This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Fulgar S.p.A. falls victim to RansomHouse Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s internal data.
- Date: 2025-11-11T23:36:22Z
- Network: tor
- Published URL: (http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/r/b864826ddb58ac4b98088b1fa1fa2439fabd7bb2)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d22bc624-33a4-4b05-9c5e-354ed9c47ac3.png
- Threat Actors: RansomHouse
- Victim Country: Italy
- Victim Industry: Textiles
- Victim Organization: fulgar s.p.a.
- Victim Site: fulgar.com
- Alleged access to FTP SERVER from USA
- Category: Initial Access
- Content: The threat actor claims to have gained unauthorized FTP SERVER ACCESS from USA.
- Date: 2025-11-11T22:10:25Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-USA-%F0%9F%87%BA%F0%9F%87%B8-FTP-SERVER-ACCESS-6-9-Billion)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f1f75bbe-4b0d-4caf-b8c7-db28c38b7c3a.png
- Threat Actors: Dark_Alpha
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: Unknown
- Victim Site: Unknown
- Brenda Richardson Memorial Care Home LLC falls victim to Anubis Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T22:06:01Z
- Network: tor
- Published URL: (http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/r/VhqpF6JDKUx6XirvcywDPPsGiKofSZ3752Chh5Qv3nK0q6jkRDAE3iFUxX06S0AGlmAOx74l2jYJ2D+byz121xOFByZEZt)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c534a222-3865-46ee-8351-b3e5c0b27605.png https://d34iuop8pidsy8.cloudfront.net/7f9c04b6-22f3-4548-9960-1794211a1e39.png https://d34iuop8pidsy8.cloudfront.net/8a637135-3a0e-4886-b172-8c4ee0f50a65.png https://d34iuop8pidsy8.cloudfront.net/2319b9a5-8d57-42ea-8a98-85c0b611c710.png
- Threat Actors: ANUBIS
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: brenda richardson memorial care home llc
- Victim Site: brmch.com
- Alleged data breach of Appsim
- Category: Data Breach
- Content: Threat actor claims to have leaked 10,99,825 records 7.4 GB of from Appsim.
- Date: 2025-11-11T21:36:14Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Appsim-vn-Data-Breach)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/83348360-e3d8-49cc-8dab-f7f5682d809f.png
- Threat Actors: Spirigatito
- Victim Country: Vietnam
- Victim Industry: Unknown
- Victim Organization: appsim
- Victim Site: appsim.vn
- Alleged sale of confidential ID/passport images
- Category: Data Breach
- Content: The threat actor claims to be selling a dataset of 14,000 images of identity documents (IDs, passports, driver’s licenses) allegedly exfiltrated from a hotel system in Brazil; the actor also offers access to the compromised hotel system and customer/credit-card data.
- Date: 2025-11-11T21:30:39Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/269964/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a682abcd-8437-40c5-811a-64d8e97cdba5.png https://d34iuop8pidsy8.cloudfront.net/f2fbb9fd-766a-4c6e-9141-3af420890a3c.png
- Threat Actors: s4sori
- Victim Country: Brazil
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Olive Branch Family Medical Center falls victim to Anubis Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T21:02:26Z
- Network: tor
- Published URL: (http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/r/ogoG9ZXUcwQYYtWkD15htBDgjK2MHhrpuQkA7DI+zZBrqB8Rlc6pD9rXwcFveS0Q87x0+7Nao+W0HYLVneLEhsVTJmN1lk)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a0a35711-a7a6-4386-9440-e0deabe46907.png https://d34iuop8pidsy8.cloudfront.net/13518e87-e652-4219-a8f6-8c0a6419e896.png
- Threat Actors: ANUBIS
- Victim Country: USA
- Victim Industry: Medical Practice
- Victim Organization: olive branch family medical center
- Victim Site: obfmc.com
- Dartmouth College falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-11-11T20:12:35Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/dartmouth-edu)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0a8fda8f-598e-42ed-8729-dae4af046a3f.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Higher Education/Acadamia
- Victim Organization: dartmouth college
- Victim Site: dartmouth.edu
- Irwin Car & Equipment falls victim to Payouts King ransomware
- Category: Ransomware
- Content: The group claims to have obtained 272 GB of the organization’s data.
