This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- MSC-Wireless falls victim to Sinobi ransomware
- Category: Ransomware
- Content: The group claims to have obtained 95 GB of the organization’s data. The compromised data includes Financial data, Customer’s data, and more.
- Date: 2025-10-20T22:22:06Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f6955c88b6823fa2b6b4bf)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0ac46d24-7665-4456-be14-49fe20b0a360.png
- Threat Actors: Sinobi
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: msc-wireless
- Victim Site: Unknown
- Alleged sale of access to Binance support panel
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to Binance support panel.
- Date: 2025-10-20T22:15:34Z
- Network: tor
- Published URL: (http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-%E2%9C%93-VERIFIED-BINANCE-SUPPORT-PANEL-ACCESS)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/36f7cfd3-58b4-4435-bcd6-0a9fd5951c4e.png
- Threat Actors: cRime
- Victim Country: Cayman Islands
- Victim Industry: Financial Services
- Victim Organization: binance
- Victim Site: binance.com
- Alleged sale of Doxbinscrape
- Category: Data Breach
- Content: Threat actor claims to be selling Doxbinscrape, described as a scraped dataset/tool containing personally identifiable information.
- Date: 2025-10-20T22:08:21Z
- Network: openweb
- Published URL: https://leakbase.la/threads/doxbinscrape-2025.44717/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e8f80eb5-0379-4d4f-a8ab-51db2788f79c.png
- Threat Actors: HarleenQuinzel
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Greater Mental Health of New York falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 350 GB of the organization’s data. The compromised data includes Confidential, Customer’s data, Financial data, Incidents, and more. They plan to publish it within 4 to 5 days.
- Date: 2025-10-20T22:07:06Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f69f3288b6823fa2b6f2e8)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f18f6edc-40b8-44d2-b050-6b713f8954a6.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Mental Health Care
- Victim Organization: greater mental health of new york
- Victim Site: greatermentalhealth.org
- Alleged leak of XWorm 6.5 Crack
- Category: Malware
- Content: Threat actor claims to have leaked XWorm 6.5 Crack version.
- Date: 2025-10-20T22:06:20Z
- Network: openweb
- Published URL: https://xss.pro/threads/143870/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/85f37619-9c79-4971-be02-aaa92510b96b.png
- Threat Actors: YUI78
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Tryon Distributing Co falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-10-20T21:58:43Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f6937188b6823fa2b6a8e3)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e286ddcd-0449-4481-9f8e-6987c81b5d21.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Wine & Spirits
- Victim Organization: tryon distributing co
- Victim Site: tryondist.com
- Grupo JSA falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 200 GB of the organization’s data. The compromised data includes Confidential, Customer’s data, Financial data, Contracts, and more. They plan to publish it within 1 day.
- Date: 2025-10-20T21:47:18Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f6948988b6823fa2b6adae)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4ebc1166-bdf2-43dc-a10f-3b98b480ac9b.png
- Threat Actors: Sinobi
- Victim Country: Brazil
- Victim Industry: Real Estate
- Victim Organization: grupo jsa
- Victim Site: grupojsainc.com.br
- Phoenix Village Dental falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 50 GB of the organization’s data. The compromised data includes Customer’s data, Financial data, HR, and more.
- Date: 2025-10-20T21:36:20Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f6821888b6823fa2b650da)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9993b104-1084-41df-bae6-ff8a6d5ac590.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: phoenix village dental
- Victim Site: phoenixvillagedental1.com
- South Atlanta Medical Clinic falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 140 GB of the organization’s data. The compromised data includes Confidential, Financial data, Customer’s data, and more.
- Date: 2025-10-20T21:24:48Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f682bb88b6823fa2b654da)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cb95167f-77fb-451a-8690-5ea0957b9f34.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: south atlanta medical clinic
- Victim Site: southatlantasc.com
- Alleged gain of access to the control panel of industrial equipment, Italy
- Category: Initial Access
- Content: The group claims to have gained access to the control panel of industrial equipment, Italy.
