beast is a ransomware operator currently active on public leak sites. Darkfield has indexed 75 public victims claimed by this operator between July 29, 2025 and May 21, 2026. The Beast ransomware group is a relatively new threat actor that emerged in July 2025, operating with apparent financial motivations through their ransomware campaigns. With limited public documentation available from major security agencies, the group has demonstrated activity primarily targeting victims across the United States, United Kingdom, Brazil, South Korea, and Argentina, accumulating approximately 65 known victims since their emergence. Their targeting pattern shows a focus on healthcare organizations, manufacturing companies, educational institutions, and construction firms, suggesting an opportunistic approach rather than highly specialized sector expertise. The group's recent emergence means there is insufficient public intelligence from CISA, FBI, Mandiant, or other established security researchers regarding their specific attack methodologies, initial access vectors, or technical capabilities. Given the timeline of their first observation in mid-2025, Beast represents an active and emerging threat with their current operational status remaining unclear due to limited threat intelligence reporting from authoritative sources.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.