- Date: 2025-11-11T19:53:38Z
- Network: tor
- Published URL: (https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a71cc279-f6f4-49a7-bf8b-d2a0a45d2c7c.jpg
- Threat Actors: Payouts King
- Victim Country: USA
- Victim Industry: Mining/Metals
- Victim Organization: irwin car & equipment
- Victim Site: irwincar.com
- Alleged data breach of International Kiteboarding Organization – IKO
- Category: Data Breach
- Content: The threat actor claims to have leaked data from the International Kiteboarding Organization (IKO).
- Date: 2025-11-11T19:25:05Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-International-Kiteboarding-Organization-Data-Breach)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3b8c29cb-a788-4e0b-b09e-c992a6517f6b.png
- Threat Actors: 888
- Victim Country: Dominican Republic
- Victim Industry: Sports
- Victim Organization: international kiteboarding organization – iko
- Victim Site: ikointl.com
- Glendale Obstetrics and Gynecology falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.u
- Date: 2025-11-11T19:02:02Z
- Network: tor
- Published URL: (http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/glendaleobgyncom/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b844fec7-0ea6-4ad1-918e-ab1d026bd745.png
- Threat Actors: SAFEPAY
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: glendale obstetrics and gynecology
- Victim Site: glendaleobgyn.com
- Alleged sale of leads from USA
- Category: Data Breach
- Content: Threat actor claims to be selling fresh leads from USA.
- Date: 2025-11-11T18:10:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-USA-fresh-2025-leads-avilable-39-million-valid-rows)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a8c7f4a0-037c-4fec-967f-c734978481ee.png
- Threat Actors: yeestge33
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Manusos General Contracting falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 780 GB of the organization’s data. The compromised data reportedly includes project data, contracts and NDA, financial data, network users folders, management folders, data exfiltrated from company file server.
- Date: 2025-11-11T18:02:29Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/0a3979bf30d820dd31d5/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a2541290-9394-4322-8315-9e0273648a8b.png
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: manusos general contracting
- Victim Site: manusosinc.com
- Legion targets the website of Twsaa
- Category: Defacement
- Content: Group claims to have deface the website of Twsaa.
- Date: 2025-11-11T18:00:36Z
- Network: telegram
- Published URL: (https://t.me/Legion_offlcail/621)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d4d4b17e-c30f-44dd-b3ac-df21d0e1171e.png
- Threat Actors: Legion
- Victim Country: UAE
- Victim Industry: E-commerce & Online Stores
- Victim Organization: twsaa
- Victim Site: nwff.twsaa.ae
- Lows Orkney falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.2 TB of the organization’s data. The compromised data reportedly includes clients data, financial data, personal data, contracts and NDA, network users folders, management folders, data exfiltrated from company file server. The group intends to publish the data within 2-3 days.
- Date: 2025-11-11T17:55:52Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/679e791eb3035ad93674/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d1704192-394c-4a47-babd-5f5bda455480.png
- Threat Actors: GENESIS
- Victim Country: UK
- Victim Industry: Legal Services
- Victim Organization: lows orkney
- Victim Site: lowsorkney.co.uk
- Continental Conveyor falls victim to GENESIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 200 GB of the organization’s data. The compromised data reportedly includes supply-chain data, contracts and NDA, financial data, clients data, technical data, data exfiltrated from company file server.
- Date: 2025-11-11T17:44:55Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/b80c0de55cbbc24229e1/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/aa091ecb-3449-4cbb-8a26-aea7169eb43c.png
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: continental conveyor
- Victim Site: cgmh.com
- S.B. Conrad, Inc falls victim to GENESIS ransomware
- Category: Ransomware
- Content: The group claims to have obtained 500 GB of the organization’s data. The compromised data reportedly includes project data, contracts and NDA, financial data, technical data, network users folders, management folders, data exfiltrated from company file server.
