CL0P Ransomware Strikes Gladinet CentreStack in Latest Attack

Published:

spot_img

CL0P Ransomware Targets Gladinet CentreStack in New Campaign

The CL0P ransomware group has recently set its sights on Gladinet’s CentreStack file servers as part of its latest extortion effort. This alarming trend was highlighted in a LinkedIn announcement from the Curated Intelligence project, where incident response professionals initially flagged this growing threat.

Emerging Threats and Targeted Vulnerabilities

According to a recent advisory from Cyble, CL0P seems poised to launch a significant wave of attacks following earlier exploits of vulnerabilities in Oracle E-Business Suite. This earlier campaign reportedly affected over 100 organizations. Cyble’s findings suggest that the group is preparing its dark web data leak site (DLS) for incoming victims, which echoes previous strategies involving mass data leak disclosures. Currently, it appears there’s an organized effort to catalog and group victims based on their association with these Oracle vulnerabilities, indicating a coordinated response may be imminent for those targeted through Gladinet CentreStack. As of now, specific victim samples or timelines related to these latest attacks have not been disclosed.

Understanding the Vulnerabilities: Known and Unknown

There is still uncertainty about whether CL0P is exploiting known vulnerabilities or if it is leveraging new, undisclosed zero-day exploits. Curated Intelligence pointed out a report from Huntress, suggesting a potential link to recent findings. This report identified CVE-2025-11371, which pertains to a vulnerability allowing external parties access to certain files within Gladinet’s CentreStack and TrioFox systems. This issue was noted in the CISA’s Known Exploited Vulnerabilities (KEV) catalog earlier in November.

Furthermore, Huntress identified additional vulnerabilities that threat actors could exploit. These include CVE-2025-30406, related to a hard-coded cryptographic key vulnerability, and CVE-2025-14611, which pertains to similar hardcoded cryptographic weaknesses in both Gladinet CentreStack and TrioFox. Each of these vulnerabilities carries unique risks, with the former being cataloged in the KEV database since April and the latter added in December.

As of December 8, the recommended version of Gladinet’s CentreStack software is 16.12.10420.56791. Experts urge any potentially impacted users to promptly update to this latest iteration to bolster defenses. Also recommended is the rotation of the machineKey, which is essential for maintaining security integrity.

Historical Context: CL0P’s Targeting Patterns

CL0P has established a reputation for effectively exploiting file-sharing and transfer systems, making it one of the most prominent ransomware threats in recent years. Historically, their targets have included various services such as Oracle EBS, Cleo FTP, MOVEit, and others. A notable example of their impact occurred earlier this year when vulnerabilities in Cleo MFT resulted in a surge of ransomware incidents.

This group’s persistence alongside their ability to exploit vulnerabilities at scale has positioned them as one of the top five ransomware groups over their six years of activity. Curated Intelligence underscored that this new campaign marks another chapter in CL0P’s ongoing series of data extortion efforts, suggesting a predictable pattern that organizations must remain vigilant against.

Potential Impact and Recommendations

With recent port scanning data revealing over 200 distinct IP addresses running “CentreStack – Login,” these systems present a significant risk of being targeted by CL0P. This highlights the need for heightened security consciousness, especially in organizations utilizing Gladinet’s CentreStack services.

As businesses increasingly rely on digital file management systems, understanding the nature of these vulnerabilities and proactively addressing them is crucial. Organizations are encouraged to maintain updated software versions and implement rigorous security measures, including regular system reviews and updates, as well as staff training on recognizing potential threats.

By staying informed and prepared, businesses can better defend themselves against ransomware threats like those posed by the CL0P group.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...