radiant is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 8 public victims claimed by this operator between October 12, 2025 and October 29, 2025. Based on publicly available information, Radiant is an emerging ransomware group that was first observed in October 2025, representing one of the newer threats in the ransomware landscape with a relatively small footprint of eight documented victims to date. The group appears to be financially motivated, following the typical ransomware business model of encrypting victim data and demanding payment for decryption keys. Limited intelligence suggests the group operates independently rather than as a ransomware-as-a-service operation, though insufficient data exists to definitively establish their country of origin or potential affiliations with other cybercriminal organizations. Due to the group's recent emergence and limited victim count, specific details regarding their attack methodology, initial access vectors, and technical capabilities remain largely undocumented by major security research organizations. Their targeting pattern shows a geographic focus on Western nations including the United States, Netherlands, Germany, United Kingdom, and Finland, with victim organizations spanning healthcare, transportation and logistics, agriculture and food production, and consumer services sectors. Given the group's recent emergence in late 2025, there are no documented major campaigns, high-profile attacks, or law enforcement actions against Radiant at this time. The group appears to remain active as of current reporting, though their limited operational history and small victim count suggest they are either in early operational phases or operating at a relatively small scale compared to established ransomware enterprises.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.