Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
About
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

All Threat Actors

BlackCat

Also known as: ALPHV, Noberus, UNC4466, Scattered Spider affiliate, ALPHV-ng, AlphaV, AlphaVM

InactiveExpertRussia
0Campaigns
17Techniques
5IOCs
17Tools
0Matches
3Infrastructure
OverviewTechniquesToolsIOCsInfrastructureReferences

Overview

BlackCat/ALPHV executed an exit scam in March 2024 following the Change Healthcare attack (February 2024), which resulted in the largest healthcare data breach in U.S. history affecting approximately 190 million individuals. UnitedHealth paid $22 million ransom, but ALPHV operators kept the payment from their affiliate, posted a fake FBI seizure notice, and shut down operations. The group has been linked to over 1,000 victims globally and collected nearly $300 million in ransoms. Recent prosecutions (2025-2026) revealed insider threats: three U.S. cybersecurity professionals working as ransomware negotiators and incident responders secretly operated as ALPHV affiliates, extorting over $75 million from victims they were hired to help.

Motivations

Financial GainExtortion

Target Sectors

HealthcareFinancial ServicesGovernmentLegalTechnologyHospitalityManufacturingEnergyEducation

Activity Timeline

First Seen

Nov 2021

Last Seen

Mar 2024

Quick Facts

OriginRussia
Sophisticationexpert
StatusInactive

MITRE ATT&CK Techniques

(17)

Initial Access

T1190

Exploit Public-Facing Application

Exploit vulnerabilities in internet-facing applications to gain access.

T1078

Valid Accounts

Use legitimate credentials to authenticate and gain access.

T1133

External Remote Services

Abuse remote services like VPNs or RDP to gain access to the network.

Execution

T1059.001

PowerShell

Use PowerShell commands and scripts for execution and automation.

T1059.003

Windows Command Shell

Use cmd.exe to execute commands and batch scripts.

Impact

T1486

Data Encrypted for Impact

Encrypt victim data to disrupt availability, typically for ransom.

T1490

Inhibit System Recovery

Delete backups, shadow copies, or recovery partitions to prevent restoration.

T1489

Service Stop

Stop critical services to disrupt operations or aid in data destruction.

Other

T1562.001

T1562.001

T1567.002

T1567.002

T1484.002

T1484.002

T1550.001

T1550.001

Defense Evasion

T1027

Obfuscated Files or Information

Encrypt, encode, or obfuscate payloads and data to evade detection.

T1070

Indicator Removal

Delete or modify artifacts such as logs and files to hide activity.

Lateral Movement

T1021.001

Remote Desktop Protocol

Use RDP to connect to and control remote systems.

T1021.002

SMB/Windows Admin Shares

Use SMB and administrative shares (C$, ADMIN$) to access remote systems.

Credential Access

T1003.001

LSASS Memory

Access LSASS process memory to extract credential material.

Tools & Malware

(17)

BlackCat/ALPHV Ransomware

malwareMalicious

First major ransomware written in Rust for cross-platform capability (Windows, Linux, VMware ESXi). Supports multiple encryption modes and customizable per-victim configurations.

ExMatter

malwareMalicious

Custom .NET data exfiltration tool that selectively steals documents, databases, and sensitive files before encryption. Uploads to attacker-controlled SFTP servers.

Eamfo

malwareMalicious

Custom info-stealer that targets Veeam backup credentials stored in SQL databases. Extracts backup admin credentials to enable deletion of backups before ransomware deployment.

Sphynx

malwareMalicious

Updated BlackCat encryptor variant with built-in tools for network propagation using Impacket's psexec and remcom for lateral movement during encryption.

Cobalt Strike

frameworkLegitimate

Standard post-exploitation framework for lateral movement, persistence, and C2. Affiliates deploy custom Cobalt Strike loaders to evade signature-based detections.

Brute Ratel

frameworkLegitimate

Advanced C2 framework used by BlackCat affiliates as Cobalt Strike alternative. Harder for EDR solutions to detect due to syscall-level operation.

Mimikatz

frameworkLegitimate

Deployed for LSASS memory dumping, DCSync attacks, and Kerberos ticket extraction. Used to achieve domain-wide administrative access before ransomware staging.

AnyDesk

legitimate toolLegitimate

Primary remote access tool installed for persistent hands-on-keyboard access. Multiple affiliates deploy AnyDesk on dozens of systems for redundant access.

ScreenConnect (ConnectWise)

legitimate toolLegitimate

Remote management tool used by affiliates for persistent access. Harder to detect than C2 beacons since it generates legitimate-looking remote access traffic.

