Ransomedvc is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 68 public victims claimed by this operator between August 21, 2023 and October 30, 2023. Ransomedvc is a financially-motivated ransomware group that emerged in August 2023, representing one of the newer entrants in the ransomware ecosystem with a documented victim count of 68 organizations. Given the group's recent emergence and limited public documentation from major cybersecurity organizations, specific details about their country of origin and operational structure remain unclear, though their targeting patterns suggest they operate as an independent group rather than a established RaaS operation. The group demonstrates a preference for targeting critical infrastructure sectors, particularly focusing on Food & Agriculture and Healthcare organizations across a geographically diverse range of countries including Bulgaria, Brazil, Japan, Australia, and Russia, indicating either a broad opportunistic approach or the use of automated scanning tools to identify vulnerable systems. While comprehensive details about their specific attack methodologies, encryption techniques, and whether they employ double or triple extortion tactics have not been extensively documented by major threat intelligence firms, their targeting of healthcare and food sector organizations suggests they may leverage the critical nature of these services to pressure victims into payment. The group's notable campaign activity appears concentrated in their operational period since mid-2023, though no major high-profile attacks or significant law enforcement actions have been publicly reported by CISA, FBI, or other authoritative sources. Ransomedvc appears to remain active as of the latest available intelligence, though their relatively recent emergence means their long-term operational patterns and potential for rebranding or law enforcement disruption remain to be observed.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.