Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Rise of Ransomware: A Look into the World of 0APT and Krybit


Two rival ransomware gangs have engaged in a high-stakes game of cat and mouse after one group threatened to expose those affiliated with Krybit unless certain demands were met.

  • 0APT and Krybit are two rival ransomware groups engaged in a cat-and-mouse game, with 0APT posing a legitimate threat and Krybit remaining somewhat of an enigma.
  • 0APT threatened to expose Krybit's affiliates unless certain demands were met, but the threat was deemed ineffective due to Krybit's lack of reputation worth protecting.
  • Cybercriminals' paranoia about their identities can still be used as leverage, but not when applied to groups like Krybit.


  • In the ever-evolving landscape of cybersecurity threats, two groups have recently emerged that are sending shockwaves through the dark web and beyond. 0APT, a relatively new player in the ransomware game, has made headlines by posting hundreds of victim organizations to its leak blog within the first 48 hours of life. This bold move has sparked a cat-and-mouse game between 0APT and another rival group, Krybit.

    According to Halcyon's ransomware research center, 0APT poses a legitimate threat and shows credible technical depth. The group's actions have been closely watched by cybersecurity experts, who are taking notice of its sophisticated tactics. On the other hand, Krybit remains somewhat of an enigma, with no major threat intelligence or cybersecurity outfit publishing a report on the group. Dark web tracking platforms suggest that Krybit has only been active for a few weeks, making it a relatively new player in the ransomware scene.

    The situation took a dramatic turn when 0APT threatened to expose people affiliated with Krybit unless certain demands were met. This move was seen as a classic example of double extortion, where the threat of reputational damage is used to coerce victims into paying a ransom. However, in this case, the target of the threat was another group of criminals rather than businesses.

    The leaked data from Krybit included plaintext credentials belonging to operators and affiliates, five cryptocurrency wallet addresses, and no evidence of a single paid ransom. This lack of success in extorting payment has raised questions about the effectiveness of such tactics when aimed at fellow criminals.

    Cybercriminals are notorious for their paranoia about their identities, which gives the threat of reputational damage some residual bite. Nevertheless, experts have noted that this model is almost laughably toothless when applied to groups like Krybit, who do not possess a reputation worth protecting.

    The incident highlights the ongoing cat-and-mouse game between rival ransomware gangs and cybersecurity professionals. As the landscape continues to evolve, it will be interesting to see how 0APT and Krybit continue to interact with one another in the coming weeks.

    In other news, DragonForce has made headlines for its attacks on rival groups BlackLock and Mamona in 2025. The group also took down former ransomware kingpin RansomHub's operation after a month of infighting between the two enterprises. This incident serves as a reminder that criminal-on-criminal attacks are not uncommon and can have significant consequences.

    Furthermore, Microsoft has announced plans to raise prices for its Surface devices in the UK due to a RAM crisis. The company has stated that this increase will be reflected in entry-level models, with some jumps reaching up to £220.

    In addition, IBM has become the first company to pay under Trump administration's diversity blitz. Despite not admitting liability and continuing to fight age discrimination cases, IBM coughed up $17 million as part of its settlement.

    Additionally, Rolls-Royce has been granted a contract to sketch out its mini reactor future. The UK state bank is considering lengthening its disastrous IT program, which has already cost £1.3 billion over budget and 4 years late.

    Finally, Japanese chip testing firm TSMC expanded its Japanese foothold with the production of 2nm semis next year. Rapidus is on track to begin this process soon.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Rise-of-Ransomware-A-Look-into-the-World-of-0APT-and-Krybit-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2026/04/14/0apt_krybit_spat/

  • https://www.theregister.com/2026/04/14/0apt_krybit_spat/

  • https://cyberscoop.com/0apt-ransomware-group-hoax-technical-capabilities/


  • Published: Tue Apr 14 08:37:07 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us