keyholder is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between April 4, 2015. Based on available public documentation, Keyholder is an obscure ransomware operation that was first observed in April 2015, with limited documented activity suggesting primarily financially motivated attacks. The group's origin and affiliations remain largely unknown due to minimal public reporting from major security firms and law enforcement agencies, with no clear indication of whether they operate as a Ransomware-as-a-Service model or as an independent entity. Available intelligence indicates extremely limited activity with only one publicly documented victim, suggesting either a highly targeted approach or a short-lived operation that failed to gain significant traction in the ransomware landscape. The group has demonstrated targeting of emergency services sectors within the United States, though the specific attack methodology, tools, and extortion tactics employed remain undocumented in public threat intelligence reporting. Given the sparse public documentation and lack of recent reporting from CISA, FBI, or major security research firms since the initial 2015 observation, the current operational status of Keyholder remains unclear, with the group likely having ceased operations or remaining dormant.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.