home.social

#cl0p — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cl0p, aggregated by home.social.

  1. Data Extortion Groups Intensify Pressure On Global Aerospace Supply Chains

    Cyber threats targeting the global aviation and aerospace sector are rapidly evolving, with ransomware, identity-based intrusions, and platform-level disruptions becoming dominant attack vectors. The interconnected nature of this ecosystem, combined with time-sensitive operations and complex third-party dependencies, makes it highly attractive to threat actors. Shared airport IT platforms represent critical single points of failure, as demonstrated by the September 2025 ransomware attack on Collins Aerospace MUSE system that disrupted major European airports including Heathrow, Brussels, Berlin, and Dublin. Major ransomware groups like LockBit and Cl0p maintain heavy focus on aviation suppliers, while advanced persistent threat groups including Refined Kitten, Wicked Panda, and Fancy Bear conduct strategic espionage targeting intellectual property, aircraft design data, and military aviation intelligence. Emerging threats include vulnerabilities in regional airports, aviation SaaS platforms, and satellite ...

    Pulse ID: 69fb173ad966425db9cad018
    Pulse Link: otx.alienvault.com/pulse/69fb1
    Pulse Author: AlienVault
    Created: 2026-05-06 10:26:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cl0p #CyberSecurity #Espionage #Europe #Extortion #InfoSec #LockBit #Military #OTX #OpenThreatExchange #RAT #RansomWare #SupplyChain #bot #AlienVault

  2. Food and Ag-ISAC reports 82% surge in ransomware attacks as Qilin, Akira and CL0P lead campaigns against sector

    New data from the Food and Agriculture Information Sharing and Analysis Center (Food and Ag-ISAC) shows ra…
    #dining #cooking #diet #food #Food #Akira #Cl0p #DDoS #FoodandAg-ISAC #foodandagriculture #Lynx #play #Qilin #ransomwareattacks
    diningandcooking.com/2510429/f

  3. CW: NSFW

    @darkwebsonar @kkarhan that's a different thing.

    - #cl0p is not #clop!

    @defilerzero does the latter…

  4. Cl0p - or Clop, depending on you talk to - is back targeting Australian companies again with cyber extortion attempts, though at this stage it may all be a bluff.

    #cybersecurity #cl0p #cl0p #cybercrime

    cyberdaily.au/security/13172-e

  5. So for many folks - cancelling their Hilton Honors membership was a way to let the chain know that their handling of the situation in Minneapolis was unacceptable.

    Nice techdirt article and template for those perhaps looking to do the same techdirt.com/2026/01/07/dear-h

    Now it appears that the #Cl0p folks claim to have breached Hilton.com - but have yet to publish any data. After following cl0p in a previous life, my estimate is that they're found some novel way to breach a specific technology that many of these companies have deployed, have been immensely successful in compromising a large number of them, and are now inundated with data that they have to wade through.

    (first detection I am aware of was at 2026-01-25 15:14:45 UTC)

    infosec.exchange/@ransomwatch/

    However - I do have confidence that Hilton will not pay them and the data will [eventually] be published to The Dark Web™. (Or more accurately - probably via BitTorrent)

    (you can point your TOR enabled browser of choice to santat7kpllt6iyvqbr7q4amdv6dzr for any updates - the attached screenshot is from there)

    What that means is that for folks that did cancel their membership is that their data is likely going to be leaked to various and sundry criminal elements and probably lead to increased cyber-type headaches such as spam, phishing and identity theft for anyone involved. (Note that this is also true for anyone who did not cancel their Hilton Honors membership.)

    Going to preface this next bit by indicating that I'm not a lawyer nor do I play one on TV - and that no sane person should take legal advice from me or anyone else who is not a practicing lawyer lest you end up being the star of one of those "sovereign citizen" clips on youtube.

    Now - there probably is a way to help translate at least some of this into pain for the Hilton chain. If you are in the EU - GDPR does provide a lot of leverage for individuals in terms of data and privacy protection. As data breaches are more common - and you do live in Europe - you may already have some tools to point in Hilton's general direction.

    (Of note as well is that the GDPR 72-hour notifications window starts once the company is "aware" of the breach - and there may be some convoluted verbiage on what that actually means, but your report/request as a European person may be what actually starts that clock.)

    If you don't live in Europe - the folks at DLA Piper have a fairly substantial breakdown of breach requirements by country - but may give you some pointers in keywords to be using when communicating with their agents based on your locale.

    dlapiperdataprotection.com/?t=

    Additionally - if you have the time (and patience) to deal with someone on the phone - this is is the sort of inquiry that will need to be escalated to a human (i.e. will cost Hilton money) to answer.

    hilton.com/en/help-center/glob

    You may also want to reach out via any of the emails listed in the techdirt article above

    This may be of some assistance in providing - at the very least - some time and cycle burn for their public relations folks, who are probably also very busy trying to put some spin on some of their other PR disasters.

