agelocker is a relatively obscure ransomware operation that first emerged in August 2020, appearing to be financially motivated like most ransomware groups. Given the limited public documentation and single known victim, the group's country of origin and operational structure remain unclear, with no established connections to other ransomware families or confirmation of whether they operate as a standalone group or part of a larger ransomware-as-a-service ecosystem. The group has demonstrated targeting of the information technology sector, though their specific attack vectors, encryption methods, and whether they employ data exfiltration tactics are not well-documented in public threat intelligence reporting from major security firms or government agencies. With only one publicly documented victim since their 2020 emergence, agelocker does not appear to have conducted any high-profile campaigns or attracted significant law enforcement attention. The current operational status of agelocker remains uncertain due to the limited intelligence available, though the lack of recent public reporting suggests either minimal activity or cessation of operations. The group has been linked to 1 public disclosures across our corpus. First observed on a leak site on August 30, 2020. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.