1. Alleged data leak of BIAM Laboratory School & College, Bogura
- Category: Data Breach
- Content: The group claims to have leaked data from BIAM Laboratory School & College, Bogura.
- Date: 2025-09-12T14:02:36Z
- Network: telegram
- Published URL: (https://t.me/c/2438113342/892)
- Screenshots:
- Threat Actors: PhantomCrew
- Victim Country: Bangladesh
- Victim Industry: Education
- Victim Organization: biam laboratory school & college, bogura
- Victim Site: blscbogra.edu.bd
2. Alleged data leak of National Awakening Party
- Category: Data Breach
- Content: The threat actor claims to have leaked a database belonging to PKB (Partai Kebangkitan Bangsa), an Indonesian political party. The data contains details of party candidates and members, including full names, electoral districts (DPRD/DPR RI level), gender, and voter support counts across various regions of Aceh Province, Indonesia.
- Date: 2025-09-12T13:43:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-PKB-POLITICAL-PARTY-BY-TERRORISM666)
- Screenshots:
- Threat Actors: TERRORISM666
- Victim Country: Indonesia
- Victim Industry: Political Organization
- Victim Organization: national awakening party
- Victim Site: pkb.id
3. Alleged data leak of Samarinda City Government
- Category: Data Breach
- Content: The threat actor claims to have leaked personal data from the official website of the Samarinda City Government in Indonesia. The exposed records allegedly include full names, RT (neighborhood unit) numbers, start and end dates of official documents, reference numbers, full residential addresses, national ID numbers (NIK), email addresses, and phone numbers.
- Date: 2025-09-12T13:07:02Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-SAMARINDA-BY-TERRORISM666)
- Screenshots:
- Threat Actors: TERRORISM666
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: samarinda city government
- Victim Site: samarindakota.go.id
4. Alleged data leak of Orangeburg-Calhoun Technical College
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of Orangeburg-Calhoun Technical College.
- Date: 2025-09-12T12:59:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-octech-edu)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: USA
- Victim Industry: Education
- Victim Organization: orangeburg-calhoun technical college
- Victim Site: octech.edu
5. Alleged data leak of Coco Solution
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of Coco Solution.
- Date: 2025-09-12T12:56:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-cocosolution-com)
- Screenshots:
- Threat Actors: kanie2903
- Victim Country: Spain
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: coco solution
- Victim Site: cocosolution.com
6. Alleged data sale of ZoomInfo
- Category: Data Breach
- Content: The threat actor claims to be selling a database from ZoomInfo. The data allegedly includes detailed professional and organizational information such as full names, job titles, management levels, company names, emails, direct phone numbers, physical addresses, revenue, employee counts, SIC/NAICS codes, and personal profile URLs.
- Date: 2025-09-12T12:26:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-ZoomInfo-Database-2025)
- Screenshots:
- Threat Actors: Shad0w
- Victim Country: USA
- Victim Industry: Software Development
- Victim Organization: zoominfo
- Victim Site: zoominfo.com
7. Alleged data breach of Aeromexico
- Category: Data Breach
- Content: The group claims to have leaked 2 TB of data from Aeromexico, allegedly containing confidential information.
- Date: 2025-09-12T12:20:57Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1547)
- Screenshots:
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Mexico
- Victim Industry: Airlines & Aviation
- Victim Organization: aeromexico
- Victim Site: aeromexico.com
8. Alleged sale of access to Ctrip
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized access to Ctrip, a major travel agency and online booking platform based in China.
- Date: 2025-09-12T11:29:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Ctrip-%E6%90%BA%E7%A8%8B-Chinese-Travel-Agency)
- Screenshots:
- Threat Actors: krekti
- Victim Country: China
- Victim Industry: Leisure & Travel
- Victim Organization: ctrip
- Victim Site: ctrip.com
9. Alleged data leak of L’apiéceur – Sur Mesure
- Category: Data Breach
- Content: The threat actor claims to have leaked a 6.4 million record database from L’apiéceur – Sur Mesure. The data contains detailed customer information including order numbers, names, addresses, phone numbers, emails, shirt measurements, fabric references, style choices, payment details, and various product customization data.
- Date: 2025-09-12T11:10:51Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-LAPIECEUR-6-4-MILLION-DATABASE)
- Screenshots:
- Threat Actors: Himenisme666
- Victim Country: France
- Victim Industry: Fashion & Apparel
- Victim Organization: l’apiéceur – sur mesure
- Victim Site: lapieceur.com
10. Alleged data breach of L’apiéceur
- Category: Data Breach
- Content: The group claims to be selling a database of 6.4 million records from L’apiéceur, allegedly containing customer data.
