insomnia is a ransomware operator currently active on public leak sites. Darkfield has indexed 34 public victims claimed by this operator between February 7, 2026 and April 28, 2026. Based on the limited publicly available information, Insomnia is a relatively new ransomware group that first emerged in February 2026, appearing to be financially motivated based on their targeting patterns and operational behavior. The group's country of origin and potential affiliations with other ransomware operations remain unknown, with insufficient public documentation from major threat intelligence sources to determine whether they operate as a Ransomware-as-a-Service model or as an independent entity. Their attack methodology and specific technical capabilities have not been extensively documented by CISA, FBI, or major security research firms, though their targeting of 29 known victims across healthcare, technology, manufacturing, and hospitality sectors in the United States, Singapore, and Brazil suggests a broad opportunistic approach rather than highly selective operations. Given the group's recent emergence and limited public reporting from established threat intelligence sources, there are no widely documented notable campaigns or high-profile incidents that have garnered significant attention from law enforcement or major security vendors. As of current reporting, the operational status of Insomnia remains unclear due to the lack of comprehensive public analysis from authoritative sources, making it difficult to assess whether the group remains active or has ceased operations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.