thecyberthrone.in Open in urlscan Pro
192.0.78.151  Public Scan

URL: https://thecyberthrone.in/2024/12/17/clop-ransomware-exploits-cleo-vulnerability-in-its-attacks/
Submission: On December 17 via api from IN — Scanned from US

Form analysis 5 forms found in the DOM

GET https://thecyberthrone.in/

<form method="get" class="search-form" action="https://thecyberthrone.in/">
  <input type="hidden" name="post_type" value="product">
  <label>
    <input type="search" class="search-field form-control" placeholder="Search for products..." value="" name="s">
  </label>
  <input type="submit" class="search-submit btn btn-primary mt-3" value="Search">
</form>

<form id="commentform" class="comment-form">
  <iframe title="Comment Form"
    src="https://jetpack.wordpress.com/jetpack-comment/?blogid=172946585&amp;postid=35435&amp;comment_registration=0&amp;require_name_email=0&amp;stc_enabled=1&amp;stb_enabled=1&amp;show_avatars=1&amp;avatar_default=identicon&amp;greeting=Leave+a+Reply&amp;jetpack_comments_nonce=b83247a0af&amp;greeting_reply=Leave+a+Reply+to+%25s&amp;color_scheme=light&amp;lang=en_US&amp;jetpack_version=14.2-a.3&amp;iframe_unique_id=1&amp;show_cookie_consent=10&amp;has_cookie_consent=0&amp;is_current_user_subscribed=0&amp;token_key=%3Bnormal%3B&amp;sig=216c6b9f3111c48c4fe9b8dfc65070341ec4ae76#parent=https%3A%2F%2Fthecyberthrone.in%2F2024%2F12%2F17%2Fclop-ransomware-exploits-cleo-vulnerability-in-its-attacks%2F"
    name="jetpack_remote_comment" style="width: 100%; height: 2px; border: 0px;" class="jetpack_remote_comment" id="jetpack_remote_comment" sandbox="allow-same-origin allow-top-navigation allow-scripts allow-forms allow-popups" scrolling="no">
  </iframe>
  <!--[if !IE]><!-->
  <!--<![endif]-->
</form>

POST https://wordpress.com/email-subscriptions

<form action="https://wordpress.com/email-subscriptions" method="post" accept-charset="utf-8" data-blog="172946585" data-post_access_level="everybody" data-subscriber_email="" id="subscribe-blog">
  <div class="wp-block-jetpack-subscriptions__form-elements">
    <p id="subscribe-email">
      <label id="subscribe-field-label" for="subscribe-field" class="screen-reader-text"> Type your email… </label>
      <input required="required" type="email" name="email" class="no-border-radius " style="font-size: 16px;padding: 15px 23px 15px 23px;border-radius: 0px;border-width: 1px;" placeholder="Type your email…" value="" id="subscribe-field"
        title="Please fill in this field.">
    </p>
    <p id="subscribe-submit">
      <input type="hidden" name="action" value="subscribe">
      <input type="hidden" name="blog_id" value="172946585">
      <input type="hidden" name="source" value="https://thecyberthrone.in/2024/12/17/clop-ransomware-exploits-cleo-vulnerability-in-its-attacks/">
      <input type="hidden" name="sub-type" value="subscribe-block">
      <input type="hidden" name="app_source" value="">
      <input type="hidden" name="redirect_fragment" value="subscribe-blog">
      <input type="hidden" name="lang" value="en_US">
      <input type="hidden" id="_wpnonce" name="_wpnonce" value="6b274adf92"><input type="hidden" name="_wp_http_referer" value="/2024/12/17/clop-ransomware-exploits-cleo-vulnerability-in-its-attacks/"><input type="hidden" name="post_id"
        value="35435"> <button type="submit" class="wp-block-button__link no-border-radius" style="font-size: 16px;padding: 15px 23px 15px 23px;margin: 0; margin-left: 10px;border-radius: 0px;border-width: 1px;" name="jetpack_subscriptions_widget">
        Subscribe <span class="jetpack-memberships-spinner"> <svg width="24" height="24" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
            <path d="M12,1A11,11,0,1,0,23,12,11,11,0,0,0,12,1Zm0,19a8,8,0,1,1,8-8A8,8,0,0,1,12,20Z" opacity=".25" fill="currentColor"></path>
            <path d="M10.14,1.16a11,11,0,0,0-9,8.92A1.59,1.59,0,0,0,2.46,12,1.52,1.52,0,0,0,4.11,10.7a8,8,0,0,1,6.66-6.61A1.42,1.42,0,0,0,12,2.69h0A1.57,1.57,0,0,0,10.14,1.16Z" class="jetpack-memberships-spinner-rotating" fill="currentColor"></path>
          </svg></span></button>
    </p>
  </div>
</form>