- Date: 2025-11-11T17:34:30Z
- Network: tor
- Published URL: (http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/e8e330cd0bc243e8fe62/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/19d52aac-2af3-45c2-8c5d-775402265e3e.png
- Threat Actors: GENESIS
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: s.b. conrad, inc
- Victim Site: sbconrad.com
- Alleged sale of Renfe Operadora database
- Category: Data Breach
- Content: The threat actor claims to be selling Renfe Operadora database.
- Date: 2025-11-11T16:01:35Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/renfe-2025-11-db-avilable-on-priva1e-channe1-to-b0y-acces-dm-telgram.45736/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0eb81ccc-b7a7-4eef-bfc5-dd7234afc6f3.png
- Threat Actors: jdudjbdd
- Victim Country: Spain
- Victim Industry: Transportation & Logistics
- Victim Organization: renfe operadora
- Victim Site: renfe.com
- Alleged database sale of BTC-e
- Category: Data Breach
- Content: The group claims to be selling a database allegedly belonging to BTC-e. The dataset reportedly contains 1,127,416 records, including email addresses, IP addresses, wallet balances, hashed passwords, nicknames, and full names.
- Date: 2025-11-11T14:21:16Z
- Network: telegram
- Published URL: (https://t.me/h3c4kedzsec_official/24)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/50f4b054-e14e-4e47-811c-ea045b2555e5.png
- Threat Actors: H3C4KEDZ
- Victim Country: Russia
- Victim Industry: Financial Services
- Victim Organization: btc-e
- Victim Site: btc-e.com
- Octomeca Oy falls victim to RansomHouse Ransomware
- Category: Ransomware
- Content: The group claims to have obtained of the organization’s data.
- Date: 2025-11-11T14:18:35Z
- Network: tor
- Published URL: (http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/r/1e7b394c44a45925914d3a8a324fe5723a4f1bd5)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e03e2677-05fb-413d-8ec5-aef0c9f56980.jpg
- Threat Actors: RansomHouse
- Victim Country: Finland
- Victim Industry: Manufacturing
- Victim Organization: octomeca oy
- Victim Site: octomeca.fi
- Public Safety Mutual Benefit Fund falls victim to RansomHouse Ransomware
- Category: Ransomware
- Content: The group claims to have obtained of the organization’s data.
- Date: 2025-11-11T14:03:52Z
- Network: tor
- Published URL: (http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/r/5e3c3d3356682f21a266efa7196cf00dfa414419)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/43826b8e-774c-4f40-b821-b5addee9fcc8.jpg
- Threat Actors: RansomHouse
- Victim Country: Philippines
- Victim Industry: Insurance
- Victim Organization: public safety mutual benefit fund inc.
- Victim Site: psmbfi.com.ph
- Alleged data breach of Militant Zone
- Category: Data Breach
- Content: The group claims to have obtained the database of Militant Zone, identifying buyers using mail.ru domains. According to their statement, buyer information, card details, and personal data protected under Federal Law 152 were extracted and subsequently reported to the relevant authorities.
- Date: 2025-11-11T13:54:39Z
- Network: telegram
- Published URL: (https://t.me/ru_62IX/156)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/300f0b9d-c96a-424a-b169-a51d1c193ca1.png
- Threat Actors: 62IX GROUP
- Victim Country: Ukraine
- Victim Industry: Retail Industry
- Victim Organization: militant zone
- Victim Site: militant.zone
- Alleged sale of admin access to Supreme Court of the Republic of Indonesia
- Category: Initial Access
- Content: The threat actor calims to be selling unauthorized admin access to Supreme Court of the Republic of Indonesia.
- Date: 2025-11-11T13:31:04Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Indonesia-Supreme-Court-administrator-access-for-sale-https-putusan-mahkamahagung)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/718355f5-f3c0-45d1-a4f6-0e1e5f67c582.png
- Threat Actors: yeestge33
- Victim Country: Indonesia
- Victim Industry: Judiciary
- Victim Organization: supreme court of the republic of indonesia
- Victim Site: putusan.mahkamahagung.go.id
- Alleged data sale of Kabutan
- Category: Data Breach
- Content: The threat actor claims to be selling 420,000 Kabutan Stock & Investors records, allegedly containing phone numbers, first and last names, gender, email addresses, and websites.
