RU

BlackCat

High ConfidenceHigh Threat

ALPHV • Noberus • UNC4466

BlackCat, also known as ALPHV and Noberus, is a sophisticated ransomware-as-a-service (RaaS) operation that emerged in November 2021. The group is believed to be comprised of former members of the DarkSide and BlackMatter ransomware gangs, and it is considered by some to be a direct successor to these now-defunct operations. BlackCat's ransomware is notable for being written in the Rust programming language, which allows for greater customization and improved performance across a variety of operating systems. The group operates on a RaaS model, providing its ransomware to affiliates in exchange for a share of the profits. BlackCat is known for its aggressive tactics, which include double and triple extortion techniques. In addition to encrypting victim data, the group exfiltrates sensitive information and threatens to publish it on their data leak site. They have also been observed launching distributed denial-of-service (DDoS) attacks against their victims to further pressure them into paying the ransom. The U.S. Department of State has offered a reward of up to $10 million for information leading to the identification or location of the group's leaders. In March 2024, following a major attack on Change Healthcare, a subsidiary of UnitedHealth Group, BlackCat's infrastructure was disrupted by law enforcement. The group subsequently announced that it was shutting down its ...

Origin: Russia
Sponsor: Cybercriminal (No State Sponsor)
Active: 2021 - Present
Victims: 500+ organizations
Advanced
Active
Financial Gain
Risk Assessment
84
Composite Risk Score
High Risk
ARCS Compliance88
Escalation Risk85
Grievance Index72
Infrastructure Impact90
History & Evolution

BlackCat, also known as ALPHV and Noberus, is a sophisticated ransomware-as-a-service (RaaS) operation that emerged in November 2021. The group is believed to be comprised of former members of the DarkSide and BlackMatter ransomware gangs, and it is considered by some to be a direct successor to these now-defunct operations. BlackCat's ransomware is notable for being written in the Rust programming language, which allows for greater customization and improved performance across a variety of operating systems. The group operates on a RaaS model, providing its ransomware to affiliates in exchange for a share of the profits. BlackCat is known for its aggressive tactics, which include double and triple extortion techniques. In addition to encrypting victim data, the group exfiltrates sensitive information and threatens to publish it on their data leak site. They have also been observed launching distributed denial-of-service (DDoS) attacks against their victims to further pressure them into paying the ransom. The U.S. Department of State has offered a reward of up to $10 million for information leading to the identification or location of the group's leaders. In March 2024, following a major attack on Change Healthcare, a subsidiary of UnitedHealth Group, BlackCat's infrastructure was disrupted by law enforcement. The group subsequently announced that it was shutting down its ...

Targeting

Target Sectors

HealthcareCritical InfrastructureGamingHospitalityGovernment

Target Regions

GlobalUnited States
Attribution & Affiliations

Attributed to Cybercriminal (No State Sponsor) (Russia). Attribution confidence: High.

Intelligence Assessment
High
Threat Level
Moderately
Targeting
Moderately
Adaptability
High
Persistence
Periodic
Op Tempo
Active (Disrupted)
Status

Future Outlook

BlackCat is expected to continue operations targeting Healthcare sectors.

Timeline of Key Events
2021
Major

First observed activity of BlackCat

2024
Moderate

Continued active operations