The ransomware group Coinbase Cartel has added Aptim, a U.S. engineering and professional services company, to its list of victims. In a post on its dark web leak site dated April 23, 2026, the group claimed to have breached Aptim's network and exfiltrated confidential data. The attackers are threatening to publish the stolen information unless a ransom is paid. Notably, the group included a technical artifact in their post, a string that strongly resembles a Kerberos pre-authentication hash. This suggests that the initial access or privilege escalation may have been achieved via a Kerberoasting attack, targeting service account credentials within Aptim's Active Directory environment.
Aptim, a Louisiana-based firm, provides critical engineering, environmental, and infrastructure solutions to both government and commercial clients. A breach of its network could expose highly sensitive data, including intellectual property, project blueprints, and confidential client information.
The Coinbase Cartel group is employing a double extortion tactic: not only is data likely encrypted on Aptim's systems, but the exfiltrated data is being held hostage with the threat of public release. This puts maximum pressure on the victim to pay.
The most significant detail provided by the attackers is the hash string: $krb5pa$23$APTIM.COM.... This format is characteristic of a hash captured during a Kerberoasting attack. This indicates a likely compromise of at least one service account within Aptim's domain, which could have been used for initial access or, more likely, for privilege escalation and lateral movement within the network.
Based on the evidence, the attack likely involved the following TTPs from the MITRE ATT&CK framework:
T1558.003 - Kerberoasting. In this technique, an attacker with any valid domain user account can request service tickets (TGS) for service accounts. If these service accounts have weak passwords, the attacker can take the encrypted portion of the ticket offline and crack the password, gaining access to the service account.T1078 - Valid Accounts. A compromised service account can often provide extensive, privileged access across the network.T1567 - Exfiltration Over Web Service) to their own servers.T1486 - Data Encrypted for Impact.The inclusion of the Kerberos hash in the leak post is a form of psychological pressure, demonstrating to the victim (and security researchers) that the attackers have deep access and technical knowledge of their internal network.
For an engineering firm like Aptim, the impact of this breach is severe. The exfiltration of confidential data could lead to the theft of valuable intellectual property and proprietary designs. If government client data is involved, it could trigger regulatory and contractual penalties. The public leak of this data would cause significant reputational damage and could be used by competitors. Operationally, the company is likely facing significant disruption from the encryption of its systems, leading to project delays and financial losses associated with recovery and incident response.
$krb5pa$23$APTIM.COM...Security teams can hunt for Kerberoasting activity with the following methods:
4769Windows Security Event Log$ (i.e., is not a computer account) and the ticket encryption type is 0x17 (RC4-HMAC).svc_* or service_*Detecting Kerberoasting is key to stopping this attack chain early.
D3-DAM: Domain Account Monitoring.svc_sql_admin) and extremely long, complex passwords. Place them as honeypots and configure alerts for any access attempts, as no legitimate process should ever use them.Upon detecting a Kerberoasting attempt, the security team should immediately investigate the source account to determine if it is compromised and analyze which service accounts were targeted.
Mitigating Kerberoasting is a critical Active Directory hardening task:
D3-SPP: Strong Password Policy.Enforcing extremely long and complex passwords (25+ characters) for all service accounts is the primary defense against offline cracking of Kerberos tickets.
Mapped D3FEND Techniques:
Switching from standard user accounts to Group Managed Service Accounts (gMSAs) for services eliminates the threat of Kerberoasting for those accounts.
The most direct countermeasure to the Kerberoasting attack used against Aptim is to enforce a robust password policy specifically for Active Directory service accounts. Because Kerberoasting relies on cracking a password hash offline, the only effective defense is to make the password uncrackable within a reasonable timeframe. Organizations must implement a policy requiring all service accounts to have passwords of at least 25 characters, composed of a mix of upper/lowercase letters, numbers, and symbols. These passwords should be randomly generated. Furthermore, transitioning to Group Managed Service Accounts (gMSAs) where possible is highly recommended, as Windows automatically manages these accounts with 127-character, complex passwords that are rotated regularly, rendering them immune to Kerberoasting.
To detect a Kerberoasting attack in progress, organizations must actively monitor their domain controllers. By forwarding Windows Security Event Logs to a SIEM, security teams can build a detection rule for Event ID 4769 (A Kerberos service ticket was requested). While this event is common, an attack pattern emerges when a single source user account requests a large number of tickets for many different service principal names (SPNs) in a short period. The rule should be tuned to alert on this 'one-to-many' request pattern. Enriching the alert with information about the source user and the targeted service accounts can help analysts quickly identify and respond to the potential compromise, disabling the source account before the attacker can crack the hashes and move laterally.
The Coinbase Cartel ransomware group posted its claim of attacking Aptim on its data leak site.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats