obscura is a ransomware operator currently active on public leak sites. Darkfield has indexed 33 public victims claimed by this operator between September 5, 2025 and January 11, 2026. Obscura is a recently emerged ransomware group that was first observed in September 2025, operating with apparent financial motivations based on their targeting patterns across multiple sectors and geographic regions. The group has compromised at least 33 known victims since their emergence, demonstrating rapid operational capabilities despite their recent entry into the ransomware landscape. Limited public documentation exists regarding their country of origin, operational structure, or affiliations with established ransomware families, though their targeting pattern suggests either opportunistic attacks or access to diverse initial compromise vectors. Their victim profile spans multiple sectors including healthcare, technology, manufacturing, and construction, with geographic focus on the United States, Malaysia, Portugal, Egypt, and Denmark, indicating either broad targeting criteria or access to varied attack infrastructure across different regions. Due to the group's recent emergence and limited public reporting from major security vendors and law enforcement agencies, specific details regarding their technical capabilities, encryption methods, data exfiltration practices, or ransom demands remain undocumented in open-source intelligence. The group appears to remain active as of late 2025, though insufficient time has elapsed to determine their long-term operational sustainability or potential law enforcement attention.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.