This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged Data Leak of CalCOFI
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of CalCOFI.
- Date: 2025-09-01T14:10:43Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-CALCOFI-BY-TERRORISM666)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9b119477-a40a-461c-8698-7a2b18ece719.png
- Threat Actors: TERRORISM666
- Victim Country: USA
- Victim Industry: Research Industry
- Victim Organization: calcofi
- Victim Site: calcofi.org
- Alleged sale of ATM card cloning tool
- Category: Malware
- Content: The threat actor claims to be selling ATM card cloning tool, a carding toolkit designed to clone debit and credit cards. The bundle includes software for reading and writing magnetic stripe data, generating EMV ARQC codes, and managing Java smart cards (JCOP). The tools allow threat actors to replicate card data obtained via skimmers or other means and use it to make fraudulent transactions.
- Date: 2025-09-01T13:48:42Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-ATM-Card-Cloning-All-Tools-2025)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e1c57595-97bd-4c7a-aab5-822f5a2b2bc7.png https://d34iuop8pidsy8.cloudfront.net/d8f5df10-3544-4dfe-a251-fb8a3da09bdc.png
- Threat Actors: dimexor4381
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of admin level API access to an unidentifed Crypto Exchange
- Category: Initial Access
- Content: The threat actor claims to be selling administrative-level API access to an unidentified cryptocurrency exchange.
- Date: 2025-09-01T12:53:08Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Crypto-Exchange-access)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2f08516f-5f23-48b9-a30c-6edb707659eb.png
- Threat Actors: krekti
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged database leak of Bitstamp
- Category: Data Breach
- Content: The group claims to have leaked 6M records from Bitstamp database. The compromised data includes customers’ first names, last names, country, email, phone numbers, brand, payment type, and dates.
- Date: 2025-09-01T12:52:58Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1151)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3cc3bc37-3560-4fa1-b70a-1f51c772ec1a.png
- Threat Actors: scattered lapsu$ hunters
- Victim Country: Luxembourg
- Victim Industry: Financial Services
- Victim Organization: bitstamp usa, inc.
- Victim Site: bitstamp.net
- Alleged data breach of Cổng thông tin điện tử Tỉnh Sơn La
- Category: Data Breach
- Content: The group claims to have leaked the data from Cổng thông tin điện tử Tỉnh Sơn La.
- Date: 2025-09-01T12:40:59Z
- Network: telegram
- Published URL: (https://t.me/ntsec4real/32)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/013fb18e-fb46-49c2-b5b5-be2893a021f1.JPG
- Threat Actors: NTSEC
- Victim Country: Vietnam
- Victim Industry: Government Administration
- Victim Organization: cổng thông tin điện tử tỉnh sơn la
- Victim Site: sonla.gov.vn
- ResetIDN targets the website of Banyuputih Village
- Category: Defacement
- Content: The group claims to have defaced the website of Banyuputih Village
- Date: 2025-09-01T12:22:30Z
- Network: telegram
- Published URL: (https://t.me/LenteraBawahOfc/122)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1ea5c610-2b8c-468c-bc6f-f6e2d1fc4ad8.JPG
- Threat Actors: ResetIDN
- Victim Country: Indonesia
- Victim Industry: Government & Public Sector
- Victim Organization: banyuputih village
- Victim Site: banyuputih.jepara.go.id
- Alleged unauthorized access to unidentified AIMK ventilation control system in Romania
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an unidentified AIMK ventilation control system in Romania, which manages large HVAC units (CTA 1, CTA 2, CTA 3). The compromised system allegedly allows full control over heating, ventilation, and air conditioning functions, including air flow monitoring, fan speeds, volumetric parameters, temperature indicators, and valve operations. The attackers also claim they can start or stop AHU and MRV modules, adjust manual and automatic air flow parameters, and manipulate recovery units and filters.
- Date: 2025-09-01T11:25:44Z
- Network: telegram
- Published URL: (https://t.me/Z_ALLIANCE/681)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1a77c231-bd4a-4e33-ba0d-8309d866f68e.png https://d34iuop8pidsy8.cloudfront.net/a2ffaf48-c5cd-4ced-8aad-0b9a7fa19618.png
- Threat Actors: Z-ALLIANCE
- Victim Country: Romania
- Victim Industry: Industrial Automation
- Victim Organization: Unknown
- Victim Site: Unknown
- Meduza Cyber Force claims to target multiple countries
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Israel, India, Pakistan and UK
- Date: 2025-09-01T10:29:02Z
- Network: telegram
- Published URL: (https://t.me/MeduzaCyberForce/59)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/80f57d55-4597-4894-ba5a-64f5b1ccc837.png
- Threat Actors: Meduza Cyber Force
- Victim Country: India
- Victim Industry: Network & Telecommunications
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of JBoss.org
- Category: Data Breach
- Content: The threat actor claims to have leaked JBoss.org. The compromised data reportedly includes customers and employees tables containing sensitive business information such as customer names, contact details, phone numbers, addresses, countries, credit limits, as well as employee names, extensions, emails, job titles, and reporting structures.
