HackWatch
! High riskBR Breach

KryBit Leaks 0APT Data in Retaliatory Cyberattack Amid RaaS Rivalry

Breach coverage centered on exposed data, scope clarification and immediate containment priorities.

Potential exposure event. Confirm scope, identify affected accounts or records and move quickly on resets, notifications and monitoring.
KryBit Leaks 0APT Data in Retaliatory Cyberattack Amid RaaS Rivalry - HackWatch breach alert image
HackWatch breach alert image for: KryBit Leaks 0APT Data in Retaliatory Cyberattack Amid RaaS Rivalry
Marcin Pocztowski

Infrastructure Security Editor

Marcin Pocztowski

Infrastructure and Vulnerability Response

By: Marcin Pocztowski

Responsible editor: Marcin Pocztowski / Infrastructure and Vulnerability Response

Infrastructure Security Editor: Marcin Pocztowski / Infrastructure and Vulnerability Response

Last reviewed by: Marcin Pocztowski on Apr 30, 2026

Technical review credentials: Security+ evidence | RHCSA evidence | JNCIS-SEC evidence

Published on HackWatch: Apr 30, 2026

Source date: Apr 30, 2026

Last updated: Apr 30, 2026

Incident status: Active threat

Last verified: Apr 30, 2026

Corroborating sources: 1

Trust note:This alert is maintained under HackWatch's editorial policy, with visible source records, a named responsible editor and a correction channel for disputed facts.

AI tools may assist HackWatch with initial monitoring and source clustering. The public article is reviewed, fact-checked and edited by a real HackWatch reviewer before publication or material updates. Last human review: Apr 30, 2026.

Technical reviewer note: Marcin Pocztowski reviewed this alert on Apr 30, 2026 for server impact, affected-version evidence, privilege or code-execution claims and realistic patch priority. His remediation note follows the same discipline he would use around Juniper routers and production servers: verify scope, preserve useful logs, reduce exposed management access and only then apply the fix or compensating control supported by the 1 corroborating source.

Review our editorial policy or send corrections to [email protected].

Active threat. The incident should still be treated as active until confirmed mitigation or patch adoption is verified.

KryBit, a new ransomware-as-a-service group, has breached rival gang 0APT and published extensive operational data after 0APT leaked KryBit’s information earlier this month. The incident exposes internal logs, system files, and source code, highlighting escalating conflicts within cybercrime communities.

GLOBAL, April 30, 2026, 16:38 UTC

  • KryBit exposes 0APT’s operational data following prior data leak against itself
  • Published information includes access logs, system files, and PHP source code
  • Incident underscores growing infighting among emerging ransomware-as-a-service gangs

KryBit, a recently identified ransomware-as-a-service (RaaS) operation, has retaliated against rival group 0APT by leaking comprehensive internal data belonging to the latter. The exposed materials include 0APT’s access logs, system files, and PHP source code, according to a report by Infosecurity Magazine.

This tit-for-tat data breach follows 0APT’s earlier leak of some KryBit data earlier in April, marking a rare public feud between nascent ransomware gangs. Such conflicts can disrupt illicit operations but also risk collateral damage to victims and affiliates.

The leak reveals sensitive operational details that could allow security researchers and law enforcement to better understand 0APT’s infrastructure and tactics. Access logs may expose user activity and potential vulnerabilities within the gang’s systems.

Ransomware-as-a-service models rely on affiliate networks to distribute malware and negotiate ransoms, making operational secrecy critical. The publication of source code and system files undermines 0APT’s ability to maintain this secrecy and could lead to further disruptions.

Cybersecurity experts warn that these internal disputes may increase volatility in ransomware campaigns, potentially leading to more aggressive attacks or opportunistic targeting of victims during periods of instability.

While neither group has publicly commented on the incident, the leak has been verified by multiple sources within the cybersecurity community. Analysts note that such retaliatory leaks are uncommon but indicate shifting dynamics in the ransomware ecosystem.

Victims potentially affected by either gang’s ransomware should remain vigilant for signs of compromise and ensure backups and security measures are up to date. Organizations are advised to monitor for indicators of compromise related to both KryBit and 0APT.

The incident also highlights the importance of threat intelligence sharing and collaboration among defenders to track emerging ransomware groups and their evolving tactics.

As ransomware gangs continue to evolve, internal conflicts like this one may become more frequent, complicating efforts to predict and mitigate attacks.

Risk remains high that leaked source code and operational data could be repurposed by other threat actors, increasing the overall threat landscape.

Security teams should prioritize patching known vulnerabilities, enforcing multi-factor authentication, and conducting regular network monitoring to reduce exposure.

The KryBit-0APT feud serves as a reminder that ransomware operations are not monolithic and that internal rivalries can have real-world implications for cybersecurity defenses.

Further updates are expected as researchers analyze the leaked data and assess its impact on ongoing ransomware campaigns.

Sources used for this article

scmagazine.com

Marcin Pocztowski

Real reviewer profile

Marcin Pocztowski

Infrastructure Security Editor at HackWatch.io

Open reviewer profile

Marcin Pocztowski is the owner of MMPS and an infrastructure security editor for HackWatch. His public technical record spans 20 years, from Security+ evidence dated January 2006 through Juniper, Cisco and RHCSA records, and he reviews server, network and vulnerability-response coverage for source accuracy and practical remediation.

Infrastructure Security Editor: technical-density, source-existence and remediation-logic review for infrastructure and vulnerability coverage.

Coverage focus: Server and network hardening, vulnerability response, patch prioritization and infrastructure security review

Editorial disclosure: This profile is tied to Marcin's LinkedIn, X profile and source-backed editorial work on HackWatch. Historical certificates are treated as background evidence only, not as current active credentials.

Marcin leads this data breach alerts coverage lane at HackWatch. This article is maintained as part of the ongoing editorial watch around "KryBit Leaks 0APT Data in Retaliatory Cyberattack Amid RaaS Rivalry".

Technical review: Security+ evidence | RHCSA evidence | JNCIS-SEC evidence

Server and network infrastructure administrationKnown exploited vulnerabilities and patch prioritizationCVSS v4.0 and CISA KEV triage