Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Data Leak Site Linked to Active Cyber Threat

New Data Leak Site Linked to Active Cyber Threat

Posted on March 24, 2026 By CWS

A significant development in the cybercriminal landscape unfolded on March 22, 2026, with the introduction of a new Tor-based platform named ‘ALP-001’. This site, emerging on the dark web, is positioning itself as a ‘Data Leaks / Access Market’. This launch indicates a shift in the modus operandi of established threat actors, traditionally focused on selling access to corporate networks, now venturing into extortion.

The Rise of ALP-001

The platform’s appearance marks a pivotal moment, suggesting a new strategy for initial access brokers. Security experts highlight this as a potential shift towards combining data theft with exposure, maximizing pressure on victims. ALP-001 is linked to a threat actor with a history of activity on dark web forums dating back to July 2024. Initially, their focus was on selling unauthorized access to compromised systems, particularly targeting internet-facing devices.

This evolution into extortion signifies a strategic escalation. ReliaQuest analysts have traced ALP-001 back to a known Initial Access Broker active on various underground forums, strengthening the connection through matching Tox and Session IDs. Previously operating under names such as ‘Alpha Group’ and ‘DGJT Group’, the group has a well-documented history.

Linking Past and Present Activities

The discovery of ALP-001’s connection to past forum activities provides strong evidence of its operations. Analysts matched victims listed on ALP-001 to access sale posts on forums, including a French manufacturing company with $543 million in annual revenues. This alignment confirms the group’s transition from selling access to engaging in data extortion.

The group’s targeted attack surface is extensive, focusing on compromised perimeter technologies like FTP and SSH servers, Fortinet and FortiGate VPNs, Cisco equipment, and more. These targets are strategically chosen for their internet-facing nature and significant privileges, making them lucrative for exploitation.

Implications for Cybersecurity

ALP-001 is linked to at least 10 Initial Access Broker accounts across six dark web forums, with activity traced back to July 2024. The group has used these platforms to advertise unauthorized access to corporate environments, maintaining multiple identities to extend their reach and minimize disruption risks.

The credibility of this group in underground circles is notable, with escrow-verified status ensuring trust among buyers. While specific data exfiltration capabilities remain unconfirmed, their public victim listings on a Tor-based site imply possession or intent to acquire stolen data following initial access.

Defensive Measures

Organizations facing this threat should prioritize auditing and patching internet-facing edge devices, especially Fortinet, Cisco, and Citrix solutions, as these are frequently exploited. Security teams must also monitor for signs of persistent access, such as unauthorized sessions and unusual data transfers.

Implementing multi-factor authentication on remote access points and conducting comprehensive privileged account audits are critical to reducing exposure. Staying informed and proactive is essential in managing this evolving cyber threat landscape.

Cyber Security News Tags:ALP-001, cyber threat, Cybersecurity, dark web, data leak, Extortion, initial access broker, ReliaQuest, security research, underground forums

Post navigation

Previous Post: Google Chrome 146 Update Fixes Critical Security Flaws
Next Post: TeamPCP Exploits Checkmarx GitHub Actions with Stolen Credentials

Related Posts

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users Cyber Security News
MomentProof Introduces AI-Resilient Asset Protection for AXA MomentProof Introduces AI-Resilient Asset Protection for AXA Cyber Security News
Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server Cyber Security News
Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Hackers Imitate OneNote Login to Steal Office365 & Outlook Credentials Cyber Security News
SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks Cyber Security News
DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw
  • HackerOne Employee Data Breach Exposes Sensitive Information
  • Enhanced Governance Critical for Securing AI Systems
  • Malicious Ads Lead to EDR-Disabling Malware via Huawei Driver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DoE Unveils Strategic 5-Year Energy Security Plan
  • TeamPCP Exploits LiteLLM via CI/CD Flaw
  • HackerOne Employee Data Breach Exposes Sensitive Information
  • Enhanced Governance Critical for Securing AI Systems
  • Malicious Ads Lead to EDR-Disabling Malware via Huawei Driver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark