Nightspire is a ransomware group that first emerged in March 2025 and appears to be primarily financially motivated, having targeted over 215 victims in a relatively short operational timeframe. The group's origin and affiliations remain unclear due to limited public documentation from major cybersecurity organizations, though their targeting patterns suggest a broad opportunistic approach rather than nation-state backing. Based on available victim data, Nightspire appears to employ common ransomware attack vectors targeting organizations across multiple sectors, with a particular focus on manufacturing, technology, healthcare, and construction industries, while demonstrating a geographic preference for victims in the United States, India, Taiwan, France, and Hong Kong. The group's rapid victim acquisition rate since their March 2025 emergence suggests an active and potentially effective operational capability, though specific technical details about their attack methodology, encryption techniques, or extortion tactics have not been publicly documented by major threat intelligence firms. Given the recent emergence of this group and limited public reporting from established cybersecurity organizations like CISA, FBI, or Mandiant, Nightspire remains an active threat with insufficient public documentation to fully assess their operational sophistication or organizational structure. The group has been linked to 265 public disclosures across our corpus. First observed on a leak site on March 12, 2025; most recent post May 18, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Healthcare sector, which has 1,779 disclosures indexed across all operators we track. Geographically, Swansea Ambulance Corps is reported in GB, a country with 309 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.