Wednesday, May 22, 2024

Ransomware Gang Files an SEC Complaint for Victim Not Disclosing Data Breach

Alphv Ransomware gang filed an SEC complaint against MeridianLink for not disclosing a data breach.

BlackCat, also known as ALPHV, BlackCat operates on the ransomware as a service (RaaS) model, with developers offering the malware for use by affiliates and taking a percentage of ransom payments.

The ransomware relies essentially on stolen credentials obtained through initial access brokers for initial access. The group operates a public data leak site to pressure victims to pay ransom demands.

MeridianLink (MLNK) is a leading provider of comprehensive loan origination solutions and an advanced digital lending platform designed to cater to the ever-changing needs of financial institutions.

The DataBreaches report states that Alphv has incorporated MeridianLink into its malicious website. However, the data breaches suggest that the attack was carried out with the involvement of another party.

According to reports, Alpha claimed that they did not encrypt any files, instead, they stole them and removed them from the system. It was also reported that no immediate security measures were taken in response to the incident.

When DataBreaches inquired whether MeridianLink had gotten in touch with AlphV or replied to them, they were informed that although there had been no communication between the attackers and the company, AlphV had received a message from MeridianLink at some time.

DataBreaches enquired of MeridianLink on the purported event and its management. They quickly reacted and said the following:

Ransomware Gang SEC Complaint
Data Breaches

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.


Latest articles

OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients'...

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a...

Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts

In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a...

Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments

Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident...

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread...

Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

A new critical vulnerability has been discovered in Fluent Bit's built-in HTTP server, which...

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles