Also known as: Cl0p, TA505, FIN11, Lace Tempest, DEV-0950
Profile generated with AI assistance — review before citing.
Exploit Public-Facing Application
Exploit vulnerabilities in internet-facing applications to gain access.
External Remote Services
Abuse remote services like VPNs or RDP to gain access to the network.
Valid Accounts
Use legitimate credentials to authenticate and gain access.
Spearphishing Attachment
Send targeted emails with malicious file attachments to gain initial access.
Malware used by Clop.
Malware used by Clop.
Malware used by Clop.
Malware used by Clop.
Malware used by Clop.
Legitimate tool used by Clop.
Legitimate tool used by Clop.
Malware used by Clop.
Malware used by Clop.
Legitimate tool used by Clop.
Legitimate tool used by Clop.
Legitimate tool used by Clop.
Legitimate tool used by Clop.
Malware used by Clop.
Legitimate tool used by Clop.
Malware used by Clop.
SQL injection exploit for CVE-2023-34362 in Progress MOVEit Transfer application used in mass compromise campaign
Zero-day exploit for CVE-2023-0669 in Fortra GoAnywhere MFT used for initial access
Remote access trojan deployed in Clop operations for persistence and lateral movement
| Type | Value |
|---|---|
| domain | clop-leaks[[.]]com |
| domain | sanjonmta[[.]]com |
| domain | fishingworld[[.]]club |
| hash | 0f0ff752b95e76a5745a689349e5b2ac |
| hash | 4d32c791b99f72f88c2a5cfa7b99f3e1f5f5b3d1a2e5e8f9d2b3c4d5e6f7a8b9 |
| hash | 8c5f0d7f8e2b4a3c9d1e5f7a8b6c4d2e |
| ip | 185[.]140[.]53[[.]]140 |
| ip | 91[.]212[.]166[[.]]109 |
| url | hxxp[://]ekfhzmslekfczawl[[.]]onion |
| hash | c14b96b706e9bb2f6dd00c42a2a62f82e3f2f2a1 |
| Domain / Host | Status |
|---|---|
clop-leaks[.]comClop ransomware data leak site (historical) | offline |
sanjonmta[.]comC2 domain associated with Clop operations | offline |
fishingworld[.]clubC2 infrastructure used in TA505/Clop campaigns | offline |
185[.]140[.]53[.]140C2 server IP associated with Clop infrastructure | active |
91[.]212[.]166[.]109Historical Clop C2 infrastructure | offline |
ekfhzmslekfczawl[.]onionClop ransomware Tor payment/negotiation site | active |
oa[.]88tech[.]me | offline |
xbox-ms-store-debug[.]com | offline |
ms-pipes-service[.]com | offline |
pubstorm[.]com | active |
pubstorm[.]net | active |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
CISA Alert: Clop Ransomware
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a
Microsoft Threat Intelligence: Lace Tempest (Clop)
https://www.microsoft.com/en-us/security/blog/2023/06/14/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
Mandiant: FIN11 and Clop Ransomware
https://www.mandiant.com/resources/blog/fin11-email-campaigns-precursor-for-ransomware-data-theft
CrowdStrike: Clop Ransomware Analysis
https://www.crowdstrike.com/blog/how-to-defend-against-clop-ransomware/
MITRE ATT&CK: Clop Group Profile
https://attack.mitre.org/groups/G0082/
Secureworks: Clop Ransomware Analysis
https://www.secureworks.com/research/clop-ransomware
Huntress: MOVEit Zero-Day Exploitation by Clop
https://www.huntress.com/blog/moveit-zero-day-findings
Palo Alto Networks: Clop Ransomware Timeline
https://unit42.paloaltonetworks.com/clop-ransomware/
Clop Ransomware Gang Exploiting MOVEit Transfer Vulnerability
https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft
Understanding the Clop Ransomware Threat
https://www.cisa.gov/stopransomware/clop-ransomware