- Date: 2025-09-01T10:25:11Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-JBoss-org-Data-Breach-Leaked-Download)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c329c8f8-b3ec-4e37-b6b0-fc5a1ece5b40.png https://d34iuop8pidsy8.cloudfront.net/0fd19ae9-2355-4790-bfea-271608929c68.png
- Threat Actors: N1KA
- Victim Country: USA
- Victim Industry: Software Development
- Victim Organization: jboss.org
- Victim Site: jboss.org
- Alleged sale of access to Roche
- Category: Initial Access
- Content: A threat actor claims to be selling unauthorized administrator-level access to Roche.
- Date: 2025-09-01T10:19:32Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1094)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/17346f8f-a7f5-4122-b4ab-67a2c7ea94fe.png https://d34iuop8pidsy8.cloudfront.net/6f903a6a-28a0-41d3-9078-826aed23fac0.png
- Threat Actors: scattered lapsu$ hunters
- Victim Country: Switzerland
- Victim Industry: Biotechnology
- Victim Organization: f. hoffmann-la roche ltd
- Victim Site: roche.com
- Alleged sale of access to HMM
- Category: Initial Access
- Content: A threat actor claims to be selling unauthorized administrator-level access to HMM.
- Date: 2025-09-01T10:13:11Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1094)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b77306df-da11-4fd2-b6df-3c9ecc5f339f.png https://d34iuop8pidsy8.cloudfront.net/0e9c34f1-6b84-49ae-ac33-21fba79aae1b.png
- Threat Actors: scattered lapsu$ hunters
- Victim Country: South Korea
- Victim Industry: Maritime
- Victim Organization: hmm co., ltd.
- Victim Site: hmm21.com
- Alleged data sale from 100 Vietnamese hospitals
- Category: Data Breach
- Content: The threat actor claims to be selling 2.5 million records from around 100 hospitals across Vietnam.
- Date: 2025-09-01T09:52:52Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DB-HOSPITAL-VIETNAM-2025)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b50a6357-9862-462d-ba99-b257dea34da0.png
- Threat Actors: luly119
- Victim Country: Vietnam
- Victim Industry: Hospital & Health Care
- Victim Organization: Unknown
- Victim Site: Unknown
- Infinite Cyber Team targets the website of RK DIGITAL – Studio & Colorlab
- Category: Defacement
- Content: The group claims to have defaced the website of RK DIGITAL – Studio & Colorlab
- Date: 2025-09-01T09:49:14Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f15c1dc1-0c2a-45ed-ba07-7f9782434b4c.JPG https://d34iuop8pidsy8.cloudfront.net/da6d720a-a7a4-4493-8849-90295cf603df.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Photography
- Victim Organization: rk digital – studio & colorlab
- Victim Site: rkstudios.in
- Infinite Cyber Team targets the website of REN FITNESS CLUB
- Category: Defacement
- Content: The group claims to have defaced the website of REN FITNESS CLUB
- Date: 2025-09-01T09:21:31Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f4e5cb6e-24a6-4ba9-b9f8-1abdd12387cb.JPG https://d34iuop8pidsy8.cloudfront.net/aa8eb7e6-cf08-4ccb-9e86-e7a5fa489758.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Health & Fitness
- Victim Organization: ren fitness club
- Victim Site: renfitnessclub.com
- Infinite Cyber Team targets the website of Yoga Vidhya Pranic Healing Foundation Calicut
- Category: Defacement
- Content: The group claims to have defaced the website of Yoga Vidhya Pranic Healing Foundation Calicut
- Date: 2025-09-01T09:18:03Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7f1fecf7-428d-44da-af72-61df6467ad82.JPG https://d34iuop8pidsy8.cloudfront.net/aa8173ad-bc32-47d6-bbe0-1deb55dcc2f6.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Alternative Medicine
- Victim Organization: yoga vidhya pranic healing foundation calicut
- Victim Site: pranichealingcalicut.net
- Infinite Cyber Team targets the website of Pranavam Infotech
- Category: Defacement
- Content: The group claims to have defaced the website of Pranavam Infotech
- Date: 2025-09-01T09:13:13Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/901ffff7-7bd9-484f-b904-195f6c6e6c1e.png https://d34iuop8pidsy8.cloudfront.net/9936f00c-77de-4f7a-b6ab-ef3f7027348f.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Information Technology (IT) Services
- Victim Organization: pranavam infotech
- Victim Site: pranavaminfotec.com
- Infinite Cyber Team targets the website of Meridian Diagnostics
- Category: Defacement
- Content: The group claims to have defaced the website of Meridian Diagnostics.