- Date: 2025-09-12T11:04:07Z
- Network: telegram
- Published URL: (https://t.me/c/2297393697/471)
- Screenshots:
- Threat Actors: HIME666
- Victim Country: France
- Victim Industry: Fashion & Apparel
- Victim Organization: l’apiéceur
- Victim Site: lapieceur.com
11. Alleged sale of unathorized access to DSN1007 Casino
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized access to the Chinese online casino platform DSN1007 Casino.
- Date: 2025-09-12T10:52:37Z
- Network: tor
- Published URL: (http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-Selling-Chinese-Casino-dsn1007-com)
- Screenshots:
- Threat Actors: krekti
- Victim Country: China
- Victim Industry: Gambling & Casinos
- Victim Organization: dsn1007 casino
- Victim Site: dsn1007.com
12. Alleged data leak of CIA hacking tools – “Year Zero”
- Category: Data Breach
- Content: The group claims to have leaked CIA hacking tools archive, titled “Year Zero”, containing 8,761 documents and files from a high-security network within the CIA’s Center for Cyber Intelligence in Langley, Virginia, USA. The leak reportedly includes malware, viruses, trojans, weaponized zero-day exploits, remote control systems, and related documentation, following earlier disclosures of CIA targeting French political entities before the 2012 election.
- Date: 2025-09-12T10:41:04Z
- Network: telegram
- Published URL: (https://t.me/c/2297393697/461)
- Screenshots:
- Threat Actors: HIME666
- Victim Country: USA
- Victim Industry: Government Administration
- Victim Organization: central intelligence agency
- Victim Site: cia.gov
13. Alleged data leak of Survival Flight
- Category: Data Breach
- Content: The group claims to have leaked data from Survival Flight.
- Date: 2025-09-12T09:57:28Z
- Network: tor
- Published URL: (https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/5166935264)
- Screenshots:
- Threat Actors: Worldleaks
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: survival flight
- Victim Site: survivalflightinc.com
14. Alleged data leak of World Bank Group
- Category: Data Breach
- Content: The threat actor claims to have leaked a 6 GB database from World Bank Group. The leak data includes full names, organizations, job titles/designations, phone numbers, and email addresses.
- Date: 2025-09-12T09:33:38Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-6GB-DATABASE-WORLD-BANK-BY-TERRORISM666)
- Screenshots:
- Threat Actors: TERRORISM666
- Victim Country: USA
- Victim Industry: International Trade & Development
- Victim Organization: world bank group
- Victim Site: worldbank.org
15. Alleged data breach of Meezan Bank
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Meezan Bank. The compromised data includes the date, transaction type, account holder information, transaction amount, balance, and more.
- Date: 2025-09-12T09:33:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-Document-transaction-meezan-bank-BY-TERRORISM666)
- Screenshots:
- Threat Actors: TERRORISM666
- Victim Country: Pakistan
- Victim Industry: Banking & Mortgage
- Victim Organization: meezan bank
- Victim Site: meezanbank.com
16. Alleged data leak of INTER FRUIT DEALERS LIMITED
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Interfruit Dealers Ltd. The compromised data includes the public.farmers table, containing fields such as id, code, idtype, name, photo, phone, email, status, isverified, and created at.
- Date: 2025-09-12T09:23:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-INTER-FRUIT-DEALERS-LIMITED-DATABASE)
- Screenshots:
- Threat Actors: Himenisme666
- Victim Country: Unknown
- Victim Industry: Food & Beverages
- Victim Organization: inter fruit dealers limited
- Victim Site: Unknown
17. Alleged admin access leak of Regional Story Tellers Private Limited
- Category: Initial Access
- Content: The group claims to have obtained admin access to Regional Story Tellers Private Limited.
- Date: 2025-09-12T09:05:28Z
- Network: telegram
- Published URL: (https://t.me/httpstmesG9Uef8mbyoxYWVk/402)
- Screenshots:
- Threat Actors: BD Anonymous
- Victim Country: India
- Victim Industry: Broadcast Media
- Victim Organization: regional story tellers private limited
- Victim Site: radioroom.co.in
18. Alleged data leak of Janio Asia
- Category: Data Breach
- Content: The threat actor claims to have leaked 10,559 user accounts from Janio Asia (janio.asia). The leak includes staff, shippers, and agent accounts with data fields such as IDs, passwords, last login, email, names, account roles (staff, shipper, first-mile, agent, warehouse), account status, and creation/update timestamps.
