RansomHub is a financially-motivated ransomware group that emerged in February 2024 and has rapidly established itself as a significant threat, compromising over 1,000 victims within its first year of operation. The group operates as a Ransomware-as-a-Service (RaaS) model, though their specific country of origin and potential affiliations with other cybercriminal organizations remain under investigation by security researchers. RansomHub employs double extortion tactics, stealing sensitive data before encrypting victims' systems and threatening to leak the information if ransom demands are not met, with their attacks primarily targeting organizations in the United States, Brazil, Canada, United Kingdom, and Italy. The group has demonstrated a particular focus on business services, technology, manufacturing, and healthcare sectors, suggesting they prioritize targets with both high revenue potential and critical operational dependencies that increase the likelihood of ransom payment. Despite their recent emergence, RansomHub has quickly gained notoriety for their aggressive targeting approach and high victim count, with security agencies including CISA and FBI monitoring their activities as part of ongoing ransomware threat assessments. As of current reporting, RansomHub remains active and continues to recruit affiliates for their RaaS operation while expanding their victim base across multiple industries and geographic regions. The group has been linked to 1,032 public disclosures across our corpus. First observed on a leak site on February 10, 2024; most recent post March 31, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Consumer Services sector, which has 396 disclosures indexed across all operators we track. Geographically, www.carolinaac.com is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.