Roadsweep is an obscure ransomware group that emerged in July 2022 with apparent financial motivations, though limited public documentation exists about their operations. The group's origin and potential affiliations remain unknown, with no confirmed information about whether they operate as a Ransomware-as-a-Service model or function independently. Based on available data, Roadsweep has demonstrated a specific focus on government facilities, with their targeting primarily concentrated in Albania, though their attack methodology, encryption techniques, and use of data exfiltration tactics have not been publicly documented by major security researchers or government agencies. The group's operational scope appears limited, with only one documented victim identified in public reporting, and no major campaigns or high-profile incidents have been attributed to them by CISA, FBI, or established threat intelligence firms. Current intelligence suggests Roadsweep remains a minor actor in the ransomware landscape with minimal confirmed activity beyond their initial emergence period. The group has been linked to 1 public disclosures across our corpus. First observed on a leak site on July 18, 2022. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.