{"id":22417,"date":"2023-07-10T11:21:20","date_gmt":"2023-07-10T19:21:20","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/10\/news-16147\/"},"modified":"2023-07-10T11:21:20","modified_gmt":"2023-07-10T19:21:20","slug":"news-16147","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/07\/10\/news-16147\/","title":{"rendered":"Clop At The Top \u2013 But For How Long?"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Mon, 10 Jul 2023 17:06:58 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>The Clop (or Cl0p) threat-actor group is a financially motivated organization believed to currently operate from Russian-speaking countries, though it was known to operate in both Russia and Ukraine <a href=\"https:\/\/www.securityweek.com\/six-arrested-roles-clop-ransomware-operation\/\">prior to<\/a> 2022. The Clop threat-actor group is linked to the groups identified as TA505 and FIN11. Its most characteristic ransomware, also called Clop or Cl0p, is a variant of the <a href=\"https:\/\/www.zdnet.com\/article\/this-old-ransomware-is-using-an-unpleasant-new-trick-to-try-and-make-you-pay-up\/\">CryptoMix<\/a> family, also thought to have been developed in the Russian Federation. MITRE identifies this ransomware as <a href=\"https:\/\/attack.mitre.org\/software\/S0611\/\">S0611<\/a>. The group is currently in the news as the force behind the recent rash of attacks leveraging Progress Software\u2019s MOVEit file-transfer system. The self-assigned \u201cClop\u201d (\u041a\u043b\u043e\u043f) name, meanwhile, translates to \u201cbedbug\u201d \u2013 an adaptable, persistent pest.<\/p>\n<p>Its involvement in the MOVEit exploitation is the third such effort ascribed to Clop during the <a href=\"https:\/\/www.crn.com\/news\/security\/the-10-biggest-data-breaches-of-2023-so-far-\">first half of 2023<\/a>, after the GoAnywhere incident in February and the PaperCut incident in April. Some of those efforts appear opportunistic, either resulting from a sale of the group\u2019s own ransomware tooling or from collaboration with other groups. Others, such as MOVEit itself, appear to be the culmination of a long-term tech effort and refinement process by the group. We\u2019ll look at the differences in approaches among the three later in this piece, but for now, the MOVEit thefts continue to <a href=\"https:\/\/www.cybersecuritydive.com\/news\/moveit-vulnerability-victims\/654037\/\">unfold<\/a>. Though it\u2019s still not clear if even this campaign is truly successful: The group hasn\u2019t provided many details about the current operation\u2019s scale, but<strong> as recently as July 3, Sophos is not aware of any victims actually paying the ransom.<\/strong><\/p>\n<h2><strong>What is Clop?<\/strong><\/h2>\n<p>Clop campaigns have historically <a href=\"https:\/\/blog.cyble.com\/2023\/04\/03\/cl0p-ransomware-active-threat-plaguing-businesses-worldwide\/\">targeted<\/a> organizations in the United States, Canada, Latin America, Asia Pacific, and Europe for the most part. The group is known for its innovative techniques \u2013 it was, for instance, among the first to use the tactic of emailing customers and partners of a compromised site to demand that they, too, pressure the compromised target to pay \u2013 and aggressive, preferential <a href=\"https:\/\/www.coveware.com\/blog\/2023\/4\/28\/big-game-hunting-is-back-despite-decreasing-ransom-payment-amounts\">targeting<\/a> of large organizations. It\u2019s part of infosec history as the <a href=\"https:\/\/blogs.blackberry.com\/en\/2021\/07\/threat-thursday-cryptomix-clop-ransomware\">source<\/a> of the first known ransomware demand over $20 million USD, against Software AG in October 2020.<\/p>\n<p>The group was first observed in 2019, relying then on phishing attempts, brute forcing, and the exploitation of known vulnerabilities. The group leverages a &#8220;double extortion&#8221; strategy, in which attackers steal users&#8217; data and encrypt it; if the target of Clop\u2019s attack refuses to pay the ransom, the attackers will not only refuse to restore access, but may also publish their personal data on the \u2018CL0P^_- LEAKS\u2019 site, which is accessible via Tor hidden service.