morpheus is a ransomware operator currently active on public leak sites. Darkfield has indexed 17 public victims claimed by this operator between January 7, 2025 and May 14, 2026. Morpheus is a recently emerged ransomware group first observed in January 2025, operating with apparent financial motivations and demonstrating a targeted approach to victim selection across multiple geographic regions. The group's origin and potential affiliations remain unclear due to limited public documentation from established threat intelligence sources, though their operational patterns suggest they may be operating independently rather than as part of a larger ransomware-as-a-service ecosystem. With 14 documented victims across diverse sectors including healthcare, business services, manufacturing, and hospitality, Morpheus has shown a preference for targeting organizations in the United States, Spain, India, Mexico, and Belgium, indicating either a broad operational reach or the use of automated targeting mechanisms that transcend geographic boundaries. The group's attack methodology, encryption techniques, and specific tactics, techniques, and procedures remain largely undocumented in public threat intelligence reporting from major cybersecurity firms and government agencies. Due to the group's recent emergence and limited public intelligence available from established sources such as CISA, FBI, or major threat intelligence providers, notable campaigns and high-profile incidents have not yet been extensively documented or analyzed in the public domain. Morpheus appears to remain active as of early 2025, though comprehensive assessment of their current operational status is limited by the nascent nature of their observed activities and the lack of extensive public reporting on their operations.
How we know this. Operator profiles on Darkfield are built from continuous monitoring of every leak site the group is known to operate, cross-correlated with community-curated feeds (RansomLook, ransomware.live, RansomWatch, MISP-galaxy). Status flips from active to inactive when no new disclosure appears for 60 days. MITRE ATT&CK mappings shown in the interactive section below are sourced from CISA, vendor analysis, and the MITRE community catalog — we attribute each technique back to its source. Aliases reflect operator re-brands and affiliate splits.