Darkvault is an emerging ransomware group first observed in April 2024, operating with apparent financial motivations and demonstrating a broad international targeting approach across multiple high-value sectors. The group's origin and specific affiliations remain undocumented in public threat intelligence reporting, though their operational patterns suggest a financially motivated cybercriminal organization rather than state-sponsored activity. Given the limited public documentation from established security research organizations, specific details regarding Darkvault's attack methodology, initial access vectors, encryption techniques, and potential data exfiltration practices have not been comprehensively analyzed or reported by major threat intelligence providers such as CISA, FBI, or Mandiant. The group has reportedly compromised approximately 55 victims across diverse geographic regions, with particular concentration in India, the United States, Brazil, the United Kingdom, and South Korea, while demonstrating sector preferences for technology companies, business services, healthcare organizations, transportation and logistics firms, and financial institutions. Due to the group's recent emergence and limited coverage in established threat intelligence channels, comprehensive details regarding notable high-profile campaigns, ransom demands, or specific law enforcement actions remain undocumented in publicly available security research. Current intelligence suggests the group maintains active operations as of late 2024, though the limited public reporting on Darkvault indicates either highly effective operational security or insufficient analysis by major cybersecurity research organizations. The group has been linked to 55 public disclosures across our corpus. First observed on a leak site on April 11, 2024; most recent post January 6, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Transportation/Logistics sector, which has 847 disclosures indexed across all operators we track. Geographically, oexpress.id is reported in Indonesia, a country with 38 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.