erebus is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between June 10, 2017. Erebus is a relatively obscure ransomware group that first emerged in June 2017 with apparent financial motivations, though limited public documentation exists about their operations. The group's origin and potential affiliations remain largely unknown, with no confirmed details about their operational structure or whether they operate as a ransomware-as-a-service model. Based on available intelligence, Erebus has demonstrated capability to target information technology sectors, though their specific attack methodologies, initial access vectors, and encryption techniques have not been extensively documented by major security research organizations. The group's operational scope appears limited, with only one publicly documented victim, suggesting either highly targeted operations or minimal operational activity compared to more prominent ransomware groups. Current intelligence indicates that Erebus has maintained a low profile with minimal reported activity, making their current operational status unclear.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.