The ransomed ransomware group is a relatively new cybercriminal organization that emerged in August 2023, primarily motivated by financial gain through extortion activities targeting organizations across multiple countries. Based on their targeting patterns across Japan, Brazil, Russia, Great Britain, and Bulgaria, the group appears to operate internationally without clear geographic limitations, though their country of origin and potential affiliations with other ransomware groups remain undetermined due to limited public intelligence reporting. Given the recent emergence of this group and lack of detailed technical analysis from major security firms, their specific attack methodologies, initial access vectors, and encryption techniques have not been comprehensively documented in publicly available threat intelligence reports from CISA, FBI, or established security researchers. The group has claimed approximately 68 victims across their identified target countries since becoming active, though no specific high-profile campaigns or notable ransom demands have been publicly reported by law enforcement or security organizations. As of current reporting, the group appears to remain active with continued victim claims, though the limited public documentation suggests they operate as a lower-profile ransomware operation compared to more established and widely-tracked ransomware families. The group has been linked to 68 public disclosures across our corpus. First observed on a leak site on August 21, 2023; most recent post October 30, 2023. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Retail & Consumer sector. Geographically, Kasida.bg Database Leaked, Download is reported in Bulgaria, a country with 19 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.