[October-6-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.


  1. Alleged sale of access to unidentified company from Chile

  1. Clifford Paper Inc falls victim to Qilin Ransomware

  1. Alleged sale of N-Day vulnerability for Oracle E-Businesses

  1. AES Clean Technology falls victim to PLAY Ransomware

  1. Dataforth Corporation falls victim to PLAY Ransomware

  1. Markus Schramm, Rechtsanwalt und Steuerberater falls victim to Qilin Ransomware

  1. Rogue Valley Door falls victim to Sinobi Ransomware

  1. Law Offices of James Scott Farrin falls victim to Sinobi Ransomware

  1. BANGLADESH CYBER FORCE targets the website of Darussalam Government Secondary School

  1. BANGLADESH CYBER FORCE targets the website of Aerial Swarnamoyee High School

  1. Alleged Unauthorized Access to IMPIANTO IDRICO SINOPOLI SCADA System

  1. BANGLADESH CYBER FORCE targets the website of United Model High School

  1. NurtureCare falls victim to kairos Ransomware

  1. BANGLADESH CYBER FORCE targets the website of Rajanagar Syedpur Union High School

  1. BANGLADESH CYBER FORCE targets the website of Mokamia High School

  1. BANGLADESH CYBER FORCE targets the website of Hajee Shariat Ullah Adarshsa High School

  1. BANGLADESH CYBER FORCE targets the website of BIAM Model School and College

  1. BANGLADESH CYBER FORCE targets the website of Rupnagar Government Secondary School

  1. BANGLADESH CYBER FORCE targets the website of Ahsania Mission College

  1. Alleged sale of personal information of Chinese citizens living in the UK

  1. BANGLADESH CYBER FORCE targets the website of Syed Kutub Jalal Model High School

  1. BANGLADESH CYBER FORCE targets the website of Bangladesh University

  1. Alleged sale of 140 million combo list from UK

  1. BANGLADESH CYBER FORCE targets the website of Shamsul Hoque Khan School and College

  1. Alleged sale of personal data of sports betting players from UK

  1. Alleged sale of access to unidentified software development company from Vietnam

  1. Landmark Management, Inc. falls victim to Qilin Ransomware

  1. Alleged data breach of Israel Tax Authority

  1. Alleged Sale of Chile WordPress Admin Access with Webpay Plus

  1. Development Services Group, Inc.

  1. Alleged Sale of WordPress Admin Access to Peru based site with credit card payment frame
    • Category: Initial Access
    • Content: The threat actor claims to be selling WordPress admin access to a Peru-based website integrated with a credit card frame payment method. The listing indicates that in September, the site processed 99 credit card orders without subscriptions.
    • Date: 2025-10-06T17:58:06Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/267667/
    • Screenshots:
    • Threat Actors: Fancy.Bear
    • Victim Country: Peru
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown

  1. Alleged Sale of WordPress Admin Access to US Site with Credit Card Payment Form

  1. Alleged sale of forex personal data from France

  1. Orion Engineers + Constructors falls victim to akira Ransomware
    • Category: Ransomware
    • Content: The group claims to have obtained 32 GB of the organization’s data. The compromised data includes Internal confidential information containing client personal information (SSNs, address, email addresses and so on), employee information (w9 forms), financial and accounting files, contracts, agreements, clients’ engineering specifications and drawings, projects, etc.
    • Date: 2025-10-06T17:16:38Z
    • Network: tor
    • Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    • Screenshots:
    • Threat Actors: akira
    • Victim Country: USA
    • Victim Industry: Mechanical or Industrial Engineering
    • Victim Organization: orion engineers + constructors
    • Victim Site: orion-eng.com

