Flocker Ransomware

Under attack by ransomware or suffering a cyber breach?

Speed is critical when facing a live cyber attack. If you believe you’ve been compromised, by the Flocker ransomware group or another threat actor - contact us immediately.

About Flocker ransomware group

What we can help with:

Previously known as FSociety in 2016, the group reemerged as Flocker in 2023. It has since partnered with ransomware entity FunkSec, forming one of the more coordinated ransomware groups in recent years, leveraging their combined strengths for more effective operations.

Flocker is known for launching sophisticated ransomware attacks that lock victims’ data and encrypt entire systems. Victims are then presented with a ransom demand, often in cryptocurrency, to regain access and prevent the exposure or sale of stolen data on the dark web.

Request a call back

If your organisation has been infected with ransomware contact us immediately.

How Flocker operators work

First identified in late 2023, Flocker is notorious for its aggressive attack methods and rapid expansion across multiple sectors. While believed to have evolved from the earlier FSociety group, security experts note significant differences in their impact, tactics, and use of advanced ransomware tools.

Flocker primarily targets Windows and Linux systems, distributing its malware through phishing emails, compromised remote desktop protocol (RDP) credentials, and exploit kits. Once inside a network, Flocker rapidly encrypts files and exfiltrates sensitive data, leveraging a double extortion model. Victims are not only locked out of their systems but also threatened with the public release of stolen and sensitive data if they fail to pay the ransom. In many cases, Flocker has been known to leak sensitive data on dark web forums as part of its intimidation strategy.

There is increasing speculation that Flocker operates under a ransomware as a service (RaaS) model, allowing affiliates to deploy its malware in exchange for a share of the profits. This has further fueled its growth and widened its reach.

Due to the growing number of successful attacks, Flocker is expected to become an increasingly dangerous threat to businesses worldwide. Security researchers continue to monitor its activities, warning organisations to bolster their cyber security measures against this evolving ransomware threat.

We are equipped to deal with an attack from any ransomware group.

Don’t hesitate to contact us if you are under attack from a ransomware group not listed above. 

Recognising a Flocker attack

Flocker uses double extortion tactics, combining file encryption with data theft to pressure victims into making ransom payments. Even with backups in place, the threat of exposing confidential or sensitive business information can lead to severe financial and reputational damage.

Additionally, Flocker disables security tools and attempts to delete backups, making recovery significantly harder. If the ransom remains unpaid, the stolen data is often published on a data leak site or sold to other cybercriminals via dark web marketplaces.

Recent reports also suggest Flocker is expanding its capabilities to target mobile devices, signaling a broader shift in its attack surface and increasing its threat profile across both enterprise and consumer environments.

Why you must not interfere with your ransomware environment

If you discover a physical break-in at your offices, your first instinct would be to call the police; touch nothing and let them search for clues. Then, your focus would shift to restoring business operations.

A cyber-attack requires the same approach. Your digital environment is a CRIME SCENE. It is crucial to leave the environment untouched to allow for a forensic investigation.

This is not a task for your IT team or MSP. Digital Forensic specialists are available 24/7 to assist you, just like in a physical crime.

Post breach actions

  • Call a NCSC Cyber Incident Response approved supplier Some NCSC providers will fund up to 48 hours of investigation into your incident.
  • Report the incident to Report Fraud
  • Locate your business continuity plan Work out what you can do without access to your systems and data.
  • Identify your business insurance contact details
Business woman contacting a Zensec ransomware recovery service

Who are we and what experience do we have in responding to cyber incidents?

We are accredited to ISO 27001 and recognised by the UK’s National Cyber Security Centre (NCSC).

We provide comprehensive cyber risk management services, with a core focus on Digital Forensics and Incident Response (DFIR). Our capabilities are driven by a 24/7 Security Operations Centre and a dedicated in-house intelligence team that delivers timely, actionable threat reporting.

With decades of collective cyber security experience, we have the expertise to assume operational ownership of your entire IT security architecture – simplifying and strengthening cyber security across your business.

As an Assured Service Provider for Cyber Incident Response (CIR) at the Standard Level. This accreditation demonstrates our ability to deliver high-assurance, effective support in response to a wide range of cyber threats.

