maui is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 1 public victims claimed by this operator between May 1, 2021. Maui is a ransomware group that emerged in May 2021 with apparent financial motivations, though their limited known victim count suggests either highly selective targeting or a relatively small-scale operation. The group's origin and affiliations remain largely undocumented in public threat intelligence reporting, with no confirmed country of origin or clear links to other ransomware families established by major security agencies. Based on available information from security researchers, Maui operators appear to specifically target healthcare and public health sector organizations within the United States, though detailed attack methodology, initial access vectors, and encryption techniques have not been extensively documented in public CISA, FBI, or major security firm reporting. The group's limited public profile means that notable campaigns and high-profile victims beyond general healthcare targeting have not been widely reported or analyzed in mainstream threat intelligence sources. Current operational status of the Maui ransomware group remains unclear due to limited public documentation and intelligence reporting.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.