Executive Summary
In April 2026, a rare conflict erupted between two emerging ransomware-as-a-service (RaaS) groups, 0APT and KryBit. 0APT, initially known for fabricating victim claims, targeted rival ransomware operators, including KryBit, by leaking their operational data. This exposure revealed KryBit's infrastructure, personnel details, and victim negotiations. In retaliation, KryBit breached 0APT's systems, exposing fabricated victim lists and defacing 0APT's leak site. This mutual exposure has significantly disrupted both groups' operations, necessitating infrastructure rebuilding and rebranding efforts.
This incident underscores the volatile nature of cybercriminal alliances and the potential for internal conflicts to disrupt malicious operations. For defenders, such feuds provide valuable insights into ransomware tactics, techniques, and procedures, enhancing preparedness against future attacks.
Why This Matters Now
The public exposure of ransomware groups' internal operations offers a unique opportunity for cybersecurity professionals to analyze and understand adversary behaviors, potentially improving defensive strategies against similar threats.
Attack Path Analysis
0APT initiated the attack by compromising KryBit's infrastructure, likely through exploiting vulnerabilities or using stolen credentials. They escalated privileges to gain administrative access, enabling them to exfiltrate sensitive data. Subsequently, 0APT moved laterally within KryBit's network to access critical systems. They established command and control channels to maintain persistent access. The exfiltrated data was then leaked publicly to damage KryBit's operations. The impact was significant, leading to operational disruptions and reputational damage for KryBit.
Kill Chain Progression
Initial Compromise
Description
0APT gained initial access to KryBit's infrastructure, possibly through exploiting vulnerabilities or using stolen credentials.
MITRE ATT&CK® Techniques
Valid Accounts
Phishing
Data Encrypted for Impact
Transfer Data to Cloud Account
Application Layer Protocol
Taint Shared Content
Inhibit System Recovery
Command and Scripting Interpreter
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Malicious Software Prevention
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Encryption of Nonpublic Information
Control ID: 500.15
DORA – ICT Risk Management Framework
Control ID: Article 10
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Incident Handling
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer/Network Security
Ransomware-as-a-Service feuds expose critical infrastructure vulnerabilities and operational intelligence, requiring enhanced egress security, threat detection capabilities, and zero trust segmentation implementations.
Financial Services
RaaS attacks targeting databases with encoded records threaten compliance frameworks (PCI, NIST), demanding strengthened encrypted traffic protection and multicloud visibility controls.
Information Technology/IT
Cross-platform ransomware targeting Windows, Linux, ESXi systems necessitates comprehensive east-west traffic security, anomaly detection, and kubernetes security fabric deployment strategies.
Health Care / Life Sciences
Healthcare data exfiltration risks from RaaS operations require HIPAA-compliant intrusion prevention systems, secure hybrid connectivity, and real-time policy enforcement mechanisms.
Sources
- Feuding Ransomware Groups Leak Each Other's Datahttps://www.darkreading.com/threat-intelligence/feuding-ransomware-groups-leak-dataVerified
- 0APT vs. KryBit Ransomware Actors List Opposing Operators as Victimshttps://www.halcyon.ai/ransomware-research-reports/0apt-vs-krybit-ransomware-actors-list-opposing-operators-as-victimsVerified
- Ransomware Turf War as 0APT and KryBit Groups Trade Blowshttps://www.infosecurity-magazine.com/news/ransomware-turf-war-0apt-krybit/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing Aviatrix Zero Trust CNSF could have significantly constrained 0APT's ability to move laterally and exfiltrate data within KryBit's cloud infrastructure, thereby reducing the attack's overall impact.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's initial access would likely have been limited to specific segments, reducing their ability to reach critical systems.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges would likely have been constrained, reducing their control over the environment.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement would likely have been restricted, reducing their ability to access additional systems.
Control: Multicloud Visibility & Control
Mitigation: The attacker's command and control channels would likely have been detected and disrupted, reducing their ability to maintain access.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's data exfiltration efforts would likely have been blocked, reducing the amount of data compromised.
The overall impact of the attack would likely have been minimized, reducing operational disruptions and reputational damage.
Impact at a Glance
Affected Business Functions
- n/a
Estimated downtime: N/A
Estimated loss: N/A
n/a
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement within the network.
- • Deploy East-West Traffic Security to monitor and control internal traffic flows.
- • Utilize Multicloud Visibility & Control to detect and respond to anomalous activities across cloud environments.
- • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration.
- • Establish Threat Detection & Anomaly Response mechanisms to identify and mitigate potential threats promptly.