- Date: 2025-11-11T13:26:16Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Kabutan-Stock-Investors-420-000-Website-https-kabutan-jp)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8fe7ecb7-b4df-4fdf-a35e-a04cc9d1e989.png
- Threat Actors: yeestge33
- Victim Country: Japan
- Victim Industry: Financial Services
- Victim Organization: kabutan
- Victim Site: kabutan.jp
- Alleged data sale of stepping stone AG
- Category: Data Breach
- Content: The threat actor claims to be selling data from stepping stone AG.
- Date: 2025-11-11T13:20:40Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Stepping-Stone-AG-Database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ad6076e9-16c7-4a1e-823e-4b41da3674a2.png
- Threat Actors: ByteToBreach
- Victim Country: Switzerland
- Victim Industry: Information Technology (IT) Services
- Victim Organization: stepping stone ag
- Victim Site: stepping-stone.ch
- Omnium International Ltd., falls victim to DEVMAN 2.0 Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.2 TB of the organization’s data and intends to publish them within 3 – 4 days.
- Date: 2025-11-11T13:04:33Z
- Network: tor
- Published URL: (http://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/edb9f8fe-0cf1-422f-bd0f-1cbf240cf013.png
- Threat Actors: DEVMAN 2.0
- Victim Country: UAE
- Victim Industry: Building and construction
- Victim Organization: omnium international ltd.
- Victim Site: omniumint.com
- Alleged unauthorized access to RabbitMQ
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to RabbitMQ.
- Date: 2025-11-11T12:54:23Z
- Network: telegram
- Published URL: (https://t.me/c/3186755612/18)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/98309cdb-6a47-406b-947a-1054bfdb9f12.JPG
- Threat Actors: TRUTH LEGION 707
- Victim Country: UK
- Victim Industry: Software Development
- Victim Organization: rabbitmq
- Victim Site: rabbitmq.com
- Brian-Kyles Construction, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T12:35:39Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=591f0b91-fd5a-35b4-a8c2-2fc981947407)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6d4bf8f4-4061-4bf5-ba28-dc535316b31a.jpg
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: brian-kyles construction, inc.
- Victim Site: briankyles.com
- Polidano Group falls victim to RansomHouse Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T11:37:32Z
- Network: tor
- Published URL: (http://zohlm7ahjwegcedoz7lrdrti7bvpofymcayotp744qhx6gjmxbuo2yid.onion/r/874211b57a2f22986f9d9ddd87c751d9b45a3821)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/fc54d03c-4797-4a3a-bb37-b7a12a4646b6.jpg
- Threat Actors: RansomHouse
- Victim Country: Malta
- Victim Industry: Building and construction
- Victim Organization: polidano group
- Victim Site: polidano-group.com
- NoName targets the website of Proximus Group
- Category: Phishing
- Content: Proof of downtime: http://check-host.net/check-report/321ae65ck60d
- Date: 2025-11-11T10:54:54Z
- Network: telegram
- Published URL: (https://t.me/c/2787466017/328)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/140b5149-4227-4751-a353-18eaf4b9ee74.png
- Threat Actors: NoName057(16)
- Victim Country: Belgium
- Victim Industry: Network & Telecommunications
- Victim Organization: proximus group
- Victim Site: proximus.com
- Alleged data sale of Commonwealth of Learning
- Category: Data Breach
- Content: The threat actor claims be selling 150k lines of data from Commonwealth of Learning, Allegedly containing id, session id, user id, name, email and role.
- Date: 2025-11-11T10:44:47Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Canada-Database-colcommons-org-150K)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/802c1132-25d0-48b8-8764-f13215473182.png
- Threat Actors: Robert2025
- Victim Country: Canada
- Victim Industry: E-Learning
- Victim Organization: commonwealth of learning
- Victim Site: colcommons.org
- Alleged data breach of Worldskandi VIP
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Worldskandi VIP, allegedly containing records of 100 users, 200 payments, and 40 support tickets, including emails, usernames, passwords, payment details, and ticket messages.
