nasirsecurity (also tracked as nasir security) is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between October 12, 2025. nasirsecurity is an obscure ransomware group first observed in October 2025 with very limited documented activity, appearing to operate with financial motivations based on a single recorded victim. The group's origin and potential affiliations remain unknown, with insufficient public data to determine whether they operate as part of a Ransomware-as-a-Service model or as an independent entity. Their attack methodology, encryption techniques, and initial access vectors have not been publicly documented by major cybersecurity firms or law enforcement agencies, though their targeting appears geographically focused on Israel within the technology sector. No notable high-profile campaigns, significant ransom demands, or law enforcement actions have been publicly reported in connection with this group by CISA, FBI, Mandiant, or other reputable security researchers. Given the extremely limited victim count and lack of subsequent reporting, the current operational status of nasirsecurity remains unclear, though their minimal footprint suggests either very recent emergence, limited capabilities, or potential early-stage operations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.