Braincipher is a recently emerged ransomware group that was first observed in July 2024, operating with apparent financial motivations and targeting organizations primarily across North America and Europe. The group's origin and potential affiliations remain largely undocumented by major threat intelligence organizations, though their targeting patterns suggest a broad opportunistic approach rather than nation-state backing, likely operating as an independent entity rather than through established ransomware-as-a-service infrastructure. Their attack methodology and specific technical capabilities have not been extensively documented by CISA, FBI, or major security research firms, though their victim distribution across 44 confirmed targets spanning business services, manufacturing, technology, and healthcare sectors indicates a generalist approach to target selection rather than sector-specific expertise. No major high-profile campaigns or significant law enforcement actions have been publicly documented against this group by reputable sources, suggesting either a relatively low-impact operational scale or insufficient intelligence collection on their activities. As of current reporting, the group's operational status remains unclear due to limited public documentation from established threat intelligence sources. The group has been linked to 56 public disclosures across our corpus. First observed on a leak site on July 1, 2024; most recent post May 13, 2026. The operation is currently active.
Also tracked as: brain cipher.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, neatem.fr is reported in France, a country with 472 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.