We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Ransom:Win32/Clop!rfn
Aliases: No associated aliases
Summary
Ransom:Win32/Clop!rfn first appeared in early 2019 released by threat actors who moved from simple file encryption to multiextortion tactics. They steal files, threaten to publish them on a Tor leak site, and harass executives or clients. They gained wide attention by finding and exploiting zeroday flaws in managed file transfer software. By breaking into one platform, they compromised thousands of organizations at once. The Clop family runs as a mature Ransomware-as-a-Service model that deliberately hunts large enterprise targets. Threat actors behind it were involved to more than 500 million dollars in extortion payments. They routinely use double, triple, and quadruple extortion. They encrypt local data, steal sensitive documents, threaten to release them on the CL0P^_-LEAKS Tor site, and sometimes launch denial-of-service attacks or send threatening messages to employees and customers. In several recent campaigns, the group skipped encryption entirely and only stole data. They recognized that the threat of public exposure often pressures the affected organizations into paying faster than locking devices does.
- Disconnect affected devices from the network at once. Stop ransomware from spreading and cut off data exfiltration. Deactivate compromised administrative accounts. Isolate infected servers and workstations.
- Capture forensic images of volatile memory and disk storage before wiping or restoring any device. Preserve these images for analysis to determine the entry point and the full extent of the breach.
- Restore encrypted files from offline, immutable, or versioned backups. Verify that the original vulnerability is patched, and that no malware remains on the device before reconnecting it.
- Notify legal counsel to assess obligations under data breach notification laws. Prepare public statements and coordinate with law enforcement.
- Monitor the CL0P^_-LEAKS Tor site and other channels the threat actors use. Subscribe to threat intelligence feeds to track new activity.
Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.