Posted on Leave a comment

Clop Ransomware Affiliates Are Being Targeted by Federal Agencies.

According to an Interpol Press Statement, Law enforcement authorities also issued two Red Notices , which are issued for  escaped prisoners wanted for arrest. The published document reads “Two Red Notices, which are internationally wanted persons alerts, have been circulated to INTERPOL’s 194 member countries following a request by Korea’s cybercrime investigation division via INTERPOL’s National Central Bureau in Seoul. The Notices follow the Ukraine arrest of six members of a notorious ransomware family during a global operation coordinated by INTERPOL with Korean, Ukrainian and US law enforcement authorities in June.”

“The global strike – codenamed Operation Cyclone – follows global police investigations into attacks against Korean companies and US academic institutions by the Cl0p ransomware threat group. Cl0p malware operators in Ukraine allegedly attacked private and business targets in Korea and the US by blocking access to their computer files and networks, and then demanded extortionate ransoms for restoring access.

In June, Ukrainian police arrested six individuals in a total of 20 raids across Kyiv and other cities, confiscating computers, equipment, automobiles, and $185,000 in cash.

On the raid, Clop ransomware was codenamed as Operation Cyclone, the Ukrainian National Police collaborated with South Korean law enforcement.

And also it was coordinated from INTERPOL’s Cyber Fusion Centre in Singapore, where stakeholders shared intelligence in a safe and interactive environment using INTERPOL’s global network.

Since February 2019, the Clop ransomware gang has been active, targeting a variety of businesses and universities. Clop operators, like other ransomware gangs, adopted a double-extortion approach, disclosing data acquired from victims who refused to pay the ransom on their leak sites.

Interpol’s Cyber Fusion Centre oversaw the operation in Singapore, according to Interpol, an intergovernmental organisation focused on supporting coordinated activity between police agencies throughout the world.

Threat intelligence was provided by Trend Micro, CDI, Kaspersky Lab, Palo Alto Networks, Fortinet, and Group-IB as part of the Interpol Gateway project, which also included police from Ukraine, South Korea, and the United States.

Authorities reported that The overall damage caused by the surpasses $ 500 million.

Members of the ransomware gang who have been caught face up to eight years in prison.

INTERPOL’s Director of Cybercrime Craig Jones Concluded that , “Despite spiralling global ransomware attacks, this police-private sector coalition saw one of the world’s first online criminal gang arrests, sending a powerful message to ransomware criminals that no matter where they hide in cyberspace, we will pursue them relentlessly.”

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin

Leave a Reply