• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Cyber Incident Review Board

    Australia Forms Cyber Incident Review Board to Strengthen Defences After Major Breaches

    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    Pheno, Infostealer, OTP

    New Infostealer Dubbed ‘Pheno’ Hijacks Windows’ Phone Link App to Steal MFA OTPs

    Ransomware Organization Sentencing

    Latvian Cybercriminal Jailed for Role in Multi-Million Dollar Ransomware Scheme

    Canvas cybersecurity incident

    Instructure Confirms Canvas Cybersecurity Incident, User Data Accessed

    Trellix, Source Code Repository Breach, Breach

    Trellix Confirms Source Code Repository Breach

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    cyber-enabled cargo theft

    FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

    RightsCon 2026

    Global Rights Event Scrapped in Zambia Amid Sudden Government Decision

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Cyber Incident Review Board

    Australia Forms Cyber Incident Review Board to Strengthen Defences After Major Breaches

    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    Pheno, Infostealer, OTP

    New Infostealer Dubbed ‘Pheno’ Hijacks Windows’ Phone Link App to Steal MFA OTPs

    Ransomware Organization Sentencing

    Latvian Cybercriminal Jailed for Role in Multi-Million Dollar Ransomware Scheme

    Canvas cybersecurity incident

    Instructure Confirms Canvas Cybersecurity Incident, User Data Accessed

    Trellix, Source Code Repository Breach, Breach

    Trellix Confirms Source Code Repository Breach

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    cyber-enabled cargo theft

    FBI Warns of Surge in Cyber-Enabled Cargo Theft Targeting Logistics Firms

    RightsCon 2026

    Global Rights Event Scrapped in Zambia Amid Sudden Government Decision

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Claude AI, Antropic, AI, Artificial Intelligence

    U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

    U.S. Government Sues TikTok, TikTok

    UK’s Online Age Checks Are Failing—Kids are Beating Them with AI, Fake Beards

    vulnerability patch wave

    NCSC Warns Organisations to Act Fast as Hidden Software Flaws Surface

    APRA AI risk warning

    Australia’s APRA Issues AI Risk Warning to Banks and Insurers

    Norway social media age limit

    Norway to Introduce Social Media Age Limit of 16, Platforms to Enforce Verification

    Facial Recognition Policy

    High Court Backs UK Police Use of Live Facial Recognition Technology

    CBI, Cyber Fraud Network, Chakra-V, SIM Card, Operation Chakra, Covid-19, Fraud

    Indian Agency Arrests Key SIM Card Supplier of a Broader Cyber Fraud Network

    UAE Cyber Security Council

    UAE Cyber Security Council Warns 1 in 4 Public Files Contain Sensitive Personal Data

    DDoS-for-Hire, Operation PowerOFF, Europol, U.S. Department of Justice

    75,000 DDoS-for-Hire Users Reprimanded as Authorities Seize Dozens of Domains

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    AI Chip, Chip Security Act

    Congress Wants a GPS Tracker on Every Advanced AI Chip America Exports

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily Dark Web News

‘Today FBI Got Him, Tomorrow They Will Get Me’: LockBit, BlackCat Unite to Form Cyber Cartel

The unexpected collaboration between LockBit and BlackCat raises significant concerns within the cybersecurity world.

Samiksha Jain by Samiksha Jain
December 22, 2023
in Dark Web News, Firewall Daily
0
LockBit and BlackCat
704
SHARES
3.9k
VIEWS
Share on LinkedInShare on Twitter

In the aftermath of a successful takedown of Alphv ransomware infrastructure, an unexpected alliance has emerged. LockBit and BlackCat/APLHV, two prominent hacker collectives, have come together in an attempt to establish a ransomware cartel, presenting a unified front against crackdowns like the recent FBI action targeting ALPHV’s leak website.

The announcement came through cryptic messages posted on the dark web, where these cybercriminals usually communicate and plan their illicit activities.

Amidst these shifts, social media is buzzing with reactions, discussing the dynamics of this collaboration.

Tim Pappa, a certified former FBI profiler specializing in cyber deception and online influence, shared insights with The Cyber Express.

“This exchange is surely designed to manage impressions. It’s not a private conversation. This is a performance. Well, we might be seeing a real agreement; the agreement is likely on Lockbit’s terms given what has happened. The Lockbit collective and Lockbitsupp have always been keenly focused on managing impressions. Historically, they are especially reactive to any criticism or question of trust or distrust among their affiliates.” The opportunity to appear to be a benefactor to the communities of affiliates and ransomware personalities is surely a gift for Lockbit, worth more than any ransom pay day. This is a narrative that is purely opportunistic for Lockbit.”

Expanding on this, he added, “The LockBit collective and Lockbitsup typically express themselves in terms of principle and honor. This situation is another reflection of that ethos. LockBit is essentially conveying that we are here for each other; one day, it might be me in BlackCat’s position, and we look out for each other. If the true terms of this so-called agreement, hashed out in secret, were revealed, ransomware communities would likely perceive it differently.”

report-ad-banner

On the other hand, a Cyble researcher aptly notes that the seemingly diplomatic discourse may be a strategic move by BlackCat to mitigate the fallout from LOCKBIT’s attempts to poach their affiliates.

According to him, the ongoing battle for affiliates became evident when LOCKBIT sought to recruit from N0_Esc4pe and BlackCat groups. Speculation arises as to whether some affiliates, seeking improved operational security, might have defected to LOCKBIT.

Despite BlackCat’s efforts to project business as usual on their leak site, signs of disorientation emerge. The intricate dance between these cyber adversaries underscores the constant evolution and strategic maneuvers within the shadowy realms of ransomware cartels.

