Ransomware

Law Enforcement Reportedly Behind Takedown of BlackCat/Alphv Ransomware Website

The leak website of the notorious BlackCat/Alphv ransomware group has been offline for days and law enforcement is reportedly behind the takedown.

BlackCat ransomware

The official leak website of the notorious ransomware group known as BlackCat and Alphv has been offline for days and law enforcement is believed to be behind the takedown.

The Tor-based BlackCat/Alphv leak site has been inaccessible since December 7. Threat intelligence company RedSense reported the following day that the website was taken down by law enforcement.

In an update on Sunday, the company said, “RedSense Chief Research Officer Yelisey Bohuslavkiy confirms that the threat actors, including BlackCat’s affiliates and initial access brokers, are convinced that the shutdown was caused by a law enforcement action.”

“He specifies that other ransomware leadership from the top-tier groups directly related to AlphV also confirm this: specifically admins and team leads of Royal/BlackSuit, BlackBasta, LockBit, and Akira,” the company added.

RedSense also learned that the cybercriminals expect everything to be restored soon, which suggests that the impact on their operation and infrastructure was limited.

At the time of writing, the BlackCat website has been down for four days. SOC company ReliaQuest pointed out that the group’s site does have a history of connectivity issues and outages. However, this seems to be one of the longest — if not the longest — downtime.

No law enforcement agency appears to have released information about an operation targeting BlackCat. 

Following the shutdown of the Hive ransomware in January 2023, BlackCat said such a takedown effort would not work against its operation. 

Advertisement. Scroll to continue reading.

According to a recent year-in-review report from Cisco Talos, BlackCat was the second most active group this year, after LockBit. A BlackFog ransomware report for November shows that BlackCat was as active as LockBit last month. 

BlackCat, whose operators appear to be Russian speakers, emerged in late 2021 as a ransomware-as-a-service enterprise, offering up to 90% of ransom payments in an effort to attract affiliates. Many of the developers and money launderers for BlackCat are said to be linked to the now-defunct Darkside/BlackMatter ransomware.

ReliaQuest said the ransomware operation’s leak website listed more than 650 victims before it was shut down. Victims included major organizations such as Reddit, Western Digital, Swissport, MGM Resorts, and NCR

Related: BlackCat Ransomware Targets Industrial Companies

Related: US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea

Related: Technical, Legal Action Taken to Prevent Abuse of Cobalt Strike, Microsoft Software

Related Content

Data Breaches

The Ohio Lottery cyberattack conducted by the DragonForce ransomware group has impacted more than 500,000 individuals.

Data Breaches

Tech giant notifies millions of customers that full names and physical mailing addresses were stolen during a security incident.

Ransomware

The LockBit cybercrime group has taken credit for the recent ransomware attack that disrupted City of Wichita systems.

Ransomware

Organizations need to look beyond preventive measures when it comes to dealing with today’s ransomware threats and invest in ransomware response.

Ransomware

Philadelphia-based real estate company Brandywine Realty Trust shuts down systems following a ransomware attack.

Ransomware

Charges and sanctions announced against Dimitry Yuryevich Khoroshev, the alleged developer and operator of LockBit ransomware.

Ransomware

The City of Wichita, Kansas, has shut down its network after falling victim to a file-encrypting ransomware attack.

Cybercrime

Yaroslav Vasinskyi was sentenced to 13 years and seven months in prison for his alleged role in the REvil ransomware operation.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version