Everything we know so far about the rumored ALPHV 'takedown'
Rumors' attributing the ALPHV outage to a law enforcement operation remain unconfirmed


Speculation about a law enforcement takedown of the ALPHV ransomware group has been rampant in recent days after its data leak website was abruptly knocked offline.
The cause of the outage is not confirmed, and the site does have a history of periodic outages and disruption issues. However, the 30-hour downtime period represents one of the longest outages the site has suffered since being launched.
The group, often referred to as ALPHV/BlackCat, has listed over 650 companies on its data leak site since it was created in 2021.
On December 10, cyber intelligence specialist RedSense revealed its chief research officer Yelisey Bohuslavkiy received information from threat actors affiliated with ALPHV who indicated they were “convinced” the outage was related to law enforcement operations.
The firm added Bohuslavkiy also received confirmation from the leadership of related groups such as Royal/BlackSuit, BlackBasta, LockBit, and Akira.
But at the time of writing no official law enforcement agency has released information claiming responsibility for the outage.
There are some signs the group’s site may be on its way back to functionality. At the time of writing, the group’s leak site appears to be coming back online, which tracks with the message received by RedSense from ALPHV’s admin stating “everything will work soon”.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Who are ALPHV/BlackCat?
First rising to prominence in 2021, ALPHV/BlackCat were one of the earliest ransomware groups to use the Rust programming language, which has since been adopted by a number of other threat actors such as Hive group.
RELATED RESOURCE
Find out why cloud transformation requires you to rethink data protection
DOWNLOAD NOW
The programming language has grown in popularity due to its efficient memory management and anti-analysis properties that allow ransomware to evade detection from many anti-malware systems.
Notable victims of the ALPHV/BlackCat group include aviation services provider Swissport, video game giant Bandai Namco, and the Luxembourg energy company Encevo Group.
The group has been known to employ a ‘quadruple extortion’ method whereby they encrypt the victims data, threaten to release sensitive data, launch denial of service (DoS) attacks against the victim’s public domains, and harass the victim by publicising the breach to its customers, media, and business partners.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
AI is helping bad bots take over the internet
News Automated bot traffic has surpassed human activity for the first time in a decade, according to Imperva
By Bobby Hellard
-
Two years on from its Series B round, Hack the Box is targeting further growth
News Hack the Box has grown significantly in the last two years, and it shows no signs of slowing down
By Ross Kelly
-
History tells us ALPHV will likely recover from recent takedown
News A number of cyber criminal outfits have recovered from police takedowns in recent years, but that doesn’t mean authorities should stop trying
By Ross Kelly
-
ALPHV leak site seized by law enforcement as decryption tool released
News The ALPHV takedown as been described as a "huge win" for law enforcement
By Ross Kelly
-
Ransomware groups are using media coverage to coerce victims into paying
News Threat actors are starting to see the benefits of a more sophisticated media strategy for extracting ransoms
By Solomon Klappholz
-
Western Digital refuses to negotiate with hackers as ALPHV offers “final warning”
News The hackers claim to have stolen 10TB worth of the company's data but have received no contact during two-week incident
By Connor Jones