Month by month, the number of ransomware Attacks rose 50% from January 2025 to February, and just under 40% of them attributable to the resurging clop/cl0p crew, according to NCC Group's Latest Monthly Threat Pulse Report,

During the four weeks from 1 to 28 February, NCC observed 886 ransomware attacks, up from 590 in January and 403 this time last year. It said clop's Slice of the Pie was “unusually” high as a direct result of a Mass Naming and Shaming of Victims Compromised via a Pair of Zero-DAY ExPLITS in the cleo file transfer software package,

As Cyber ​​Criminal Watches will know, The Clop Gang is renovned for seeking out and exploiting file transfer services, having out the mass hack of users of users of users of Progress Software's Moveit Service Back in 2023 – Which has a similar effect at the time,

However, Said NCC, Clop has also been Known to Exaggerate its claims to garner more attention, so although there is no doubt it is a highly aggressive threat actor, the numbers may get Manipulated.

Nevertheles, the gang significantly outpaced its Nearest Rivals, with Ransomhub Managing 87 Attacks, Akira 77 and Play 43.

“Ransomware Victim Numbers Hit Record Highs in February, Surging 50% Compared With January 2025, with Cl0p Leading the charge,” said ncc thret intelligence head matt hull. “Unlike Traditional Ransomware Operations, CL0P's Activity Wasn'T About Encrypting Systems – it was about stealing data at scale.

“By exploiting unpatched vulnerabilites in widely used file transfer software, much like we saw with moveit and goanywhere, they were able to exfiltrate sensitive information and will no Pressure Victims Into Paying. Added.

Clop's Cleo Attacks Werechestrated Through Through Common Vulnerabilites and Exposures (cves) Tracked as cve-2024-50623 and cve-2024-55956.

The first of these enables the upload of malicious files to a server than can then be executed to Gain remote code execution (rce). This issue aries through improper handling of file uploads in the autorun direction that can be exploited by sending a crafted request to retrieve files or to upload MALICIOUS ONEs.

The second enables rce through autorun, allowing unaunticated users to import and execute arbitrary bash or powerrashell commands on the host using the Autorun Directory settings. The flaw also enables an attacker to deploy modular java backdoors to steal data and move laterally.

Patches are available for both, but according to ncc, many organisations using cleot remain vulnerable thanks to delayed updates or insufficient mitigations.

Amid Political Chaos, Threat actors focus on the US

Notable in NCC's Data This month was the extent to which ransomware attacks are affected targets in the us – with north America accounting for 65% of OBSERDETS Compared with 18% in Arizer and 7% in in Asia.

Last November, The NCC Threat Pulse Report Reported Similar statistics And attributeed the high attack volumes to the chaotic geopolitical landscape.

This trend seems only to be gathering pace president trump returned to the white house in January 2025, Simultaneously ramping up ramping up pressure on ran to curtail its Nuclear Ambitions and Causing A Significant Breakdown in Relations Between the US and Ukraine, AlongSide a Thaw in Attitudes to the Russian regime.

NCC said it saw significant “Opportunities” for Threat actors in Both Iran and Russia to take advantage of rapidly changing american policy – in ran's case, it suggesled tehran may wll expand State-Backed Cyber ​​Capability and seek closer links to china; While in europe, the russian-specking cyber criminal ecosystem may perform ease their targeting of us victims if the thaw continues.

But for now, russian-specking ransomware gangs continue to hammer us targets and, in the short-term, NCC said it saw significant concerens over the draamatic government cuts being Implemented by the department of government efficiency (Dog). Billed by Trump in Part as an Attack on wasteful Spending by washington dc, these efforts, LED by Tech Oligarch Elon Musk, Have Seen Thousands of Government Workers Firdesy.

Ncc said that bot financially and geopolitically motivated threats Were likely looking to take advantage of the confusion and disruption which has likes like to synakes Processes in the federal government. Stress and Uncertainty also Increases The Risk from Disruptive Attacks and Leads to Insider Threats.

Alarmingly, A 19-YLD DOGE Employee Given High-level access to sensitive government it systems was also found to be a former member of a cyber criminal network knowledge as the com.

NCC noted that the us house commissione on oversight and government reform Called for the cessation of dog activities And warned of “Reckless disregard of critical cyber security practices”.

Leave a Reply

Your email address will not be published. Required fields are marked *