ALP-001 is a ransomware operator currently active on public leak sites. Darkfield has indexed 17 public victims claimed by this operator between March 21, 2026 and April 8, 2026. ALP-001 is an emerging ransomware group first observed in March 2026 with limited documented activity, having targeted only five known victims to date with a focus on financially motivated cybercrime. Due to the group's recent emergence and low victim count, their country of origin, operational structure, and potential affiliations remain unknown with no public documentation from major security firms or law enforcement agencies regarding their organizational structure. Their attack methodology, encryption techniques, and initial access vectors have not been publicly analyzed or reported by reputable security researchers, though their targeting pattern suggests a preference for technology and manufacturing sectors across developed nations including the United States, Japan, China, France, and Italy. No notable campaigns, high-profile incidents, or significant ransoms have been publicly documented for this group, and no law enforcement actions have been reported against ALP-001. The group's current operational status remains unclear due to limited public intelligence and their recent emergence in the threat landscape.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.