Contact us Buy Me a Coffee

Sponsored by Hudson Rock Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks

0apt

| RaaS

The group appears unreliable. Most, if not all, of its alleged victims cannot be verified and appear to be randomly selected organizations. WE HAVE DECIDED TO REMOVE ENTRIES FOR THIS GROUP


Known Locations (1)
Favicon Title Type Available Last Visit Server Info FQDN
favicon 0APT | Command Ops No 2026-03-25 11:00:13 oaptxiyisljt2kv3we2we34kuudmqda7f2geffoylzpeo7ourhtz4dad.onion

Target (Not Available)

No victim


Heatmap (Not Available)

No victim


Ransom Notes (1)

Tools Used (Not Available)

No tools used available.


Vulnerabilities Exploited (4)
This information is provided by Ransomware-Vulnerability-Matrix
Vendor Product CVE Source
Palo Alto Networks PAN-OS (Edge Firewalls) CVE-2024-3400
Ivanti Ivanti ICS CVE-2025-22457
Ivanti VPN Appliance CVE-2024-21887
Oracle Oracle E-Business Suite (EBS) CVE-2025-61882

TTPs Matrix (6)
This information is provided by Crocodyli & Ransomware.live
Initial Access Execution Persistence Defense Evasion Discovery Exfiltration
Exploit Public-Facing Application Native API Create or Modify System Process: Systemd Service Debugger Evasion Network Service Scanning Exfiltration Over Web Service: Exfiltration to Cloud Storage

Negotiation Chats (0)

No negotiation chats available.


YARA Rules (0)

No YARA rules available.


Indicators of Compromise (IoCs) (4)
MD5 4
Type IOC
md5 370fbcc6711fb983ae4679f02c5ac461
md5 29144c2f5acd859adf08d42ffcd74f50
md5 fb42dec2c39cd7884ca4cb6b76308f51
md5 0f7d721e4e5e2ce0a5c629f2fd4ac572

Victims (0)