New Data Leak Site Uncovered Linked to Active Initial Access Broker

Related

Female Cybersecurity Leaders to Watch in Minnesota

Minnesota’s cybersecurity leadership strength shows up across agriculture, banking,...

Google Deploys Gemini AI to Monitor Dark Web for Cyber Threats

What happened Google has deployed Gemini AI agents within its...

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

What happened Infinite Campus, a major U.S. K-12 student information...

Dutch Ministry of Finance Discloses Breach Affecting Employees

What happened The Dutch Ministry of Finance confirmed that some...

Female Cybersecurity Leaders to Watch in Arizona

Arizona’s cybersecurity leadership landscape continues to expand alongside its...

Share

What happened

Researchers uncovered a new Tor-based data leak site called “ALP-001”, which is directly linked to an active Initial Access Broker (IAB) operating on underground forums. The platform, launched around March 22, 2026, markets itself as both a “Data Leaks / Access Market,” signaling a shift from simply selling access to compromised networks toward full-scale extortion. Investigators from ReliaQuest tied the site to a known threat actor by matching contact identifiers used across dark web forums, confirming the group had been active since at least mid-2024. Evidence showed overlap between previously sold access and newly listed victims on the leak site, indicating the group is now exposing or monetizing stolen data after gaining access. The actors primarily target internet-facing enterprise systems such as VPNs, Citrix gateways, FTP/SSH servers, and remote access infrastructure, making this evolution a significant escalation in their operations. 

Who is affected

Organizations with exposed or vulnerable internet-facing infrastructure—particularly those using VPNs, Citrix, or remote access gateways—are affected, as these are the primary targets of the linked access broker. 

Why CISOs should care

The development shows how threat actors are merging initial access brokering with data leak site operations, increasing pressure on victims by combining intrusion, data theft, and public exposure into a single extortion model. 

3 practical actions

  1. Secure internet-facing systems. Patch and harden VPNs, Citrix, and remote access infrastructure frequently targeted by access brokers. 
  2. Monitor for persistent access. Look for unauthorized sessions, abnormal privileged activity, and suspicious outbound transfers. 
  3. Enforce strong authentication controls. Apply multi-factor authentication across all remote access points to reduce compromise risk. 

For more coverage of major incidents and threat activity, explore our reporting on Cyberattacks.