DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Clop ransomware is now extorting 66 Cleo data-theft victims

Posted on December 25, 2024 by Dissent

Bill Toulas reports:

The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands.

The cybercriminals announced that they are contacting those companies directly to provide links to a secure chat channel for conducting ransom payment negotiations. They also provided email addresses where victims can reach out themselves.

In the notification on their leak site, Clop lists 66 partial names of companies that did not engage the hackers for negotiations. If these companies continue to ignore, Clop threatens to disclose their full name in 48 hours.

Read more at Bleeping Computer.

Comment:

Clop has a history of finding and exploiting vulnerabilities in file transfer software. In the past, they successfully attacked entities by exploiting vulnerabilities in Accellion, GoAnywhere, and MOVEit software. And now Cleo’s software?  In each of the prevous campaigns, there were more than 100 victims each, with many victims each affecting numerous clients.

Clop does not need to encrypt its victims. By simply exfiltrating data, they position themselves as having at least some leverage to extort the companies, threatening to leak data  from those who do not pay. Clop generally follows up on its threats.

Clop’s attacks have affected countless people. In an awareness campaign,  a self-described watchdog called “Nam3L3ss” recently started leaking data that had been exfiltrated from Delta Dental in May of 2023 due to the MOVEit vulnerability. The data were previously leaked by Clop itself, but now may be reaching a new or even broader audience due to its leak on a clear net forum.

When Delta Dental reported its breach to Maine on behalf of affiliates and clients, it reported almost 7 million people affected.  And Delta Dental was just one of the companies or insurers that Clop had hit.

So when is the world going to wake up  or reassess the risks of using commercial file transfer software that transmits unencrypted data? Why is it still being used?

In one of his posts, Nam3L3ss quoted something often attributed to Einstein — that the definition of insanity is doing the same thing over and over again and expecting a different result. Is using file transfer software that transmits unencrypted data an act of insanity?  Or are insurers and covered entities just accepting the likelihood of a serious attack that will affect millions of people?  And if they are, then maybe we are the insane ones for not prohibiting this.

 

Related posts:

  • The Fortra/GoAnywhere breach also affected healthcare entities. Here’s what we know so far, Part 2.
Category: Commentaries and AnalysesHack

Post navigation

← Journalist faces Crime Branch action for exposing data breach, Kerala’s press fights back
Japan Airlines recovers from cyberattack, confirms no customer data leaks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.