Cyber Crime

An international joint operation resulted in the arrest of Clop ransomware members

Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an international joint operation.

Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an international operation conducted by law enforcement from Ukraine, South Korea, and the US.

At the time of this writing, the Ukrainian authorities did not disclose the number of Clop ransomware operators that have been arrested.

The law enforcement agencies from the involved countries shut down infrastructure used by the ransomware gang in its operations, the police also conducted searches at 21 houses in Kyiv.

“The hacker group was exposed by officers of the Cyber ​​Police Department together with the Main Investigation Department of the National Police. The perpetrators were exposed as part of an international operation to promote and coordinate Interpol (IGCI) and in collaboration with law enforcement officials from the Republic of Korea and the United States.” reported Ukraine’s Cyber Police division, “The perpetrators were exposed as part of an international operation, It was established that six defendants carried out attacks of malicious software such as “Ransomware” on the servers of American and Korean companies.”

The police also seized computers, smartphones, and server equipment were seized, 5 million Ukrainian hryvnias (+$180K) in cash, and several cars, including Tesla, Mercedes, and Lexus models.

Clop ransomware gang has been active since February 2019, it targeted many organizations and universities over the years. Like other ransomware gangs, Clop operators implemented a double-extortion model leaking on their leak sites the data stolen from the victims that refused to pay the ransom.

In February 2021, FireEye researchers reported the collaboration between the Clop gang and the FIN11 cybercrime group. The security firm discovered that the FIN11 hackers were publishing data from Accellion FTA customers on the Clop ransomware leak site.

According to the Ukraine police, in 2019 the Clop ransomware gang infected the systems of four South Korean companies asking for large ransoms, the malware has infected 810 internal servers and personal computers of employees blocking the operations of the victims. 

“Hackers sent e-mails with a malicious file to the mailboxes of company employees. After opening the infected file, the program sequentially downloaded additional programs from the distribution server and completely infected the victims’ computers with a remote managed program “Flawed Ammyy RAT“. continues the police.

“Using remote access, the suspects activated malicious software “Cobalt Strike”, which provided information about the vulnerabilities of infected servers for further capture. The attackers received a “ransom” in cryptocurrency for decrypting the information.”

According to the police, the total damage caused by the reaches $ 500 million. 

The arrested members of the ransomware gang risk up to eight years in prison.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Two Linux flaws can lead to the disclosure of sensitive data

Qualys warns of two information disclosure flaws in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise…

15 hours ago

Meta stopped covert operations from Iran, China, and Romania spreading propaganda

Meta stopped three covert operations from Iran, China, and Romania using fake accounts to spread…

1 day ago

US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator

The U.S. sanctioned Funnull Technology and Liu Lizhi for aiding romance scams that caused major…

2 days ago

ConnectWise suffered a cyberattack carried out by a sophisticated nation state actor<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

ConnectWise detected suspicious activity linked to a nation-state actor, impacting a small number of its…

2 days ago

Victoria’s Secret ‘s website offline following a cyberattack

Victoria’s Secret took its website offline after a cyberattack, with experts warning of rising threats…

3 days ago

China-linked APT41 used Google Calendar as C2 to control its TOUGHPROGRESS malware

Google says China-linked group APT41 controlled malware via Google Calendar to target governments through a…

3 days ago