hermes is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between July 27, 2018. Hermes is an obscure ransomware group that emerged in July 2018 with limited documented activity and appears to be financially motivated based on its ransomware operations. The group's origin and affiliations remain largely unknown, with insufficient public documentation from major security firms or law enforcement agencies to determine whether they operate independently or as part of a ransomware-as-a-service model. Attack methodology details are not well-documented in public threat intelligence reports, though like most ransomware operators they likely employ common initial access vectors such as phishing or exploit kits to deploy their encryption payloads. The group has maintained a notably low profile with only one publicly documented victim in the United States government facilities sector, suggesting either very limited operations or successful evasion of detection and reporting mechanisms. Current operational status of Hermes remains unclear due to the sparse nature of available threat intelligence, though their minimal documented activity since 2018 suggests they may have ceased operations, rebranded, or continue operating below the radar of major security research organizations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.