BlackCat/ALPHV attacks Algeiba
The BlackCat/ALPHV Ransomware Gang's Attack on Algeiba
The BlackCat/ALPHV ransomware gang has attacked Algeiba. Algeiba is a technology solutions provider headquartered in Buenos Aires, Argentina. It offers its customers infrastructure transformation, business intelligence, cybersecurity, and architecture and development. BlackCat/ALPHV posted Algeiba to its data leak site on July 13th, threatening to publish all stolen data by July 15th. It is currently unclear whether the ransomware gang has published the stolen data.
Overview of BlackCat/ALPHV Ransomware
First observed in late 2021, BlackCat/ALPHV employs a well-developed RaaS (Ransomware-as-a-Service) platform that encrypts by way of an AES algorithm where the AES key is encrypted using an RSA public key. BlackCat/ALPHV has the ability to disable security tools and evade analysis. BlackCat/ALPHV is thought to be the first ransomware group using RUST, a secure programming language that offers exceptional performance for concurrent processing. The ransomware also leverages Windows scripting to deploy the payload and to compromise additional hosts.
Links to Previous Ransomware Campaigns
The developers have also been linked to DarkSide/BlackMatter ransomware attacks and may simply be a rebranding of those campaigns.
Double Extortion Schemes
BlackCat/ALPHV also exfiltrates victim data prior to the execution of the ransomware – including from cloud-based deployments - to be leveraged in double extortion schemes to compel payment of the ransom demand. They have one of the more generous RaaS offerings, offering as much as 80-90% cut to affiliates. BlackCat/ALPHV is also noted for putting their leaks website on the public web instead of dark web, bringing increased visibility and pressure on impacted organizations to pay the ransom demand.
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!