DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AlphV claims they have started contacting some of Tipalti’s clients (1)

Posted on December 4, 2023 by Dissent

Following up on a somewhat atypical strategy to monetize an alleged attack on Tipalti,  AlphV updated their leak site post today. It now reads:

We are systematically reaching out to affected clients of Tipalti, the first batch (consisting of organizations with the most data exfiltrated), have been sent communications requesting initial contact. We will immediately leak the data of organizations who share these file lists , samples or notes with their vendor Tipalti.

Samples or file lists have and will be provided to authorized negotiators.

Victims, note that you won’t be outed unless you fail to cooperate.

In light of some confusion yesterday as to what their first post yesterday even meant in terms of strategy (see this thread for various interpretations),  DataBreaches reached out to a TA involved in this particular attack to request some clarification from their perspective.

As of this morning, the TA claimed, they have already started attempting to extort some of Tipalti’s clients because “it will make more $ that way.”   When DataBreaches followed up by asking,  “So you didn’t try Tipalti first at all?” they answered, “They will be reached out to once we extort the clients,” adding, “We know they won’t pay what we want.”

The TA also confirmed DataBreaches’ interpretation yesterday that the absence of cyberinsurance had led them to conclude that they wouldn’t get paid a lot by attempting to extort Tipalti, so they were starting with Tipalti’s clients first.

“We are sadly hitting a wall here,” the TA commented. “Exfil only doesn’t allow for huge payouts.”

DataBreaches has sent an email inquiry to Roblox asking whether they have received any contact request from AlphV and if so, if they have replied. An automatic acknowledgement to the inquiry was received promptly but no substantive reply as yet.

To summarize the situation so far, at least as far as DataBreaches understands it:

  1. AlphV claims to have exfiltrated more than 265 GB of  data from Tipalti, including client data.0  No encryption was involved.
  2. AlphV publicly announced the attack even though they had not yet contacted Tipalti or any clients to attempt to extort them.
  3. Following AlphV’s somewhat confusing post, there were public and incorrect claims that Roblox and Twitch were being extorted (even though they hadn’t even been contacted at all) and that Twitter would likely be extorted within a few days (even though the TA had not stated that specific intention).
  4. Tipalti’s only statements have been that they are investigating the claimed attack. As of yesterday’s statement,  they had not detected any data loss or breach of its systems but is not known to DataBreaches if that is still the case.

As of today,  the threat actors have not stated what clients they have already reached out to and whether they got any responses.

Claims by people on Twitter that named companies are being extorted or will almost certainly be extorted within days just help the threat actors while possibly harming the clients’ reputations and stock values.  As Alexander Leslie eloquently stated:

Don’t let criminals control online narratives.

Amplifying criminal claims without context, analysis, credibility assessments, or confidence language puts potential victims at a disadvantage.

It also contributes to the spread of misinformation, disinformation, and malinformation online.

If left unchecked, unverified criminal claims alone have the potential to do as much harm to brand reputation as a data breach or disruptive attack.

Amplify credible voices, promote counter-messaging, and encourage transparency.

Urge patience and restraint, especially in developing situations.

Share accurate and timely information with the widest possible audience.

If you can provide actionable intelligence or mitigation strategies for defenders — even better.

Some of this burden relies on government, but it is mainly shouldered by independent researchers, journalists, and technology companies.

 

Update 1 (Dec. 4):  DataBreaches had an opportunity to ask the TA this evening if they were currently negotiating with Roblox and Twitch. Their answer was “no.”

 

 

No related posts.

Category: Business SectorHackU.S.

Post navigation

← Research: Privacy as Pretense: Empirically Mapping the Gap Between Legislative & Judicial Protections of Privacy
23andMe data breach: Hackers accessed data of 6.9 million users →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.