CrazyHunter is a recently emerged ransomware group first observed in March 2025, operating with apparent financial motivations based on their targeting patterns across multiple high-value sectors. The group's origin and affiliations remain unclear due to limited public documentation, though their operational focus on Taiwan and the United States suggests either geographic proximity to these regions or specific economic interests in these markets. Based on available data, CrazyHunter has compromised at least 10 victims across healthcare, manufacturing, technology, and consumer services sectors, demonstrating a broad targeting approach typical of opportunistic ransomware operations. The group's attack methodology, encryption techniques, and specific tools remain undocumented in public threat intelligence reporting from major security firms and government agencies. Given the recent emergence of this group and limited public reporting, notable campaigns and specific high-profile incidents have not been documented by reputable security researchers or law enforcement agencies. CrazyHunter appears to remain active as of the latest available intelligence, though the group's operational scale and sophistication cannot be definitively assessed due to insufficient public documentation. The group has been linked to 10 public disclosures across our corpus. First observed on a leak site on March 9, 2025; most recent post March 30, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Manufacturing sector, which has 2,458 disclosures indexed across all operators we track. Geographically, Huacheng Electric is reported in TW, a country with 46 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.