desolator is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 4 public victims claimed by this operator between August 30, 2025 and September 1, 2025. Desolator is a relatively new ransomware group that emerged in August 2025, with financial motivation as their primary driver based on their ransomware operations. The group appears to operate independently with limited public information available regarding their country of origin or affiliations with other cybercriminal organizations. Due to the recent emergence of this group and limited public reporting from major security firms, specific details about their attack methodology, initial access vectors, and encryption techniques have not been extensively documented by CISA, FBI, or established security researchers. The group has claimed a small number of victims across diverse geographic regions including Colombia, the United States, and Vietnam, with their targeting spanning construction, technology, and other unspecified sectors, suggesting an opportunistic rather than highly targeted approach. No major high-profile attacks or significant ransoms have been publicly attributed to Desolator at this time, likely due to their recent emergence and limited operational scope. The group appears to remain active as of their recent emergence, though their operational tempo and long-term viability remain unclear given the lack of extensive public documentation of their activities.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.