deathkitty is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between July 22, 2021. Based on available intelligence, deathkitty is an obscure ransomware operation that first emerged in July 2021 with apparent financial motivations, though limited public documentation exists about this group's activities. The group's origin and potential affiliations remain unknown, with no confirmed information regarding whether they operate as a Ransomware-as-a-Service model or as an independent entity. Technical details about their attack methodology, initial access vectors, encryption methods, and whether they employ double or triple extortion tactics have not been publicly documented by major security vendors or government agencies. The group has been observed targeting the transportation sector specifically in South Africa, with only one confirmed victim on record, suggesting either a highly targeted approach or limited operational scope. Given the minimal public reporting and single documented victim since their 2021 emergence, the current operational status of deathkitty remains unclear, though the lack of recent activity may indicate the group has ceased operations or operates below the threshold of major security vendor detection.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.