- Date: 2025-10-20T21:16:23Z
- Network: telegram
- Published URL: https://t.me/TwoNetchannel/59
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8ad5057d-d6fd-4096-8dad-87c3d944aee2.png https://d34iuop8pidsy8.cloudfront.net/b63acb01-ac2d-486d-8c1d-08984f92197e.png
- Threat Actors: TwoNet
- Victim Country: Italy
- Victim Industry: Energy & Utilities
- Victim Organization: Unknown
- Victim Site: Unknown
- Harmony Outdoor Brands falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 50 GB of the organization’s data. The compromised data includes Financial data, Contracts, Incidents, and more. They plan to publish it within 3 to 4 days.
- Date: 2025-10-20T21:13:46Z
- Network: tor
- Published URL: (http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/68f683c488b6823fa2b65a67)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/92470f12-82bf-4d5b-92ae-5182832b5839.png https://d34iuop8pidsy8.cloudfront.net/4ed640d3-7cf4-445a-bed1-595a00628b98.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Wholesale
- Victim Organization: harmony outdoor brands
- Victim Site: harmonybrands.com
- Catholic Diocese of Memphis falls victim to Brain Cipher Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 100 GB of the organization’s data and intends to publish it within 11-12 days.
- Date: 2025-10-20T20:57:16Z
- Network: tor
- Published URL: (http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/s/9FA1jieRyw7UKiZdDa2AMQvrcuN4oM2ivKk9lqSkod77oNPsdUMvYrfLaGGrC7yalZFivcAM6ue9WDIWBz55TRKejVyV1ZJ)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5508518e-7558-4e71-a33a-5c76024d565c.png
- Threat Actors: Brain Cipher
- Victim Country: USA
- Victim Industry: Religious Institutions
- Victim Organization: catholic diocese of memphis
- Victim Site: cdom.org
- Oxford County falls victim to Brain Cipher Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1 TB of the organization’s data and intends to publish it within 11-12 days.
- Date: 2025-10-20T20:49:49Z
- Network: tor
- Published URL: (http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/s/aKKXx9AWBwzr2jUt3xP2r4l0btfxcWtusCH29NLXy7XLygBQgsrVFR3Vyi+j5y9g7QM4P7N95uAiFm+JQWxM6TRKTnRJN2xY)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0be0d3c9-7384-4b7e-9f41-ecfb54c4dabc.png
- Threat Actors: Brain Cipher
- Victim Country: Canada
- Victim Industry: Government Administration
- Victim Organization: oxford county
- Victim Site: oxfordcounty.ca
- Alleged Sale of France Forex leads
- Category: Data Breach
- Content: Threat actor claims to be selling leaked forex data from an unidentified call center, France. The compromised data reportedly contains 38,000 records including fname, lname, phone, geo, uid, deposit amount, etc.
- Date: 2025-10-20T20:40:07Z
- Network: tor
- Published URL: (http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-Selling-38K-France-Forex-leads-with-Deposit-and-FTDs-balance-Full-Private)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/26fc8170-aff1-402b-9c60-aed4ec417890.png
- Threat Actors: IntelSeller
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Eticex
- Category: Data Breach
- Content: Threat actor claims to be selling leaked customer data and databases from Eticex, Turkey.
- Date: 2025-10-20T20:26:49Z
- Network: tor
- Published URL: (http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-TURKEY-ETICEX-COM-HOSTING-HACKED)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/29728b19-17d7-403c-96ed-98ce30410529.png https://d34iuop8pidsy8.cloudfront.net/89266cbf-afb0-4871-b931-42ced193dabe.png
- Threat Actors: l33t
- Victim Country: Turkey
- Victim Industry: Information Technology (IT) Services
- Victim Organization: eticex
- Victim Site: eticex.com
- Orange County Bar Association falls victim to Kairos Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 114 GB of the organization’s data and intends to publish it within 6-7 days.
- Date: 2025-10-20T20:06:58Z
- Network: tor
- Published URL: (http://nerqnacjmdy3obvevyol7qhazkwkv57dwqvye5v46k5bcujtfa6sduad.onion/detail/?code=www-ocbar-org-usa-114gb)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/47a853ee-ff76-47f3-9493-e9c47658d851.png https://d34iuop8pidsy8.cloudfront.net/d251ca05-37fd-49a3-b619-f9679bb68082.png
- Threat Actors: Kairos
- Victim Country: USA
- Victim Industry: Legal Services
- Victim Organization: orange county bar association
- Victim Site: ocbar.org
- Cape Dara Resort, Pattaya falls victim to Obscura Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 80 GB of organization’s data and intends to publish it within 8-9 days.
