pear is a ransomware operator currently active on public leak sites. Darkfield has indexed 87 public victims claimed by this operator between August 5, 2025 and May 20, 2026. The Pear ransomware group is a relatively new threat actor that emerged in August 2025, operating with primarily financial motivations and targeting victims across multiple countries and sectors. Based on their recent emergence and limited public documentation, specific details about their country of origin and organizational structure remain unclear, though their targeting patterns suggest a financially-driven operation that may operate independently or as part of a smaller ransomware-as-a-service model. With 65 documented victims since their August 2025 debut, the group has demonstrated a preference for targeting organizations in the United States, New Zealand, Australia, Egypt, and Switzerland, with particular focus on healthcare, business services, manufacturing, and technology sectors. Their attack methodology and specific technical details have not been extensively documented by major threat intelligence firms or law enforcement agencies, though their rapid victim acquisition suggests they have established effective initial access and encryption capabilities. Notable campaigns and high-profile attacks have not been publicly detailed by CISA, FBI, or major security research organizations, likely due to the group's recent emergence and relatively small scale compared to established ransomware operations. As of late 2025, Pear appears to remain active given their recent emergence and ongoing victim targeting across multiple geographic regions and industry verticals.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.