TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Flashpoint

Lessons From Clop: Combating Ransomware and Cyber Extortion Events

Flashpoint · 2023-06-27 · Read original ↗

ATT&CK techniques detected

8 predictions
T1505.003Web Shell
96%
“install a malicious web shell called lemurloot. zero - days. ransomware groups may also exploit zero - day vulnerabilities, or previously unknown security flaws, in software leveraged by a wide range of organizations. putting vulnerabilities into context clop ’ s use of the movei…”
T1486Data Encrypted for Impact
85%
“lessons from clop : combating ransomware and cyber extortion events blogs blog lessons from clop : combating ransomware and cyber extortion events recent attacks from clop emphasize the importance of implementing an organization - wide ransomware and cyber extortion strategy, fro…”
T1195Supply Chain Compromise
68%
“chain attacks. as illustrated through moveit, clop often targets upstream software vendors or service providers so that it can cast a wide net. a number of the known clop victims are companies who were attacked via a third - party vendor. attackers like clop may exploit vulnerabi…”
T1486Data Encrypted for Impact
58%
“##9 ), which led them to claim they ’ d illegally obtained information for more than 100 companies. when a ransomware or cyber extortion event occurs, security teams are racing against the clock : what do we know about the cybercriminal group that ’ s claiming responsibility for …”
T1486Data Encrypted for Impact
54%
“for investigations a managed attribution solution allows intelligence teams to shift from defense to offense by enabling security teams to safely and anonymously conduct investigations. analysts will often access or download files from a ransomware blog to verify if their organiz…”
T1190Exploit Public-Facing Application
52%
“chain attacks. as illustrated through moveit, clop often targets upstream software vendors or service providers so that it can cast a wide net. a number of the known clop victims are companies who were attacked via a third - party vendor. attackers like clop may exploit vulnerabi…”
T1486Data Encrypted for Impact
42%
“is impacted by ransomware, having a well - practiced incident response plan can greatly minimize damages. this includes : creating an incident response playbook holding mandatory training sessions for employees enabling staff members to proactively thwart attacks ransomware and c…”
T1195.002Compromise Software Supply Chain
34%
“chain attacks. as illustrated through moveit, clop often targets upstream software vendors or service providers so that it can cast a wide net. a number of the known clop victims are companies who were attacked via a third - party vendor. attackers like clop may exploit vulnerabi…”

Summary

Recent attacks from Clop emphasize the importance of implementing an organization-wide ransomware and cyber extortion strategy, from preparedness to detection and isolation

The post Lessons From Clop: Combating Ransomware and Cyber Extortion Events appeared first on Flashpoint.