{
	"id": "257b6ffe-eefd-4995-8706-1cc5afe49752",
	"created_at": "2026-04-09T02:23:03.972892Z",
	"updated_at": "2026-04-10T03:29:39.720225Z",
	"deleted_at": null,
	"sha1_hash": "f8b6627efa17af121b92c7fd50736432a2ffb68d",
	"title": "AlphV reacts to law enforcement action by allowing affiliates to attack hospitals, critical infrastructure - DataBreaches.Net",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 37207,
	"plain_text": "AlphV reacts to law enforcement action by allowing affiliates to\r\nattack hospitals, critical infrastructure - DataBreaches.Net\r\nPublished: 2023-12-20 · Archived: 2026-04-09 02:20:07 UTC\r\nIn response to the takedown notice on their original leak site and other damage done to their operations as\r\ndescribed in the DOJ press release and warrant application that was unsealed today, AlphV posted this:\r\nAs you all know, the FBI got the keys to our blog, now we’ll tell you how it was.\r\nFirst, how it all happened, after examining their documents, we understand that they gained access to\r\none of the DC, because all the other DC were untouched, it turns out that they somehow hacked one of\r\nour hosters, maybe even he himself helped them.\r\nThe maximum that they have is the keys for the last month and a half, it’s about 400 companies, but\r\nnow more than 3,000 companies will never receive their keys because of them.\r\nBecause of their actions, we are introducing new rules, or rather removing ALL the rules except one,\r\nyou can not touch the CIS, you can now block hospitals, nuclear power plants, anything and anywhere.\r\nThe rate is now 90% for all adverts.\r\nWe do not give any discounts to companies, payment is strictly the amount that we specified.\r\nhttps://www.databreaches.net/alphv-reacts-to-law-enforcement-action-by-allowing-affiliates-to-attack-hospitals-critical-infrastructure/\r\nPage 1 of 2\n\nVIP advertisers receive their private affiliate program, which we raise only for them, on a separate DC,\r\ncompletely isolated from each other.\r\nThank you for your experience, we will take into account our mistakes and work even harder, waiting\r\nfor your whining in chat rooms and requests to make discounts that no longer exist.\r\n[Note:  Mentally replace “advertisers” with “affiliates” in the above.]\r\nWhile the law enforcement operations accomplished a lot, this was not a total destruction of AlphV.  For one\r\nthing, they had already migrated to a newer site after the initial disruption. That new site is still operational today.\r\nSecond, their “unseized” messaging gave them an opportunity to appear stronger and more vindictive, which may\r\nintimidate new or future victims. One affiliate is already lashing out at the government by leaking a victim now\r\nand threatening harsher treatment of victims:\r\nWe will no longer give victims additional time to reach out. You need to contact us before being added\r\nto the blog, or else we will leak your data and harass the family of your executive teams and employees\r\n– even your young children are not exempt.\r\nPatient data will no longer be removed prior to a leak, the SEC and HHS will always be notified in the\r\nevent of no initial contact.\r\nAdditionally, we are revoking the additional 48 hours provided to [REDACTED] as well as ability to\r\naccess the negotiation URL. They can shove their money up their asses.\r\nClearnet link to the entirety of the data will be reflected in a few hours.\r\nSource: https://www.databreaches.net/alphv-reacts-to-law-enforcement-action-by-allowing-affiliates-to-attack-hospitals-critical-infrastructure/\r\nhttps://www.databreaches.net/alphv-reacts-to-law-enforcement-action-by-allowing-affiliates-to-attack-hospitals-critical-infrastructure/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.databreaches.net/alphv-reacts-to-law-enforcement-action-by-allowing-affiliates-to-attack-hospitals-critical-infrastructure/"
	],
	"report_names": [
		"alphv-reacts-to-law-enforcement-action-by-allowing-affiliates-to-attack-hospitals-critical-infrastructure"
	],
	"threat_actors": [
		{
			"id": "6e23ce43-e1ab-46e3-9f80-76fccf77682b",
			"created_at": "2022-10-25T16:07:23.303713Z",
			"updated_at": "2026-04-10T02:00:04.530417Z",
			"deleted_at": null,
			"main_name": "ALPHV",
			"aliases": [
				"ALPHV",
				"ALPHVM",
				"Ambitious Scorpius",
				"BlackCat Gang",
				"UNC4466"
			],
			"source_name": "ETDA:ALPHV",
			"tools": [
				"ALPHV",
				"ALPHVM",
				"BlackCat",
				"GO Simple Tunnel",
				"GOST",
				"Impacket",
				"LaZagne",
				"MEGAsync",
				"Mimikatz",
				"Munchkin",
				"Noberus",
				"PsExec",
				"Remcom",
				"RemoteCommandExecution",
				"WebBrowserPassView"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775701383,
	"ts_updated_at": 1775791779,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f8b6627efa17af121b92c7fd50736432a2ffb68d.pdf",
		"text": "https://archive.orkl.eu/f8b6627efa17af121b92c7fd50736432a2ffb68d.txt",
		"img": "https://archive.orkl.eu/f8b6627efa17af121b92c7fd50736432a2ffb68d.jpg"
	}
}