This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged HTML INJECTION vulnerability on the subdomain Government of Semarang City
- Category: Vulnerability
- Content: The threat actor claims to have discovered a vulnerability that occurs when users can control the input point and inject arbitrary HTML code into a vulnerable web page. This vulnerability can lead to many consequences, such as exposure of user session cookies that can be used to impersonate the victim, or, more generally, allowing attackers to alter the content of the page viewed by the victim.
- Date: 2025-08-29T14:24:24Z
- Network: telegram
- Published URL: https://t.me/FanatixLegionFX/380
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5082d68e-46ff-419b-ac78-008ad5f1c657.JPG
- Threat Actors: FANATIX LEGION
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: government of semarang city
- Victim Site: semarangkota.go.id
- Alleged Breach of OTP Bank Ukraine
- Category: Data Breach
- Content: The group claims to have compromised the systems of OTP Bank JSC in Ukraine, alleging full control over internal login keys. They further state that the vulnerability is being offered for sale.
- Date: 2025-08-29T14:15:36Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/1273?single
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/146f3ebc-e73c-455b-b77b-5fcfb6e1b92e.png https://d34iuop8pidsy8.cloudfront.net/e5f5b7e4-4166-497b-8547-5d70a4b9c7be.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Ukraine
- Victim Industry: Financial Services
- Victim Organization: otp bank
- Victim Site: otpbank.com.ua
- H3C4KEDZ targets the website of TAT Intelligence Center
- Category: Defacement
- Content: The group claims to have defaced the website of TAT Intelligence Center
- Date: 2025-08-29T14:14:54Z
- Network: telegram
- Published URL: https://t.me/h3c4kedzofficial/54
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9af03be5-1605-430f-bbc5-906bd02feab3.png
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Government Relations
- Victim Organization: tat intelligence center
- Victim Site: marketingdb.tat.or.th
- Alleged access to unidentified CCTV cameras in Japan
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to 3 unidentified CCTV cameras in Japan.
- Date: 2025-08-29T14:02:13Z
- Network: telegram
- Published URL: https://t.me/hezirash/1469
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/447ae9d1-ceb8-40a4-a4c5-fdf8c17e16a0.png
- Threat Actors: HEZI RASH
- Victim Country: Japan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Israeli credit cards
- Category: Data Breach
- Content: The threat actor claims to be selling 100 Israeli credit card records with expiration dates ranging from 2020 to 2027.
- Date: 2025-08-29T14:01:45Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Israel-credit-cards
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/397b1a60-2f7d-4d77-80eb-6071f71ddf4a.png
- Threat Actors: bxxxx1
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Breach of OTP Bank Ukraine
- Category: Data Breach
- Content: The group claims to have leaked data from OTP Bank JSC, one of the largest banks in Ukraine. They allege that they gained access to the bank’s internal systems, obtained login keys, and deployed a virus intended to spread across the network.
- Date: 2025-08-29T13:57:37Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/1273?single
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/146f3ebc-e73c-455b-b77b-5fcfb6e1b92e.png https://d34iuop8pidsy8.cloudfront.net/e5f5b7e4-4166-497b-8547-5d70a4b9c7be.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Ukraine
- Victim Industry: Financial Services
- Victim Organization: otp bank
- Victim Site: otpbank.com.ua
- Alleged unauthorized access to unidentified UK thermal well control system
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an industrial automation system (SCADA/PLC) at an unidentified thermal facility in the UK. The compromised system allegedly allows control of pumps and valves, monitoring of temperature and pressure parameters, access to error logs, and manipulation of programmable logic controller (PLC) inputs and outputs, potentially enabling interference with critical engineering operations.
