DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AlphV (BlackCat) leak site reportedly taken down by law enforcement (4)

Posted on December 8, 2023 by Dissent

When the AlphV site went offline yesterday, rumors started. Now intel firm RedSense has tweeted that they can confirm it was a law enforcement takedown:

Image: DataBreaches.net

Today, RedSense can confirm that #ALPHV aka #BlackCat ransomware gang’s site has been taken down by law enforcement
@4D435A

There has been no statement from the Department of Justice yet.

Bleeping Computer has some additional details concerning their communications with AlphV yesterday after the site first went offline.

Update 1: VX-Underground was reportedly given a different explanation by AlphV yesterday, with VX-Underground being told that AlphV was having problems with their hosting provider. Perhaps coincidentally, BreachForums also went offline for a brief period this week when their registrar told them they were canceling their domain after getting a number of law enforcement requests about the forum. According to the forum owner who related that to DataBreaches, when they tried to contact another company, that company declined to accept them as a customer, telling them that they had been contacted by law enforcement.

So is there some concerted law enforcement actions going on or are these activities unrelated? Time will tell, but hopefully DOJ will issue something soon about the AlphV takedown.

Image: DataBreaches.net

Update 2 (December 9):  The AlphV qtox account status was changed from “REPAIR” to a message: “Everything will work soon.”  But of course, how do we know who is in charge of that account now?  There is still no announcement or confirmation from DOJ about any takedown.

Update 3 (December 9): This story continues to raise more questions than it answers. DataBreaches just had the following exchange with the AlphV admin on qTox, in which the admin says the claim of a law enforcement action is “fake.” When asked what’s fake, they replied, “Discs just fell out in our DC, we are moving to another DC.”

Image: DataBreaches.net

So law enforcement had nothing to do with this? The question was put to them by the owner of the @CyberSecurityIL channel on Telegram, who shared their exchange with DataBreaches:

When asked, “So no law enforcement involved? Only technical issues?” the admin answered, “Yes.”

Of course, that may not be true at all. A source with knowledge of AlphV tells DataBreaches that this appears to be law enforcement action with the host, and it may be much more disruptive than AlphV is letting on. Is a rebrand coming up soon? Stay tuned….

Update 4 of December 11:  AlphV’s leak site is back online, but without any of the old content. Their qTox status has been changed to “Everything is working.”

DataBreaches contacted the admin on qTox to ask whether the site was really working and about the previous content — whether it would be restored or was all gone. Admin ALPHV answered:

фдд цщкл
all work
files remove
all

DataBreaches followed up: “So all of the old posts and data are gone? You are starting over? ”

Admin ALPHV replied: “All new only”

DOJ has still not issued any statement, despite another request from DataBreaches this morning.

Related posts:

  • Forbes Breach Email Statistics
  • TeamGhostShell posts “master list” of 548 leaks (so far)
  • 66 Chinese and Iranian based sites hacked and defaced by poltergeisth4cker
Category: Of Note

Post navigation

← Seattle cancer patients face blackmail threats after recent Fred Hutch data breach
FBI explains how companies can delay SEC cyber incident disclosures →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appears fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.