Meow is a ransomware operator no longer publishing new disclosures. Darkfield has indexed 145 public victims claimed by this operator between November 24, 2023 and November 19, 2024. Meow is a relatively new ransomware group that emerged in November 2023, primarily motivated by financial gain through extortion activities targeting organizations across multiple sectors. The group has compromised at least 145 known victims in a short operational timeframe, demonstrating rapid scaling of their criminal enterprise. Based on their targeting patterns, Meow appears to focus heavily on English-speaking countries, with the United States, United Kingdom, and Canada representing their primary victim base, though they have also expanded operations to include targets in Italy and Colombia. The group shows a preference for attacking business services organizations, manufacturing companies, healthcare institutions, and agriculture and food production entities, suggesting they may employ broad-spectrum targeting rather than highly specialized sector focus. Their emergence in late 2023 and the significant victim count achieved in a relatively short period indicates either a sophisticated operation with experienced operators or potential links to existing ransomware ecosystems, though specific details about their attack methodology, initial access vectors, encryption techniques, or data exfiltration practices have not been extensively documented by major threat intelligence sources. Given the recent timeline of their emergence and limited public reporting from established security researchers, detailed technical analysis of their tools, tactics, and procedures remains sparse. The group appears to remain active as of current reporting, though comprehensive law enforcement actions or major disruption efforts have not been publicly documented.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.