Anubis is a recently emerged ransomware group that began operations in February 2025, primarily motivated by financial gain through encryption and extortion attacks. The group has demonstrated rapid expansion, accumulating 65 documented victims within a short operational timeframe. Given the group's recent emergence, limited information is publicly available regarding their specific country of origin, organizational structure, or confirmed affiliations with other cybercriminal entities, though their operational patterns suggest they may operate as an independent group or small-scale ransomware-as-a-service operation. Their attack methodology appears to focus on opportunistic targeting across multiple geographic regions, with victims concentrated primarily in the United States, Australia, Canada, the United Kingdom, and France, indicating either English-language proficiency or the use of automated tools that facilitate cross-border operations. The group demonstrates a clear preference for targeting healthcare organizations and manufacturing companies, followed by business services and technology sectors, suggesting they prioritize organizations with critical operational dependencies that may be more likely to pay ransoms quickly. Due to the group's recent emergence in early 2025, there is insufficient publicly documented information from established cybersecurity firms or law enforcement agencies regarding their specific technical capabilities, encryption methods, or whether they employ double or triple extortion tactics involving data theft and leak sites. As of current reporting, Anubis remains an active threat with continued victim acquisition, though the full scope of their capabilities and long-term operational sustainability remains to be determined as security researchers continue to analyze their activities. The group has been linked to 77 public disclosures across our corpus. First observed on a leak site on February 25, 2025; most recent post May 13, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, [Redacted] Ticket #1989 is reported in United Kingdom, a country with 902 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.