Trisec_Cyberoutlaw is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 3 public victims claimed by this operator between February 16, 2024 and February 19, 2024. Trisec_Cyberoutlaw is an emerging ransomware group first observed in February 2024, operating with apparent financial motivations based on their targeting patterns across multiple countries and sectors. The group's origin and affiliations remain unclear due to limited public documentation from major threat intelligence sources, though their relatively small victim count of three organizations suggests they are either a nascent operation or a smaller-scale independent group rather than a well-established ransomware-as-a-service operation. Their attack methodology details are not well-documented in public threat intelligence reports, though their targeting spans diverse sectors including business services, healthcare, and technology across Italy, Sweden, and Ireland, indicating they may employ opportunistic rather than highly specialized attack vectors. Notable campaigns and specific high-profile victims have not been extensively documented by major cybersecurity firms or law enforcement agencies, likely due to the group's recent emergence and limited operational scope. The group's current operational status remains unclear given the lack of comprehensive public reporting on their activities beyond basic victim statistics and geographic targeting patterns.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.