Clop Ransomware Bypasses Cleo File Transfer Software to Steal Data

The Clop Ransomware group, suspected to have ties to Russian intelligence, has successfully exploited a vulnerability in Cleo File Transfer software, allowing them to bypass the company’s servers during a security update. This incident has raised substantial concerns about the security of companies that depend on Cleo’s solutions for secure data transfers.

Cleo has confirmed that three of its critical products—Harmony, VLTrader, and LexiCom—were compromised through a remote code execution (RCE) attack, enabling the hackers to access and potentially exfiltrate sensitive intellectual property. This breach underscores the serious implications for Cleo’s clients, many of whom view the company as a key provider of IT supply chain software. The repercussions could echo those of the devastating MoveIT cyber-attack earlier this year, which similarly affected numerous organizations.

Initial reports indicate that Cleo has patched the zero-day vulnerability that permitted the ransomware gang to infiltrate their systems. However, many clients remain uninformed about the breach, leaving them exposed to potential subsequent attacks or compromises. The urgency for these companies to secure their systems has never been greater, as they face an elevated risk of falling prey to similar exploits if not addressed promptly.

In a bid to dismantle the Clop ransomware operation, the U.S. Department of Justice has offered a $10 million reward for credible information leading to the arrest of its members. This initiative aims to encourage whistleblowers to come forward with actionable intelligence regarding the perpetrators behind these cyber incursions.

Interestingly, although the attack was initiated in October 2024, the Clop group initially opted for silence. However, they were prompted to identify themselves when media mistakenly linked the breach to the “Termite” ransomware gang. In a surprising announcement, Clop claimed they would delete all stolen data previously advertised on the dark web. This raised intriguing questions regarding their motivations—whether it was a strategy to exert psychological pressure on victims or merely an attempt to cover their tracks after capitalizing on the stolen data.

This situation illustrates an unusual strategy in the cybersecurity landscape: when attackers cloak their identity by adopting another gang’s name, misattributing the attack can compel the true assailants to reveal themselves. Such tactics may represent a developing avenue for cybersecurity professionals seeking to expose or disrupt ransomware operations, as they could potentially provoke adversaries into taking uncharacteristic actions.

The rapidly evolving world of cyber threats, coupled with the adaptive strategies employed by ransomware groups, necessitates increased vigilance regarding cybersecurity measures. For enterprises utilizing Cleo or similar service providers, the prospect of further attacks looms large, highlighting the imperative of immediate action to reinforce their security postures.

Source