**Overview:** Ragnarlocker is a financially motivated ransomware operation that emerged in April 2020, conducting targeted attacks against enterprise organizations across multiple sectors with a focus on maximizing profit through encryption and data theft extortion tactics.
**Origin & Affiliation:** The group's country of origin remains unclear based on publicly available intelligence, though they operate as an independent ransomware family rather than offering Ransomware-as-a-Service capabilities to other criminal actors.
**Attack Methodology:** Ragnarlocker operators typically gain initial access through compromised Remote Desktop Protocol credentials, phishing campaigns, and exploitation of public-facing applications, subsequently deploying their custom ransomware payload that employs strong encryption algorithms. The group practices double extortion tactics, exfiltrating sensitive data before encryption and threatening to publish stolen information on dedicated leak sites if ransom demands are not met, often targeting network shares and attempting to delete shadow copies to prevent recovery.
**Notable Campaigns:** The group has successfully compromised 128 documented victims across multiple countries, with significant targeting of critical infrastructure sectors including energy, finance, and telecommunications organizations, though specific high-profile incidents and ransom amounts have not been widely disclosed in public threat intelligence reports.
**Current Status:** Based on available public reporting, Ragnarlocker remains an active threat as of recent security advisories, continuing to target organizations primarily in the United States and Europe. The group has been linked to 128 public disclosures across our corpus. First observed on a leak site on April 1, 2020; most recent post June 17, 2025. The operation is currently inactive.
Also tracked as: Ragnar Locker.
Sector and geography
Geographically, Batesville Tool & Die, Inc will be leaked in 3 Days is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.