- Date: 2025-11-11T10:22:17Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-vipworldskandi-Database–58901)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c0ff0990-179f-4f89-bf87-c058a5a9202c.png
- Threat Actors: Perjury7764
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: worldskandi vip
- Victim Site: vipworldskandi.to
- Alleged leak of admin access to Elaph Translation
- Category: Initial Access
- Content: The threat actor claims to have gained unauthorized admin access to Elaph Translation.
- Date: 2025-11-11T09:55:11Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-translation-services-company-elaphtranslation-ae-in-Dubai-admin-access)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/959fc31b-d93e-408e-9dd6-f9e19174be76.png
- Threat Actors: crazyboy68
- Victim Country: UAE
- Victim Industry: Translation & Localization
- Victim Organization: elaph translation
- Victim Site: elaphtranslation.ae
- Alleged sale of unauthorized access to unidentified Interactive Business Management System in Pakistan
- Category: Initial Access
- Content: The group claims to be selling unauthorized access to an unidentified Interactive Business Management System (IBMS) in Pakistan.
- Date: 2025-11-11T09:46:28Z
- Network: telegram
- Published URL: (https://t.me/c/2100198323/707)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/737a0455-6ba3-4145-9e34-2348b2306c36.png
- Threat Actors: KINGSMAN INDIA
- Victim Country: Pakistan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of access to LCRST system of the Directorate General of Food, Bangladesh
- Category: Initial Access
- Content: The group claims to be selling unauthorized access to the LCRST system belonging to the Directorate General of Food.
- Date: 2025-11-11T09:10:38Z
- Network: telegram
- Published URL: (https://t.me/c/2100198323/706)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6cec9dd6-d501-4179-b555-0ed8060040f0.png
- Threat Actors: KINGSMAN INDIA
- Victim Country: Bangladesh
- Victim Industry: Government Administration
- Victim Organization: directorate general of food
- Victim Site: dgfood.gov.bd
- S. Himmelstein and Company falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data.
- Date: 2025-11-11T08:29:37Z
- Network: tor
- Published URL: (http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/himmelsteincom/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cefdfc85-7697-4bea-8a1c-1c9c15aac373.jpg
- Threat Actors: SAFEPAY
- Victim Country: USA
- Victim Industry: Industrial Automation
- Victim Organization: s. himmelstein and company
- Victim Site: himmelstein.com
- State of Guanajuato falls victim to TEKIR APT Ransomware
- Category: Ransomware
- Content: The group claims to have obtained access to and encrypted all subdomains of the state of Guanajuato, including the attorney general’s office, police department, and municipality. All backups have reportedly been deleted. The compromised data includes over 250 GB of sensitive information, such as personal identification details, legal case files, and internal communications. They intend to publish the data by November 20, 2025. Note: The authenticity of the claims has yet to be verified.
- Date: 2025-11-11T08:25:04Z
- Network: tor
- Published URL: (http://hgjytemoe4ooaqzvqsstm6czcxtkcpjn2c2ojlchtwl4hxk6jguq7qid.onion/victim-poc.html?domain=pgj-gto.gob.mx)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/171cc1bf-e302-4177-96f1-bfc94e65e742.png https://d34iuop8pidsy8.cloudfront.net/42f5dbd8-8442-49f3-9efd-f3e7ed51fff9.png
- Threat Actors: TEKIR APT
- Victim Country: Mexico
- Victim Industry: Government Administration
- Victim Organization: state of guanajuato
- Victim Site: pgj-gto.gob.mx
- Alleged data sale of unidentified clinical laboratory in northern Mexico
- Category: Data Breach
- Content: The threat actor claims to be selling phpmyAdmin access and databases allegedly containing sensitive information from an unidentified clinical laboratory company based in northern Mexico. The compromised data reportedly includes detailed records of patients and medical professionals, including doctors and laboratory staff.
- Date: 2025-11-11T08:02:38Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-MX-Clinical-Laboratories-Db-s-Vulnerabilities)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7fe2d033-503e-456a-92fd-5f1cf6acf0d5.png https://d34iuop8pidsy8.cloudfront.net/3d0984b3-dfa9-46f5-8b8f-ce7937ddacb0.png
- Threat Actors: icaro
- Victim Country: Mexico
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Cloak ransomware group adds an unknown victim (Con*******.com)
- Category: Ransomware
- Content: The group claims to have obtained 245 GB of the organization’s data.
