frag is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 30 public victims claimed by this operator between March 24, 2025 and June 12, 2025. The frag ransomware group is a newly emerged threat actor that began operations in March 2025, appearing to be financially motivated based on their targeting patterns across multiple countries and sectors. Given their recent emergence and limited public documentation, the group's specific country of origin and operational structure remain unclear, though their geographic targeting suggests potential international reach or ransomware-as-a-service capabilities. With only basic operational details available from initial observations, the group's specific attack methodology, encryption techniques, and data exfiltration practices have not yet been thoroughly documented by major security research organizations. The group has claimed approximately 30 victims across the United States, United Kingdom, Singapore, Spain, and the Netherlands, primarily targeting business services, financial services, construction, and manufacturing sectors, though no major high-profile attacks or significant ransoms have been publicly reported. As of the available intelligence, frag remains an active but relatively small-scale ransomware operation with limited public research coverage from established threat intelligence sources.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.