Your NCSC-approved supplier is a specialist crime scene investigator who will:

  1. Isolate and preserve your environment for forensic investigation.
  2.  Identify where the data has been duplicated and issue a legal takedown order.
  3. Identify your data, application and systems restore points. These might be at different points in time and will need to be carefully restored and reconstructed in a pristine environment.
  4.  Liaise with your business insurance company and if needed, with the Police.
  5. Advise you on notifying your customers of your situation.
  6. Rebuild your systems, restore your data and get you back to full operation. Note: This process can take between 2 weeks – 2 months.

 

Working with us

Our response process

Our team are ransomware recovery specialists with a proven, streamlined approach to resolving incidents quickly and effectively.

Step 1: Triage

We deploy our incident response team the same day. From the first call, we begin onboarding, introduce key stakeholders, set communication schedules, and start gathering critical information to guide the response.

Step 2: Investigation

DFIR (Digital Forensic Incident Response) teams investigate breaches to identify vulnerabilities, attack vectors, and system impacts from ransomware such as Data Loss (PII). We deliver clear forensic insights to guide mitigation.

Step 3: Contain

Our onsite and remote teams act fast to stop the attack in its tracks. That includes isolating affected systems, removing malicious code, and putting protections in place to prevent further spread or damage.

Step 4: Remediate & Eradicate

Once contained, we work to fully eliminate the threat. This includes fixing exploited vulnerabilities, restoring systems to a secure state, and ensuring no traces of the attack remain.

Step 5: Recover

Our incident response teams help get your business back to normal. We restore access to systems, recover data, and ensure services are safe, stable, and functioning, with minimal downtime.

Step 6: Post Incident

We conduct a full review of the incident response and recovery efforts. Together we assess what happened, what worked, and what can be improved, helping you build stronger defences for the future.

Forensic analysis to drive recovery

Our process includes a thorough digital forensic analysis from step two where the output becomes a central component of business recovery. This is because understanding the attack is of critical importance:

  • Informing an initial infection date

  • The extent and spread of infection

  • Data exfiltration having an impact on regulatory positions

  • Ensuring that the attacker and any tooling or artefacts they leave behind are eradicated

It is critical that the analysis of digital evidence is carried out to an agreed plan.

Maximising early root cause discovery and legal leverage

The process is purpose-built to uncover the root cause as early as possible, which is essential to inform remediation / eradication and recovery as well as supporting a legal take-down case if this is applicable. A legal take-down means we can assist in the legal enforcement that stops the criminals from publishing the data, thus undermining the ransom notice.

Our Digital Forensic and Incident Response (DFIR) teams maintain consistent communication throughout. Dedicated Incident Managers and technical engineering leads provide updates during the Cyber Incident Response journey, utilising risk registers and working within change management processes, all from triage through to post-incident, delivering successful business recovery.

Key take aways

  • You will not be able to access your systems or data.
  • It is advised to disconnect from the internet and shut down your systems, including PCs, to prevent further infections.
  • Your Office 365 system might also be compromised, allowing the attackers to monitor your responses. Avoid communicating with individuals through your primary email or team systems.
  • Threat actors typically infiltrate your system at least 2-4 weeks before you become aware of the attack. Your data will have already been exfiltrated. If your system is encrypted, this was not an overnight event.
  • Ransom demands in the UK typically range from £500,000 to £3 million, with some sectors, like education, facing demands that exceed £5 million
  • Paying the ransom may violate financial sanctions, which is a criminal offence and could result in a custodial sentence or further financial penalties.
  • If your data is sold or published online, it puts your customers and staff at risk, potentially implicating you in a Data Protection breach.
  • You will need to submit a data takedown request to the initial location where the data was transferred.
  • Do not overwrite the encrypted data. It is crucial to determine when the infection began and where the data was sent.
  • Avoid rebuilding from the latest backup, as it is likely to be infected.

Why should I trust Zensec to do this work rather than my IT team?

A forensic analysis needs to be meticulous and a clean restore and recovery requires a wealth of experience not normally available in an in-house team who must provide a broader range of IT support skills:

Internal IT teams don’t have the necessary skill set to resolve security encryption issues themselves. 

IT teams may recover to the same position with indicators of compromise ready to do it again… which can lead to another breach.