- Date: 2025-10-20T19:24:48Z
- Network: tor
- Published URL: (http://obscurad3aphckihv7wptdxvdnl5emma6t3vikcf3c5oiiqndq6y6xad.onion/leaks/11)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5fb65d28-8e74-493b-8e17-784c25a3cfee.png
- Threat Actors: Obscura
- Victim Country: Thailand
- Victim Industry: Hospitality & Tourism
- Victim Organization: cape dara resort, pattaya
- Victim Site: capedarapattaya.com
- Selig Enterprises, Inc. falls victim to akira Ransomware
- Category: Ransomware
- Content: Group claims to have obtained 81 GB of the organization’s data. The compromised information reportedly includes Employee personal documents (passports, DLs), clients personal information (Full name, DOB, SSN, phone and so on), detailed accounting and financials, credit cards details, projects (confidential ones), drawing and specifications, NDAs, police reports and other interesting information, etc.
- Date: 2025-10-20T18:45:01Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/79db57c4-49cd-4614-889b-80604c8e2848.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: selig enterprises, inc.
- Victim Site: seligenterprises.com
- Integra BCG falls victim to DragonForce Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 459.9 GB of organization’s data and intends to publish it within 5-6 days.
- Date: 2025-10-20T18:10:39Z
- Network: tor
- Published URL: (http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/77aaf396-f7af-4002-8684-f889bfd70c28.png https://d34iuop8pidsy8.cloudfront.net/85bb7d6e-1f69-4929-9b69-776b28c954b9.png
- Threat Actors: DragonForce
- Victim Country: Guatemala
- Victim Industry: Information Technology (IT) Services
- Victim Organization: integra bcg
- Victim Site: integrasap.com
- SAACKE GmbH falls victim to LYNX Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-10-20T17:24:57Z
- Network: tor
- Published URL: (http://lynxblogco7r37jt7p5wrmfxzqze7ghxw6rihzkqc455qluacwotciyd.onion/leaks/68f647912423bc3ce0b2a6a1)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/aee5f0d8-4f8b-4f6e-9a4e-b46835561dd6.png
- Threat Actors: LYNX
- Victim Country: Germany
- Victim Industry: Machinery Manufacturing
- Victim Organization: saacke gmbh
- Victim Site: saacke.com
- Computer World WLL falls victim to BlackShrantac Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 6 TB of the organization’s data. The compromised data includes Finance info such as invoices, customers, assets, credit, HR information about employers, contracts, DL, SSNs, and more.
- Date: 2025-10-20T16:51:49Z
- Network: tor
- Published URL: (http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/6)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d1988540-85a5-4263-b0ad-a8086209dbe7.png https://d34iuop8pidsy8.cloudfront.net/f55300fb-4738-4a9a-8667-be98dfa03443.png
- Threat Actors: BlackShrantac
- Victim Country: Bahrain
- Victim Industry: Information Technology (IT) Services
- Victim Organization: computer world wll
- Victim Site: cwbah.com
- Al Ahly Leasing & Factoring Company falls victim to BlackShrantac Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 6 TB of the organization’s data. The compromised data includes Finance info such as business, funds, customer’s assets, HR information about employers, contracts, DL, SSNs, and more.
- Date: 2025-10-20T16:29:48Z
- Network: tor
- Published URL: (http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/11)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8b08cdaa-5501-4263-887d-2f2e78550f0f.png https://d34iuop8pidsy8.cloudfront.net/86b4da0d-d18d-447b-a018-70129ebb59e9.png https://d34iuop8pidsy8.cloudfront.net/3e415105-cdea-434b-b7a6-140557e1893d.png https://d34iuop8pidsy8.cloudfront.net/f5612271-95f7-49bf-b57b-760c9e0859f6.png
- Threat Actors: BlackShrantac
- Victim Country: Egypt
- Victim Industry: Financial Services
- Victim Organization: al ahly leasing & factoring company
- Victim Site: alc.com.eg
- Altas Temizlik falls victim to BlackShrantac Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 600 GB of the organization’s data. The compromised data includes Finance info such as production costs, bills, invoices, statements, payrolls, HR information about employers, contracts, DL, SSNs, and more.
