Dan0N is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 33 public victims claimed by this operator between April 25, 2024 and August 23, 2024. Dan0N is an emerging ransomware group that first appeared in April 2024, operating with primarily financial motivations and demonstrating a focused targeting approach across multiple sectors. Based on limited public information, the group's origin and affiliations remain unclear, with insufficient data to determine whether they operate as an independent entity or as part of a Ransomware-as-a-Service model. The group has demonstrated capability to compromise organizations across diverse sectors including business services, technology, healthcare, and financial services, though specific attack vectors and technical methodologies have not been extensively documented by major security research organizations. Dan0N has maintained a relatively low profile compared to established ransomware operations, with 33 documented victims primarily concentrated in the United States, Ireland, and South Korea, suggesting either targeted regional focus or opportunistic attacks against accessible infrastructure in these countries. The group appears to remain active as of current reporting, though the limited public documentation from established threat intelligence sources indicates they have not yet achieved the notoriety or scale of operations that would trigger significant law enforcement attention or comprehensive technical analysis from major security firms.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.