threatintel
actor tracker
All actors

Cl0p

cl0p · primary source: Other · first observed 2019
?? · UnknownRansomwareModerate confidencelast cited Sep 28, 2025 · 8mo ago

Russian-speaking double-extortion crew historically aligned with TA505/FIN11. Specialized in mass exploitation of managed-file-transfer software zero-days: Accellion FTA (2020), GoAnywhere MFT (early 2023), and the MOVEit Transfer CVE-2023-34362 campaign in mid-2023 that compromised an estimated 2,700+ organizations and exposed personal data on tens of millions of individuals.

Aliases

CLOPOtherTA505MandiantFIN11Mandiant

Motivations

financial gain

Target sectors

financialhealthcareeducationgovernmentmanufacturing

Target countries

USGBDECABENLCH

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Cl0p
  • Unknown
  • financial gain
Infrastructure
Victim
  • financial
  • healthcare
  • education
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Tools & malware

1 entry

Timeline

1 event

Indicators of compromise

4 indicators
csv
TypeValueFirst seenSource
Email
unlock[at]rsv-box[.]com
family · CL0P
CL0P negotiation email address published in ransom notes during the MOVEit and GoAnywhere campaigns, listed in the email-address IOC table of AA23-158A.
Jun 6, 2023CISA
SHA-256
c58c2c2ea608c83fad9326055a8271d47d8246dc9cb401e420c0971c67e19cbf
family · LEMURLOOT
SHA256 of a compiled DLL generated from a human2.aspx LEMURLOOT payload, referenced in the Mandiant YARA rule M_Webshell_LEMURLOOT_DLL_1 included in AA23-158A as a hunting sample for the CL0P MOVEit zero-day intrusion set.
May 31, 2023CISA
Name
human2.aspx
family · LEMURLOOT
LEMURLOOT web-shell filename masquerading as MOVEit's legitimate human.aspx, dropped via CVE-2023-34362 starting May 27, 2023. Primary breach indicator per joint FBI/CISA advisory AA23-158A on the CL0P/TA505 MOVEit campaign.
May 26, 2023CISA
SHA-256
0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9
family · LEMURLOOT
SHA256 of a LEMURLOOT web-shell ASPX sample listed in the MOVEit Campaign IOC table of AA23-158A; one of the ~40 hashes the FBI/CISA released June 7, 2023 covering TA505 web-shell deployments against MOVEit Transfer.
May 26, 2023CISA

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Cl0p — actor profile. Retrieved from https://threatintel.local/actors/cl0p

latest cited activity · 2025-09-29 · 4 cataloged indicators