direwolf is a ransomware operator currently active on public leak sites. Darkfield has indexed 71 public victims claimed by this operator between May 27, 2025 and January 13, 2026. Direwolf is a ransomware group that emerged in May 2025 with primarily financial motivations, having targeted 71 known victims across multiple sectors and geographic regions. The group's origin and potential affiliations remain undocumented in public threat intelligence reports, with no confirmed information regarding whether they operate as a Ransomware-as-a-Service model or as an independent entity. Their attack methodology and technical capabilities have not been extensively documented by major cybersecurity firms or government agencies, though their targeting patterns indicate a focus on manufacturing, technology, healthcare, and transportation/logistics sectors across Malaysia, the United States, Thailand, Singapore, and Taiwan. No major high-profile campaigns or significant ransomware demands have been publicly attributed to this group by CISA, FBI, or established security researchers such as Mandiant. Given the group's recent emergence and limited public documentation, their current operational status and long-term threat posture remain unclear, requiring continued monitoring by the cybersecurity community to establish a more comprehensive threat profile.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.