Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/New Data Leak Site Linked to Active Initial Access Broker
Threats

New Data Leak Site Linked to Active Initial Access Broker

On March 22, 2026, a new Tor-based leak site named “ALP-001” surfaced on the dark web, marking a notable development in the cybercriminal underground. The site openly markets itself as a...

Sarah simpson
Sarah simpson
March 24, 2026 4 Min Read
0 0

On March 22, 2026, a new Tor-based leak site named “ALP-001” surfaced on the dark web, marking a notable development in the cybercriminal underground. The site openly markets itself as a “Data Leaks / Access Market,” a detail further explored in a recent report.

The emergence of this platform points to a growing trend where established threat actors who traditionally sell corporate network access are now pushing into full-scale extortion.

Security researchers warn this could represent a significant shift in how initial access brokers operate, merging data theft with victim exposure for maximum leverage.

ALP-001 did not appear out of nowhere. The site carries clear markers of a well-organised threat actor who has been building a presence across multiple dark web forums since at least July 2024.

During that time, the group was primarily known for selling unauthorised access to compromised enterprise systems, with a particular focus on internet-facing perimeter devices and remote access gateways.

This move marks a sharp escalation in intent, suggesting the group now views extortion as a core part of its operation.

ReliaQuest analysts identified ALP-001 and directly tied the group to an active Initial Access Broker operating across prominent underground forums, including Exploit and DarkForums.

By cross-referencing the Tox and Session IDs displayed on the leak site, researchers confirmed that the same contact identifiers were already being used by a known IAB forum account.

This group had previously gone by the names “Alpha Group” and “DGJT Group,” giving investigators enough historical data to construct a timeline of activity reaching back almost two years.

🚨 Unmasking the new data leak site: ALP-001

A new Tor-based leak site, “ALP-001,” surfaced yesterday marketing itself as a “Data Leaks / Access Market.” But who are they?

ReliaQuest directly tied this group to an active Initial Access Broker (IAB) on underground forums. 👇… pic.twitter.com/f1uyjM3Yl4

— ReliaQuest Threat Research (@ReliaQuestTR) March 23, 2026

A strong piece of corroborating evidence emerged when analysts compared the victims listed on ALP-001 against previous access sale posts on underground forums.

A French manufacturing company with reported annual revenues of $543 million, shown on the leak site as a new victim, matched exactly with an access sale the same forum account posted in January 2026.

This direct link between the leak site and forum activity left little doubt about the attribution and confirmed the group’s transition from access selling to data extortion.

The attack surface this group targets is broad and deliberate. The IAB has historically profited from compromised perimeter technologies, focusing on widely used enterprise infrastructure that grants deep access to corporate environments once breached.

Their known attack vectors span FTP and SSH servers, Fortinet and FortiGate VPN appliances, Cisco equipment, Citrix and RDWeb gateways, and GlobalProtect remote access systems.

These targets are picked carefully because they are almost always internet-facing, carry significant privileges, and appear consistently across large organisations worldwide.

Dark Web Footprint and Growing Extortion Model

ReliaQuest analysts noted that ALP-001 has been connected to at least 10 IAB accounts spread across six dark web forums, with the group’s earliest known activity dating to July 2024.

Across these accounts, the group repeatedly advertised unauthorised access to enterprise organisations through compromised FTP servers, Fortinet/FortiGate VPNs, GlobalProtect, and Citrix environments.

This level of activity across multiple platforms signals a threat actor who has deliberately maintained parallel identities to extend reach and reduce the risk of being disrupted on any single forum.

What makes this escalation more concerning is the group’s established credibility within criminal circles. On underground forums, the group operated with escrow-verified status, meaning buyers trusted them to deliver what they promised.

While their actual data exfiltration capabilities have not been confirmed, the public listing of victims on a Tor-based site strongly suggests they are either already in possession of stolen data or working to obtain it shortly after gaining initial access.

Defenders facing this threat should audit and patch all internet-facing edge devices, particularly Fortinet, Cisco, and Citrix solutions, as these represent the group’s most frequently exploited entry points.

Security teams should also hunt for signs of persistent access, including unauthorised sessions, unusual outbound transfers over FTP or SCP, and irregular privileged account behaviour.

Enforcing multi-factor authentication on all remote access points and conducting thorough privileged account audits are critical steps organisations must take to reduce exposure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitPatchSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Roundcube Webmail Security Updates Patch Critical Vulner

Next Post

Google Gemini AI Scans Dark Web Posts to Detect Threats

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us