LA

Lamashtu Ransomware

Active

Threat actor group tracked in the global ransomware database ยท Last disclosure: May 11, 2026

Ransomware-as-a-Service (RaaS) Double Extortion Target: Hospitality and Tourism
25
Total Victims
0.1% of all tracked
15
Countries Targeted
6
Sectors Targeted
2026
First Seen

Threat Actor Analysis

Lamashtu is a ransomware threat group that has disclosed 25 victims in publicly accessible leak site data, representing 0.1% of all ransomware attacks tracked in this database. The earliest victim disclosure attributed to Lamashtu in our dataset dates to May 2026.

Geographically, Lamashtu has targeted organisations in 15 countries. The most frequently targeted nation is France with 4 victim organisations. Other heavily targeted nations include Mexico, Malaysia, Germany.

Industry-wise, Lamashtu shows a concentration in the Hospitality and Tourism, Healthcare, Telecommunication sectors. These industries are frequently targeted because they manage sensitive data, critical operations, or have lower tolerance for operational downtime โ€” conditions that increase ransom payment likelihood.

Like most modern ransomware operations, Lamashtu likely employs a double extortion model: encrypting victim files while simultaneously exfiltrating data, creating dual pressure to pay the ransom. Victim organisations that refuse payment face having their data published on the group's dark web leak site.

Note: This profile is generated from public leak site disclosures aggregated via the ransomware.live API. Data is updated automatically. The victim table below shows the 8 most recent cached victims; the total victim count (25) reflects the complete database.

Recent Victim Disclosures (8 cached of 25 total)

# Organization Country Sector Date
1
Depรณsito Dental Universitario
ddu.mx
๐Ÿ‡ฒ๐Ÿ‡ฝ Mexico Healthcare May 11, 2026
2
Sistemas Electrรณnicos y de Telecomunicaciones
sertes.com.mx
๐Ÿ‡ฒ๐Ÿ‡ฝ Mexico Telecommunication May 11, 2026
3
Acros Sport GmbH
acros-components.com
๐Ÿ‡ฉ๐Ÿ‡ช Germany Manufacturing May 8, 2026
4
Ashtech Infotech
ashinfo.com
๐Ÿ‡ฎ๐Ÿ‡ณ India Technology May 8, 2026
5
WOHA
woha.net
๐Ÿ‡ธ๐Ÿ‡ฌ Singapore Hospitality and Tourism May 6, 2026
6
GRANDHOME
grandhomemart.com
BD Consumer Services May 5, 2026
7
Luna Group
lunagroupeg.com
๐Ÿ‡ช๐Ÿ‡ฌ Egypt โ€” May 4, 2026
8
ROYAL M HOTEL BY GEWAN FUJAIRAH LLC
royalmhotels.com
๐Ÿ‡ฆ๐Ÿ‡ช UAE Hospitality and Tourism May 4, 2026

Frequently Asked Questions

What is Lamashtu ransomware?

Lamashtu is a ransomware threat group that has claimed 25 victims since its first known activity in May 2026. The group operates by infiltrating target networks, exfiltrating data, encrypting files, and threatening to publish stolen data on a dark web leak site if the ransom is not paid.

How many victims has Lamashtu attacked?

Lamashtu has claimed 25 victims in our database, representing 0.1% of all tracked ransomware attacks. The most targeted countries are France, Mexico, Malaysia, Germany.

Which countries does Lamashtu target?

Lamashtu has attacked organizations in 15 countries. The top targeted countries are: France, Mexico, Malaysia, Germany.

Which industries does Lamashtu target?

Lamashtu most frequently targets the Hospitality and Tourism, Healthcare, Telecommunication sectors based on victim disclosures in our database.

Is Lamashtu still active?

Lamashtu's most recent victim disclosure in our database was on May 11, 2026. Ransomware groups frequently rebrand or go dormant; monitor this page and our ransomware map for the latest activity.