Metaencryptor is a relatively new ransomware group that emerged in August 2023, operating with primarily financial motivations and targeting organizations across multiple sectors and geographical regions. The group appears to be an independent operation rather than a Ransomware-as-a-Service model, though limited public documentation makes definitive attribution challenging regarding their specific country of origin or connections to established cybercriminal networks. Based on their targeting patterns, Metaencryptor demonstrates a preference for manufacturing organizations, business services, and transportation/logistics companies, with their operations concentrated primarily in Western nations including Germany, the United States, Canada, Spain, and the United Kingdom. With 31 documented victims since their emergence, the group represents a moderate but persistent threat in the ransomware landscape. However, due to their recent emergence and relatively lower profile compared to major ransomware families, comprehensive technical analysis of their attack methodologies, encryption techniques, and specific initial access vectors has not been extensively documented by major cybersecurity firms or government agencies. The group's current operational status remains active as of available intelligence, though the limited public reporting suggests they operate with a smaller scale and lower visibility than prominent ransomware-as-a-service operations that typically attract more attention from law enforcement and security researchers. The group has been linked to 31 public disclosures across our corpus. First observed on a leak site on August 16, 2023; most recent post June 24, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Manufacturing sector, which has 2,458 disclosures indexed across all operators we track. Geographically, Carlex Glass Luxembourg S.A. is reported in LU, a country with 3 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.