Darkvault is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 55 public victims claimed by this operator between April 11, 2024 and January 6, 2025. Darkvault is an emerging ransomware group first observed in April 2024, operating with apparent financial motivations and demonstrating a broad international targeting approach across multiple high-value sectors. The group's origin and specific affiliations remain undocumented in public threat intelligence reporting, though their operational patterns suggest a financially motivated cybercriminal organization rather than state-sponsored activity. Given the limited public documentation from established security research organizations, specific details regarding Darkvault's attack methodology, initial access vectors, encryption techniques, and potential data exfiltration practices have not been comprehensively analyzed or reported by major threat intelligence providers such as CISA, FBI, or Mandiant. The group has reportedly compromised approximately 55 victims across diverse geographic regions, with particular concentration in India, the United States, Brazil, the United Kingdom, and South Korea, while demonstrating sector preferences for technology companies, business services, healthcare organizations, transportation and logistics firms, and financial institutions. Due to the group's recent emergence and limited coverage in established threat intelligence channels, comprehensive details regarding notable high-profile campaigns, ransom demands, or specific law enforcement actions remain undocumented in publicly available security research. Current intelligence suggests the group maintains active operations as of late 2024, though the limited public reporting on Darkvault indicates either highly effective operational security or insufficient analysis by major cybersecurity research organizations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.