Cl0p
cl0p · primary source: Other · first observed 2019
?? · UnknownRansomwareModerate confidencelast cited Sep 28, 2025 · 8mo ago
Russian-speaking double-extortion crew historically aligned with TA505/FIN11. Specialized in mass exploitation of managed-file-transfer software zero-days: Accellion FTA (2020), GoAnywhere MFT (early 2023), and the MOVEit Transfer CVE-2023-34362 campaign in mid-2023 that compromised an estimated 2,700+ organizations and exposed personal data on tens of millions of individuals.
Aliases
CLOPOtherTA505MandiantFIN11Mandiant
Motivations
financial gain
Target sectors
financialhealthcareeducationgovernmentmanufacturing
Target countries
USGBDECABENLCH
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Tools & malware
1 entryTimeline
1 eventIndicators of compromise
4 indicators| Type | Value | First seen | Source |
|---|---|---|---|
family · CL0P CL0P negotiation email address published in ransom notes during the MOVEit and GoAnywhere campaigns, listed in the email-address IOC table of AA23-158A. | Jun 6, 2023 | CISA | |
| SHA-256 | family · LEMURLOOT SHA256 of a compiled DLL generated from a human2.aspx LEMURLOOT payload, referenced in the Mandiant YARA rule M_Webshell_LEMURLOOT_DLL_1 included in AA23-158A as a hunting sample for the CL0P MOVEit zero-day intrusion set. | May 31, 2023 | CISA |
| Name | family · LEMURLOOT LEMURLOOT web-shell filename masquerading as MOVEit's legitimate human.aspx, dropped via CVE-2023-34362 starting May 27, 2023. Primary breach indicator per joint FBI/CISA advisory AA23-158A on the CL0P/TA505 MOVEit campaign. | May 26, 2023 | CISA |
| SHA-256 | family · LEMURLOOT SHA256 of a LEMURLOOT web-shell ASPX sample listed in the MOVEit Campaign IOC table of AA23-158A; one of the ~40 hashes the FBI/CISA released June 7, 2023 covering TA505 web-shell deployments against MOVEit Transfer. | May 26, 2023 | CISA |
Related actors
shared ATT&CK techniques- RU · Russia8Base2 shared techniques
- ?? · UnknownAkira2 shared techniques
- ?? · UnknownALPHV/BlackCat2 shared techniques
- KP · DPRKAndariel2 shared techniques
- RU · RussiaDarkSide2 shared techniques
- CN · ChinaHafnium2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Cl0p — actor profile. Retrieved from https://threatintel.local/actors/cl0p
latest cited activity · 2025-09-29 · 4 cataloged indicators