- Date: 2025-09-01T08:58:11Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b627501b-d140-4e73-9c6f-43b10ff6f4be.png https://d34iuop8pidsy8.cloudfront.net/7ce0857e-a2bd-4810-a78b-eb61c1e859b1.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: meridian diagnostics
- Victim Site: meridiandiagnostics.co.in
- Infinite Cyber Team targets the website of Codeaxys
- Category: Defacement
- Content: The group claims to have defaced the website of Codeaxys.
- Date: 2025-09-01T08:53:51Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/74106f18-a1a8-42cc-9081-c84329033e1f.JPG https://d34iuop8pidsy8.cloudfront.net/68cafd1d-9359-45d5-b629-d383469ba80c.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: Unknown
- Victim Industry: Information Technology (IT) Services
- Victim Organization: codeaxys
- Victim Site: codeaxys.com
- Infinite Cyber Team targets the website of Mahathma Nature Cure Centre
- Category: Defacement
- Content: The group claims to have defaced the website of Mahathma Nature Cure Centre.
- Date: 2025-09-01T08:52:06Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/86303ecf-e363-4fce-946a-f1c69fe96e10.png https://d34iuop8pidsy8.cloudfront.net/6936e4f3-4467-43be-a398-d641589ea978.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: mahathma nature cure centre
- Victim Site: mahathmanaturalhygiene.com
- Infinite Cyber Team targets the website of India Legal Solutions
- Category: Defacement
- Content: The group claims to have defaced the website of India Legal Solutions.
- Date: 2025-09-01T08:46:06Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5871787f-9401-4c2d-b0ae-6833f3814111.png https://d34iuop8pidsy8.cloudfront.net/4794d6d8-fc50-4284-be2e-a3ffbed8fc47.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Legal Services
- Victim Organization: india legal solutions
- Victim Site: indialegalsolutions.in
- Infinite Cyber Team targets the website of Healhub Rehabilitation Centre
- Category: Defacement
- Content: The group claims to have defaced the website of Healhub Rehabilitation Centre
- Date: 2025-09-01T08:41:15Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3cf93edf-d8b1-454a-98d3-90e06c4a0454.png https://d34iuop8pidsy8.cloudfront.net/f4e5c273-649e-4041-99ca-251c50623cb5.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: healhub rehabilitation centre
- Victim Site: healhubrehab.com
- Infinite Cyber Team targets the website of Chiruthacorpgifts
- Category: Defacement
- Content: The group claims to have defaced the website of Chiruthacorpgifts.
- Date: 2025-09-01T08:38:31Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d69e1626-5b7f-44f1-893d-40631490b9b1.JPG https://d34iuop8pidsy8.cloudfront.net/10600bb9-3bbb-448a-8c44-702a2a185dc0.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Retail Industry
- Victim Organization: chiruthacorpgifts
- Victim Site: chiruthacorpgifts.com
- Infinite Cyber Team targets the website of Saipro Steel
- Category: Defacement
- Content: The group claims to have defaced the website of Saipro Steel
- Date: 2025-09-01T08:34:35Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a5549ea8-2c2d-45b5-89be-daacbf6c4d8d.png https://d34iuop8pidsy8.cloudfront.net/c3b08fa1-d621-4ee4-bb51-4196dc292ed1.png
- Threat Actors: Infinite Cyber Team
- Victim Country: Qatar
- Victim Industry: Building and construction
- Victim Organization: saipro steel
- Victim Site: saiprosteel.qa
- Infinite Cyber Team targets the website of greenhomecarekwt.com
- Category: Defacement
- Content: The group claims to have defaced the website of greenhomecarekwt.com
- Date: 2025-09-01T08:33:55Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f9da99af-33bc-4644-af35-41e2d9d47af2.png https://d34iuop8pidsy8.cloudfront.net/ed5e9006-e556-48ad-b49a-b400f7ff6e4d.png
- Threat Actors: Infinite Cyber Team
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: greenhomecarekwt.com
- Victim Site: greenhomecarekwt.com
- Infinite Cyber Team targets the website of Calicut Solar Tech
- Category: Defacement
- Content: The group claims to have defaced the website of Calicut Solar Tech
- Date: 2025-09-01T08:30:17Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/87deb10a-8ebd-4ac0-bf0c-65a6deb53d80.JPG https://d34iuop8pidsy8.cloudfront.net/6f987851-5f6a-42f8-8594-ac232a4546be.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Energy & Utilities
- Victim Organization: calicut solar tech
- Victim Site: calicutsolartech.com
- Infinite Cyber Team targets the website of Bricks & Oaks
- Category: Defacement
- Content: The group claims to have defaced the website of Bricks & Oaks
- Date: 2025-09-01T08:25:13Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d45b801e-1d70-428b-87be-90c9514f2514.JPG https://d34iuop8pidsy8.cloudfront.net/4b8b8c5d-f553-4099-9745-9f4f1d30a922.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Building and construction
- Victim Organization: bricks & oaks
- Victim Site: bricksnoaks.com
- Infinite Cyber Team targets the website of techsol-kw
- Category: Defacement
- Content: The group claims to have defaced the website of techsol-kw.
