nightspire is a ransomware operator currently active on public leak sites. Darkfield has indexed 265 public victims claimed by this operator between March 12, 2025 and May 18, 2026. Nightspire is a ransomware group that first emerged in March 2025 and appears to be primarily financially motivated, having targeted over 215 victims in a relatively short operational timeframe. The group's origin and affiliations remain unclear due to limited public documentation from major cybersecurity organizations, though their targeting patterns suggest a broad opportunistic approach rather than nation-state backing. Based on available victim data, Nightspire appears to employ common ransomware attack vectors targeting organizations across multiple sectors, with a particular focus on manufacturing, technology, healthcare, and construction industries, while demonstrating a geographic preference for victims in the United States, India, Taiwan, France, and Hong Kong. The group's rapid victim acquisition rate since their March 2025 emergence suggests an active and potentially effective operational capability, though specific technical details about their attack methodology, encryption techniques, or extortion tactics have not been publicly documented by major threat intelligence firms. Given the recent emergence of this group and limited public reporting from established cybersecurity organizations like CISA, FBI, or Mandiant, Nightspire remains an active threat with insufficient public documentation to fully assess their operational sophistication or organizational structure.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.