ALPHV BlackCat uses ransomware to infiltrate networks and compromise sensitive data of individuals and government agencies. Victims often pay to have their equipment released and/or prevent sensitive data from being leaked.
As a major ransomware player, ALPHV BlackCat hackers have victimized more than 1,000 entities in the U.S. alone. Victims include Department of Defense contractors, municipal governments, and critical infrastructure, according to the FBI. To date, the group’s ransom demands have exceeded $100 million.
ALPHV BlackCat has also targeted entities in the United Kingdom, Australia, Germany, Spain, and Denmark. Law enforcement agencies from these countries are working with the FBI in efforts to interdict the group and bring its members to justice.
People can earn $10 million in rewards for providing information on ALPHV BlackCat’s members, affiliates, activities, or foreign government links. More information on the program is available on the State Department’s Rewards for Justice page.
The State Department also maintains a Deep Web reporting channel here, which can only be accessed via the Tor browser.
Ransomware victims should consider carefully before paying a ransom, according to a ransomware guide published by the FBI.
Paying criminal actors funds other illicit activities, and sometimes hackers don’t release the systems of data after the ransom is paid. In some cases, entities that paid ransoms have been targeted for subsequent attacks, presumably because they had already displayed a willingness to pay.
All told, ransomware victims paid more than $1 billion in 2023, according to Fisher Phillips, LLP. The law firm expects that figure will rise in 2024.
Feature Teresa Tennyson | Sep 3, 2024
Feature Teresa Tennyson | Aug 5, 2024
Feature Teresa Tennyson | Jul 23, 2024
Join the mission and subscribe to our newsletter. In exchange, we promise to fight for justice.
Join the mission and subscribe to our newsletter. In exchange, we promise to fight for justice.