Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Clop ransomware hits 66 companies: Check if you’re on their radar

The breach centers on a zero-day vulnerability known as CVE-2024-50623, affecting Cleo’s LexiCom, VLTransfer, and Harmony products

byKerem Gülen
December 25, 2024
in News, Cybersecurity
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

The Clop ransomware gang has claimed responsibility for breaching data from at least 66 companies, exploiting a vulnerability in Cleo Software’s file transfer tools. This incident, reported on December 25, 2024, highlights the gang’s ongoing campaign targeting vulnerable corporate systems. Clop announced that victims have 48 hours to comply with their ransom demands, failing which they will release the full names of the affected companies.

Clop ransomware gang exploits Cleo software affecting 66 companies

The breach centers on a zero-day vulnerability known as CVE-2024-50623, affecting Cleo’s LexiCom, VLTransfer, and Harmony products. This flaw permits remote file uploads and downloads, leading to potential remote code execution. Cleo confirmed that its software is utilized by over 4,000 organizations globally, suggesting a larger pool of companies could be at risk. Previous hacks by Clop included similar exploits aimed at the Accellion, GoAnywhere, and MOVEit platforms.

Clop’s recent actions mark a significant escalation, as they have directly contacted victims, providing secure channels for ransom negotiations. The gang published partial names of affected companies on their dark web site, claiming that the current list only reflects those who have not engaged with them. This further alludes to the possibility that the number of compromised companies could be higher than reported.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Cleo has warned clients about the active exploitation of the CVE-2024-50623 vulnerability and has released patches for its software. However, cybersecurity researchers have raised concerns that these fixes might be susceptible to bypass. Huntress disclosed this vulnerability earlier this month, alerting users of ongoing exploitation efforts by hackers. The potential implications of this vulnerability are compounded by Clop’s confirmation of exploiting the flaw to facilitate their latest data theft operations.


Starbucks restores systems after Blue Yonder ransomware attack


Macnica’s Yutaka Sejiyama told Bleeping Computer that even with incomplete names of companies, cross-referencing with publicly available data on Cleo servers could reveal some of the victims. As the situation develops, there remains uncertainty surrounding how many organizations may ultimately fall victim to this attack and what measures will be taken to address these vulnerabilities.

Clop has a notorious history of leveraging zero-day vulnerabilities to infiltrate corporate networks, as evidenced by their prior hacks connected to other popular file transfer platforms. The stolen data from these incidents often serves as leverage for ransom payments, as companies strive to avoid the public exposure of sensitive information. In this latest attack, Clop explicitly stated the urgency for companies to respond to their demands, underlining their intent to release full names of victims who do not engage.

The strategies employed by the Clop gang reflect a sophisticated understanding of corporate cybersecurity protocols, often targeting critical software solutions that facilitate large data transfers.


Featured image credit: Kerem Gülen/Midjourney

Tags: ransomware

Related Posts

Dell fixes the XPS: Physical keys return in new 14 and 16 models

Dell fixes the XPS: Physical keys return in new 14 and 16 models

January 13, 2026
Zuckerberg launches Meta Compute to build massive AI energy grid

Zuckerberg launches Meta Compute to build massive AI energy grid

January 13, 2026
Official: Google Gemini will power Apple Intelligence and Siri

Official: Google Gemini will power Apple Intelligence and Siri

January 13, 2026
Amazon: 97% of our devices are ready for Alexa+

Amazon: 97% of our devices are ready for Alexa+

January 13, 2026
Anthropic’s Cowork brings developer-grade AI agents to non-coders

Anthropic’s Cowork brings developer-grade AI agents to non-coders

January 13, 2026
Xiaomi eyes total independence with new chip and OS

Xiaomi eyes total independence with new chip and OS

January 12, 2026

LATEST NEWS

Dell fixes the XPS: Physical keys return in new 14 and 16 models

Zuckerberg launches Meta Compute to build massive AI energy grid

Official: Google Gemini will power Apple Intelligence and Siri

Amazon: 97% of our devices are ready for Alexa+

Anthropic’s Cowork brings developer-grade AI agents to non-coders

Xiaomi eyes total independence with new chip and OS

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.