securotrop is a ransomware operator currently active on public leak sites. Darkfield has indexed 35 public victims claimed by this operator between July 22, 2025 and May 4, 2026. Securotrop is a relatively new ransomware group that emerged in July 2025 and operates with apparent financial motivations, having targeted at least 31 victims across multiple sectors. The group primarily targets English-speaking countries including the United States, Canada, and the United Kingdom, with their attacks focused heavily on manufacturing companies, business services firms, construction organizations, and telecommunications providers. Due to the group's recent emergence and limited public documentation from major cybersecurity agencies and researchers, specific details about their country of origin, operational structure, attack methodologies, and technical capabilities remain largely undocumented in open-source intelligence reports. The targeting pattern suggests a focus on critical infrastructure and industrial sectors that may be willing to pay ransoms to quickly restore operations, though no major high-profile attacks or record ransom demands have been publicly reported by established threat intelligence sources. Given the group's recent formation in mid-2025, Securotrop appears to remain active, though comprehensive analysis of their tactics, techniques, and procedures awaits further documentation by cybersecurity researchers and law enforcement agencies.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.