Get in Touch Close Menu

Threat Intelligence on Recent Cyberattack by CL0P Ransomware Group   

24 August 2022

South Staffordshire Water   

The CL0P ransomware group claimed responsibility for the attack on UK-based utility provider South Staffordshire Water. However, they have said there is no impact on the water supply or drinking water safety.   

On its extortion website, CL0P uploaded a vast collection of stolen papers. These included passport scans, spreadsheets with administrator passwords, drivers’ licences, and, concerningly, screenshots of administration interfaces of wastewater treatment systems.   

Possible IOC’s   

Whist CL0P use broad malicious email campaigns to identify potential victims; recent evidence suggests that vulnerabilities in public-facing infrastructure are also exploited to gain a foothold within a victim’s network.   

Malicious Spam Campaigns   

CL0P malicious spam campaigns use information from previous victims, most likely to “cascade” their ransomware threat and attack other organisations and supply chains. Clients, associates, or suppliers of any victim organisation may be the subject of these malicious emails. 

Exposing Victims 

Thought to be a Russian-language cybercriminal group, CL0P is responsible for several infamous “big game hunter” ransomware attacks. Other cybercriminal groups have reported them as being associated with or adopting their malware.    

Utilising common ‘steal, encrypt and leak’ tactics as most well-organised and coordinated ransomware groups employ, victims who fail to meet ransom demands are promptly named and shamed on ‘CL0P^_- LEAKS’, the group’s Tor-hosted leak site. This is problematic as victims are often further targeted by other threat actors over long periods.  

Sapphire Security Operations Centre (SOC)   

The Sapphire Team will continue to monitor and collect intelligence about this incident and other activities that we believe can improve customer security, using our threat intelligence, threat hunting and investigation capabilities. 

Related Articles

Amid CHAOS, There is Also Crypto Mining
30 January 2023

Sapphire’s SOC Team have been tracking a recent Crypto Mining campaign targeting Linux systems, utilising a proof-of-concept (PoC) hack tool hosted on GitHub known as ‘CHAOS’.

Find Out More
CASE STUDY: SAPPHIRE UTILITY SOLUTIONS
9 January 2023

Like all organisations, Sapphire Utility Solutions (SUS) is a target for cybercriminals. This is only exasperated by its rapid growth.

Whilst having extensive security experience within the team, SUS wanted to enhance its cybersecurity capabilities and provide the best resources for its team to take advantage of, so it decided to outsource its cybersecurity via Sapphire’s Managed Security service.

Find Out More
What Does SIEM Stand for?
6 January 2023

SIEM (Security Information and Event Management) is one of many approaches to security management. It combines SIM (Security Information Management) and SEM (Security Event Management) to aggregate data from a variety of sources as well as identify any deviations and act against them.  

Find Out More