WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Ransomware Group Files SEC Complaint: Vigilante Report or Blackmail, What’s Next?
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Ransomware Group Files SEC Complaint: Vigilante Report or Blackmail, What’s Next?

Author: Jennifer Walker

Created: Thursday, November 16, 2023 - 18:05

Categories: Cybersecurity, Security Preparedness

by Jennifer Lyn Walker

In the evolution of tactics, it wasn’t entirely surprising a few years ago when ransomware extortion groups attempted pressuring victims to pay by “notifying” their partners or customers. It’s rare that I’m surprised by such antics, but this recent tactic made me laugh out loud, literally. According to DataBreaches.net, the ALPHV/BlackCat ransomware group has filed a complaint with the SEC regarding the failure of one of its alleged victims for non-compliance – albeit prior to the rule going into effect in mid-December.

AlphV wrote: “We want to bring to your attention a concerning issue regarding MeridianLink’s compliance with the recently adopted cybersecurity incident disclosure rules.

It has come to our attention that MeridianLink, in light of a significant breach compromising customer data and operational information, has failed to file the requisite disclosure under Item 1.05 of Form 8-K within the stipulated four business days, as mandated by the new SEC rules.

Certainly, there is more to unpack here. But at first blush, this is not a bad strategy on the part of the group to bring undesired attention through a seeming “vigilante” report or just a natural evolution of blackmail tactics. Either way, if this becomes a trend and not just a one-off escapade, organizations finding themselves listed on the business end of a data leak site (actual or alleged) may be forced to report to their authorities out of an abundance of caution before outed by the adversary or otherwise feel compelled to consider paying the demand (not advised).

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar