Over on SuspectFile, Marco A. De Felice writes:
We are exclusively publishing the interview that we conducted with the Meow Leaks group and which they gave us in these last hours.
We had known the Meow Leaks group as a group attributable, at least for the programming code used, to the Conti (v2) ransomware group. A belief also due to the analyzes carried out on the group published on various websites in the sector, but from the answers he gave us in the interview, evidently, we were wrong.
According to the group’s administrator, no ransomware software is used, the data is not encrypted but only exfiltrated and then put on sale on his new website which the author himself likes to define as “Market Meow Leaks”. A totally renewed website, put back online today with the same IP address used before it was taken offline by the same administrator during the last days of last month while awaiting the definitive restyling.
Read more at SuspectFile.