Knight is a relatively new ransomware group that emerged in September 2023, operating with primarily financial motivations and demonstrating a focus on targeting critical infrastructure and high-value sectors. The group's origin and specific affiliations remain largely undocumented in public threat intelligence reports, though their operational patterns suggest they operate as an independent entity rather than a established ransomware-as-a-service model. With 48 known victims since their emergence, Knight has shown a preference for targeting organizations across the United States, Brazil, Italy, Spain, and Germany, with particular focus on healthcare, manufacturing, media, and government sectors. Their attack methodology and specific technical capabilities have not been extensively documented by major security firms, though their targeting of healthcare and government entities suggests they employ effective initial access techniques and likely utilize double extortion tactics common among contemporary ransomware groups. While specific notable campaigns have not been widely publicized by CISA, FBI, or major security researchers, the group's consistent activity across multiple countries and high-value sectors indicates sustained operational capability. Knight appears to remain active as of current reporting, though detailed technical analysis and specific law enforcement actions against the group have not been publicly documented by authoritative sources. The group has been linked to 48 public disclosures across our corpus. First observed on a leak site on September 6, 2023; most recent post February 12, 2024. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Government sector, which has 509 disclosures indexed across all operators we track. Geographically, Chamber of Deputies of Romania (Camera Deputaților din România) is reported in Romania, a country with 8 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.