fulcrumsec is a ransomware operator currently active on public leak sites. Darkfield has indexed 23 public victims claimed by this operator between May 1, 2026 and May 10, 2026. FulcrumSec is a recently emerged ransomware group that was first observed in May 2026, operating with apparent financial motivations based on their targeting patterns across multiple countries and high-value sectors. Given the recency of their emergence and limited public documentation, the group's specific country of origin and potential affiliations remain unclear, though their targeting of victims across the United States, India, Netherlands, Colombia, and Japan suggests either a geographically distributed operation or deliberate international scope rather than nation-state backing. The group has demonstrated a preference for targeting technology companies, business services firms, and healthcare organizations, with 21 documented victims indicating a selective approach focused on sectors likely to yield significant ransom payments due to operational dependencies and sensitive data holdings. Their attack methodology details remain largely undocumented in public threat intelligence reports from major security firms, though their sector targeting suggests sophisticated initial access capabilities given the typically robust security postures of technology and healthcare organizations. No major high-profile campaigns or significant law enforcement actions against FulcrumSec have been publicly reported by CISA, FBI, or leading cybersecurity researchers as of available intelligence. The group appears to remain active as of the most recent observations, though the limited public intelligence on their operations suggests they may be maintaining a relatively low profile compared to more established ransomware enterprises.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.