Classifications & Affiliations
Type: Data Extortion Group (formerly Ransomware-as-a-Service)
Technical analysis reveals 66% code similarity with the original Conti codebase, placing the group among four major derivatives from the Conti v2 source code leak alongside BlueSky, ScareCrow, and Putin Team. Initially operating as a Ransomware-as-a-Service (RaaS) platform, the transition to a data-only extortion model represents a significant operational shift.
Current Status: As of October 2025, Meow's activity and operational levels have tapered off, raising questions about the group's trajectory and future operations.