Orca is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 5 public victims claimed by this operator between September 16, 2024 and April 27, 2026. Orca is an emerging ransomware group that was first observed in September 2024, appearing to be financially motivated based on their targeting patterns and operational behavior. The group's origin and affiliations remain unclear due to their recent emergence, with insufficient public documentation from major security researchers to definitively establish their country of origin or whether they operate as a Ransomware-as-a-Service model. Limited public information is available regarding their specific attack methodologies, initial access vectors, or encryption techniques, as major cybersecurity firms and government agencies have not yet published detailed technical analyses of their operations. The group has reportedly compromised at least four known victims across a geographically diverse range including Colombia, China, Austria, and Tennessee, with their attacks primarily targeting organizations in the technology, manufacturing, and transportation/logistics sectors. Given the group's recent emergence in September 2024 and lack of extensive public reporting, Orca appears to be in the early stages of their operations and remains active, though comprehensive threat intelligence on their capabilities and impact is still developing within the cybersecurity community.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.