FulcrumSec is a recently emerged ransomware group that was first observed in May 2026, operating with apparent financial motivations based on their targeting patterns across multiple countries and high-value sectors. Given the recency of their emergence and limited public documentation, the group's specific country of origin and potential affiliations remain unclear, though their targeting of victims across the United States, India, Netherlands, Colombia, and Japan suggests either a geographically distributed operation or deliberate international scope rather than nation-state backing. The group has demonstrated a preference for targeting technology companies, business services firms, and healthcare organizations, with 21 documented victims indicating a selective approach focused on sectors likely to yield significant ransom payments due to operational dependencies and sensitive data holdings. Their attack methodology details remain largely undocumented in public threat intelligence reports from major security firms, though their sector targeting suggests sophisticated initial access capabilities given the typically robust security postures of technology and healthcare organizations. No major high-profile campaigns or significant law enforcement actions against FulcrumSec have been publicly reported by CISA, FBI, or leading cybersecurity researchers as of available intelligence. The group appears to remain active as of the most recent observations, though the limited public intelligence on their operations suggests they may be maintaining a relatively low profile compared to more established ransomware enterprises. The group has been linked to 23 public disclosures across our corpus. First observed on a leak site on May 1, 2026; most recent post May 10, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Healthcare sector, which has 1,779 disclosures indexed across all operators we track. Geographically, Lena Health is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.