- Date: 2025-09-01T08:23:25Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/479b85c4-6b3b-4cf3-82c1-1719f3346c4e.png https://d34iuop8pidsy8.cloudfront.net/f716e97c-0452-4305-8214-507400d1d0c4.png
- Threat Actors: Infinite Cyber Team
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: techsol-kw
- Victim Site: techsol-kw.com
- Infinite Cyber Team targets the website of Ayur Wellness & Spa
- Category: Defacement
- Content: The group claims to have defaced the website of Ayur Wellness & Spa
- Date: 2025-09-01T08:21:11Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d2e33950-9ac9-43a4-9fc4-11d611010f33.JPG https://d34iuop8pidsy8.cloudfront.net/316cb8ab-474f-4258-be12-6d4a00afdbfa.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Health & Fitness
- Victim Organization: ayur wellness & spa
- Victim Site: ayursanjeevnam.com
- Infinite Cyber Team targets the website of Agasthiya Herbs
- Category: Defacement
- Content: The group claims to have defaced the website of Agasthiya Herbs
- Date: 2025-09-01T08:16:24Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3d946f79-4f34-487d-8b39-6bdb573de657.JPG https://d34iuop8pidsy8.cloudfront.net/a0f63c62-0ce2-44a2-a8e3-866d8495b7ab.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: E-commerce & Online Stores
- Victim Organization: agasthiya herbs
- Victim Site: agasthiaherbs.com
- Infinite Cyber Team targets the website of Dr Asish Medical Center
- Category: Defacement
- Content: The group claims to have defaced the website of Dr Asish Medical Center.
- Date: 2025-09-01T08:14:16Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/019e6e9d-64d1-4606-83b9-59fd51b4ec5f.png https://d34iuop8pidsy8.cloudfront.net/a29c77a3-6fb8-4aa3-8d8b-6bd4f9f8ac1d.png
- Threat Actors: Infinite Cyber Team
- Victim Country: UAE
- Victim Industry: Medical Practice
- Victim Organization: dr asish medical center
- Victim Site: drasish.com
- Infinite Cyber Team targets the website of Acero Nutech Structurals Pvt Ltd
- Category: Defacement
- Content: The group claims to have defaced the website of Acero Nutech Structurals Pvt Ltd.
- Date: 2025-09-01T08:10:13Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fc128a5c-8b51-4066-b9b9-fa71c1601a3c.JPG https://d34iuop8pidsy8.cloudfront.net/a6f1246c-18ff-4f1e-8035-426a85528175.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: acero nutech structurals pvt ltd
- Victim Site: acerotech.com
- Infinite Cyber Team targets the website of Goodwill calicut
- Category: Defacement
- Content: The group claims to have defaced the website of Goodwill calicut.
