Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Data Breaches»Ransomware Group ALPHV Introduces Data Leak API in a Revamped Extortion Approach

    Ransomware Group ALPHV Introduces Data Leak API in a Revamped Extortion Approach

    By NotesleuNo Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    The notorious ransomware collective, ALPHV, also known as BlackCat, is innovating its extortion methods with the introduction of an API for their leak site. This enhancement is aimed at increasing the exposure of their cyber-attacks, in an attempt to mount additional pressure on their victims to pay ransoms.

    The move comes in the wake of ALPHV’s recent breach of beauty giant, Estée Lauder, where the company dismissed any engagement with the threat actor’s efforts to negotiate a ransom payment.

    API calls and Python crawler under scrutiny

    Prominent researchers have recently discovered a new page with instructions for utilizing the API on the ALPHV/BlackCat data leak site. The purpose is to receive real-time updates about new victims.

    APIs, short for Application Programming Interfaces, are typically used to establish communication between two software components, conforming to predefined protocols and definitions.

    Cybersecurity research group, VX-Underground, was among the first to spot the new section on ALPHV’s site. However, the “feature” has been partially accessible for a few months, albeit not for the wider audience.

    The cybercriminal group released the API calls, assisting in acquiring various information about new victims added to their leak site or updates from a specific date. They also provided a Python-based crawler to facilitate the retrieval of the latest information on the data leak site.

    Ransomware Victims: A Declining Trend

    Although ALPHV did not provide any specific reason behind the release of the API, industry insiders speculate it could be due to the decrease in victims succumbing to ransomware demands.

    Coveware, a ransomware incident response firm, notes that the proportion of victims that suffered a ransomware attack and paid a ransom “declined to an all-time low of 34%” in this year’s second quarter.

    However, this does not mean that all ransomware gangs are suffering. Some are still raking in large sums by focusing their efforts on the supply chain to impact a greater number of organizations. For instance, the Clop ransomware group has reportedly made at least $75 million from their extensive MOVEit data theft campaign, potentially impacting hundreds of companies.

    In a show of defiance, Estée Lauder did not respond to any communications from ALPHV, firmly indicating that it would not negotiate with the attackers over the stolen files.

    This reaction enraged the ALPHV group, leading to a sarcastic message mocking the company’s security measures. The message indicated that the security experts hired in the aftermath of the breach were unsuccessful, as the network was still compromised.

    With the decline in ransom payment, ransomware groups are now compelled to devise innovative strategies to exert pressure and secure their desired funds. The practice of making leaked data easily accessible to a wider audience appears to be the latest pressure tactic from ransomware gangs. However, many cybersecurity experts believe such efforts are likely to prove futile in the long run.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 54
    Featured Ransomware Trending
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCybersecurity and Infrastructure Security Agency Report: Over Half of Cyberattacks Involve Legitimate Credentials
    Next Article New Nitrogen malware pushed via Google Ads for ransomware attacks

    Related Posts

    General News December 26, 2025

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    December 26, 2025
    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    General News December 26, 2025

    Kali Linux 2024.2: GNOME 46 and new security tools

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.