đą 0APT : une campagne de bluff mais un ransomware Rust rĂ©ellement opĂ©rationnel (analyse Cyderes)
đ Selon Cyderes â Howler Cell Threat Research Team (publiĂ© le 16 fĂ©vrier 2026), 0APT est un ransomware Ă©crit en...
đ cyberveille :
https://cyberveille.ch/posts/2026-02-18-0apt-une-campagne-de-bluff-mais-un-ransomware-rust-reellement-operationnel-analyse-cyderes/đ source :
https://www.cyderes.com/howler-cell/0apt-bluff-campaign-evolves-into-potential-threat#0APT #IOC #Cyberveille0APT : une campagne de bluff mais un ransomware Rust réellement opérationnel (analyse Cyderes)
Selon Cyderes â Howler Cell Threat Research Team (publiĂ© le 16 fĂ©vrier 2026), 0APT est un ransomware Ă©crit en Rust apparu avec une campagne de bluff revendiquant plus de 200 victimes, mais sans preuves vĂ©rifiables; lâĂ©quipe a nĂ©anmoins confirmĂ© lâexistence dâune plateforme RaaS fonctionnelle et de charges malveillantes opĂ©rationnelles.
Cyderes souligne des doutes sur la crĂ©dibilitĂ© des fuites: un site onion listait de nombreuses victimes avant de disparaĂźtre, la section « leaks » du panneau RaaS propose des archives prĂ©tendument volumineuses qui ne se tĂ©lĂ©chargent pas, et aucune capture de donnĂ©es compromises nâest fournie. Les annonces massives et rapides (â200 victimes) sans artefacts contredisent les pratiques des groupes de rançongiciels matures, renforçant lâhypothĂšse dâune campagne de bluff destinĂ©e Ă impressionner.
CyberVeille
[0APT] - Ransomware Victim: Sonova Holding (Switzerland) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Dassault SystĂšmes (France) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: ConvaTec Group (UK) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Prince Court Medical (Malaysia) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Amcor Packaging Global (Australia) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Bio-Rad Laboratories (USA) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Cochlear Limited (Australia) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Freudenberg Technology Group (Germany) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security
[0APT] - Ransomware Victim: Edwards Lifesciences (USA) - RedPacket Security
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating
RedPacket Security