radar is a ransomware operator currently active on public leak sites. Darkfield has indexed 26 public victims claimed by this operator between September 10, 2025 and May 18, 2026. Radar is an emerging ransomware group that first appeared in September 2025, operating with apparent financial motivations based on their targeting patterns across multiple sectors and countries. The group's origin and affiliations remain unclear due to limited public documentation from established threat intelligence sources, though their geographic targeting suggests a focus on English-speaking nations and select international markets. Based on available victim data, Radar appears to employ opportunistic targeting methods that have successfully compromised 23 organizations across diverse sectors including construction, financial services, transportation/logistics, and technology, with operations spanning the United States, United Kingdom, Australia, Kuwait, and other regions. The group's attack methodology, encryption techniques, and whether they employ double or triple extortion tactics have not been extensively documented by major threat intelligence firms or law enforcement agencies. No significant high-profile campaigns, major ransoms, or law enforcement disruption actions against Radar have been publicly reported by CISA, FBI, or established security research organizations. Given the group's recent emergence and limited public intelligence reporting, Radar's current operational status and long-term capabilities remain under assessment by the cybersecurity community.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.