Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware Turf War as 0APT and KryBit Groups Trade Blows

April 28, 2026

⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

April 28, 2026

No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC

April 28, 2026
Facebook X (Twitter) Instagram
Tuesday, April 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Ransomware Turf War as 0APT and KryBit Groups Trade Blows
News

Ransomware Turf War as 0APT and KryBit Groups Trade Blows

Team-CWDBy Team-CWDApril 28, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Two ransomware groups are licking their wounds and rebuilding their infrastructure after leaking each other’s operational data online, according to Halcyon.

The set-to began when 0APT claimed the scalps of three ransomware groups on its leak site: newcomer KryBit and established players RansomHouse and Everest Group.

The leak exposed KryBit infrastructure and personnel and the group will likely need to “rotate leaked operational components to ensure impact on their activities is limited,” Halcyon explained.

“KryBit’s leaked administrator panel included data for KryBit’s primary operators, affiliates, and victim negotiation data. The activity spanned between 28 March 2026 and 12 April 2026. At the time of the leak, KryBit had two administrators and five affiliates along with 20 potential victims. The data exfiltrated for each victim ranged between 10-250GB and ransom demands between $40,000-$100,000.”

Read more on ransomware: Conti Group Suffers Massive Data Breach.

KryBit responded by hacking back at 0APT, stealing data and defacing its leak site with the message: “Next time, don’t play with the big boys,” according to the report.

“KryBit leaked the full 0APT operational data set the following day, which included full access logs, PHP source code, and system files. The access logs revealed that the 190+ victims initially posted by 0APT in January 2026 were entirely fabricated and no data was ever exfiltrated from any of the listed victims,” Halcyon explained.

“Additionally, the infrastructure for the ransomware data leak site was operating on an AnLinux-Parrot OS and pushing all content via an Android phone’s internal SD card. 0APT has been unable to recover, and KryBit maintains defacement of the 0APT leak site.”

0APT Aggression Backfires

The aggressor in this case, 0APT, appears to have been trying to garner some notoriety for itself after previous attempts to drum up affiliate interest in its business failed. However, that seems to have backfired after KryBit responded in kind.

Everest Group thus far has not hit back at 0APT, despite having its encoded and hashed publication and user data leaked by the group.

“Due to the extensive leaks of both KryBit and 0APT, the operators will likely have to rebuild, rebrand, and spin up new infrastructure over the next few weeks to months to remain active,” Halcyon concluded.

Former Barclays CISO and Halcyon chief strategy officer, Oliver Newbury, said the tit for tat is a sign of the financial pressure that ransomware groups are under.

“These groups depend on credibility to survive, so when that starts to crack, rivals move fast to expose it,” he added.

“We’re now seeing them disrupt each other’s operations, taking over infrastructure and undermining campaigns in real time. It creates instability, but not safety. The ecosystem doesn’t shrink, it reshapes, often becoming harder to predict in the process.”

Chainalysis data from 2025 revealed that crypto-payments to ransomware actors plummeted 8% annually to $820m, even as the number of attacks increased 50%.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More
Team-CWD
  • Website

Related Posts

News

⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge & More

April 28, 2026
News

No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC

April 28, 2026
News

Why Most AI Deployments Stall After the Demo

April 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

When ‘hacking’ your game becomes a security risk

October 17, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.