Ransomware victim disclosure
← All victimsAptim
Claimed by coinbasecartel · listed 28 days ago
Status timeline
- Listed
Apr 23, 2026
- Data leaked
At a glance
- Group
- coinbasecartel
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- Apr 23, 2026
About the victim
AI dossier — public-source company profileAPTIM is a US-based engineering, program management, and technical services company operating primarily in environmental remediation, infrastructure, and energy sectors. The company serves federal government agencies, industrial clients, and utilities across the United States. APTIM was formed in 2017 following CB&I's sale of its environmental and infrastructure services division.
- Industry
- Environmental & Infrastructure Engineering Services
- Employees
- 1001-5000
- Founded
- 2017
Attack summary
Severity: high — Publication of Kerberos pre-authentication hashes (AS-REP/krb5pa type 23) demonstrates confirmed deep Active Directory compromise of a significant US federal contractor. Credential exfiltration at domain level implies broad internal access; APTIM's federal government clientele elevates potential downstream risk.The coinbasecartel group claims to have compromised APTIM's Active Directory environment, publishing Kerberos pre-authentication (krb5pa) password hashes for the aptim.com domain as proof of access, indicating deep internal network penetration. The disclosed status indicates data has been published, suggesting exfiltration of internal credentials and potentially broader data.
Data the group says was taken
AI dossier — extracted from the leak post- Active Directory Kerberos authentication hashes
- Domain credentials (aptim.com)
- Internal network access artifacts
The group's post references roughly 2 proof files.
What the group claims
$krb5pa$23$APTIM.COM$APTIM.COM$$9936cd67a6d3d8560aaa25bb4a7a03b0bb8dfbbdbac8fed06e9262c41dce5ee567d0f7b52928d3626e43c0a7cfac4fb1a9b90887 $krb5pa$23$aptim.com$aptim.com$f7a8e75a2c6d3610fe9f4b34bec2a...
The leak post
captured from the group's siteSystem Breach • Coinbasecartel We are looking for new partners/insiders. Send us a message to dicuss We are looking for new partners/insiders. Send us a message to dicuss CRITICAL ANNOUNCEMENTS × Contact Update We have changed our contact method. We now exclusively use qTox Messenger for all communications. SimpleX and Session have been discontinued. Our Tox ID: A7580331D4D16453CCE86D7ADFBCF0CEED0D0D1AEA8F4DBEEBCA9E3B46308F260DE9B41BD838 TO APTIM You may have noticed the sudden, heavy silence. The corporate VPNs are dead. We have been the silent architects of your network for the past three weeks. While your "elite" investigators from Mandiant sat in your logs, we sat directly beside them burning through over a hundred of your corporate identities like disposable tools. we have had your entire network and internal protocols. HOW LONG WILL YOU KEEP YOUR THOUSANDS OF FIELD WORKERS LOCKED OUT? We have successfully exfiltrated the most sensitive engineering data held by any firm in your sectors We hold the complete Navisworks 3D models, P&ID diagrams, and maintenance logic for your major energy plants. This includes the granular Honeywell DCS controller logic. We know…
Sources
Source
Indexed 28 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
