Blacktor is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 4 public victims claimed by this operator between December 30, 2021. Blacktor is a relatively obscure ransomware group that emerged in December 2021 with apparent financial motivations, having targeted a limited number of victims since its inception. The group's origin and potential state affiliations remain unclear due to limited public reporting from major cybersecurity firms and government agencies, though their operational structure appears to be that of a small independent operation rather than a large-scale Ransomware-as-a-Service model. Technical details regarding Blacktor's attack methodology, including their preferred initial access vectors, encryption techniques, and whether they employ double or triple extortion tactics, have not been extensively documented in public threat intelligence reports from established sources such as CISA, FBI, or major security research organizations. With only four known victims documented since their emergence, Blacktor has not achieved the notoriety of major ransomware families and lacks publicly reported high-profile campaigns or significant law enforcement actions. The group's current operational status remains uncertain due to the limited visibility into their activities and the absence of recent public reporting on their campaigns.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.