TOTAL ATTACKS
79
REPORTS APPEARED IN
1
GLOBAL RANK
#3
ATTACK SHARE
10.4%
Cl0p continues operating as one of the most established and financially successful RaaS platforms, with 79 attacks this period demonstrating their strategic evolution toward high-value technology and financial services targets. The group maintains their signature approach of leveraging T1190 exploitation of public-facing applications, particularly targeting supply chain vulnerabilities as evidenced by their recent Oracle E-Business Suite campaign that generated massive enterprise extortion campaigns. Their double extortion model combines data theft with traditional encryption, using T1021.002 SMB-based lateral movement to maximize data exfiltration before deploying ransomware payloads. Cl0p's estimated $500M+ earnings from supply chain attacks underscore their preference for high-impact, multi-victim campaigns that generate maximum return on investment, making them particularly dangerous to organizations with extensive vendor ecosystems.
17
upvotes
How Cl0p Ransomware Earned $500M+ by Hacking the Supply Chain
We’ve all seen the headlines about the **MOVEit** breach: the single largest cyber heist in history by victim count (2,500+ orgs, 66M+ people). But the story of the gang behind it, **Cl0p**, is even...
7
upvotes
Canon has confirmed a subsidiary was affected in the Cl0p ransomware group’s Oracle E-Business Suite exploit campaign.
The company says only a web server was impacted and there’s no evidence of leaked Canon data. Cl0p has already named over 100 organizations across industries - including Broadcom, Estée Lauder, Miche...
67
upvotes
Oracle and Google warn of large-scale extortion emails hitting enterprise clients | Hackers linked to the cl0p ransomware group claim responsibility for the campaign
3
upvotes
wsip-70-188-68-120.cox.net had INBOUND firewall traffic from 71.6.165.200 (tracked in cl0p ransomware) to 70.188.68.120
"connection_status": "ACCEPT", "direction": "INBOUND", "incoming_bytes": "60", "outgoing_bytes": "0", "geoip_country_code": "US", "geoip_country_name": "United States...