R
Ransomwhere.org
Live MapLatest VictimsGroups
PaymentsTTPsIdentifyNewsDataAPI
LIVE
Ransomwhere.org

Real-time ransomware intelligence platform. Tracking threat actors, victims, and payments to raise awareness and help defend against ransomware attacks worldwide.

Platform

  • Live Map
  • Latest Victims
  • Groups
  • Payments
  • Identify
  • News

Resources

  • Data & Methodology
  • API Docs
  • NoMoreRansom
  • Ransomware.live
  • CISA Advisories

Data sourced from Ransomware.live API. For informational purposes only.

© 2026 Ransomwhere.org

Groups/alphv

alphv

Inactive

The operators of the ALPHV/BlackCat ransomware began their activity in December 2021, making posts on Dark Web forums to promote their affiliate program, offering other actors the opportunity to engage in a 'new type of ransomware family' developed from scratch using the Rust programming language.<BR> <BR> Some clear evidence indicates that the actors behind this new ransomware are not new to cybercrime, and there were links to other affiliate programs such as DarkSide, BlackMatter, and REvil. (After several attacks against large companies, these groups faced pressure and arrests, necessitating the termination of their operations).<BR> <BR> As a security measure, the operators of ALPHV implemented the requirement for the execution of the ransomware payload by providing an 'access token,' which is supplied by the owners of the Ransomware-as-a-Service to the affiliate. This token is added to the victim's ransom note so that they can contact the threat actor responsible for encrypting the data.<BR> <BR> ALPHV affiliates employ double and triple extortion techniques, meaning the publication of the company's name on leak sites, threats of data leakage, and lastly, threats of DDoS attacks against the organization.<BR>Source: https://github.com/crocodyli/ThreatActors-TTPs

731
Victims
5
Sites

Known Leak Sites

alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onionDLS
alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onionDLS
2cuqgeerjdba2rhdiviezodpu3lc4qz2sjf4qin6f7std2evleqlzjid.onionDLS
vqifktlreqpudvulhbzmc5gocbeawl67uvs2pttswemdorbnhaddohyd.onionDLS
alphvuzxyxv6ylumd2ngp46xzq3pw6zflomrghvxeuks6kklberrbmyd.onionDLS

Victims (731)

Live
ipmaltamira
alphvMX
Ewig Usa
alphvCN
SBM & Co
alphvGB
Petrus Resources Ltd
alphvUS
Kumagai Gumi Group
alphvJP
Allan Berger & Associates
alphvUS
Change Healthcare - Optum - UnitedHealth
alphvUS
verbraucherzentrale hessen
alphvDE
Electro Marteix
alphvES
Angeles Medical Centers
alphvUS
S+C Partners
alphvCA
Worthen Industries [FULL DATA]
alphvUS
Family Health center
alphvUS
ANDFLA SRL
alphvRO
Hardeman County Community Health Center
alphvUS
Worthen Industries [We're giving you one last chance to save your business]
alphvUS
KHSS (You have 3 days)
alphvUS
Austen Consultants
alphvUS
VSP Dental
alphvUS
Prudential Financial
alphvUS
LoanDepot
alphvUS
Rush Energy Services Inc [Time's up]
alphvCA
ASA Electronics [2.7 TB]
alphvUS
The Source
alphvCA
ArcisGolf
alphvUS

Top Targeted Countries

Unknown425
United States82
Canada25
Australia21
United Kingdom17

Profile

:
:
:
:

Activity

Total victims731
Countries affected56
Last seen