Internal teams are pressured to restore business operations and may recover before forensic analysis even begins, potentially destroying the crime scene before completion.

description Sector Date Discovered Attack Date Country Screenshot
To The IEEE Sensors Council We Have Breached APSCON2025 Event And Full Attendees Guest List And Registry System And Global […] Technology 31/07/2025 10:19 PM 31/07/2025 12:00 AM US View' rel='' target='_self'>View
For The Council Of T*****d Group We Have Breached You Main System T**********p.com a global, multi-manager investment platform exclusively focused […] Not Found 31/07/2025 02:52 PM 31/07/2025 12:00 AM View' rel='' target='_self'>View
For The Board Of G*****n Group We have breached your Main system and exfiltrated backup copy of all the data. Not Found 31/07/2025 10:42 AM 31/07/2025 12:00 AM -
To The Leadership Of National C******i University We Compromised The Department Of Statistics conducted research on data matrix visualization and […] Not Found 31/07/2025 10:42 AM 31/07/2025 12:00 AM TW -
For the leadership of G****l H********e A*****y We have compromised your main servers G*********************y.org and 3rd Party Entity’s leveraging your […] Not Found 15/07/2025 03:17 AM 15/07/2025 12:00 AM View' rel='' target='_self'>View
To The Board Of Interior Design Group As the Cayman Islands longest-standing interior design company, IDG has a long history Not Found 07/07/2025 09:46 PM 30/06/2025 12:00 AM KY View' rel='' target='_self'>View
The Board Of S******h S**w LLP You Operate one of the world’s largest firms With approximately 900 lawyers across 18 […] Not Found 05/07/2025 09:46 AM 05/07/2025 12:00 AM View' rel='' target='_self'>View
To The Board Of I******r D****n G***p As the C****n Islands’ longest-standing interior design company, I*G has a long history […] Not Found 30/06/2025 09:24 PM 30/06/2025 12:00 AM View' rel='' target='_self'>View
To The Leadership Of Ajman Department of Land & Real Estate Department of Land & Real Estate Regulation in Ajman […] Public Sector 12/06/2025 11:14 PM 05/06/2025 12:00 AM AE View' rel='' target='_self'>View
To The Leadership Of A*****e D********t of L**d & R**l E****e We have breached main servers, And We Also Exfiltrated […] Public Sector 05/06/2025 06:17 PM 05/06/2025 12:00 AM View' rel='' target='_self'>View
For The Council Of LTS Group We have breached your main system Lts.com.vn LTS LAW, a key component of LTS […] Technology 05/06/2025 04:48 AM 28/05/2025 12:00 AM VN View' rel='' target='_self'>View
For The Leadership Of Data-Core Systems Inc In 2016 Data-Core Systems Inc. founded Data-Core The Automation Company, with a focus Not Found 01/06/2025 04:48 AM 25/05/2025 12:00 AM View' rel='' target='_self'>View
To The Board Of Trust Group Firm Trust Group is a well-established, multi-faceted organization with over two decades of expertise Not Found 31/05/2025 06:16 AM 23/05/2025 12:00 AM AE View' rel='' target='_self'>View
For The Council Of L*S GROUP We have breached your main system l*s.com.vn We also took backup copy of all […] Not Found 28/05/2025 01:42 PM 28/05/2025 12:00 AM View' rel='' target='_self'>View
For The Leadership Of D**a-C**e S*****s Inc We have compromised your main server D****v.org we also took copy of all […] Healtcare 25/05/2025 10:14 AM 25/05/2025 12:00 AM View' rel='' target='_self'>View
To The Board Of T***t L*****s & L***l C*********s We have breached one of your servers and exfiltrated data, we […] Not Found 23/05/2025 08:16 PM 23/05/2025 12:00 AM AE View' rel='' target='_self'>View
To the Leadership Of S*****r We have gained access to your main system, Z*****a.com and took backup of all data. […] Not Found 19/04/2025 02:03 AM 19/04/2025 12:00 AM View' rel='' target='_self'>View
To the management of W***** LLP We have breached the main servers, and took down W*******w.com, we have also taken […] Not Found 28/03/2025 02:14 AM 28/03/2025 12:00 AM View' rel='' target='_self'>View
To the management of Salem Erode Investment Limited We have breached your system servers Salemerode.com also extracted valuable files, customer […] Not Found 09/03/2025 02:11 PM 03/03/2025 12:00 AM DE View' rel='' target='_self'>View
