Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • CLOP ransomware suspects charged by police in Ukraine
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CLOP ransomware suspects charged by police in Ukraine

5 years ago Graham Cluley
CLOP ransomware suspects charged by police in Ukraine

Six people alleged to be part of the notorious CLOP ransomware gang have been detained and charged by Ukrainian police, following nearly two dozen raids across the country.

According to a statement released by the Ukraine’s cyber police, the hacking group is thought to have inflicted $500 million worth of damage on universities and organisations it exfiltrated data from and infected with ransomware.

The arrests are said to be connected to ransomware attacks that took place against organisations in the United States and South Korea, with law enforcement officers from both countries assisting in the investigation.

The attackers are thought to have used Cobalt Strike, a penetration testing tool which has become beloved by malicious hackers as a means of compromising organisations.

“Using remote access, the suspects activated malicious software ‘Cobalt Strike’, which provided information about the vulnerabilities of infected servers for further capture.”

Back in November 2020, a South Korean retailer was threatened by the CLOP ransomware gang which said it would release the payment card details of some two million customers if a Bitcoin ransom worth $40 million was not paid.

Some of this week’s arrests were recorded on video by police, showing armed officers raiding the suspects’ properties, seizing luxury vehicles, gathering computers and smartphones for forensic analysis, and counting large sums of money.

Obviously it’s good to see international law enforcement agencies working together to identify suspected members of a ransomware gang, and bring them to justice. If found guilty, those arrested could face up to eight years in prison.

But if you think that this might signal the end of the CLOP ransomware gang, then I fear I may have to dampen your hopes.

Those arrested in Ukraine do not appear to have been the masterminds of the group, but rather members of the gang who were engaged in the cashing-out and money-laundering side of the criminal enterprise.

Experts at Intel471 told journalists that they “did not believe that any core actors behind CLOP were apprehended, due to the fact they are probably living in Russia.”

Meanwhile, CLOP’s website – where it publicises a list of past victims and shares terabytes of data files it has stolen from victims who refused to pay a ransom – remains online on the dark web.

Whether CLOP operatives further up the food chain will be apprehended in the future remains, for now, uncertain and may require a greater level of international co-operation than has been seen to date.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” CLOP ransomware suspects charged by police in Ukraine” appeared first on TripWire

Source:TripWire – Graham Cluley

Tags: Encryption, Finance, Goverment, Malware, Ransomware, TripWire

Continue Reading

Previous Breaches and Incidents: Top 5 Cyber-attacks in Quarter 1
Next CVS Health Records for 1.1 Billion Customers Exposed

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

15 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams

22 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

23 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

24 hours ago [email protected] (The Hacker News)

Recent Posts

  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
  • Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
  • Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
  • The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT