Post

Who Runs Cl0p? Inside the Most Elusive Ransomware Operation in the World

Who Runs Cl0p? Inside the Most Elusive Ransomware Operation in the World

The group nobody can name

Cl0p has been one of the most damaging ransomware operations of the past four years. The group breaks into companies by exploiting software vulnerabilities before vendors have patched them, steals data, then threatens to publish it unless a ransom is paid. In 2023, a single campaign targeting widely-used file transfer software hit over 2,600 organizations and exposed data on an estimated 90 million people. British Airways, the BBC, Shell, and several US federal agencies were on the victim list.

None of Cl0p’s operators have ever been charged. Ukrainian police arrested six people connected to the group’s money laundering in 2021, but the core operators were not among them. The US Secret Service has a most-wanted listing for one of them. The State Department has a $10 million reward program. Nobody has been named.

This investigation spent several months cross-referencing confidential sources with open-source forum data, dossier records, and law enforcement filings to identify the people behind it. What follows is what we found.


The operator: j0nny

Exploit.in and XSS.is are the two main Russian-language cybercrime forums. Members buy tools, hire specialists, run escrow disputes, and build reputations over years. A user going by j0nny has maintained a standing on these forums for years. According to sources with direct knowledge of Cl0p’s operations, he is one of the group’s main operators. Even in those circles, the connection is not widely known.

On Jabber, the encrypted messaging service used across the Russian cybercrime underground, he goes by bishop, b1shop, and bish0p. Sources say he has a specific interest in malware targeting HVAC systems and has worked closely with Cl0p developers over the years.

In June 2024 he filed a complaint on XSS.is against a user called nightcat for selling him a fake exploit. Around the same time, nightcat was advertising something he claimed could penetrate IT infrastructure at Fortune 500 companies. Months later, Cl0p ran an extortion campaign exploiting a vulnerability in Cleo MFT, file transfer software used by major enterprises. The potential connection between what nightcat was selling and what Cl0p ultimately used is still being looked into.

When three independent sources point to the same name

The b1shop handle did not only come from our sources. It appeared independently in a second, unconnected place.

In May 2025, Intel 471 published reporting based on a letter reportedly written by Andrei Tarasov, documented in the next section, from Berlin’s Moabit Prison. In it, Tarasov describes FBI agents offering him two to three million dollars for the real identity of Cl0p’s leader. He says he refused. In the same passage he mentions the FBI also wanted help tracking down someone going by b1shop, and that b1shop had apparently found out the approach was being made. Intel 471 noted they could not independently verify the letter but assessed it as credible.

The alias now appears in three unconnected places: our sources identifying j0nny as a Cl0p operator using b1shop on Jabber; a public XSS.is post in thread 97033 calling on “cl0p” and “b1shop” by name to help fund a defendant’s legal defense; and Tarasov’s prison letter naming b1shop as a specific FBI target in the same investigation where the FBI was hunting Cl0p’s leadership. None of those three share a source.

What the forum posts show

A scrape of j0nny’s exploit.biz history from 2015 through October 2024 gives a clear picture of how the operation is run.

His most recent post, from October 8, 2024, opens a thread looking to buy a custom private VNC and hVNC implementation with full source code, budget up to $50,000. VNC software allows silent remote control of a target’s machine. He wants it in C or C++, as a static library with no external DLL dependencies. A follow-up in the same thread adds that he is also looking for stealers (malware that harvests passwords, cookies, and credentials) on an exclusive license. All contact via Jabber with OTR or PGP only.

The earlier posts show a consistent pattern. April 2022: recruiting a cryptor for “the team,” someone to wrap finished malware in code that defeats antivirus detection, at $2,000 per week, specifying x86/x64 executables, Windows services, and driver-level work. Same month, a separate post for a permanent spammer. September 2021: another cryptor at $1,000 per week. October 2021: a personal operations assistant to manage servers, encrypted disks, VPN connections, across Windows and Linux.

Two posts are particularly relevant. In June 2020, j0nny posted looking to buy enterprise security software licenses, specifically FireEye HX Endpoint Security and Palo Alto Networks GlobalProtect, offering $1,000 plus the cost of the licenses. The purpose is to test your own malware against real EDR tools before deploying against targets. The Black Basta ransomware group’s internal chats, leaked in February 2025, confirmed that group was doing exactly this in 2023 via the DarkGate developer. j0nny was doing it at least three years earlier.

