This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged gain of access to Ricous Hydroelectric Complex on the Drac River
- Category: Initial Access
- Content: The group claims to have gained full administrator access to the Ricous hydroelectric complex on the Drac River, France. They reportedly controlled key systems such as pumps, valves, and heaters, altering operational parameters beyond safety limits. The intrusion, said to have occurred on October 12, 2025, between 21:55 and 22:22, caused system errors and disruptions, indicating attempts to bypass automated controls and exposing major security vulnerabilities.
- Date: 2025-10-12T23:22:37Z
- Network: telegram
- Published URL: (https://t.me/Z_ALLIANCE/827)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1a37c63a-9f3e-40c9-811a-239ef8a1e87f.png https://d34iuop8pidsy8.cloudfront.net/557fb4e9-bb17-4189-b170-5e8c8da9b9bd.png
- Threat Actors: Z-PENTEST ALLIANCE
- Victim Country: France
- Victim Industry: Energy & Utilities
- Victim Organization: Unknown
- Victim Site: cnr.tm.fr
- Alleged data sale of repandre.com
- Category: Data Breach
- Content: Threat actor claims to be selling leaked data from repandre.com, France. The compromised data reportedly contains 15,000 records including ID, use login, user pass, user email, etc.NB: repandre.com was previously breached on Sun Jan 28 2024.
- Date: 2025-10-12T22:40:16Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-France-repandre-com-Database-15k)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b69226a7-450b-445e-8d77-ab39d8430044.png
- Threat Actors: camillaDF
- Victim Country: France
- Victim Industry: Newspapers & Journalism
- Victim Organization: repandre.com
- Victim Site: repandre.com
- FRISQUET S.A. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 13 GB of the organization’s data.
- Date: 2025-10-12T22:27:06Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=2b200a55-c6f4-303c-9ac8-7ba779bfe554)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3a847afe-6576-43d4-aec5-4aeb81ccfcec.png https://d34iuop8pidsy8.cloudfront.net/e478bc44-cf20-44ed-93d3-3f32441ce1d9.png https://d34iuop8pidsy8.cloudfront.net/a95abf71-0dfc-4d9b-90cd-dee2e0895469.png https://d34iuop8pidsy8.cloudfront.net/2dbe4185-7c42-4953-ac58-26dc58ea214e.png
- Threat Actors: Qilin
- Victim Country: France
- Victim Industry: Machinery Manufacturing
- Victim Organization: frisquet s.a.
- Victim Site: frisquet.com
- Alleged sale of French trading database
- Category: Data Breach
- Content: Threat actor claims to be selling leaked trading database from France.
- Date: 2025-10-12T22:23:11Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-Trading-No-Leak-DATABASE)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e4ee2c28-6b1a-4dca-b4ec-444bb96610f6.png
- Threat Actors: meuhq5
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Etat Civil database
- Category: Data Breach
- Content: Threat actor claims to be selling leaked Etat Civil database from France. The compromised data reportedly contains 15,187,459 including name, address, email, phone number, gender, etc.
- Date: 2025-10-12T22:15:43Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-Etat-Civil-15M-No-Leak-DATABASE)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1b906958-90bd-4f42-9d4d-d8abcc59fc6f.png
- Threat Actors: meuhq5
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Dynamic Precision falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 49 GB of the organization’s data.
- Date: 2025-10-12T22:14:39Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ca993b69-6fe1-3070-b514-2a34e3716306)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d8ec5685-a7a5-4968-b4d9-5d186ba65ab7.png https://d34iuop8pidsy8.cloudfront.net/31ea9a7d-6deb-4c82-95e2-1c4a61476d7b.png https://d34iuop8pidsy8.cloudfront.net/e7c70d64-b5f7-4c27-8832-48d4e0187e8f.png https://d34iuop8pidsy8.cloudfront.net/a25b4408-2cad-450a-acf8-67d8e196e399.png
- Threat Actors: Qilin
- Victim Country: Norway
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Organization: dynamic precision
- Victim Site: dpnorge.no
- Alleged Sale of RDP Access to Italian Construction Company
- Category: Initial Access
- Content: A threat actor is allegedly offering rdp access to an Italy-based company operating in the Commercial & Residential Construction sector. The organization reportedly has annual revenue under $5 Million USD. The access provides user-domain level credentials on a Windows host protected by Windows Defender.
- Date: 2025-10-12T22:08:27Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268088/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/95a382a6-5e55-4aed-a7e5-7adcbb0c28ee.png
- Threat Actors: 361CrimeLiFe
- Victim Country: Italy
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Mission locale de Paris
- Category: Data Breach
- Content: Threat actor claims to be selling leaked data from Mission locale de Paris, France. The compromised data reportedly contains 442,401 lines of data including name, email, address, phone number, etc.
- Date: 2025-10-12T22:04:05Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-Mission-Local-No-Leak-DATABASE)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/01a3fb29-bc9b-4196-b59f-f0878b3fe1a3.png
- Threat Actors: meuhq5
- Victim Country: France
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: mission locale de paris
- Victim Site: missionlocale.paris
- Alleged Sale of RDP Access to Italian Industrial Machinery Company
- Category: Initial Access
- Content: A threat actor is allegedly offering rdp access to an Italy-based company in the Industrial Machinery & Equipment sector reporting 9M in revenue. The access appears to be a user domain account on a Windows host protected by Windows Defender.
- Date: 2025-10-12T22:03:03Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268087/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/21cd1eb4-5101-4185-94cc-d50acd1bc1bd.png
- Threat Actors: 361CrimeLiFe
- Victim Country: Italy
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of RDP Access to US Corporation (Advertising & Marketing)
- Category: Initial Access
- Content: A threat actor is allegedly offering rdp access to a US-based corporation in the Advertising & Marketing sector. The target organization reportedly generates less than $5M in annual revenue. The access provides local administrator privileges on a Windows system protected by Windows Defender. This type of access could enable lateral movement, data exfiltration, or deployment of malicious software.
- Date: 2025-10-12T21:56:45Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268086/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/020bd76d-f98f-4fab-980c-77e54d6cb717.png
- Threat Actors: 361CrimeLiFe
- Victim Country: USA
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: Unknown
- Victim Site: Unknown
- Sunbelt Design and Development falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-10-12T21:49:57Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68ec0e8988b6823fa2820a0f)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5ec628ba-1400-4976-ac92-da59346a1490.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Defense & Space
- Victim Organization: sunbelt design and development
- Victim Site: sunbeltdesign.com
- Alleged sale of access to Brainerd Public Schools
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized RDP access with with domain admin rights to Brainerd Public Schools (Independent School District #181), USA.
- Date: 2025-10-12T21:40:25Z
- Network: openweb
- Published URL: (https://forum.duty-free.cc/threads/1374/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/85eb317e-f485-4327-9275-ea5cfb64f520.png
- Threat Actors: meuhq5
- Victim Country: USA
- Victim Industry: Education
- Victim Organization: brainerd public schools
- Victim Site: isd181.org
- CMF Inc. falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 140 GB of the organization’s data. The compromised data includes Financial data, Contracts, Customer’s data, etc, and plans to publish it within 7 to 8 days.
- Date: 2025-10-12T21:39:57Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68ec0d8a88b6823fa282010f)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/55783d32-3386-489e-94b8-43da15534daa.png https://d34iuop8pidsy8.cloudfront.net/0a06fcfd-5d85-4c3d-a4e5-56643491efe0.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: cmf inc.
- Victim Site: cmfinc.com
- Alleged data sale of Oro Integrated Cooperative
- Category: Data Breach
- Content: Threat actor claims to be selling access and database from Oro Integrated Cooperative. The compromised data content reportedly include source codes, emails, signatures, certificates and more.
- Date: 2025-10-12T21:34:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-PH-Oro-Integrated-Cooperative-45GB)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/98ccb63a-783f-426c-a431-bb1a4b446e83.png
- Threat Actors: redpin
- Victim Country: Philippines
- Victim Industry: Financial Services
- Victim Organization: oro integrated cooperative
- Victim Site: orointegrated.coop
- Alleged leak of Ukrainian entrepreneurs data
- Category: Data Breach
- Content: Threat actor claims to have leaked database containing information on over 500,000 Ukrainian entrepreneurs. The compromised data reportedly include name, phone number, email, etc.
- Date: 2025-10-12T21:20:56Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Ukraine-Enterpreneurs-Database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/37bf36fd-2b44-4d9c-bb65-544fe4425dbc.png
- Threat Actors: Rothmans
- Victim Country: Ukraine
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of access to Sani-touch
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized FORTI access with YES rights to Sani-touch, South Africa.
- Date: 2025-10-12T21:20:43Z
- Network: openweb
- Published URL: (https://forum.duty-free.cc/threads/1375/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/845b5d4f-6193-4d43-b563-d45ad1be6c4a.png
- Threat Actors: TRY
- Victim Country: South Africa
- Victim Industry: Healthcare & Pharmaceuticals
- Victim Organization: sani-touch
- Victim Site: sanitouch.co.za
- IDB Clinics Group falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 50 GB of the organization’s data and plans to publish it within 5 to 6 days.
- Date: 2025-10-12T20:52:26Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68ec0c9688b6823fa281f98a)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/70ab805a-eeba-4cef-b189-5bd0e73bca1c.png
- Threat Actors: Sinobi
- Victim Country: Venezuela
- Victim Industry: Hospital & Health Care
- Victim Organization: idb clinics group
- Victim Site: idbclinicas.com
- Alleged leak of Indian National Identity Cards
- Category: Data Breach
- Content: Threat actor claims to have leaked 506 Indian national identity card images.
- Date: 2025-10-12T20:44:58Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Leaked-Indian-National-Identity-Cards)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c7a88eac-7a72-45d8-9a9b-ed8584fd9e39.png
- Threat Actors: holyriko
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Valtorta falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 83 GB of the organization’s data.
- Date: 2025-10-12T19:32:02Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=1fd0a673-8c64-3736-bf05-ca8cc832ff04)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/137f498c-3d9e-4517-80e7-cb26d6f8c482.png https://d34iuop8pidsy8.cloudfront.net/8cd5a0d2-5dd1-4232-b7a9-fe86caf832aa.png https://d34iuop8pidsy8.cloudfront.net/d78e2915-dbea-4329-8628-65bd678c0c8f.png
- Threat Actors: Qilin
- Victim Country: Italy
- Victim Industry: Mechanical or Industrial Engineering
- Victim Organization: valtorta
- Victim Site: valtortagru.com
- Alleged data sale of Solana Foundation
- Category: Data Breach
- Content: Threat actor claims to be selling leaked data from Solana foundation. The compromised data reportedly contains 1500 rows including email, full name, and discord with about $6,000,000 dollars overall balance.
- Date: 2025-10-12T19:14:31Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-6-000-000-Dollars-overall-balance-solana-foundation-insider-leaks)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/416af933-9d57-4e10-b830-9da0ba00f3e6.png
- Threat Actors: IntelSeller
- Victim Country: Switzerland
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: solana foundation
- Victim Site: solana.org
- Alleged data leak of Comptroller and Auditor General of India
- Category: Data Breach
- Content: The group claims to have leaked data of Comptroller and Auditor General of India, containing around 1.9k Excel databases with sensitive government information and internal records.
