DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Clop ransomware is now extorting 66 Cleo data-theft victims

Posted on December 25, 2024 by Dissent

Bill Toulas reports:

The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands.

The cybercriminals announced that they are contacting those companies directly to provide links to a secure chat channel for conducting ransom payment negotiations. They also provided email addresses where victims can reach out themselves.

In the notification on their leak site, Clop lists 66 partial names of companies that did not engage the hackers for negotiations. If these companies continue to ignore, Clop threatens to disclose their full name in 48 hours.

Read more at Bleeping Computer.

Comment:

Clop has a history of finding and exploiting vulnerabilities in file transfer software. In the past, they successfully attacked entities by exploiting vulnerabilities in Accellion, GoAnywhere, and MOVEit software. And now Cleo’s software?  In each of the prevous campaigns, there were more than 100 victims each, with many victims each affecting numerous clients.

Clop does not need to encrypt its victims. By simply exfiltrating data, they position themselves as having at least some leverage to extort the companies, threatening to leak data  from those who do not pay. Clop generally follows up on its threats.

Clop’s attacks have affected countless people. In an awareness campaign,  a self-described watchdog called “Nam3L3ss” recently started leaking data that had been exfiltrated from Delta Dental in May of 2023 due to the MOVEit vulnerability. The data were previously leaked by Clop itself, but now may be reaching a new or even broader audience due to its leak on a clear net forum.

When Delta Dental reported its breach to Maine on behalf of affiliates and clients, it reported almost 7 million people affected.  And Delta Dental was just one of the companies or insurers that Clop had hit.

So when is the world going to wake up  or reassess the risks of using commercial file transfer software that transmits unencrypted data? Why is it still being used?

In one of his posts, Nam3L3ss quoted something often attributed to Einstein — that the definition of insanity is doing the same thing over and over again and expecting a different result. Is using file transfer software that transmits unencrypted data an act of insanity?  Or are insurers and covered entities just accepting the likelihood of a serious attack that will affect millions of people?  And if they are, then maybe we are the insane ones for not prohibiting this.

 

Category: Commentaries and AnalysesHack

Post navigation

← Journalist faces Crime Branch action for exposing data breach, Kerala’s press fights back
Japan Airlines recovers from cyberattack, confirms no customer data leaks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.