CI0p attacks Thai Summit America

Incident Date: Mar 03, 2024

Attack Overview
VICTIM
Thai Summit America
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Clop
FIRST REPORTED
March 3, 2024

Thai Summit America Compromised by Cl0p Ransomware Group

Thai Summit America has reportedly been compromised by Cl0p ransomware group, but no other details are available. Thai Summit America has Corporate facilities in Asia Pacific, and is a global supplier to OEM’s in major class A stamping and assembly components. The Howell facility is the first manufacturer in North America to introduce remote laser welding and utilize entire surface imaging for timely communication with customers. First company to create supplemental tooling to manipulate blanks under ram to allow a nested configuration that yields higher material utilization.

Recent Activities of Cl0p Ransomware Group

Attacks by Cl0p operators and affiliates fell dramatically in August of 2023, then the group appeared to have gone dark altogether in September with few attacks attributed to them throughout the rest of Q4-2023. CI0p is a RaaS (Ransomware as a Service) platform first observed in 2019. CI0p has advanced anti-analysis capabilities and anti-virtual machine analysis to prevent investigations in an emulated environment like those commonly used by security tools.

CI0p is increasingly using automation to exploit known vulnerabilities to infiltrate targets, as well as a SQL injection zero-day vulnerability (CVE-2023-34362) that installs a web shell – a rarity amongst ransomware operators. Attacks by CI0p surged in Q1 of 2023 as the gang leveraged patchable exploits for the GoAnywhere file transfer software to compromise more than 100 victims in a matter of weeks, although it is unknown how well they were able to monetize the attacks.

CI0p's Ransom Demands and Targets

CI0p is likely to be leveraging automation to identify exposed organizations who have not patched against known vulnerability, which is why we are seeing so many new victims. Ransom demands vary depending on the target and average around $3 million dollars but have been reported as to be as high as $20 million. Ransom amounts are likely to continue to grow as CI0p focuses more on the exfiltration of sensitive data.

CI0p is one of just a handful of RaaS providers that have developed a Linux version, an indication that CI0p is likely actively recruiting new talent to help improve their platform and expand the scope of what and whom they can attack. CI0p’s Windows version was written in C++ and encrypts files with RC4 and the encryption keys with RSA 1024-bit.

CI0p had previously almost exclusively hit targets in the healthcare sector but has significantly expanded targeting to include most any organization with vulnerable GoAnywhere installations. CI0p runs an expansive affiliate program and exfiltrates data to be leveraged in triple extortion schemes and has significantly expanded its primary target range beyond the healthcare sector. There are indications that CI0p may be shifting to more of a pure data extortion model, but most victims still suffer the ransomware payload at this point.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.