threatintel
actor tracker
All actors

DarkSide

darkside · primary source: Other · first observed 2020 · last observed 2021
RU · RussiaRansomwareModerate confidencelast cited May 6, 2021 · 5y ago

Russian-speaking ransomware-as-a-service operation active from August 2020 to May 2021, when an affiliate's compromise of Colonial Pipeline triggered the fuel-supply crisis on the U.S. East Coast and prompted a U.S. policy and law-enforcement response that drove the brand to shut down. Operationally rebranded as BlackMatter (July 2021-November 2021), then ALPHV/BlackCat (November 2021-March 2024) per consistent code, infrastructure, and operator overlap reported by multiple vendors.

Aliases

Carbon SpiderCrowdStrikeUNC2628Mandiant

Motivations

financial gain

Target sectors

energymanufacturingfinancialprofessional services

Target countries

USGBCAAUFR

Lineage & relationships

full graph →

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • DarkSide
  • Russia
  • financial gain
Infrastructure
  • darksidedxcftmqa.onion
  • athaliaoriginals.com
Victim
  • energy
  • manufacturing
  • financial
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Timeline

1 event

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
Name
power_encryptor.exe
family · DarkSide
DarkSide encryptor binary name observed across the intrusions Mandiant documented in 'Shining a Light on DARKSIDE' (May 11, 2021) - the public report on the Carbon Spider-aligned RaaS responsible for the Colonial Pipeline shutdown.
May 10, 2021Mandiant
Domain
darksidedxcftmqa[.]onion
family · DarkSide
DarkSide data-leak Tor hidden service URL embedded in victim ransom notes during the campaigns Mandiant profiled in its May 11, 2021 'Shining a Light on DARKSIDE' report covering UNC2628, UNC2659 and UNC2465 affiliates - the same RaaS used against Colonial Pipeline on May 7, 2021 (CISA AA21-131A).
May 10, 2021Mandiant
Domain
athaliaoriginals[.]com
family · DarkSide
DarkSide command-and-control domain documented in Mandiant's May 11, 2021 report on the DARKSIDE ransomware-as-a-service operation, contemporaneous with the Colonial Pipeline incident addressed in joint CISA/FBI advisory AA21-131A.
May 10, 2021Mandiant

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). DarkSide — actor profile. Retrieved from https://threatintel.local/actors/darkside

latest cited activity · 2021-05-07 · 3 cataloged indicators