DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AlphV claims they have started contacting some of Tipalti’s clients (1)

Posted on December 4, 2023 by Dissent

Following up on a somewhat atypical strategy to monetize an alleged attack on Tipalti,  AlphV updated their leak site post today. It now reads:

We are systematically reaching out to affected clients of Tipalti, the first batch (consisting of organizations with the most data exfiltrated), have been sent communications requesting initial contact. We will immediately leak the data of organizations who share these file lists , samples or notes with their vendor Tipalti.

Samples or file lists have and will be provided to authorized negotiators.

Victims, note that you won’t be outed unless you fail to cooperate.

In light of some confusion yesterday as to what their first post yesterday even meant in terms of strategy (see this thread for various interpretations),  DataBreaches reached out to a TA involved in this particular attack to request some clarification from their perspective.

As of this morning, the TA claimed, they have already started attempting to extort some of Tipalti’s clients because “it will make more $ that way.”   When DataBreaches followed up by asking,  “So you didn’t try Tipalti first at all?” they answered, “They will be reached out to once we extort the clients,” adding, “We know they won’t pay what we want.”

The TA also confirmed DataBreaches’ interpretation yesterday that the absence of cyberinsurance had led them to conclude that they wouldn’t get paid a lot by attempting to extort Tipalti, so they were starting with Tipalti’s clients first.

“We are sadly hitting a wall here,” the TA commented. “Exfil only doesn’t allow for huge payouts.”

DataBreaches has sent an email inquiry to Roblox asking whether they have received any contact request from AlphV and if so, if they have replied. An automatic acknowledgement to the inquiry was received promptly but no substantive reply as yet.

To summarize the situation so far, at least as far as DataBreaches understands it:

  1. AlphV claims to have exfiltrated more than 265 GB of  data from Tipalti, including client data.0  No encryption was involved.
  2. AlphV publicly announced the attack even though they had not yet contacted Tipalti or any clients to attempt to extort them.
  3. Following AlphV’s somewhat confusing post, there were public and incorrect claims that Roblox and Twitch were being extorted (even though they hadn’t even been contacted at all) and that Twitter would likely be extorted within a few days (even though the TA had not stated that specific intention).
  4. Tipalti’s only statements have been that they are investigating the claimed attack. As of yesterday’s statement,  they had not detected any data loss or breach of its systems but is not known to DataBreaches if that is still the case.

As of today,  the threat actors have not stated what clients they have already reached out to and whether they got any responses.

Claims by people on Twitter that named companies are being extorted or will almost certainly be extorted within days just help the threat actors while possibly harming the clients’ reputations and stock values.  As Alexander Leslie eloquently stated:

Don’t let criminals control online narratives.

Amplifying criminal claims without context, analysis, credibility assessments, or confidence language puts potential victims at a disadvantage.

It also contributes to the spread of misinformation, disinformation, and malinformation online.

If left unchecked, unverified criminal claims alone have the potential to do as much harm to brand reputation as a data breach or disruptive attack.

Amplify credible voices, promote counter-messaging, and encourage transparency.

Urge patience and restraint, especially in developing situations.

Share accurate and timely information with the widest possible audience.

If you can provide actionable intelligence or mitigation strategies for defenders — even better.

Some of this burden relies on government, but it is mainly shouldered by independent researchers, journalists, and technology companies.

 

Update 1 (Dec. 4):  DataBreaches had an opportunity to ask the TA this evening if they were currently negotiating with Roblox and Twitch. Their answer was “no.”

 

 

Category: Business SectorHackU.S.

Post navigation

← Research: Privacy as Pretense: Empirically Mapping the Gap Between Legislative & Judicial Protections of Privacy
23andMe data breach: Hackers accessed data of 6.9 million users →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
  • HHS OCR Settles HIPAA Security Rule Investigation of BayCare Health System for $800k and Corrective Action Plan
  • UK: Two NHS trusts hit by cyberattack that exploited Ivanti flaw
  • Update: ALN Medical Management’s Data Breach Total Soars to More than 1.8 Million Patients Affected
  • Russian-linked hackers target UK Defense Ministry while posing as journalists
  • Banks Want SEC to Rescind Cyberattack Disclosure Requirements
  • MathWorks, Creator of MATLAB, Confirms Ransomware Attack
  • Russian hospital programmer gets 14 years for leaking soldier data to Ukraine
  • MSCS board renews contract with PowerSchool while suing them

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation
  • U.S. Spy Agencies Are Getting a One-Stop Shop to Buy Your Most Sensitive Personal Data
  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.