Lapsus$ is a financially motivated cybercriminal group that emerged in December 2021, gaining notoriety for their aggressive extortion tactics and high-profile targeting of major corporations and government entities. The group is believed to have originated from South America, particularly Brazil, with suspected ties to young hackers operating independently rather than as a traditional ransomware-as-a-service operation, though they have demonstrated sophisticated coordination and insider recruitment capabilities. Lapsus$ primarily relies on social engineering techniques, SIM swapping, and insider threats to gain initial access to target networks, often recruiting employees through bribes or coercion rather than relying on traditional malware delivery methods, and they frequently employ data theft and public leak tactics for extortion rather than always deploying encryption-based ransomware. The group has conducted notable attacks against major technology companies including Microsoft, Nvidia, Samsung, and Okta, as well as targeting organizations across France, the United States, Brazil, Germany, and Canada, with a particular focus on consumer services, education, government facilities, and critical manufacturing sectors, leading to significant law enforcement attention and arrests of suspected members. Following arrests of key members by Brazilian and UK authorities in 2022, the group's activity has significantly diminished, though some security researchers suggest remnants may still be operational under different identities. The group has been linked to 21 public disclosures across our corpus. First observed on a leak site on December 10, 2021; most recent post May 10, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Healthcare sector, which has 1,779 disclosures indexed across all operators we track. Geographically, ASTRAZENECA CORP is reported in GB, a country with 309 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.