nova is a ransomware operator currently active on public leak sites. Darkfield has indexed 117 public victims claimed by this operator between April 28, 2025 and May 20, 2026. Based on the limited available data, Nova is a recently emerged ransomware operation first observed in April 2025 with an apparent financial motivation, having targeted approximately 95 victims in its brief operational period. The group's origin and potential affiliations remain undocumented by major security firms, though their targeting pattern suggests a broad opportunistic approach rather than geopolitically motivated attacks. Nova's attack methodology and specific technical capabilities have not been publicly detailed by established threat intelligence sources, though their victim distribution across the United States, France, Brazil, Singapore, and the Netherlands indicates either automated widespread targeting or access to diverse initial compromise vectors. The group has demonstrated a preference for targeting healthcare, technology, manufacturing, and education sectors, suggesting they may focus on organizations with critical operational dependencies that increase pressure for ransom payment. Given the group's recent emergence and limited public documentation by major security researchers, Nova's current operational status, organizational structure, and long-term threat trajectory remain largely uncharacterized in established threat intelligence reporting.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.