ALPHV ransomware gang returns, sorta
The ALPHV ransomware gang, arguably the second most dangerous âbig gameâ ransomware operator, appears to be back in business after its infrastructure went down for five days. But all does not appear to be going well for group.
ALPHVâs dark web leak site may be back but it is only showing a single victim with no sign of any of the hundreds of others it normally lists. The solitary listing on the site is dated December 13, which is after the site was restored.
Many of the groupâs negotiation links are reportedly not working either, meaning that victims looking to pay off the gang are stuck in limbo, and its likely that neither the ALPHV group, nor the affiliates who use its ransomware to carry out attacks, are being paid.
When the gangâs infrastructure went down a week ago, many suspected the hand of law enforcement, despite no official word on the subject. According to VX Underground, APLHVâs own explanation is that it suffered a hardware failure. If the group really has lost access to the data its business relies on, then itâs now getting a first hand look at what its victims go through when theyâre attacked and their data is encrypted.
ALPHV wouldnât be the first ransomware gang to suffer problems behind the scenes. Earlier this year, Analyst1 reported that LockBit, the 800-lb gorilla in the ransomware space âcannot consistently publish stolen data ⊠due to limitations in its backend infrastructure and available bandwidth.â
However, while itâs perfectly plausible that ALPHV is suffering hardware woes, law enforcement action canât be ruled out. ALPHV would likely lose affiliates if it admitted to a brush with the law, so the ransomware gang is likely going to attribute the outage to something benignâwhether that is true or not. Equally, the silence from the FBI could mean everything and nothing. In January, the agency took down one of ALPHVâs contemporaries, Hive, and revealed it had penetrated the groupâs infrastructure six months prior:
Since late July 2022, the FBI has penetrated Hiveâs computer networks, captured its decryption keys, and offered them to victims worldwide, preventing victims from having to pay $130 million in ransom demanded. Since infiltrating Hiveâs network in July 2022, the FBI has provided over 300 decryption keys to Hive victims who were under attack. In addition, the FBI distributed over 1,000 additional decryption keys to previous Hive victims.
There were infiltration rumors about LockBit later in the year too, after it went inexplicably dark for two weeks. Analyst1âs undercover investigator revealed they had âreceived another message from a third party who indicated they may have hacked the gangâs infrastructure ⊠I believe the gang went dark to clean up the intrusion into its infrastructure.â
Analyst1 didnât say whether the third party that claimed to have hacked LockBit was a law enforcement agency, a criminal hacker, or another ransomware gang, but all are possibleâthere is no honor among thieves.
ALPHV would certainly be of great interest to both law enforcement and its rivals. Over the last 18 months it has been the second most dangerous ransomware group in the world, listing more victims on its leak site than every other group apart from LockBit.
The number of known monthly attacks by the group has increased steadily over the last 18 months, too.
Even if another ransomware gang isnât behind ALPHVâs woes, one of them is certainly looking to profit from it.
Bleeping Computer reports that LockBit has been attempting to recruit affiliates from ALPHV. The gang is reportedly offering the use of its data leak site and negotiation panel to ALPHV affiliates so they can resume negotiations with victims that have been disrupted. At least one victim previously listed on the ALPHV site is now listed on the LockBit site.
Whether ALPHVâs troubles are caused by tight-lipped law enforcement, an ironic lack of disaster recovery planning, or some other sleight of hand, any disruption to the ransomware ecosystem is a welcome early Christmas present in our book.