Ralord is an emerging ransomware group first observed in March 2025, operating with primarily financial motivations based on their victim targeting patterns across multiple countries and sectors. The group's origin and affiliations remain unclear due to limited public documentation from established threat intelligence sources, though their targeting of Spanish and Brazilian organizations alongside other Latin American and European countries suggests possible regional familiarity or language capabilities. With only 19 documented victims since their emergence, ralord appears to operate as a smaller-scale ransomware operation, focusing primarily on manufacturing, hospitality and tourism, education, and technology sectors across Spain, Brazil, Saudi Arabia, France, and Argentina. The group's specific attack methodologies, initial access vectors, and whether they employ double or triple extortion tactics have not been publicly documented by major cybersecurity firms or law enforcement agencies. Due to the group's recent emergence and limited public reporting, no notable high-profile campaigns or significant ransoms have been documented in open-source intelligence reports from CISA, FBI, or established security research organizations. Given the recency of their first observed activity in March 2025, ralord appears to remain active, though comprehensive threat intelligence profiles from major security vendors have yet to be published. The group has been linked to 19 public disclosures across our corpus. First observed on a leak site on March 26, 2025; most recent post April 27, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, bettininformatica - suporteon company is reported in Brazil, a country with 319 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.