CL0P Ransomware Strikes Gladinet CentreStack in Latest Attack

Published:

spot_img

CL0P Ransomware Targets Gladinet CentreStack in New Campaign

The CL0P ransomware group has recently set its sights on Gladinet’s CentreStack file servers as part of its latest extortion effort. This alarming trend was highlighted in a LinkedIn announcement from the Curated Intelligence project, where incident response professionals initially flagged this growing threat.

Emerging Threats and Targeted Vulnerabilities

According to a recent advisory from Cyble, CL0P seems poised to launch a significant wave of attacks following earlier exploits of vulnerabilities in Oracle E-Business Suite. This earlier campaign reportedly affected over 100 organizations. Cyble’s findings suggest that the group is preparing its dark web data leak site (DLS) for incoming victims, which echoes previous strategies involving mass data leak disclosures. Currently, it appears there’s an organized effort to catalog and group victims based on their association with these Oracle vulnerabilities, indicating a coordinated response may be imminent for those targeted through Gladinet CentreStack. As of now, specific victim samples or timelines related to these latest attacks have not been disclosed.

Understanding the Vulnerabilities: Known and Unknown

There is still uncertainty about whether CL0P is exploiting known vulnerabilities or if it is leveraging new, undisclosed zero-day exploits. Curated Intelligence pointed out a report from Huntress, suggesting a potential link to recent findings. This report identified CVE-2025-11371, which pertains to a vulnerability allowing external parties access to certain files within Gladinet’s CentreStack and TrioFox systems. This issue was noted in the CISA’s Known Exploited Vulnerabilities (KEV) catalog earlier in November.

Furthermore, Huntress identified additional vulnerabilities that threat actors could exploit. These include CVE-2025-30406, related to a hard-coded cryptographic key vulnerability, and CVE-2025-14611, which pertains to similar hardcoded cryptographic weaknesses in both Gladinet CentreStack and TrioFox. Each of these vulnerabilities carries unique risks, with the former being cataloged in the KEV database since April and the latter added in December.

As of December 8, the recommended version of Gladinet’s CentreStack software is 16.12.10420.56791. Experts urge any potentially impacted users to promptly update to this latest iteration to bolster defenses. Also recommended is the rotation of the machineKey, which is essential for maintaining security integrity.

Historical Context: CL0P’s Targeting Patterns

CL0P has established a reputation for effectively exploiting file-sharing and transfer systems, making it one of the most prominent ransomware threats in recent years. Historically, their targets have included various services such as Oracle EBS, Cleo FTP, MOVEit, and others. A notable example of their impact occurred earlier this year when vulnerabilities in Cleo MFT resulted in a surge of ransomware incidents.

This group’s persistence alongside their ability to exploit vulnerabilities at scale has positioned them as one of the top five ransomware groups over their six years of activity. Curated Intelligence underscored that this new campaign marks another chapter in CL0P’s ongoing series of data extortion efforts, suggesting a predictable pattern that organizations must remain vigilant against.

Potential Impact and Recommendations

With recent port scanning data revealing over 200 distinct IP addresses running “CentreStack – Login,” these systems present a significant risk of being targeted by CL0P. This highlights the need for heightened security consciousness, especially in organizations utilizing Gladinet’s CentreStack services.

As businesses increasingly rely on digital file management systems, understanding the nature of these vulnerabilities and proactively addressing them is crucial. Organizations are encouraged to maintain updated software versions and implement rigorous security measures, including regular system reviews and updates, as well as staff training on recognizing potential threats.

By staying informed and prepared, businesses can better defend themselves against ransomware threats like those posed by the CL0P group.

spot_img

Related articles

Recent articles

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Scheme In a significant cybersecurity breach, Drift has disclosed that the attack on April 1,...

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network

Mastermind Arrested as Delhi Police Uncover ₹300 Crore International Cyber Fraud Network A routine investigation into a single financial fraud complaint in New Delhi has...

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches

UAE Warns: AI-Driven Phishing Scams Account for 90% of Cyber Breaches In a recent statement, the Cybersecurity Council of the UAE highlighted a troubling trend...

36 Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants

36 Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants Recent cybersecurity investigations have unveiled a significant threat within the npm registry, where...