Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Ukrainian Police Arrest Suspected Members of 'CL0P' Ransomware Gang

Despite the arrests, the main CL0P ransomware gang is likely still in operation, according to a cybersecurity firm.

By Michael Kan
June 16, 2021
(Credit: National Police of Ukraine)

Police in Ukraine say they’ve arrested six people tied to the CL0P ransomware gang, a group notorious for leaking information from dozens of different companies.

On Wednesday, the National Police of Ukraine released a video that shows investigators raiding  homes belonging to the suspects. In total, police conducted 21 searches in the Kyiv region, which also involved seizing millions in cash and confiscating cars. 

Ukrainian police didn’t offer details on the arrests. However, they worked with Interpol and law enforcement in the US and South Korea to track down the suspects’ identities. 

According to Ukrainian police, the CL0P ransomware gang has caused damages reaching an estimated $500 million. Its members have installed ransomware on computers from US and Korean companies. The attacks work by encrypting the information on the computers, and then demanding victims pay up in Bitcoin to receive a decryption key. 

Earlier this year, CL0P also managed to steal data from dozens of groups, including Stanford University Medical School, the University of Maryland, and the University of California. The ransomware gang claimed this was done by compromising a third-party supplier called Accellion.

Clop's website

CL0P then began leaking the stolen information through the group’s website on the dark web while threatening to release more confidential files unless victims paid up. The CL0P's leak site currently lists 57 alleged victims.

The announcement from the Ukrainian police says law enforcement has shut down the infrastructure for the CL0P ransomware computer code. But despite the arrests, the main CL0P ransomware gang is likely still in operation, according to the cybersecurity firm Intel 471, which suspects the police raid primarily hit CL0P's money-laundering business.  

“We do not believe that any core actors behind CL0P were apprehended, due to the fact that they are probably living in Russia,” Intel 471 told security journalist Brian Krebs. “The overall impact to CL0P is expected to be minor although this law enforcement attention may result in the CL0P brand getting abandoned as we’ve recently seen with other ransomware groups like Darkside and Babuk.”

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan