Madliberator (also tracked as mad liberator) is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 16 public victims claimed by this operator between July 17, 2024 and October 1, 2024. Madliberator is a recently emerged ransomware group first observed in July 2024, operating with apparent financial motivations and demonstrating a focused targeting approach across multiple continents. Based on their targeting pattern spanning Spain, Italy, Germany, South Korea, and South Africa, the group appears to operate internationally with no clear geographic origin established by security researchers, and their operational model as either independent operators or ransomware-as-a-service remains undetermined due to limited public documentation. With only 16 documented victims since their emergence, specific details about their attack methodology, initial access vectors, encryption techniques, and whether they employ double or triple extortion tactics have not been extensively documented by major security firms or government agencies. The group has primarily targeted business services, manufacturing, financial services, and government sectors, though no specific high-profile incidents or record ransom demands have been publicly reported by CISA, FBI, or established threat intelligence providers. As of current reporting, Madliberator appears to remain active given their recent emergence and ongoing targeting activities, though comprehensive analysis remains limited due to the group's relatively small victim count and recent operational timeline.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.