> ransomware group tracker
Live profiles of active ransomware operations. Tracking TTPs, targets, victim counts, and law enforcement actions across the ransomware ecosystem.
Qilin Agenda
High-volume RaaS operation that surpassed 1,000 leak site victims. Collaborates with initial access brokers for stolen VPN credentials. Known for targeting healthcare, manufacturing, and education sectors.
TTPs
Akira GOLD SAHARA
Dominant RaaS group accounting for 22% of observed incidents in early 2026. Targets small to mid-size businesses across multiple sectors. Known for exploiting VPN vulnerabilities and Cisco ASA flaws.
TTPs
LockBit LockBit 3.0 / LockBit Green
Taken down by Operation Cronos in February 2024 but resurfaced in September 2025. Has stated intent to target critical infrastructure including nuclear and power facilities. Historically the most prolific ransomware operation.
TTPs
Law Enforcement Actions
- Operation Cronos takedown (Feb 2024)
- Multiple affiliate arrests (2024)
- Leader 'LockBitSupp' identified as Dmitry Khoroshev (May 2024)
Clop Cl0p / TA505
Specializes in mass exploitation of file-transfer software zero-days. Responsible for MOVEit (2023), GoAnywhere (2023), and Cleo (2024) campaigns affecting thousands of organizations. Prefers data theft over encryption.
TTPs
Law Enforcement Actions
- Multiple arrests in Ukraine (2021)
Play PlayCrypt
Closed ransomware group (not RaaS) targeting government agencies, police networks, and critical infrastructure primarily in Latin America and Europe. Uses custom encryption and double-extortion tactics.
TTPs
DragonForce
Operating as a ransomware cartel model, absorbing smaller groups like BlackLock/Mamona. Offers white-label ransomware infrastructure to affiliates. Growing rapidly in 2026.