Killsecurity is a ransomware operator currently active on public leak sites. Darkfield has indexed 277 public victims claimed by this operator between March 21, 2024 and May 15, 2026. Killsecurity is a relatively new ransomware group that emerged in March 2024, operating with apparent financial motivations and demonstrating rapid expansion in their victim targeting. The group's origin and affiliations remain unclear due to limited public documentation from major threat intelligence sources, though their global targeting pattern suggests a sophisticated operation. Based on available victim data, Killsecurity has compromised 276 organizations primarily across the United States, India, United Kingdom, Brazil, and Belgium, with a particular focus on healthcare, technology, business services, and financial sectors. The group's attack methodology, encryption techniques, and specific tools remain undocumented in public threat intelligence reports from established security firms. Notable campaigns and high-profile victims have not been extensively documented by major cybersecurity organizations or law enforcement agencies, likely due to the group's recent emergence. Killsecurity appears to remain active as of current reporting, though comprehensive analysis of their operations is limited by the lack of detailed technical documentation from reputable threat intelligence sources.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.