📱 0APT : une campagne de bluff mais un ransomware Rust rĂ©ellement opĂ©rationnel (analyse Cyderes)
📝 Selon Cyderes – Howler Cell Threat Research Team (publiĂ© le 16 fĂ©vrier 2026), 0APT est un ransomware Ă©crit en...
📖 cyberveille : https://cyberveille.ch/posts/2026-02-18-0apt-une-campagne-de-bluff-mais-un-ransomware-rust-reellement-operationnel-analyse-cyderes/
🌐 source : https://www.cyderes.com/howler-cell/0apt-bluff-campaign-evolves-into-potential-threat
#0APT #IOC #Cyberveille
0APT : une campagne de bluff mais un ransomware Rust réellement opérationnel (analyse Cyderes)

Selon Cyderes – Howler Cell Threat Research Team (publiĂ© le 16 fĂ©vrier 2026), 0APT est un ransomware Ă©crit en Rust apparu avec une campagne de bluff revendiquant plus de 200 victimes, mais sans preuves vĂ©rifiables; l’équipe a nĂ©anmoins confirmĂ© l’existence d’une plateforme RaaS fonctionnelle et de charges malveillantes opĂ©rationnelles. Cyderes souligne des doutes sur la crĂ©dibilitĂ© des fuites: un site onion listait de nombreuses victimes avant de disparaĂźtre, la section « leaks » du panneau RaaS propose des archives prĂ©tendument volumineuses qui ne se tĂ©lĂ©chargent pas, et aucune capture de donnĂ©es compromises n’est fournie. Les annonces massives et rapides (≈200 victimes) sans artefacts contredisent les pratiques des groupes de rançongiciels matures, renforçant l’hypothĂšse d’une campagne de bluff destinĂ©e Ă  impressionner.

CyberVeille
[0APT] - Ransomware Victim: Sonova Holding (Switzerland) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Dassault SystĂšmes (France) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: ConvaTec Group (UK) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Prince Court Medical (Malaysia) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Amcor Packaging Global (Australia) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Bio-Rad Laboratories (USA) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Cochlear Limited (Australia) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Freudenberg Technology Group (Germany) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[0APT] - Ransomware Victim: Edwards Lifesciences (USA) - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security