vect is a ransomware operator currently active on public leak sites. Darkfield has indexed 25 public victims claimed by this operator between January 6, 2026 and April 15, 2026. The Vect ransomware group is an emerging threat actor first observed in January 2026, operating with apparent financial motivations based on their ransomware deployment patterns. With limited public documentation available from major cybersecurity organizations, the group's country of origin and potential affiliations remain unclear, though their targeting patterns suggest a relatively small-scale operation compared to established ransomware families. Based on available victim data, Vect has compromised at least 23 organizations globally, with primary focus on Brazil, the United States, South Africa, Namibia, and Egypt, demonstrating a geographically diverse targeting approach that spans multiple continents. The group appears to concentrate their attacks on manufacturing, healthcare, technology, and energy sectors, suggesting they may seek targets with critical infrastructure dependencies or valuable data assets, though their specific attack methodologies and encryption techniques have not been extensively documented by major threat intelligence providers. Given the group's recent emergence in early 2026, comprehensive analysis of their tactics, techniques, and procedures remains limited in public threat intelligence reporting. As of current reporting, Vect appears to remain active, though the limited public visibility suggests they operate at a smaller scale compared to prominent ransomware-as-a-service groups that typically attract more extensive law enforcement and security researcher attention.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.