  1. Alleged sale of premium academic memberships for Shodan

  1. Alleged sale of admin access to unidentified telecom company from UK

  1. Milliman Financial Risk Management falls victim to akira Ransomware

  1. Alleged data sale of Grip Invest

  1. Alleged Sale of access to Honduras based Building Materials company

  1. Daily Printing, Inc. falls victim to akira Ransomware

  1. Alleged Sale of access to UK based Industrial Machinery & Equipment firm

  1. saint-claude town hall falls victim to Qilin Ransomware

  1. Mecklenburg County Public Schools falls victim to Qilin Ransomware

  1. 4 EXPLOITATION targets the website davidsonhealth.co.il

  1. Alleged Sale of Hotmail Good Mail Access Combolist

  1. AnonGhost targets the website of Isranet Computers

  1. McGeorge Architecture Interiors, LLC falls victim to Qilin Ransomware

  1. Alleged sale of combolists from multiple countries

  1. Kecy Metal Technologies falls victim to Qilin Ransomware

  1. Alleged sale of access to UU Slots website

  1. Alleged leak of access to Agenda of the Pacitan Regency Government

  1. Alleged leak of access to Dinas Komunikasi dan Informatika or DISKOMINFO

  1. Alleged data leak of Gujarat Bank
    • Category: Data Breach
    • Content: The threat actor claims to have leaked data from Gujarat Bank. The compromised data reportedly includes a full backup of the bank manager’s account containing 99,000 emails (35 GB with attachments) spanning from 2019 to 2025. The leak allegedly contains emails exchanged with major institutions such as the Reserve Bank of India, NPCI, NEFT, FIU-IND, Equifax, Airtel, HDFC Bank, CIBIL, and M2P Fintech, as well as Indian government entities.
    • Date: 2025-10-06T13:53:23Z
    • Network: openweb
    • Published URL: (https://darkforums.st/Thread-Selling-The-Gujarat-Bank-Sensitivities)
    • Screenshots:
    • Threat Actors: ByteToBreach
    • Victim Country: India
    • Victim Industry: Banking & Mortgage
    • Victim Organization: Unknown
    • Victim Site: Unknown

  1. Alleged data breach of Gradoo crm

  1. Alleged data breach of Bacabal City Hall

  1. Alleged sale of healthcare application data

  1. Ludlow Construction Co Inc falls victim to Akira Ransomware

  1. Alleged data leak of Horizon Lussier

  1. Alleged leak of access to Direktorat Jenderal Bina Pemerintahan Desa

  1. Lipapromet falls victim to Qilin Ransomware

  1. Alleged data breach of Israel Police

  1. Alleged data breach of Safir company

  1. Natural Milk falls victim to DEVMAN 2.0 Ransomware

  1. Alleged unauthorized access to boiler control of ENERGOFOREST s.r.o.

  1. Natoli Engineering Company, Inc. falls victim to akira Ransomware
    • Category: Ransomware
    • Content: The group claims to have obtained 936 GB of the organization’s data. The compromised data includes financial data (audit, payment details, financial reports, invoices), employees and customers information (passports, driver’s license, Social Security Numbers death/birth certificates, emails, phones) confidential information, NDAs and other documents with detailed personal information.
    • Date: 2025-10-06T11:16:17Z
    • Network: tor
    • Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    • Screenshots:
    • Threat Actors: akira
    • Victim Country: USA
    • Victim Industry: Manufacturing & Industrial Products
    • Victim Organization: natoli engineering company, inc.
    • Victim Site: natoli.com

  1. Alleged data breach of Centers Laboratory

  1. HMEI7 targets the website of Sun Software (Pvt.) Limited

  1. Field and Goldberg, LLC falls victim to akira Ransomware
    • Category: Ransomware
    • Content: The group claims to have obtained 232 GB of the organization’s data. The compromised data includes financial data (audit, payment details, financial reports, invoices), employees and customers information (passports, Social Security Numbers, emails, phones) confidential information, NDAs and other documents with detailed personal information.
    • Date: 2025-10-06T10:23:46Z
    • Network: tor
    • Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    • Screenshots:
    • Threat Actors: akira
    • Victim Country: USA
    • Victim Industry: Law Practice & Law Firms
    • Victim Organization: field and goldberg, llc
    • Victim Site: fieldandgoldberg.com

