{"id":48393,"date":"2022-09-09T14:22:58","date_gmt":"2022-09-09T14:22:58","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks"},"modified":"2022-09-09T14:22:58","modified_gmt":"2022-09-09T14:22:58","slug":"lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/","title":{"rendered":"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The ransomware-as-a-service (RaaS) groups LockBit and ALPHV (aka BlackCat), among others, have been the focus of distributed denial-of-service (DDoS) attacks targeting their data leak sites, causing downtime and outages.<\/p>\n<p>The attacks have been monitored by Cisco Talos since Aug. 20 and include a wide range of other RaaS groups, including Quantum, LV, Hive, Everest, BianLian, Yanluowang, Snatch, and Lorenz.<\/p>\n<p>Forum posts by the<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/lockbit-3-debut-bug-bounty-program\" target=\"_blank\" rel=\"noopener\"> LockBit gang&#8217;s<\/a> technical support arm, &#8220;LockBitSupp,&#8221; indicate that the attacks have had a significant impact on the group&#8217;s activities, with nearly 1,000 servers targeting the leak site with close to 400 requests per second, researchers said.<\/p>\n<p>&#8220;Many of the aforementioned groups are still affected by connectivity issues and continue to face a variety of intermittent outages to their data leak sites, including frequent disconnects and unreachable hosts, suggesting that this is part of a sustained effort to thwart updates to those sites,&#8221; a Talos blog post <a href=\"https:\/\/blog.talosintelligence.com\/2022\/09\/ransomware-leaksite-ddos.html?&amp;web_view=true\" target=\"_blank\" rel=\"noopener\">explained<\/a> this week. <\/p>\n<p>The groups have responded in different ways, with some sites simply redirecting web traffic elsewhere, as in the case of the Quantum group, while others have beefed up DDoS protections.<\/p>\n<p>&#8220;Given that this activity is continuing to interrupt and hinder the ability for these affiliates and operators to <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/ransomware-operators-amp-up-pressure-on-victims-via-multi-extortion-attacks\" target=\"_blank\" rel=\"noopener\">post new victim information publicly<\/a>, we will likely continue to see various groups respond differently, depending on the resources available to them,&#8221; the blog post authors noted. <\/p>\n<h2 class=\"regular-text\">Shutdowns Offer Respite to Targeted Groups<\/h2>\n<p>Aubrey Perin, lead threat intelligence analyst at Qualys, says in the case of a DDoS attack on RaaS leak sites, victims of criminal hacking gang activity would clearly benefit. Perin notes that the report showcases how effective these attacks are at halting ransomware operations, with outages allowing defenders precious time to investigate.<\/p>\n<p>&#8220;If the leak sites are shut down, the victim&#8217;s infrastructure cannot be announced,&#8221; Perin says. &#8220;The purpose of these types of attacks is to interrupt the gangs&#8217; activities,&#8221; adding that if gangs cannot list victim information, then extortion tactics become far more difficult, and in some cases benign. <\/p>\n<p>However, Perin adds today&#8217;s bad actors are growing increasingly sophisticated and learning from mistakes on the fly, so they may find workarounds rather quickly.<\/p>\n<p>&#8220;More mature gangs have exemplified their agility to quickly re-organize and launch more sophisticated countermeasures for DDoS attacks,&#8221; Perin explains. Where initial ransomware authors used &#8220;spray-and-pray&#8221; methods, Perin points out that today&#8217;s bad actors carry out ransomware attacks as professional operations, with each applying their own &#8220;special sauce.&#8221;<\/p>\n<p>&#8220;Organizations each have their own strategies and protocols they follow, and RaaS is no different. Each gang finds <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/retreat-of-ransomware-roi-will-drive-bec-attacks-analyst-warns\" target=\"_blank\" rel=\"noopener\">what works best, develops strategy, and executes<\/a>,&#8221; Perin says. &#8220;Each gang&#8217;s operations are unique to that of other gangs.&#8221; <\/p>\n<p>Thus, Perin says, without a deeper understanding of a specific gangs&#8217; operating schedule and strategy, it is next to impossible to know the real impact to their operations.<\/p>\n<p>&#8220;That being said, these attacks certainly have the power to tarnish their reputations,&#8221; Perin notes. <\/p>\n<h2 class=\"regular-text\">Rival Extortion Groups, Government Agencies Could Benefit<\/h2>\n<p>When it comes to who&#8217;s behind the DDoS efforts, Rick Holland, CISO and vice president of strategy at Digital Shadows, says rival extortion crews and government agencies are two possible beneficiaries of attacks against data leak sites.<\/p>\n<p>&#8220;There is no honor among thieves, and there is a history of groups targeting each other,&#8221; he says. &#8220;On the government side, US Cyber Command commander General [Paul] Nakasone admitted to targeting ransomware groups last year, so it would be reasonable to assume that the US government has continued efforts to disrupt the adversaries.&#8221; <\/p>\n<p>Holland says extortionists need to think about their site&#8217;s resilience, just like legitimate businesses.<\/p>\n<p>&#8220;There are other ways for ransomware victims to interact with the actors,&#8221; he explains. &#8220;RaaS representatives are available on forums, and victim negotiations can still be taken offline through various messaging applications.&#8221;<\/p>\n<p>Andrew Hay, COO at LARES Consulting, adds that the targeted gangs are likely actively combatting the issue.<\/p>\n<p>&#8220;We&#8217;ll likely see the threat groups relocate their servers and services to a more distributed infrastructure to maintain availability, just like any organization would to stay operational,&#8221; he says. <\/p>\n<p>From Hay&#8217;s perspective, the report suggests that attacks directed at RaaS data leak sites are likely not going to fade away anytime soon, which could lead to a sort of underground competition for affiliates.<\/p>\n<p>&#8220;You don&#8217;t need to be the best, you just have to be better \u2014 or more available \u2014 than the other guy,&#8221; he says. <\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A sweeping effort to prevent a raft of targeted cybercrime groups from posting ransomware victims&#8217; data publicly is hampering their operations, causing outages.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/lockbit-alphv-ransomware-gang-leak-sites-ddos-attacks\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-48393","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-09T14:22:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks\",\"datePublished\":\"2022-09-09T14:22:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/\"},\"wordCount\":754,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0081f3369307d97f\\\/61e87ceed912285939eb7b20\\\/DDoS_Aleksey_Funtap_Alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/\",\"name\":\"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0081f3369307d97f\\\/61e87ceed912285939eb7b20\\\/DDoS_Aleksey_Funtap_Alamy.jpg\",\"datePublished\":\"2022-09-09T14:22:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0081f3369307d97f\\\/61e87ceed912285939eb7b20\\\/DDoS_Aleksey_Funtap_Alamy.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0081f3369307d97f\\\/61e87ceed912285939eb7b20\\\/DDoS_Aleksey_Funtap_Alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/","og_locale":"en_US","og_type":"article","og_title":"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-09T14:22:58+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks","datePublished":"2022-09-09T14:22:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/"},"wordCount":754,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/","url":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/","name":"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg","datePublished":"2022-09-09T14:22:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0081f3369307d97f\/61e87ceed912285939eb7b20\/DDoS_Aleksey_Funtap_Alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/lockbit-alphv-other-ransomware-gang-leak-sites-hit-by-ddos-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"LockBit, ALPHV &amp; Other Ransomware Gang Leak Sites Hit by DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48393"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48393\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}