This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged Breach of Unidentified ICS and SCADA System
- Category: Data Breach
- Content: The group claims to have breached an unidentified ICS and SCADA system, disrupting production processes, damaging equipment, deleting automation scripts and databases, and taking customer communication systems under control.
- Date: 2025-09-16T13:40:03Z
- Network: telegram
- Published URL: (https://t.me/unknowns_cyberteam/742)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a09dc9b6-37c0-4836-a02b-a402c0d9f7d8.png
- Threat Actors: Unknowns cyber team
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of SK Telecom Co., Ltd.
- Category: Data Breach
- Content: The threat actor claims to have leaked data from SK Telecom Co., Ltd.
- Date: 2025-09-16T13:24:50Z
- Network: tor
- Published URL: (http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/sk-telecom)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/52773b54-458b-4d18-80e9-31269e9f04b1.png
- Threat Actors: CoinbaseCartel
- Victim Country: South Korea
- Victim Industry: Network & Telecommunications
- Victim Organization: sk telecom co., ltd.
- Victim Site: sktelecom.com
- UNDERGROUND-NET targets the website of SMK Muhammadiyah 2 Wuryantoro
- Category: Defacement
- Content: The group claims to have defaced the website of SMK Muhammadiyah 2 Wuryantoro.
- Date: 2025-09-16T10:26:59Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1215)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8698223a-a10c-4442-a0ab-fcb54e24cf08.jpg
- Threat Actors: UNDERGROUND-NET
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: smk muhammadiyah 2 wuryantoro
- Victim Site: smkmudawuryantoro.sch.id
- UNDERGROUND-NET targets the website of SMP NEGERI 1 BONOROWO
- Category: Defacement
- Content: The group claims to have defaced the website of SMP NEGERI 1 BONOROWO.
- Date: 2025-09-16T10:25:43Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1215)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ed7260e3-912d-48b5-abbe-65b7529150cf.jpg
- Threat Actors: UNDERGROUND-NET
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: smp negeri 1 bonorowo
- Victim Site: smpn1bonorowo.sch.id
- Alleged data leak of All India Institute of Medical Sciences (AIIMS)
- Category: Data Breach
- Content: Threat actor claims to have leaked data from All India Institute of Medical Sciences (AIIMS). The compromised data reportedly contains user IDs, emails, phone numbers, names, encoded passwords, and timestamps.
- Date: 2025-09-16T09:56:45Z
- Network: telegram
- Published URL: (https://t.me/c/2297393697/538)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9edd1f38-1756-4052-8ece-02f08ded0212.png https://d34iuop8pidsy8.cloudfront.net/479a215f-7f93-4255-8be7-f91d1a6c9b7e.png
- Threat Actors: HIME666
- Victim Country: India
- Victim Industry: Medical Practice
- Victim Organization: all india institute of medical sciences
- Victim Site: aiims.edu
- Alleged data leak of Rädlinger Mechanical and Steel Construction
- Category: Data Breach
- Content: The group claims to have leaked data from Rädlinger Mechanical and Steel Construction, part of Werner Rädlinger Group.
- Date: 2025-09-16T09:47:06Z
- Network: telegram
- Published URL: (https://t.me/c/2591775005/538)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a388cfc5-3824-4147-b7fe-a6ec6ea7ed21.png
- Threat Actors: CLOBELSECTEAM
- Victim Country: Germany
- Victim Industry: Machinery Manufacturing
- Victim Organization: rädlinger mechanical and steel construction
- Victim Site: readlinger.de
- Alleged Unauthorized Access to Water Treatment Control System, United States
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an advanced electrochemical water treatment control system in the United States. The compromised system reportedly manages solution production, pumps, digital valves, precision sensors, relays, and operational modes, with applications in disinfection, water treatment, and industrial cleaning.
- Date: 2025-09-16T08:53:29Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/1658)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bce67b47-465b-49d5-9c90-753d7b3b7c46.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of unauthorized access to Kasikornbank Public Company Limited (KBank)
- Category: Initial Access
- Content: The group claims to have leaked 125,848,04 binance account, user id and password belonging to Kasikornbank Public Company Limited (KBank).
- Date: 2025-09-16T08:37:19Z
- Network: telegram
- Published URL: (https://t.me/h3c4kedz_official/23)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/eed5a1ea-4228-40af-8444-ef6f7183d5ad.JPG https://d34iuop8pidsy8.cloudfront.net/b4b1d46c-d0a7-4fbd-bdef-d6ca60fdde9d.JPG https://d34iuop8pidsy8.cloudfront.net/08186fcc-afc0-43f0-b82e-abfd9c0e99f2.JPG
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Financial Services
- Victim Organization: kasikornbank public company limited (kbank)
- Victim Site: kbiz.kasikornbank.com
- Alleged data leak of Taiwan shopping data
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing Taiwan shopping data. The leak reportedly includes detailed personal information such as names, identification numbers, birthdates, phone numbers, addresses, email addresses, and other personal details. The sample data contains over a thousand records with sensitive customer information, potentially exposing individuals to privacy risks.
- Date: 2025-09-16T06:09:39Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/266361/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bad8e8cd-a8dc-4dae-b67a-7a85f30604a8.png
- Threat Actors: r57
- Victim Country: Taiwan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Allianz Insurance Thailand
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of Allianz Insurance Thailand. The leak includes extensive customer data: names, national ID numbers, phone numbers, addresses, policy codes, transaction details, and dates.