<\/p>\n<p>Clop\u2019s preference for targeting larger companies (&gt;$5 million\/year revenue) and capitalizing on newer-but-disclosed vulnerabilities has been the primary driver of its success in the first half of 2023. The list of its current or recent victims is a who\u2019s who of big names in industries <a href=\"https:\/\/techcrunch.com\/2023\/06\/15\/moveit-clop-mass-hacks-banks-universities\/\">including<\/a> banking and financial services (BFSI), education, and (in an especially grotesque <a href=\"https:\/\/www.hipaajournal.com\/hph-sector-clop-ransomware\/\">example of social engineering<\/a>) healthcare. Clop is regularly connected to high-profile attacks such as the 2021 <a href=\"https:\/\/www.netsec.news\/accellion-fta-extortion-attacks-linked-to-fin11-and-cl0p-ransomware-gang\/\">Accellion<\/a> FTA (File Transfer Appliance) as well as <a href=\"https:\/\/thecyberexpress.com\/pg-cyber-attack-cl0p-ransomware-victim-list\/\">GoAnywhere<\/a> and the multi-vulnerability <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/06\/05\/information-on-moveit-transfer-and-moveit-cloud-vulnerability-cve-2023-34362\/\">MOVEit<\/a>. Of note is the group\u2019s consistent and aggressive recent targeting of file-transfer services, which tend to handle data from a variety of systems and thus could be considered a vulnerable point in many supply chains.<\/p>\n<h2><strong>How Do You Do, That Thing You Do? Let\u2019s Talk Tactics <\/strong><\/h2>\n<p>The Clop ransomware gang employs several tactics during an attack to maximize impact and increase the likelihood of victims paying the ransom. (The tactics and even the target\u2019s experience may change from case to case, but money is almost always the goal. We\u2019ll touch on certain exceptions below.) To understand how Clop typically executes its mission, we\u2019ll step through highlights of a typical attack flow.<\/p>\n<h3>Initial Access<\/h3>\n<p>The Clop gang usually gains initial access to a victim&#8217;s network through phishing emails, exploit kits, or exploitation of vulnerabilities in software and systems. It often uses social engineering techniques such as spam, malicious links, and other lures in an effort to gain a foothold for its ransomware. And it can be persistent; one Sophos MDR client\u2019s logs recorded 3,689 Clop-driven attempts against their Ubiquity UniFi server to gain initial access, as shown in the log snippet below.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-00.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92581\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-00.png\" alt=\"\" width=\"640\" height=\"51\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-00.png 993w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-00.png?resize=300,24 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-00.png?resize=768,61 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>In that case, the attacker was aiming at the <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/12\/17\/inside-the-code-how-the-log4shell-exploit-works\/\">Log4J vulnerability<\/a> (CVE-2021-44228) and was willing to throw the kitchen sink at it; we observed payloads ranging from PoCs to Metasploit modules to exploits designed specifically for Linux hosts. The attacker was anything but stealthy in this spray-and-pray targeting.<\/p>\n<h3>Persistence<\/h3>\n<p>Clop maintains access to compromised systems in multiple ways. In a case recently handled by the Sophos X-Ops Incident Response team, the threat actor chose to leverage Cobalt Strike Beacon to establish their persistence on the first compromised machine, as seen in the log snippet below.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-01.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92582\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-01.png\" alt=\"Clop using Carbon Strike Beacon on an infiltrated machine\" width=\"640\" height=\"260\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-01.png 997w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-01.png?resize=300,122 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-01.png?resize=768,312 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>This activity was achieved by the creation of a new service, shown in the log snippet below executing the Cobalt Strike installer.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92585\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-2.png\" alt=\"Service installation success\" width=\"640\" height=\"174\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-2.png 976w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-2.png?resize=300,81 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-2.png?resize=768,209 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<h3>Lateral Movement<\/h3>\n<p>Once access to the network has been achieved, Clop pivots laterally, searching for and infecting connected systems. This lateral movement allows the ransomware to deploy quickly throughout the network: infecting the infrastructure, encrypting many files, and maximizing the impact of the operation. In incidents Sophos observed, the threat actor initially leveraged SMB connections before transitioning to interactive RDP sessions, as shown below.