SilentRansomGroup is a ransomware operator currently active on public leak sites. Darkfield has indexed 117 public victims claimed by this operator between May 6, 2025 and May 19, 2026. Based on the limited available information, SilentRansomGroup is a relatively new ransomware operation that first emerged in May 2025, appearing to be financially motivated given their targeting patterns across multiple high-value sectors. The group's origin and affiliations remain unclear due to their recent emergence, though their diverse geographic targeting including the United States, Germany, Canada, and Russia suggests either a sophisticated operation or potential ransomware-as-a-service model. Their attack methodology and specific technical capabilities have not been extensively documented by major security researchers, though their targeting of business services, financial services, hospitality, and manufacturing sectors indicates they likely focus on organizations with both valuable data and ability to pay significant ransoms. With 93 known victims across multiple countries and sectors in a relatively short timeframe since May 2025, SilentRansomGroup has demonstrated notable activity levels, though specific high-profile campaigns or ransom amounts have not been publicly disclosed by CISA, FBI, or major threat intelligence firms. The group appears to remain active as of current reporting periods, though comprehensive technical analysis and attribution efforts by established security researchers are still developing given their recent emergence in the threat landscape.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.