lockbit2 attacks Clozdloop

Incident Date:

June 2, 2022

World map

Overview

Title

lockbit2 attacks Clozdloop

Victim

Clozdloop

Attacker

Lockbit2

Location

Delften, Belgium

Malle, Belgium

First Reported

June 2, 2022

Clozdloop Suffers Ransomware Attack by Lockbit2

Company Overview

Clozdloop is a company that helps businesses gain control over their sustainability processes. They make it easy for companies to take back, recover, and reuse their high-value products, preventing them from ending up in landfills or being used in someone else's assembly line. The company is well-positioned within the circular economy and has merged with O F Packaging to form the Close the Loop Group.

Vulnerabilities and Exploits

The Lockbit2 ransomware group exploited a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software's managed file Internet-facing MOVEit Transfer web applications. This vulnerability allowed the attackers to install a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases.

Impact and Mitigation

The attack by Lockbit2 has resulted in the exfiltration of data from the GoAnywhere MFT platform, impacting approximately 130 victims. To mitigate such attacks, organizations are advised to take an inventory of their assets and data, grant admin privileges and access only when necessary, monitor network ports, protocols, and services, and regularly patch and update software and applications to their latest versions.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.