toufan is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 117 public victims claimed by this operator between December 17, 2023 and December 27, 2023. Toufan is a ransomware group that emerged in December 2023, operating with apparent financial motivations and demonstrating a preference for targeting victims across Israel, Canada, Singapore, Australia, and Great Britain. The group has claimed responsibility for compromising 117 victims since its emergence, though detailed public documentation from major threat intelligence firms regarding their specific origin, country of operation, or organizational structure remains limited. Given the recent emergence of this group and the geographic distribution of their targeting, comprehensive technical analysis of their attack methodologies, encryption techniques, and initial access vectors has not been extensively documented in public threat intelligence reporting from established security research organizations. The group's targeting pattern suggests a focus on English-speaking countries and Israel, though the specific sectors or victim profiles they prioritize, along with details about ransom demands or notable high-profile compromises, have not been widely reported in mainstream cybersecurity intelligence channels. As a recently emerged threat actor first observed in late 2023, Toufan appears to remain active based on the accumulation of claimed victims, though comprehensive assessment of their current operational status requires further monitoring and analysis by established threat intelligence communities.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.