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92586\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-03.png\" alt=\"The sessions transitions from automation to hands-on activity\" width=\"640\" height=\"438\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-03.png 922w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-03.png?resize=300,205 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-03.png?resize=768,526 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<h3>Exfiltration<\/h3>\n<p>The Clop gang often exfiltrates data that it considers valuable from compromised networks before deploying the ransomware \u2013 including employee HR data, intellectual property, financial data, and customer information. This gives the group the leverage it needs to strengthen the extortion portion of the plot, relying on the threat of leaks to pressure victims into paying hefty ransoms. One of the tactics Clop and similar groups rely on most frequently for exfiltration is classified by MITRE as <a href=\"https:\/\/attack.mitre.org\/techniques\/T1567\/\">Exfiltration Over Web Service [T1567]<\/a>, which covers use of a variety of third-party tools such as megasync, rclone, Filezilla, or Windows Secure Copy. They also look at C2-based avenues of approach such as <a href=\"https:\/\/attack.mitre.org\/techniques\/T1219\/\">Remote Access Software [T1219]<\/a> and <a href=\"https:\/\/attack.mitre.org\/techniques\/T1105\/\">Ingress Tool Transfer [T1105]<\/a>. The example shown below provides insight into what types of information they [Clop] typically seek.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-04.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92588\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-04.png\" alt=\"Clop seeking exfiltration candidates\" width=\"640\" height=\"58\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-04.png 934w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-04.png?resize=300,27 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-04.png?resize=768,69 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Data Encrypted for Impact<\/p>\n<p>The primary focus of Clop ransomware is to encrypt files on the compromised systems, whatever the eventual outcome or demand on the attack target. It targets as many file types as possible, casting a large net. As we see below, a scheduled task is a convenient way for the threat actor to quickly deploy ransomware, in this case both <strong>dwm.exe<\/strong> and <strong>sysinfo.exe<\/strong>, across victim machines.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-05.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92589\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-05.png\" alt=\"Scheduled tasks created\" width=\"640\" height=\"304\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-05.png 976w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-05.png?resize=300,142 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/code-05.png?resize=768,364 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<h3>Victim Notification<\/h3>\n<p>As is typical with ransomware operators, after encrypting (and possibly exfiltrating) the files, Clop leaves a <strong>README.TXT<\/strong> ransom note on the compromised systems. This is (usually) where the price to decrypt the files is made known to the target \u2013 a distinctive choice, since ransomware gangs often prefer to disclose the price to victims once a private chat is established &#8212; as well as the instructions for how to provide the payment demanded. Meanwhile, the attackers leave their mark all across the network, changing the extensions of the encrypted files to <strong>.Clop<\/strong> (or <strong>.CIIp<\/strong> or <strong>.C_L_O_P<\/strong> or similar). The image below shows a typical Clop ransomware note.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/figure-1.