A new ransomware syndicate called 0APT (pronounced “Zero-APT”) burst onto the scene on January 28, 2026, and immediately became the most active threat actor in the ecosystem. Within 48 hours, they compromised 71 organizations. By early February, they had claimed over 90 victims and accounted for nearly a quarter of all ransomware incidents globally.

This post breaks down their operations, TTPs, and provides actionable detection guidance.

Who is 0APT?

0APT operates as a Ransomware-as-a-Service (RaaS) syndicate. The name is deliberately ironic: they explicitly distance themselves from nation-state APTs, branding themselves as a “politically neutral underground syndicate” focused purely on profit.

Their ransom notes frame attacks as a “tax on security negligence” - psychological manipulation designed to normalize payment and shame victims into compliance.

AttributeDetails
First ObservedJanuary 28, 2026
Operational ModelRaaS with affiliate network
Extortion MethodDouble extortion (encryption + data leak)
MotivationFinancial, explicitly non-political
Possible LineageTechnical similarities to Haron ransomware (2021)
Victim Count91+ (as of early February 2026)

Attack Velocity

The numbers are staggering:

  • 71 organizations compromised in 48 hours
  • 61 attacks executed on January 30 alone
  • 23.75% of all ransomware incidents in late January 2026
  • 50GB to 3TB of data exfiltrated per victim

This velocity suggests either pre-positioned access (victims compromised earlier, detonated simultaneously) or a large, coordinated affiliate network hitting multiple targets at once.

Target Profile

0APT is sector-agnostic but shows concentration in:

  • Healthcare: Metro General Hospital, Silverline Hospitals, dental clinics
  • Finance: Silver City Bank, Quantum Financial Corp, Summit Financial Group, Unity Insurance
  • Energy/Utilities: Delta Energy Corp, Solaris Renewable Energy, Blue Water Utilities
  • Transportation: National Rail Network, City Transit Authority, Harbor Port Authority
  • Technology: FutureTech AI, Nexus IT Services, Eclipse Software House

Critical infrastructure is clearly on the menu.

Technical Analysis

The Locker

The 0APT ransomware is written in C# targeting Windows, with reported Linux/ESXi variants.

Technical AttributeValue
LanguageC# (.NET)
File EncryptionSalsa20 stream cipher
Key ProtectionRSA-1024
File ExtensionNone (files retain original names)
Ransom NoteHOW TO RESTORE YOUR FILES.TXT
ObfuscationSmartAssembly, string encryption

Notable quirk: Unlike most ransomware, 0APT does not append an extension to encrypted files. This is a trait shared with Haron ransomware from 2021, suggesting possible code reuse or developer overlap.

The ransom notes claim AES-256 encryption, but analysis reveals Salsa20 - a simplification for non-technical victims.

Initial Access

0APT affiliates use multiple entry vectors:

1. Credential Phishing (Primary)

Sophisticated SSO phishing kits targeting Okta, Microsoft Entra, and Google Workspace. Known phishing domains:

myadyensso[.]com (targeting Adyen)
weworksso[.]com (targeting WeWork)
cnainsurancesso[.]com (targeting CNA Insurance)

These kits perform real-time session hijacking, capturing MFA tokens and establishing persistent access.

2. Exposed Remote Services

Exploitation of internet-facing RDP and VPNs using:

  • Credentials purchased from initial access brokers
  • Stolen credentials from phishing
  • Unpatched VPN appliances

Execution and Lateral Movement

Post-access playbook follows standard ransomware TTPs:

  1. Reconnaissance: Map networks, identify domain controllers, backup servers, and high-value targets
  2. Credential Dumping: LSASS memory extraction (likely Mimikatz)
  3. Lateral Movement: PsExec and WMI for remote execution
  4. Privilege Escalation: Target domain admin accounts
  5. Deployment: Abuse Group Policy for enterprise-wide ransomware push
  6. Impact Maximization: Target VMware ESXi hosts and network storage

Defense Evasion

  • SmartAssembly obfuscation for .NET binaries
  • String encryption to evade static analysis
  • AV/EDR termination via taskkill and net stop
  • Shadow copy deletion: vssadmin delete shadows /all /quiet
  • Process naming mimicking legitimate files (e.g., svcHost.exe)

Exfiltration

Data theft occurs days before encryption:

  • Volumes: 50GB to 3TB per victim
  • Tools: Likely Rclone, cloud storage services, or custom exfil
  • Data is archived and compressed before transfer
  • HTTPS/TLS encrypted channels to C2

Infrastructure

Command and Control

Known C2 domains:

approvalmechanism[.]com
commerceapprove[.]com
technicalposition[.]com

Leak site and victim communications operate over Tor.

