Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
About
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

All Threat Actors

Clop

Also known as: Cl0p, TA505, FIN11, Lace Tempest, DEV-0950

ActiveAdvancedEastern Europe / Russia

Profile generated with AI assistance — review before citing.

0Campaigns
34Techniques
10IOCs
19Tools
0Matches
11Infrastructure
OverviewTechniquesToolsIOCsInfrastructureReferences

Overview

Clop (also known as Cl0p) is a sophisticated ransomware-as-a-service (RaaS) operation and cybercriminal group that has been active since 2019. The group gained significant notoriety for its double extortion tactics, where they both encrypt victim data and threaten to publish stolen information on their leak site if ransom demands are not met. Clop operates with a highly organized structure and targets large enterprises across multiple sectors, focusing on organizations that can afford substantial ransom payments. The group is believed to have connections to TA505, a well-established financially motivated threat actor group, and operates primarily from Eastern Europe, with suspected ties to Russian-speaking cybercriminal networks. Clop achieved widespread attention in 2023 through their mass exploitation of zero-day vulnerabilities in file transfer applications, particularly the MOVEit Transfer zero-day (CVE-2023-34362), which affected hundreds of organizations worldwide including government agencies, healthcare providers, and Fortune 500 companies. Clop's operational methodology demonstrates high sophistication, utilizing custom malware variants, exploiting supply chain vulnerabilities, and conducting extensive reconnaissance before attacks. The group maintains an active data leak site where they publish stolen data from non-compliant victims, applying significant pressure on organizations to pay ransoms. Their operations have resulted in hundreds of millions of dollars in damages globally, making them one of the most impactful ransomware operations in recent years.

Motivations

Financial gainData extortionRansomware operations

Target Sectors

HealthcareFinancial servicesLegal servicesManufacturingRetailEducationGovernment agenciesTechnology sectorTransportationEnergyProfessional servicesTechnology

Activity Timeline

First Seen

Feb 2019

Last Seen

Jan 2024

Quick Facts

OriginEastern Europe / Russia
Sophisticationadvanced
StatusActive

MITRE ATT&CK Techniques

(34)

Impact

T1486

Data Encrypted for Impact

Encrypt victim data to disrupt availability, typically for ransom.

T1490

Inhibit System Recovery

Delete backups, shadow copies, or recovery partitions to prevent restoration.

T1489

Service Stop

Stop critical services to disrupt operations or aid in data destruction.

Execution

T1059.001

PowerShell

Use PowerShell commands and scripts for execution and automation.

T1059.003

Windows Command Shell

Use cmd.exe to execute commands and batch scripts.

T1047

Windows Management Instrumentation

Use WMI to execute commands and manage systems remotely.

Defense Evasion

T1027

Obfuscated Files or Information

Encrypt, encode, or obfuscate payloads and data to evade detection.

Discovery

T1083

File and Directory Discovery

Enumerate files and directories to find sensitive data or binaries.

T1082

System Information Discovery

Collect OS version, architecture, hostname, and other system details.

T1018

Remote System Discovery

Discover remote systems on the network for lateral movement targets.

Other

T1033

T1033

T1057

T1057

T1012

T1012

T1560.001

T1560.001

T1039

T1039

T1567.002

T1567.002

T1558.003

T1558.003

T1070.004

T1070.004

T1562.001

T1562.001

T1210

T1210

T1204.002

T1204.002

Lateral Movement

T1021.001

Remote Desktop Protocol

Use RDP to connect to and control remote systems.

T1021.002

SMB/Windows Admin Shares

Use SMB and administrative shares (C$, ADMIN$) to access remote systems.

Collection

T1005

Data from Local System

Collect sensitive data stored on the local file system.

Exfiltration

T1048

Exfiltration Over Alternative Protocol

Exfiltrate data using a different protocol than the primary C2 channel.

Initial Access

T1190

Exploit Public-Facing Application

Exploit vulnerabilities in internet-facing applications to gain access.

T1133

External Remote Services

Abuse remote services like VPNs or RDP to gain access to the network.

T1078

Valid Accounts

Use legitimate credentials to authenticate and gain access.

T1566.001

Spearphishing Attachment

Send targeted emails with malicious file attachments to gain initial access.

Privilege Escalation

T1068

Exploitation for Privilege Escalation

Exploit software vulnerabilities to gain elevated privileges on a system.

Credential Access

T1003.001

LSASS Memory

Access LSASS process memory to extract credential material.

Reconnaissance

T1592

Gather Victim Host Information

Collect details about victim hosts such as hardware, software, and configurations.

T1589

Gather Victim Identity Information

Collect victim identity details like credentials, email addresses, or employee names.

Command and Control

T1105

Ingress Tool Transfer

Download additional tools or payloads from an external system.

Tools & Malware

(19)

Clop Ransomware

malwareMalicious

Malware used by Clop.

SDBbot

malwareMalicious

Malware used by Clop.