- Date: 2025-10-12T18:18:18Z
- Network: telegram
- Published URL: (https://t.me/c/3088972502/61)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/75c221ea-1845-44a5-86de-4c4483167da2.png
- Threat Actors: HIME666
- Victim Country: India
- Victim Industry: Government & Public Sector
- Victim Organization: comptroller and auditor general of india
- Victim Site: cag.gov.in
- Alleged data leak of Roblox
- Category: Data Breach
- Content: The threat actor claims to be selling a data Roblox. The compromised data reportedly contains 37 millions of data that includes user information and passwords.
- Date: 2025-10-12T17:40:41Z
- Network: openweb
- Published URL: https://leakbase.la/threads/roblox-37m.44366/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/46312d1d-56e9-4070-b880-162e83469e70.png
- Threat Actors: jacksparrow874
- Victim Country: USA
- Victim Industry: Software Development
- Victim Organization: roblox
- Victim Site: roblox.com
- Alleged Sale of Prestashop Admin Access in Spain with Credit Card Redirect
- Category: Initial Access
- Content: A threat actor is allegedly selling admin access to a Prestashop-based e-commerce website located in Spain. The system reportedly includes a credit card payment redirection mechanism.
- Date: 2025-10-12T17:16:18Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268071/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6bf55944-eb81-4dcc-a10b-052217af8bad.png
- Threat Actors: Fancy.Bear
- Victim Country: Spain
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Prestashop Admin Access in France with Credit Card Redirect
- Category: Initial Access
- Content: A threat actor is allegedly selling admin access to a Prestashop-based online store located in France. The system includes a credit card payment redirection setup.
- Date: 2025-10-12T17:11:40Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268069/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c192c5b2-3bf7-4789-bfa5-dbc86d6dc145.png
- Threat Actors: Fancy.Bear
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Prestashop Admin Access in Lithuania with Credit Card Redirect
- Category: Initial Access
- Content: A threat actor is allegedly selling admin access to a Prestashop-based online store located in Lithuania. The system includes a credit card payment redirection setup.
- Date: 2025-10-12T17:05:38Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268068/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a84d691e-4c28-4809-afbe-cbbdda1c8400.png
- Threat Actors: Fancy.Bear
- Victim Country: Lithuania
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Mossad Data and Israeli Companies Information
- Category: Data Breach
- Content: Threat actor claims to be selling leaked Mossad data and Israeli companies information database. The compromised data reportedly contains 1 GB of data.
- Date: 2025-10-12T16:55:59Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-MOSSAD-DATA-AND-ISRAELI-COMPANIES–55777)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/927c9a6e-0387-4b01-b0cf-e66eaf93c33c.png
- Threat Actors: INDOHAXSEC
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Stansberry Research
- Category: Data Breach
- Content: Threat actor claims to be selling leaked private data from Stansberry Research, USA. The compromised data reportedly contains 1.5 Million lines.
- Date: 2025-10-12T14:52:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Stansberry-Research-Full-Private-data-for-sale)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8bb52469-ac42-4bfa-80f8-0d56e9ba2c0b.png
- Threat Actors: IntelSeller
- Victim Country: USA
- Victim Industry: Research Industry
- Victim Organization: stansberry research
- Victim Site: stansberryresearch.com
- Alleged data breach of Perbadanan Putrajaya
- Category: Data Breach
- Content: The group claims to have leaked the data from Perbadanan Putrajaya. The compromised data includes administrative records, financial data, and citizen information.
- Date: 2025-10-12T14:44:17Z
- Network: openweb
- Published URL: https://vfvct.github.io/VFVCT/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c4e342ef-7a20-4d5f-b6d2-d0d97a5809d4.png https://d34iuop8pidsy8.cloudfront.net/fc37eae7-6e19-43bc-935f-22f6bf34e46f.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Malaysia
- Victim Industry: Government Administration
- Victim Organization: perbadanan putrajaya
- Victim Site: ppj.gov.my
- Alleged data sale of the Israel Defense Forces
- Category: Data Breach
- Content: The threat actor claims to have obtained data from the Israel Defense Forces (IDF), allegedly containing Naval deployment, personnel records and vessel specs.
