Clop Ransomware Detection: Threat Research Release, April 2021

Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.

Clop Ransomware has been active since 2019 and has been mostly associated with financially-driven criminal groups. However, lately this ransomware payload has been observed in campaigns against universities and other institutions in the education vertical. Most recently, Clop Ransomware has been used in a cyberattack that demanded one of the highest ransom amounts in recorded history ($20 million), and one of the particular items associated with the actors behind the Clop Ransomware is blackmailing their victims through threatening to publish sensitive information exfiltrated from victims’ networks. Within this past month in April, we saw that Clop Ransomware-related threats were persistent throughout the distinct variants used by several groups of organized criminals and decided to focus our research efforts on Clop Ransomware detections. We hope that these detections will help organizations detect abnormal behavior faster before it becomes detrimental. Watch this video to learn more.

Detection Searches for Clop Ransomware

As we state in our blog, "Detecting Clop Ransomware," the actors behind this crimeware send the malicious payloads via different methods, such as phishing emails, then proceed to spread ransomware payload post-exploitation by pivoting to exposed or related vulnerable systems. Although the actual developers of this crimeware have not been identified yet, they have been tied to several financially-driven threat actors. They are also known for leveraging public available vulnerabilities as entry and post-exploitation vectors.

The most common method behind this crimeware is as follows: once they have infiltrated their targets, they then present instructions on how to pay ransom and communicate further threats of exposure by publishing the sensitive information they obtained on a publicly accessible website.

Source *

Although this may appear as a new modality, in reality ransomware is usually the cherry on top of the cake, as malicious actors usually dwell, exfiltrate and qualify exfiltrated data, which eventually lands on dark web public forums, dark markets or private crime intelligence brokers where qualified financial, business and kompromat information is then priced and sold to the highest bidder.

We used our attack range tool to demonstrate and research how this malware payload infects and spreads once executed. A number of new searches has been created to address this threat:

Name
Technique ID
Tactic(s)
Note
Suspicious Wevtutil Usage
T1070.001
Defense Evasion
This search wevtutil.exe with parameters for clearing the application, security, setup,or system event logs.
Windows Event Log Cleared
T1070.001
Defense Evasion
This search looks for windows events that indicate one of the windows event logs has been purged
Common Ransomware Notes
Impact
This search looks for files created with names matching those typically used in ransomware notes
Deleting Shadow Copies
T1490
Impact
This search looks for vssadmin.exe used to delete shadow copies
Common Ransomware Extensions (New)
T1485
Impact
This search looks for file modifications with extensions commonly used by Ransomware
High Frequency of File Deletion (New)
T1485
Impact
Detects high frequency of file deletion relative to process name and id.
Clop Common Exec Parameter (New)
T1204
Execution
Detects Clop ransomware variant via execution arguments.
Process Deleting Its Process File Path (New)
T1070.001
Defense Evasion
Detects suspicious process attempting to delete file path related to its process
Resize ShadowStorage Volume (New)
T1490
Impact
Detects the resizing of shadowstorage
Clop Ransomware Known Service Name (New)
T1543
Persistence, Privilege Escalation
Identifies common service name created by Clop ransomware
Suspicious Service File Path Creation (New)
T1569
Execution
Detects creation of “user mode service” where path is located in an uncommon service folder.
Clop High Frequency Process Termination (New)
T1486
Impact
Identifies high frequency of process termination.
Ransomware Notes Bulk Creation (New)
T1486
Impact
Identifies creation of large number of ransomware notes

Please see our blog "Detecting Clop Ransomware" for specific information about the events and SPL code involved in these detections. We also provide information about a Splunk Phantom playbook that can be used to defend against this threat.

Why Should You Care?

Having the paid ransom amounts in recorded history ($20 million) and the fact that the Clop Ransomware actors are extremely opportunistic makes this a specially worrisome actor. The actors behind this crimeware are constantly looking for vulnerable targets, and once they are able to infiltrate victims, they are driven by obtaining sensitive information which most likely will end up sold in a dark market.

Ransomware campaigns involving this payload will continue, as this group continuously targets different verticals it is important to prepare and understand the workings of these malicious payloads and prepare your environment in order to defend and be resilient against a ransomware attack. You can use our pre-packaged detections to help your organization stay safe against these types of attacks.

For a full list of security content, check out the release notes on Splunk Docs:

Learn More

You can find the latest content about security analytic stories on GitHub and in Splunkbase. All of these detections are also now available via push update in Splunk Security Essentials.

Feedback

Any feedback or requests? Feel free to submitput in an i Issue on Github and we’ll follow up. You can also join us on the Slack channel #security-research. Follow these instructions If you need an invitation to our Splunk user groups on Slack.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.