**Overview**: AvosLocker is a financially motivated ransomware group that emerged in June 2021, operating as both a Ransomware-as-a-Service (RaaS) platform and conducting direct attacks against organizations worldwide. The group has demonstrated sophisticated capabilities and has targeted over 70 victims across multiple critical sectors. **Origin & Affiliation**: While the exact country of origin remains unclear, AvosLocker operates as a RaaS model, recruiting affiliates to conduct attacks using their ransomware payload and infrastructure. The group has shown no clear ties to state-sponsored activities, appearing to be purely profit-driven cybercriminals. **Attack Methodology**: AvosLocker typically gains initial access through compromised Remote Desktop Protocol (RDP) credentials, VPN vulnerabilities, and phishing campaigns, subsequently deploying tools like Cobalt Strike for lateral movement and persistence. The group employs double extortion tactics, stealing sensitive data before encrypting systems and threatening to publish the information on their leak site if ransom demands are not met. Their ransomware uses strong encryption algorithms and includes capabilities to terminate security processes and delete shadow copies to prevent recovery. **Notable Campaigns**: The group has particularly targeted critical infrastructure sectors including education, manufacturing, finance, healthcare, and transportation, with significant attacks reported against organizations in the United States, Germany, Singapore, Canada, and France. CISA and FBI have issued joint advisories warning about AvosLocker's targeting of critical infrastructure, highlighting the group's impact on essential services. **Current Status**: As of recent threat intelligence reporting, AvosLocker remains active, continuing to recruit affiliates and conduct ransomware operations against organizations globally. The group has been linked to 70 public disclosures across our corpus. First observed on a leak site on June 13, 2021; most recent post February 11, 2023. The operation is currently inactive.
Also tracked as: Avos.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.