    Some questions that you may want to ask anyone that you get a hold of via phone, email, or carrier pigeon:

    • Are you aware that the ransomware gang cl0p has claimed that they have breached Hilton.com?
    • Can you confirm that this breach notification is legitimate?
    • Do you have an idea of what data was allegedly stolen, how much and when?
      • Has the vulnerability that led to this alleged breach been identified and remediated?
    • Is there any personally identifiable information (PII) included in the corpus?
    • Is my PII included in that corpus?
    • Is there a plan to notify affected individuals and/or provide remediation or credit monitoring?

    #hhonors #ice #Hilton #USPol #HiltonBoycott #ransomware

  6. Korean Air confirms 30,000 of its employee records have been stolen after the Cl0p ransomware gang leaked the data online, following exploitation of an Oracle EBS vulnerability.

    Read: hackread.com/30000-korean-air-

    #CyberSecurity #DataBreach #Cl0p #KoreanAir #OracleEBS #InfoSec

  7. Barts Health NHS confirms Cl0p ransomware breached its invoicing system by exploiting an Oracle EBS flaw. The organisation is now taking legal action against the notorious Russian-speaking group.

    Read: hackread.com/barts-health-nhs-

    #NHS #Cl0p #Ransomware #DataBreach #CyberSecurity #Oracle

  8. NEW: Cl0p ransomware claims NHS UK breach days after breaching The Washington Post, stealing 183GB of data through Oracle EBS flaws, a breach confirmed by the Post.

    Read: hackread.com/cl0p-ransomware-n

    #CyberSecurity #Cl0p #Ransomware #Oracle #NHS #DataBreach

  9. Cyberangriff - ermöglicht durch gemeinsame Schwachstelle in der Oracle E‑Busines‑Suite (EBS)?

    Die russischsprachige Ransomware-Gruppe Cl0p_‑Leaks erpresst aktuell mehrere zahlungskräftige Unternehmen/Institutionen, darunter Logitech, die Washington Post oder auch die Harvard‑Universität. Ausgangspunkt scheint eine Schwachstelle in Oracles E‑Busines‑Suite (EBS) zu sein.
    Wenn die Angegriffenen nicht binnen 24h zahlen, werden die Daten zum Verkauf angeboten oder veröffentlicht oder beides. Mehr als unangenehm für die Betroffenen.
    24heures.ch/logitech-le-fabric

    #Ransomware #Cl0p #EBS #oracle #infosec #infosecnews

  10. Cl0p ransomware adds Logitech to its list of alleged victims - reportedly exploiting an Oracle E-Business Suite zero-day as part of a campaign hitting 9+ ICT & manufacturing firms.
    🔗 technadu.com/cl0p-ransomware-c

    #Cybersecurity #Cl0p #Logitech #Ransomware #OracleEBS

  11. Envoy Air, a regional carrier of American Airlines, confirms it was impacted in the latest zero-day exploit of Oracle E-Business Suite by the #CL0P extortion gang. Limited business info exposed, no customer data or flights impacted.

    Read: hackread.com/envoy-air-america

    #CyberSecurity #DataBreach #OracleEBS #Infosec #Ransomware

  12. Alert: a group claiming ties to Cl0p is sending extortion emails to Oracle E-Business Suite users. Mandiant and Google’s threat teams are investigating.

    Read: hackread.com/cl0p-extort-oracl

    #OracleEBS #Cybersecurity #Ransomware #Cl0p #Mandiant #Google

  13. 🚨 Over 270,000+ records from American National Insurance Company (#ANICO) leaked online, linked to the 2023 MOVEit hack. Sensitive customer & employee info exposed.

    Read: hackread.com/american-national

    #CyberSecurity #DataBreach #MOVEit #Cl0p

  14. CIBC National Trust of Chicago, a US division of the Canadian Imperial Bank of Commerce (CIBC) have notified their Private Wealth Management customers that their data have been stolen when their third party service provider, Pension Benefit Information (PBI) was hit by a cyberattack in May.

    The PBI breach was one of the many organization that fell victim to the much wider MOVEIt breaches by the Cl0p ransomware gang.

    There's no word on how many clients were affected & how much information was stolen as the letter seen by IT World Canada was heavily redacted.

    https://www.itworldcanada.com/article/u-s-division-of-cibc-apparently-sideswiped-by-moveit-hack/545256

    #infosec #cybersecurity #CIBC #databreach #banking #datasecurity #ransomware #MOVEIt #Cl0p

  15. #Aon client data published online as major businesses respond to #MOVEit breach <- A total of 100 organizations have now either publicly disclosed being impacted by MOVEit and/or been listed by #Cl0p.

    theinsurer.com/news/aon-client

  16. #Cl0p has listed #Telos Corporation. Telos "offers advanced technology solutions that empower and protect the world’s most security-conscious enterprises." #MOVEit.

  17. #Cl0p has listed Santa Clara University. #SCU is the 6th US university known to have been impacted out of a total of 82 organizations known to have been impacted by #MOVEit.

