The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a considerable ransom. It advances actively with new emerging campaigns. The Clop ransomware is associated with the Russian threat group TA505, which primarily operates as a (RaaS) ransomware-as-a-service. It is also seen that the threat group has been using various zero-day exploits for its campaigns, which include the latest Moveit Transfer exploitation. The ransomware is primarily Cryptomix ransomware, making its first appearance in 2019.
Clop ransomware mainly targets victims through spear-phishing campaigns, primarily focusing on the banking, healthcare, and finance sectors. The banking sector experiences the highest number of campaigns. On the contrary, the threat group avoids targeting the healthcare sector out of humanitarian considerations. However, the healthcare sector is still affected by its campaigns. The ransomware is also specific in targeting countries such as the USA, Canada, and most parts of the Asia Pacific. The most affected countries are the USA, Canada, and India, all falling victim to these campaigns.
The ransomware is observed exploiting numerous zero-day vulnerabilities with different variations. Installing DEWMODE
, a webshell, was initially detected on FTA servers by exploiting zero-days. Recently, it was also observed exploiting the MOVEIT Transfer vulnerability, which is an MFT with a SQL injection vulnerability. These exploits were primarily used to exfiltrate data from databases and install webshells, granting the threat actors complete control over the affected endpoints. In a new campaign launched by the threat group, they are seen exploiting GOAnywhere (MFT) using a zero-day vulnerability.
The ransomware actively targets various organizations, and it has been observed since late 2020 that the threat actors have compromised over 100 companies. In collaboration with Fin11, a financially motivated threat group, they exploited a zero-day vulnerability in the File Transfer Appliance (FTA) of Kiteworks (formerly known as Accellion). It is important to note that no data was encrypted; however, the threat actors threatened to expose millions of user data on the black market. The Clop ransomware was primarily used to exfiltrate the data. Additionally, the threat actors maintain a blog providing updates on their recent activities. They also operate a market selling data from various organizations for financial gain.
The infection chain of the Clop ransomware involves the following stages:
Clop ransomware specifically targets the MOVEIT Transfer vulnerability, an application designed to facilitate efficient management of file transfer operations within organizations. The threat actors took advantage of a SQL injection vulnerability present in the web application of MOVEIT Transfer. They exploited this vulnerability by installing a webshell known as LEMURLOOT
. Furthermore, the webshell incorporated various libraries from Moveit and primarily focused on enumerating and retrieving data from the underlying databases. This exploit not only enabled the threat actors to exfiltrate sensitive data but also gave them the ability to execute malicious code. The situation is particularly worrisome as it has been observed that more than 2000 servers are still utilizing the vulnerable version of the MOVEIT Transfer application, rendering them active targets for the threat actor.
Clop ransomware MOVEIT campaign LEMURLOOT Webshell
1 0ea05169d111415903a1098110c34cdbbd390c23016cd4e179dd9ef507104495 2 110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286 3 1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2 4 2413b5d0750c23b07999ec33a5b4930be224b661aaf290a0118db803f31acbc5 5 2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59 6 348e435196dd795e1ec31169bd111c7ec964e5a6ab525a562b17f10de0ab031d 7 387cee566aedbafa8c114ed1c6b98d8b9b65e9f178cf2f6ae2f5ac441082747a 8 38e69f4a6d2e81f28ed2dc6df0daf31e73ea365bd2cfc90ebc31441404cca264 9 3a977446ed70b02864ef8cfa3135d8b134c93ef868a4cc0aa5d3c2a74545725b 10 3ab73ea9aebf271e5f3ed701286701d0be688bf7ad4fb276cb4fbe35c8af8409 11 3c0dbda8a5500367c22ca224919bfc87d725d890756222c8066933286f26494c 12 4359aead416b1b2df8ad9e53c497806403a2253b7e13c03317fc08ad3b0b95bf 