To the management of S***m E***e I********t Limited We have breached your system servers S********e.com also extracted valuable files, customer Not Found 03/03/2025 12:54 PM 03/03/2025 12:00 AM View' rel='' target='_self'>View
To the board of K*** ********y ******e We have owned your system at k**d.edu we also took backup of data […] Education 03/03/2025 12:52 PM 03/03/2025 12:00 AM -
To the leadership of Zamservices We have compromised Eservices.gov.zm main servers, backup, internal network, we also exfiltrated all data before […] Public Sector 19/02/2025 10:21 AM 12/02/2025 12:00 AM ZM View' rel='' target='_self'>View
To the board of GPSTECH2007 We have compromised your system servers for Gpstech2007.com and locked out all user, we also Technology 16/02/2025 02:53 AM 08/02/2025 12:00 AM View' rel='' target='_self'>View
For the Administration of Mervis.info We have compromised Mervis.info system and extracted data to do with system control and operation Not Found 16/02/2025 02:52 AM 08/02/2025 12:00 AM View' rel='' target='_self'>View
To The council Of Realtime Taiwan We have breached Realtime.tw server and extracted data on all employee, and other company Technology 16/02/2025 02:49 AM 08/02/2025 12:00 AM TW View' rel='' target='_self'>View
To the board of A********n N******l U********y We have took over the servers A*u.edu.au and before encryption we extracted all […] Education 16/02/2025 02:48 AM 16/02/2025 12:00 AM AU View' rel='' target='_self'>View
To the leadership of Z*********S We have compromised E*******s.gov.zm main servers, backup, internal network, we also exfiltrated all data before […] Public Sector 12/02/2025 01:59 PM 12/02/2025 12:00 AM ZM View' rel='' target='_self'>View
The council Of R******e we look forward to talk We have breached R******e.tw server and extracted data on all employee, […] Not Found 08/02/2025 11:03 AM 08/02/2025 12:00 AM TW View' rel='' target='_self'>View
To the board of G*********7 We have compromised your system servers for G*********7.com and locked out all user, we also Not Found 08/02/2025 08:21 AM 08/02/2025 12:00 AM View' rel='' target='_self'>View
For the Administration of m****s.info We have compromised M****s.info system and extracted data to do with system control and operation […] Not Found 08/02/2025 08:20 AM 08/02/2025 12:00 AM View' rel='' target='_self'>View
To the leadership of TOSH LOGISTICS CO LIMITED We have breached the system entirely we also took all data with Technology 05/02/2025 06:38 AM 31/01/2025 12:00 AM View' rel='' target='_self'>View
To the management of A2B Cargo We have gained access to A2b-cargo.com and have obtained sensitive data including Driver, Employee […] Transportation/Logistics 05/02/2025 06:36 AM 31/01/2025 12:00 AM US View' rel='' target='_self'>View
To The Organization of Punjab.gov.pk We have owned the servers and extract ed all data of all officers and Employees working Public Sector 31/01/2025 06:53 PM 31/01/2025 06:51 PM PK View' rel='' target='_self'>View
To the managment of w*****e.com We have breached the main system servers and extracted all client details, including all employee Not Found 31/01/2025 06:51 PM 31/01/2025 06:50 PM View' rel='' target='_self'>View
To the leadership of T**H L*******S CO LIMITED We have breached the system entirely we also took all data with Not Found 31/01/2025 06:50 PM 31/01/2025 06:49 PM View' rel='' target='_self'>View
To the management of A** ****o We have gained access to A**-****o.com and have obtained sensitive data including Driver, Employee […] Not Found 31/01/2025 06:49 PM 31/01/2025 06:47 PM View' rel='' target='_self'>View
To the leadership of K****S.COM, We have gained access to K****S.COM and have obtained Server data including user information and […] 21/12/2024 02:01 AM 21/12/2024 12:00 AM View' rel='' target='_self'>View
To the board of d****I.org, We have gained access to your system and have procured highly confidential data, including 2.1TB […] Not Found 05/11/2024 02:53 AM 05/11/2024 12:00 AM View' rel='' target='_self'>View
To the management of C**********M.com, We have breached C**********M.com and have obtained all data including user information and transaction histories. […] Not Found 30/10/2024 08:41 PM 30/10/2024 12:00 AM View' rel='' target='_self'>View