Ngrok

legitimate toolLegitimate

Tunneling tool used to create reverse tunnels to compromised systems, enabling access even when direct inbound connections are blocked by firewalls.

Advanced IP Scanner

legitimate toolLegitimate

Network discovery tool used to map internal infrastructure, identify domain controllers, file servers, and backup systems for maximum impact targeting.

BloodHound

frameworkLegitimate

AD attack path mapping tool used to identify privilege escalation routes from initial access to domain admin for rapid domain compromise.

LaZagne

frameworkLegitimate

Credential recovery tool used to extract saved passwords from browsers, email clients, databases, and various Windows credential stores.

Mega.nz

legitimate toolLegitimate

Cloud storage service abused for data exfiltration. Affiliates sync stolen data via MEGAsync client, taking advantage of the service's end-to-end encryption.

PowerShell

os utilityLegitimate

Used for disabling security tools, deleting shadow copies (vssadmin, wmic shadowcopy), modifying boot configuration, and deploying ransomware via scripts.

PsExec

legitimate toolLegitimate

Used for remote ransomware deployment across domain-joined systems. Often combined with compromised domain admin credentials from DCSync attacks.

Scattered Spider TTPs

scriptMalicious

Some BlackCat affiliates (Scattered Spider/UNC3944) specialize in social engineering helpdesk staff for MFA bypass and SIM swapping to gain initial access.

Indicators of Compromise

(5)
IOC values are defanged for safety
TypeValueNotes
ip185[.]220[.]101[.]65BlackCat affiliate Tor exit node used for initial access
ip193[.]42[.]33[.]14ExMatter data exfiltration server
hash847f5914c43e17748b9d838c1e185b03BlackCat ransomware Rust binary (MD5)
hashf8c08d00ff6e8c6adb1a93cd133b19302d0b651afd73ccb54e3b6ac6c60d99c6ExMatter data exfiltration tool (SHA-256)
domainalphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad[.]onionBlackCat dark web leak site (.onion)

Infrastructure

(3)
Domain values are defanged for safety
Domain / HostTypeStatusLast Checked
185[.]220[.]101[.]65

BlackCat affiliate Tor exit node used for initial access

ipofflineApr 2, 2026
193[.]42[.]33[.]14

ExMatter data exfiltration server

ipofflineApr 2, 2026
alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad[.]onion

BlackCat dark web leak site (.onion)

onionactiveApr 2, 2026

Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.

References

(12)

CISA - ALPHV BlackCat Ransomware

https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a

FBI - ALPHV BlackCat Ransomware Indicators of Compromise

https://www.ic3.gov/Media/News/2022/220420.pdf

Microsoft - The many lives of BlackCat ransomware

https://www.microsoft.com/en-us/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/

DOJ: Two Americans Plead Guilty to ALPHV BlackCat Ransomware Attacks (Dec 2025)

https://www.justice.gov/opa/pr/two-americans-plead-guilty-targeting-multiple-us-victims-using-alphv-blackcat-ransomware

FBI Leads Alphv/BlackCat Takedown (Dec 2023)

https://www.techtarget.com/searchsecurity/news/366564014/FBI-leads-Alphv-BlackCat-takedown-decrypts-victims-data

BlackCat Ransomware Exit Scam (Mar 2024)

https://www.bleepingcomputer.com/news/security/blackcat-ransomware-shuts-down-in-exit-scam-blames-the-feds/

Change Healthcare Attack Analysis (Feb 2024)

https://www.picussecurity.com/resource/blog/alphv-ransomware

FinCEN: ALPHV Most Prevalent Ransomware 2022-2024

https://www.fincen.gov/news/news-releases/fincen-issues-financial-trend-analysis-ransomware

Third Ransomware Negotiator Charged (Mar 2026)

https://www.hipaajournal.com/u-s-nationals-indicted-blackcat-ransomware-attacks/

Mandiant: UNC4466 ALPHV Affiliate Targets Veritas Backup (Mar 2024)

https://cloud.google.com/blog/topics/threat-intelligence/alphv-ransomware-backup/

Change Healthcare Cyberattack - AHA Report

https://www.aha.org/change-healthcare-cyberattack-underscores-urgent-need-strengthen-cyber-preparedness-individual-health-care-organizations-and

The Record - Ransomware incident responder gave info to BlackCat cybercriminals during negotiations

https://therecord.media/ransomware-blackcat-doj-incident-responder