- Date: 2025-09-12T08:40:07Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-LEAK-JANIO-ASIA-%E2%80%94-10-559-Users-Staff-Shippers-Agents)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Singapore
- Victim Industry: Transportation & Logistics
- Victim Organization: janio asia
- Victim Site: janio.asia
19. Alleged data leak of Swifta
- Category: Data Breach
- Content: The threat actor claims to have leaked database from Swifta, a fintech/payment platform operating in Nigeria. The alleged dump contains 18,917 records covering admins, agents, and partners, including emails, hashed passwords, mobile numbers, API keys, Firebase tokens, authorization pins, device IDs, account roles, creation and update timestamps, and status metadata.
- Date: 2025-09-12T08:29:09Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-LEAK-SWIFTA-COM-%E2%80%94-18-917-Records-Admin-Agents-Partners)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Nigeria
- Victim Industry: Financial Services
- Victim Organization: swifta systems
- Victim Site: swifta.com
20. Alleged database leak of NADRA Pakistan
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Pakistan’s National Database & Registration Authority (NADRA). The leaked data reportedly includes passport numbers, NICOP IDs, full names, guardian details, and more.
- Date: 2025-09-12T08:21:26Z
- Network: openweb
- Published URL: (https://x.com/ANON_SEC_KERALA/status/1937766548112024054)
- Screenshots:
- Threat Actors: Anonsec- kerala
- Victim Country: Pakistan
- Victim Industry: Government Administration
- Victim Organization: national database & registration authority (nadra)
- Victim Site: nadra.gov.pk
21. Alleged data leak of Cartea
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Cartea. The data includes 53,425 user records containing usernames, emails, encrypted or third-party login credentials, avatars, bios, gender, location, device metadata, tokens, timestamps, and machine IDs.
- Date: 2025-09-12T07:49:38Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-LEAK-ICARTEA-COM-%E2%80%94-53-425-Users-Car-Marketplace-Platform-Emails-Pass)
- Screenshots:
- Threat Actors: privilege
- Victim Country: UAE
- Victim Industry: Automotive
- Victim Organization: cartea
- Victim Site: icartea.com
22. Alleged data leak of Ministry of Agriculture, Animal Industry and Fisheries (Uganda)
- Category: Data Breach
- Content: The group claims to have leaked the data of Ministry of Agriculture, Animal Industry and Fisheries (Uganda).
- Date: 2025-09-12T07:41:19Z
- Network: telegram
- Published URL: (https://t.me/c/2297393697/460)
- Screenshots:
- Threat Actors: HIME666
- Victim Country: Uganda
- Victim Industry: Government Administration
- Victim Organization: ministry of agriculture, animal industry and fisheries (uganda)
- Victim Site: agriculture.go.ug
23. Alleged data leak of Ministry of Public Service, Democratic Republic of Congo
- Category: Data Breach
- Content: The threat actor has allegedly leaked a database from Ministry of Public Service, Democratic Republic of Congo, used for managing administrative records and internal staff accounts. The data reportedly contains 1,136 records with fields including usernames, hashed passwords, full names, gender, emails, phone numbers, document references, system activity logs, and account statuses.
- Date: 2025-09-12T07:26:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-FRAP-CD-%E2%80%94-1-136-LINES-Full-User-Data-Gov-Staff-Access)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Democratic Republic of the Congo
- Victim Industry: Government Administration
- Victim Organization: ministry of public service, democratic republic of congo
- Victim Site: frap.cd
24. Alleged data leak of Meixcan Pharmacies
- Category: Data Breach
- Content: The threat actor claims to have leaked databases of multiple Mexican Pharmacies.
- Date: 2025-09-12T07:11:26Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DB-of-similar-pharmacies-in-Mexico)
- Screenshots:
- Threat Actors: AKA_Astaroth
- Victim Country: Mexico
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: Unknown
- Victim Site: Unknown
25. Alleged data leak of Atiyeh Andishan Damoun Insurance Brokerage Company
- Category: Data Breach
- Content: The threat actor has allegedly leaked client data from Atiyeh Andishan Damoun Insurance Brokerage Company. The leaked content includes personal information such as full names, birth dates, national ID numbers, phone numbers, company affiliations, and confirmation statements, extracted from internal form submissions.
