The ALPHV ransomware organization is responsible for a string of ransomware operations that have been carried out via the BlackCat software, and it runs a platform that provides ransomware as a service. Moreover, the gang has built a searchable database of its victims who refuse to pay the ransom, which its associated groups may access. The Alphv ransomware family was discovered for the first time in November 2021. It was written in the Rust programming language and was also known as BlackCat and Noberus. However, its operators are likely connected to the same cybercrime ring that was previously identified as being responsible for the Darkside and Blackmatter ransomware. In certain instances, the organization was also spotted executing distributed denial-of-service (DDoS) assaults against victims and harassing the victims’ customers, workers, and partners in an effort to further push the victims into paying up. To this day, the operators of the Alphv ransomware have compromised more than 100 different firms.
ALPHV has claimed responsibility for the attack on Ring, a well-known provider of security cameras sold on Amazon, and is now threatening to disclose the company’s confidential information. Ring was established in 2013 and was bought by Amazon in 2018. The company initially offered just a smart doorbell, but it has since extended its product line to include a smart alarm system and other intelligent home security solutions.
In response to allegations made by a cybercrime organization, the home security company Ring has said that it does not have any evidence to support the notion that it has been the target of a ransomware assault. End-to-end encryption is supported by Ring doorbell and security camera devices in the majority of locations where it is accessible. Despite this, it is not impossible for the adversaries to steal company or consumer data rather than the video.
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.