- Date: 2025-10-20T16:13:53Z
- Network: tor
- Published URL: (http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/8)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e87e7188-b5f4-49f2-b82e-0ac5edb730ef.png https://d34iuop8pidsy8.cloudfront.net/e4df5e2e-1c31-4b62-957f-7ea033d3e4a9.png https://d34iuop8pidsy8.cloudfront.net/c4f4deec-ca38-4754-8e9a-6ace46fe4e11.png
- Threat Actors: BlackShrantac
- Victim Country: Turkey
- Victim Industry: Agriculture & Farming
- Victim Organization: altas temizlik
- Victim Site: altastemizlik.com.tr
- Alleged data breach of Edri Ltd
- Category: Data Breach
- Content: Threat actor claims to have leaked data from Edri Ltd. The compromised data reportedly contains 16gb records.
- Date: 2025-10-20T15:20:39Z
- Network: openweb
- Published URL: https://leakbase.la/threads/israeli-company-edri-ltd.44703/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e7028307-67ab-461f-9322-d9c18a240943.png
- Threat Actors: CyberToufan
- Victim Country: Israel
- Victim Industry: Building and construction
- Victim Organization: edri ltd
- Victim Site: edriltd.co.il
- Alleged data breach of SuperFanVerse
- Category: Data Breach
- Content: Threat actor claims to have leaked data from SuperFanVerse, USA. The compromised data reportedly from year 2024, containing users, messages, transactions data.
- Date: 2025-10-20T15:06:28Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Superfanverse-com-2024-sql-dump
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/83fbdea2-024a-46e7-9b3a-f7ad73b39fa8.png
- Threat Actors: alec3899
- Victim Country: USA
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: superfanverse
- Victim Site: superfanverse.com
- Cabinets 2000, LLC falls victim to BlackShrantac Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.5 TB of organization’s data including finance info such as production costs, bills, invoices, statements, payrolls, HR information about employers, contracts, DL, SSNs, customer service data and internal company data, etc
- Date: 2025-10-20T14:39:57Z
- Network: tor
- Published URL: (http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/10)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c0f1ffe6-4ff7-4f40-bc76-d4061932a37a.jpg https://d34iuop8pidsy8.cloudfront.net/05f8b905-2727-405e-9be4-130ee97ad48f.jpg
- Threat Actors: BlackShrantac
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: cabinets 2000, llc
- Victim Site: cabinets2000.com
- Alleged sale of log data from unidentified country
- Category: Data Breach
- Content: Threat actor claims to be selling 860 log data from unidentified country..
- Date: 2025-10-20T14:36:51Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-LEAK-FREE-TEST-LOGS-860-logs-Oct-samples
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/86f2e2ef-d862-4657-bce8-7309f29af164.JPG
- Threat Actors: BradMax
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Amazon Japan Database
- Category: Data Breach
- Content: Threat actor claims to be selling data from Amazon Japan. The compromised data reportedly contains personal data of buyers, employees, and other sensitive data.
- Date: 2025-10-20T14:27:45Z
- Network: telegram
- Published URL: https://t.me/rubiconhack/44
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2e359e23-4dd3-4dfe-9b6b-1833eb90e99f.png
- Threat Actors: Rubiconhack
- Victim Country: Japan
- Victim Industry: E-commerce & Online Stores
- Victim Organization: amazon japan
- Victim Site: amazon.co.jp
- Alleged sale of multi-module resident bot
- Category: Malware
- Content: Threat actor claims to be selling multi-module resident bot, it allows attackers to steal personal data, passwords, and crypto wallets, giving them full access to your online accounts and financial information. It can also let them control your computer remotely, spy on your activity, and use your device to hide their identity or launch more attacks.
