Incident Date:

April 16, 2022

World map









Berkeley, USA

California, USA

First Reported

April 16, 2022

Alternative Technologies Suffers Ransomware Attack

Alternative Technologies, a Bay Area nonprofit technology provider, has been targeted by the ransomware group Clop. The company, which has been serving the Bay Area since 1989, became a worker-owned cooperative in 2022 to ensure the continuation of its founder's legacy and provide stability for its employees.

Alternative Technologies is known for its dedication to nonprofits, having worked with some of the most progressive businesses and effective nonprofits in the Bay Area. The company's website features testimonials from satisfied clients, highlighting its knowledgeable technicians, caring approach, and professionalism.

The ransomware attack on Alternative Technologies is a reminder of the growing threat of cybercrime in the telecommunications sector. Ransomware attacks can severely impact business processes by rendering systems unusable and demanding payment in exchange for decryption keys. In 2023, ransomware payments surpassed $1 billion, marking a record peak following a decrease in 2022.

To mitigate the risk of ransomware attacks, organizations should implement best practices such as joining sector-based information sharing and analysis centers, employing artificial intelligence and machine learning technologies, and conducting regular cybersecurity assessments and training.

Alternative Technologies has not yet released a statement regarding the ransomware attack or its response. The company's website remains operational, but it is unclear whether the attack has affected its services or operations.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.