What is BlackCat Ransomware?
BlackCat Ransomware, also known as ALPHV, is a ransomware gang that first emerged in late 2021. The group operates under a RaaS model and utilizes a double extortion tactic. To gain initial access to a network, the hackers rely on stolen credentials obtained through access brokers. BlackCat has been linked to both DarkSide ransomware and BlackMatter ransomware suggesting that BlackCat is the successor or rebranding of both. BlackCat gained notoriety over the years by successfully extorting over 1,000 victims including Reddit, Moncler, Florida Int. University, Bandai Namco, and many more.
Read more about this ransomware variant HERE.
$5 to $10 Million Reward for BlackCat Ransom Gang
December 19, 2023, the Justice Department disrupted BlackCat operations, seized multiple ALPHV/BlackCat sites, and released a decryption tool for victims to use freely. This tool enabled over 500 victims in restoring their computer systems, sparing them from ransom demands amounting to approximately $99 million.
As of February 15, 2024, the US Department of State is offering a $5 million reward for information on associates involved in BlackCat attacks that leads to their arrest or conviction. Furthermore, a $10 million reward is being offered for any leads on BlackCat leaders that result in their arrest or conviction. This reward announcement aligns seamlessly with the FBI’s announcement of collaboration with law enforcement groups in Germany, Denmark, Australia, Spain, and the UK. This reward is provided through the Department of State’s Transnational Organized Crime Rewards Program (TOCRP), aimed at bolstering global law enforcement endeavors to dismantle transnational crime and apprehend fugitives.
In more recent news, BlackCat was identified as the perpetrator behind an attack on Change Healthcare, a subsidiary technology unit of UnitedHealth on February 21, 2024.







You want to enter in a fully burdened labor rate for this field. What that means is that you want to take the base hourly rate, plus 25-30% for employer payroll taxes, benefits, vacation/holiday time, etc.
Smoke testing is a type of software testing performed by Alvaka after a software patching sequence to ensure that the system is working correctly and to identify any misconfigurations or conflicts within the patched system.
This is a basic cost calculator for you to compute your typical monthly cost for patching your servers, PCs, laptops, tablets and associated application software. It also forms the basis for you to begin calculating your Return on Investment for software patching, or for comparison with alternatives to the manual process of patching operating systems and application software—such as Patch Management as a Service, also known as Vulnerability Management as a Service.
Smoke testing is a term used to describe the testing process for servers after patches are applied.