ALPHV/BlackCat: Who, What, Where, Why, How

Photo by Adél Grőber on Unsplash



  • Encryption: Victims must pay to regain access to encrypted data and systems.
  • Data theft: Threat actors release sensitive data if they don’t receive a ransom.
  • Denial of Service (DoS): Threat actors launch DoS attacks that bring down the victim’s public websites.
  • Harassment: Threat actors tell the victim’s customers, business partners, and employees, and the media, about the breach.





Additional Resources



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Cyber threat intelligence (CTI), OSINT, & cybersecurity enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.