HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Feuding Ransomware Groups 0APT and KryBit Leak Each Other’s Infrastructure Data

Ransomware gangs 0APT and KryBit engaged in a direct cyber‑conflict, compromising each other's command‑and‑control servers and publicly releasing internal tooling, victim lists, and encryption keys. The leak gives defenders unprecedented insight into ransomware tradecraft, raising supply‑chain risk for third‑party vendors.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 darkreading.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
darkreading.com

Feuding Ransomware Groups 0APT and KryBit Leak Each Other’s Infrastructure Data

What Happened — Ransomware gangs 0APT and KryBit turned on one another, compromising each other’s command‑and‑control (C2) servers, credential stores, and victim‑list databases. The attackers publicly released the stolen artifacts, exposing tooling, encryption keys, and operational playbooks.

Why It Matters for TPRM

  • Reveals ransomware tactics that can be repurposed against third‑party vendors and supply‑chain partners.
  • Provides concrete Indicators of Compromise (IOCs) that can be integrated into vendor‑risk monitoring platforms.
  • Highlights the risk that ransomware groups may target or exploit each other’s infrastructure, potentially affecting shared services.

Who Is Affected — Any organization that relies on third‑party services, especially high‑value sectors such as healthcare, financial services, manufacturing, and cloud‑hosted SaaS providers.

Recommended Actions

  • Ingest the leaked IOCs into your threat‑intelligence feeds and SIEM.
  • Verify that critical third‑party vendors have robust ransomware detection, immutable backups, and offline recovery capabilities.
  • Conduct a tabletop exercise simulating a ransomware supply‑chain compromise.

Technical Notes — Attack vector: malware‑driven compromise of C2 infrastructure; leaked data includes server configurations, encryption keys, victim lists, and internal tooling. No CVE is associated. Source: Dark Reading

📰 Original Source
https://www.darkreading.com/threat-intelligence/feuding-ransomware-groups-leak-data

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.