Unsafeleak is a relatively new ransomware group that emerged in December 2022, operating with primarily financial motivations and targeting organizations across developed nations. The group has claimed 14 victims to date, with their operations concentrated in the United States, France, and Switzerland, showing a preference for attacking manufacturing companies, government entities, educational institutions, and transportation/logistics organizations. Due to the limited public documentation available from major threat intelligence sources, specific details about Unsafeleak's country of origin, operational structure, attack methodologies, and technical capabilities remain largely unknown to security researchers. Given the group's recent emergence and relatively small victim count, there have been no widely reported major campaigns or high-profile attacks that have garnered significant attention from law enforcement agencies or cybersecurity firms. The current operational status of Unsafeleak is unclear, as the group's low profile and limited public reporting make it difficult to determine whether they remain active, have ceased operations, or have potentially rebranded under a different name. The group has been linked to 14 public disclosures across our corpus. First observed on a leak site on December 21, 2022; most recent post January 14, 2024. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Transportation/Logistics sector, which has 847 disclosures indexed across all operators we track. Geographically, Hartl European Transport Company is reported in Switzerland, a country with 78 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.