- Date: 2025-09-16T06:02:07Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/266358/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/40d3f4b2-45eb-4a5b-b060-b3bbe2c9e7c4.png
- Threat Actors: r57
- Victim Country: Thailand
- Victim Industry: Insurance
- Victim Organization: allianz insurance thailand
- Victim Site: allianz.co.th
- Alleged data breach of Prasertphon Use Car
- Category: Data Breach
- Content: The group claims to have leaked a customer database from psnkp.co.th, a Thai car dealership, exposing personal details, ID card images, sales notes, and finance-related information for thousands of clients.
- Date: 2025-09-16T05:43:34Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/266357/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3831a1c4-1f2b-4083-9595-3e5eb6847824.png https://d34iuop8pidsy8.cloudfront.net/12bcc9cc-53c3-43e2-be22-dc0bfe6353f3.png https://d34iuop8pidsy8.cloudfront.net/a08e7876-43fa-41f9-b1b9-f72c5fab7ec8.png
- Threat Actors: r57
- Victim Country: Thailand
- Victim Industry: Automotive
- Victim Organization: prasertphon use car
- Victim Site: psnkp.co.th
- Cyb3r Drag0nz targets the website of Iraqi Society for Photography
- Category: Defacement
- Content: Group claims to have defaced the website of Iraqi Society for Photography
- Date: 2025-09-16T05:39:56Z
- Network: telegram
- Published URL: (https://t.me/TeamCyb3rDrag0nz/48)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b1295bbd-2451-4f7d-9ae6-13171a8edb5f.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Photography
- Victim Organization: iraqi society for photography
- Victim Site: ispiraq.org
- Alleged leak of Iraq database
- Category: Data Breach
- Content: The group claims to have released data on 23.8 million Iraqis in 2025, stating that all the information is newly obtained and more data is yet to come.
- Date: 2025-09-16T05:28:32Z
- Network: telegram
- Published URL: (https://t.me/TeamCyb3rDrag0nz/47)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9427ebdd-0dd3-46cd-ae7f-f9b96867ac28.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Iraq citizen data
- Category: Data Breach
- Content: The group claims to have leaked data of 8 million Iraqi citizens in 2025, providing a 2.8 GB downloadable file for easier access and extraction.
- Date: 2025-09-16T05:16:03Z
- Network: telegram
- Published URL: (https://t.me/TeamCyb3rDrag0nz/46)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5fb5c78a-28eb-480d-a2da-a0b6c9d926a9.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Loopia
- Category: Data Breach
- Content: The threat actor claims to have leaked full SQL data from Loopia. The exposed database allegedly includes fields such as: id, date, time, IP, URL requested, agent, referrer, search, nation, OS, browser, search engine, spider, feed, user, and timestamp.
- Date: 2025-09-16T05:08:40Z
- Network: telegram
- Published URL: (https://t.me/bl4ckcyb3rofficial/1941)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2ac68fb6-f261-4cec-8102-2f709b7a886a.png
- Threat Actors: BL4CK CYB3R
- Victim Country: Sweden
- Victim Industry: Software Development
- Victim Organization: loopia
- Victim Site: loopia.se
- Alleged leak of login access to phpMyAdmin
- Category: Initial Access
- Content: The group claims to have leaked login credentials belonging to Loopia AB’s phpMyAdmin service, exposing potential access to customer databases.
- Date: 2025-09-16T05:02:57Z
- Network: telegram
- Published URL: (https://t.me/bl4ckcyb3rofficial/1939)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8f81f79d-6ad6-4072-8f81-2ef874179ed6.png
- Threat Actors: BL4CK CYB3R
- Victim Country: Unknown
- Victim Industry: Software
- Victim Organization: phpmyadmin
- Victim Site: phpmyadmin513.loopia.se
- Alleged data breach of American Charter Communications LLC
- Category: Data Breach
- Content: The threat actor claims to have leaked data from American Charter Communications LLC. The exposed information includes Zabbix monitoring status, disk usage statistics, NTP time sources, DHCP lease data, SIP peer status, voicemail user status, and the latest system logs.
- Date: 2025-09-16T04:09:05Z
- Network: telegram
- Published URL: (https://t.me/c/2591775005/536)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/272c642f-5853-4717-8d48-7b9b66012101.png https://d34iuop8pidsy8.cloudfront.net/33712dc8-1095-4f3c-9351-20b0aca51490.png
- Threat Actors: CLOBELSECTEAM
- Victim Country: USA
- Victim Industry: Network & Telecommunications
- Victim Organization: american charter communications llc
- Victim Site: corporate.charter.com
he cyber incidents documented in this report reveal a dynamic and multifaceted threat landscape. Data breaches and leaks are a significant concern, impacting diverse sectors from telecommunications and healthcare to manufacturing and financial services across countries like South Korea, India, Germany, Taiwan, Thailand, Sweden, and the USA. The compromised data is extensive, ranging from personal user information, financial records, and patient data to sensitive ICS/SCADA systems. Beyond data exfiltration, a notable trend is the sale of initial access, with threat actors offering unauthorized entry into corporate networks, including a US-based water treatment control system, and a major financial institution in Thailand. The report also highlights the activity of threat actors like Unknowns cyber team, CoinbaseCartel, and CLOBELSECTEAM, among others, who operate across various networks including Telegram and the Tor network. These incidents collectively underscore the critical need for organizations worldwide to adopt robust cybersecurity measures, including strong access controls, continuous monitoring, and proactive threat intelligence, to defend against these sophisticated and opportunistic attacks.