killsec is a relatively new ransomware group that emerged in March 2024, operating with apparent financial motivations and demonstrating broad targeting across multiple geographic regions and industry sectors. The group's origin and potential state affiliations remain unclear due to limited public documentation from major threat intelligence sources, though their targeting pattern suggests opportunistic rather than geopolitically motivated operations. With 276 documented victims primarily concentrated in the United States, India, the United Kingdom, Brazil, and Belgium, killsec appears to focus heavily on healthcare, technology, business services, and financial sectors, indicating either specific tooling designed for these environments or opportunistic targeting of organizations with valuable data and high pressure to restore operations quickly. Given the group's recent emergence and the lack of detailed technical analysis from established cybersecurity firms like Mandiant or law enforcement advisories from CISA or FBI, specific details about their attack methodology, initial access vectors, encryption techniques, and extortion tactics have not been publicly documented in authoritative sources. The group remains active as of current reporting, though the limited intelligence profile suggests they may be either a smaller operation or one that has not yet attracted significant attention from major threat intelligence organizations despite their substantial victim count. The group has been linked to 279 public disclosures across our corpus. First observed on a leak site on March 21, 2024; most recent post May 14, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, seajob is reported in India, a country with 255 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.