Erebus is a relatively obscure ransomware group that first emerged in June 2017 with apparent financial motivations, though limited public documentation exists about their operations. The group's origin and potential affiliations remain largely unknown, with no confirmed details about their operational structure or whether they operate as a ransomware-as-a-service model. Based on available intelligence, Erebus has demonstrated capability to target information technology sectors, though their specific attack methodologies, initial access vectors, and encryption techniques have not been extensively documented by major security research organizations. The group's operational scope appears limited, with only one publicly documented victim, suggesting either highly targeted operations or minimal operational activity compared to more prominent ransomware groups. Current intelligence indicates that Erebus has maintained a low profile with minimal reported activity, making their current operational status unclear. The group has been linked to 1 public disclosures across our corpus. First observed on a leak site on June 10, 2017. The operation is currently inactive.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.