In an internationally coordinated operation, law-enforcement officials from the Ukraine, US, and South Korea raided homes and vehicles associated with members of the “Clop” ransomware group in Kiev, Ukraine. Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally. This latest operation follows similar raids on the “NetWalker” and “Egregor” ransomware groups in early 2021; it is unlikely to have a significant impact on the wider ransomware landscape, and only momentarily disrupted Clop’s operations. Regardless, the crackdown highlights a continued international effort to hold ransomware extortion groups to account.
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Main story: Attackers seize Microsoft zero-day for malware dissemination, espionage
Main story: REvil REturns with new data-leak site
Main story: Russian cyber attacks on Ukraine: Where’s the boom?
Main story: Karakurt Hacking Team moonlights as Conti side business
RaidForums takedown sends cybercriminals scrambling
Carbanak group’s evolution extends to ransomware
Q1 2022: What happened and what lies ahead
Maverick extortionist group Lapsus$ goes after big tech
US executive order pushes for responsible cryptocurrency use
The Russia-Ukraine war has triggered a resurgence of hacktivism around the world
The US government has issued an alert about the Iran-linked "MuddyWater" advanced persistent threat group
Conti ransomware group aims to ascend with new tools, structure
US DoJ arrests shine light on ease and impact of cryptocurrency laundering