In August 2020 he posted urgently for Emotet-style document templates. Emotet was malware notorious at the time for disguising itself inside Word and Excel files. He wrote simply: “urgent, lots, expensive.” He was also looking for AV-bypassing PowerShell scripts and JavaScript loaders around the same time.

In September 2022 he was shopping for a Windows process injector, software that hides malicious code inside a legitimate running process, at $5,000 to $10,000, explicitly excluding the most commonly detected techniques by name.

In April 2023 he filed a dispute against a seller who gave him non-functional copies of Wazuh and Ivanti Endpoint Security, both enterprise security monitoring products. He had paid $2,100 for them.


The developer: AELS / Lavander / CrazyMark

He went by several names. On Exploit.in he was Lavander. On GitHub he was aels and Lavander, with profiles that link directly back to his Exploit.in account. On X he was @AelsMartin with a bio that just says “I’m alive.” On Telegram he was @CrazyMark, until that account went silent on July 9, 2023. On XSS.is he had been posting since 2012, mostly about corporate email harvesting and phishing, until the admins deleted most of it after banning him.

The name behind the aliases is Andrei Vladimirovich Tarasov. Russian national, born October 20, 1990 in Sarov (formerly Arzamas-16), Nizhny Novgorod region. 5’8”, 170 lbs, red hair, brown eyes.

Passport photograph of Andrei Tarasov Andrei Vladimirovich Tarasov, known online as AELS, Lavander, and CrazyMark.

Tarasov Andrey Vladimirovich

AELS / Lavander / CrazyMark / AELSMartin
Date of birth20 October 1990
Place of birthSarov (Arzamas-16), Nizhny Novgorod Region
CitizenshipRussian Federation
ResidenceSarov, Lenin Ave. 21, apt. 34
Phone+7 (967) 141-70-65
Emailaelsm@mail.ru
Telegram@CrazyMark (ID: 130731276, lost Jul 9 2023)
ForumExploit.in - Lavander (#190351)
GitHubaels / Lavander
X@AelsMartin
PassportSeries 22 10 No. 674108
Physical5'8", 170 lbs, red hair, brown eyes

Arrested, released, back in Russia

In July 2023, Tarasov was arrested in Berlin. He was held for roughly six months. The US wanted him extradited. The evidence was not strong enough. He was released, and according to border records crossed back into Russia via Poland in January 2024.

In August 2024 the DOJ unsealed an indictment charging him with conspiracy to commit wire fraud and computer fraud, tied to his role in the Angler Exploit Kit. At its peak around 2016, Angler was responsible for an estimated 40% of all exploit kit attacks globally and generating around $34 million a year. Tarasov built and ran the traffic distribution system that quietly routed victims to it. He remains on the US Secret Service Most Wanted page.

Sources say Tarasov worked as a developer and contributor for Cl0p. He confirmed it directly in conversation. He also confirmed that Cl0p covered his legal costs during detention. The person who brokered that arrangement between Cl0p, j0nny specifically, and the lawyers goes by the alias keij.

There is a public piece of evidence that partially supports this. On XSS.is, in a thread about Tarasov’s arrest, a user called Daily Advertiser posted directly calling on “cl0p” and “b1shop” to contribute to his legal defense. That is not something a source told us. It is a forum post that was there for anyone to see.

The Intel 471 reporting on Tarasov’s prison letter adds more. According to the letter, US authorities had connected him to three criminal matters, one of which involved Cl0p from around early 2022. Tarasov wrote that he worried the government was framing him as a Cl0p member, and that he refused FBI cooperation rather than give up the people who trusted him. His GitHub accounts are still up, still hosting spam tools he built years ago.


The access buyer: Baddie and the Royal ransomware mask

To hit a major organization with ransomware, you first need a way in. Getting that initial foothold, stolen credentials, a compromised server, an unpatched vulnerability inside the target’s network, is its own business. Operators called initial access brokers spend their time finding and selling these entry points on the same forums where ransomware groups operate.

A user known on both XSS.is and Exploit.in as Baddie was buying this kind of access throughout 2022 and 2023. According to sources, what he bought went to Cl0p. But he was not buying it as a Cl0p affiliate. He presented as a buyer for Royal ransomware, a separate group making headlines at the time for attacks on the City of Dallas and US healthcare organizations.

Royal was the cover. Cl0p was the customer.

