lockergoga is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 4 public victims claimed by this operator between January 24, 2019 and March 22, 2019. LockerGoga is a ransomware group that emerged in January 2019, primarily motivated by financial gain through targeted attacks against critical infrastructure and manufacturing organizations. The group is suspected to have origins in Eastern Europe, though specific attribution remains unclear, and operates independently rather than as a Ransomware-as-a-Service model. LockerGoga typically gains initial access through spear-phishing emails and credential stuffing attacks, then moves laterally through networks before deploying their custom ransomware payload that encrypts files and often disables network services and changes user passwords to prevent system access and recovery efforts. The group is notable for several high-profile attacks including strikes against Norsk Hydro in Norway, Altran Technologies in France, and various U.S. manufacturing firms, with their attacks causing significant operational disruptions particularly in industrial control systems. LockerGoga activity has significantly diminished since 2020, with security researchers observing minimal new campaigns attributed to this specific variant, suggesting the group has either ceased operations or potentially rebranded under different malware families.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.