Morpheus is a recently emerged ransomware group first observed in January 2025, operating with apparent financial motivations and demonstrating a targeted approach to victim selection across multiple geographic regions. The group's origin and potential affiliations remain unclear due to limited public documentation from established threat intelligence sources, though their operational patterns suggest they may be operating independently rather than as part of a larger ransomware-as-a-service ecosystem. With 14 documented victims across diverse sectors including healthcare, business services, manufacturing, and hospitality, Morpheus has shown a preference for targeting organizations in the United States, Spain, India, Mexico, and Belgium, indicating either a broad operational reach or the use of automated targeting mechanisms that transcend geographic boundaries. The group's attack methodology, encryption techniques, and specific tactics, techniques, and procedures remain largely undocumented in public threat intelligence reporting from major cybersecurity firms and government agencies. Due to the group's recent emergence and limited public intelligence available from established sources such as CISA, FBI, or major threat intelligence providers, notable campaigns and high-profile incidents have not yet been extensively documented or analyzed in the public domain. Morpheus appears to remain active as of early 2025, though comprehensive assessment of their current operational status is limited by the nascent nature of their observed activities and the lack of extensive public reporting on their operations. The group has been linked to 17 public disclosures across our corpus. First observed on a leak site on January 7, 2025; most recent post May 14, 2026. The operation is currently active.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, LYNXSPA is reported in Spain, a country with 212 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.