- Date: 2025-09-12T06:54:39Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-IRAN-damounins-com-Insurance-Leaked-Download)
- Screenshots:
- Threat Actors: Demetrius
- Victim Country: Iran
- Victim Industry: Insurance
- Victim Organization: atiyeh andishan damoun insurance brokerage company
- Victim Site: damounins.com
26. Alleged data breach of Green Horizons Lawn Care
- Category: Data Breach
- Content: Threat actor claims to have leaked data from Green Horizons Lawn Care. The compromised data includes customer account records containing personally identifiable information (PII) and authentication details.
- Date: 2025-09-12T06:36:11Z
- Network: openweb
- Published URL: (https://breachsta.rs/topic/19k-user-green-horizonscom-s47dpxhbwhph)
- Screenshots:
- Threat Actors: liru
- Victim Country: USA
- Victim Industry: Consumer Services
- Victim Organization: green horizons lawn care
- Victim Site: green-horizons.com
27. Alleged data breach of Diamond Oaks Country Club
- Category: Data Breach
- Content: Threat actor claims to have leaked data from Diamond Oaks Country Club. The compromised data includes User Name, Role, Email Address, Phone Number. Status, Last Login Date.
- Date: 2025-09-12T06:11:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Diamond-Oaks-Country-Club-Users-GolferRoster)
- Screenshots:
- Threat Actors: Purple0piOd
- Victim Country: USA
- Victim Industry: Entertainment & Movie Production
- Victim Organization: diamond oaks country club
- Victim Site: diamondoaksclub.com
28. Alleged Data Breach of DQLab
- Category: Data Breach
- Content: Threat actor claims to have obtained the data from DQLAB, exposing 32,353 user records including names, emails, phone numbers, and other account details.
- Date: 2025-09-12T05:53:42Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-LEAK-DQLAB-ID-%E2%80%94-32-353-Users-Full-Dump)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: dqlab
- Victim Site: dqlab.id
29. Alleged Data Leak of FinecoBank
- Category: Data Breach
- Content: Threat actor claims to leak data of 680,000 male clients of Italy’s leading investment bank, FinecoBank S.p.A, which specializes in financial and investment services.
- Date: 2025-09-12T05:43:54Z
- Network: telegram
- Published URL: (https://t.me/aqj986/7020)
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: Italy
- Victim Industry: Financial Services
- Victim Organization: finecobank
- Victim Site: it.finecobank.com
30. Alleged Data Leak of Commerzbank
- Category: Data Breach
- Content: Threat actor claims to leak data of 700,000 Commerzbank private client gold credit card holders in Germany, including individuals with stable income, high-value assets, and strong credit profiles.
- Date: 2025-09-12T05:43:22Z
- Network: telegram
- Published URL: (https://t.me/aqj986/6992)
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: Germany
- Victim Industry: Banking & Mortgage
- Victim Organization: commerzbank
- Victim Site: commerzbank.de
31. Alleged Data Leak of National Australia Bank
- Category: Data Breach
- Content: Threat actor claims to leak data from National Australia Bank, exposing personal details such as names, dates of birth, addresses, phone numbers, and email addresses of affected individuals.
- Date: 2025-09-12T05:42:52Z
- Network: telegram
- Published URL: (https://t.me/aqj986/7021)
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: Australia
- Victim Industry: Banking & Mortgage
- Victim Organization: national australia bank
- Victim Site: nab.com.au
32. Alleged data breach of iGooana
- Category: Data Breach
- Content: The threat actor claims to have leaked 237 records from igooana.id, a platform operating in Indonesia with a focus on regional users mainly from South Sulawesi and East Java. The leaked data includes user IDs, regional allocations, unique identifiers (NIK), full names, emails, and account statuses for both individual and organizational users.
- Date: 2025-09-12T05:42:34Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATA-LEAK-igooana-id-%E2%80%94-237-Records-Regional-Users-Internal-Data-2025)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Indonesia
- Victim Industry: Information Technology (IT) Services
- Victim Organization: igooana
- Victim Site: igooana.id
33. Alleged Data Leak of Chinese American shoppers
- Category: Data Breach
- Content: Threat actor claims to leak an exclusive database of 680,000 verified Chinese American shoppers, noting that Korean surnames were removed from the dataset.
