Darkrace is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 10 public victims claimed by this operator between May 31, 2023 and June 9, 2023. Darkrace is a relatively new ransomware group that emerged in May 2023, operating with primarily financial motivations through targeted extortion campaigns. The group demonstrates a preference for targeting European nations, particularly Italy, Sweden, and Portugal, while also conducting operations against victims in Japan and Switzerland, suggesting a broad international scope despite their limited scale of operations. With only 10 documented victims since their emergence, Darkrace appears to operate as a smaller, independent ransomware operation rather than a large-scale Ransomware-as-a-Service enterprise, though specific details regarding their country of origin and potential affiliations with other cybercriminal groups remain undocumented in public threat intelligence reporting. Due to the limited public documentation from major cybersecurity firms and law enforcement agencies regarding Darkrace's specific attack methodologies, encryption techniques, and initial access vectors, their operational tactics and technical capabilities are not well-established in current threat intelligence databases. The group has not been associated with any major, high-profile ransomware incidents that have drawn significant public attention or law enforcement response, likely due to their relatively small victim count and recent emergence in the threat landscape. Current intelligence suggests Darkrace remains active as of late 2023, though their limited operational footprint and absence from major cybersecurity advisories indicates they represent a lower-tier threat compared to more established ransomware operations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.