{"id":44513,"date":"2021-06-17T13:21:29","date_gmt":"2021-06-17T10:21:29","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=44513"},"modified":"2025-08-31T17:17:15","modified_gmt":"2025-08-31T14:17:15","slug":"ukraine-identifies-clop-ransomware-operators-sources-say-they-are-not-hackers","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/ukraine-identifies-clop-ransomware-operators-sources-say-they-are-not-hackers\/","title":{"rendered":"Ukraine identifies Clop ransomware operators; sources say they are not hackers"},"content":{"rendered":"<p>Ukrainian law enforcement authorities <a href=\"https:\/\/cyberpolice.gov.ua\/news\/kiberpolicziya-vykryla-xakerske-ugrupovannya-u-rozpovsyudzhenni-virusu-shyfruvalnyka-ta-nanesenni-inozemnym-kompaniyam-piv-milyarda-dolariv-zbytkiv-2402\/\">\u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438<\/a> on the identification of six members of a hacker group that stood behind the Clop ransomware, which attacked organizations in South Korea and the United States.<\/p>\n<p>According to Ukraine&#8217;s cyberpolice, in 2019 the Clop operators hacked four South Korean companies, compromising internal servers and employees&#8217; devices. The hackers distributed the malware via emails with malicious attachments.<\/p>\n<p>In 2021 the group attacked the Stanford University School of Medicine, as well as the University of Maryland and the University of California, gaining access to employees\u2019 personal data and financial records.<\/p>\n<p>For decrypting the data, the attackers demanded a ransom in cryptocurrency; if not paid, they threatened to disclose confidential data. The total damage from the attacks was estimated at $500 million.<\/p>\n<p>Interpol and law enforcement agencies from the United States and South Korea also participated in the operation.<\/p>\n<p>The cyberpolice said they had disrupted the hackers\u2019 infrastructure and blocked channels used to launder cryptocurrency obtained illegally.<\/p>\n<p>The agency said law enforcement conducted 21 searches in Kyiv and the region, seizing computers, vehicles, and about 5 million hryvnias in cash (over $184,000).<\/p>\n<p>In a statement from the Office of the Prosecutor General of Ukraine, it was stated that 24 searches were conducted and about 1.5 million hryvnias (over $55,000), 3,000 euros and $58,000 were seized.<\/p>\n<p>A ForkLog source who wished to remain anonymous said the searches were conducted at OTC traders through which the ransomware operators moved bitcoins. They themselves, according to our source, are not hackers.<\/p>\n<p>It is believed that the personal data of the individuals involved in the case was handed over to law enforcement by the Binance exchange, where they conducted their trades.<\/p>\n<p>The cyberpolice release does not explicitly state the arrest of these individuals \u2014 only the opening of a criminal case and seizure of assets. The source confirms that the suspects are not under arrest and are at large.<\/p>\n<p>Intel 471 likewise arrived at similar conclusions \u2014 its specialists confirmed that the raids in Ukraine pertain to the laundering of Clop&#8217;s funds, and its principal members are more likely to be in Russia.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abThe consequences for Clop will be minor. They may simply drop the current name due to the close attention of law enforcement,\u00bb Intel471 quotes the specialized site <a href=\"https:\/\/krebsonsecurity.com\/2021\/06\/ukrainian-police-nab-six-tied-to-clop-ransomware\/\">krebsonsecurity.com<\/a>.<\/p>\n<\/blockquote>\n<p>Krebsonsecurity.com notes that the Clop members split from the TA505 group, which has operated since 2014 and had financial motives.<\/p>\n<p>In ForkLog&#8217;s comment, cyberpolice representatives said that the publication on their site contains information that they &#8220;may cover&#8221;: <\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u00abWe cannot comment on the rest to avoid interfering with the investigation\u00bb.<\/p>\n<\/blockquote>\n<p>We will continue to monitor the development of the story.<\/p>\n<p>Late last year, Clop <a href=\"https:\/\/forklog.com\/en\/news\/hackers-hit-1000-symrise-computers-in-clop-ransomware-attack\">attacked<\/a> the leading German producer of food flavorings, Symrise. The hackers stole 500 GB of data and encrypted 1,000 devices at the company.<\/p>\n<p>Follow ForkLog&#8217;s Bitcoin news on our <a href=\"\/\/telegram.me\/forklog\" target=\"\u201c_blank\u201d\" rel=\"\u201cnofollow\u201d noopener\">Telegram<\/a> \u2014 cryptocurrency news, prices and analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ukrainian law enforcement authorities reported on the identification of six members of the hacker group behind the Clop ransomware, which attacked organizations in South Korea and the United States.<\/p>\n","protected":false},"author":1,"featured_media":44514,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1444,1472,16],"class_list":["post-44513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-law-enforcement","tag-search","tag-ukraine"],"aioseo_notices":[],"amp_enabled":true,"views":"27","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/44513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=44513"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/44513\/revisions"}],"predecessor-version":[{"id":44515,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/44513\/revisions\/44515"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/44514"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=44513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=44513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=44513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}