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-92572\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/figure-1.png\" alt=\"A partially redacted ransom note received by a target of Clop ransomware\" width=\"480\" height=\"271\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/figure-1.png 480w, https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/figure-1.png?resize=300,169 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<p><em>Figure 1: A message nobody wants to see on their network. (Image credit: <\/em><a href=\"https:\/\/github.com\/threatlabz\/ransomware_notes\/blob\/main\/clop\/clop2.txt\"><em>https:\/\/github.com\/threatlabz\/ransomware_notes\/blob\/main\/clop\/clop2.txt<\/em><\/a><em>)<\/em><\/p>\n<p>Interestingly, there is variety in Clop\u2019s ransom-note style. An example from January 2023, sourced by PCRisk and replicated in an HHS <a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/clop-ransomware-analyst-note-tlpclear.pdf\">analysis<\/a> of the attacks, differs greatly from the Github sample above \u2013 no mention of publication, a time limit of two weeks for the target to contact Clop via email, and pressure to respond quickly \u2013 \u201cthe final price depends on how fast you write to us.\u201d \u00a0This final aspect \u2013 a deadline for initial contact \u2013 has been used in the MOVEit attacks.<\/p>\n<h3>Network Denial of Service<\/h3>\n<p>There have been some instances, generally in hacktivism-related cases, where the Clop gang will also look to overwhelm the target\u2019s network by DDoS, further impairing the targeted organization while they await payment. These hacktivism campaigns are not generally in line with Clop\u2019s usual targeting and goals, and appear to be mainly undertaken against nation-state entities in tandem with affiliates. The benefit to Clop of participating in such campaigns (money, loyalty, or something else) is unknown, as is the actual impetus for the attack \u2013 hacktivism or merely ransomware with extra pressure points. (That said, nation-state activity is apparently <em>not<\/em> always appealing to the group. In the MOVEit attack, the group issued a statement in mid-June <a href=\"https:\/\/www.cnn.com\/2023\/06\/16\/tech\/clop-ransomware-attack-explainer\/index.html\">telling<\/a> entities affected by the attack that \u201cIf you are a government, city or police service do not worry, we erased all your data. You do not need to contact us. We have no interest to expose such information.\u201d)<\/p>\n<p>Though these tactics make up the current Clop playbook, the group continues to evolve. This is what makes Clop so successful: The group has set methods of operation, but remains flexible in its ability to leverage additional techniques in order to demand more ransoms from a potentially vast list of targets.<\/p>\n<h2>Known Affiliations<\/h2>\n<p>The Clop ransomware gang is no stranger to collaboration during operations, including sharing resources and techniques. It has worked with a variety of allied groups in the cybercrime ecosystem including TA505 and FIN11 (to which, as mentioned above, Clop is \u201crelated\u201d; a recent FBI \/ CISA alert <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/cisa-and-fbi-release-advisory-cl0p-ransomware-gang-exploiting-moveit-vulnerability\">states<\/a> that Clop and TA505 are identical, though others <a href=\"https:\/\/www.esecurityplanet.com\/threats\/clop-moveit-vulnerability\/\">suggest<\/a> the three simply overlap or that FIN11 is a subset of TA505), as well as DarkSide and more recently FIN7. Some instances of collaboration have included <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/operation-cyclone-deals-blow-to-clop-ransomware-operation\/\">point-of-sale attacks<\/a> or plain old-fashioned exploitation. Clop\u2019s brand of cybercrime fits in well with that of other bad actors. As such, its ransomware is often utilized by other high-profile groups, and is occasionally offered for sale on RaaS (ransomware-as-a-service) sites. In some situations, there is no prior known affiliation, but an observable overlap in techniques. overlap in techniques.<\/p>\n<h2>But What Have You Done for Me Lately?<\/h2>\n<p>In April 2023 we <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/04\/27\/increased-exploitation-of-papercut-drawing-blood-around-the-internet\/\">observed<\/a> Clop exploiting vulnerable PaperCut servers, installing the same Truebot malware it used in the GoAnywhere attacks; Truebot is generally <a href=\"https:\/\/blog.talosintelligence.com\/breaking-the-silence-recent-truebot-activity\/\">linked<\/a> to the Silence Group. (PaperCut, from the company of the same name, is print-management software; GoAnywhere, from Fortra, does managed file transfer \u2013 as noted above, a noteworthy focus by the group.) This fits another pattern Sophos has seen with Clop over the past three years &#8212; leaning into known exploitation opportunities and seizing the initiative. The group relies on these opportunities for initial access and then pivots towards the next phase to retrieve the data it will eventually hold for ransom.