- Date: 2025-11-11T07:22:35Z
- Network: tor
- Published URL: (http://cloak7jpvcb73rtx2ff7kaw2kholu7bdiivxpzbhlny4ybz75dpxckqd.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/037d3d1b-bdba-4088-8aae-7e62f5bd6d5b.jpg
- Threat Actors: Cloak
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of tutorial on unpack and analyze malware
- Category: Data Breach
- Content: The threat actor claims to be sharing a detailed tutorial on how to unpack and analyze malware, specifically focusing on unpacking a Trojan using various reverse engineering techniques.
- Date: 2025-11-11T07:14:20Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Zero2Auto-%E2%80%93-Initial-Stagers-From-one-Email-to-a-Trojan)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/52881cab-6462-41c4-8042-5de4c810cbe4.png https://d34iuop8pidsy8.cloudfront.net/763f770a-423b-457e-81db-75dc189f3b01.png https://d34iuop8pidsy8.cloudfront.net/b28fee0d-0244-4fc4-81ab-bb961940e572.png https://d34iuop8pidsy8.cloudfront.net/8c2d4138-0764-4e48-9b7c-b5b225f16334.png https://d34iuop8pidsy8.cloudfront.net/c4c198e3-a66d-4c48-b619-4fc9c34e0ed9.png
- Threat Actors: rajeshp
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Israeli email addresses
- Category: Data Breach
- Content: The threat actor claims to be selling 22,424 Israeli email addresses.
- Date: 2025-11-11T06:58:34Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-22-000-Fresh-Israel-Emails-Addresses-30)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/51988e04-32e5-4fad-a926-7e27ba793487.png
- Threat Actors: Moscow
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Philippine payment system technical documents
- Category: Data Breach
- Content: The threat actor claims to be selling confidential technical documents on the Philippine payment system, including QRPh implementation and InstaPay transaction details, with potential to exploit system vulnerabilities for fraudulent activities.
- Date: 2025-11-11T06:47:51Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%87%B5%F0%9F%87%AD-1-3GB-Philippine-Payment-System-Technical-Docs)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9ab53df4-4504-4926-ae55-59b6ccc7053d.png
- Threat Actors: kfcnigger
- Victim Country: Philippines
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Sarcoma ransomware group has added an unidentified victim
- Category: Ransomware
- Content: The group claims to have obtained 436 GB of organization’s data and intends to publish it within the 7 days.
- Date: 2025-11-11T06:29:08Z
- Network: tor
- Published URL: (http://sarcomawmawlhov7o5mdhz4eszxxlkyaoiyiy2b5iwxnds2dmb4jakad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6be11c26-99eb-4231-bd6e-01e5c9773230.png https://d34iuop8pidsy8.cloudfront.net/c5254d05-1e39-448b-8efd-56175520a5e7.png
- Threat Actors: Sarcoma
- Victim Country: Switzerland
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of SearchHub.vip MongoDB Database
- Category: Data Breach
- Content: The threat actor claims to be selling a leaked MongoDB database allegedly exfiltrated from SearchHub.vip, an OSINT and search optimization platform registered in Sweden. The exposed dataset reportedly includes usernames, plaintext passwords, hashed credentials, and timestamp metadata.
- Date: 2025-11-11T06:18:23Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/searchub-vip-data-mongodb-leak-osint-tools.45696/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5198bf6a-57cc-49a9-adc8-66327f79aa69.png
- Threat Actors: uhqboy
- Victim Country: Sweden
- Victim Industry: Information Technology (IT) Services
- Victim Organization: searchhub.vip
- Victim Site: searchhub.vip
- Paul Hildebrandt AG falls victim to Sarcoma Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.4 TB of the organization’s internal data. Update: On November 11, 2025, they revealed the full domain name and published samples of the compromised data on their dark web portal.
