Classifications & Affiliations
Type: Independent Ransomware Operation
Operating as an Independent Ransomware Operation, Cactus maintained full control over attack lifecycle, victim negotiations, and ransom proceeds without public RaaS infrastructure. The group's self-encrypting binary required specific AES keys for execution, bringing out technical capability through multi-threaded AES-256 CBC + RSA-4096 encryption.
Strategic partnerships included initial access broker ToyMaker and shared BackConnect malware infrastructure with BlackBasta. This closed operational model enabled precise targeting of organizations with revenues exceeding $100 million, avoiding the vulnerabilities of affiliate networks while maintaining capabilities across Windows, Linux, and VMware ESXi environments.
Current Status: Significantly diminished as of Q2 2025. Halcyon's Q4-2024 Power Rankings classified Cactus in the "Diminishing" category, indicating decreased attack volumes. Multiple security intelligence sources report Cactus among groups that have either exited the ransomware ecosystem or substantially reduced operations