Introduction: This analysis delves into the Cl0P ransomware, which emerged in early 2019 and is linked to the TA505 threat group, remaining active as of January 2022. Known for aggressive campaigns against large enterprises, Cl0P employs various controls to evade analysis, including digital signatures on malicious payloads.
Target and Modus Operandi: Cl0P predominantly targets large companies, particularly in the financial, healthcare, manufacturing, and media sectors. Notably, it has also affected small and medium-sized businesses. The ransomware spreads through malicious email attachments, websites, and links. Operators exploit vulnerabilities such as Accellion FTA and “ZeroLogon.”
Attack Examples: The TA505 group behind Cl0P has demonstrated a high level of sophistication, targeting organizations regardless of size. Notable victims include Shell, Qualys, Kroger, and several universities globally, compromised through the hacking of Accellion FTA servers. UNC2546, associated with Cl0P, exploited four zero-day vulnerabilities in Accellion’s File Transfer Appliance in December 2020.
Technical Insights: Cl0P encrypts victim files using the AES-256 encryption algorithm, employing a combination of AES, RSA, and RC4. The unique encryption keys are stored remotely, requiring victims to contact the attacker for a decryptor. The ransomware can spread within a network, infecting multiple computers simultaneously. It often utilizes digital signatures to evade endpoint security controls and is capable of deleting Windows System Restore points, complicating recovery.
Detection Strategies: EDR is effective in identifying and preventing Cl0P-related malicious activities. For organizations without this platform, a combination of technical and operational measures is recommended:
Mitigation Measures: , the following steps can help mitigate the risk of Cl0P ransomware attacks:
A comprehensive approach, including employee education, preventive measures, and recovery strategies, is crucial to effectively mitigate the risk of Cl0P ransomware attacks.
Back