zerofox logo
Advisories

ZeroFox Intelligence Profile - Krybit

|by Alpha Team

banner image

ZeroFox Intelligence Profile - Krybit

Product Serial: P-2026-04-28a

TLP:GREEN

This Threat Actor Profile is a baseline analysis for the ransomare-as-a-service collective Krybit, which has been active since early April 2026.

Standing Intelligence Requirements

For the most up-to-date list of ZeroFox’s Intelligence Requirements, please visit:

https://cloud.zerofox.com/intelligence/advisories/14956

Link to Download

View the full report here

Key Findings

  • Krybit is a ransomware and digital extortion (R&DE) collective active since at least April 3, 2026, that publishes victim information on its dark-web hosted blog; the collective has claimed at least 19 victims so far.
  • Krybit is very likely financially motivated; neither its dark web leak site nor its public statements on dark web forums, social media, or covert communication channels indicate any political stance, ideological messaging, or affiliation with a specific cause.
  • Krybit employs a double extortion model, as indicated by the file encryption experienced by known victims, as well as the ransom note left behind in confirmed attacks.
  • On April 13, 2026, rival ransomware collective 0APT exploited a vulnerability in Krybit’s backend database, gaining access to Krybit’s victim data set, among other data. Subsequently, on April 15, 2026, Krybit revealed its own counterattack against 0APT, defacing 0APT’s leak site and publicly releasing its full source code and operational logs. This response likely indicates that, beyond its core financial objectives, Krybit is willing to allocate resources to retaliatory actions to safeguard its reputation.
  • ZeroFox assess Krybit is a low-to-medium sophistication, immature ransomware-as-a-service (RaaS) provider that warrants continued monitoring, given its expanding platform capabilities and infrastructure.

Tags: threat actortlp:greendark web

ZeroFox Intelligence Profile - Krybit