Moneymessage is a relatively new ransomware group that emerged in March 2023, operating with primarily financial motivations and targeting organizations across multiple sectors globally. Given the group's recent emergence and limited public documentation from major security agencies, detailed information about their origin and affiliations remains largely unknown, though their targeting patterns suggest they may operate as a smaller independent operation rather than a large-scale RaaS model. The group has demonstrated a broad targeting approach across healthcare, business services, public sector, government, and financial organizations, with their 29 documented victims spanning geographically diverse regions including the United States, Italy, Argentina, Bangladesh, and Russia, though specific attack methodologies and technical capabilities have not been extensively documented by major threat intelligence firms. Notable campaigns and high-profile attacks attributed to Moneymessage have not been widely reported by established security researchers or law enforcement agencies, likely due to the group's relatively recent emergence and smaller scale of operations compared to more prominent ransomware families. The group appears to remain active as of available reporting, though comprehensive analysis of their current operational status is limited by the lack of detailed public documentation from authoritative sources such as CISA, FBI, or major cybersecurity firms. The group has been linked to 32 public disclosures across our corpus. First observed on a leak site on March 29, 2023; most recent post May 16, 2026. The operation is currently active.
Also tracked as: money message.
Sector and geography
This disclosure adds to ransomware activity in the Business Services sector, which has 2,640 disclosures indexed across all operators we track. Geographically, Young Adjustment Company is reported in United States, a country with 7,392 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.