History tells us ALPHV will likely recover from recent takedown
A number of cyber criminal outfits have recovered from police takedowns in recent years, but that doesn’t mean authorities should stop trying


With a recent law enforcement sting putting a serious dent in ALPHV operations, questions remain over how quickly the group will recover and return to plaguing organizations globally.
This week, US authorities announced it had seized control of ALPHV’s dark web leak site in coordination with law enforcement agencies from a host of international partners, including the UK, Germany, and Australia.
The operation, hailed as a significant blow to the notorious ransomware group, enabled authorities to “gain visibility” into the gang’s computer networks and was followed by the release of a decryption tool for organizations impacted by its activities.
Lingering questions remain over the group’s ability to recover from the sting operation, however. And recent history shows that some cyber criminal outfits are more than capable of regrouping.
Qakbot, ranked among the most prolific botnets, was taken down earlier this year, again in a US-led operation. However, within weeks of the sting operation there were signs of recovery.
In October, researchers at Cisco Talos warned that Qakbot-affiliated hackers still remained a pervasive threat, with threat actors in fact waging a devastating ransomware campaign that began “just before the takedown”.
Just this week, research from Microsoft Threat Intelligence showed a new Qakbot phishing campaign has emerged. While this appears to still be in its infancy, the fact it has reemerged doesn’t paint a positive picture.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Three months was all it took for the botnet to get back on its feet.
This tit-for-tat process of police takedowns and eventual recovery has become a recurring trend in recent years. In 2020, an operation to take down Trickbot bore initial success but resulted in the eventual return of the infamous botnet.
The Europol-led Emotet takedown in 2021 also saw a similar outcome. Emotet not only re-established itself within the space of four months, but upon its return accelerated activities and plagued organizations globally with hundreds of thousands of daily attacks.
This begs the question as to whether authorities can ever truly cripple cyber criminal operations and paints a concerning picture for organizations potentially in the crosshairs; you can run, but you can’t hide.
ALPHV-style takedowns create breathing room
Despite these concerns, Steve Stone, head of Rubrik Zero Labs believes police takedowns still play a crucial role in denting cyber criminal operations.
“While debate persists about whether such actions curb ransomware groups in the long term, these coordinated efforts produce invaluable impacts no single organization could achieve alone,” he said.
RELATED RESOURCE
Read an in-depth analysis of device activity and IoT malware trends
DOWNLOAD NOW
Takedowns typically require threat actors to rebuild from the ground up, which is a costly, time consuming process that will provide vital breathing room for both potential victims and law enforcement to refine their techniques.
“Takedowns force threat actors to reconstitute under new names and rebuild technical infrastructure from scratch - actions that divert significant time and resources away from criminal operations,” he added.
“Recent examples, like the months-long disruption of Qakbot, show how some groups struggle to restore operations after takedowns. While Qakbot ultimately returned, it took nearly three months to rebuild technical infrastructure and restore capabilities.”

Ross Kelly is ITPro's News & Analysis Editor, responsible for leading the brand's news output and in-depth reporting on the latest stories from across the business technology landscape. Ross was previously a Staff Writer, during which time he developed a keen interest in cyber security, business leadership, and emerging technologies.
He graduated from Edinburgh Napier University in 2016 with a BA (Hons) in Journalism, and joined ITPro in 2022 after four years working in technology conference research.
For news pitches, you can contact Ross at ross.kelly@futurenet.com, or on Twitter and LinkedIn.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
ALPHV leak site seized by law enforcement as decryption tool released
News The ALPHV takedown as been described as a "huge win" for law enforcement
By Ross Kelly Published
-
Ransomware groups are using media coverage to coerce victims into paying
News Threat actors are starting to see the benefits of a more sophisticated media strategy for extracting ransoms
By Solomon Klappholz Published
-
Everything we know so far about the rumored ALPHV 'takedown'
News Rumors' attributing the ALPHV outage to a law enforcement operation remain unconfirmed
By Solomon Klappholz Published
-
Western Digital refuses to negotiate with hackers as ALPHV offers “final warning”
News The hackers claim to have stolen 10TB worth of the company's data but have received no contact during two-week incident
By Connor Jones Published