- Date: 2025-09-01T08:05:41Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/656e5b66-b81b-4966-8cdf-153c0728106f.JPG https://d34iuop8pidsy8.cloudfront.net/1ccfbd58-1e62-43a1-b3db-d4679323b279.JPG
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Retail Industry
- Victim Organization: goodwill calicut
- Victim Site: goodwillcalicut.in
- Infinite Cyber Team targets the website of DeepSwara
- Category: Defacement
- Content: The group claims to have defaced the website of DeepSwara
- Date: 2025-09-01T08:01:24Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/60e4d61d-5cae-406c-81dd-ce3582f085e8.png https://d34iuop8pidsy8.cloudfront.net/d32a52d7-604b-4519-93a6-e998aed34b13.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Music
- Victim Organization: deepswara
- Victim Site: deepswara.com
- Infinite Cyber Team targets the website of Concorde International
- Category: Defacement
- Content: The group claims to have defaced the website of Concorde International
- Date: 2025-09-01T07:57:10Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3aa8c1dc-b20e-4c6b-8f5c-58fd086aeb2c.png https://d34iuop8pidsy8.cloudfront.net/42e4a3e8-d2ce-4c50-a1a5-a25fc92b9ddd.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Leisure & Travel
- Victim Organization: concorde international
- Victim Site: concordeintl.in
- Infinite Cyber Team targets the website of Wayanad Greens
- Category: Defacement
- Content: The group claims to have defaced the website of Wayanad Greens
- Date: 2025-09-01T07:56:31Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/332fa4f0-6a99-43eb-9bf9-47a23be95be9.png https://d34iuop8pidsy8.cloudfront.net/68b22bec-68b5-428d-97ed-e76620ab7bee.png
- Threat Actors: Infinite Cyber Team
- Victim Country: India
- Victim Industry: Hospitality & Tourism
- Victim Organization: wayanad greens
- Victim Site: wayanadgreens.com
- Alleged source code leak of Santa Fe County Lodgers Portal
- Category: Data Breach
- Content: The threat actor claims to have leaked the full source code of the Santa Fe County Lodgers’ Tax Portal, a U.S. government platform used for managing lodging tax submissions in Santa Fe County, New Mexico.
- Date: 2025-09-01T07:49:48Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-lodgers-santafecountynm-gov-SRC)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/88120e3f-0ef9-4f56-9c9e-a53065bb4d08.png
- Threat Actors: skra1a
- Victim Country: USA
- Victim Industry: Government Administration
- Victim Organization: santa fe county lodgers’ tax portal
- Victim Site: lodgers.santafecountynm.gov
- Infinite Cyber Team targets the website of Willow Cleaning Services LLC
- Category: Defacement
- Content: The group claims to have defaced the website of Willow Cleaning Services LLC
- Date: 2025-09-01T07:45:22Z
- Network: telegram
- Published URL: (https://t.me/InfiniteCyberTeam/228)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4ffd17c2-af3a-41cb-8ba4-db2245d0f67d.png https://d34iuop8pidsy8.cloudfront.net/7432721c-1960-4724-86a8-870b7f4f6000.png
- Threat Actors: Infinite Cyber Team
- Victim Country: UAE
- Victim Industry: Facilities Services
- Victim Organization: willow cleaning services llc
- Victim Site: willowcleaningservices.ae
- Alleged data leak of IT Hub Solution
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from IT Hub Solution, allegedly exposing sensitive personal and academic information. The dataset includes candidate names, caste categories, gender, date of birth, father’s name, domicile, mobile numbers, email IDs, academic board details, examination roll numbers, subject streams, class X and XII percentages, registration numbers, rank details (overall, category, and reservation-wise), merit index, course names, departments, subjects, admission years, and system remarks.
- Date: 2025-09-01T07:28:15Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-IT-HUB-SOLUTION-ithubsolution-org-Data-Breach-Leaked-Download)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/75b4c028-398a-46a8-bc69-7d28a4fd300c.png
- Threat Actors: N1KA
- Victim Country: India
- Victim Industry: Information Technology (IT) Services
- Victim Organization: it hub solution
- Victim Site: ithubsolution.org
- Alleged sale of 23000 credit card records from Mexico
- Category: Data Breach
- Content: The threat actor claims to be selling 23,000 credit card records from Mexico, reportedly containing card numbers (CC), expiration dates, CVV codes, full names, phone numbers, email addresses, and billing addresses. The data is allegedly 70% valid and may be used for financial fraud or identity theft.
- Date: 2025-09-01T06:23:42Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/265350/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c5e01cf7-7bf3-4179-86cb-a95e5fe2db1d.png
- Threat Actors: Mexicnon
- Victim Country: Mexico
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Kalimantan
- Category: Data Breach
- Content: The group claims to be have leaked data of Kalimantan
- Date: 2025-09-01T06:09:35Z
- Network: telegram
- Published URL: (https://t.me/c/2702757113/280)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/779c893d-bfea-46f5-b021-91262d1a4bde.png
- Threat Actors: Night Owll
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of HTML loader
- Category: Malware
- Content: The threat actor claims to be selling an HTML loader exploit (not a 0-day). The tool is designed to smuggle an HTML file in BASE64 inside another file, auto-download it, and trigger a prompt that opens Windows Explorer to the exact file location.
