Based on the limited available data, worldleaks is a recently emerged ransomware group that was first observed in May 2025 and appears to be primarily financially motivated, having claimed 134 victims in a relatively short timeframe since its emergence. The group's origin and organizational structure remain unclear, with no publicly documented information from major cybersecurity firms or law enforcement agencies regarding their country of origin, potential affiliations, or operational model. Their targeting patterns indicate a focus on English-speaking countries, particularly the United States, United Kingdom, and Canada, with additional activity observed in Germany and Japan, while their sector targeting shows a preference for healthcare, technology, manufacturing, and consumer services organizations. Due to the group's recent emergence and limited public documentation by established threat intelligence sources, specific details about their attack methodologies, encryption techniques, extortion tactics, and notable campaigns have not yet been comprehensively analyzed or reported by organizations such as CISA, FBI, or major cybersecurity research firms. The group appears to remain active as of the most recent observations, though comprehensive threat intelligence profiling awaits further analysis and documentation by established cybersecurity authorities. The group has been linked to 156 public disclosures across our corpus. First observed on a leak site on May 18, 2025; most recent post May 22, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Manufacturing sector, which has 2,458 disclosures indexed across all operators we track. Geographically, BMJ Paperpack is reported in ID, a country with 23 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.