[September-29-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


1. Alleged unauthorized access to Ministry of Finance of Thailand


2. Alleged Sale of E-KTP Data from SMK Taruna Bhakti Depok

  • Category: Data Breach
  • Content: The group claims to be selling a database containing E-KTP data from SMK Taruna Bhakti Depok in Indonesia. The compromised data reportedly includes personal identification details of students and staff.
  • Date: 2025-09-29T14:23:35Z
  • Network: telegram
  • Published URL: (https://t.me/VFCTeam/188)
  • Screenshots:
  • Threat Actors: V FOR VENDETTA CYBER TEAM
  • Victim Country: Indonesia
  • Victim Industry: Education
  • Victim Organization: smk taruna bhakti depok
  • Victim Site: smktarunabhakti.net

3. Alleged data sale of the National Real Estate and Housing Registration System of Iran


4. Alleged data leak of all Yemeni military and government seals


5. J E Stacey & Co Ltd falls victim to J group Ransomware


6. Alleged data breach of PRECCS


7. Lakehaven Water and Sewer District falls victim to Qilin Ransomware


8. Alleged Unauthorized Access to U.S. Water Treatment and Pumping Systems

  • Category: Initial Access
  • Content: The group claims to have gained access to an unidentified water purification and pumping station system in the United States. The alleged breach reportedly enables oversight of suction and distribution tanks, inlet pumps, dosing units, filtration blocks, and distribution tanks.
  • Date: 2025-09-29T13:39:56Z
  • Network: telegram
  • Published URL: (https://t.me/n2LP_wVf79c2YzM0/1769)
  • Screenshots:
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: USA
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown

9. Virtual Projects falls victim to J group Ransomware


10. The General Directorate of Taxes and Estates falls victim to BlackShrantac ransomware


11. Alleged unauthorized access to unidentified YAESU Antenna Rotor Control System in UK


12. manjarrez printers sa de cv falls victim to INC RANSOM Ransomware


13. Raimore Construction, LLC falls victim to J group Ransomware


14. InDoM1nu’s targets multiple Nigerian websites


15. Sono Show Móveis falls victim to Mydata/Alphalocker Ransomware


16. DigitalStormSec targets the website of Definitive Business Solutions Limited


17. KAL EGY 319 targets multiple Turkish websites


18. PHI falls victim to INC RANSOM Ransomware


19. Alleged data breach of VMX


20. Hoffman Estates Park District falls victim to Qilin Ransomware


21. Alleged data breach of Terminals Parking


22. Alleged Breach of 4 Elements Control Systems in Ukraine


23. Night Owll targets the website of Furbabiesplus.edublogs.org


24. Alleged leak of Chinese government employees data


25. Alleged data breach of Pharmacie.ma


26. Alleged data leak of Switzerland database


27. DigitalStormSec targets the website of landing.demodekhi.xyz


28. f4ded b0yz claims breach of X’s Okta Platform

  • Category: Alert
  • Content: Threat actor is claiming responsibility for a breach of X’s (Twitter’s) Okta identity and access management platform. The screenshots show access to Okta’s admin recovery workflow, including a manual recovery request and new recovery email setup, which would allow them to hijack accounts. Another screenshot shows the Okta agent dashboard with access to internal workflows, suggesting they could impersonate or escalate privileges of internal users. The threat actor claim they leveraged a Google dork (advanced search query) to discover exposed employee information, which helped them pivot into Okta and gain unauthorized access. This implies a potential identity compromise and privilege escalation risk within X’s authentication infrastructure.
  • Date: 2025-09-29T06:04:51Z
  • Network: openweb
  • Published URL: (https://x.com/F4dedB0yz/status/1972426248258523574)
  • Screenshots:
  • Threat Actors: f4ded b0yz
  • Victim Country: USA
  • Victim Industry: Information Technology (IT) Services
  • Victim Organization: okta, inc.
  • Victim Site: okta.com

29. MSB Inc. falls victim to Sarcoma Ransomware


30. Alleged data breach of QRIS Indonesia


31. Alleged data breach of Colegio Franco Peruano


32. Alleged sale of access to an unidentified French PrestaShop admin panel


33. Alleged data sale of Vehicle Emissions Control


34. Alleged data leak of real time online lending records in India

  • Category: Data Breach
  • Content: Threat actor claims to have leaked real time online lending records in India. The compromised dataset includes detailed transactional and customer information such as record IDs, transaction types and IDs, geographic identifiers (state, region, area, branch, and service center details), group and customer codes, customer names and mobile numbers, loan IDs, product details, as well as billing and user role information.
  • Date: 2025-09-29T02:54:19Z
  • Network: openweb
  • Published URL: (https://darkforums.st/Thread-DATABASE-Real-time-data-on-online-lending-in-India)
  • Screenshots:
  • Threat Actors: Dy1223344
  • Victim Country: India
  • Victim Industry: Financial Services
  • Victim Organization: Unknown
  • Victim Site: Unknown

35. Alleged data breach of Atwar Alkon


36. Alleged data leak of Taiwan Loan Data


37. Naftali Group falls victim to Sinobi Ransomware


38. Alleged sale of login access to 150 business shipping accounts in the USA


39. Bignault & Carter, LLC falls victim to Sinobi Ransomware


40. Alleged data sale of Euronature


41. Alleged data breach of Airports of Thailand Public Company Limited (AOT)

  • Category: Data Breach
  • Content: Threat actor claims to have leaked data from Airports of Thailand Public Company Limited (AOT). The compromised data includes access to the internal admin dashboard of Airports of Thailand (AOT), exposing real-time flight and passenger information, staff accounts with administrative privileges, terminal operations and incident logs, maintenance schedules, ground crew coordination details, as well as secure network mapping and infrastructure configurations.
  • Date: 2025-09-29T00:21:57Z
  • Network: openweb
  • Published URL: (https://darkforums.st/Thread-DATABASE-2-63GB-DATABASE-AIRPORTS-OF-THILAND-AOT)
  • Screenshots:
  • Threat Actors: NodeSillent
  • Victim Country: Thailand
  • Victim Industry: Airlines & Aviation
  • Victim Organization: airports of thailand public company limited (aot)
  • Victim Site: airportthai.co.th