POST https://wordpress.com/email-subscriptions

<form action="https://wordpress.com/email-subscriptions" method="post" accept-charset="utf-8" data-blog="172946585" data-post_access_level="everybody" data-subscriber_email="" id="subscribe-blog-2">
  <div class="wp-block-jetpack-subscriptions__form-elements">
    <p id="subscribe-email">
      <label id="subscribe-field-2-label" for="subscribe-field-2" class="screen-reader-text"> Type your email… </label>
      <input required="required" type="email" name="email" style="font-size: 16px;padding: 15px 23px 15px 23px;border-radius: 50px;border-width: 1px;" placeholder="Type your email…" value="" id="subscribe-field-2" title="Please fill in this field.">
    </p>
    <p id="subscribe-submit">
      <input type="hidden" name="action" value="subscribe">
      <input type="hidden" name="blog_id" value="172946585">
      <input type="hidden" name="source" value="https://thecyberthrone.in/2024/12/17/clop-ransomware-exploits-cleo-vulnerability-in-its-attacks/">
      <input type="hidden" name="sub-type" value="subscribe-block">
      <input type="hidden" name="app_source" value="atomic-subscription-modal-lo">
      <input type="hidden" name="redirect_fragment" value="subscribe-blog-2">
      <input type="hidden" name="lang" value="en_US">
      <input type="hidden" id="_wpnonce" name="_wpnonce" value="6b274adf92"><input type="hidden" name="_wp_http_referer" value="/2024/12/17/clop-ransomware-exploits-cleo-vulnerability-in-its-attacks/"><input type="hidden" name="post_id"
        value="35435"> <button type="submit" class="wp-block-button__link" style="font-size: 16px;padding: 15px 23px 15px 23px;margin: 0; margin-left: 10px;border-radius: 50px;border-width: 1px;" name="jetpack_subscriptions_widget"> Subscribe <span
          class="jetpack-memberships-spinner"> <svg width="24" height="24" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
            <path d="M12,1A11,11,0,1,0,23,12,11,11,0,0,0,12,1Zm0,19a8,8,0,1,1,8-8A8,8,0,0,1,12,20Z" opacity=".25" fill="currentColor"></path>
            <path d="M10.14,1.16a11,11,0,0,0-9,8.92A1.59,1.59,0,0,0,2.46,12,1.52,1.52,0,0,0,4.11,10.7a8,8,0,0,1,6.66-6.61A1.42,1.42,0,0,0,12,2.69h0A1.57,1.57,0,0,0,10.14,1.16Z" class="jetpack-memberships-spinner-rotating" fill="currentColor"></path>
          </svg></span></button>
    </p>
  </div>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label><textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field"
    placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

Text Content

Skip to content

TheCyberThrone

Thinking Security ! Always



--------------------------------------------------------------------------------

 * Latest Story
 * AI
 * Application Security
 * Cloud Security
   * AWS Security
   * Azure Security
   * Google Security
 * Container Security
 * Data Breaches
 * Email Security
 * Mobile Security
 * Security Acquisition
 * ZeroDay
 * Certification Guide
   * Cloud Certifications
   * Network Certifications
   * Security Certifications
 * Security NewsLetter
 * About Author


CLOP RANSOMWARE EXPLOITS CLEO VULNERABILITY IN ITS ATTACKS

BY PravinKarthik December 17, 2024

--------------------------------------------------------------------------------

The Clop ransomware gang has recently claimed responsibility for a series of
sophisticated data theft attacks targeting Cleo, a prominent provider of managed
file transfer software. These attacks exploited zero-day vulnerabilities in
Cleo’s file transfer platforms, specifically Cleo Harmony, VLTrader, and
LexiCom, to steal sensitive corporate data.


OVERVIEW OF THE ATTACK

The Clop ransomware gang has leveraged zero-day vulnerabilities, which are
previously unknown security flaws, to breach Cleo’s systems. This breach allowed
them to gain unauthorized access to sensitive data and exfiltrate it. The
vulnerabilities, notably CVE-2024-50623, facilitated unrestricted file uploads
and downloads, leading to potential remote code execution. Although Cleo had
released a patch in October to address this flaw, cybersecurity firm Huntress
discovered that the initial patch was incomplete, which the attackers were able
to bypass.

Advertisements



METHOD OF EXPLOITATION

The attackers employed a multi-step approach to exploit the vulnerabilities:

 1. Initial Breach: By exploiting the zero-day vulnerabilities, the attackers
    gained initial access to Cleo’s file transfer platforms.
 2. Payload Deployment: They uploaded a sophisticated JAVA backdoor, which
    provided persistent access and control over the compromised networks.
 3. Data Exfiltration: Using the backdoor, the attackers were able to steal
    sensitive corporate data, including financial records, intellectual
    property, and confidential communications.


IMPACT AND CONSEQUENCES

The Clop ransomware gang’s attacks have had significant repercussions:

 * Data Breach: The theft of sensitive data can lead to financial losses, legal
   liabilities, and reputational damage for affected organizations.
 * Operational Disruption: The attacks can cause operational disruptions as
   companies scramble to secure their networks and recover from the breach.
 * Increased Cyber Threat: These incidents highlight the growing sophistication
   of cyber threats and the need for robust cybersecurity measures.


