8Base is a ransomware group that emerged in May 2023, operating with primarily financial motivations and demonstrating a rapid escalation in activity with 458 documented victims across multiple sectors. The group's origin and specific affiliations remain largely undocumented by major security agencies, though their operational patterns suggest they function as an independent ransomware operation targeting predominantly Western markets. Based on publicly available victim data, 8Base appears to focus on opportunistic attacks against business services and manufacturing sectors, with the United States representing their primary target geography, followed by France, Brazil, Italy, and the United Kingdom, indicating a preference for developed economies with established digital infrastructure. The group has notably impacted healthcare and technology sectors alongside their primary business services focus, suggesting a broad targeting approach rather than sector-specific specialization. Given the group's recent emergence in 2023 and continued victim accumulation across diverse geographic and sectoral targets, 8Base appears to remain active as of current reporting periods, though detailed technical methodologies, specific attack vectors, and notable high-profile campaigns have not been extensively documented in public threat intelligence reporting from major security agencies. The group has been linked to 458 public disclosures across our corpus. First observed on a leak site on May 23, 2023; most recent post February 1, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, Bring Solution is reported in Brazil, a country with 319 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.