Leak Site Mechanics

  • Countdown timers create artificial urgency
  • Sample data published to demonstrate access
  • Full dumps threatened if ransom not paid
  • Victim-specific portals for “negotiation”

MITRE ATT&CK Mapping

TacticTechniqueDescription
Initial AccessT1566.001Spearphishing (SSO phishing kits)
Initial AccessT1078Valid Accounts (stolen creds)
Initial AccessT1133External Remote Services (RDP/VPN)
ExecutionT1047WMI
ExecutionT1059.001PowerShell
Credential AccessT1003.001LSASS Memory Dumping
Lateral MovementT1021.002SMB/Admin Shares (PsExec)
Defense EvasionT1027Obfuscated Files
Defense EvasionT1562.001Disable Security Tools
ExfiltrationT1041Exfil Over C2 Channel
ImpactT1486Data Encrypted for Impact
ImpactT1490Inhibit System Recovery

Detection Opportunities

Network-Based

Monitor for:

  • Connections to known C2 domains (see IOC section)
  • Tor network traffic from servers/workstations
  • Large outbound data transfers (especially to cloud storage)
  • SMB traffic patterns consistent with PsExec lateral movement
  • Unusual RDP connections between internal hosts

Endpoint-Based

Alert on:

  • Mass file operations without extension changes (0APT signature)
  • vssadmin delete shadows execution
  • LSASS access from unsigned processes
  • PowerShell with encoded commands
  • New scheduled tasks or services on multiple hosts
  • Processes named similar to system files but in wrong locations

Authentication

  • Failed authentication spikes followed by successful logins
  • Logins from unusual locations or at unusual times
  • Service account usage from workstations
  • New admin account creation

Indicators of Compromise

C2 Domains

approvalmechanism[.]com
commerceapprove[.]com
technicalposition[.]com

Phishing Domains

myadyensso[.]com
weworksso[.]com
cnainsurancesso[.]com

Ransom Note

Filename: HOW TO RESTORE YOUR FILES.TXT

Behavioral

  • Encrypted files with no extension change
  • Salsa20 encryption patterns
  • RSA-1024 key exchange

Recommendations

Immediate Actions

  1. Block IOCs at firewall, proxy, and DNS levels
  2. Hunt for phishing domains in email and proxy logs
  3. Review authentication logs for anomalies in the past 30 days
  4. Validate backup integrity - can you actually restore?
  5. Segment critical systems - domain controllers, backup servers, ESXi hosts

Strategic Hardening

  1. Implement phishing-resistant MFA (FIDO2, hardware keys) - SSO phishing kits can bypass SMS/TOTP
  2. Restrict PsExec and WMI to authorized admin workstations
  3. Deploy EDR with behavioral detection, not just signature-based
  4. Monitor outbound traffic for data exfiltration patterns
  5. Air-gap backups - ransomware crews specifically target backup infrastructure

User Awareness

0APT phishing is sophisticated. Train users to:

  • Verify SSO login URLs character-by-character
  • Report unexpected MFA prompts
  • Question “IT support” calls requesting credentials

Conclusion

0APT’s explosive debut signals a new tempo in the ransomware ecosystem. Their affiliate model, combined with effective SSO phishing and proven ransomware tooling, makes them a serious threat to organizations of all sizes.

The silver lining: their TTPs are well-documented and detectable. Organizations with mature security programs and proper backup hygiene can defend against 0APT, but the window for preparation is narrowing.


Want hands-on training in ransomware defense? Check out the Endolum Certified Defense Analyst (ECDA) course for practical blue team skills.