Also known as: ALPHV, Noberus, UNC4466, Scattered Spider affiliate, ALPHV-ng, AlphaV, AlphaVM
First major ransomware written in Rust for cross-platform capability (Windows, Linux, VMware ESXi). Supports multiple encryption modes and customizable per-victim configurations.
Custom .NET data exfiltration tool that selectively steals documents, databases, and sensitive files before encryption. Uploads to attacker-controlled SFTP servers.
Custom info-stealer that targets Veeam backup credentials stored in SQL databases. Extracts backup admin credentials to enable deletion of backups before ransomware deployment.
Updated BlackCat encryptor variant with built-in tools for network propagation using Impacket's psexec and remcom for lateral movement during encryption.
Standard post-exploitation framework for lateral movement, persistence, and C2. Affiliates deploy custom Cobalt Strike loaders to evade signature-based detections.
Advanced C2 framework used by BlackCat affiliates as Cobalt Strike alternative. Harder for EDR solutions to detect due to syscall-level operation.
Deployed for LSASS memory dumping, DCSync attacks, and Kerberos ticket extraction. Used to achieve domain-wide administrative access before ransomware staging.
Primary remote access tool installed for persistent hands-on-keyboard access. Multiple affiliates deploy AnyDesk on dozens of systems for redundant access.
Remote management tool used by affiliates for persistent access. Harder to detect than C2 beacons since it generates legitimate-looking remote access traffic.
Tunneling tool used to create reverse tunnels to compromised systems, enabling access even when direct inbound connections are blocked by firewalls.
Network discovery tool used to map internal infrastructure, identify domain controllers, file servers, and backup systems for maximum impact targeting.
AD attack path mapping tool used to identify privilege escalation routes from initial access to domain admin for rapid domain compromise.
Credential recovery tool used to extract saved passwords from browsers, email clients, databases, and various Windows credential stores.
Cloud storage service abused for data exfiltration. Affiliates sync stolen data via MEGAsync client, taking advantage of the service's end-to-end encryption.
Used for disabling security tools, deleting shadow copies (vssadmin, wmic shadowcopy), modifying boot configuration, and deploying ransomware via scripts.
Used for remote ransomware deployment across domain-joined systems. Often combined with compromised domain admin credentials from DCSync attacks.
Some BlackCat affiliates (Scattered Spider/UNC3944) specialize in social engineering helpdesk staff for MFA bypass and SIM swapping to gain initial access.
| Type | Value |
|---|---|
| ip | 185[.]220[.]101[.]65 |
| ip | 193[.]42[.]33[.]14 |
| hash | 847f5914c43e17748b9d838c1e185b03 |
| hash | f8c08d00ff6e8c6adb1a93cd133b19302d0b651afd73ccb54e3b6ac6c60d99c6 |
| domain | alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad[.]onion |
| Domain / Host | Status |
|---|---|
185[.]220[.]101[.]65BlackCat affiliate Tor exit node used for initial access | offline |
193[.]42[.]33[.]14ExMatter data exfiltration server | offline |
alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad[.]onionBlackCat dark web leak site (.onion) | active |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
CISA - ALPHV BlackCat Ransomware
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a
FBI - ALPHV BlackCat Ransomware Indicators of Compromise
https://www.ic3.gov/Media/News/2022/220420.pdf
Microsoft - The many lives of BlackCat ransomware
https://www.microsoft.com/en-us/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/
DOJ: Two Americans Plead Guilty to ALPHV BlackCat Ransomware Attacks (Dec 2025)
https://www.justice.gov/opa/pr/two-americans-plead-guilty-targeting-multiple-us-victims-using-alphv-blackcat-ransomware
FBI Leads Alphv/BlackCat Takedown (Dec 2023)
https://www.techtarget.com/searchsecurity/news/366564014/FBI-leads-Alphv-BlackCat-takedown-decrypts-victims-data
BlackCat Ransomware Exit Scam (Mar 2024)
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-shuts-down-in-exit-scam-blames-the-feds/
Change Healthcare Attack Analysis (Feb 2024)
https://www.picussecurity.com/resource/blog/alphv-ransomware
FinCEN: ALPHV Most Prevalent Ransomware 2022-2024
https://www.fincen.gov/news/news-releases/fincen-issues-financial-trend-analysis-ransomware
Third Ransomware Negotiator Charged (Mar 2026)
https://www.hipaajournal.com/u-s-nationals-indicted-blackcat-ransomware-attacks/
Mandiant: UNC4466 ALPHV Affiliate Targets Veritas Backup (Mar 2024)
https://cloud.google.com/blog/topics/threat-intelligence/alphv-ransomware-backup/
Change Healthcare Cyberattack - AHA Report
https://www.aha.org/change-healthcare-cyberattack-underscores-urgent-need-strengthen-cyber-preparedness-individual-health-care-organizations-and
The Record - Ransomware incident responder gave info to BlackCat cybercriminals during negotiations
https://therecord.media/ransomware-blackcat-doj-incident-responder