Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Feuding Ransomware Groups Leak Each Other’s Data
    Cybersecurity

    Feuding Ransomware Groups Leak Each Other’s Data

    adminBy adminApril 29, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Feuding Ransomware Groups Leak Each Other's Data
    Share
    Facebook Twitter LinkedIn Pinterest Email

    When ransomware actors start attacking each other, who wins? Maybe defenders do. 

    The Halcyon Ransomware Research Center published a blog post recently, primarily covering two newer ransomware-as-a-service (RaaS) actors: 0APT and KryBit. While neither has made a name for themselves to date, the two outfits found themselves embroiled in a feud that appears to have left both in shambles.

    0APT emerged in late January with a list of nearly 200 victims posted to its data leak blog over the course of a week. This list was widely regarded as fabricated because of a lack of evidence pointing toward victim compromises, though Halcyon assessed 0APT did use functioning encryptors. The actor failed to pick up traction, or affiliates, and went quiet for months, researchers said.

    Then in mid-April, 0APT reemerged, deleting its previous list of fake victims while claiming ransomware attacks against ransomware operators including KryBit, Everest (active since 2020), and RansomHouse (active since 2021). The latter two, Halcyon said, are much more established. 

    Related:North Korea’s Lazarus Targets macOS Users via ClickFix

    KryBit emerged in late March, offering RaaS kits targeting Windows, Linux, ESXi, and network-attached storage (NAS) devices, using an 80/20 affiliate model (where the RaaS affiliate keeps 80% of ransom payments and KryBit keeps 20%). The group published 10 legitimate victims in its first two weeks. 

    Contrary to the phony aspect of the initial victim list, 0APT’s comeback strategy is slightly more rooted in reality. 0APT published a joint listing for Everest and RansomHouse, posting an SQL database belonging to the former with encoded and hashed database records spanning the first nine months of 2025. There was no plaintext in critical fields, and while RansomHouse was mentioned in the listing, no RansomHouse data was included in the leak. 

    Ransomware Actions Have Ransomware Consequences

    Erika Totaro, intelligence analyst with the Halcyon Ransomware Research Center, tells Dark Reading that 0APT’s unique tactic may have been a play for attention.

    “When your credibility in a criminal marketplace depends on proven victims and ransom payments, and you have neither, you have to find another way to make noise,” she says. “Exposing a rival’s admin panels, affiliate data, and victim negotiations is how you buy credibility when you have no actual victims to show for yourself. These gangs are motivated entirely by financial gain, and they will expose, extort, or undercut each other without hesitation.”

    Everest has not publicly retaliated or made any public acknowledgement to date. 

    Related:Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets

    That is not the case with KryBit, which had both its infrastructure and personnel exposed. This revealed that KryBit had two administrators, five affiliates, 20 potential victims, and ransom demands between $40,000 and $100,000. 

    In response to its data leaking, KryBit breached and exfiltrated 0APT’s infrastructure, listed the latter as a victim, and left a message on 0APT’s leak site: “Next time, don’t play with the big boys.”

    “KryBit leaked the full 0APT operational data set the following day, which included full access logs, PHP source code, and system files. The access logs revealed that the 190+ victims initially posted by 0APT in January 2026 were entirely fabricated and no data was ever exfiltrated from any of the listed victims,” the researchers said. “0APT has been unable to recover, and KryBit maintains defacement of the 0APT leak site.”

    Ransomware Gang Wars

    As Halcyon put it, both operators will likely have to rebuild, rebrand, and create new infrastructure in order to recover from this. 

    Ransomware operator feuds are not unheard of, though they rarely take shape in the way seen here. Feuds often form among ransomware operators and affiliates, either due to disagreements or possible scamming.

    Related:Africa Relinquishes Cyberattack Lead to Latin America — For Now

    Totaro says gang feuds are a net positive for defenders. For one, they offer defenders a window into operations, giving security professionals the chance to prepare for future attacks.

    “When operators reconstitute or affiliates migrate to a new service, their tactics, techniques, and procedures travel with them. The tooling changes; the behavior largely does not,” she explains. “That overlap is exactly what defenders can alert on. So while the drama between these groups may look chaotic, the intelligence value of what gets exposed in these moments is real and actionable.”

    The blog post contains indicators of compromise. For defenders, Halcyon recommends monitoring for signs of data staging and exfiltration, validating backup integrity, and deploying anti-ransomware defenses. The post also highlighted that while 0APT’s victim list has been fraudulent, KryBit and Everest should be treated as legitimate threats.

    data Feuding groups leak ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleFree Answer Engine Optimization Tools to Benchmark LLM Visibility
    Next Article Comparison Of AI Citation Patterns Offers Strategic SEO Insights
    admin
    • Website

    Related Posts

    GitHub fixes RCE flaw that gave access to millions of private repos

    April 29, 2026

    Checkmarx Confirms Data Stolen in Supply Chain Attack

    April 29, 2026

    CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV

    April 29, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How to build brand visibility in AI search

    April 29, 2026

    GitHub fixes RCE flaw that gave access to millions of private repos

    April 29, 2026

    Checkmarx Confirms Data Stolen in Supply Chain Attack

    April 29, 2026

    Comparison Of AI Citation Patterns Offers Strategic SEO Insights

    April 29, 2026
    Categories
    • Blogging (70)
    • Cybersecurity (1,576)
    • Privacy & Online Earning (187)
    • SEO & Digital Marketing (969)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (249)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How to build brand visibility in AI search

    April 29, 2026

    GitHub fixes RCE flaw that gave access to millions of private repos

    April 29, 2026

    Checkmarx Confirms Data Stolen in Supply Chain Attack

    April 29, 2026
    Most Popular
    • How to build brand visibility in AI search
    • GitHub fixes RCE flaw that gave access to millions of private repos
    • Checkmarx Confirms Data Stolen in Supply Chain Attack
    • Comparison Of AI Citation Patterns Offers Strategic SEO Insights
    • Feuding Ransomware Groups Leak Each Other’s Data
    • Free Answer Engine Optimization Tools to Benchmark LLM Visibility
    • 9 Best WordPress Consulting Themes to Win More Clients (20+ Tested)
    • CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.