Obscura is a recently emerged ransomware group that was first observed in September 2025, operating with apparent financial motivations based on their targeting patterns across multiple sectors and geographic regions. The group has compromised at least 33 known victims since their emergence, demonstrating rapid operational capabilities despite their recent entry into the ransomware landscape. Limited public documentation exists regarding their country of origin, operational structure, or affiliations with established ransomware families, though their targeting pattern suggests either opportunistic attacks or access to diverse initial compromise vectors. Their victim profile spans multiple sectors including healthcare, technology, manufacturing, and construction, with geographic focus on the United States, Malaysia, Portugal, Egypt, and Denmark, indicating either broad targeting criteria or access to varied attack infrastructure across different regions. Due to the group's recent emergence and limited public reporting from major security vendors and law enforcement agencies, specific details regarding their technical capabilities, encryption methods, data exfiltration practices, or ransom demands remain undocumented in open-source intelligence. The group appears to remain active as of late 2025, though insufficient time has elapsed to determine their long-term operational sustainability or potential law enforcement attention. The group has been linked to 33 public disclosures across our corpus. First observed on a leak site on September 5, 2025; most recent post January 11, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Energy sector, which has 374 disclosures indexed across all operators we track. Geographically, [Redacted] #1927 is reported in TH, a country with 45 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.