By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    McDonald’s Delaware Court Decision Will Change CCO World Forever
    21 February 2023
    Health Equity: Board Directors’ Most Important ESG Measure
    7 May 2023
    News Roundup: 75% of US Companies Mention Climate Risk in 10-Ks
    15 June 2024
    Latest News
    Fractured & Fraught — but Still Potentially Profitable: The State of ESG in 2025
    7 November 2025
    UK AML Reform in 2025: A Public Recalibration of Risk and Responsibility
    1 November 2025
    US National Security Compliance Risk & Readiness Report
    26 October 2025
    What Would a Farage Government Mean for Compliance?
    20 October 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Inside the High Risk of 3rd-Party SaaS Apps
    24 March 2023
    Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency • Graham Cluley
    30 March 2023
    119 Arrested in Cybercrime Crackdown
    6 April 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    ‘Wordle’ today: Here’s the answer, hints for April 3
    3 April 2023
    8 Ways to Know if You Have a Vitamin Deficiency
    12 April 2023
    A real-life Pixel Fold has seemingly leaked for the very first time
    22 April 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Hungary president signs Sweden’s NATO membership ratification By Reuters
    5 March 2024
    Can New York City skyscrapers withstand an earthquake?
    6 April 2024
    Hedge fund boss Paul Marshall loses case over silver salvaged from shipwreck
    8 May 2024
    Latest News
    Microvast Holdings earnings beat by $0.02, revenue topped estimates
    11 November 2025
    Client Challenge
    10 November 2025
    Peter Thiel warns if you ‘proletarianize the young people,’ don’t be surprised they end up communist
    9 November 2025
    US Supreme Court lets Trump withhold $4 billion in food aid funding for now
    8 November 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Cybersecurity Elevator Pitch: Cyber Risk Monitoring. Developed By Black Kite.
    8 May 2023
    Cybercrime News For May 16,2023. Russian Hackers Take Aim At Sweden. WCYB Digital Radio.
    16 May 2023
    Cybercrime Wire For Dec. 27, 2023. 2nd Lawsuit Filed Against Norton Healthcare. WCYB Digital Radio.
    27 December 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: ALPHV/BlackCat ransomware operation disrupted, but criminals threaten more attacks
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Cyber Security > ALPHV/BlackCat ransomware operation disrupted, but criminals threaten more attacks
Cyber Security

ALPHV/BlackCat ransomware operation disrupted, but criminals threaten more attacks

webmaster
Last updated: 2023/12/24 at 3:27 PM
webmaster
Share
4 Min Read
SHARE

The US Department of Justice has announced that it has disrupted the operations of the ALPHV ransomware group, and seized decryption keys that could help 500 victims unscramble their files without having to pay a ransom.

The Russian-speaking ALPHV (also known as BlackCat or Noberus) is one of the world’s most notorious ransomware groups, having counted amongst its many victims Beverly Hills plastic surgeries, Las Vegas casino giant MGM Resorts, hotel chains, and cosmetics firm Estée Lauder.

Just last month ALPHV created headlines after audaciously filing a complaint to the SEC that a company it had hacked (but had declined to pay a ransom) had not notified the authorities of the data breach.

The US DOJ says it considers ALPHV/Blackcat to be the second most prolific ransomware-as-a-service variant in the world, based upon the hundreds of millions of dollars it has extorted from victims around the world.

From today however, visitors to ALPHV’s dark web site have been greeted with a banner saying that the site has been seized by the authorities.

And, it emerges, the FBI has been working hard behind-the-scenes with dozens of ALPHV victims – saving them an estimated US $68 million in ransoms, by providing a method to decrypt their data for free.

As described in an unsealed search warrant, the ransomware gang’s infrastructure was not as secure as it might have wished.

As Bleeping Computer reports, an FBI confidential source managed to successfully sign-up to be an affiliate with the ALPHV/BlackCat ransomware operation and was granted access to the group’s backend affiliate panel.

Having managed to gain access to ALPHV’s private control panel, FBI agents were able to gather substantial information about the criminal enterprise’s operations:

“From the Campaigns screen, affiliates can see the victim entity, full ransom price demanded, discount ransom price, expiration date, cryptocurrency addresses, cryptocurrency transactions, type of computer system compromised, ransom demand note, chats with the victim, and more,” explained the FBI.

With this access, investigators were able to obtain the decryption keys used in attacks and provide them to hundreds of victims to recover their data for free.

ALPHV/BlackCat is a business.  A criminal business, admittedly.  But like any business it’s not going to take kindly to its money-making operations being disrupted (in this case, by crime-fighting authorities.)

Within hours of the Department of Justice issuing its press release announcing that it had disrupted some of the ransomware group’s activities, ALPHV/BlackCat had an announcement of its own to make.

On the dark web ALPHV/BlackCat claimed it had “unseized” its domain and threatened retaliation against the United States and other countries that had assisted in the takedown, by allowing its affiliates to launch attacks against critical infrastructure.

As security researcher Allan Liska explained on Twitter, the ransomware group’s claims that it has “unseized” its server are somewhat disingenuous.  However, the encouragement to ALPHV/BlackCat affiliates to launch even more attacks against yet more critical targets can most definitely be seen as a raising of the stakes.

In short, ALPHV/BlackCat says it isn’t going to “play nice” anymore… as if any group that extorted millions from innocent companies by encrypting data and exfiltrating data can ever be said to be “playing nice.”

You Might Also Like

North Korean Hackers Target Developers with Malicious npm Packages

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article This Long Island Retreat Is a Neutral Oasis With Nautical Touches
Next Article Digital Transformation with No-Code & API's | Business Chat
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce
VERACODE 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
Microvast Holdings earnings beat by $0.02, revenue topped estimates
Businness 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?