- Date: 2025-10-12T14:26:57Z
- Network: openweb
- Published URL: https://vfvct.github.io/VFVCT/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ae0d63e0-99e7-4162-97d5-5c53ed3c69bb.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Israel
- Victim Industry: Government Administration
- Victim Organization: israel defense forces
- Victim Site: idf.il
- Alleged data sale of Johor State Court
- Category: Data Breach
- Content: The threat actor claims to have obtained data from Johor State Court, allegedly containing Staff information, identity cards and court records.
- Date: 2025-10-12T14:26:27Z
- Network: openweb
- Published URL: https://vfvct.github.io/VFVCT/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6c48fc89-fee9-487d-a9e9-4a4c31a57b54.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Malaysia
- Victim Industry: Government Administration
- Victim Organization: johor state court
- Victim Site: johor.kehakiman.gov.my
- Design To Print falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 3.3 TB of the organization’s data and plans to publish it within 10 to 11 days.
- Date: 2025-10-12T14:22:10Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=c4c39da7a3fea2b9d7ac20e1a2fc9a5b)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/654da3c7-981e-4786-9325-8a3b3a04d754.jpg
- Threat Actors: MEDUSA
- Victim Country: USA
- Victim Industry: Printing
- Victim Organization: design to print, inc.
- Victim Site: designtoprint.com
- Ecopetróleo falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data and plans to publish it within 13 to 14 days.
- Date: 2025-10-12T14:18:53Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=4362cccf2bc3ba954528f31583147928)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4c4e1350-9d58-49f4-a9f4-802d551ad1c6.png
- Threat Actors: MEDUSA
- Victim Country: Dominican Republic
- Victim Industry: Oil & Gas
- Victim Organization: ecopetróleo
- Victim Site: ecopetroleo.do
- Alleged data sale of SMK Taruna Bhakti Depok
- Category: Data Breach
- Content: The threat actor claims to have obtained data from SMK Taruna Bhakti Depok, allegedly containing student records, personal information, addresses, and family data.
- Date: 2025-10-12T14:15:06Z
- Network: openweb
- Published URL: https://vfvct.github.io/VFVCT/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4e335caa-fdaf-4732-b7e0-07611a841053.png
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: smk taruna bhakti depok
- Victim Site: smktarunabhakti.net
- La VOIE EXPRESS falls victim to MEDUSA Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data and plans to publish it within 7 to 8 days.
- Date: 2025-10-12T14:03:24Z
- Network: tor
- Published URL: (http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=d31f1afc1c34917fb1e0affbbe60b217)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bf798690-5bf9-4f1f-b03c-29987182a493.png
- Threat Actors: MEDUSA
- Victim Country: Morocco
- Victim Industry: Transportation & Logistics
- Victim Organization: la voie express
- Victim Site: lavoieexpress.com
- Ministry of Health falls victim to Nova Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 10 GB of the organization’s data and intends to publish it within 12-13 days.
- Date: 2025-10-12T13:04:58Z
- Network: tor
- Published URL: (http://novadmrkp4vbk2padk5t6pbxolndceuc7hrcq4mjaoyed6nxsqiuzyyd.onion/#)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c58b057d-4e17-4329-8f1c-ea287583926a.jpg
- Threat Actors: Nova
- Victim Country: Argentina
- Victim Industry: Government & Public Sector
- Victim Organization: ministry of health
- Victim Site: argentina.gob.ar
- Alledged Sale of Canva Database
- Category: Data Breach
- Content: The threat actor claims to be selling canva database.
- Date: 2025-10-12T12:42:30Z
- Network: openweb
- Published URL: https://leakbase.la/threads/canva-database.44348/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f9f19ca1-3079-4748-90b9-313863ff3739.png
- Threat Actors: AX00000P
- Victim Country: Australia
- Victim Industry: Software Development
- Victim Organization: canva
- Victim Site: canva.com
- Alleged data breach of tarbia.tn
- Category: Data Breach
- Content: The threat actor claims to have leaked data from tarbia.tn.
