Friday, February 21, 2025
HomeCyber AttackCL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors

CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors

Published on

SIEM as a Service

Follow Us on Google News

The notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical sectors such as telecommunications and healthcare.

Known for its sophisticated tactics, the group has exploited zero-day vulnerabilities to infiltrate systems, steal sensitive data, and extort victims.

This resurgence follows a relatively quieter 2024, during which CL0P listed only 27 victims compared to its infamous 2023 campaign with 384 breaches.

In February alone, over 80 attacks have been attributed to CL0P, underscoring its renewed focus on large-scale campaigns.

The group’s latest activities include exploiting vulnerabilities in widely used software platforms, such as Cleo products, to compromise organizations globally.

The vulnerability, tracked as CVE-2024-50623, allowed remote file uploads and downloads, leading to unauthorized access and data theft.

Despite patches being released for affected systems, cybersecurity experts warn that these fixes may be bypassed.

Cleo Breach Sparks New Wave of Attacks

A significant catalyst for this surge in activity was the Cleo breach in late December 2024.

CL0P leveraged a zero-day vulnerability in Cleo LexiCom, VLTrader, and Harmony products to exfiltrate sensitive data from numerous organizations.

Following this breach, the group listed 66 companies on its data leak site (DLS), demanding ransom payments within 48 hours.

Failure to comply would result in public disclosure of the victims’ identities and stolen data.

The Cleo breach highlights the group’s ability to exploit vulnerabilities in widely used enterprise software, affecting thousands of organizations worldwide.

According to cybersecurity researcher Yutaka Sejiyama, partial company names revealed by CL0P can often be cross-referenced with exposed Cleo servers to identify victims.

According to Cyberint, this tactic amplifies the pressure on organizations to meet ransom demands.

Tactics and Impact

CL0P’s operations follow a well-established pattern of “steal, encrypt, and leak.”

After gaining access through vulnerabilities or phishing campaigns, the group conducts reconnaissance to identify valuable data before deploying ransomware.

The encryption phase involves halting critical services and deleting backup files using Windows tools like vssadmin.exe and taskkill.exe.

Encrypted files are marked with extensions such as .Clop or .Cl0p, accompanied by ransom notes detailing exfiltrated data and negotiation instructions.

The group’s leak site serves as a platform for publicizing non-compliant victims and releasing stolen data incrementally.

In recent months, CL0P has shifted from traditional leak sites to torrent-based distribution methods, complicating efforts by authorities to disrupt their operations.

CL0P Ransomware
CL0P Leak Site (Tor)

The telecom and healthcare sectors are particularly vulnerable due to their reliance on interconnected systems and sensitive data.

Healthcare organizations face heightened risks as ransomware attacks can disrupt patient care and compromise medical records.

Similarly, telecom companies are targeted for their extensive customer databases and critical infrastructure.

CL0P’s resurgence demonstrates the evolving threat landscape posed by ransomware groups exploiting zero-day vulnerabilities.

Organizations must prioritize robust patch management, endpoint monitoring, and disaster recovery planning to mitigate risks.

As CL0P continues its large-scale campaigns, cybersecurity experts emphasize the need for vigilance across all industries.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...