- Date: 2025-08-29T13:46:29Z
- Network: telegram
- Published URL: https://t.me/Z_ALLIANCE/661
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7dbe8c7e-8fd9-4bc8-b0d0-c7f16a429c6b.png https://d34iuop8pidsy8.cloudfront.net/2c835b7e-872b-403f-b297-991a22b8d1aa.png
- Threat Actors: Z-ALLIANCE
- Victim Country: UK
- Victim Industry: Industrial Automation
- Victim Organization: Unknown
- Victim Site: Unknown
- Z-ALLIANCE targets the website of Teplytsia
- Category: Defacement
- Content: The group claims to have defaced the website of Teplytsia
- Date: 2025-08-29T13:27:21Z
- Network: telegram
- Published URL: https://t.me/Z_ALLIANCE/656?single
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ff1d2873-acd6-4d49-87d9-5b31eb6cb8df.JPG
- Threat Actors: Z-ALLIANCE
- Victim Country: Ukraine
- Victim Industry: Agriculture & Farming
- Victim Organization: teplytsia
- Victim Site: teplytsia.com.ua
- Alleged data breach of Southern Federal University
- Category: Data Breach
- Content: The group claims to have leaked 12 GB of data from the Southern Federal University, allegedly containing CVs of professors and staff, sensitive personal information of faculty members, administrative files, confidential research projects and highly sensitive internal documents.
- Date: 2025-08-29T13:02:10Z
- Network: telegram
- Published URL: https://t.me/FireWireMaroc/37
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/857c9940-09eb-4fed-a1fe-301281f8aa75.png
- Threat Actors: Fire Wire
- Victim Country: Russia
- Victim Industry: Education
- Victim Organization: southern federal university
- Victim Site: sfedu.ru
- Alleged Sale of VPN Access to U.S. and Canadian Companies
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized VPN access to eleven organizations located in the United States and Canada. According to the listing, the accesses primarily provide domain user-level privileges, with affected companies spanning multiple sectors including manufacturing, logistics, finance, construction, chemicals, automotive services, and architecture.
- Date: 2025-08-29T12:26:05Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/265178/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bd2315e7-f324-4bd8-8f12-05a30862d37c.png
- Threat Actors: ProfessorKliq
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Access to Vietnamese Power Company
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized access to a power company in Vietnam. The actor possesses domain administrator privileges with VPN access, enabling control over approximately 320 domain-joined computers.
- Date: 2025-08-29T12:18:49Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/265174/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bf761eb0-aaca-4eeb-8bc5-32ce7f34f53d.png
- Threat Actors: personX
- Victim Country: Vietnam
- Victim Industry: Energy & Utilities
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of access to Fastweb SCADA system
- Category: Initial Access
- Content: The group claims to have leaked access to Fastweb’s SCADA system.
- Date: 2025-08-29T12:16:50Z
- Network: telegram
- Published URL: https://t.me/hkvd_team/50
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d85cce4b-12af-4df0-af8a-09abd0d1a258.png
- Threat Actors: HKVD
- Victim Country: Italy
- Victim Industry: Network & Telecommunications
- Victim Organization: fastweb
- Victim Site: fastweb.it
- Alleged leak of login access to KT Corporation
- Category: Initial Access
- Content: The group claims to have leaked login credential belonging to KT Corporation.
- Date: 2025-08-29T12:14:58Z
- Network: telegram
- Published URL: https://t.me/hkvd_team/51
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a1e9afef-49cf-4fbe-94aa-d1b7f8dfdacc.JPG
- Threat Actors: HKVD
- Victim Country: South Korea
- Victim Industry: Network & Telecommunications
- Victim Organization: kt corporation
- Victim Site: kt.com
- Alleged data leak of PT Infrastruktur Bisnis Sejahtera
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of PT Infrastruktur Bisnis Sejahtera (IBS), which contains employee data including IDs, names, departments, emails, phone numbers, access levels, bank details, and job info, along with 232,530 records of site activities, file names, locations, and related metadata.
- Date: 2025-08-29T10:51:41Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-PT-Infrastruktur-Bisnis-Sejahtera-IBS-Data-Breach-Leaked-Download
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/71dcd83c-cb19-49ad-8cc6-9ed65eee5930.png https://d34iuop8pidsy8.cloudfront.net/b9cfbdf6-19dc-4ff7-be2e-aa782f44e6d6.png
- Threat Actors: N1KA
- Victim Country: Indonesia
- Victim Industry: Network & Telecommunications
- Victim Organization: pt infrastruktur bisnis sejahtera
- Victim Site: ibsmulti.com
- Alleged leak of Pakistani student database
- Category: Data Breach
- Content: The threat actor claims to have leaked a 3,037-line database from Pakistan containing detailed student information. The dataset reportedly includes full names, parent names, gender, dates of birth, CNIC numbers, contact numbers, residential addresses, email addresses, class levels, course categories, registered institutions, and registration timestamps.
