Toufan is a ransomware group that emerged in December 2023, operating with apparent financial motivations and demonstrating a preference for targeting victims across Israel, Canada, Singapore, Australia, and Great Britain. The group has claimed responsibility for compromising 117 victims since its emergence, though detailed public documentation from major threat intelligence firms regarding their specific origin, country of operation, or organizational structure remains limited. Given the recent emergence of this group and the geographic distribution of their targeting, comprehensive technical analysis of their attack methodologies, encryption techniques, and initial access vectors has not been extensively documented in public threat intelligence reporting from established security research organizations. The group's targeting pattern suggests a focus on English-speaking countries and Israel, though the specific sectors or victim profiles they prioritize, along with details about ransom demands or notable high-profile compromises, have not been widely reported in mainstream cybersecurity intelligence channels. As a recently emerged threat actor first observed in late 2023, Toufan appears to remain active based on the accumulation of claimed victims, though comprehensive assessment of their current operational status requires further monitoring and analysis by established threat intelligence communities. The group has been linked to 117 public disclosures across our corpus. First observed on a leak site on December 17, 2023; most recent post December 27, 2023. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Manufacturing sector, which has 2,458 disclosures indexed across all operators we track. Geographically, www.atwoodindustries.com is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.