ronggolawe is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between February 1, 2021. Ronggolawe is an obscure ransomware group that emerged in February 2021, appearing to be financially motivated based on limited available intelligence. The group's origin and affiliations remain unknown due to insufficient public reporting from major security vendors and law enforcement agencies, and it is unclear whether they operate as an independent entity or utilize a ransomware-as-a-service model. Based on available data, the group has demonstrated a specific targeting pattern focused on government facilities, though their attack methodology, initial access vectors, and use of data exfiltration or double extortion tactics have not been documented in public threat intelligence reports. The group's activity appears to be geographically concentrated in Ecuador, with only one publicly documented victim, suggesting either highly limited operations or that their activities have largely escaped broader security industry attention. Current intelligence indicates minimal ongoing activity, though the lack of comprehensive public reporting makes it difficult to definitively assess whether the group remains active, has rebranded, or ceased operations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.