|
gptkbp:instanceOf
|
gptkb:ransomware_group
|
|
gptkbp:alsoKnownAs
|
Cl0p
|
|
gptkbp:arrested
|
Ukraine (2021 law enforcement action)
|
|
gptkbp:associatedWith
|
gptkb:TA505
|
|
gptkbp:firstObserved
|
2019
|
|
gptkbp:language
|
gptkb:Russian
|
|
gptkbp:leaksDataOn
|
dark web leak sites
|
|
gptkbp:notableBattle
|
Accellion FTA breach
MOVEit Transfer data breach
|
|
gptkbp:notableFor
|
ransomware attacks
|
|
gptkbp:operates
|
gptkb:cybercrime
|
|
gptkbp:operatesPrimarilyIn
|
gptkb:Eastern_Europe
|
|
gptkbp:requires
|
ransom payments in cryptocurrency
|
|
gptkbp:target
|
gptkb:government
gptkb:government_ministry
education sector
healthcare sector
large enterprises
organizations worldwide
|
|
gptkbp:uses
|
double extortion tactics
exploits software vulnerabilities
phishing emails for initial access
ransomware-as-a-service model
|
|
gptkbp:victim
|
gptkb:BBC
gptkb:British_Airways
gptkb:Stanford_University
gptkb:University_of_California
gptkb:Deutsche_Bank
gptkb:Morgan_Stanley
gptkb:Shell
|
|
gptkbp:bfsParent
|
gptkb:CL0P_ransomware_group
gptkb:TA505
gptkb:Clop_ransomware_group
|
|
gptkbp:bfsLayer
|
8
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Clop
|