In an internationally coordinated operation, law-enforcement officials from the Ukraine, US, and South Korea raided homes and vehicles associated with members of the “Clop” ransomware group in Kiev, Ukraine. Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally. This latest operation follows similar raids on the “NetWalker” and “Egregor” ransomware groups in early 2021; it is unlikely to have a significant impact on the wider ransomware landscape, and only momentarily disrupted Clop’s operations. Regardless, the crackdown highlights a continued international effort to hold ransomware extortion groups to account.
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Main story: Ransom Cartel and REvil: Partners in cybercrime?
Main story: Hacktivists fan flames of Iranian anti-regime protests
Main story: ProxyNotShell spells déjà vu for MS Exchange Server defenders
Main story: Rogue ex-developer leaks LockBit 3.0 builder
Main story: Uber compromised by Lapsus$'s resurgence
Main story: Cyber attacks shock the Italian energy sector
Main story: Back to school for students and ransomware groups
Main story: LastPass suffers source code data breach
Main story: LockBit under DDoS attack: Entrust strikes back?
Main Story: Cisco defies extortion attempts after network breach
Main story: Cybercriminals scramble for new hiding places after 911 proxy service folds
Main story: Free-to-use Redeemer opens doors for ransomware enthusiasts