To the executives of F*******M, We have successfully breached F*******M.com and obtained critical data from your servers. This includes 3.5TB Not Found 24/10/2024 05:37 AM 24/10/2024 12:00 AM View' rel='' target='_self'>View
To the management of Coinmama, We have gained access to B****A.ca and have obtained sensitive data including user information and […] Not Found 24/10/2024 05:36 AM 24/10/2024 12:00 AM View' rel='' target='_self'>View
We have infiltrated the Q***M.com servers, a well-known Money Management institution. In just 7 days, if payment not submitted in […] Technology 18/10/2024 07:33 AM 18/10/2024 12:00 AM US View' rel='' target='_self'>View
To the board of K***N, We have gained access to your system at K***N.com and have procured highly confidential data, […] Not Found 10/10/2024 01:33 AM 10/10/2024 12:00 AM KR -
We have Access Y*********I.edu servers, a well-known University. In just 7 days, we will leak all data we have taken. […] Technology 14/08/2024 09:08 PM 14/08/2024 12:00 AM US -
To the Firm of A****N, We have gained unauthorized access to A***N.com and have gained highly confidential data, including 145GB […] Business Services 07/08/2024 04:43 PM 07/08/2024 12:00 AM View' rel='' target='_self'>View
To the executives of A*****D, We have breached A*****D.com servers and your security measures and obtained critical data from your […] Technology 19/07/2024 10:42 AM 19/07/2024 12:00 AM -
To the board of O***M, We have gained access to your system O***M.com and have highly confidential data, including 450GB […] Technology 10/07/2024 09:34 AM 10/07/2024 12:00 AM View' rel='' target='_self'>View
To the board of F*****H, We have gained unauthorized access to your system F*****H.com and have procured highly confidential data, Financial 03/07/2024 09:15 AM 03/07/2024 12:00 AM View' rel='' target='_self'>View
To the leadership of K*****S.ca We have infiltrated the K*****S.ca servers, a well-known Law Firm institution. In just 7 days, […] Technology 03/07/2024 09:14 AM 03/07/2024 12:00 AM View' rel='' target='_self'>View
To The Leadership Of H*******Y We have Successfully breached H*******y.net servers your systems are Encrypted, We took backup copy of […] Technology 27/06/2024 01:49 PM 27/06/2024 12:00 AM View' rel='' target='_self'>View
To The Board Of D*****S We have Successfully breached d*****s.com servers your systems are locked, We took backup copy of […] Transportation/Logistics 22/06/2024 01:26 PM 22/06/2024 12:00 AM View' rel='' target='_self'>View
The four victims of our attack – SBC Global, Bitfinex, Coinmama, and Rutgers University. You refused to pay, and now […] Not Found 07/05/2024 03:49 AM 05/05/2024 12:00 AM View' rel='' target='_self'>View
To the management of Coinmama, We have gained access to Coinmama.com and have obtained sensitive data including user information and Financial 06/05/2024 12:27 AM 26/04/2024 12:00 AM View' rel='' target='_self'>View
The four victims of our attack – SBC Global, Bitfinex, Coinmama, and Rutgers University. You refused to pay, and now […] Not Found 06/05/2024 12:25 AM 05/05/2024 12:00 AM View' rel='' target='_self'>View
the four victims of our attack – SBC Global, Bitfinex, Coinmom, and Rutgers University. You refused to pay, and now […] Not Found 05/05/2024 02:01 AM 05/05/2024 12:00 AM View' rel='' target='_self'>View
To the executives of Bitfinex, We have successfully breached your security measures and obtained critical data from your servers. This Financial 03/05/2024 09:01 AM 25/04/2024 12:00 AM VG View' rel='' target='_self'>View
To the board of SBC Global, We have gained unauthorized access to your system and have procured highly confidential data, Business Services 03/05/2024 09:00 AM 25/04/2024 12:00 AM View' rel='' target='_self'>View
We have infiltrated the Rutgers.edu servers, a well-known educational institution. In just 7 days, we will unveil their hidden truths Government 03/05/2024 08:58 AM 26/04/2024 12:00 AM US View' rel='' target='_self'>View
To the management of Coinmoma, We have gained access to Coinmoma.com and have obtained sensitive data including user information and […] Financial 03/05/2024 08:56 AM 26/04/2024 12:00 AM CA View' rel='' target='_self'>View
We can help

