Termite is a ransomware operator currently active on public leak sites. Darkfield has indexed 43 public victims claimed by this operator between November 17, 2024 and May 17, 2026. Termite is a recently emerged ransomware group that first appeared in November 2024, operating with apparent financial motivations based on their targeting patterns across multiple high-value sectors. The group's origin and affiliations remain largely undocumented by major threat intelligence providers, though their targeting of primarily Western nations including the United States, France, United Kingdom, Germany, and Canada suggests a non-Western operational base. With 39 documented victims across healthcare, telecommunications, business services, and technology sectors within just a few months of operation, Termite demonstrates an aggressive deployment strategy, though specific details regarding their initial access vectors, encryption methodologies, and whether they employ double or triple extortion tactics have not been publicly documented by established security research organizations. The group's relatively recent emergence means that notable high-profile campaigns and specific technical indicators have not yet been extensively analyzed or reported by authoritative sources such as CISA, FBI, or major cybersecurity firms. Termite appears to remain active as of early 2025, though the limited public documentation suggests they may be a smaller-scale operation or have not yet attracted significant attention from major threat intelligence organizations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.