  1. PERENNIAL falls victim to BEAST Ransomware

  1. Saskarc Inc. falls victim to akira Ransomware

  1. Alleged data sale of Microsoft Japan Co., Ltd.

  1. Alleged data leak of Crescitaly SMM Panel

  1. Alleged sale of unauthorized PrestaShop Admin Access in Spain

  1. Alleged data leak of SMM Panel Server (Social Media Marketing panel)

  1. Pharaoh’s Team targets the website of Smart Menu

  1. Alleged data leak of KEX

  1. Pharaoh’s Team targets the website of Smart Clinic

  1. Pharaoh’s Team targets the website of SoftX ITS

  1. Pharaoh’s Team targets the website of sylwias photography

  1. Pharaoh’s Team targets the website of Darwish Sweets

  1. Alleged sale of Russian confidential data

  1. Pharaoh’s Team targets the website of Sigeko-Weiden

  1. Pharaoh’s Team targets the website of DamasTech General Contracting

  1. Pharaoh’s Team targets the website of Ideal Umzüge

  1. Alleged data breach of CHRIST Jewelers and Watchmakers since 1863 GmbH

  1. Alleged sale of unauthorized PrestaShop Admin Access in Spain

  1. Alleged sale of unauthorized PrestaShop Admin Access in Spain

  1. Alleged sale of unauthorized PrestaShop Admin Access in Spain

  1. RipperSec Claims to Target Multiple Countries
    • Category: Alert
    • Content: A recent post by the group indicates they are resuming activity and continuing development of their MegaMedusa tool. The group claims intentions to conduct cyber operations targeting multiple countries, citing ongoing conflicts related to Palestine.
    • Date: 2025-10-06T08:25:39Z
    • Network: telegram
    • Published URL: https://t.me/c/2875163062/43
    • Screenshots:
    • Threat Actors: RipperSec
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown

  1. Alleged leak of admin access to Totalwin College of Economics

  1. Alleged sale of Personally Identifiable Information (PII)
    • Category: Data Breach
    • Content: The group claims to be selling Personally Identifiable Information (PII). The exposed data reportedly include full name, date of birth, address, phone number, email, facial photograph, NIK, family card details, email, BPJS card data, residence, father’s name, mother’s name, parental permission letter etc.
    • Date: 2025-10-06T06:59:28Z
    • Network: telegram
    • Published URL: https://t.me/fornetcloud/2680
    • Screenshots:
    • Threat Actors: FORNET ORG
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown

  1. Alleged leak of company infrastructure data from Kingbright Electronic Co., Ltd.

  1. Alleged data breach of Indonesian National Police (POLRI) & Indonesian Air Force (TNI-AU)

  1. Alleged leak of consent.exe

  1. Alleged data sale of Kuwait Ministry of Public Works

  1. Alleged access sale of RDP to cloud-mining ASIC manufacturer
    • Category: Initial Access
    • Content: The threat actor claims to be selling access to an unidentified organization, which includes Remote Desktop access to a local network belonging to a cloud-based Bitcoin mining (ASIC) chip manufacturer based in Northwestern Europe.
    • Date: 2025-10-06T06:18:34Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/267618
    • Screenshots:
    • Threat Actors: rs6mtm
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown

  1. Alleged sale of unauthorized access to Nodes.Guru

  1. Alleged sale of administrative access and Insider Recruitment

  1. Alleged sale of access to an administrative dashboard in Nepal

  1. Alleged sale of unauthorized access to unidentified shop in Australia * Category: Initial Access * Content: Threat actor claims to be selling unauthorized access to unidentified shop in Australia. * Date: 2025-10-06T04:15:49Z * Network: openweb * Published URL: https://forum.exploit.in/topic/267624/ * Screenshots:

  1. Magna Foodservice victim to Radiant Group Ransomware * Category: Ransomware * Content: The group claims to have obtained organization’s data. * Date: 2025-10-06T03:01:41Z * Network: tor * Published URL: http://trfqksm6peaeyz4q6egxbij5n2ih6zrg65of4kwasrejc7hnw2jtxryd.onion/Magna * Screenshots:

  1. Wellslandscaping INC victim to INC RANSOM Ransomware * Category: Ransomware * Content: The group claims to have obtained the organization’s data. * Date: 2025-10-06T02:51:03Z * Network: tor * Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/68e2fbfcfa0b6f4bdfef8990) * Screenshots:

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Ransomware attacks, notably by Qilin, akira, and PLAY, are prominent, targeting various sectors including law, education, manufacturing, and real estate across the USA, Germany, and France. Data breaches and leaks are widespread, affecting government organizations in Israel, India, Kuwait, and Indonesia, and compromising sensitive information such as personal data, corporate records, and internal technical documents. Furthermore, the market for initial access remains highly active, with threat actors selling unauthorized entry to SCADA systems in Italy and the Czech Republic, administrative dashboards for WiFi hotspots in Nepal, and corporate networks in the UK and Vietnam. The continued activity in malware (Vulnerability) and combo list sales underscores the persistent availability of offensive capabilities in the cyber underground.

The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.