cephalus is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 19 public victims claimed by this operator between August 26, 2025 and August 29, 2025. Based on available public information, Cephalus is a recently emerged ransomware group first observed in August 2025, operating with apparent financial motivations targeting organizations primarily across the United States, United Kingdom, Netherlands, and Ireland. The group has claimed 19 victims since emergence, with no publicly documented country of origin or confirmed affiliations to established ransomware families or RaaS operations by major security researchers or government agencies. Their attack methodology and specific technical capabilities remain largely undocumented in public threat intelligence reporting, though their targeting pattern shows focus on healthcare, business services, financial services, and manufacturing sectors alongside organizations of undetermined industry classification. No major high-profile campaigns, record ransom demands, or law enforcement disruption actions have been publicly reported by CISA, FBI, or established security research firms at this time. The group appears to remain active as of current reporting, though the limited public documentation suggests either highly targeted operations or insufficient analysis coverage by major threat intelligence organizations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.