023-27351Unspecified
1
None
CVE-2023-35708Unspecified
1
CVE-2023-35708 is a critical software vulnerability, specifically an SQL injection flaw, that affected the MOVEit Transfer application. This issue was identified as a privilege escalation vulnerability, meaning it could potentially allow unauthorized users to gain elevated access rights within the s
CVE-2023-35036Unspecified
1
CVE-2023-35036 is a significant vulnerability identified in the MOVEit Transfer software, part of the Progress Software suite. This flaw was first reported on June 16, 2023, following the discovery and exploitation of CVE-2023-34362 by a Clop ransomware affiliate. The CVE-2023-35036 vulnerability pr
Source Document References
Information about the cl0p Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
a year ago
CalPERS Latest Victim of MOVEit Hack with Data of Estimated 700K Members, Retirees Exposed | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
a year ago
New DoJ Cyber Prosecution Team Will Go After Nation-State Threat Actors
CERT-EU
a year ago
Avast, Norton Parent Latest Victim of MOVEit Ransomware Attacks
CERT-EU
a year ago
Hackers target DMV to expose data of 9.5 million people | Digital Trends
CERT-EU
a year ago
Zero-Day-Lücke: Cl0p nennt weitere Opfer der MOVEit-Transfer-Schwachstellen
CERT-EU
a year ago
SQL injection vulnerability in MOVEit Transfer leads to data breaches worldwide
CERT-EU
a year ago
Progress Software hit with class action lawsuit over MOVEit hack
CERT-EU
a year ago
Zero-Day-Lücke: Cl0p nennt weitere Opfer der MOVEit-Transfer-Schwachstellen
CERT-EU
a year ago
MOVEIt Vulnerability: A Painful Reminder That Threat Actors Aren’t the Only Ones Responsible for a Data Breach - Security Boulevard
Malwarebytes
a year ago
US dangles $10 million reward for information about Cl0p ransomware gang
CERT-EU
a year ago
La empresa de ciberseguridad Norton Lifelock, se convierte en víctima de ransomware, ¡ Que dios salve a los clientes!
CERT-EU
a year ago
EY and PwC Among the Many Entities Caught Up in the MOVEit Cybersecurity Breach Ransom | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
DARKReading
a year ago
Fresh Ransomware Gangs Emerge As Market Leaders Decline
CERT-EU
a year ago
The US government is offering $10 million for tips about Cl0p ransomware
CERT-EU
a year ago
attack on BBC and BA offers glimpse into the future of cybercrime | #cybercrime | #infosec | National Cyber Security Consulting
CERT-EU
a year ago
Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime
CERT-EU
a year ago
Datenleck: Verivox von MOVEit-Lücke betroffen
CERT-EU
a year ago
US authorities offer up to $10M for info on Clop ransomware
CERT-EU
a year ago
MOVEit Customers Urged to Patch Third Critical Vulnerability
CERT-EU
a year ago
Datenleck: Verivox von MOVEit-Lücke betroffen