Flocker is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 59 public victims claimed by this operator between May 3, 2024 and July 31, 2025. Flocker is a relatively new ransomware group that emerged in May 2024, operating with apparent financial motivations and having compromised at least 59 known victims within a short operational timeframe. The group's origin and affiliations remain largely undocumented by major threat intelligence organizations, with no confirmed country of origin or clear operational model regarding RaaS capabilities established in public reporting. Based on available targeting data, Flocker appears to employ opportunistic attack methodologies that have successfully compromised organizations across diverse sectors including technology, public sector, financial services, and transportation/logistics, though specific technical details regarding their initial access vectors, encryption methods, or data exfiltration practices have not been publicly documented by authoritative sources. The group has demonstrated a notable geographic reach with victims identified across the United States, UAE, Taiwan, Canada, and Zambia, suggesting either broad targeting capabilities or affiliate operations, though no specific high-profile campaigns or major incidents have been publicly attributed to them by federal agencies or established security researchers. As of current reporting, Flocker appears to remain active given their recent emergence timeline, though comprehensive threat intelligence regarding their operations remains limited in open-source reporting from authoritative cybersecurity organizations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.