d4rk4rmy is a recently emerged ransomware group that was first observed in July 2025, operating with apparent financial motivations based on their targeting of high-value sectors including financial services and technology organizations. With only 18 documented victims to date, the group appears to be in its early operational phase, demonstrating a geographically diverse targeting approach across the United States, Taiwan, Brazil, Poland, and Monaco, with particular focus on financially lucrative sectors such as financial services, technology, transportation and logistics, and hospitality and tourism industries. Given the group's recent emergence and limited public documentation from established threat intelligence sources, specific details regarding their country of origin, operational structure, attack methodologies, encryption techniques, and whether they operate as a Ransomware-as-a-Service model remain largely undetermined by major cybersecurity organizations such as CISA, FBI, or prominent security research firms. The group's current operational status appears active based on the recent timeline of their emergence, though comprehensive analysis of their capabilities, notable campaigns, and potential law enforcement actions is limited due to insufficient publicly available intelligence from authoritative sources. The group has been linked to 18 public disclosures across our corpus. First observed on a leak site on July 7, 2025; most recent post August 16, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, BIG SILVER is reported in Thailand, a country with 10 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.