Classifications & Affiliations
Type: Ransomware-as-a-Service (RaaS)
Sarcoma operates through a hybrid RaaS model with selective affiliate recruitment following a 70/30 revenue split favoring affiliates. Core operators maintain malware infrastructure, develop encryption logic, and run dark web leak sites, while affiliates execute attacks and handle victim negotiations. The group draws on double extortion tactics, combining file encryption with data theft to pressure victims from both operational disruption and exposure risk.
Data exfiltration uses Rclone, WinSCP, and cURL before encryption, then threatens publication on leak sites. Code-level similarities to Maze and Egregor ransomware families suggest inherited infrastructure or experienced talent.
Current Status: Fully operational as of October 2025 with zero government advisories or law enforcement actions despite 100+ documented victims