Embargo is a ransomware group that emerged in April 2024, operating with primarily financial motivations and demonstrating a focus on high-value targets across multiple sectors. The group has been observed targeting victims predominantly in the United States, Singapore, India, and France, with particular emphasis on technology, healthcare, manufacturing, business services, and financial sectors. Given the group's recent emergence and limited public documentation from major threat intelligence sources, specific details about their country of origin, operational structure, and technical methodologies remain largely unconfirmed by established security research organizations. With 37 known victims identified since their emergence, Embargo appears to follow established ransomware operational patterns typical of financially-motivated cybercriminal groups, though comprehensive analysis of their attack vectors, encryption methods, and extortion tactics has not yet been extensively documented by major cybersecurity firms or government agencies. The group's targeting of critical infrastructure sectors including healthcare and financial services aligns with broader ransomware trends observed throughout 2024, though specific notable campaigns or high-profile attacks have not been widely reported in public threat intelligence reporting. As of current observations, Embargo appears to remain active, though the limited timeframe since their emergence and sparse public documentation makes definitive assessment of their operational status challenging without additional confirmed reporting from established threat intelligence sources. The group has been linked to 38 public disclosures across our corpus. First observed on a leak site on April 21, 2024; most recent post March 31, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Healthcare sector, which has 1,779 disclosures indexed across all operators we track. Geographically, weisermemorialhospital.org is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.