The Cl0p (also known as Clop) ransomware group is a financially motivated cybercriminal organization that emerged in March 2020, operating as part of the broader TA505/FIN11 threat landscape and conducting high-impact ransomware campaigns targeting organizations globally. The group is believed to operate from Russian-speaking territories and has been linked to the prolific TA505 cybercriminal consortium, functioning as a Ransomware-as-a-Service operation that collaborates with various affiliate groups to maximize their operational reach. Cl0p primarily gains initial access through exploitation of zero-day vulnerabilities in file transfer applications, phishing campaigns, and SQL injection attacks, employing double extortion tactics by exfiltrating sensitive data before deploying their custom ransomware payload, which uses strong encryption algorithms to render victim systems inoperable. The group has been responsible for several high-profile campaigns, most notably their exploitation of zero-day vulnerabilities in MOVEit Transfer software in 2023, which affected hundreds of organizations worldwide including major corporations and government entities, and their previous campaigns targeting Accellion FTA and other file transfer solutions that resulted in the compromise of sensitive data from numerous high-value targets. Cl0p remains active as of 2024, continuing to evolve their tactics and maintain their position as one of the most prolific ransomware groups globally, with over 1,490 documented victims primarily concentrated in the United States, Canada, United Kingdom, Germany, and Australia across technology, manufacturing, transportation, and consumer services sectors. The group has been linked to 1,490 public disclosures across our corpus. First observed on a leak site on March 13, 2020; most recent post February 14, 2026. The operation is currently active.
Also tracked as: Clop, TA505, FIN11.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, TRJLTD.CO.UK is reported in United Kingdom, a country with 902 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.