- Date: 2025-10-20T14:14:42Z
- Network: openweb
- Published URL: https://xss.pro/threads/143858/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0540fcb3-f204-48c9-91b8-267b10307b93.JPG https://d34iuop8pidsy8.cloudfront.net/c8f9a121-d567-4579-9728-8459b560b90d.JPG
- Threat Actors: sosaaaa1337
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of crypto database from USA
- Category: Data Breach
- Content: The threat actor is allegedly leaked 1M Crypto user databases and marketing leads from USA. The datasets reportedly include sensitive user information like email, first name ,last name, phone, country, source etc.
- Date: 2025-10-20T14:01:06Z
- Network: openweb
- Published URL: https://xss.pro/threads/143856/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/da38f106-59a6-430a-9a41-bb30abb8d42a.JPG https://d34iuop8pidsy8.cloudfront.net/fda0c698-1859-4932-a546-1613a96cf8bc.JPG
- Threat Actors: databoss
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: Unknown
- Victim Site: Unknown
- Corneilhan falls victim to Ciphbit Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data and intends to publish it within 15-16 days.
- Date: 2025-10-20T13:49:16Z
- Network: tor
- Published URL: (http://ciphbitqyg26jor7eeo6xieyq7reouctefrompp6ogvhqjba7uo4xdid.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f94bf98c-d0b5-47d3-a59b-1cf40b225fec.jpg
- Threat Actors: Ciphbit
- Victim Country: France
- Victim Industry: Government Administration
- Victim Organization: corneilhan
- Victim Site: corneilhan.fr
- Seraphita falls victim to DragonForce Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 121.2 GB of organization’s data and intends to publish it within 12-13 days.
- Date: 2025-10-20T13:20:38Z
- Network: tor
- Published URL: (http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ba58c6f9-3fa5-47da-ae49-f48d30f38668.png
- Threat Actors: DragonForce
- Victim Country: Switzerland
- Victim Industry: Accounting
- Victim Organization: seraphita gmbh
- Victim Site: seraphita.ch
- Alleged data leak of Makan Bergizi Gratis
- Category: Data Breach
- Content: Threat actor claims to be leaked 2.5GB detailed engineering design from Makan Bergizi Gratis in Indonesia.NB:- The group also mentioning that they hold documents on air defense, military unit financial reports, the refurbishment of naval vessels, oil refineries, and other vital materials.
- Date: 2025-10-20T12:19:42Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-Indonesia-Dapur-Makanan-Bergizi-Gratis-Detailed-Engineering-Design-2-5-GB
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/337fcdda-1b43-4d27-8851-783a0493ffe6.JPG
- Threat Actors: toshikana
- Victim Country: Indonesia
- Victim Industry: Government & Public Sector
- Victim Organization: makan bergizi gratis
- Victim Site: Unknown
- B.+G. Schneider Treuhand AG falls victim to PEAR Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 850 GB of the organization’s data. The compromised data reportedly includes firm’s and Its Clients financials, HR, business operations, partners and vendors data, numerous PI Records, payment details, mailboxes & email, etc.
- Date: 2025-10-20T12:06:47Z
- Network: tor
- Published URL: (http://peargxn3oki34c4savcbcfqofjjwjnnyrlrbszfv6ujlx36mhrh57did.onion/Companies/schneider-treuhand/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d01b8a95-be3d-4e40-8c80-938228d18e13.jpg
- Threat Actors: PEAR
- Victim Country: Switzerland
- Victim Industry: Accounting
- Victim Organization: b.+g. schneider treuhand ag
- Victim Site: schneider-treuhand.ch
- LEHNEN Group falls victim to Nova Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 350 GB of the organization’s data and intends to publish them within 10-11 days.
- Date: 2025-10-20T10:20:51Z
- Network: tor
- Published URL: (http://novadmrkp4vbk2padk5t6pbxolndceuc7hrcq4mjaoyed6nxsqiuzyyd.onion/#)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/212df63a-d5f8-4835-a727-c81e3bbf2b32.jpg
- Threat Actors: Nova
- Victim Country: Germany
- Victim Industry: Building and construction
- Victim Organization: lehnen group
- Victim Site: gruppe-lehnen.de
- Alleged unauthorized access to St Miquel / Cherries Glamour farm greenhouse systems
- Category: Initial Access
- Content: The group claims to have gained full administrator access to the agricultural facilities management system at the St Miquel / Cherries Glamour cherry farm. They reportedly control critical systems including ventilation, humidity and temperature , heating schedules and modes, air exchange calculations, CO2 levels, silo measurements, and emergency notifications. Logs and historical measurement data are also accessible. The intrusion could allow microclimate disturbances, disabling of heating/ventilation systems, triggering mass alarms, and potential social engineering via emergency contact access, exposing significant operational and safety risks.
