payoutsking is a ransomware operator currently active on public leak sites. Darkfield has indexed 100 public victims claimed by this operator between July 7, 2025 and May 13, 2026. PayoutsKing is a recently emerged ransomware group first observed in July 2025, operating with apparent financial motivations and demonstrating broad geographic and sectoral targeting capabilities. With limited public documentation available from major threat intelligence sources, the group's origin and affiliations remain unclear, though their targeting pattern suggests a professional ransomware operation rather than opportunistic attacks. Based on available victim data, PayoutsKing has compromised approximately 60 organizations across multiple sectors, with primary focus on the United States, Germany, United Kingdom, France, and Spain, targeting manufacturing, healthcare, technology, and construction industries alongside various other sectors. The group's attack methodology, encryption techniques, and whether they employ double or triple extortion tactics have not been publicly detailed by established security researchers or government agencies. Given the group's recent emergence in July 2025, there are no widely reported major campaigns or high-profile incidents documented by reputable sources such as CISA, FBI, or Mandiant at this time. PayoutsKing appears to remain active as of current reporting, though comprehensive threat intelligence profiles from established security firms have not yet been published due to the group's recent emergence.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.