Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Data Leak Site Linked to Active Cyber Threat

New Data Leak Site Linked to Active Cyber Threat

Posted on March 24, 2026 By CWS

A significant development in the cybercriminal landscape unfolded on March 22, 2026, with the introduction of a new Tor-based platform named ‘ALP-001’. This site, emerging on the dark web, is positioning itself as a ‘Data Leaks / Access Market’. This launch indicates a shift in the modus operandi of established threat actors, traditionally focused on selling access to corporate networks, now venturing into extortion.

The Rise of ALP-001

The platform’s appearance marks a pivotal moment, suggesting a new strategy for initial access brokers. Security experts highlight this as a potential shift towards combining data theft with exposure, maximizing pressure on victims. ALP-001 is linked to a threat actor with a history of activity on dark web forums dating back to July 2024. Initially, their focus was on selling unauthorized access to compromised systems, particularly targeting internet-facing devices.

This evolution into extortion signifies a strategic escalation. ReliaQuest analysts have traced ALP-001 back to a known Initial Access Broker active on various underground forums, strengthening the connection through matching Tox and Session IDs. Previously operating under names such as ‘Alpha Group’ and ‘DGJT Group’, the group has a well-documented history.

Linking Past and Present Activities

The discovery of ALP-001’s connection to past forum activities provides strong evidence of its operations. Analysts matched victims listed on ALP-001 to access sale posts on forums, including a French manufacturing company with $543 million in annual revenues. This alignment confirms the group’s transition from selling access to engaging in data extortion.

The group’s targeted attack surface is extensive, focusing on compromised perimeter technologies like FTP and SSH servers, Fortinet and FortiGate VPNs, Cisco equipment, and more. These targets are strategically chosen for their internet-facing nature and significant privileges, making them lucrative for exploitation.

Implications for Cybersecurity

ALP-001 is linked to at least 10 Initial Access Broker accounts across six dark web forums, with activity traced back to July 2024. The group has used these platforms to advertise unauthorized access to corporate environments, maintaining multiple identities to extend their reach and minimize disruption risks.

The credibility of this group in underground circles is notable, with escrow-verified status ensuring trust among buyers. While specific data exfiltration capabilities remain unconfirmed, their public victim listings on a Tor-based site imply possession or intent to acquire stolen data following initial access.

Defensive Measures

Organizations facing this threat should prioritize auditing and patching internet-facing edge devices, especially Fortinet, Cisco, and Citrix solutions, as these are frequently exploited. Security teams must also monitor for signs of persistent access, such as unauthorized sessions and unusual data transfers.

Implementing multi-factor authentication on remote access points and conducting comprehensive privileged account audits are critical to reducing exposure. Staying informed and proactive is essential in managing this evolving cyber threat landscape.

Cyber Security News Tags:ALP-001, cyber threat, Cybersecurity, dark web, data leak, Extortion, initial access broker, ReliaQuest, security research, underground forums

Post navigation

Previous Post: Google Chrome 146 Update Fixes Critical Security Flaws
Next Post: TeamPCP Exploits Checkmarx GitHub Actions with Stolen Credentials

Related Posts

New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability Cyber Security News
Hackers Exploit Critical Yearn Finance’s yETH Pool Vulnerability to Steal  Million in Ethereum Hackers Exploit Critical Yearn Finance’s yETH Pool Vulnerability to Steal $9 Million in Ethereum Cyber Security News
YouTube Down for Users Globally – Google Confirms Outage YouTube Down for Users Globally – Google Confirms Outage Cyber Security News
Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms Cyber Security News
kkRAT Employs Network Communication Protocol to Steal Clipboard Contents kkRAT Employs Network Communication Protocol to Steal Clipboard Contents Cyber Security News
New Windows 11 KB5074109 Update Breaks Systems New Windows 11 KB5074109 Update Breaks Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems
  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Resilient Tycoon2FA Phishing Platform Bounces Back Rapidly
  • Poland Sees Spike in Cyberattacks Targeting Energy Sector
  • Critical Dell Wyse Security Flaws Threaten Systems
  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark