Double-Extortion Ransomware Attacks on the Rise with Clop and FIN11

  • By Dawna M. Roberts
  • Published: Oct 15, 2020
  • Last Updated: Mar 18, 2022

Cybersecurity experts are noting that cybercriminal gangs are diversifying with double-extortion ransomware tactics and using Clop as their tool of choice.

What and Who is Clop?

Clop is the name of a gang of cyber thieves and the name of their own brand of ransomware. Recently Clop used their malware targeting a huge German software company, Software AG. 

In October, the gang breached the company's computer systems and accessed untold volumes of data. The company released a statement alerting customers, "While services to its customers, including its cloud-based services, remain unaffected, as a result, Software AG has shut down the internal systems in a controlled manner in accordance with the company's internal security regulations."

Unfortunately, a few days later, Software AG found out that the gang had downloaded customer data and threatened to release it online. The threat came in the form of a ransom note demanding $23 million. 

Clop was first used and discovered in February 2019 by MalwareHunterTeam. This was when the new tactic of double-extortion began to emerge. These cyber gangs target large companies with deep pockets. They gain access to their systems, steal critical data, and demand that they pay a ransom. If the company refuses to pay, they release the data publicly online. 

Before this recent and largest attack, Clop also targeted a biopharmaceutical company named ExecuPharm back in April. The company refused to pay, and the thieves leaked the data online.

The difference with Clop (the group) is that they target large, reputable firms rather than smaller organizations, which most hackers go after.

How Does Clop (the malware) Work?

In a recent article on McAfee's website, Alexandre Mundo and Marc Rivero Lopez explained in detail how the Clop malware/ransomware works. 

"The Clop ransomware is usually packed to hide its inner workings. Signing a malicious binary, in this case, ransomware, may trick security solutions to trust the binary and let it pass." Evading anti-malware makes Clop very dangerous, and they also noted that if it is not installed successfully as a service, it terminates itself.

One of the most interesting and disturbing aspects is that the first order of business is that Clop maps the victim's keyboard against hardcoded values to check whether or not the user is Russian. Mundo and Lopez explained it as "The malware checks that the layout is bigger than the value 0x0437 (Georgian), makes some calculations with the Russian language (0x0419) and with the Azerbaijan language (0x082C). This function will return 1 or 0, 1 if it belongs to Russia or another CIS country, or 0 in every other case." The malware then performs a second check to determine if a Russian character set is installed or used. 

If the malware encounters a 0, it continues to function. If not, it deletes itself. After ruling out the Russian component, Clop creates a folder called "Favorite." It then makes a dummy call to produce an error, essentially searching for antivirus software. If found, it goes to sleep for five seconds and then resumes.

McAfee mentions that the developers of Clop are not very good programmers and use simple batch files to get the job done; they explain, "The next action is to write this batch file in the same folder where the malware stays with the function 'CreateFileA,'" they said. "The file created has the name 'clearsystems-11-11.bat'. Later, will launch it with 'ShellExecuteA,' wait for five seconds to finish, and delete the file with the function' DeleteFileA." Mundo and Lopez added, "All these actions could have been performed in the malware code itself, without the need of an external file that can be detected and removed."

FIN11 Hacker Group Using Clop

The hacker group named FIN11 has been using phishing and credential stuffing to defraud victims and steal money. However, FireEye Mandiant's research team has noticed that this very prolific group has started to expand operations to include ransomware using Clop. 

The malicious group has been around for about four years and have conducted countless phishing campaigns and even added point-of-sale (POS) malware to its repertoire. 

As they evolve, they have recently added ransomware and changed their victimology from targeting companies in the retail space, financial institutions, and hospitality sector to a more widespread victim pool.

According to cybersecurity experts, FIN11 is a spin-off from the larger TA505 group (a.k.a. Hive0065), which has been around since 2014, targeting restaurants, finance, and retail businesses for financial gain. They are also responsible for a large percentage of the COVID-19 phishing emails.  

FIN11 distinguishes itself by being a sophisticated crime group with vast resources. Mandiant researchers have theorized that "We believe that the group has used services that provide anonymous domain registration, bulletproof hosting, code signing certificates, and private or semi-private malware. Outsourcing work to these criminal service providers likely enables FIN11 to increase the scale and sophistication of their operations."

CISO of Netenrich, Brandon Hoffman, told ThreatPost that "There is a whole marketplace of providers that cater to and operate in what some refer to as the dark web. These services are not limited to the ones described as in use by FIN11 but include code-writing services, monetary exchanges, and more." Hoffman also added that "Broad-based phishing campaigns with the hope of hooking ransomware into an organization for the purpose of extortion, while leveraging malicious service providers, is at the basic footprint of cybercrime today."

Regardless of the methods used, everyone is at risk of identity theft if their information is stolen and leaked online. 

 
About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What You Need to Know about the Episource Data Breach

What You Need to Know about the Episource Data Breach

Episource is a California-based healthcare services and technology company that provides risk adjustment and medical coding services to healthcare plans, doctors, and several other types of healthcare organizations.

What you need to know about the Krispy Kreme Data Breach

What you need to know about the Krispy Kreme Data Breach

The popular doughnut and coffeehouse chain Krispy Kreme was established in 1937 in Winston-Salem, North Carolina. It has grown over the years and currently operates 1,500 shops and 17,900 points of access in 40 nations.

What You Need to Know about the Ocuco Data Breach

What You Need to Know about the Ocuco Data Breach

Ocuco is a Dublin-based organization that specializes in optical software solutions. Established in 1993 by Leo Mac Canna, the company initially developed software for independent optometrists.

What You Need to Know about the TxDOT Data Breach

What You Need to Know about the TxDOT Data Breach

The Texas Department of Transportation (TxDOT) is responsible for designing, planning, operating, building, and maintaining the state's transportation system to deliver a reliable and safe transportation system.

What You Need to Know about the AT&T Data Breach

What You Need to Know about the AT&T Data Breach

AT&T, one of the largest telecommunications providers in the United States and the fourth-largest telecommunications company in the world by revenue, experienced a significant data leak, which became public in June 2025.

What You Need to Know about the Mainstreet Bank Data Breach

What You Need to Know about the Mainstreet Bank Data Breach

MainStreet is a community-oriented bank in Fairfax, Virginia. Established in 2004, it is under the MainStreet Bancshares Incorporated, a small-cap financial holding organization.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close