Sarcoma is a relatively new ransomware group that emerged in October 2024, operating with apparent financial motivations and demonstrating a broad international targeting approach with at least 140 documented victims across multiple countries and industry sectors. The group's origin and affiliations remain unclear due to its recent emergence, with no publicly documented connections to established ransomware families or confirmation of whether they operate as an independent entity or through a Ransomware-as-a-Service model. Limited public information is available regarding Sarcoma's specific attack methodologies, initial access vectors, or technical capabilities, though their targeting patterns suggest opportunistic rather than highly selective victim selection across diverse industries including manufacturing, business services, agriculture and food production, and technology sectors. The group has shown a particular focus on victims in the United States while also maintaining operations against targets in Italy, Canada, Germany, and Australia, though no specific high-profile attacks or record ransom demands have been publicly documented by major security firms or law enforcement agencies. Given the group's recent emergence in late 2024, Sarcoma appears to remain active with no reported law enforcement disruptions or confirmed rebranding activities at this time. The group has been linked to 150 public disclosures across our corpus. First observed on a leak site on October 9, 2024; most recent post May 12, 2026. The operation is currently active.
Also tracked as: Sarcoma Ransomware Group.
Sector and geography
This disclosure adds to ransomware activity in the Consumer Services sector, which has 396 disclosures indexed across all operators we track. Geographically, CARSTAR Business Group is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.