Tuesday, February 25, 2025
HomeCyber Security NewsRansomware Gang Files an SEC Complaint for Victim Not Disclosing Data Breach

Ransomware Gang Files an SEC Complaint for Victim Not Disclosing Data Breach

Published on

SIEM as a Service

Follow Us on Google News

Alphv Ransomware gang filed an SEC complaint against MeridianLink for not disclosing a data breach.

BlackCat, also known as ALPHV, BlackCat operates on the ransomware as a service (RaaS) model, with developers offering the malware for use by affiliates and taking a percentage of ransom payments.

The ransomware relies essentially on stolen credentials obtained through initial access brokers for initial access. The group operates a public data leak site to pressure victims to pay ransom demands.

MeridianLink (MLNK) is a leading provider of comprehensive loan origination solutions and an advanced digital lending platform designed to cater to the ever-changing needs of financial institutions.

The DataBreaches report states that Alphv has incorporated MeridianLink into its malicious website. However, the data breaches suggest that the attack was carried out with the involvement of another party.

According to reports, Alpha claimed that they did not encrypt any files, instead, they stole them and removed them from the system. It was also reported that no immediate security measures were taken in response to the incident.

When DataBreaches inquired whether MeridianLink had gotten in touch with AlphV or replied to them, they were informed that although there had been no communication between the attackers and the company, AlphV had received a message from MeridianLink at some time.

DataBreaches enquired of MeridianLink on the purported event and its management. They quickly reacted and said the following:

Ransomware Gang SEC Complaint
Data Breaches

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.

Latest articles

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...

Poseidon Stealer Targets Mac Users via Fake DeepSeek Website

Cybersecurity researchers uncovered a sophisticated malware campaign targeting macOS users through a fraudulent DeepSeek.ai...

Beware of Fake Job Interview Challenges Targeting Developers to Deliver Malware

A new wave of cyberattacks, dubbed "DeceptiveDevelopment," has been targeting freelance developers through fake...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...

Poseidon Stealer Targets Mac Users via Fake DeepSeek Website

Cybersecurity researchers uncovered a sophisticated malware campaign targeting macOS users through a fraudulent DeepSeek.ai...