LoanDepot — ALPHV ransomware
ALPHV ransomware encrypted LoanDepot's systems in January 2024, forcing a multi-week portal outage and exposing full mortgage dossiers on 16.9 million customers.
- Target
- LoanDepot — ALPHV ransomware
- Date public
- 8 January 2024
- Sector
- Financial Services
- Attack type
- Ransomware
- Threat actor
- ALPHV / BlackCat
- Severity
- High
- Region
- United States
LoanDepot is one of the largest non-bank mortgage lenders in the United States. In January 2024 a ransomware group called ALPHV — also known as BlackCat — encrypted its systems and forced its online payment portal and customer-service operations offline for several weeks. Customers who owed mortgage payments couldn't pay online; the company had to manually process payment deferrals to avoid late-fee damage to customers who were trying to pay but couldn't. The data side was worse. The attackers stole personal records on roughly 16.9 million current and former customers — the kind of information collected during a mortgage application: name, address, date of birth, Social Security number, and financial account numbers. That's as complete a dossier as exists for most people. LoanDepot had to offer two years of credit monitoring to nearly 17 million people and faced multiple class-action lawsuits. The breach came during a wave of January 2024 ransomware attacks on US mortgage companies that prompted fresh federal guidance on cyber resilience in non-bank mortgage servicers.
What happened
On 8 January 2024 LoanDepot, Inc. — one of the United States’ largest non-bank mortgage lenders and servicers — filed an 8-K with the Securities and Exchange Commission disclosing a material cybersecurity incident. The filing, submitted under the SEC’s new mandatory cyber-disclosure rules that had taken effect on 15 December 2023, stated that LoanDepot had identified ransomware encrypting portions of its IT environment and had taken affected systems offline to contain the spread.
The systems that went offline included LoanDepot’s customer-facing loan-servicing portal and its payment-acceptance infrastructure. Customers who owed mortgage payments could not pay online or through the automated phone system; the company created manual processing lanes and publicly committed to waiving late fees for affected customers during the outage period. The disruption lasted several weeks, with full system restoration occurring through late January and into February 2024.
ALPHV, the ransomware-as-a-service group also known as BlackCat, listed LoanDepot on its dark-web leak site in the days following the incident disclosure, claiming responsibility and implying possession of stolen data. In a subsequent notification filed with state attorneys-general and sent to affected individuals, LoanDepot disclosed that the attacker had exfiltrated personal data on approximately 16.9 million current and former customers. The dataset included names, addresses, dates of birth, phone numbers, email addresses, Social Security numbers, and financial account numbers — a near-complete mortgage-application file for each affected individual.
LoanDepot offered affected customers 24 months of credit monitoring and identity-restoration services and faced multiple class-action lawsuits in state and federal courts alleging inadequate data protection.
How it worked
ALPHV operates as a ransomware-as-a-service platform, providing ransomware tooling and infrastructure to affiliated operators who conduct the actual intrusions and negotiate ransoms in return for a percentage of proceeds. The group is technically sophisticated; its BlackCat ransomware is written in Rust, making it cross-platform and harder to detect than legacy C++ variants, and it has been observed using a range of initial-access methods including phishing, credential stuffing against exposed remote-access services, and exploitation of known vulnerabilities in VPN and firewall products.
The specific initial access vector for the LoanDepot intrusion was not disclosed in LoanDepot’s public filings. ALPHV’s operational pattern typically involves an extended pre-encryption phase — reconnaissance, credential escalation, lateral movement, identification and targeting of backup systems to limit recovery options — before executing the ransomware payload across the most operationally critical systems simultaneously. The fact that the encryption affected both LoanDepot’s operational systems and its customer-facing portal suggests broad domain access before deployment.
The mortgage sector is a particularly rich target for data-exfiltration ransomware because the underlying data held is unusually dense. A mortgage servicer holds, for each customer, essentially every piece of personal information needed for identity fraud, account takeover, and synthetic identity creation. The combination of the full dataset and a large customer base means the ALPHV leverage in the LoanDepot situation was high: 16.9 million detailed financial dossiers is a dataset with sustained dark-web resale value independent of the ransom outcome.