- Date: 2025-10-20T10:16:35Z
- Network: telegram
- Published URL: https://t.me/Z_ALLIANCE/843
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/00f3debf-2214-480f-abb0-cf0cf82aa730.png https://d34iuop8pidsy8.cloudfront.net/87796c36-8d96-4806-bd70-752f97c5d829.png https://d34iuop8pidsy8.cloudfront.net/e51811d6-188c-486b-8936-48acec37a600.png
- Threat Actors: Z-PENTEST ALLIANCE
- Victim Country: Spain
- Victim Industry: Agriculture & Farming
- Victim Organization: Unknown
- Victim Site: Unknown
- EgaraSet falls victim to DragonForce Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 44.49 GB of the organization’s data.
- Date: 2025-10-20T10:01:51Z
- Network: tor
- Published URL: (http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/77459db0-bc98-4321-95c7-c12bd3b537b3.png
- Threat Actors: DragonForce
- Victim Country: Spain
- Victim Industry: Software Development
- Victim Organization: egaraset sl
- Victim Site: egaraset.com
- Alleged data breach of SwiftOptionTrades
- Category: Data Breach
- Content: Threat actor claims to be selling data from SwiftOptionTrades. The compromised data includes Email, First name, Last name, phone number, Country, Source, Deposit Amount.
- Date: 2025-10-20T06:27:31Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Forex-recovery-depositor
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/15bc3ae1-eb3c-4fc1-b9dd-4db9653a75f8.png
- Threat Actors: Manik123
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: swiftoptiontrades
- Victim Site: swiftoptiontrades.com
- Alleged data breach of Deliver2Alaska
- Category: Data Breach
- Content: The threat actor claims to have leaked all user data from Deliver2Alaska.com, a U.S.-based mail and package forwarding service. The exposed dataset allegedly includes user IDs, full names, email addresses, Stripe customer IDs, account creation dates, mailing information, and account status details.
- Date: 2025-10-20T06:18:42Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Deliver2Alaska-com-All-User-Data
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2e2ed68d-888f-4c4d-8c82-20fac07a06f6.png
- Threat Actors: interference
- Victim Country: USA
- Victim Industry: Transportation & Logistics
- Victim Organization: deliver2alaska
- Victim Site: deliver2alaska.com
- Alleged data breach of Avnet
- Category: Data Breach
- Content: The threat actor claims to be selling the complete EMEA data lake of Avnet, an electronics distribution giant, offering 1.1 TB compressed (likely much larger when extracted). The listing alleges the dump contains Avnet’s sales strategies, customer data (including hidden high-value customer relationships), supplier lists, proprietary AI training data, strategic pricing systems, Databricks infrastructure contents, and extracted CSV/parquet tables.
- Date: 2025-10-20T06:09:23Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Electronic-Giant-Avnet-s-Complete-EMEA-Data-Lake-1-1tb-compressed-BUSINESS-INTEL
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2bbcf209-37bc-4d20-a02e-78b35de1d6d2.png
- Threat Actors: FulcrumSec
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: avnet
- Victim Site: avnet.com
- Alleged data leak of USA Driving Licence
- Category: Data Breach
- Content: Threat actor claims to be selling a private USA Driving licence pack containing more than 545 U.S. driver licences.
- Date: 2025-10-20T06:06:27Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-SELLING-PRIVATE-USA-DL-PACK-DL-FRONT-BACK-SELFIE-SSN-Fullz-ESCROW-ACCEPTE
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f2c36075-0b2b-4785-8e97-265d7c9fdb8b.png
- Threat Actors: NexuzPro
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Court Decisions of Ukraine
- Category: Data Breach
- Content: Threat actor claims to be selling 44 million case records from Court Decisions of Ukraine. The compromised data includes full names of individuals, case numbers, case types, descriptions, statuses, and the legal roles of participants such as plaintiffs, defendants, and applicants.