- Date: 2025-08-29T09:39:56Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-3037-LINE-DATABASE-PAKISTAN
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d66739c9-80f9-4eac-a7a8-c927ff7f5f40.png
- Threat Actors: APT_GHOSTID
- Victim Country: Pakistan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of PERPUSTAKAAN PENGADILAN NEGERI BOYOLALI
- Category: Data Breach
- Content: The group claims to have breached the server of PERPUSTAKAAN PENGADILAN NEGERI BOYOLALI and uploaded a text file mentioning the breach
- Date: 2025-08-29T09:26:03Z
- Network: telegram
- Published URL: https://t.me/c/2702757113/215
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/00282379-7c65-406b-a7f7-3fcede9d42d6.png
- Threat Actors: Night Owll
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: perpustakaan pengadilan negeri boyolali
- Victim Site: perpustakaan.pn-boyolali.go.id
- Alleged data leak of Pakistani pilot personnel
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing pilot personnel records from Pakistan, including details such as full names, CNIC/ID numbers, dates of birth, addresses, cities, provinces, blood groups, gender, personal and emergency contact numbers, email addresses, parent/guardian names, employment IDs, joining and leaving dates, and pilot grades
- Date: 2025-08-29T09:00:32Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-TEST
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/16c6f88b-c9cc-4d9a-b171-ed8d32044fda.png
- Threat Actors: APT_GHOSTID
- Victim Country: Pakistan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- KAL EGY 319 claims to target Egypt
- Category: Alert
- Content: A recent post by the group claims that they are targeting The Egyptian Foundation’s in Egypt.
- Date: 2025-08-29T08:38:09Z
- Network: telegram
- Published URL: https://t.me/KALOSHAEGY319/18
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/eb8a1d05-9090-4ad7-bd8b-396964297713.JPG
- Threat Actors: KAL EGY 319
- Victim Country: Egypt
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of SMA Mazraatul Ulum Paciran
- Category: Data Breach
- Content: The threat actor claims to be selling sensitive login data from SMA Mazraatul Ulum Paciran, a religious high school in Indonesia. The leak includes two files containing 156 student accounts and 58 teacher accounts.
- Date: 2025-08-29T08:14:31Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Indonesian-Student-Leaked-smamazraatululum-com
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fc0a20e2-be51-4241-a26b-dc9567289de2.png
- Threat Actors: Hitori_Bocchi
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: sma mazraatul ulum paciran
- Victim Site: smamazraatululum.com
- Alleged data leak of Indonesian National Police
- Category: Data Breach
- Content: The threat actor claims to have obtained a database containing detailed records of Indonesian police personnel. The leak reportedly includes information such as ID numbers, ranks, names, positions, units, addresses, phone numbers, and employment status.
- Date: 2025-08-29T07:37:42Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-CLOBELSECTEAM-Leaked-database-police-of-indonesia
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d4c8b295-a3fc-43b4-b576-c2b4e3a3748b.png https://d34iuop8pidsy8.cloudfront.net/48c0f96c-16b4-4a79-aacf-836dae904807.png
- Threat Actors: petrush4x0r
- Victim Country: Indonesia
- Victim Industry: Law Enforcement
- Victim Organization: indonesian national police
- Victim Site: inp.polri.go.id
- Alleged sale of U.S. Executive Records
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing 41 million records of U.S. executives.
- Date: 2025-08-29T07:28:04Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-American-Executives
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f259a5bd-996f-4b81-bc2b-e9cbaaa3d899.png
- Threat Actors: first_bug
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of MMS Parser 0day RCE Exploit
- Category: Malware
- Content: The threat actor is selling a 0day exploit targeting the Android MMS parser, affecting versions 11 to 15 on ARM (32/64-bit). The exploit enables remote code execution, root privilege escalation, and sandbox escape without user interaction or visible crash, making it highly stealthy.
