Skip to content

CLOP Ransomware avoids takedowns by using torrents

is a HTML tag that is used to create a division or section in a webpage. It is widely used in web development to structure and style content on a webpage.

Clop Ransomware, a cybercriminal gang based in the United States, has changed its tactics to evade law enforcement surveillance.

Instead of using traditional websites to sell stolen data, Clop has started leaking data related to the victims of the MoveIT cyber-attack through torrents.

The group infiltrated the MoveIT software database and compromised sensitive information from nearly 600 organizations worldwide.

Initially, the leaked data was distributed through Clearweb websites accessible only via the TOR browser, but law enforcement took action against these sites.

To circumvent law enforcement, Clop started using torrents to distribute the stolen information, which not only helps them avoid detection but also addresses the issue of slow transfer speeds.

Cybersecurity firm Coverware estimates that Clop could earn an extortion payment of $60-$90 million with this latest move of using Torrent downloads.

Clop is known for engaging in double extortion attacks, where they pressure victims by disclosing breach details to the victimized company’s partners and customers.

They also often launch DDoS attacks on the victims’ networks, causing significant revenue losses and tarnishing the affected companies’ reputation.

This new tactic demonstrates the adaptability and sophistication of Clop Ransomware, highlighting the need for enhanced measures to counter such attacks.

Key Points:
– Clop Ransomware has changed its tactics to evade law enforcement surveillance.
– Instead of selling stolen data through traditional websites, Clop is now leaking data through torrents.
– The group infiltrated the MoveIT software database and compromised information from nearly 600 organizations.
– Clop is using torrents to distribute stolen information and avoid detection.
– Cybersecurity firm Coverware estimates that Clop could earn millions through this tactic.
– Clop engages in double extortion attacks and launches DDoS attacks on victims’ networks.
– This new tactic showcases the adaptability and sophistication of Clop Ransomware.

Leave a Reply

Your email address will not be published. Required fields are marked *