- Date: 2025-10-20T05:20:16Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Court-Decisions-of-Ukraine-2025
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fbd08fd9-caf6-4a72-93b7-2ddb9c11734b.png
- Threat Actors: ALEXkozyavka
- Victim Country: Ukraine
- Victim Industry: Judiciary
- Victim Organization: court decisions of ukraine
- Victim Site: reyestr.court.gov.ua
- Alleged leak of database from Argentina
- Category: Data Breach
- Content: The threat actor claims to be leaking a database containing over 10 million user records from Argentina
- Date: 2025-10-20T04:35:30Z
- Network: openweb
- Published URL: https://xss.pro/threads/143849/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ce8b9b14-7c82-4a7d-a8d8-50df338f138f.png
- Threat Actors: xSTRANGEGHOST
- Victim Country: Argentina
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Unauthorized Access to Climate Control System at STABILIMENTO ALSALAB
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the advanced climate control system of STABILIMENTO ALSALAB in Italy. The system manages air handling units (UTA), heat pump, pressure, energy use, and alarm controls within the facility. It ensures precise regulation of temperature, humidity, and air quality essential for production and research. The system also includes intelligent energy management and automatic fault recovery,
- Date: 2025-10-20T03:38:56Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/2026
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d5816285-68db-46a2-87e0-08912d3bee9b.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Italy
- Victim Industry: Manufacturing
- Victim Organization: stabilimento alsalab
- Victim Site: alsalab.it
- Alleged data breach of Konecta
- Category: Data Breach
- Content: The threat actor claims to have leaked data from the Peruvian branch of the call center company Konecta. The exposed information allegedly includes personal identification details, financial information, technical data, location and contact information, and records of services purchased.
- Date: 2025-10-20T01:00:54Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-KONECTA-PERU-2025
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bfb63a4a-87a9-4a11-993d-f682a432e230.png https://d34iuop8pidsy8.cloudfront.net/899202a4-d62a-4379-95e2-8b0f4a6a6f18.png
- Threat Actors: deadmanpe
- Victim Country: Peru
- Victim Industry: Outsourcing & Offshoring
- Victim Organization: konecta
- Victim Site: konecta.com
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats.
Ransomware attacks are highly prominent, primarily by the Sinobi and BlackShrantac groups, targeting a variety of sectors including Real Estate (Brazil, USA), Hospital & Health Care (USA), Information Technology (IT) Services (Bahrain, Guatemala, USA), and Financial Services (Egypt), often compromising massive amounts of data ranging up to 6 TB. Other notable ransomware groups include Brain Cipher, Kairos, Obscura, akira, LYNX, Ciphbit, DragonForce, PEAR, and Nova, affecting organizations in Canada, USA, Thailand, Germany, Switzerland, France, and Spain.
Data Breach incidents involve the sale or leak of sensitive information across a wide spectrum:
- Customer/User Data: Financial leads (France, USA), user data from an e-commerce site (USA), a massive database from Argentina (over 10 million records), and detailed user information from a social media platform (USA).
- Corporate/Sensitive Data: The complete EMEA data lake from a major electronics distributor (Avnet, USA), detailed engineering designs and sensitive military documents (Indonesia), and customer/database leaks from a Turkish IT services company (Eticex).
- Personal Identifiable Information (PII): A private pack of US driver’s licenses, personal data from Amazon Japan, and 44 million case records from the Court Decisions of Ukraine.
Initial Access remains a critical threat vector, with threat actors offering access to:
- High-Value Systems: Binance support panel.
- Industrial Control Systems (ICS): The STABILIMENTO ALSALAB climate control system and unnamed industrial equipment control panel in Italy, as well as an agricultural facilities management system in Spain, demonstrating a clear focus on disrupting operational technology (OT) environments.
The market for Malware is also active, with the alleged sale of a multi-module resident bot and a cracked version of the XWorm 6.5 tool, underscoring the readily available offensive capabilities in the cyber underground.
The concentration of successful attacks across diverse sectors and geographies emphasizes the critical importance of robust cybersecurity measures, continuous monitoring, and proactive threat intelligence to defend against sophisticated and opportunistic attacks.