- Date: 2025-08-29T07:22:53Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Android-RCE-Exploit-0day-Android-11-15
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3faa55c3-d372-43f2-948a-b4dda093f170.png
- Threat Actors: Bucad
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Verified Mobile Numbers from Crypto Users
- Category: Data Breach
- Content: The threat actor claims to be selling a database of verified mobile phone numbers of major cryptocurrency users. The data allegedly includes users from Binance (UK: 500,000; France: 156,500; UAE: 88,000), OKX (UAE: 125,500; Hong Kong: 45,500), HTX (Hong Kong: 49,000), KuCoin (USA: 67,000), and Coinbase (USA: 1.1 million).
- Date: 2025-08-29T07:22:45Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Sell-mobile-phone-numbers-of-filtered-cryptocurrency-exchanges–27446
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0d7863e4-9c96-400a-939f-90268928c733.png
- Threat Actors: 1688shuju
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorised access to Thailand’s Department of Fisheries
- Category: Initial Access
- Content: The group claims to have accessed the website of Thailand’s Department of Fisheries
- Date: 2025-08-29T06:17:47Z
- Network: telegram
- Published URL: https://t.me/h3c4kedzofficial/53
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9696cb5e-4237-41c2-96cf-63c340663fd6.png
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Fishery
- Victim Organization: thailand’s department of fisheries
- Victim Site: fisheries.go.th
- Alleged data breach of Polda Banten
- Category: Data Breach
- Content: The threat actor claims to have leaked the data of Kepolisian Daerah Banten (Polda Banten). The compromised data includes names, national identity numbers (NIK), educational backgrounds, police ranks, official positions, and personal phone numbers of high-ranking police officials.
- Date: 2025-08-29T05:55:37Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-HQ-LEAK-Polda-Banten-Command-–-Officers’-Numbers-Exclusive
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fbf69060-860b-4f20-9335-c8d099dc5831.png https://d34iuop8pidsy8.cloudfront.net/481e2921-de1c-4784-8ae1-d3cbfbe09253.png
- Threat Actors: MarioBrosssss
- Victim Country: Indonesia
- Victim Industry: Law Enforcement
- Victim Organization: polda banten
- Victim Site: banten.polri.go.id
- Alleged DOM based XSS vulnerability in the website of FontIran
- Category: Vulnerability
- Content: The threat actor claims to have discovered a DOM-based XSS vulnerability in the website of FontIran, enabling the execution of a payload that captures a screenshot of the victim’s page and sends it to a remote server.
- Date: 2025-08-29T05:31:34Z
- Network: telegram
- Published URL: https://t.me/LearnExploit/8643
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cb015cdf-1654-4eac-852b-ede418c279f2.png https://d34iuop8pidsy8.cloudfront.net/3c4005fe-43d8-46dd-9c64-75becd7f3aa4.png
- Threat Actors: 0Day.Today Learn Exploit Zero World Dark Web
- Victim Country: Iran
- Victim Industry: Information Technology (IT) Services
- Victim Organization: fontiran
- Victim Site: fontiran.com
- Alleged sale of unauthorized access to AgilPay
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized access to the Agilpay payment system. The actor advertises that the access includes the admin panel, which allows viewing of payments, transaction details, and terminal management functions.
- Date: 2025-08-29T05:06:02Z
- Network: tor
- Published URL: https://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142919/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f95e977c-965e-49e3-9607-92d1720541b1.png
- Threat Actors: S1N3R_HACK
- Victim Country: Dominican Republic
- Victim Industry: Financial Services
- Victim Organization: agilpay
- Victim Site: webapi.agilpay.net
- Alleged data breach of LiteBit Crypto Exchange
- Category: Data Breach
- Content: The threat actor claims to have leaked data from LiteBit, a cryptocurrency exchange that has since become part of Bitvavo. The leak reportedly contains 279,642 records dating back to 2017, and includes sensitive user information such as full names, multiple emails and phone numbers, IBANs, addresses, gender, IP addresses, and dates of birth.
- Date: 2025-08-29T04:36:37Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-250K-LiteBit-Crypto-Exchange-Currently-Bitvavo
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c38dd5d5-33a1-4856-a7b5-b2c3fe441d70.png
- Threat Actors: Trezor
- Victim Country: Netherlands
- Victim Industry: Financial Services
- Victim Organization: litebit
- Victim Site: litebit.eu
- Alleged data breach of National Ski Council Federation (NSCF)
- Category: Data Breach
- Content: Threat actor claims to have leaked the data of National Ski Council Federation (NSCF). The compromised data includes user id, login name, email, hashed passwords, display name, socials, SEO configurations.
