Siegedsec is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 19 public victims claimed by this operator between December 8, 2023 and December 9, 2023. SiegedSec is a relatively new threat actor that emerged in December 2023, primarily motivated by hacktivism with a strong focus on anti-Israeli sentiment rather than traditional financial gain through ransomware operations. The group appears to operate independently with suspected ideological motivations tied to pro-Palestinian activism, though their exact geographic origin remains unclear based on publicly available intelligence. Unlike traditional ransomware groups, SiegedSec appears to focus on data theft and public exposure of sensitive information rather than encryption-based extortion, primarily targeting Israeli government entities through opportunistic attacks that exploit web application vulnerabilities and exposed credentials. The group has maintained a relatively low profile with 19 documented victims, almost exclusively targeting Israeli government infrastructure in what appears to be coordinated ideological attacks rather than broad financial campaigns. Based on available reporting, SiegedSec remains active as of late 2023 and early 2024, continuing their focused campaign against Israeli targets through data exfiltration and public disclosure operations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.