cipherforce is a ransomware operator currently active on public leak sites. Darkfield has indexed 6 public victims claimed by this operator between February 23, 2026. CipherForce is a relatively new ransomware group that emerged in February 2026, appearing to be financially motivated based on their targeting patterns and operational characteristics. Given their recent emergence and limited public documentation, details about their specific country of origin and affiliations remain unclear, though their targeting of victims across the United States, United Arab Emirates, India, China, and Vietnam suggests either a geographically distributed operation or deliberate international scope. With only six known victims documented to date, the group appears to focus on technology companies, business services, and transportation/logistics sectors, though their attack methodology and specific tools have not been extensively documented by major threat intelligence firms or law enforcement agencies. No notable high-profile campaigns or significant ransoms have been publicly reported by CISA, FBI, or established security researchers, likely due to the group's recent emergence and relatively small victim count. CipherForce appears to remain active as of current reporting, though their limited operational history makes it difficult to assess their long-term viability or potential for expansion.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.