- Date: 2025-10-12T11:52:54Z
- Network: telegram
- Published URL: https://t.me/H3yder_N3ex/544
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4b8a5920-3369-4517-be09-81c1ab623c61.png
- Threat Actors: Hider_Nex
- Victim Country: Tunisia
- Victim Industry: Education
- Victim Organization: tarbia.tn
- Victim Site: tarbia.tn
- Alleged database sale of Yunex Traffic
- Category: Data Breach
- Content: The group claims to be selling 1TB of compressed internal data from Yunex Traffic.
- Date: 2025-10-12T11:12:23Z
- Network: telegram
- Published URL: https://t.me/thecrimsoncollective/32
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/645e0b30-2156-4c9c-a0c0-4e508b3357dd.png
- Threat Actors: Crimson Collective
- Victim Country: Germany
- Victim Industry: Information Technology (IT) Services
- Victim Organization: yunex traffic
- Victim Site: yunextraffic.com
- Alleged data leak of American Airlines
- Category: Data Breach
- Content: Threat actor claims to be selling leaked data from American Airlines. The compromised dataset reportedly contains 500 million records and a 3 TB database.
- Date: 2025-10-12T11:10:06Z
- Network: telegram
- Published URL: https://t.me/rubiconhack/7
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d610864c-c641-4e1f-b521-56c2689e0dcf.png https://d34iuop8pidsy8.cloudfront.net/b849c253-ca14-4b12-a22c-1eba22442c2a.png https://d34iuop8pidsy8.cloudfront.net/6c588d4c-5062-47ef-946d-5f0859c5bbbb.png
- Threat Actors: Rubiconhack
- Victim Country: USA
- Victim Industry: Airlines & Aviation
- Victim Organization: american airlines, inc.
- Victim Site: aa.com
- Alleged data breach of Lotería de Medellín
- Category: Data Breach
- Content: The group claims to be selling over 1 TB of compressed data allegedly stolen from Lotería de Medellín, including some winners’ information and internal documents related to the lottery’s operations.
- Date: 2025-10-12T10:58:50Z
- Network: telegram
- Published URL: https://t.me/thecrimsoncollective/36
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6a849c95-5e8e-49af-a83b-b40b0dab6711.png
- Threat Actors: Crimson Collective
- Victim Country: Colombia
- Victim Industry: Gambling & Casinos
- Victim Organization: lotería de medellín
- Victim Site: loteriademedellin.com
- Alleged Sale of Brazilian Server Access
- Category: Initial Access
- Content: The threat actor claims to be selling VPN access and local admin Exchange server access related to a Brazilian organization. The actor claims the system is protected by Kaspersky antivirus.
- Date: 2025-10-12T10:10:41Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/268050/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fbdc67b5-198f-4c4e-a403-e0a1b9c391bf.png
- Threat Actors: personX
- Victim Country: Brazil
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Google Data
- Category: Data Breach
- Content: The group claims to be selling sensitive Google data, including user information and important documents. The group alleges possession of 3TB of data.
- Date: 2025-10-12T10:06:21Z
- Network: telegram
- Published URL: https://t.me/rubiconhack/6
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c438e21b-18ca-4b2e-afa2-f896872e7644.png
- Threat Actors: Rubiconhack
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: google
- Victim Site: google.com
- Alleged unauthorized access to Business Bangla Machineries
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to Business Bangla Machineries.