- Date: 2025-09-01T05:42:19Z
- Network: openweb
- Published URL: (https://xss.pro/threads/142989/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/39161c23-4075-4f50-97be-4a124dfd409c.png https://d34iuop8pidsy8.cloudfront.net/e9e0d088-71ce-489c-a200-8f9167893b6b.png
- Threat Actors: OperationMeow
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- TengkorakCyberCrew Official targets the website of Hyderabad Darbar
- Category: Defacement
- Content: The group claims to have defaced the website of hyderabad darbar. Minor link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T05:38:51Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/134f2ce8-d519-46b9-8700-60e5b9619f43.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Restaurants
- Victim Organization: hyderabad darbar
- Victim Site: hyderabad-darbar.com
- TengkorakCyberCrew Official targets the website of Vertex Solution
- Category: Defacement
- Content: The group claims to have defaced the website of Vertex Solution. Minor link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T05:33:18Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a76ea34d-76a4-4a47-85b4-08bd7324f766.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Staffing/Recruiting
- Victim Organization: vertex solution
- Victim Site: vertexsolution.co.uk
- TengkorakCyberCrew Official Channel targets the website of Shenko IT
- Category: Defacement
- Content: The group claims to have defaced the website of Shenko IT. Minor link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T05:25:24Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8cdbb5ea-b89d-49ae-8a5b-502bcc5621eb.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Information Technology (IT) Services
- Victim Organization: shenko it
- Victim Site: shenkoit.co.uk
- scattered lapsu$ hunters claims to targets Starbucks
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Starbucks database.
- Date: 2025-09-01T05:23:55Z
- Network: telegram
- Published URL: (https://t.me/c/2976044031/1081)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d43fc1ac-51b8-4d69-b51d-c6bc3d0c5bc6.png
- Threat Actors: scattered lapsu$ hunters
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- TengkorakCyberCrew Official targets the website of Montague Care
- Category: Defacement
- Content: The group claims to have defaced the website of Montague Care
- Date: 2025-09-01T05:14:00Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b75710dc-d547-48c8-849b-aee9644278f1.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: montague care
- Victim Site: montaguecare.com
- Alleged Unauthorized Access to New Ecology System S.p.A
- Category: Initial Access
- Content: Threat actor claims to have gained access to New Ecology System S.p.A’s SCADA-based waste processing system in Italy, which uses biotunnels, biofilters, and biocells to optimize waste decomposition, monitoring key parameters and leveraging inverter controls to enhance efficiency and reduce energy consumption.
- Date: 2025-09-01T05:11:36Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1303)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2ddaa6b1-e1b5-4823-9e23-0b134903205c.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Italy
- Victim Industry: Environmental Services
- Victim Organization: new ecology system s.p.a
- Victim Site: newecologysystem.it
- TengkorakCyberCrew Official targets the website of Milton Direct
- Category: Defacement
- Content: The group claims to have defaced the website of Milton Direct. Minor link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T05:06:16Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5d9d4f6d-dd57-4097-8fa1-5dece1c59b41.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Retail Industry
- Victim Organization: milton direct
- Victim Site: miltondirect.co.uk
- Alleged data breach of Service national universel
- Category: Data Breach
- Content: The threat actor claims to be selling a database of the French Service National Universel (SNU), containing 75,718 records. The exposed data includes participants’ full names, emails, unique IDs, French nationality status, application and validation phases, cohesion center assignments, activity domains, parental information, medical files, and other administrative details, potentially compromising both personal and program-related information of French youth participants.
- Date: 2025-09-01T05:04:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-FRENCH-DATABASE-SERVICE-NATIONAL-UNIVERSEL-75K)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0e88328f-9686-44f8-966f-e558678e15d8.png
- Threat Actors: nopeyourtoolate
- Victim Country: France
- Victim Industry: Government Administration
- Victim Organization: service national universel
- Victim Site: snu.gouv.fr
- TengkorakCyberCrew Official targets the website of Darbar Lounge.
- Category: Defacement
- Content: The group claims to have defaced the website of Darbar Lounge. Minor link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T04:53:25Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/dca354cb-3ce4-4cdd-83c9-9b1d223ac1da.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Restaurants
- Victim Organization: darbar lounge.
