Sarcoma (also tracked as Sarcoma Ransomware Group) is a ransomware operator currently active on public leak sites. Darkfield has indexed 150 public victims claimed by this operator between October 9, 2024 and May 12, 2026. Sarcoma is a relatively new ransomware group that emerged in October 2024, operating with apparent financial motivations and demonstrating a broad international targeting approach with at least 140 documented victims across multiple countries and industry sectors. The group's origin and affiliations remain unclear due to its recent emergence, with no publicly documented connections to established ransomware families or confirmation of whether they operate as an independent entity or through a Ransomware-as-a-Service model. Limited public information is available regarding Sarcoma's specific attack methodologies, initial access vectors, or technical capabilities, though their targeting patterns suggest opportunistic rather than highly selective victim selection across diverse industries including manufacturing, business services, agriculture and food production, and technology sectors. The group has shown a particular focus on victims in the United States while also maintaining operations against targets in Italy, Canada, Germany, and Australia, though no specific high-profile attacks or record ransom demands have been publicly documented by major security firms or law enforcement agencies. Given the group's recent emergence in late 2024, Sarcoma appears to remain active with no reported law enforcement disruptions or confirmed rebranding activities at this time.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.