Abyss is a relatively new ransomware group that emerged in March 2023, operating with primarily financial motivations and targeting organizations across multiple sectors with a focus on English-speaking countries. The group's origin and affiliations remain largely undocumented by major security agencies, though their targeting patterns suggest they operate independently rather than as a Ransomware-as-a-Service model. Their attack methodology and specific tools have not been extensively documented by major threat intelligence firms, though their victim profile of 87 organizations indicates they employ effective initial access techniques to compromise business services, technology, healthcare, and agriculture sectors. The group demonstrates a clear geographic preference for targets in the United States, United Kingdom, Canada, Switzerland, and Hong Kong, suggesting either language preferences or specific regional access capabilities. Due to the group's recent emergence and relatively limited public documentation from established security researchers, detailed information about notable campaigns, encryption methods, or law enforcement actions remains scarce. Abyss appears to remain active as of current reporting, though the lack of extensive public analysis by major threat intelligence organizations suggests they may operate at a smaller scale compared to more prominent ransomware families. The group has been linked to 98 public disclosures across our corpus. First observed on a leak site on March 21, 2023; most recent post May 18, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, pez.com is reported in Austria, a country with 24 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.