Xinglocker is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 21 public victims claimed by this operator between April 29, 2021 and October 26, 2021. Xinglocker is a relatively minor ransomware group that emerged in April 2021, operating with apparent financial motivations and targeting a limited number of victims across multiple countries. Based on publicly available information, the group's origin and affiliations remain largely undocumented by major threat intelligence organizations, with no confirmed details about their country of operation, RaaS model usage, or connections to other cybercriminal entities. The group's attack methodology and technical capabilities are not well-documented in public reporting from CISA, FBI, or established security researchers, though their targeting appears focused on critical infrastructure sectors. Xinglocker has reportedly compromised 21 known victims, with particular focus on healthcare and transportation sectors primarily in the United States, Germany, and Norway, though specific high-profile incidents or notable campaigns have not been extensively documented in public threat intelligence reporting. Current intelligence suggests limited recent activity, though the group's operational status remains unclear due to sparse public documentation from authoritative sources.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.