**Overview:** Mallox is a financially motivated ransomware group that emerged in November 2022, operating as a relatively new player in the ransomware ecosystem with a focus on extracting monetary payments from victim organizations across multiple industry sectors.
**Origin & Affiliation:** The group's country of origin and specific affiliations remain largely undocumented by major threat intelligence organizations, though their operational patterns suggest they operate independently rather than as part of a larger ransomware-as-a-service operation.
**Attack Methodology:** Limited public documentation exists regarding Mallox's specific attack vectors and technical capabilities, though their successful compromise of 49 documented victims suggests they employ conventional ransomware deployment methods including data encryption and likely extortion tactics to pressure victims into payment.
**Notable Campaigns:** Mallox has demonstrated a preference for targeting technology companies, business services, and manufacturing sectors, with their operations showing particular concentration in the United Kingdom, India, and the United States, though specific high-profile incidents have not been widely publicized by major cybersecurity firms or law enforcement agencies.
**Current Status:** The group remains active as of recent threat intelligence reporting, continuing to conduct ransomware operations across their preferred geographic and sectoral targets. The group has been linked to 49 public disclosures across our corpus. First observed on a leak site on November 4, 2022; most recent post July 15, 2024. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Not Found sector, which has 4,859 disclosures indexed across all operators we track. Geographically, Rafum Group is reported in Pakistan, a country with 3 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.