RESPONSE AND RECOMMENDATIONS

Advertisements


In response to the attacks, Cleo has issued another critical update to address
the vulnerabilities and enhance security measures. Organizations using Cleo’s
file transfer platforms are strongly advised to take the following actions:

 1. Apply Latest Security Patches: Ensure all systems are updated to the latest
    versions to mitigate the risks associated with these vulnerabilities.
 2. Conduct Security Audits: Regularly review and audit systems to identify and
    address potential vulnerabilities promptly.
 3. Implement Robust Security Measures: Strengthen security protocols, such as
    network segmentation, multi-factor authentication, and regular backups, to
    prevent unauthorized access and minimize the impact of potential breaches.

Considering the history of attacks with file transfer applications previously,
CISA added this vulnerability to its Known Exploited Vulnerabilities Catalog.


CONCLUSION

The Clop ransomware gang’s attack on Cleo underscores the critical importance of
maintaining vigilance and robust security practices in today’s digital
landscape. Organizations must stay proactive in updating and securing their
systems to protect against evolving cyber threats.




SHARE THIS:

 * 
 * 
 * 
 * WhatsApp
 * Save
 * Reddit
 * 
 * Telegram
 * Mastodon
 * 


LIKE THIS:

Like Loading...


RELATED STORIES

CISA ADDS CLEO VULNERABILITY CVE-2024-50623 TO KEV CATALOG

The US CISA adds Cleo vulnerability to its Known Exploited Vulnerabilities
Catalog based on the evidence of active exploitation reported. Security vendor
Huntress was the first to publicize the attacks, revealing that the remote code
execution (RCE) vulnerability affects Cleo Harmony, VLTrader, and LexiCom
products. This critical security flaw stems…

CL0P RANSOMWARE HAVOC WITH GOANYWHERE MFT EXPLOIT

City of Toronto suffers a data breach caused by Clop ransomware, the gang
responsible for exploiting the vulnerability in GoAnywhere. The Clop ransomware
gang listed the city of Toronto on its data leak site. The data breach was
possible using the zero-day vulnerability in Forta’s GoAnywhere file transfer
solution. The…

CL0P RANSOMWARE EXPLOITS GOANYWHERE MFT BUG

The Clop ransomware group claims that it has stolen sensitive data from over 130
organizations by exploiting Fortra’s GoAnywhere MFT secure file transfer tool
tracked as CVE-2023-0669. Fortra advisory says the zero-day is a remote code
injection issue that impacts GoAnywhere MFT. The vulnerability can only be
exploited by attackers with access…

Tags: Cleo Vulnerability, Clop Ransomware, CVE-2024-50623, Security


POST NAVIGATION

CISA KEV Catalog Update Part IV – December 2024


LEAVE A REPLYCANCEL REPLY



This site uses Akismet to reduce spam. Learn how your comment data is processed.

Advertisements


TRENDING POST

 * Exploit Code released for Spring Framework CVE-2024-38819
 * Apache Struts was affected by CVE-2024-53677
 * Dell fixes CVE-2024-37143 and CVE-2024-38144 vulnerabilities
 * AuthQuake vulnerability with Microsoft to Bypass MFA
 * Microsoft Patch Tuesday December 2024
 * Django was affected by CVE-2024-53907 and CVE-2024-53908

ARCHIVES

Archives Select Month December 2024  (40) November 2024  (73) October 2024  (81)
September 2024  (65) August 2024  (75) July 2024  (61) June 2024  (50) May 2024
 (49) April 2024  (42) March 2024  (43) February 2024  (36) January 2024  (51)
December 2023  (67) November 2023  (66) October 2023  (80) September 2023  (95)
August 2023  (98) July 2023  (109) June 2023  (87) May 2023  (83) April 2023
 (95) March 2023  (107) February 2023  (96) January 2023  (87) December 2022
 (100) November 2022  (95) October 2022  (72) September 2022  (97) August 2022
 (103) July 2022  (86) June 2022  (113) May 2022  (101) April 2022  (98) March
2022  (122) February 2022  (121) January 2022  (168) December 2021  (175)
November 2021  (137) October 2021  (130) September 2021  (109) August 2021
 (128) July 2021  (109) June 2021  (108) May 2021  (81) April 2021  (73) March
2021  (72) February 2021  (68) January 2021  (85) December 2020  (63) November
2020  (60) October 2020  (59) September 2020  (48) August 2020  (48) July 2020
 (49) June 2020  (45) May 2020  (46) April 2020  (37) March 2020  (34) February
2020  (15)
Clcik



CLICK TO SUBSCRIBE

Type your email…

Subscribe


FOLLOW US

 * Facebook
 * Twitter
 * Instagram

Advertisements

© 2020-2024, TheCyberThrone.in, All Rights Reserved
TOP


DISCOVER MORE FROM THECYBERTHRONE

Subscribe now to keep reading and get access to the full archive.

Type your email…

Subscribe

Continue reading

 

Loading Comments...

 

Write a Comment...
Email Name Website


%d
Share