Hunters International is a ransomware group that emerged in October 2023, operating with primarily financial motivations and demonstrating rapid expansion in their victim targeting across multiple sectors. The group's origin and specific affiliations remain largely undocumented by major security agencies, though their operational patterns suggest they function as an independent ransomware operation rather than a established Ransomware-as-a-Service model. Based on publicly available victim data, Hunters International has demonstrated a preference for targeting business services, technology, and manufacturing sectors, with their attacks primarily concentrated in English-speaking countries including the United States, France, and the United Kingdom. Their attack methodology and specific technical capabilities have not been extensively documented by major threat intelligence organizations such as CISA, FBI, or Mandiant, limiting detailed analysis of their initial access vectors, encryption methods, or data exfiltration practices. With 388 documented victims since their emergence, the group has shown consistent activity levels, though specific high-profile campaigns or notable ransom demands have not been widely reported in public threat intelligence reports. As of current reporting, Hunters International appears to remain active with no documented law enforcement disruptions or operational changes reported by major cybersecurity agencies. The group has been linked to 388 public disclosures across our corpus. First observed on a leak site on October 20, 2023; most recent post March 26, 2026. The operation is currently active.
Also tracked as: Hunters.
Sector and geography
This disclosure adds to ransomware activity in the Financial Services sector, which has 516 disclosures indexed across all operators we track. Geographically, Mercer Advisors is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.