Crypto24 is a recently emerged ransomware group first observed in April 2025, with a primary financial motivation evidenced by their targeting of high-value sectors across multiple geographic regions. The group's origin and affiliations remain unclear due to their recent emergence, though their targeting pattern suggests either independent operations or a new ransomware-as-a-service offering given the diverse geographic spread of their 43 documented victims. Their attack methodology and specific technical capabilities have not yet been thoroughly documented by major threat intelligence providers, though their targeting of technology, financial services, healthcare, and business services sectors indicates they likely employ common initial access vectors such as phishing or exploitation of public-facing applications to gain entry into victim networks. The group has demonstrated a preference for targeting organizations primarily in the United States while also conducting operations across Southeast Asia including Malaysia, Singapore, and Indonesia, as well as extending their reach to Egypt, suggesting either a globally distributed affiliate network or opportunistic targeting based on vulnerable infrastructure discovery. Crypto24 remains active as of the latest available intelligence reporting, though given their recent emergence, comprehensive details about their specific tactics, techniques, and procedures await further analysis by established cybersecurity research organizations. The group has been linked to 49 public disclosures across our corpus. First observed on a leak site on April 8, 2025; most recent post May 18, 2026. The operation is currently active.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.