secp0 is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between March 14, 2025. secp0 is a newly emerged ransomware group first observed in March 2025, appearing to be financially motivated based on their operational pattern. Given the extremely limited public documentation and recent emergence, specific details about their country of origin, group affiliations, or operational model remain unknown to security researchers. Based on available incident data, the group has demonstrated capability to compromise technology sector targets within the United States, though their specific attack vectors, toolsets, and extortion methodologies have not been publicly documented by major security firms or law enforcement agencies. No notable high-profile campaigns or significant ransomware payments have been publicly attributed to this group at this time. The group appears to be in early operational stages with minimal public visibility, making comprehensive threat assessment challenging due to limited available intelligence from established cybersecurity organizations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.