This content is viewable by Everyone

Jan 2026: NEW Cl0p EXTORTION THREAT

Extortion Lure Red Flags

Threat Alert: NEW Cl0p EXTORTION THREAT

  • The Cl0p threat actor group routinely uses extortion-style messages to extract funds, typically in the form of cryptocurrency, from recipients.
  • The messages can be both fictitious and reflect real-world events, complicating organizational response.

How is it used in the wild?

  • The Cl0p group has infamously engaged in the exploitation of new or zero-day vulnerabilities to exfiltrate sensitive data, then extorted victims to prevent their disclosure.
  • This campaign claims to originate from Cl0p, purporting to have exploited the organization Gladinet’s CentreStack software.
  • Messages threaten to post stolen files on the group’s data leak site (DLS), directing recipients to contact them via support@pubstorm[.]com and support@pubstorm[.]net (likely actor-controlled addresses) to negotiate payment.

Key Action: Stay Alert!

  • Follow proper payment processes.
  • Report ANY suspicious emails via Phish Alarm.