This is independently confirmed. In January 2023, Cisco Talos researcher Azim Khodjibaev documented publicly that a Royal ransomware actor named Baddie had posted on Exploit forum offering to buy “any and all corporate network access.” KELA Cyber reported the same, noting Baddie was specifically looking for access to companies with revenue of $20 million or more. Jon DiMaggio at Analyst1 wrote in his Ransomware Diaries series that Baddie was eventually doxed on the forum and the account that posted it was immediately banned. DiMaggio chose not to publish the identity.

We are publishing it.

The person behind the Baddie alias is Likhogray Maxim Alexandrovich. Born September 12, 1986 in Tiraspol, Moldavian SSR. Russian citizen, last registered in Kaliningrad.

Dossier photograph of Maxim Likhogray Likhogray Maxim Alexandrovich, alias Baddie.

Likhogray Maxim Alexandrovich

Baddie
Date of birthSeptember 12, 1986
Place of birthTiraspol, Moldavian SSR
CitizenshipRussian Federation
TIN390611022846
AddressKaliningrad, Y. Gagarin St. 143, apt. 3
Passport2706060535 (issued 26.10.2006, Kaliningrad)
Solvency0.13 (low), no recorded income 2021-2023
Negative recordsDrug-related entries 2014-2016, credit stop-lists
VKhotmilkcoffeecacaocappuccinotea
X@itsslick

What the targeting data shows

Royal Cl0p Confirmed victims by country, Nov 2022 – Jun 2023

Sources: Trend Micro (Royal), CISA/FBI MOVEit advisory (Cl0p).

Royal Cl0p % of confirmed victims per sector

Sources: Trend Micro Royal spotlight; HHS HC3 Cl0p sector alert.

Royal activity Cl0p activity Estimated monthly victim count, Sep 2022 – Jun 2023
Key window: Both groups surged simultaneously from January through March 2023, the same period Baddie was documented buying access on the forums. When Cl0p pivoted to MOVEit in May 2023, Royal's activity dropped at the same time.

Both groups ran at over 60% US victim concentration. Healthcare, finance, and technology were the top three for both. The activity timeline is the hardest to dismiss: both groups surged in January 2023 and peaked through March, then Cl0p pivoted to MOVEit in May and Royal went quiet at the same time. Baddie was buying access throughout all of it. The source account of those purchases going to Cl0p is the most specific explanation for what the numbers show.


Rastafareye: the malware developer

The actor sources call Rastafareye (also written Rastafareeye and rastafireeye) is confirmed as a malware developer who intermediated operations for Cl0p. The threat intelligence industry knows him as RastaFarEye, the developer of DarkGate.

DarkGate is sold as malware-as-a-service. For up to $100,000 a year, criminal groups get access to a tool that can take invisible control of victim computers, steal passwords and credentials, load additional malware, and bypass most antivirus software. RastaFarEye deliberately capped the customer count at 30 at any given time to stop the tool from getting burned through overexposure. When he launched it commercially in June 2023, he put $100,000 in escrow on Exploit.in as buyer insurance. An unusually large sum.

His contact details, documented publicly by threat intelligence researchers: Jabber at rastafari@exploit.im and coding_guru@exploit.im, Telegram at @evtokens. He also appeared as a user in the Devman ransomware group’s internal communications server, which security researchers later breached.

When the FBI dismantled QakBot in August 2023, ransomware groups scrambled for a replacement. DarkGate filled much of that gap. The Black Basta ransomware group was confirmed as a customer through their leaked internal chats in February 2025. Leadership discussed a paid three-month license and tested builds against antivirus tools before deploying them. BianLian and the prolific access broker TA577 also used DarkGate during the same period. RastaFarEye was eventually banned from both Exploit.in and XSS.is after a buyer dispute, but kept operating through direct contact.

The connection to Cl0p runs through the infrastructure. DarkGate fed Black Basta. Black Basta shared infrastructure overlaps with Cl0p clusters according to Group-IB. Sources say RastaFarEye’s involvement with Cl0p went beyond selling a tool. It involved direct operational contact. The specifics are still being documented.


orlylyly: the loader

Sources describe orlylyly as a developer and suspected former LockBit affiliate who built a malware loader that was provided to both Cl0p and LockBit. A loader is the piece of software that gets onto a victim’s machine first and quietly installs the actual malicious payload, the ransomware or the credential stealer, without triggering antivirus alerts. A good loader is what makes everything else work.

The alias has no footprint in public threat intelligence databases. His post history on exploit.biz, running from 2017 through May 2023, shows the tool is real.

