IMNCrew is a recently emerged ransomware group first observed in May 2025, operating with apparent financial motivations based on their targeting patterns and victim selection. The group's origin and affiliations remain unclear due to limited public documentation, though their geographic targeting suggests potential international operations with no confirmed ties to established ransomware families or known state-sponsored actors. Based on available intelligence, IMNCrew appears to employ traditional ransomware deployment methods targeting organizations across multiple sectors, though specific technical details regarding their initial access vectors, encryption implementations, or data exfiltration capabilities have not been publicly documented by major security researchers or government agencies. The group has compromised approximately 12 known victims primarily across the United States, Sweden, Canada, Mexico, and Indonesia, with notable focus on consumer services, healthcare, financial services, and technology sectors. IMNCrew appears to remain active as of their recent emergence, though comprehensive threat intelligence regarding their operations, infrastructure, and specific attack methodologies requires further documentation from established security research organizations. The group has been linked to 12 public disclosures across our corpus. First observed on a leak site on May 5, 2025; most recent post September 16, 2025. The operation is currently inactive.
Also tracked as: imn crew.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, Repremundo.com.co is reported in CO, a country with 9 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.