The Clop ransomware gang claims to be behind recent attacks that exploited a zero-day vulnerability in the GoAnywhere MFT secure file transfer tool, saying they stole data from over 130 organizations.
The security flaw, now tracked as , enables attackers to gain remote code execution on unpatched GoAnywhere MFT instances with their administrative console exposed to Internet access.
Clop reached out to BleepingComputer and told us that they had allegedly stolen the data over the course of ten days after breaching servers vulnerable to exploits targeting this bug.
They also claimed that they could move laterally through their victims’ networks and deploy ransomware payloads to encrypt their systems but decided against it and only stole the documents stored on the compromised GoAnywhere MFT servers.
The gang refused to provide proof or share additional details regarding their claims when BleepingComputer asked them when the attacks began, if they’d already started extorting their victims, and what ransoms they were asking for.
BleepingComputer could not independently confirm Clop’s claims, and Fortra has not replied to emails asking for more info regarding CVE-2023-0669 exploitation and the ransomware group’s allegations.
However, Huntress Threat Intelligence Manager Joe Slowik , a threat group known for deploying Clop ransomware in the past, while investigating an attack where the TrueBot malware downloader was deployed.
“While links are not authoritative, analysis of Truebot activity and deployment mechanisms indicate links to a group referred to as TA505. Distributors of a ransomware family referred to as Clop, reporting from various entities links Silence/Truebot activity to TA505 operations,” Slowik said.
“Based on observed actions and previous reporting, we can conclude with moderate confidence that the activity Huntress observed was intended to deploy ransomware, with potentially additional opportunistic exploitation of GoAnywhere MFT taking place for the same purpose.”
Actively exploited flaw in secure file transfer tool
GoAnywhere MFT’s developer Fortra (formerly known as HelpSystems) to its customers last week that the vulnerability was being exploited as a zero-day in the wild.
On Monday, a proof-of-concept exploit , allowing unauthenticated remote code execution on vulnerable servers.
The company issued the next day to allow customers to secure their servers from incoming attack attempts.
Since then, Fortra has published another update on its support website (accessible only after logging in with a user account) on Thursday, saying that some of its MFTaaS instances were also breached in the attacks.
“We have determined that an unauthorized party accessed the systems via a previously unknown exploit and created unauthorized user accounts,” Fortra said.
“As part of our actions to address this and out of an abundance of caution, we have implemented a temporary service outage. Service continues to be restored on a customer-by-customer basis as mitigation is applied and verified within each environment.
“We are working directly with customers to assess their individual potential impact, apply mitigations, and restore systems.”
CISA also the CVE-2023-0669 GoAnywhere MFT vulnerability to its on Friday, ordering federal agencies to patch their systems within the next three weeks, until March 3rd.
While Shodan shows that are exposed online, only 135 are on ports 8000 and 8001 (the ones used by the vulnerable admin console).

Clop’s Accellion extortion attacks
Clop’s alleged use of the GoAnywhere MFT zero-day to steal data is a very similar tactic to the one they used in December 2020, when they discovered and to steal the data of approximately 100 companies.
At the time, companies were receiving emails demanding $10 million ransom payments to avoid having their data publicly leaked.
In the 2020 Accellion attacks, Clop’s operators stole large amounts of data from high-profile companies using Accellion’s legacy File Transfer Appliance (FTA).
Organizations that had their servers hacked by Clop include, among others, , , , and multiple universities worldwide (e.g., , , University of Miami, University of Maryland Baltimore (UMB), and the University of California).
In June 2021, some of Clop’s infrastructure was shut down following an international law enforcement operation codenamed Operation Cyclone when six money launderers who provided services to the Clop ransomware gang were
The gang has also been linked to ransomware attacks worldwide . Some victims that had their servers encrypted by Clop include , , , and .
Update February 10, 15:25 EST: Added a section showing that Huntress made a between GoAnywhere MFT attacks and threat actors known for deploying Clop ransomware.