Clop ransomware gang admits MoveIT attack following Microsoft accusation

identity theft on computer
(Image credit: TheDigitalWay from Pixabay)

The Clop ransomware group has confirmed Microsoft’s claims that it was responsibility for the recent cyberattack on the MOVEit managed file transfer service. 

In a statement given to BleepingComputer, the dreaded threat actor also confirmed most of the speculation that was making rounds in these last couple of days, namely that the attack began May 27 (during the long US Memorial Day holiday), used a zero-day vulnerability, and most of the victims will be asked for payment in return for their data. 

The negotiations haven’t started yet, though. Reports speculate the group is currently sifting through gigabytes of data, identifying points of interest and important data, before setting their ransoms and calculating where to strike first. So far, no data has been posted, not even snippets.

No government data

However, extortion attempts are now just a matter of time, says Charles Carmakal, CTO, Mandiant Consulting - Google Cloud. 

"At this stage it is critical for victim organizations to prepare for potential extortion, publication of stolen data, and victim shaming. It is likely that the threat actor will soon begin to make contact with extortion demands and begin to work through their list of victims," he said. 

"Mandiant’s investigations into prior campaigns from the suspected threat actor show that extortion demands are usually in the 7- or 8-figure range, including a few demands for more than $35 million."

Earlier speculation also stated that Clop obtained sensitive data belonging to Western governments. While the group did pull such information, it claims to have deleted it immediately, possibly in order not to poke the bear. 

"I want to tell you right away that the military, children's hospitals, GOV etc like this we no to attack, and their data was erased," Clop told the publication via email.

Last Friday, MOVEit confirmed discovering a major security vulnerability in its systems and urged its customers to apply the workaround as it works on the patch. 

Earlier today, news of the first victims emerged, after the BBC reported that its staff, as well as those working at British Airways, Boots, Aer Lingus, and Zelli, were affected. 

The data that was stolen in the breach includes national insurance numbers, as well as bank details - depending on the affected software user.

MOVEit Transfer is a managed file transfer (MFT) solution built by Ipswitch, a subsidiary of a company called Progress. Companies usually use software such as this to securely transfer sensitive files, such as financial data, personally identifiable information, and more.

Carmakal also said businesses should be aware of possible scammers: "Some of our clients impacted by the MOVEit exploitation received extortion emails over the weekend. The extortion emails were unrelated to the MOVEit exploitation and were just scams, but organizations could easily confuse them as being authentic."

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Lock on Laptop Screen
Clop ransomware lists Cleo cyberattack victims
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
59 organizations reportedly victim to breaches caused by Cleo software bug
Data leak
US utility giant says MOVEit hack exposed stolen data
Russia
Major Russian hacking group shifts focus to US and UK targets
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand