brotherhood is a ransomware operator currently active on public leak sites. Darkfield has indexed 18 public victims claimed by this operator between October 10, 2025 and January 6, 2026. The Brotherhood ransomware group is a recently emerged financially-motivated cybercriminal organization first observed in October 2025, representing one of the newer entrants in the ransomware landscape. Given the group's recent emergence and limited public documentation from major security firms and law enforcement agencies, detailed information about their origin, country of operation, and specific affiliations remains largely unknown to open-source intelligence. Based on observed targeting patterns, the group appears to employ opportunistic attack methodologies, focusing primarily on English-speaking markets including the United States, Australia, and Canada, while also targeting victims in Germany and Switzerland, suggesting either broad-spectrum initial access capabilities or acquisition of access through underground markets. Their victim selection spans multiple sectors including business services, construction, transportation and logistics, and technology companies, indicating a non-discriminatory approach typical of many financially-motivated ransomware operations rather than targeted campaigns against specific industries. With only 18 documented victims since their October 2025 emergence, Brotherhood represents a relatively small-scale operation compared to established ransomware groups, and specific details regarding their encryption methods, data exfiltration practices, or extortion tactics have not been publicly documented by major threat intelligence providers. The group remains active as of the latest available intelligence, though their limited operational footprint and recent emergence means comprehensive analysis of their tactics, techniques, and procedures awaits further documentation by security researchers and law enforcement agencies.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.