Flocker Ransomware
TrackedThreat actor group tracked in the global ransomware database Β· Last disclosure: Unknown
Threat Actor Analysis
Flocker is a ransomware threat group that has disclosed 59 victims in publicly accessible leak site data, representing 0.3% of all ransomware attacks tracked in this database.
Geographically, Flocker has targeted organisations in 16 countries. The most frequently targeted nation is United States with 6 victim organisations. Other heavily targeted nations include Taiwan, UAE, Canada.
Like most modern ransomware operations, Flocker likely employs a double extortion model: encrypting victim files while simultaneously exfiltrating data, creating dual pressure to pay the ransom. Victim organisations that refuse payment face having their data published on the group's dark web leak site.
Note: This profile is generated from public leak site disclosures aggregated via the ransomware.live API. Data is updated automatically. The victim table below shows the 0 most recent cached victims; the total victim count (59) reflects the complete database.
Recent Victim Disclosures (0 cached of 59 total)
Frequently Asked Questions
What is Flocker ransomware?
Flocker is a ransomware threat group that has claimed 59 victims since its first known activity. The group operates by infiltrating target networks, exfiltrating data, encrypting files, and threatening to publish stolen data on a dark web leak site if the ransom is not paid.
How many victims has Flocker attacked?
Flocker has claimed 59 victims in our database, representing 0.3% of all tracked ransomware attacks. The most targeted countries are United States, Taiwan, UAE, Canada.
Which countries does Flocker target?
Flocker has attacked organizations in 16 countries. The top targeted countries are: United States, Taiwan, UAE, Canada.
Which industries does Flocker target?
Flocker has targeted organizations across multiple industries including healthcare, manufacturing, and business services.
Is Flocker still active?
Based on available data, Flocker's current operational status is uncertain. Check the ransomware map for the latest activity.