malekteam is a relatively new ransomware group that emerged in December 2023, operating with apparent financial motivations based on their targeting patterns and small-scale operations. The group's origin and affiliations remain largely undocumented in public threat intelligence reporting, though their limited scope of operations suggests they operate as an independent entity rather than part of a larger ransomware-as-a-service ecosystem. With only seven known victims documented to date, malekteam appears to focus their attacks primarily on targets in Israel and Switzerland, with a preference for business services and healthcare sectors, though specific details about their initial access vectors, encryption methods, and whether they employ data exfiltration tactics prior to encryption have not been publicly documented by major security firms or law enforcement agencies. Due to the group's recent emergence and limited public reporting, notable campaigns and high-profile victims have not been extensively documented in open-source intelligence reports from established security researchers. The group's current operational status remains unclear given the limited public documentation of their activities since their emergence in late 2023. The group has been linked to 7 public disclosures across our corpus. First observed on a leak site on December 24, 2023; most recent post April 5, 2024. The operation is currently inactive.
Also tracked as: malek team.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, gav.co.il is reported in Israel, a country with 78 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.