- Date: 2025-08-29T04:17:07Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-DUMP-SkiFederation-Users-DB-–-15K-Records
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/57e38563-5092-4eb6-99ea-67b165eda22f.png https://d34iuop8pidsy8.cloudfront.net/6ead11b7-9221-4877-aa39-c7bc3f05f6ca.png
- Threat Actors: MrAxSiKucingHitam
- Victim Country: USA
- Victim Industry: Leisure & Travel
- Victim Organization: national ski council federation (nscf)
- Victim Site: skifederation.org
- Alleged data breach of Summit Bank Limited
- Category: Data Breach
- Content: A threat actor claims to be selling a database from a bank in Pakistan, specifically citing sample data from Summit Bank. The database reportedly contains sensitive financial and personal information, including CNIC/passport numbers, full names, addresses, account numbers, account types, deposit details, instrument and cheque information, currency and conversion rates, and provincial data.
- Date: 2025-08-29T03:52:51Z
- Network: telegram
- Published URL: https://t.me/digitalsghost/715
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6bf5f1e4-979e-43d9-b159-3b6b0976e03e.png
- Threat Actors: DigitalGhost
- Victim Country: Pakistan
- Victim Industry: Banking & Mortgage
- Victim Organization: summit bank limited
- Victim Site: summitbank.com.pk
- Alleged data breach of AxisPro
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from AxisPro (axisproerp.com), a UAE-based cloud ERP system used in government service centers including Amer, Tas-heel, Tadbeer, and Typing Centers. The exposed data reportedly contains 230,089 records and includes detailed customer and transaction information such as names, TRNs, mobile numbers, emails, payment methods, invoice totals, transaction references, and employee details associated with the transactions.
- Date: 2025-08-29T03:45:12Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-AxisPro-axisproerp-com-Database-Breach-Leaked-Download–27373
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3a3409fd-24a0-42f4-8f23-e607b2ce7af8.png
- Threat Actors: N1KA
- Victim Country: UAE
- Victim Industry: Information Technology (IT) Services
- Victim Organization: axispro
- Victim Site: axisproerp.com
- Alleged data breach of Shelbourne Accountants
- Category: Data Breach
- Content: The group claims to have obtained the organization data.
- Date: 2025-08-29T03:39:57Z
- Network: tor
- Published URL: http://cephalus6oiypuwumqlwurvbmwsfglg424zjdmywfgqm4iehkqivsjyd.onion/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/89a9edfd-c2c7-420c-8e5b-d5da15800ee7.png
- Threat Actors: Cephalus
- Victim Country: Ireland
- Victim Industry: Accounting
- Victim Organization: shelbourne accountants
- Victim Site: shelbourneaccountants.ie
- Alleged data breach of ACROAMATICS Telemetry Systems
- Category: Data Breach
- Content: Threat actor claims to have exfiltrated over 800GB of internal data from Acroamatics, a U.S.-based telemetry systems company under Delta Information Systems.
- Date: 2025-08-29T03:36:47Z
- Network: tor
- Published URL: http://cephalus6oiypuwumqlwurvbmwsfglg424zjdmywfgqm4iehkqivsjyd.onion/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7faaa86a-f64c-41eb-a8a9-1556ddd4a8f0.png
- Threat Actors: Cephalus
- Victim Country: USA
- Victim Industry: Defense & Space
- Victim Organization: acroamatics telemetry systems
- Victim Site: acroamatics.com
- Alleged data breach of Bureau of Justice Statistics (BJS)
- Category: Data Breach
- Content: The threat actor claims to have leaked data from bjs.ojp.gov (the Bureau of Justice Statistics, under the U.S. Department of Justice). The leak allegedly includes Gmail addresses, names, first names, and last names.