<\/p>\n<p>On the other hand, it\u2019s possible that Clop\u2019s hand in MOVEit stretches back \u2013 way back \u2013 and involves sustained tech effort and refinement. Following this exact approach to emerging vulnerabilities, the Clop ransomware gang claimed that it was behind the MOVEit Transfer data theft attacks and that it had been exploiting the vulnerability since May 27, 2023 \u2013 the day that CVE-2023-34362 exploitation activity <a href=\"https:\/\/news.sophos.com\/en-us\/2023\/06\/05\/information-on-moveit-transfer-and-moveit-cloud-vulnerability-cve-2023-34362\/\">first turned up<\/a> in Sophos data, and four days before Progress disclosed the situation. But intriguingly, some reports hint that the group has been test-driving CVE-2023-34362 literally for years, perhaps <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-likely-testing-moveit-zero-day-since-2021\/\">as early as<\/a> July 2021. The group hasn\u2019t provided many details about the current operation\u2019s scale, but as recently as July 3, Sophos is not aware of any victims paying the ransom.<\/p>\n<h2>So how does this end?<\/h2>\n<p>With their current momentum and based on what we\u2019ve seen, Clop has a chance to continue to push the envelope in terms of scale and tactics employed, as long as its ransoms are being paid.<\/p>\n<p>Law enforcement agencies and cybersecurity organizations have actively pursued legal action against the Clop gang. Over the last few years, several members of the group have been arrested or indicted, leading to temporary disruptions in its operations. However, this appears to have done little to slow the group\u2019s momentum. Based on its history, it appears that Clop will likely continue to leverage vulnerabilities (patched and unpatched) and joint operations to expand its footprint. The group\u2019s output indicates no current diminution in its staffing, skills, or ambition.<\/p>\n<h2>Mitigation Recommendations<\/h2>\n<p>Organizations are advised to take the following actions when looking to prevent Clop ransomware and similar attacks:<\/p>\n<ol>\n<li>Regularly patch and update software and applications to their latest versions, and perform vulnerability assessments periodically.\n<ol>\n<li>Be mindful that pirated software can also lead to an increased probability of infection of your devices, since these are frequently used to spread malware.<\/li>\n<\/ol>\n<\/li>\n<li>Conduct an inventory of assets and data.\n<ol>\n<li>Focus on identifying authorized and unauthorized devices and software.<\/li>\n<\/ol>\n<\/li>\n<li>Stay aware of lateral movements.\n<ol>\n<li>Once attackers are inside your organization, they will try to move through the network infecting as many endpoints as they can. You can stop them more effectively by having visibility to spot this anomalous behavior. Analyzing netflows is usually the easiest way.<\/li>\n<\/ol>\n<\/li>\n<li>Provide admin privileges and access only when necessary, establishing a software allow list that only executes legitimate applications.<\/li>\n<\/ol>\n<p>Sophos\u2019 Intercept X provides multiple layers of detection against the components and techniques used by Clop, including understanding of the relevant C2 frameworks and of the lateral movement seen with Clop-related attack attempts.<\/p>\n<p>These recommendations should serve as a sounding board for actions that need to take place, in an effort to protect against Clop as well as other ransomware types. They will help to decrease the likelihood of exposure to malware and intrusion, and can help to protect your assets. By developing a consistent approach to security and awareness, while encouraging those within your organization to do the same, you are building an effective culture of operational security.<\/p>\n<h2>Acknowledgements<\/h2>\n<p>Sophos\u2019 Mark Parsons, Colin Cowie, Benjamin Sollman, Morgan Demboski, and Paul Jaramillo contributed to this post.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/07\/10\/clop-at-the-top\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/07\/shutterstock_1031701831.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Mon, 10 Jul 2023 17:06:58 +0000<\/strong><\/p>\n<p>Halfway through 2023, the threat landscape is dominated by one loud, adaptable, persistent player<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[25304,129,28150,28588,29502,29216,3765,28099,16771],"class_list":["post-22417","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-clop","tag-featured","tag-fin11","tag-goanywhere","tag-moveit","tag-papercut","tag-ransomware","tag-ta505","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22417"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22417\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}