Dispossessor is a recently emerged ransomware group that began operations in April 2024, primarily motivated by financial gain through extortion campaigns targeting organizations across multiple sectors. The group's country of origin and potential affiliations with other ransomware operations remain unclear based on publicly available intelligence, and there is insufficient documented evidence to confirm whether they operate as a Ransomware-as-a-Service model or as an independent entity. Given the group's recent emergence, detailed technical analysis of their attack methodology, specific initial access vectors, encryption techniques, and data exfiltration practices have not been extensively documented by major cybersecurity firms or law enforcement agencies, though their targeting patterns suggest they employ typical ransomware deployment strategies against business services, healthcare, technology, financial services, and manufacturing sectors. The group has reportedly compromised 344 victims since their emergence, with primary targeting focus on organizations in the United States, Canada, France, the United Kingdom, and India, indicating a preference for English-speaking and Western European targets. As of current reporting, Dispossessor appears to remain active with no documented law enforcement disruption actions or confirmed rebranding activities, though the limited timeframe since their emergence in April 2024 means their operational longevity and persistence remain to be determined. The group has been linked to 344 public disclosures across our corpus. First observed on a leak site on April 19, 2024; most recent post June 17, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, TNT Materials tnt-materials.com is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.