The apos ransomware group is a relatively new threat actor that emerged in April 2024, primarily motivated by financial gain through ransomware operations targeting organizations across multiple countries and sectors. Given their recent emergence and limited public documentation, their country of origin and affiliations with other ransomware groups remain unknown, though their targeting pattern suggests they may operate independently rather than as part of a larger ransomware-as-a-service ecosystem. Based on available data, the group has successfully compromised 16 known victims across Brazil, the United States, Argentina, Canada, and France, with a particular focus on technology, healthcare, business services, and manufacturing sectors, though their attack methodology and specific tools remain undocumented by major threat intelligence firms. No notable high-profile campaigns or major ransom payments have been publicly reported by CISA, FBI, Mandiant, or other reputable security researchers, likely due to the group's recent emergence and relatively small victim count. The group appears to remain active as of current reporting, though their limited public footprint suggests they are either a smaller operation or have managed to maintain a low profile in the threat landscape. The group has been linked to 16 public disclosures across our corpus. First observed on a leak site on April 29, 2024; most recent post August 15, 2025. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, Bitz Softwares is reported in Brazil, a country with 319 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.