Malas is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 170 public victims claimed by this operator between April 9, 2023 and May 18, 2023. **Overview**: Malas is a ransomware group that emerged in April 2023, operating with primarily financial motivations and targeting organizations across multiple sectors and geographic regions. The group has demonstrated significant activity levels, compromising approximately 170 victims within its first operational period.
**Origin & Affiliation**: Public documentation regarding Malas' specific country of origin and operational structure remains limited in available CISA, FBI, and security researcher reports. The group's targeting patterns across both Western nations and Russia suggest either independent operations or a complex operational structure that crosses traditional geopolitical boundaries.
**Attack Methodology**: Detailed technical analysis of Malas' specific attack vectors, tools, and encryption methods has not been extensively documented in publicly available threat intelligence reports from major security organizations. Based on victim distribution patterns, the group appears to employ effective initial access techniques that enable them to successfully compromise diverse organizational targets across multiple countries and industry sectors.
**Notable Campaigns**: While Malas has accumulated a substantial victim count of 170 organizations, specific high-profile attacks or record ransom demands have not been prominently featured in public security advisories or law enforcement communications. The group's targeting of media, technology, manufacturing, and transportation sectors across Italy, Russia, Germany, France, and the United States indicates a broad operational scope.
**Current Status**: Given the limited public documentation available from authoritative sources, the current operational status of Malas remains unclear based on verified threat intelligence reporting.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.