mor3intel logo
mor3intelThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
InstagramTelegram
5 Active Threats
Back to Dashboard

BlackCat (ALPHV)

active

Also known as: ALPHV, Noberus

BlackCat/ALPHV is a sophisticated Ransomware-as-a-Service operation written in Rust, making it cross-platform capable. Known for triple extortion tactics including data encryption, data theft threats, and DDoS attacks.

First Seen

2021-11

Last Activity

2025-01

Target Regions

3 regions

Industries

5 sectors

HealthcareLegal ServicesTechnologyEnergyRetail
Attack Chain (MITRE ATT&CK)
Visual representation of the attack phases and techniques used by BlackCat (ALPHV)

Click on a phase to view details and MITRE ATT&CK technique IDs

Tactics & Techniques
MITRE ATT&CK mapped tactics and techniques used by this threat actor
Technique IDNameTacticDescriptionReference
T1078Valid AccountsInitial AccessUses compromised or purchased valid credentialsMITRE
T1027Obfuscated Files or InformationDefense EvasionRust-based binary with heavy obfuscationMITRE
T1486Data Encrypted for ImpactImpactCross-platform encryption using AESMITRE
Indicators of Compromise (IOCs)
Known IOCs associated with BlackCat (ALPHV) operations
TypeValueDescriptionLast SeenActions
hashb2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0c1d2e3ALPHV ransomware binary2025-01-08
domainalphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad[.]onionTor leak site—

IOCs are defanged for safety. Click copy to get the clean value.

Detection Guidance
SIEM and EDR detection recommendations for identifying BlackCat (ALPHV) activity
  • 1
    Monitor for bcdedit safe mode boot modifications
  • 2
    Detect Rust-based executables with high entropy
  • 3
    Alert on mass file access patterns
  • 4
    Monitor for ExMatter data exfiltration tool
Mitigation, Containment & Recovery
Step-by-step guidance for responding to and recovering from this ransomware attack
  • 1
    Isolate infected systems immediately
  • 2
    Block all IOCs at network perimeter
  • 3
    Preserve evidence for forensic analysis
mor3intel logomor3intel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

@mor3cod3@mor3cod3
© 2026 mor3intel