19 June 2023

US authorities offer up to $10M for info on Clop ransomware


US authorities offer up to $10M for info on Clop ransomware

The US State Department is offering a reward of up to $10 million for information connecting the Clop ransomware gang or any other malicious cyber actors targeting US critical infrastructure to a foreign government.

“Do you have info linking CL0P Ransomware Gang or any other malicious cyber actors targeting U.S. critical infrastructure to a foreign government? Send us a tip. You could be eligible for a reward,” reads a message in the official State Department’s Rewards for Justice program Twitter account.

Clop (Cl0p) is a variant of the CryptoMix ransomware family first spotted in 2019 that operates on a ransomware-as-a-service (RaaS) model. The malware is widely believed to have emerged from Russian cybercriminal circles and is frequently leveraged by several Russian affiliates, among them the FIN11 financially motivated hacking group.

Over the past few years, the Clop ransomware gang gained notoriety for compromising high-profile organizations in various industries worldwide using multilevel extortion techniques. In 2023, the group claimed responsibility for the GoAnywhere zero-day attacks that affected more than a hundred organizations across the world, and the MOVEit global mass hack that impacted US government agencies, oil and gas giant Shell, UK’s media regulator Ofcom, British integrated communications provider Adare SEC, and many other organizations.

Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024