Based on the limited available information, SilentRansomGroup is a relatively new ransomware operation that first emerged in May 2025, appearing to be financially motivated given their targeting patterns across multiple high-value sectors. The group's origin and affiliations remain unclear due to their recent emergence, though their diverse geographic targeting including the United States, Germany, Canada, and Russia suggests either a sophisticated operation or potential ransomware-as-a-service model. Their attack methodology and specific technical capabilities have not been extensively documented by major security researchers, though their targeting of business services, financial services, hospitality, and manufacturing sectors indicates they likely focus on organizations with both valuable data and ability to pay significant ransoms. With 93 known victims across multiple countries and sectors in a relatively short timeframe since May 2025, SilentRansomGroup has demonstrated notable activity levels, though specific high-profile campaigns or ransom amounts have not been publicly disclosed by CISA, FBI, or major threat intelligence firms. The group appears to remain active as of current reporting periods, though comprehensive technical analysis and attribution efforts by established security researchers are still developing given their recent emergence in the threat landscape. The group has been linked to 117 public disclosures across our corpus. First observed on a leak site on May 6, 2025; most recent post May 19, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, Ph..s is reported in US, a country with 2,713 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.