FlawedAmmyy RAT

malwareMalicious

Malware used by Clop.

Get2

malwareMalicious

Malware used by Clop.

SDBot

malwareMalicious

Malware used by Clop.

Cobalt Strike

frameworkLegitimate

Legitimate tool used by Clop.

Mimikatz

legitimate toolLegitimate

Legitimate tool used by Clop.

PowerShell Empire

malwareMalicious

Malware used by Clop.

TrueBot

malwareMalicious

Malware used by Clop.

PsExec

legitimate toolLegitimate

Legitimate tool used by Clop.

AdFind

legitimate toolLegitimate

Legitimate tool used by Clop.

BloodHound

legitimate toolLegitimate

Legitimate tool used by Clop.

Rclone

legitimate toolLegitimate

Legitimate tool used by Clop.

FileZilla

malwareMalicious

Malware used by Clop.

MEGAsync

legitimate toolLegitimate

Legitimate tool used by Clop.

WinSCP

malwareMalicious

Malware used by Clop.

MOVEit Transfer Exploit

ExploitMalicious

SQL injection exploit for CVE-2023-34362 in Progress MOVEit Transfer application used in mass compromise campaign

GoAnywhere MFT Exploit

ExploitMalicious

Zero-day exploit for CVE-2023-0669 in Fortra GoAnywhere MFT used for initial access

FlawedGrace

RATMalicious

Remote access trojan deployed in Clop operations for persistence and lateral movement

Indicators of Compromise

(10)
IOC values are defanged for safety
TypeValueNotes
domainclop-leaks[[.]]comClop ransomware data leak site (historical)
domainsanjonmta[[.]]comC2 domain associated with Clop operations
domainfishingworld[[.]]clubC2 infrastructure used in TA505/Clop campaigns
hash0f0ff752b95e76a5745a689349e5b2acMD5 hash of Clop ransomware variant (CL0P^_-)
hash4d32c791b99f72f88c2a5cfa7b99f3e1f5f5b3d1a2e5e8f9d2b3c4d5e6f7a8b9SHA256 hash of Clop ransomware payload
hash8c5f0d7f8e2b4a3c9d1e5f7a8b6c4d2eMD5 hash of SDBbot loader used by TA505/Clop
ip185[.]140[.]53[[.]]140C2 server IP associated with Clop infrastructure
ip91[.]212[.]166[[.]]109Historical Clop C2 infrastructure
urlhxxp[://]ekfhzmslekfczawl[[.]]onionClop ransomware Tor payment/negotiation site
hashc14b96b706e9bb2f6dd00c42a2a62f82e3f2f2a1SHA1 hash of MOVEit Transfer exploitation webshell used by Clop

Infrastructure

(11)
Domain values are defanged for safety
Domain / HostTypeStatusLast Checked
clop-leaks[.]com

Clop ransomware data leak site (historical)

domainofflineApr 2, 2026
sanjonmta[.]com

C2 domain associated with Clop operations

c2offlineApr 2, 2026
fishingworld[.]club

C2 infrastructure used in TA505/Clop campaigns

c2offlineApr 2, 2026
185[.]140[.]53[.]140

C2 server IP associated with Clop infrastructure

ipactiveApr 2, 2026
91[.]212[.]166[.]109

Historical Clop C2 infrastructure

ipofflineApr 2, 2026
ekfhzmslekfczawl[.]onion

Clop ransomware Tor payment/negotiation site

onionactiveApr 2, 2026
oa[.]88tech[.]medomainofflineApr 2, 2026
xbox-ms-store-debug[.]comdomainofflineApr 2, 2026
ms-pipes-service[.]comdomainofflineApr 2, 2026
pubstorm[.]comdomainactiveApr 2, 2026
pubstorm[.]netdomainactiveApr 2, 2026

Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.

References

(10)

CISA Alert: Clop Ransomware

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a

Microsoft Threat Intelligence: Lace Tempest (Clop)

https://www.microsoft.com/en-us/security/blog/2023/06/14/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/

Mandiant: FIN11 and Clop Ransomware

https://www.mandiant.com/resources/blog/fin11-email-campaigns-precursor-for-ransomware-data-theft

CrowdStrike: Clop Ransomware Analysis

https://www.crowdstrike.com/blog/how-to-defend-against-clop-ransomware/

MITRE ATT&CK: Clop Group Profile

https://attack.mitre.org/groups/G0082/

Secureworks: Clop Ransomware Analysis

https://www.secureworks.com/research/clop-ransomware

Huntress: MOVEit Zero-Day Exploitation by Clop

https://www.huntress.com/blog/moveit-zero-day-findings

Palo Alto Networks: Clop Ransomware Timeline

https://unit42.paloaltonetworks.com/clop-ransomware/

Clop Ransomware Gang Exploiting MOVEit Transfer Vulnerability

https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft

Understanding the Clop Ransomware Threat

https://www.cisa.gov/stopransomware/clop-ransomware