- Victim Site: darbarlounge.co.uk
- TengkorakCyberCrew targets the website of JV TEC SOFTWARE SOLUTIONS LIMITED
- Category: Defacement
- Content: The group claims to have defaced the website of JV TEC SOFTWARE SOLUTIONS LIMITED. Minor link: http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T04:51:03Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/15ac4612-7787-49a5-94f7-357bc61a4fbf.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Software Development
- Victim Organization: jv tec software solutions limited
- Victim Site: jvtech.co.uk
- TengkorakCyberCrew targets the website of arkiproperties
- Category: Defacement
- Content: The group claims to have defaced the website of arkiproperties. Minor Link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T04:50:47Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/71821279-dfe9-47da-85d2-2d968aa6d48c.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: arkiproperties
- Victim Site: arkiproperties.co.uk
- Alleged leak of Indonesia Aceh Social Aid Database
- Category: Data Breach
- Content: A threat actor has allegedly leaked a database containing sensitive information of elderly beneficiaries from the Aceh Social Aid Program (APBN 2022) in Indonesia. The compromised data includes ID_DTKS, NIK, NOKK, full names, dates of birth, full addresses (including RT/RW, village, sub-district, district, and province), along with details about household status, living conditions, types of social assistance received, and housing conditions.
- Date: 2025-09-01T04:50:32Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-Indonesia-Aceh-Social-Aid-Database-%E2%80%93-Elderly-Beneficiaries-APBN-2022)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6d9c89d8-dce5-4a5e-8008-c389a2316125.png
- Threat Actors: TomSec
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- TengkorakCyberCrew Official targets the website of chutneys by hyderabad darbar
- Category: Defacement
- Content: The group claims to have defaced the website of chutneys by hyderabad darbar. Minor link : http://zone-h.org/archive/notifier=Jaring
- Date: 2025-09-01T04:50:30Z
- Network: telegram
- Published URL: (https://t.me/TengkorakCyberCrewzz/4947)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6ab2e0c1-fff4-4429-8073-1b281b33665d.png
- Threat Actors: TengkorakCyberCrew Official Channel
- Victim Country: UK
- Victim Industry: Restaurants
- Victim Organization: chutneys by hyderabad darbar
- Victim Site: chutneysbyhyderabaddarbar.com
- Alleged data breach of warmerise
- Category: Data Breach
- Content: A threat actor group has allegedly leaked a database belonging to warmerise
- Date: 2025-09-01T04:34:14Z
- Network: openweb
- Published URL: (https://kittyforums.to/thread/928)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5711a169-e1b4-41cb-b5b6-aea229c4792a.png
- Threat Actors: body
- Victim Country: Unknown
- Victim Industry: Gaming
- Victim Organization: warmerise
- Victim Site: warmerise.com
- Alleged data breach of onetap.com
- Category: Data Breach
- Content: A threat actor group has allegedly leaked a database belonging to onetap.com
- Date: 2025-09-01T04:34:06Z
- Network: openweb
- Published URL: (https://kittyforums.to/thread/929)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/74b57eb6-a234-4010-a90d-d83173595494.png
- Threat Actors: body
- Victim Country: Unknown
- Victim Industry: Gaming
- Victim Organization: onetap.com
- Victim Site: onetap.com
- Alleged data breach of Liverpool Canoe Club
- Category: Data Breach
- Content: The threat actor claims to be leaking data from the Liverpool Canoe Club, exposing membership and payment records that include transaction dates, fees, item titles, participant names (including minors), and event details such as junior pool sessions, river trips, and adult memberships. The leaked data also reveals the club’s membership email, compromising both personal and financial information of its members.
