Article 5KD5C A week after arrests, Cl0p ransomware group dumps new tranche of stolen data

A week after arrests, Cl0p ransomware group dumps new tranche of stolen data

by
Dan Goodin
from Ars Technica - All content on (#5KD5C)
evil-packet-800x480.jpg

Enlarge (credit: Getty Images)

A week after Ukrainian police arrested criminals affiliated with the notorious Cl0p ransomware gang, Cl0p has published a fresh batch of what's purported to be confidential data stolen in a hack of a previously unknown victim. Ars won't be identifying the possibly victimized company until there is confirmation that the data and the hack are genuine.

If genuine, the dump shows that Cl0p remains intact and able to carry out its nefarious actions despite the arrests. That suggests that the suspects don't include the core leaders but rather affiliates or others who play a lesser role in the operations.

The data purports to be employee records, including verification of employment for loan applications and documents pertaining to workers whose wages have been garnished. I was unable to confirm that the information is genuine and that it was, in fact, taken during a hack on the company, although web searches showed that names listed in the documents matched names of people who work for the company.

Read 8 remaining paragraphs | Comments

index?i=w4gH_vcAE1E:SWFnZxlMw30:V_sGLiPB index?i=w4gH_vcAE1E:SWFnZxlMw30:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments