Termite is a recently emerged ransomware group that first appeared in November 2024, operating with apparent financial motivations based on their targeting patterns across multiple high-value sectors. The group's origin and affiliations remain largely undocumented by major threat intelligence providers, though their targeting of primarily Western nations including the United States, France, United Kingdom, Germany, and Canada suggests a non-Western operational base. With 39 documented victims across healthcare, telecommunications, business services, and technology sectors within just a few months of operation, Termite demonstrates an aggressive deployment strategy, though specific details regarding their initial access vectors, encryption methodologies, and whether they employ double or triple extortion tactics have not been publicly documented by established security research organizations. The group's relatively recent emergence means that notable high-profile campaigns and specific technical indicators have not yet been extensively analyzed or reported by authoritative sources such as CISA, FBI, or major cybersecurity firms. Termite appears to remain active as of early 2025, though the limited public documentation suggests they may be a smaller-scale operation or have not yet attracted significant attention from major threat intelligence organizations. The group has been linked to 43 public disclosures across our corpus. First observed on a leak site on November 17, 2024; most recent post May 17, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Financial Services sector, which has 516 disclosures indexed across all operators we track. Geographically, London Belgravia is reported in United Kingdom, a country with 902 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.