- Date: 2025-11-11T05:53:42Z
- Network: tor
- Published URL: (http://sarcomawmawlhov7o5mdhz4eszxxlkyaoiyiy2b5iwxnds2dmb4jakad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e61ee71c-655e-4624-b520-ccdf396e89d1.png https://d34iuop8pidsy8.cloudfront.net/11995ba9-61fd-47e6-86f9-601bdf96aa46.png https://d34iuop8pidsy8.cloudfront.net/5912165e-710c-4ee1-81cc-d8613c3b5e59.png https://d34iuop8pidsy8.cloudfront.net/d09bd2ef-5681-429e-b502-78d6b23267d9.png
- Threat Actors: Sarcoma
- Victim Country: Germany
- Victim Industry: Packaging & Containers
- Victim Organization: paul hildebrandt ag
- Victim Site: hildebrandt.de
- Alleged data breach of Vix
- Category: Data Breach
- Content: Threat actor claims to be selling user activity and location data from Vix.
- Date: 2025-11-11T05:46:11Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-VIX)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4feb37c4-4663-4c4e-8220-cce4b9caa30d.jpeg
- Threat Actors: icaro
- Victim Country: USA
- Victim Industry: Media Production
- Victim Organization: vix
- Victim Site: assets.vix.com
- Alleged unauthorized access to meepShop
- Category: Initial Access
- Content: Threat actor claims to have gained unauthorized access to meepShop.
- Date: 2025-11-11T05:45:34Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Access-to-build-a-shopping-site-meepshop-tw-Taiwan)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/14d3cc0a-c375-4177-a0ad-a726a974b371.png
- Threat Actors: blackhunter1
- Victim Country: Taiwan
- Victim Industry: E-commerce & Online Stores
- Victim Organization: meepshop
- Victim Site: meepshop.com
- Globus & Cosmos falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T05:19:59Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/globusandcosmos-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b7513af8-ce5f-4917-b50b-7abda851721b.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Leisure & Travel
- Victim Organization: globus & cosmos
- Victim Site: globusandcosmos.com
- Alleged sale of 0xPay
- Category: Malware
- Content: The threat actor claims to be selling a cryptocurrency payment processor called 0xPay, designed for handling TON and Jetton (USDT, NOT, and others) transactions. The tool supports memo-based payments to minimize fees, includes webhook notifications, and provides an API for TON Connect integration. Built with TypeScript, PostgreSQL, and Docker
- Date: 2025-11-11T04:57:14Z
- Network: openweb
- Published URL: (https://xss.pro/threads/144216/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2019f140-682c-4644-bc91-30bf031caf8b.png
- Threat Actors: shuriken0x1
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Unauthorized Access to Protected Agricultural Control System – Japan
- Category: Initial Access
- Content: The group claims to have gained access to a system in Japan that manages greenhouses and conservatories. It controls climate, ventilation, and curtains to regulate light, temperature, and humidity. The system also handles intelligent irrigation based on schedules, light intensity, and plant growth. It monitors temperature, humidity, dew point, and CO₂ levels in real time, while optimizing energy consumption. The system is designed to maintain a stable and efficient environment for protected agriculture.
- Date: 2025-11-11T04:32:58Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/2380)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0063789d-3734-45d4-9667-49637c707b4b.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Japan
- Victim Industry: Agriculture & Farming
- Victim Organization: Unknown
- Victim Site: Unknown
- Vascara falls victim to NightSpire Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 30 GB of the organization’s data and intends to publish it within 18 days.
- Date: 2025-11-11T04:13:20Z
- Network: tor
- Published URL: (http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/181456ad-cec0-4842-b5c8-8459436c00d7.png
- Threat Actors: NightSpire
- Victim Country: Vietnam
- Victim Industry: Fashion & Apparel
- Victim Organization: vascara
- Victim Site: vascara.com
- Alleged Unauthorized Access to Iranian Individual’s Computer
- Category: Initial Access
- Content: The group claims to have provided access credentials to a compromised computer belonging to an individual in Iran. According to the post, the system contains various data and documents, and a login link along with credentials was shared, suggesting unauthorized remote access to personal files and information.
