The Silent ransomware group is a newly emerged cybercriminal organization first observed in April 2025, appearing to be financially motivated based on their ransomware operations targeting organizations primarily in the United States and Canada. Given the group's recent emergence and limited public documentation, their specific country of origin and operational structure remain unclear, though their targeting patterns suggest a focus on English-speaking markets. With only six known victims documented to date, detailed information about their attack methodology, encryption techniques, and specific tools remains limited in publicly available threat intelligence reporting. The group has demonstrated a preference for targeting technology companies, manufacturing organizations, and public sector entities, though the small victim sample size makes broader targeting pattern analysis preliminary. Due to the group's recent emergence in April 2025, there are no widely reported major campaigns or law enforcement actions documented by established security researchers or government agencies. Silent remains active as of current reporting, though their limited victim count and recent emergence suggest they are either a new player in the ransomware ecosystem or operate with a highly selective targeting approach. The group has been linked to 6 public disclosures across our corpus. First observed on a leak site on April 23, 2025; most recent post June 21, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, Versa Networks is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.