Arcusmedia is a relatively new ransomware group that emerged in May 2024, operating with apparent financial motivations based on their targeting patterns across multiple countries and sectors. The group's origin and potential state affiliations remain unclear given limited public documentation from established threat intelligence sources, though their targeting of victims across Brazil, the United States, Spain, UAE, and Mexico suggests either a geographically distributed operation or deliberate international scope. With 98 documented victims in a short operational timeframe, Arcusmedia has demonstrated notable activity levels, primarily focusing on technology, business services, agriculture and food production, and transportation/logistics sectors, though their targeting appears opportunistic rather than strategically focused given the "Not Found" classification as their primary sector target. Limited public reporting from major cybersecurity firms and law enforcement agencies means specific details about their attack methodologies, initial access vectors, encryption techniques, or whether they employ double extortion tactics remain undocumented in authoritative sources. No major campaigns, high-profile victims, or significant law enforcement actions against Arcusmedia have been publicly reported by CISA, FBI, or established threat intelligence organizations. Current operational status appears active based on the recent emergence timeframe, though comprehensive threat intelligence profiles from reputable sources have not yet been published given the group's recent appearance in the threat landscape. The group has been linked to 98 public disclosures across our corpus. First observed on a leak site on May 15, 2024; most recent post September 17, 2025. The operation is currently inactive.
Also tracked as: arcus media.
Sector and geography
This disclosure adds to ransomware activity in the Transportation/Logistics sector, which has 847 disclosures indexed across all operators we track. Geographically, THX Transport is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.