netrunner is a ransomware operator currently active on public leak sites. Darkfield has indexed 9 public victims claimed by this operator between April 3, 2026 and May 16, 2026. Based on the limited publicly available information, netrunner is a relatively new ransomware group that first emerged in April 2026 with documented attacks against at least six organizations. The group appears to be financially motivated, targeting a diverse range of sectors including healthcare, consumer services, telecommunications, manufacturing, and agriculture across multiple countries including Japan, the United States, Jordan, Italy, and South Korea. Due to the recent emergence of this group and limited public reporting from established threat intelligence sources, detailed information about their country of origin, operational affiliations, specific attack methodologies, encryption techniques, or whether they operate as a Ransomware-as-a-Service model remains undocumented by major cybersecurity organizations such as CISA, FBI, or Mandiant. The group's targeting pattern suggests opportunistic victim selection rather than geopolitically motivated attacks, given the broad geographic and sectoral distribution of their documented victims. No major high-profile campaigns or significant law enforcement actions against netrunner have been publicly reported by reputable security researchers at this time. Given the group's recent emergence in 2026, current activity status and operational capabilities require further monitoring and analysis by the cybersecurity community.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.