SunCrypt is a financially motivated ransomware group that emerged in August 2020, operating as a relatively smaller but persistent threat actor in the cybercriminal landscape. The group's country of origin remains unclear, though they appear to operate independently rather than as a Ransomware-as-a-Service model, with limited documented connections to other established ransomware families. SunCrypt typically gains initial access through common vectors such as phishing emails and exploitation of remote desktop protocol vulnerabilities, and they employ double extortion tactics by exfiltrating sensitive data before deploying their encryption payload, threatening to publish stolen information if ransom demands are not met. The group has demonstrated a particular focus on targeting critical infrastructure sectors, having compromised at least 32 known victims primarily across the United States and United Kingdom, with healthcare organizations, educational institutions, manufacturing companies, and technology firms representing their preferred targets. While SunCrypt has not achieved the notoriety of major ransomware operations like Conti or REvil, they have maintained consistent activity since their emergence, though their current operational status appears to have diminished significantly with reduced observed activity in recent reporting periods. The group has been linked to 32 public disclosures across our corpus. First observed on a leak site on August 24, 2020; most recent post June 18, 2022. The operation is currently inactive.
Also tracked as: Sun.
Sector and geography
Geographically, Consumers Supply Distributing LLC is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.