Thanos is a ransomware operation that emerged in July 2020, primarily motivated by financial gain through extortion of victim organizations. The group's country of origin and affiliations remain largely undocumented in public threat intelligence reporting, though their limited observed activity suggests they may operate as a smaller independent operation rather than a major ransomware-as-a-service enterprise. Public documentation of their specific attack methodologies, initial access vectors, and technical capabilities is extremely limited, with available information suggesting they follow typical ransomware deployment patterns of encrypting victim systems and demanding payment for decryption keys. The group has been observed targeting government facilities, though with only one publicly documented victim, their campaign activity appears to be minimal compared to major ransomware operations. Current intelligence suggests Thanos remains a low-profile threat actor with limited documented activity since their initial emergence. The group has been linked to 1 public disclosures across our corpus. First observed on a leak site on July 1, 2020. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.