m3rx is a ransomware operator currently active on public leak sites. Darkfield has indexed 19 public victims claimed by this operator between April 29, 2026 and May 17, 2026. Based on the limited publicly available information, m3rx is an emerging ransomware group first observed in April 2026 with a relatively small victim count of eight organizations, suggesting they are either a newly formed operation or a smaller-scale criminal enterprise focused on financial gain. The group's origin and affiliations remain unclear, with no documented evidence from major security vendors or law enforcement agencies regarding their geographical base, operational structure, or whether they operate as an independent cell or as part of a larger ransomware-as-a-service ecosystem. Their attack methodology and specific technical capabilities have not been extensively documented by established threat intelligence sources, though their targeting pattern indicates a preference for English-speaking nations including Great Britain, Australia, and the United States, as well as operations in Switzerland and Italy, with victims spanning consumer services, business services, technology, and healthcare sectors. No major campaigns, high-profile victims, or significant ransoms have been publicly reported by CISA, FBI, Mandiant, or other reputable security researchers, likely due to the group's recent emergence and limited scope of operations. Given their recent first observation date and small victim count, m3rx appears to be in early operational stages with their current activity status and long-term viability remaining uncertain.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.