The LoanDepot incident arrived in the same compressed window as similar attacks on Mr. Cooper (November 2023), First American Financial (December 2023), and Fidelity National Financial (November 2023) — all major mortgage-sector players. The clustering suggested either coordinated targeting of the sector or a period in which ALPHV-affiliated actors specifically recognised mortgage servicers as underdefended high-value targets. The four incidents together exposed a combined dataset of tens of millions of mortgage customers.
Timeline
- Before January 2024 — ALPHV operators gain access to LoanDepot’s network; reconnaissance, lateral movement, and staging phase, duration not publicly confirmed.
- 8 January 2024 — LoanDepot detects ransomware encryption and takes affected systems offline; files an 8-K with the SEC under the new mandatory 4-business-day disclosure rule.
- 8–9 January 2024 — ALPHV lists LoanDepot on its leak site, claiming data theft.
- January–February 2024 — System restoration; LoanDepot operates manual payment-processing channels and waives late fees.
- February 2024 — Full system restoration substantially complete.
- May 2024 — LoanDepot notifies approximately 16.9 million affected individuals and files with state attorneys-general; offers 24 months of credit monitoring.
- 2024 — Multiple class-action lawsuits filed; US Treasury, CFPB, and FHFA publish fresh guidance on cyber resilience requirements for non-bank mortgage servicers.
What defenders should learn
The LoanDepot breach illustrates three issues that are specific to the non-bank financial-services context and one that is universal.
The mortgage-sector data density problem is worth stating plainly. A bank processes payments but typically does not hold a dossier-quality file on most customers. A mortgage originator and servicer holds everything: income, employment, assets, tax records, identity documents, financial account numbers. From an attacker’s perspective, a mortgage company’s customer database is as valuable a data target as a credit bureau. The security investment should reflect that value. Organisations that treat their mortgage-servicing data as ordinary customer PII rather than as the high-value financial dossier it actually is are systematically underinvesting in its protection.
The January 2024 clustering of mortgage-sector attacks is the second specific lesson. When multiple companies in the same sector are attacked in the same short window, the appropriate sector-wide response is immediate threat intelligence sharing and accelerated patching of any identified common vulnerability or configuration. The US mortgage sector’s information-sharing organisations — FS-ISAC, MISMO — have the infrastructure for this; the incidents suggest either that the infrastructure was not used effectively or that the shared attack surface (remote-access infrastructure, SaaS providers common to the sector) was not acted on quickly enough.
The SEC 8-K disclosure angle is a structural note rather than a security lesson. The LoanDepot filing was one of the first material cyber-incident disclosures under the SEC’s December 2023 mandatory rules. The speed and specificity of LoanDepot’s disclosure — compared to the pre-rule norm of delayed, vague notifications — demonstrates that mandatory disclosure rules change behaviour. Investors, customers, and regulators received timely notice that a material incident had occurred; LoanDepot’s executives were on record publicly while the incident was still live. That accountability dynamic is the intended outcome of mandatory disclosure.
The universal lesson is backup integrity and offline copies. Ransomware groups that use extended pre-encryption dwell periods specifically to identify and destroy backup infrastructure are well documented. Any organisation for which a multi-week system outage is operationally or financially material should maintain tested, offline, immutable backups that cannot be reached by a domain-level attacker — and should test those backups with realistic restoration drills that measure actual recovery time, not theoretical recovery-time objectives.
Sources
- LoanDepot SEC 8-K filing — January 2024 cybersecurity incident // primary
- BleepingComputer — LoanDepot ransomware attack impacts 16.9 million customers // reporting
- Krebs on Security — ALPHV BlackCat ransomware hits LoanDepot // reporting
- CFPB / FHFA guidance on cyber resilience in non-bank mortgage servicers // primary