zerotolerance is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between May 9, 2024. The zerotolerance ransomware group is a recently emerged threat actor first observed in May 2024, appearing to be financially motivated based on their ransomware operations targeting the financial sector. Given their recent emergence and limited observed activity, there is insufficient public intelligence to determine their country of origin, affiliations with other threat groups, or whether they operate as an independent entity or under a Ransomware-as-a-Service model. The group's attack methodology, tools, and tactics remain largely undocumented by major cybersecurity firms and government agencies due to their limited operational footprint. Their targeting appears geographically focused on Argentina within the financial services sector, though with only one documented victim, broader targeting patterns cannot be definitively established. No major campaigns, high-profile incidents, or law enforcement actions have been publicly reported against this group by CISA, FBI, or established threat intelligence organizations. The current operational status of zerotolerance remains unclear due to the limited intelligence available, though no recent activity has been publicly documented since their initial observation.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.