Mapping the activities and techniques of the CL0P ransomware gang to the MITRE ATT&CK framework

Adam Rhys Heaton
2 min readJul 6, 2023

--

Mapping the activities and techniques of the CL0P ransomware gang to the MITRE ATT&CK framework would provide a comprehensive understanding of their modus operandi. Here is how CL0P’s tactics align with relevant ATT&CK techniques:

Initial Access:

  1. Phishing: CL0P employs phishing techniques to deliver malicious emails containing weaponized attachments or links.
  2. External Remote Services (T1133): CL0P targets vulnerable external services, such as RDP, to gain initial access to victim networks.

Execution:

  1. PowerShell (T1059.001): CL0P utilizes PowerShell scripts for various activities, including downloading additional payloads and executing commands.
  2. Scheduled Task (T1053.005): CL0P may create scheduled tasks to establish persistence and ensure the ransomware is deployed at specific intervals.

Persistence:

  1. Service Registry Permissions Weakness (T1058.003): CL0P exploits weak permissions on Windows service registry keys to maintain persistence.
  2. BITS Jobs (T1197): CL0P may abuse Background Intelligent Transfer Service (BITS) to persistently download and execute payloads.

Defense Evasion:

  1. File Deletion (T1107): CL0P deletes logs, backups, and shadow copies to hinder recovery efforts and prevent forensic analysis.
  2. Disable or Modify Tools (T1562): CL0P may disable or modify security tools and endpoint protection to evade detection during operations.

Credential Access:

  1. Credential Dumping (T1003): CL0P employs tools like Mimikatz to extract credentials from compromised systems, enabling lateral movement and escalation of privileges.

Discovery:

  1. System Information Discovery (T1082): CL0P gathers system information, such as network configuration and installed software, to facilitate lateral movement and target valuable assets.
  2. Account Discovery (T1087): CL0P enumerates domain accounts and identifies privileged accounts for lateral movement and ransomware deployment.

Lateral Movement:

  1. Remote Desktop Protocol (T1076.001): CL0P uses compromised RDP credentials or exploits weak RDP configurations to move laterally across the network.
  2. Pass the Hash (T1075.002): CL0P leverages pass-the-hash techniques to escalate privileges and move laterally using stolen credentials.

Collection:

  1. Data Encrypted for Impact (T1486): CL0P encrypts targeted files and systems to maximize the impact on victim organizations.
  2. Data Destruction (T1485): CL0P may delete or overwrite files on compromised systems to enforce ransom demands and hinder recovery efforts.

Impact:

  1. Data Encrypted for Impact (T1486): CL0P encrypts files and demands ransom payment for decryption, disrupting operations and causing financial losses.
  2. Exfiltration over Command and Control Channel (T1041): CL0P exfiltrates sensitive data before encryption and threatens to publicly release it if ransom demands are not met.

This mapping to the MITRE ATT&CK framework provides a clear understanding of CL0P’s activities, tactics, and techniques throughout the cyber kill chain. By identifying these techniques, organizations can better defend against CL0P attacks and prioritize mitigation efforts to strengthen their security posture.

--

--

Adam Rhys Heaton

Cybersecurity expert 🛡️ Penetration testing 🔎 Cyber Threat Intel 🚨 Educating on best practices 📚 Speaker 🗣️ Follow my blog for all things security 🛡️