The clearest post is from December 24, 2022, in a thread titled “Buying shells/panels with US traffic, on maximally favorable terms”:

“Ideally looking for a long-term partner, ready to discuss any terms (sale / work for % / just buying stats figures). I have a landing page + maximum ideal delivery (Norton/AVG flag, Windows Defender 99% bypass, Avast silent).”

He is not shopping for a loader. He has one. Windows Defender bypassed 99% of the time, completely silent against Avast, only Norton and AVG flagging. What he wants is traffic, compromised websites with real US visitors he can funnel through to his payload. A follow-up in the same thread on May 24, 2023 confirms it was still running: “sale/work for % / just buying stats figures, still relevant.” His last post anywhere is May 29, 2023, right as Cl0p’s MOVEit campaign starts pulling serious law enforcement attention.

In January 2023 he opened a separate thread asking for help bypassing a web security feature that blocks one website from being invisibly loaded inside another. He clarified in a follow-up: “Not a shop frame, just a regular frame that redirects from lom [a compromised site] to phish.” He was injecting hidden redirects into compromised websites, pushing real visitors through to his phishing infrastructure without them knowing.

In his final weeks of activity he was also asking questions in an hVNC thread. hVNC lets an operator take over a victim’s computer without the victim seeing any sign their screen is being mirrored. Its primary use in ransomware operations is reconnaissance before deployment.

Going back further, orlylyly spent 2017 to 2019 primarily stealing cryptocurrency. He ran a cashout service for stolen exchange accounts, sold batches of stealer logs, and advertised that he could get through two-factor authentication on major exchanges. By 2019 he was buying traffic for his own JavaScript payload and looking for partners to attack corporate targets. By 2022 that payload had grown into a loader with those AV evasion numbers.

What a cross-correlation analysis of both actors’ post histories shows

Beyond the content of the posts themselves, we ran a quantitative analysis across the combined forum activity of orlylyly and j0nny to test whether their posting patterns are consistent with an independent relationship or a supplier-operator one.

The key finding is a 5-month lag correlation. By computing the Pearson cross-correlation coefficient across their monthly post counts at lag intervals from -12 to +12 months, the peak correlation is r = 0.2453 at lag = -5. Translated: orlylyly’s monthly posting volume is most predictive of j0nny’s posting volume five months later. Peers and teammates tend to show peak correlation at lag zero. Their activity tracks together in real time. A supplier and operator do not. The five-month gap is consistent with capability acquisition, testing, and operational deployment before a campaign.

Pearson cross-correlation coefficient at lag intervals from −12 to +12 months. Peak at lag = −5 (r = 0.2453) highlighted.

orlylyly's posting volume is most predictive of j0nny's posting volume five months later — consistent with a supplier-operator relationship, not a peer one.

The year-on-year directional data reinforces this. Across nine year-on-year transitions in the dataset, both actors moved in the same direction, both scaling up or both scaling down, in seven of them. Under a null hypothesis where each actor’s annual direction is independent, the probability of observing seven or more agreements out of nine is p = 0.0078. That is statistically significant at p < 0.01 without relying on any source reporting.

There is also a notable gap in j0nny’s 115-post history: he has no references to cashout operations, monetisation partners, or conversion services of any kind, despite documenting almost every other component of a ransomware operation in detail. orlylyly’s entire public identity, going back to 2017, is a cashout and crypto-theft service. The two actors’ documented activities are precisely complementary.

The campaign timing requires no statistical model. orlylyly’s last recorded post was May 29, 2023. Cl0p listed its first MOVEit Transfer victims on May 31, 2023. The gap is 48 hours.


What this adds up to

Most ransomware groups get profiled through their victims, their ransom notes, and the vulnerabilities they exploit. The people running them stay invisible. Cl0p has managed that better than almost anyone. Years of major campaigns, hundreds of millions in extortion, and until now no operator names in any public record.

What this investigation shows is that the operation is built to last. Developers work with the group over years. When someone gets arrested, the bills get paid. Access gets bought through other people operating under other names. The infrastructure touches multiple ecosystems at once, through tooling, through people, through shared affiliates who are not exclusively Cl0p but are close enough to matter.

None of that is accidental. It is how a professional criminal organization insulates its core.

More will follow.


Sources have been anonymized. PII has been limited to details corroborated by dossier records, public forum activity, and law enforcement filings. Family members and uninvolved associates have been excluded.

This post is licensed under CC BY 4.0 by the author.