RebornVC is a relatively new ransomware group that emerged in July 2025, appearing to be financially motivated based on their targeting patterns and operational behavior. The group's origin and potential affiliations remain unclear due to limited public documentation from established threat intelligence sources, though their recent emergence suggests they may be either a new independent operation or a rebrand of an existing threat actor. Based on available data, RebornVC has conducted a limited number of attacks with three known victims, primarily targeting organizations in the United States and Brazil across technology and education sectors, though their attack methodology and specific technical capabilities have not been extensively documented by major security researchers or government agencies. Given the group's recent emergence and low victim count, there are no widely reported notable campaigns or high-profile incidents that have drawn significant attention from law enforcement or the cybersecurity community. As of the available intelligence, RebornVC appears to remain active but operates at a relatively small scale compared to established ransomware groups. The group has been linked to 3 public disclosures across our corpus. First observed on a leak site on July 8, 2025; most recent post July 9, 2025. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.