- Date: 2025-10-12T08:14:31Z
- Network: telegram
- Published URL: https://t.me/kingsmanindia1/640
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/065886a3-7be5-4843-a9df-b55231e63561.png
- Threat Actors: KINGSMAN INDIA
- Victim Country: Bangladesh
- Victim Industry: Machinery Manufacturing
- Victim Organization: business bangla machineries
- Victim Site: erp.bbm-bd.com
- Balfour Beatty plc falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-10-12T07:14:49Z
- Network: tor
- Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/68947485c7b82dfe0b1fd39d)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/60af699e-f2c4-4e36-8536-c4caad15f06c.png https://d34iuop8pidsy8.cloudfront.net/4b64f0ad-9dca-4fd2-8e4d-97b27bf2be36.png
- Threat Actors: INC RANSOM
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: balfour beatty plc
- Victim Site: balfourbeatty.com
- Alleged data breach of Fokus
- Category: Data Breach
- Content: Threat actor claims to have leaked data from Fokus. the compromised data includes payment and withdrawal records, such as transaction amounts, dates, and related financial details, along with customer information and email addresses.
- Date: 2025-10-12T05:33:27Z
- Network: openweb
- Published URL: (https://breachsta.rs/topic/partial-db-fokusse-swedish-newspaper-uuzwc669mom3)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/71ea7d45-74a5-4e15-92d7-c82f7dd3f729.png
- Threat Actors: pimplynerd
- Victim Country: Sweden
- Victim Industry: Newspapers & Journalism
- Victim Organization: fokus
- Victim Site: fokus.se
- Alleged Data Leak of InteractiveBrokers CRM
- Category: Data Breach
- Content: The threat actor claims to have leaked a scraped database from InteractiveBrokers, a US stock company, containing 900,000 customer records.
- Date: 2025-10-12T04:22:33Z
- Network: openweb
- Published URL: https://xss.pro/threads/143726/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/23c832fe-a0b6-4024-b440-d93aa514c60e.png
- Threat Actors: Observe
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Team Schierl Companies falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 631 GB of the organization data. Sample screenshots are available on their dark web portal.
- Date: 2025-10-12T02:45:01Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=3c2c6aec-b284-3ec1-87e6-cc187699735d)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c7e2f371-77d1-44f0-a8b5-bd20cf4ca34e.png https://d34iuop8pidsy8.cloudfront.net/62c0fa83-4249-4b66-ad6a-2c9e5fdaecdf.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: team schierl companies
- Victim Site: teamschierl.com
- Alleged sale of unauthorized access to unidentified Telecom organization in Brazil
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to unidentified Telecom organization in Brazil.
- Date: 2025-10-12T01:01:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Unknown-revenue-BR-Telecom-Industry–55702)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/615629da-ea21-4bca-bf52-6b37d4bcee85.png
- Threat Actors: Yrrrr
- Victim Country: Brazil
- Victim Industry: Network & Telecommunications
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged gain of access to Climate Control System Breach at Lidl Poland
- Category: Initial Access
- Content: Group claims to have gained access to Lidl Poland’s climate control infrastructure, affecting temperature, humidity, and CO2 regulation across its warehouses, offices,and checkout areas. The attackers assert they can remotely manipulate environmental conditions, disrupting normal operations and exposing severe weaknesses in the company’s centralized automation system.
- Date: 2025-10-12T00:26:18Z
- Network: telegram
- Published URL: (https://t.me/Z_ALLIANCE/826)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1d1b9c7a-c5a1-4b62-b3f0-e5eb88e961a4.png https://d34iuop8pidsy8.cloudfront.net/540c73ea-1b6d-48ec-a59a-046e2596ddc5.png
- Threat Actors: Z-PENTEST ALLIANCE
- Victim Country: Poland
- Victim Industry: Retail Industry
- Victim Organization: lidl poland
- Victim Site: lidl.pl
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and Initial Access sales are prominent, affecting various sectors from Government & Public Sector and Education to Airlines & Aviation and Financial Services, and impacting countries including France, USA, India, Israel, Malaysia, Italy, and Brazil. The compromised data ranges from customer and user information to sensitive government and military data, and financial records.
Beyond data compromise, the report also reveals significant activity in Ransomware attacks by groups like Qilin, Sinobi, and MEDUSA, and the continued operation of Defacement and Vulnerability exploitation.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.