Frequently asked questions

Key information when you’re under pressure.

Yes, Flocker is a ransomware group that functions as a Ransomware-as-a-Service (RaaS). The group offers its advanced ransomware tools to affiliates who carry out attacks in return for a portion of the ransom payments. These affiliates typically exploit known vulnerabilities in systems or use phishing campaigns to gain initial access before demanding ransoms from victims in exchange for decryption keys and to prevent data exposure.

Flocker ransomware typically infects systems through one or more of the following methods:

  • Phishing emails that trick users into clicking malicious links

  • Malicious attachments disguised as legitimate files

  • Compromised websites that automatically download malware

  • Exploiting vulnerabilities in outdated software or unpatched systems

To help protect your organisation and avoid becoming potential victims of future attacks, Zensec recommends the following preventative measures:

  • Educate your staff on cyber security best practices

  • Enforce the use of strong passwords

  • Implement multi-factor authentication across all critical systems

  • Regularly review and remove inactive or old user accounts

  • Schedule and test regular data backups

  • Apply security updates and patches promptly

After recovering from a Flocker infection, it's essential to update your business continuity plan to reflect the lessons learned during the incident and ensure improved resilience moving forward.

Facing genuine pressure, there's a crucial decision to make - one that could rescue your organisation from weeks of operational standstill, reputation damage, and client data loss. Yet, the probability of a favourable outcome remains slim, emphasising the importance of engaging a specialised ransomware incident response team. They are your most viable recourse for navigating a ransomware incident.

The NCSC have documented the deliberations for paying ransomware: https://www.ncsc.gov.uk/ransomware/home

Important Reminder: It is a criminal offense to pay money to people who are subject to financial sanctions. The list of who is subject to financial sanctions is constantly changing.

The latest iteration can be found here: https://www.gov.uk/government/publications/financial-sanctions-consolidated-list-of-targets

A ransomware attack presents the most significant threat to your business by:

  • Disabling your access to systems, which could hinder machinery operation or impede progress through your business processes.
  • Blocking access to critical data concerning suppliers, shipments, customers, orders, or steps in your business workflow.

In the event of a business interruption, identifying your position in the supply chain and sustaining operations can be challenging. If the disruption continues, maintaining business continuity becomes critical. Once systems and data are restored, addressing backlogs and establishing future operational protocols are essential.

Ransomware ranks only behind receivership in terms of its capacity to incapacitate a business.

The NCSC is the UK National Cyber Security Centre. They provide cyber security guidance and support, helping to make the UK the safest place to live and work online. They have defined a Cyber Incident Response procedure and they have approved and accredited suppliers to provide this service.

https://www.ncsc.gov.uk/

As a recognised Assured Service Provider by the National Cyber Security Centre (NCSC), Zensec provide comprehensive cyber risk management services that are designed to Protect, Detect & Mitigate cyber security threats across the UK.

Report Fraud is the UK's national reporting centre for fraud and cybercrime. Whether you have been scammed, defrauded, or experienced cybercrime in England, Wales, or Northern Ireland, Report Fraud offers a central point of contact for information on fraud and financially motivated cybercrime.

https://www.reportfraud.police.uk/https://www.actionfraud.police.uk/

To protect sensitive data, use strong encryption and restrict access to files based on user roles and department responsibilities. Implement multi-factor authentication, carry out regular backups, and ensure systems are consistently patched and monitored.

It’s also important to educate staff across every domain of the business, whether in IT, finance, or customer service, on how to recognise phishing emails and other common threats. As cyber risks continue to evolve, your security strategy must reflect that evolution. Review and update your cyber defences regularly to stay ahead of emerging threats.

If your business operates an affiliate program, take extra care to vet partners and ensure they follow your data protection standards. Third-party breaches can also expose your sensitive data, so extending security awareness beyond your core team is vital.

In sectors such as property, compliance with real estate regulation is essential. Cyber breaches that affect client records, financial data, or land transaction details may lead to legal penalties or reputational harm.

Dealing with a ransomware attack?
Our ransomware recovery service can help

Our expert team works quickly to contain the breach, recover your data, and restore your systems to full operation. We’ll guide you through every step of the recovery process and help strengthen your defences to prevent future attacks. Regain control with Zensec - trusted support when it matters most.