Ransomedvc is a financially-motivated ransomware group that emerged in August 2023, representing one of the newer entrants in the ransomware ecosystem with a documented victim count of 68 organizations. Given the group's recent emergence and limited public documentation from major cybersecurity organizations, specific details about their country of origin and operational structure remain unclear, though their targeting patterns suggest they operate as an independent group rather than a established RaaS operation. The group demonstrates a preference for targeting critical infrastructure sectors, particularly focusing on Food & Agriculture and Healthcare organizations across a geographically diverse range of countries including Bulgaria, Brazil, Japan, Australia, and Russia, indicating either a broad opportunistic approach or the use of automated scanning tools to identify vulnerable systems. While comprehensive details about their specific attack methodologies, encryption techniques, and whether they employ double or triple extortion tactics have not been extensively documented by major threat intelligence firms, their targeting of healthcare and food sector organizations suggests they may leverage the critical nature of these services to pressure victims into payment. The group's notable campaign activity appears concentrated in their operational period since mid-2023, though no major high-profile attacks or significant law enforcement actions have been publicly reported by CISA, FBI, or other authoritative sources. Ransomedvc appears to remain active as of the latest available intelligence, though their relatively recent emergence means their long-term operational patterns and potential for rebranding or law enforcement disruption remain to be observed. The group has been linked to 68 public disclosures across our corpus. First observed on a leak site on August 21, 2023; most recent post June 7, 2024. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.