Projectrelic is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 46 public victims claimed by this operator between November 11, 2022 and November 9, 2025. Projectrelic is a ransomware group that emerged in November 2022, operating with apparent financial motivations based on their targeting patterns and victim extortion activities. The group has been documented attacking 46 organizations primarily across the United States, United Kingdom, India, Germany, and France, with a focus on technology, manufacturing, construction, and education sectors, though many victims' sector classifications remain undocumented. Limited public intelligence exists regarding Projectrelic's country of origin, organizational structure, or potential affiliations with other cybercriminal groups, and it remains unclear whether they operate as an independent entity or utilize a ransomware-as-a-service model. Similarly, detailed information about their specific attack methodologies, initial access vectors, encryption techniques, or use of double extortion tactics has not been extensively documented by major threat intelligence firms or law enforcement agencies. The group has not been associated with any particularly high-profile attacks or record ransom demands that have garnered significant public attention from security researchers or government agencies. Based on available reporting, Projectrelic appears to maintain some level of operational activity, though comprehensive assessments of their current operational status are limited due to the relatively sparse public documentation surrounding this particular threat actor.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.