Clop has been tied to hacks on health-care providers and a UK water supplier
Author of the article:
Bloomberg News
Jamie Tarabay
Published Jun 17, 2023 • 4 minute read
Join the conversation
Article content
(Bloomberg) — Shell Plc, IAG SA’s British Airways, the British Broadcasting Corp., the state of Minnesota’s Department of Education, multiple federal agencies — they’re among the victims of the latest data breach launched by Clop, a Russian-speaking hacking group that’s attacking targets around the world in both the public and private sectors.
Advertisement 2
Story continues below
This advertisement has not loaded yet, but your article continues below.
THIS CONTENT IS RESERVED FOR SUBSCRIBERS ONLY
Subscribe now to read the latest news in your city and across Canada.
Exclusive articles by Kevin Carmichael, Victoria Wells, Jake Edmiston, Gabriel Friedman and others.
Daily content from Financial Times, the world’s leading global business publication.
Unlimited online access to read articles from Financial Post, National Post and 15 news sites across Canada with one account.
National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
Daily puzzles, including the New York Times Crossword.
SUBSCRIBE TO UNLOCK MORE ARTICLES
Subscribe now to read the latest news in your city and across Canada.
Exclusive articles by Kevin Carmichael, Victoria Wells, Jake Edmiston, Gabriel Friedman and others.
Daily content from Financial Times, the world’s leading global business publication.
Unlimited online access to read articles from Financial Post, National Post and 15 news sites across Canada with one account.
National Post ePaper, an electronic replica of the print edition to view on any device, share and comment on.
Daily puzzles, including the New York Times Crossword.
REGISTER TO UNLOCK MORE ARTICLES
Create an account or sign in to continue with your reading experience.
Access articles from across Canada with one account.
Share your thoughts and join the conversation in the comments.
The Clop gang, also known as Cl0p, is known for “driving global trends in criminal malware distribution,” according to the US Cybersecurity and Infrastructure Security Agency, or CISA. Clop has pulled off its latest breach by exploiting a weakness in MOVEit, a file-transfer product that companies and organizations use to transmit sensitive data. Once the hackers penetrated MOVEit, they could access data stored on MOVEit servers, a portal that’s enabled them to steal personal information from industry giants with tens of thousands of employees and government agencies that handle data, some of it sensitive, on millions of people. The hacking group claimed it obtained data from hundreds of companies, and while that allegation is difficult to confirm, the list of victims keeps growing. For instance, the US Department of Energy received a ransom request from Clop after two of its entities were affected by the breach. The Oak Ridge Associated Universities, which manages a contract with several of the department’s national laboratories, and the National Nuclear Security Administration, the agency arm that maintains the US nuclear stockpile, received the request but didn’t respond, a spokesperson for Oak Ridge said.Another ransom request was received by an Energy Department arm affected by the hack, the Waste Isolation Pilot Plant, which stores nuclear waste underground in New Mexico, Reuters reported.Clop is the name of a variant of ransomware, a type of malware used to encrypt a victim’s computer files in lieu of a payment. It is also the name of a financially motivated criminal gang that uses a variety of methods to extort its victims: by deploying ransomware and demanding payment; by stealing sensitive documents and threatening to post them online unless a payment is made; or both.
Financial Post Top Stories
Sign up to receive the daily top stories from the Financial Post, a division of Postmedia Network Inc.
By clicking on the sign up button you consent to receive the above newsletter from Postmedia Network Inc. You may unsubscribe any time by clicking on the unsubscribe link at the bottom of our emails or any newsletter. Postmedia Network Inc. | 365 Bloor Street East, Toronto, Ontario, M4W 3L4 | 416-383-2300
Thanks for signing up!
A welcome email is on its way. If you don’t see it, please check your junk folder.
The next issue of Financial Post Top Stories will soon be in your inbox.
We encountered an issue signing you up. Please try again
Article content
Article content
Advertisement 3
Story continues below
This advertisement has not loaded yet, but your article continues below.
Article content
Clop has been honing just this sort of breach for years, researchers at Kroll LLC, a private-intelligence firm, have found.
It appears to be one of their signature attacks. A few years ago, Clop leveraged software flaws in a file-transfer product made by a company then known as Accellion to access data from Morgan Stanley, Jones Day, and Kroger among others. Accellion has since changed its name to Kiteworks.
Earlier this year, the group claimed credit for a hack on a different file transfer product called GoAnywhere, from Fortra LLC.
“This finding illustrates the sophisticated knowledge and planning that go into mass exploitation events such as the MOVEit Transfer cyberattack,” ones where intruders use a single point of vulnerability in an attempt to compromise as many victims as possible, the Kroll researchers said.
Advertisement 4
Story continues below
This advertisement has not loaded yet, but your article continues below.
Article content
Cybercrime experts say they first came to know of the group’s malware in 2019, when it launched a phishing campaign as part of a series of ransomware attacks against Korean companies and US academic institutions. The list of targets soon expanded to include financial, insurance, manufacturing and communications companies across the world, according to Trend Micro, Inc., a cybersecurity firm.
By 2021, the group was flaunting its success. That February, its page on the dark web — known as a shaming site — included a long list of victims in places like the US, Singapore, and The Netherlands, security firm Mandiant Inc., reported.
In June of that year, Ukrainian police said they arrested multiple suspects who, they alleged, worked with Clop ransomware to extort organizations in the US and South Korea. According to law enforcement officials, the group fleeced victims out of $500 million.
This advertisement has not loaded yet, but your article continues below.
Article content
“The Clop ransomware group has been a persistent and damaging threat actor,” said Michael DeBolt, chief intelligence officer at Intel 471, a cyber threat intelligence firm. “The vulnerability used by the gang was unknown prior to the start of attacks, which put organizations using the software in a mostly defenseless position. The use of such a vulnerability before it is publicly known means Clop has the resources and ability to develop or acquire such capabilities.”
Like other Russian-speaking ransomware groups, Clop has avoided targets in former Soviet countries. In fact: its malware can’t even breach a computer that operates primarily in Russian, the Korean cyber firm AhnLab has found.
But it hasn’t shown much restraint elsewhere. Clop has been known for targeting the health-care sector, and in 2022, it took credit for an attack on a UK company that supplies water to more than 1.5 million people. In a statement on its dark web site at the time, the Clop group claimed it stole a trove of data and had gained access to systems that control chemical levels in the water. “If you are shocked it is good,” the group said.
—With assistance from Ari Natter.
(Updates with Energy Department starting in third paragraph.)
Article content
Share this article in your social network
Comments
Postmedia is committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. Comments may take up to an hour for moderation before appearing on the site. We ask you to keep your comments relevant and respectful. We have enabled email notifications—you will now receive an email if you receive a reply to your comment, there is an update to a comment thread you follow or if a user you follow comments. Visit our Community Guidelines for more information and details on how to adjust your email settings.
Comments
Postmedia is committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. Comments may take up to an hour for moderation before appearing on the site. We ask you to keep your comments relevant and respectful. We have enabled email notifications—you will now receive an email if you receive a reply to your comment, there is an update to a comment thread you follow or if a user you follow comments. Visit our Community Guidelines for more information and details on how to adjust your email settings.
Join the Conversation