Ciphbit is a relatively new ransomware group that emerged in September 2023, operating with primarily financial motivations and demonstrating a focused targeting approach across Western nations. The group's origin and potential affiliations remain largely undocumented by major threat intelligence organizations, though their operational patterns suggest they operate as an independent entity rather than a established ransomware-as-a-service model. With limited public documentation from authoritative sources like CISA, FBI, or major security research firms, specific details regarding their attack methodology, initial access vectors, and encryption techniques have not been comprehensively analyzed or reported in open-source intelligence. The group has claimed responsibility for attacks against 36 documented victims, primarily concentrating their operations in the United States, Italy, France, Germany, and Portugal, with a notable preference for targeting business services, manufacturing, healthcare, and construction sectors. No major high-profile campaigns or significant law enforcement actions against Ciphbit have been publicly documented by authoritative sources as of current reporting. Based on available intelligence, Ciphbit appears to remain active as of late 2023, though their relatively recent emergence and limited public documentation make definitive status assessments challenging without additional confirmed reporting from established threat intelligence sources. The group has been linked to 36 public disclosures across our corpus. First observed on a leak site on September 14, 2023; most recent post February 10, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, CopySmart LLC is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.