LockerGoga is a ransomware group that emerged in January 2019, primarily motivated by financial gain through targeted attacks against critical infrastructure and manufacturing organizations. The group is suspected to have origins in Eastern Europe, though specific attribution remains unclear, and operates independently rather than as a Ransomware-as-a-Service model. LockerGoga typically gains initial access through spear-phishing emails and credential stuffing attacks, then moves laterally through networks before deploying their custom ransomware payload that encrypts files and often disables network services and changes user passwords to prevent system access and recovery efforts. The group is notable for several high-profile attacks including strikes against Norsk Hydro in Norway, Altran Technologies in France, and various U.S. manufacturing firms, with their attacks causing significant operational disruptions particularly in industrial control systems. LockerGoga activity has significantly diminished since 2020, with security researchers observing minimal new campaigns attributed to this specific variant, suggesting the group has either ceased operations or potentially rebranded under different malware families. The group has been linked to 4 public disclosures across our corpus. First observed on a leak site on January 24, 2019; most recent post March 22, 2019. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Critical Manufacturing sector, which has 55 disclosures indexed across all operators we track. Geographically, Hexion Inc. and MPM Holdings Inc. is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.