coldlock is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 3 public victims claimed by this operator between March 19, 2020 and May 5, 2020. **Coldlock** is a relatively obscure ransomware group that first emerged in March 2020, operating with apparent financial motivations. The group has maintained a low profile with limited documented activity, having been linked to only three known victim organizations. Little is publicly documented about Coldlock's country of origin or operational structure, though their targeting patterns suggest a focus on critical infrastructure sectors. The group primarily targets organizations in the United States, with a particular emphasis on the energy sector as well as healthcare and public health organizations. Limited public reporting from established security firms means their specific attack methodologies, encryption techniques, and initial access vectors remain largely undocumented in mainstream threat intelligence sources. No major high-profile campaigns or significant law enforcement actions against Coldlock have been publicly reported by CISA, FBI, or major security research organizations. Due to the sparse public documentation and limited victim count since 2020, it is unclear whether the group remains active, has ceased operations, or operates under a different name.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.