Nightsky is a relatively obscure ransomware group that first emerged in January 2022, with only two documented victims indicating limited operational scale or highly selective targeting for financial gain. The group's origin and potential affiliations remain largely unknown, with no publicly documented information from major security firms or law enforcement agencies regarding their geographic base of operations or connections to established ransomware ecosystems. Due to the limited public reporting on this group, specific details about their attack methodologies, initial access vectors, encryption techniques, or whether they employ double or triple extortion tactics have not been documented by reputable threat intelligence sources. No major campaigns, high-profile victims, or significant law enforcement actions against Nightsky have been publicly reported by CISA, FBI, or established security researchers. The current operational status of Nightsky remains unclear given the sparse public intelligence available about this group's activities beyond the initial 2022 timeframe. The group has been linked to 2 public disclosures across our corpus. First observed on a leak site on January 4, 2022; most recent post January 25, 2022. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.