- Date: 2025-09-12T05:42:15Z
- Network: telegram
- Published URL: (https://t.me/aqj986/7065)
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
34. Alleged data breach of PT. Swakarya Insan Mandiri
- Category: Data Breach
- Content: The threat actor claims to be selling a private, unreleased dataset containing 342 employee records from Indonesian corporate group SIM (sim.co.id). The data includes corporate emails, usernames, and bcrypt-hashed passwords, along with role-based details spanning departments such as Accounting, Finance, IT, Payroll, and Tax. Several entries indicate high-level positions like Division and Department Heads, potentially exposing internal access credentials across the organization.
- Date: 2025-09-12T05:40:13Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATA-LEAK-sim-co-id-%E2%80%94-342-Records-Corporate-Emails-Hashed-Passwords-2025)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Indonesia
- Victim Industry: Human Resources
- Victim Organization: pt. swakarya insan mandiri
- Victim Site: sim.co.id
35. Alleged data breach of Telkom Indonesia
- Category: Data Breach
- Content: The threat actor claims to be selling a dataset from Indonesia’s state-owned telecom provider, Telkom (telkom.co.id), containing 228 user records, including administrative accounts. The leaked data allegedly includes user IDs, email addresses, names, login activity, and privilege flags, with several accounts marked as admin. The dataset is labeled as private and unreleased, with records dated into 2025.
- Date: 2025-09-12T05:40:02Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-telkom-co-id-%E2%80%94-228-Records-Corporate-Accounts-Internal-Access-Data-2025)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Indonesia
- Victim Industry: Network & Telecommunications
- Victim Organization: telkom indonesia
- Victim Site: telkom.co.id
36. Alleged data breach of LINISTORE
- Category: Data Breach
- Content: Threat actor claims to have leaked data from LINISTORE. The compromised data includes identifiers and contact details ID, name, email including corporate domains ,phone numbers, authentication data, etc.
- Date: 2025-09-12T05:37:23Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-LINISTORE-ID-%E2%80%94-235-Records-Admin-Staff-Emails-Phones-Bcrypt-Passwords)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Indonesia
- Victim Industry: Retail Industry
- Victim Organization: linistore
- Victim Site: linistore.id
37. GARUDA ERROR SYSTEM targets the website of COESCOOP
- Category: Defacement
- Content: The group claims to have defaced the website of COESCOOP.
- Date: 2025-09-12T05:35:36Z
- Network: telegram
- Published URL: (https://t.me/c/2004556114/1977)
- Screenshots:
- Threat Actors: GARUDA ERROR SYSTEM
- Victim Country: Unknown
- Victim Industry: E-commerce & Online Stores
- Victim Organization: coescoop
- Victim Site: coesacoop.com
38. Alleged Data Breach of Rajabhat Maha Sarakham University
- Category: Data Breach
- Content: Threat actor claims to have obtained the data from Rajabhat Maha Sarakham University, exposing 220,000 student accounts, including personal and login information.
- Date: 2025-09-12T05:31:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-rmu-ac-th-220K-Students-Leaked-Download)
- Screenshots:
- Threat Actors: Demetrius
- Victim Country: Thailand
- Victim Industry: Higher Education/Acadamia
- Victim Organization: rajamangala university of technology rattanakosin
- Victim Site: rmu.ac.th
39. Alleged data breach of Kawauso Teknologi Indonesia
- Category: Data Breach
- Content: Threat actor claims to have leaked the data from Kawauso Teknologi Indonesia. The compromised data includes s user IDs, business IDs, and CRM contact IDs, along with personally identifiable information including full names, usernames, email addresses, contact numbers, dates of birth, gender, marital status, blood group, and guardian names, etc.
- Date: 2025-09-12T05:24:08Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-kawauso-co-id-%E2%80%94-20-Internal-Users-Corporate-Emails-Hashes-CRM-Data)
- Screenshots:
- Threat Actors: privilege
- Victim Country: Indonesia
- Victim Industry: Information Technology (IT) Services
- Victim Organization: kawauso teknologi indonesia
- Victim Site: kawauso.co.id
40. Alleged leak of Pakistan NSA Advisor Lt .Gen Muhammad Asim Malik Data
- Category: Data Breach
- Content: Threat actor claims to be selling hacked data from Pakistan’s National Security Advisor (NSA), Lt. Gen. Muhammad Asim Malik (HI(M)).The actor describes the target as a high-profile entity, with alleged access to sensitive government infrastructure now up for sale.
