If you would like to receive alerts and information on the latest vulnerabilities and threat actors via email each month, click below to subscribe to the MOXFIVE mailing list.
Cl0p has launched a new large-scale extortion campaign, sending emails from compromised accounts that reference Oracle E-Business Suite data-theft claims. Cl0p is known for long quiet periods followed by industry-wide exploitation of file transfer flaws, most notably Accellion FTA, GoAnywhere MFT, MOVEit Transfer, and Cleo. In this campaign, organizations are receiving emails from “pubstorm” addresses claiming data theft and demanding response. At this time, the activity appears to be extortion-only — no file encryption has been observed.
The MOXFIVE team is closely tracking this campaign and can provide support with forensic investigation and containment, negotiation, and data mining if your environment or vendors show signs of impact. We are already engaged on active cases supporting these workstreams.
Key Points:
Recommended Actions:
Our team is closely tracking this campaign and can provide support with forensic investigation and containment/restoration should your environment or vendors show signs of impact.
If you have questions or need any assistance, please contact us at 833-568-6695 or email our team at incident@moxfive.com.