“Overall its a very preliminary situation and too early to conclude a collaboration because there are too many buts considering their history and being staunch rivals. We may have heard resentment from LOCKBIT affiliates but not much from BlackCat,” said Cyble Researcher. 

Another user, @3xp0rtblog notably pointed out Alphv’s admission of mistakes, appreciation for LockBit’s backing, and their joint stance against the FBI’s actions.

Meanwhile, vx-underground’s tweet emphasized the unexpected show of mutual respect between ALPHV and Lockbit’s leadership, hinting at talks to establish the ALPHV/Lockbit ransomware cartel.

A Veiled Acknowledgment: BlackCat’s Message of Unity

ALPHV/BlackCat initiated the conversation with an enigmatic message on the dark web, emphasizing the need for unity among hackers in the face of adversity.

The message contained a veiled reference to recent events, thanking LockBitSupp for their support. LockBit, in turn, replied with gratitude and expressed their willingness to support like-minded individuals.

LockBit and BlackCat

A bystander on the dark web, recognizing the unusual camaraderie between two fierce rivals, commended their professionalism.

LockBit responded, shedding light on the harsh reality of their perilous profession. They highlighted the constant threat of law enforcement agencies worldwide and advocated for unity to face these challenges collectively.

LockBit and BlackCat

“The FBI doesn’t catch us alone; it joins forces with all the special services in the world; we have to do the same,” warned LockBit.

LockBit and BlackCat

In a surprising turn, BlackCat responded, emphasizing the importance of mutual respect and collaboration. “LockBit’s right, we should all join a cartel or they’ll hunt us down one by one,” BlackCat asserted.

The statement suggests that these cybercriminals recognize the strength in numbers and the need to stand united against the growing pressure from global law enforcement agencies.

LockBit and BlackCat

This collaboration between LockBit and BlackCat is particularly alarming given their notorious histories. Both groups have been implicated in major cyberattacks, and their union could amplify the scale and impact of their future operations.

The potential formation of a hackers’ cartel raises concerns about the sophistication and audacity of cybercriminals, posing a significant challenge to cybersecurity efforts worldwide.

This development follows the recent disruption of the BlackCat ransomware group by the U.S. Department of Justice (DOJ) and the FBI’s efforts.

Despite the FBI’s success in developing a decryption tool and seizing the BlackCat threat group’s website, the hackers retaliated by reestablishing control and issuing a defiant message directed at the FBI.

Implications of LockBit and BlackCat Collaboration

The unexpected collaboration between LockBit and BlackCat raises significant concerns within the cybersecurity world. If this alliance materializes into a full-fledged hackers’ cartel, the potential consequences could be far-reaching and impactful, albeit challenging to predict with certainty.

Shift in Threat Landscape: The collaboration signifies a strategic shift in the tactics employed by cybercriminals. Traditionally viewed as individual entities competing for dominance, this collaboration highlights a recognition among hackers that collective strength may provide a more enhanced defense against law enforcement efforts.

Increased Operational Scale: A merger between LockBit and BlackCat would likely result in a considerable increase in operational scale and sophistication. Combining the expertise and resources of two formidable groups could lead to more potent and widespread cyberattacks, posing a heightened challenge for cybersecurity professionals and organizations.

Global Cybersecurity Challenges: The formation of a hackers’ cartel would necessitate an enhanced, coordinated response from global cybersecurity forces. The collaboration of two major threat groups could potentially lead to a surge in cyber threats, requiring international cooperation to mitigate the risks effectively.

Adaptation of Defense Strategies: The cybersecurity community would need to adapt its defense strategies to counter this evolving threat landscape. Collaboration among cybercriminals demands a mature and united response from defenders, emphasizing the importance of information sharing and joint efforts in mitigating the impact of cyber threats.

Increased Regulatory Scrutiny: The collaboration may prompt increased regulatory scrutiny and international collaboration among law enforcement agencies. As cybercriminals join forces, governments, and regulatory bodies are likely to intensify efforts to strengthen legal frameworks and enhance cross-border cooperation to combat cybercrime effectively.

Heightened Importance of Cybersecurity Education: In the face of a growing and collaborative cyber threat, the importance of cybersecurity education and awareness becomes even more critical. Businesses, governments, and individuals must prioritize cybersecurity measures to minimize vulnerabilities and potential impacts of cyberattacks.

The impact of this unholy alliance remains to be seen, but one thing is certain: the digital world is witnessing a new era of collaboration among cybercriminals that demands a united response from global authorities.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: ALPHV BlackCatCyberattackcybersecurity newshacker groupsLockBitLockBit and BlackCatThe Cyber ExpressThe Cyber Express News
Previous Post

Teen GTA 6 Hacker Sentenced to Life in Hospital Prison

Next Post

First American Financial Confirms Cyberattack, Initiates System Shutdown

Next Post
First American cyberattack

First American Financial Confirms Cyberattack, Initiates System Shutdown

Sectoral Threat Reports

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Cyber Incident Review Board
Cyber News

Australia Forms Cyber Incident Review Board to Strengthen Defences After Major Breaches

May 6, 2026
Claude AI, Antropic, AI, Artificial Intelligence
Cyber Essentials

U.S. Will Now Examine National Security Implications of New AI Models, Pre-Release

May 5, 2026
Pheno, Infostealer, OTP
Cyber News

New Infostealer Dubbed ‘Pheno’ Hijacks Windows’ Phone Link App to Steal MFA OTPs

May 5, 2026
Ransomware Organization Sentencing
Cyber News

Latvian Cybercriminal Jailed for Role in Multi-Million Dollar Ransomware Scheme

May 5, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information