CL0P Ransomware Strikes Gladinet CentreStack in Latest Attack

Published:

spot_img

CL0P Ransomware Targets Gladinet CentreStack in New Campaign

The CL0P ransomware group has recently set its sights on Gladinet’s CentreStack file servers as part of its latest extortion effort. This alarming trend was highlighted in a LinkedIn announcement from the Curated Intelligence project, where incident response professionals initially flagged this growing threat.

Emerging Threats and Targeted Vulnerabilities

According to a recent advisory from Cyble, CL0P seems poised to launch a significant wave of attacks following earlier exploits of vulnerabilities in Oracle E-Business Suite. This earlier campaign reportedly affected over 100 organizations. Cyble’s findings suggest that the group is preparing its dark web data leak site (DLS) for incoming victims, which echoes previous strategies involving mass data leak disclosures. Currently, it appears there’s an organized effort to catalog and group victims based on their association with these Oracle vulnerabilities, indicating a coordinated response may be imminent for those targeted through Gladinet CentreStack. As of now, specific victim samples or timelines related to these latest attacks have not been disclosed.

Understanding the Vulnerabilities: Known and Unknown

There is still uncertainty about whether CL0P is exploiting known vulnerabilities or if it is leveraging new, undisclosed zero-day exploits. Curated Intelligence pointed out a report from Huntress, suggesting a potential link to recent findings. This report identified CVE-2025-11371, which pertains to a vulnerability allowing external parties access to certain files within Gladinet’s CentreStack and TrioFox systems. This issue was noted in the CISA’s Known Exploited Vulnerabilities (KEV) catalog earlier in November.

Furthermore, Huntress identified additional vulnerabilities that threat actors could exploit. These include CVE-2025-30406, related to a hard-coded cryptographic key vulnerability, and CVE-2025-14611, which pertains to similar hardcoded cryptographic weaknesses in both Gladinet CentreStack and TrioFox. Each of these vulnerabilities carries unique risks, with the former being cataloged in the KEV database since April and the latter added in December.

As of December 8, the recommended version of Gladinet’s CentreStack software is 16.12.10420.56791. Experts urge any potentially impacted users to promptly update to this latest iteration to bolster defenses. Also recommended is the rotation of the machineKey, which is essential for maintaining security integrity.

Historical Context: CL0P’s Targeting Patterns

CL0P has established a reputation for effectively exploiting file-sharing and transfer systems, making it one of the most prominent ransomware threats in recent years. Historically, their targets have included various services such as Oracle EBS, Cleo FTP, MOVEit, and others. A notable example of their impact occurred earlier this year when vulnerabilities in Cleo MFT resulted in a surge of ransomware incidents.

This group’s persistence alongside their ability to exploit vulnerabilities at scale has positioned them as one of the top five ransomware groups over their six years of activity. Curated Intelligence underscored that this new campaign marks another chapter in CL0P’s ongoing series of data extortion efforts, suggesting a predictable pattern that organizations must remain vigilant against.

Potential Impact and Recommendations

With recent port scanning data revealing over 200 distinct IP addresses running “CentreStack – Login,” these systems present a significant risk of being targeted by CL0P. This highlights the need for heightened security consciousness, especially in organizations utilizing Gladinet’s CentreStack services.

As businesses increasingly rely on digital file management systems, understanding the nature of these vulnerabilities and proactively addressing them is crucial. Organizations are encouraged to maintain updated software versions and implement rigorous security measures, including regular system reviews and updates, as well as staff training on recognizing potential threats.

By staying informed and prepared, businesses can better defend themselves against ransomware threats like those posed by the CL0P group.

spot_img

Related articles

Recent articles

Samsung Unveils Galaxy Z TriFold in UAE: A New Era for Foldable Innovation

Samsung's Galaxy Z TriFold: A New Era in Foldable Technology An Innovative Leap In December 2025, Samsung Gulf Electronics unveiled the Galaxy Z TriFold, a pioneering...

Unprecedented Success at HORECA and Salon du Chocolat Riyadh

HORECA Riyadh and Salon du Chocolat: A Celebration of Culinary Excellence Riyadh's Culinary Showcase The recently concluded 14th edition of HORECA Riyadh and the third edition...

SFIO Intensifies Investigation into IndusInd Bank’s Accounting Issues

Intensified Investigation into IndusInd Bank’s Accounting Practices Overview of the Investigation The scrutiny surrounding IndusInd Bank regarding accounting irregularities has stepped up considerably. The Serious Fraud...

Experts Warn: Unregulated AI Poses Risk of Producing Illegal Child Abuse Material

Uncovering DIG AI: The Dark Web's Threat to Cybersecurity What is DIG AI? A new artificial intelligence tool named DIG AI has emerged on the dark...