  18. Another week, another newsletter - catch up on the week's infosec news here:

    opalsec.substack.com/p/soc-gou

    Researchers have found that nearly two years on, 2 in 3 installs of #Apache #Superset are still using default Flask Secret Keys - a configuration flaw which would allow an attacker to forge session cookies and access said servers with full administrative privileges.

    #Kritec is a commodity #skimmer found installed on compromised #Magecart sites, with its code heavily obfuscated and customised to match the site's aesthetic in order to con users out of credit card details.

    #FIN7 look to be popping instances of the #Veeam backup software that are unpatched for a recent vulnerability; a revised #ViperSoftX #infostealer now targets #1password and #keepass password vaults, and #TA505 deliver a new infostealer through a #GoogleAds campaign

    #LockBit & #CL0P ransomware affiliates have been abusing a month-old vulnerability in the #PaperCut print management software to drop ransomware. With the cat out of the bag, security researchers have decided now is a great time to drop a PoC exploit on Github - I mean, why not let the skiddies get in on the action too, right?

    The #blueteam have some great research worth reading on #Smishing via #AWS; detections for #SliverC2 and different implementations of #PsExec, as well as #Sigma integration for #SentinelOne and a #KQL hack for monitoring LOLDrivers.

    Have a great week ahead folks, I hope this newsletter proves helpful!

    opalsec.substack.com/p/soc-gou

    #infosec #cyber #news #newsletter #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #affiliate #dfir #soc #threatintel #threatintelligence #threathunting #detection #threatdetection #detectionengineering #flask #python #fraud #malvertising #clop #PoC #exploit #securityresearch #LOLBAS #LOLBIN #BYOVD

  19. Another week, another newsletter - catch up on the week's infosec news here:

    opalsec.substack.com/p/soc-gou

    Researchers have found that nearly two years on, 2 in 3 installs of #Apache #Superset are still using default Flask Secret Keys - a configuration flaw which would allow an attacker to forge session cookies and access said servers with full administrative privileges.

    #Kritec is a commodity #skimmer found installed on compromised #Magecart sites, with its code heavily obfuscated and customised to match the site's aesthetic in order to con users out of credit card details.

    #FIN7 look to be popping instances of the #Veeam backup software that are unpatched for a recent vulnerability; a revised #ViperSoftX #infostealer now targets #1password and #keepass password vaults, and #TA505 deliver a new infostealer through a #GoogleAds campaign

    #LockBit & #CL0P ransomware affiliates have been abusing a month-old vulnerability in the #PaperCut print management software to drop ransomware. With the cat out of the bag, security researchers have decided now is a great time to drop a PoC exploit on Github - I mean, why not let the skiddies get in on the action too, right?

    The #blueteam have some great research worth reading on #Smishing via #AWS; detections for #SliverC2 and different implementations of #PsExec, as well as #Sigma integration for #SentinelOne and a #KQL hack for monitoring LOLDrivers.

    Have a great week ahead folks, I hope this newsletter proves helpful!

    opalsec.substack.com/p/soc-gou

    #infosec #cyber #news #newsletter #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #affiliate #dfir #soc #threatintel #threatintelligence #threathunting #detection #threatdetection #detectionengineering #flask #python #fraud #malvertising #clop #PoC #exploit #securityresearch #LOLBAS #LOLBIN #BYOVD

  20. Another week, another newsletter - catch up on the week's infosec news here:

    opalsec.substack.com/p/soc-gou

    Researchers have found that nearly two years on, 2 in 3 installs of #Apache #Superset are still using default Flask Secret Keys - a configuration flaw which would allow an attacker to forge session cookies and access said servers with full administrative privileges.

    #Kritec is a commodity #skimmer found installed on compromised #Magecart sites, with its code heavily obfuscated and customised to match the site's aesthetic in order to con users out of credit card details.

    #FIN7 look to be popping instances of the #Veeam backup software that are unpatched for a recent vulnerability; a revised #ViperSoftX #infostealer now targets #1password and #keepass password vaults, and #TA505 deliver a new infostealer through a #GoogleAds campaign

    #LockBit & #CL0P ransomware affiliates have been abusing a month-old vulnerability in the #PaperCut print management software to drop ransomware. With the cat out of the bag, security researchers have decided now is a great time to drop a PoC exploit on Github - I mean, why not let the skiddies get in on the action too, right?

    The #blueteam have some great research worth reading on #Smishing via #AWS; detections for #SliverC2 and different implementations of #PsExec, as well as #Sigma integration for #SentinelOne and a #KQL hack for monitoring LOLDrivers.

    Have a great week ahead folks, I hope this newsletter proves helpful!

    opalsec.substack.com/p/soc-gou

    #infosec #cyber #news #newsletter #cybernews #infosec #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #affiliate #dfir #soc #threatintel #threatintelligence #threathunting #detection #threatdetection #detectionengineering #flask #python #fraud #malvertising #clop #PoC #exploit #securityresearch #LOLBAS #LOLBIN #BYOVD