- Date: 2025-09-01T04:28:35Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-LIVERPOOL-CANOE-CLUB-BY-TERRORISM666)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/717c5b94-4b57-42a0-9308-fb9445a4662b.png
- Threat Actors: TERRORISM666
- Victim Country: UK
- Victim Industry: Sports
- Victim Organization: liverpool canoe club
- Victim Site: liverpoolcanoeclub.co.uk
- Alleged data breach of ESTO Agency
- Category: Data Breach
- Content: A threat actor group has allegedly leaked a database belonging to ESTO Real Estate Agency
- Date: 2025-09-01T04:11:55Z
- Network: openweb
- Published URL: (https://kittyforums.to/thread/927)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/139d16ae-5951-46fb-aeb1-0159cbd60b0b.png
- Threat Actors: body
- Victim Country: Russia
- Victim Industry: Real Estate
- Victim Organization: esto agency
- Victim Site: estoagency.ru
- Alleged data breach of YUVA Run Foundation
- Category: Data Breach
- Content: A threat actor group has allegedly leaked a database belonging to YUVA Run Foundation. The exposed data includes mobile numbers and associated passwords
- Date: 2025-09-01T03:22:51Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-YUVA-RUN-FOUNDATION-USERS-LEAK)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f155eb9f-5a56-44f2-b7fc-7035afed7357.png https://d34iuop8pidsy8.cloudfront.net/56bef130-c7f1-4049-8225-74c3d7d4a19c.png https://d34iuop8pidsy8.cloudfront.net/df223699-dd3f-4cbc-b8f1-770cfea28b5e.png https://d34iuop8pidsy8.cloudfront.net/d7a08d61-255f-4243-986f-2409f92b3652.png
- Threat Actors: nostra
- Victim Country: India
- Victim Industry: Health & Fitness
- Victim Organization: yuva run foundation
- Victim Site: yuvarunfoundation.org
- Alleged sale of Indian real estate leads
- Category: Data Breach
- Content: Threat actor claims to be selling USA commercial real estate leads. The claimed data includes Lead Name, Mobile No, Email, Source, etc.
- Date: 2025-09-01T03:01:40Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Indian-Fresh-13k-Real-Estate-Leads-Noida-Greater-Noida-NCR-Region)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7ce7e272-3740-45ef-98ed-873fe42ab7e5.png
- Threat Actors: Broker
- Victim Country: India
- Victim Industry: Real Estate
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Cuba database
- Category: Data Breach
- Content: The threat actor claims to be selling over 1 million records exfiltrated from Cuban sources. The data allegedly includes ULP scrapes and SQL/database logs from various .cu government and corporate websites. The leaked files contain usernames, emails, passwords, and system logs in TXT, JSON, and PDF formats, with samples showing credentials tied to ETECSA services and cloud platforms.
- Date: 2025-09-01T03:01:20Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-1M-Exfiltrated-Cuban-Database-ULP-Cloud-Logs-READ-DESC)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/afedec17-98a8-4e32-84d4-045557110b2f.png https://d34iuop8pidsy8.cloudfront.net/ba97edc4-4a74-4c5a-9185-0a35246ac6d3.png
- Threat Actors: ronioum
- Victim Country: Cuba
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of emails from KinoKong
- Category: Data Breach
- Content: The group claims to have leaked data from KinoKong. The compromised data includes 198 million customer email id.
- Date: 2025-09-01T02:43:46Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/801)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/28e46689-578f-4185-8c2e-16a82f093958.png
- Threat Actors: DigitalGhost
- Victim Country: Unknown
- Victim Industry: Entertainment & Movie Production
- Victim Organization: kinokong
- Victim Site: kinokong.sk
- Alleged sale of zero-day vulnerability in Microsoft IIS
- Category: Vulnerability
- Content: The threat actor claims to be selling a zero-day vulnerability in Microsoft IIS that allegedly allows remote code execution without user interaction. The post highlights the flaw’s wormable nature, meaning it could spread automatically between servers and potentially cause a large-scale outbreak.
- Date: 2025-09-01T02:10:59Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Windows-IIS-0Day)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0d72244e-12ad-4f53-bd8b-7c26874b68a1.png
- Threat Actors: adrmc21
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of unauthorized access to an unidentified Chinese government network firewall
- Category: Initial Access
- Content: A threat actor claims to be selling SSH key-based access to a Chinese government network firewall (.gov.cn domain). The access is on a Linux system, though revenue details are unspecified.
- Date: 2025-09-01T02:03:32Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-China-Government-Network-Firewall-Access)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8682356b-1dc3-450f-90a4-0e7444f83d7e.png
- Threat Actors: shine
- Victim Country: China
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Leak of French Bank Database
- Category: Data Breach
- Content: Threat Actor Claims to Be Selling Leaked Database from France, The compromised data reportedly includes full name, address, date of birth (DOB), telephone number, email, IBAN, bank information, postcode, and ID details. T
- Date: 2025-09-01T00:39:27Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-France-Database-target-bank-Full-infos-full-name-address-phone-DOB-IBAN-Bank)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/57854c3d-aeba-4272-98f4-805200e165bd.png https://d34iuop8pidsy8.cloudfront.net/27c83bb4-e3cd-4551-bb7d-6a2e55a3c50b.png https://d34iuop8pidsy8.cloudfront.net/85060fad-1dfd-4f3c-9277-17a37ce74fb3.png
- Threat Actors: moscow077
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
Conclusion The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.