Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Clop Ransomware is Back in Business After Recent Arrests

Clop Ransomware is Back in Business After Recent Arrests

The Clop ransomware operation is back in business after recent arrests and has begun listing new victims on their data leak site again.

Last week, a law enforcement operation conducted by the National Police of Ukraine, the Korean National Police Agency, and the USA led to the arrest of Clop Ransomware gang members.

A video shared by the Ukrainian police shows law enforcement searching homes and seizing property, including 500 million Ukrainian hryvnias (approximately $180,000), computer equipment, documents, and high-end cars, such as Tesla and Mercedes.

Also Read: How to Choose a Penetration Testing Vendor

In a press release, the Ukrainian police described the arrests as a significant blow against the operations and its money laundering of ransom payments.

“Together, law enforcement has managed to shut down the infrastructure from which the virus spreads and block channels for legalizing criminally acquired cryptocurrencies,” said the press statement.

Clop reawakens

While the Clop operation laid low for about a week, the ransomware gang has sprung back into action yesterday after releasing the data for two new victims on their ransomware data leak site.

As explained by cybersecurity firm Intel 471, the continued ransomware operation is likely because last week’s arrests targeted the money laundering portion of the operation and that the core members were not apprehended.

“The law enforcement raids in Ukraine associated with CLOP ransomware were limited to the cash-out/money laundering side of CLOP’s business only,” Intel 471 said at the time of the arrests.

“We do not believe that any core actors behind CLOP were apprehended and we believe they are probably living in Russia.

“The overall impact to CLOP is expected to be minor although this law enforcement attention may result in the CLOP brand getting abandoned as we’ve recently seen with other ransomware groups like DarkSide and Babuk.”

While Clop is back in action, law enforcement operations have dealt numerous blows to ransomware groups this year by targeting affiliates and the infrastructure that fuels the criminal activities.

Earlier this year, Bulgarian police seized servers belonging to the Netwalker ransomware, and Ukrainian police arrested Egregor ransomware members. Both ransomware operations shut down after the law enforcement action.

More recently, the FBI arrested a developer for the notorious TrickBot trojan responsible for developing a new ransomware operation.

Also Read: This Educator Aims to Make Good Cyber Hygiene a Household Practice

Who is Clop?

The Clop ransomware gang has been operating since March 2019, when it first began targeting the enterprise using a variant of the CryptoMix ransomware.

Clop will gain an initial foothold on a corporate computer to perform their attacks and then slowly spread throughout the network while stealing data and documents. When they have harvested everything of value, they will deploy the ransomware on the network to encrypt its devices.

Since then, Clop has been responsible for numerous large-scale ransomware attacks, including those against Maastricht UniversitySoftware AG ITExecuPharm, and Indiabulls.

More recently, Clop had been stealing data from Accellion FTA file transfer devices using a zero-day vulnerability and then threatening to release the data if not paid $10 million or more.

Some of the victims of Accellion attacks include energy giant Shellcybersecurity firm QualysFlagstar Bank, the University of Miami, and the University of California, to name a few.

The Ukrainian police estimate that Clop’s total damages reach as high as $500 million.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us