Projectrelic is a ransomware group that emerged in November 2022, operating with apparent financial motivations based on their targeting patterns and victim extortion activities. The group has been documented attacking 46 organizations primarily across the United States, United Kingdom, India, Germany, and France, with a focus on technology, manufacturing, construction, and education sectors, though many victims' sector classifications remain undocumented. Limited public intelligence exists regarding Projectrelic's country of origin, organizational structure, or potential affiliations with other cybercriminal groups, and it remains unclear whether they operate as an independent entity or utilize a ransomware-as-a-service model. Similarly, detailed information about their specific attack methodologies, initial access vectors, encryption techniques, or use of double extortion tactics has not been extensively documented by major threat intelligence firms or law enforcement agencies. The group has not been associated with any particularly high-profile attacks or record ransom demands that have garnered significant public attention from security researchers or government agencies. Based on available reporting, Projectrelic appears to maintain some level of operational activity, though comprehensive assessments of their current operational status are limited due to the relatively sparse public documentation surrounding this particular threat actor. The group has been linked to 46 public disclosures across our corpus. First observed on a leak site on November 11, 2022; most recent post November 9, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, powells.biz is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.