
The CL0P ransomware group appears to be targeting internet-facing Gladinet CentreStack file servers in its latest extortion campaign.
The Curated Intelligence project said in a LinkedIn
post that incident responders from its community βhave encountered a new CLOP extortion campaign targeting Internet-facing CentreStack file servers.β
Cyble said in a note to clients today that CL0P appears to be readying its dark web data leak site (DLS) for a new wave of victims following its exploitation of
Oracle E-Business Suite vulnerabilities that netted more than 100 victims.
βMonitoring of Cl0p's DLS indicates recent archiving and grouping of all previously listed victims associated with Oracle E-Business Suite exploitation under different folders, a move that strongly suggests preparation for a new wave of
data leak publications,β Cyble said. βThis restructuring activity is assessed to be linked to the ongoing exploitation of Gladinet CentreStack, with Cl0p likely staging victims for coordinated disclosure similar to its prior mass-extortion campaigns. No victim samples or deadlines related to the CentreStack victims have been published yet.β
CL0P May Be Targeting Gladinet CentreStack Vulnerabilities
Itβs not clear if the CL0P campaign is exploiting a known or zero-day vulnerability, but in a comment on the LinkedIn post, Curated Intelligence said that an October Huntress
report is βLikely related.β
That report focused on
CVE-2025-11371, a Files or Directories Accessible to External Parties vulnerability in Gladinet CentreStack and TrioFox that was added to CISAβs Known Exploited Vulnerabilities (KEV) catalog on Nov. 4.
In a Dec. 10 report, Huntress
noted that threat actors were also targeting
CVE-2025-30406, a Gladinet CentreStack Use of Hard-coded Cryptographic Key vulnerability, and
CVE-2025-14611, a Gladinet CentreStack and Triofox Hard Coded Cryptographic vulnerability. CVE-2025-30406 was added to the CISA KEV catalog in April, and CVE-2025-14611 was added to the KEV database on Dec. 15.
In a Dec. 18 update to that post, Huntress noted the Curated Intelligence findings and said, βAt present, we cannot say definitively that this is exploitation by the cl0p
ransomware gang, but considering the timing of this reporting, we felt it was prudent to share this recent threat intel.β
The latest release on Gladinet's CentreStack website as of December 8 is version 16.12.10420.56791, Huntress noted. βWe recommend that potentially impacted Gladinet customers update to this latest version immediately and ensure that the machineKey is rotated,β the blog post said.
Curated Intelligence noted that recent port scan data shows more than 200 unique IPs running the βCentreStack - Loginβ HTTP Title, βmaking them potential targets of CLOP who is exploiting an unknown CVE (n-day or zero-day) in these systems.β
CL0Pβs History of File Transfer Attacks
Curated Intelligence noted that CL0P has a long history of targeting file sharing and transfer services.
βThis is yet another similar data extortion campaign by this adversary,β the project said. βCLOP is well-known for targeting file transfer servers such as Oracle EBS, Cleo FTP,
MOVEit, CrushFTP, SolarWinds Serv-U, PaperCut,
GoAnywhere, among others.β
CL0Pβs exploitation of Cleo MFT vulnerabilities led to aΒ
record number of ransomware attacksΒ earlier this year, and CL0P has also successfully exploited Accellion FTA vulnerabilities.
The groupβs ability to successfully exploit
vulnerabilities at scale has made it a top five ransomware group over its six-year-history (image below from Cyble).
[caption id="attachment_107950" align="aligncenter" width="1200"]

CL0P is a top five
ransomware group over its six-year history (Cyble)[/caption]