Gunra is an emerging ransomware group that was first observed in April 2025, operating with primarily financial motivations based on their targeting patterns across multiple high-value sectors. The group's origin and affiliations remain unclear due to limited public documentation from major security vendors, though their geographic targeting suggests possible international operations given their focus on victims across Brazil, South Korea, Japan, Canada, and Egypt. With approximately 20 known victims to date, Gunra appears to follow conventional ransomware attack methodologies typical of financially-motivated cybercriminal groups, though specific technical details regarding their initial access vectors, encryption methods, or use of double extortion tactics have not been publicly documented by major threat intelligence sources. The group demonstrates opportunistic targeting behavior, focusing primarily on manufacturing organizations while also compromising entities in healthcare, technology, and financial services sectors, suggesting they may operate opportunistically rather than with highly specialized sector expertise. Given the recent emergence of this group in April 2025 and limited public reporting from established threat intelligence organizations such as CISA, FBI, or major security vendors, Gunra's current operational status, technical capabilities, and long-term threat trajectory require continued monitoring as more intelligence becomes available. The group has been linked to 36 public disclosures across our corpus. First observed on a leak site on April 23, 2025; most recent post April 8, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Manufacturing sector, which has 2,458 disclosures indexed across all operators we track. Geographically, MG Chemicals is reported in Canada, a country with 810 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.