Blacktor is a relatively obscure ransomware group that emerged in December 2021 with apparent financial motivations, having targeted a limited number of victims since its inception. The group's origin and potential state affiliations remain unclear due to limited public reporting from major cybersecurity firms and government agencies, though their operational structure appears to be that of a small independent operation rather than a large-scale Ransomware-as-a-Service model. Technical details regarding Blacktor's attack methodology, including their preferred initial access vectors, encryption techniques, and whether they employ double or triple extortion tactics, have not been extensively documented in public threat intelligence reports from established sources such as CISA, FBI, or major security research organizations. With only four known victims documented since their emergence, Blacktor has not achieved the notoriety of major ransomware families and lacks publicly reported high-profile campaigns or significant law enforcement actions. The group's current operational status remains uncertain due to the limited visibility into their activities and the absence of recent public reporting on their campaigns. The group has been linked to 4 public disclosures across our corpus. First observed on a leak site on December 30, 2021. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.