Threat Actor Profile
Low
Cybercriminal
Description
The group appears unreliable. Most, if not all, of its alleged victims cannot be verified and appear to be randomly selected organizations. WE HAVE DECIDED TO REMOVE ENTRIES FOR THIS GROUP
Confidence Score
Tags
ransomware
ransomware.live
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
MITRE ATT&CK Techniques (6)
Indicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
{'added_date': '2026-01-28',
'client': '2003264@sit.singaporetech.edu.sg',
'description': 'The group appears unreliable. Most, if not all, of its '
'alleged victims cannot be verified and appear to be randomly '
'selected organizations. WE HAVE DECIDED TO REMOVE ENTRIES FOR '
'THIS GROUP',
'firstseen': None,
'group': '0apt',
'has_negotiations': False,
'has_ransomnote': True,
'lastseen': None,
'locations': [{'available': True,
'fqdn': 'oaptxiyisljt2kv3we2we34kuudmqda7f2geffoylzpeo7ourhtz4dad.onion',
'slug': 'http://oaptxiyisljt2kv3we2we34kuudmqda7f2geffoylzpeo7ourhtz4dad.onion',
'title': '404 - Compromised',
'type': 'DLS'}],
'negotiation_count': 0,
'ransomnotes_count': 1,
'tiaras_metadata': {'has_negotiations': False,
'has_ransomnote': True,
'locations': [{'available': True,
'fqdn': 'oaptxiyisljt2kv3we2we34kuudmqda7f2geffoylzpeo7ourhtz4dad.onion',
'slug': 'http://oaptxiyisljt2kv3we2we34kuudmqda7f2geffoylzpeo7ourhtz4dad.onion',
'title': '404 - Compromised',
'type': 'DLS'}],
'negotiation_count': 0,
'ransomnotes_count': 1,
'ransomware_live_group': '0apt',
'tools': {},
'url': 'https://www.ransomware.live/group/0apt',
'victims': 0,
'vulnerabilities': [{'CVE': 'CVE-2024-3400',
'CVSS': 10.0,
'Product': 'PAN-OS (Edge Firewalls)',
'Vendor': 'Palo Alto Networks',
'severity': 'CRITICAL'},
{'CVE': 'CVE-2025-22457',
'CVSS': 9.0,
'Product': 'Ivanti ICS',
'Vendor': 'Ivanti',
'severity': 'CRITICAL'},
{'CVE': 'CVE-2024-21887',
'CVSS': 9.1,
'Product': 'VPN Appliance',
'Vendor': 'Ivanti',
'severity': 'CRITICAL'},
{'CVE': 'CVE-2025-61882',
'CVSS': 9.8,
'Product': 'Oracle E-Business Suite '
'(EBS)',
'Vendor': 'Oracle',
'severity': 'CRITICAL'}]},
'tiaras_source': 'ransomware.live',
'tools': {},
'ttps': [{'tactic_id': 'TA0001',
'tactic_name': 'Initial Access',
'techniques': [{'technique_details': 'Exploitation of '
'internet-facing applications '
'(focus on firewalls and '
'VPNs).',
'technique_id': 'T1190',
'technique_name': 'Exploit Public-Facing '
'Application'}]},
{'tactic_id': 'TA0002',
'tactic_name': 'Execution',
'techniques': [{'technique_details': 'Direct system calls to bypass '
'EDRs based on API hooks.',
'technique_id': 'T1106',
'technique_name': 'Native API'}]},
{'tactic_id': 'TA0003',
'tactic_name': 'Persistence',
'techniques': [{'technique_details': 'Creation of fake services on '
'Linux systems (systemd).',
'technique_id': 'T1543.002',
'technique_name': 'Create or Modify System Process: '
'Systemd Service'}]},
{'tactic_id': 'TA0005',
'tactic_name': 'Defense Evasion',
'techniques': [{'technique_details': 'The 0apt payload contains '
'"useless math" loops to delay '
'sandbox analysis.',
'technique_id': 'T1622',
'technique_name': 'Debugger Evasion'}]},
{'tactic_id': 'TA0007',
'tactic_name': 'Discovery',
'techniques': [{'technique_details': 'Use of custom tools that '
'mimic legitimate monitoring '
'traffic.',
'technique_id': 'T1046',
'technique_name': 'Network Service Scanning'}]},
{'tactic_id': 'TA0010',
'tactic_name': 'Exfiltration',
'techniques': [{'technique_details': 'Sending data via HTTPS '
'tunnels to legitimate AWS S3 '
'instances.',
'technique_id': 'T1567.002',
'technique_name': 'Exfiltration Over Web Service: '
'Exfiltration to Cloud '
'Storage'}]}],
'url': 'https://www.ransomware.live/group/0apt',
'victims': 0,
'vulnerabilities': [{'CVE': 'CVE-2024-3400',
'CVSS': 10.0,
'Product': 'PAN-OS (Edge Firewalls)',
'Vendor': 'Palo Alto Networks',
'severity': 'CRITICAL'},
{'CVE': 'CVE-2025-22457',
'CVSS': 9.0,
'Product': 'Ivanti ICS',
'Vendor': 'Ivanti',
'severity': 'CRITICAL'},
{'CVE': 'CVE-2024-21887',
'CVSS': 9.1,
'Product': 'VPN Appliance',
'Vendor': 'Ivanti',
'severity': 'CRITICAL'},
{'CVE': 'CVE-2025-61882',
'CVSS': 9.8,
'Product': 'Oracle E-Business Suite (EBS)',
'Vendor': 'Oracle',
'severity': 'CRITICAL'}]}