The CL0P ransomware group has ramped up its attacks in early 2025, focusing on critical sectors like telecommunications and healthcare. Known for its advanced tactics, the group has leveraged zero-day vulnerabilities to breach systems, steal confidential data, and extort businesses. This marks a stark contrast to 2024, when CL0P’s operations were relatively subdued, with only 27 victims listed. By February 2025, over 80 attacks had been attributed to the group, signaling a return to large-scale campaigns. A major part of the group's recent activities involves exploiting vulnerabilities in popular software platforms, such as Cleo products. The vulnerability, CVE-2024-50623, allowed for remote file uploads and unauthorized access, leading to data theft. Despite patches being issued, experts caution that these solutions might be bypassed. CL0P’s surge in activity can be traced back to a significant breach in Cleo’s products in December 2024, where the group exploited a zero-day vulnerability to extract sensitive data from multiple organizations. In response, CL0P demanded ransom payments from 66 companies, threatening to disclose their identities and stolen data if demands were not met. The group's operations follow a predictable pattern: steal, encrypt, and leak. After exploiting vulnerabilities or executing phishing campaigns, CL0P conducts reconnaissance to identify valuable data, followed by ransomware deployment to encrypt files. The encryption process halts critical services and deletes backup files. Encrypted files are marked with extensions like .Clop or .Cl0p, and ransom notes are left with instructions. Recently, CL0P has shifted from traditional leak sites to using torrent-based distribution methods, complicating law enforcement efforts to disrupt their operations. The telecom and healthcare industries remain prime targets due to their reliance on interconnected systems and sensitive information, making them vulnerable to these large-scale cyberattacks.
A critical vulnerability in F5 BIG-IP Access Policy Manager (APM) is being actively exploited, with over 14,000 exposed instances identified by Shadowserver. Initially classified a...
Cisco has issued a high-priority security alert concerning a critical flaw in its Smart Software Manager On-Prem (SSM On-Prem) platform, identified as CVE-2026-20160. The vulnerabi...
Modern fraud operations are evolving beyond traditional cyberattacks by leveraging legitimate services and physical-world infrastructure to execute highly effective schemes. Instea...