- Date: 2025-09-12T05:16:47Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/266072/)
- Screenshots:
- Threat Actors: xuii
- Victim Country: Pakistan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
41. Alleged sale of B2B database
- Category: Data Breach
- Content: Threat actor claims to be selling a B2B database. The compromised data includes name, job title, id, business name, country, street address, city, postcode, phone, email, national ds/TIN, date of birth, etc.
- Date: 2025-09-12T05:09:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-B2B-B2C-High-quality-data-available)
- Screenshots:
- Threat Actors: Manik123
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
42. Alleged data breach of MA (Madrasah Aliyah) Bustanul Arifin
- Category: Data Breach
- Content: Threat actor claims to have leaked the data from MA (Madrasah Aliyah) Bustanul Arifin. The compromised data includes institutional identifiers and registration details, names of students and staff, identification numbers (student/teacher IDs or national IDs), and academic/enrollment information such as classes or program affiliations.
- Date: 2025-09-12T05:00:35Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-BREACH-MA-BUSTANUL-ARIFIN-BY-TERRORISM666)
- Screenshots:
- Threat Actors: TERRORISM666
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: ma (madrasah aliyah) bustanul arifin
- Victim Site: mabustanularifin.sch.id
43. Alleged data breach of University of Brawijaya
- Category: Data Breach
- Content: Threat actor claims to have leaked data from University of Brawijaya. The compromised data includes student records containing personally identifiable information such as student identification numbers (NIM) and full names, along with academic details including faculty affiliation and program of study (Prodi/major).
- Date: 2025-09-12T04:54:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-UNIVERSITAS-BRAWIJAYA-BY-TERRORISM666)
- Screenshots:
- Threat Actors: TERRORISM666
- Victim Country: Indonesia
- Victim Industry: Higher Education/Acadamia
- Victim Organization: university of brawijaya
- Victim Site: ub.ac.id
44. Alleged leak of coinbase leads
- Category: Data Breach
- Content: Threat actor claims to have leaked coinbase private leads. The compromised data includes email, phone numbers, etc.
- Date: 2025-09-12T03:57:44Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-coinbase-leads-210K)
- Screenshots:
- Threat Actors: Mrbatxfr
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
45. Alleged leak of Admin access to an unidentified organization in Germany
- Category: Initial Access
- Content: The threat actor claims to be offering access to the admin panel of a Germany-based WooCommerce shop, with full administrative rights.
- Date: 2025-09-12T03:52:22Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/266070/)
- Screenshots:
- Threat Actors: corptoday
- Victim Country: Germany
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
46. Alleged sale of AV malware scanning platform
- Category: Malware
- Content: Threat actor claims to be selling a web-based malware scanning platform with an AV bypass feature. The platform is advertised to allow attackers to upload executable files and test them against antivirus engines in a way that hides detection results from security vendors.
- Date: 2025-09-12T01:12:54Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-NetworkBrokers-Selling-Malware-Anonymous-scanning-plataform-coded-by-me)
- Screenshots:
- Threat Actors: NetworkBrokers
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
47. Alleged data breach of A.A. Turki Group (ATCO)
- Category: Data Breach
- Content: Group claims to have leaked the data from A.A. Turki Group (ATCO). The compromised data includes name, investment firm, position, email, etc.
- Date: 2025-09-12T01:01:18Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/1020)
- Screenshots:
- Threat Actors: DigitalGhost
- Victim Country: Saudi Arabia
- Victim Industry: Investment Management, Hedge Fund & Private Equity
- Victim Organization: a.a. turki group (atco)
- Victim Site: atco.com.sa
The cyber incidents detailed in this report highlight a diverse and active landscape of cyber threats, with data breaches and leaks being a prominent concern. These incidents have affected various sectors and countries, including education in Bangladesh and Indonesia, financial services in Italy and Australia, and government organizations in countries like Uganda and the Democratic Republic of the Congo.
The types of compromised data are wide-ranging, from personal user information and customer databases to classified military components and sensitive government records. Beyond data exfiltration, there is also significant activity in the sale of initial access, with threat actors offering unauthorized access to corporate networks, banking systems, and government infrastructure. The cyber underground also sees the sale of malicious tools, such as malware and DDoS tools.
Collectively, these events demonstrate that organizations worldwide face persistent threats from data compromise, unauthorized access, and the proliferation of offensive tools. The ongoing nature of these incidents underscores the critical need for strong cybersecurity measures, including robust access controls, effective data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a variety of sophisticated and opportunistic attacks.