DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Clop ransomware is now extorting 66 Cleo data-theft victims

Posted on December 25, 2024 by Dissent

Bill Toulas reports:

The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands.

The cybercriminals announced that they are contacting those companies directly to provide links to a secure chat channel for conducting ransom payment negotiations. They also provided email addresses where victims can reach out themselves.

In the notification on their leak site, Clop lists 66 partial names of companies that did not engage the hackers for negotiations. If these companies continue to ignore, Clop threatens to disclose their full name in 48 hours.

Read more at Bleeping Computer.

Comment:

Clop has a history of finding and exploiting vulnerabilities in file transfer software. In the past, they successfully attacked entities by exploiting vulnerabilities in Accellion, GoAnywhere, and MOVEit software. And now Cleo’s software?  In each of the prevous campaigns, there were more than 100 victims each, with many victims each affecting numerous clients.

Clop does not need to encrypt its victims. By simply exfiltrating data, they position themselves as having at least some leverage to extort the companies, threatening to leak data  from those who do not pay. Clop generally follows up on its threats.

Clop’s attacks have affected countless people. In an awareness campaign,  a self-described watchdog called “Nam3L3ss” recently started leaking data that had been exfiltrated from Delta Dental in May of 2023 due to the MOVEit vulnerability. The data were previously leaked by Clop itself, but now may be reaching a new or even broader audience due to its leak on a clear net forum.

When Delta Dental reported its breach to Maine on behalf of affiliates and clients, it reported almost 7 million people affected.  And Delta Dental was just one of the companies or insurers that Clop had hit.

So when is the world going to wake up  or reassess the risks of using commercial file transfer software that transmits unencrypted data? Why is it still being used?

In one of his posts, Nam3L3ss quoted something often attributed to Einstein — that the definition of insanity is doing the same thing over and over again and expecting a different result. Is using file transfer software that transmits unencrypted data an act of insanity?  Or are insurers and covered entities just accepting the likelihood of a serious attack that will affect millions of people?  And if they are, then maybe we are the insane ones for not prohibiting this.

 


Related:

  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
Category: Commentaries and AnalysesHack

Post navigation

← Journalist faces Crime Branch action for exposing data breach, Kerala’s press fights back
Japan Airlines recovers from cyberattack, confirms no customer data leaks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.