DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AlphV (BlackCat) leak site reportedly taken down by law enforcement (4)

Posted on December 8, 2023 by Dissent

When the AlphV site went offline yesterday, rumors started. Now intel firm RedSense has tweeted that they can confirm it was a law enforcement takedown:

Image: DataBreaches.net

Today, RedSense can confirm that #ALPHV aka #BlackCat ransomware gang’s site has been taken down by law enforcement
@4D435A

There has been no statement from the Department of Justice yet.

Bleeping Computer has some additional details concerning their communications with AlphV yesterday after the site first went offline.

Update 1: VX-Underground was reportedly given a different explanation by AlphV yesterday, with VX-Underground being told that AlphV was having problems with their hosting provider. Perhaps coincidentally, BreachForums also went offline for a brief period this week when their registrar told them they were canceling their domain after getting a number of law enforcement requests about the forum. According to the forum owner who related that to DataBreaches, when they tried to contact another company, that company declined to accept them as a customer, telling them that they had been contacted by law enforcement.

So is there some concerted law enforcement actions going on or are these activities unrelated? Time will tell, but hopefully DOJ will issue something soon about the AlphV takedown.

Image: DataBreaches.net

Update 2 (December 9):  The AlphV qtox account status was changed from “REPAIR” to a message: “Everything will work soon.”  But of course, how do we know who is in charge of that account now?  There is still no announcement or confirmation from DOJ about any takedown.

Update 3 (December 9): This story continues to raise more questions than it answers. DataBreaches just had the following exchange with the AlphV admin on qTox, in which the admin says the claim of a law enforcement action is “fake.” When asked what’s fake, they replied, “Discs just fell out in our DC, we are moving to another DC.”

Image: DataBreaches.net

So law enforcement had nothing to do with this? The question was put to them by the owner of the @CyberSecurityIL channel on Telegram, who shared their exchange with DataBreaches:

When asked, “So no law enforcement involved? Only technical issues?” the admin answered, “Yes.”

Of course, that may not be true at all. A source with knowledge of AlphV tells DataBreaches that this appears to be law enforcement action with the host, and it may be much more disruptive than AlphV is letting on. Is a rebrand coming up soon? Stay tuned….

Update 4 of December 11:  AlphV’s leak site is back online, but without any of the old content. Their qTox status has been changed to “Everything is working.”

DataBreaches contacted the admin on qTox to ask whether the site was really working and about the previous content — whether it would be restored or was all gone. Admin ALPHV answered:

фдд цщкл
all work
files remove
all

DataBreaches followed up: “So all of the old posts and data are gone? You are starting over? ”

Admin ALPHV replied: “All new only”

DOJ has still not issued any statement, despite another request from DataBreaches this morning.

Category: Of Note

Post navigation

← Seattle cancer patients face blackmail threats after recent Fred Hutch data breach
FBI explains how companies can delay SEC cyber incident disclosures →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.