The Pear ransomware group is a relatively new threat actor that emerged in August 2025, operating with primarily financial motivations and targeting victims across multiple countries and sectors. Based on their recent emergence and limited public documentation, specific details about their country of origin and organizational structure remain unclear, though their targeting patterns suggest a financially-driven operation that may operate independently or as part of a smaller ransomware-as-a-service model. With 65 documented victims since their August 2025 debut, the group has demonstrated a preference for targeting organizations in the United States, New Zealand, Australia, Egypt, and Switzerland, with particular focus on healthcare, business services, manufacturing, and technology sectors. Their attack methodology and specific technical details have not been extensively documented by major threat intelligence firms or law enforcement agencies, though their rapid victim acquisition suggests they have established effective initial access and encryption capabilities. Notable campaigns and high-profile attacks have not been publicly detailed by CISA, FBI, or major security research organizations, likely due to the group's recent emergence and relatively small scale compared to established ransomware operations. As of late 2025, Pear appears to remain active given their recent emergence and ongoing victim targeting across multiple geographic regions and industry verticals. The group has been linked to 87 public disclosures across our corpus. First observed on a leak site on August 5, 2025; most recent post May 20, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Education sector, which has 694 disclosures indexed across all operators we track. Geographically, Private University is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.