WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Ransomware Awareness – New Extortion Tactic Uses Spoofed Website of Victim to Publish Stolen Data
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Ransomware Awareness – New Extortion Tactic Uses Spoofed Website of Victim to Publish Stolen Data

Author: Jennifer Walker

Created: Tuesday, January 3, 2023 - 20:11

Categories: Cybersecurity, Security Preparedness

ALPHV/BlackCat, one of 2022’s most notable ransomware menaces, continues to evolve its data extortion tactics in ongoing attempts to coerce victims into paying. The most recent tactic involves the group creating a replica of a victim’s website to publish stolen data openly on the internet. While the domain name and appearance of the website closely resembles the victim’s legitimate site, ALPHV uses its own directory structure to organize the leaked data. At this time, it is unclear if this extortion tactic will prove successful, but this development does highlight the need for organizations to protect against domain spoofing as part of a ransomware resilience strategy.

As reported in WaterISAC’s Security & Resilience Update on December, 20, 2022, ALPHV/BlackCat was responsible for the attack against Empresas Públicas de Medellín (EPM), the Colombian public energy, water, and gas provider in December. Additionally, Suffolk County New York suffered a persistent compromise lasting eight months and twenty-one days at the hands of ALPHV/BlackCat.

Members may wish to consider purchasing domain monitoring to protect your domain name from being spoofed. Likewise, for more resources to help increase resilience against ransomware, visit CISA’s StopRansomware page. Check out BleepingComputer for more.

Additional Security & Resilience Update resources on ALPHV/BlackCat Ransomware

  • Threat Awareness – Overview of BlackCat Ransomware (November 2, 2022)
  • Threat Awareness – Ransomware Groups Attempting to Destroy Data Rather than Encrypt to Ensure Payouts (September 27, 2022)
  • Threat Awareness – Emotet Botnet Now Delivering Quantum and BlackCat Ransomware (September 20, 2022)
  • FBI FLASH – BlackCat/ALPHV Ransomware Indicators of Compromise (April 21, 2022)

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar