Africahackon Intel logo
AFRICAHACKONThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
Back to Dashboard

BlackCat (ALPHV)

active

Also known as: ALPHV, Noberus

BlackCat/ALPHV is a sophisticated Ransomware-as-a-Service operation written in Rust, making it cross-platform capable. Known for triple extortion tactics including data encryption, data theft threats, and DDoS attacks.

First Seen

2021-11

Last Activity

2025-01

Target Regions

3 regions

Industries

5 sectors

HealthcareLegal ServicesTechnologyEnergyRetail
Attack Chain (MITRE ATT&CK)
Visual representation of the attack phases and techniques used by BlackCat (ALPHV)

Click on a phase to view details and MITRE ATT&CK technique IDs

Tactics & Techniques
MITRE ATT&CK mapped tactics and techniques used by this threat actor
Technique IDNameTacticDescriptionReference
T1078Valid AccountsInitial AccessUses compromised or purchased valid credentialsMITRE
T1027Obfuscated Files or InformationDefense EvasionRust-based binary with heavy obfuscationMITRE
T1486Data Encrypted for ImpactImpactCross-platform encryption using AESMITRE
Indicators of Compromise (IOCs)
Known IOCs associated with BlackCat (ALPHV) operations
TypeValueDescriptionLast SeenActions
hashb2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3ALPHV ransomware binary2025-01-08
domainalphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad[.]onionTor leak site—

IOCs are defanged for safety. Click copy to get the clean value.

Detection Guidance
SIEM and EDR detection recommendations for identifying BlackCat (ALPHV) activity
  • 1
    Monitor for bcdedit safe mode boot modifications
  • 2
    Detect Rust-based executables with high entropy
  • 3
    Alert on mass file access patterns
  • 4
    Monitor for ExMatter data exfiltration tool
Mitigation, Containment & Recovery
Step-by-step guidance for responding to and recovering from this ransomware attack
  • 1
    Isolate infected systems immediately
  • 2
    Block all IOCs at network perimeter
  • 3
    Preserve evidence for forensic analysis
Africahackon Intel logoAFRICAHACKONIntel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

Developed by @mor3cod3

@africahackon254
© 2026 Africahackon Intel