AiLock is an emerging ransomware group first observed in March 2026 with a primarily financial motivation, having targeted at least 24 known victims across multiple sectors. The group's origin and affiliations remain largely undocumented by major threat intelligence organizations, though their targeting patterns suggest a broad operational scope spanning the United States, Canada, Great Britain, China, and Germany. Based on publicly available information from security researchers, AiLock appears to focus on technology companies, consumer services, manufacturing, and public sector entities, though specific attack methodologies, initial access vectors, and encryption techniques have not been extensively documented by CISA, FBI, or major security firms. The group's relatively recent emergence and limited public documentation suggest they may be a smaller operation or newly formed entity, with no notable major campaigns or high-profile ransoms publicly reported by established threat intelligence sources. Given the March 2026 first observation date and lack of subsequent major public reporting, AiLock's current operational status and capabilities remain largely undetermined by mainstream cybersecurity organizations. The group has been linked to 35 public disclosures across our corpus. First observed on a leak site on March 3, 2026; most recent post May 24, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, Artso International, Inc. is reported in US, a country with 2,713 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.