- Date: 2025-08-29T03:00:07Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-bjs-ojp-gov-data-leak–27321
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1ffd7683-74ac-4b84-a0d7-cb063d9f2a12.png
- Threat Actors: TomSec
- Victim Country: USA
- Victim Industry: Government & Public Sector
- Victim Organization: bureau of justice statistics (bjs)
- Victim Site: bjs.ojp.gov
- Alleged data leak of Russian confidential documents
- Category: Data Breach
- Content: The group claims to have leaked 300GB of top-secret data and documents related to the Russia-Ukraine war, including details on the construction of Russian missiles, profiles of diplomats and high-ranking military officials, submarine information, files from the Russian space agency, secret military data, internal internet network structures, wiring and cabling schemes, and data center information.
- Date: 2025-08-29T02:56:45Z
- Network: telegram
- Published URL: https://t.me/digitalsghost/712
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0b5ef6b2-e5e0-46b1-ac9f-d0d0d8d0d906.png
- Threat Actors: DigitalGhost
- Victim Country: Russia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Indonesia data
- Category: Data Breach
- Content: A threat actor claims to have leaked Indonesia data
- Date: 2025-08-29T02:24:58Z
- Network: openweb
- Published URL: https://leakbase.la/threads/42071/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/df4d1f7b-b9ac-4b58-ac83-16234ea21922.png
- Threat Actors: lstjksjy
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorised access to Queen Sirikit National Institute of Child Health
- Category: Initial Access
- Content: The group claims to have accessed the website of Queen Sirikit National Institute of Child Health
- Date: 2025-08-29T02:18:57Z
- Network: telegram
- Published URL: https://t.me/h3c4kedzofficial/52
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/86ecd52f-3044-4367-ab24-ab600ef897a4.png
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Hospital & Health Care
- Victim Organization: queen sirikit national institute of child health
- Victim Site: childrenhospital.go.th
- Alleged leak of Business Database from Finland
- Category: Data Breach
- Content: A threat actor claims to be selling a business database containing information on 251,000 entities based in Finland.
- Date: 2025-08-29T02:11:59Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-2-databases
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b1ff9e75-5528-4436-b061-84155d561c04.png
- Threat Actors: Katuru
- Victim Country: Finland
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Nexoria Panel Stealer
- Category: Malware
- Content: Threat claims to be selling Nexoria Panel, an Android SMS stealer advertised as a web panel with Telegram bot integration. While many such tools are often repackaged or modified versions of existing malware, these offerings continue to pose a threat through SMS interception, notification harvesting, contact data theft, and remote device control, which can enable credential theft, financial fraud, and bypass of two-factor authentication.
- Date: 2025-08-29T01:59:29Z
- Network: tor
- Published URL: https://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142920/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f00ce294-dab0-492c-ae8e-0f0a15d79055.png https://d34iuop8pidsy8.cloudfront.net/e4b29b17-37ee-48b5-84d5-c049fedc5125.png
- Threat Actors: S1N3R_HACK
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of unauthorized RDP access to an unidentified retail company in Germany
- Category: Initial Access
- Content: A threat actor claims to be selling domain user-level RDP access to a retail company based in Germany. The company reportedly earns less than $5 million annually and uses Panda Endpoint as its antivirus solution. The access includes two servers and two to three local PCs active during working hours.
- Date: 2025-08-29T01:52:04Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/265156/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ad3d31fa-c325-4645-9737-79667fa66777.png
- Threat Actors: MrDarKNesS
- Victim Country: Germany
- Victim Industry: Retail Industry
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Harita Group
- Category: Data Breach
- Content: The threat actor claims to have leaked 475GB of data from the Indonesian-based Harita Group, which includes 99,000 emails. Harita Group operates in various sectors such as nickel and bauxite mining, coal, ferronickel smelting, alumina refining, logging, and palm oil plantations.
- Date: 2025-08-29T00:15:24Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-475GB-Breach-Data-Harita-Group-From-Indonesian
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/396d3d1a-2a3d-467e-8301-d03afe1a2ad6.png https://d34iuop8pidsy8.cloudfront.net/af534be4-9b71-4a85-923f-a7f08e0ecde2.png
- Threat Actors: CLOBELSECTEAM
- Victim Country: Indonesia
- Victim Industry: Mining/Metals
- Victim Organization: harita group
- Victim Site: bumitama-agri.com
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from financial services and education to law enforcement and mining. The compromised data ranges from personal user information and sensitive employee records to confidential government documents and financial details.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to industrial systems, corporate networks, and government infrastructure. The sale of malware, including advanced exploits and tools, further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.