13 48367d94ccb4411f15d7ef9c455c92125f3ad812f2363c4d2e949ce1b615429a 14 58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166 15 5b566de1aa4b2f79f579cdac6283b33e98fdc8c1cfa6211a787f8156848d67ff 16 6015fed13c5510bbb89b0a5302c8b95a5b811982ff6de9930725c4630ec4011d 17 702421bcee1785d93271d311f0203da34cc936317e299575b06503945a6ea1e0 18 769f77aace5eed4717c7d3142989b53bd5bac9297a6e11b2c588c3989b397e6b 19 7c39499dd3b0b283b242f7b7996205a9b3cf8bd5c943ef6766992204d46ec5f1 20 93137272f3654d56b9ce63bec2e40dd816c82fb6bad9985bed477f17999a47db 21 98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8 22 9d1723777de67bc7e11678db800d2a32de3bcd6c40a629cd165e3f7bbace8ead 23 9e89d9f045664996067a05610ea2b0ad4f7f502f73d84321fb07861348fdc24a 24 a1269294254e958e0e58fc0fe887ebbc4201d5c266557f09c3f37542bd6d53d7 25 a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986 26 b1c299a9fe6076f370178de7b808f36135df16c4e438ef6453a39565ff2ec272 27 b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03 28 b9a0baf82feb08e42fa6ca53e9ec379e79fbe8362a7dac6150eb39c2d33d94ad 29 bdd4fa8e97e5e6eaaac8d6178f1cf4c324b9c59fc276fd6b368e811b327ccf8b 30 c56bcb513248885673645ff1df44d3661a75cfacdce485535da898aa9ba320d4 31 c77438e8657518221613fbce451c664a75f05beea2184a3ae67f30ea71d34f37 32 cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621 33 cf23ea0d63b4c4c348865cefd70c35727ea8c82ba86d56635e488d816e60ea45 34 d477ec94e522b8d741f46b2c00291da05c72d21c359244ccb1c211c12b635899 35 d49cf23d83b2743c573ba383bf6f3c28da41ac5f745cde41ef8cd1344528c195 36 daaa102d82550f97642887514093c98ccd51735e025995c2cc14718330a856f4 37 e8012a15b6f6b404a33f293205b602ece486d01337b8b3ec331cd99ccadb562e 38 ea433739fb708f5d25c937925e499c8d2228bf245653ee89a6f3d26a5fd00b7a 39 ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90c 40 f0d85b65b9f6942c75271209138ab24a73da29a06bc6cc4faeddcb825058c09d 41 fe5f8388ccea7c548d587d1e2843921c038a9f4ddad3cb03f3aa8a45c29c6a2f
Presented below is the YARA rule for the MOVEIT CVE, by AhmetPayaslioglu.
1rule MOVEit_Transfer_exploit_webshell_aspx { 2 3 meta: 4 5 date = "2023-06-01" 6 description = "Detects indicators of compromise in MOVEit Transfer exploitation." 7 author = "Ahmet Payaslioglu - Binalyze DFIR Lab" 8 hash1 = "44d8e68c7c4e04ed3adacb5a88450552" 9 hash2 = "a85299f78ab5dd05e7f0f11ecea165ea" 10 reference1 = "https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/" 11 reference2 = "https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" 12 reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643" 13 verdict = "dangerous" 14 mitre = "T1505.003" 15 platform = "windows" 16 search_context = "filesystem" 17 18 strings: 19 20 $a1 = "MOVEit.DMZ" 21 $a2 = "Request.Headers[\"X-siLock-Comment\"]" 22 $a3 = "Delete FROM users WHERE RealName='Health Check Service'" 23 $a4 = "set[\"Username\"]" 24 $a5 = "INSERT INTO users (Username, LoginName, InstID, Permission, RealName" 25 $a6 = "Encryption.OpenFileForDecryption(dataFilePath, siGlobs.FileSystemFactory.Create()" 26 $a7 = "Response.StatusCode = 404;" 27 28 condition: 29 30 filesize < 10KB 31 and all of them 32 33} 34 35rule MOVEit_Transfer_exploit_webshell_dll { 36 37 meta: 38 39 date = "2023-06-01" 40 description = "Detects indicators of compromise in MOVEit Transfer exploitation." 41 author = "Djordje Lukic - Binalyze DFIR Lab" 42 hash1 = "7d7349e51a9bdcdd8b5daeeefe6772b5" 43 hash2 = "2387be2afe2250c20d4e7a8c185be8d9" 44 reference1 = "https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/" 45 reference2 = "https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" 46 reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643" 47 verdict = "dangerous" 48 mitre = "T1505.003" 49 platform = "windows" 50 search_context = "filesystem" 51 52 strings: 53 54 $a1 = "human2.aspx" wide 55 $a2 = "Delete FROM users WHERE RealName='Health Check Service'" wide 56 $a3 = "X-siLock-Comment" wide 57 58 condition: 59 60 uint16(0) == 0x5A4D and filesize < 20KB 61 and all of them 62}
FourCore has utilized analysis reports, TTPs, and threat intelligence to develop an adversary simulation assessment for Clop Ransomware. This assessment aims to validate the effectiveness of your organization's security controls using the FourCore ATTACK Platform.