cryptolocker is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 8 public victims claimed by this operator between November 6, 2013 and April 28, 2019. **Overview:** CryptoLocker was one of the first major ransomware families to achieve widespread notoriety, emerging in late 2013 and operating primarily with financial motivations through sophisticated encryption and payment demands. The group pioneered many techniques that became standard in the ransomware ecosystem, including the use of strong encryption and anonymous payment methods.
**Origin & Affiliation:** CryptoLocker is believed to have originated from Eastern European cybercriminal groups, though specific attribution remains unclear. The operation appeared to function as an independent criminal enterprise rather than a ransomware-as-a-service model, with the core group maintaining direct control over the malware distribution and payment infrastructure.
**Attack Methodology:** CryptoLocker primarily gained initial access through email-based phishing campaigns containing malicious attachments, often disguised as legitimate business documents or shipping notifications. The malware employed strong RSA-2048 encryption to lock victim files and demanded payment in Bitcoin, representing an early adoption of cryptocurrency for ransom payments. Unlike modern ransomware groups, CryptoLocker did not typically exfiltrate data before encryption, focusing solely on file encryption for extortion.
**Notable Campaigns:** The group's most significant impact occurred between 2013 and 2014, when it infected an estimated 500,000 computers worldwide and generated millions of dollars in ransom payments. Law enforcement action through Operation Tovar in 2014 successfully disrupted the Gameover Zeus botnet infrastructure that CryptoLocker relied upon for distribution, leading to the recovery of encryption keys for many victims.
**Current Status:** The original CryptoLocker operation was effectively dismantled by law enforcement actions in 2014, though the name and techniques have been adopted by various copycat groups in subsequent years.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.