- Date: 2025-11-11T04:02:56Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/2379)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2a621231-2ca6-43a6-af0a-78415f2380d9.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Iran
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Unauthorized Access to Italian Industrial Furnace Control System
- Category: Initial Access
- Content: The group claims to have gained access to an industrial furnace management system in Italy, responsible for controlling the Forno furnace operations. The compromised system reportedly regulates burner temperatures (Bruciatori), monitors heating zones (Cottura 1, 2, 3), compares real-time readings with setpoints, and records operational data (REC ON). It also includes an emergency shutdown feature (ARRESTA FORNO) to prevent malfunctions or safety hazards. The attackers allege that their access provided full visibility and control over the furnace’s temperature regulation and safety mechanisms.
- Date: 2025-11-11T03:43:40Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/2378)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5e3f9796-922e-45a2-a534-e5266c12f082.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Italy
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Samcrete Holding falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T03:30:10Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/samcrete-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4d14046e-85a6-4100-9e91-1bee3b8c1d9b.png
- Threat Actors: CL0P
- Victim Country: Egypt
- Victim Industry: Building and construction
- Victim Organization: samcrete holdings
- Victim Site: samcrete.com
- NHS England falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data. Note: NHS England was previously listed in a data leak incident on October 22, 2024.
- Date: 2025-11-11T03:11:14Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/nhs-uk)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2879147f-63aa-4e18-bdc8-41862b9f1016.png
- Threat Actors: CL0P
- Victim Country: UK
- Victim Industry: Hospital & Health Care
- Victim Organization: nhs england
- Victim Site: nhs.uk
- Alleged data sale of National Civil Service Commission of Colombia
- Category: Data Breach
- Content: Threat actor claims to be selling 2.9 TB of data from National Civil Service Commission of Colombia.
- Date: 2025-11-11T03:08:08Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-National-Civil-Service-Commission-of-Colombia-cnsc-gov-co-2-9-TB)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/310b97c9-d3ae-42fa-9f96-79ab5d694bff.png
- Threat Actors: Kazu
- Victim Country: Colombia
- Victim Industry: Government Administration
- Victim Organization: national civil service commission of colombia
- Victim Site: cnsc.gov.co
- Agritech Limited falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T02:51:42Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/pafl-com-pk)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3c8c4025-030b-4963-a5e6-0d2f720345c9.png
- Threat Actors: CL0P
- Victim Country: Pakistan
- Victim Industry: Chemical Manufacturing
- Victim Organization: agritech limited
- Victim Site: pafl.com.pk
- Pharaoh’s Team targets the website of Erennur Turizm
- Category: Defacement
- Content: The group claims to have defaced the website of Erennur Turizm.
- Date: 2025-11-11T02:38:32Z
- Network: telegram
- Published URL: (https://t.me/Pharaohs_n/296)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d23d08b8-f644-4e32-8496-883794590496.png
- Threat Actors: Pharaoh’s Team
- Victim Country: Iraq
- Victim Industry: Leisure & Travel
- Victim Organization: erennur turizm
- Victim Site: erennur.com.tr
- Gaea Global Technologies, Inc. falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T02:30:35Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/gaeaglobal-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1c19307e-c637-4765-bc85-0ab78b4737b1.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: gaea global technologies, inc.
- Victim Site: gaeaglobal.com
- Pharaoh’s Team targets multiple websites
- Category: Defacement
- Content: The group claims to have defaced multiple websites.
- Date: 2025-11-11T02:27:50Z
- Network: telegram
- Published URL: (https://t.me/Pharaohs_n/292)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ca61cd38-c2f1-4b66-a688-4b5ffba4007d.png
- Threat Actors: Pharaoh’s Team
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: almowakaba.com
- P2 Energy Services, LLC falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T02:23:31Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/p2energyservices-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/44113e6f-f17e-4fae-aaa9-fec19fd8ab97.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: p2 energy services, llc
- Victim Site: p2energyservices.com
- ennVee TechnoGroup Inc. falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T02:15:22Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/ennvee-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1bfcf9a4-ac8d-4a13-985c-8f0cebddc717.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: ennvee technogroup inc.
- Victim Site: ennvee.com
- Carglass Germany falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T02:08:42Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/carglass-de)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/400230be-fa9b-4185-ab95-550b03d24749.png
- Threat Actors: CL0P
- Victim Country: Germany
- Victim Industry: Automotive
- Victim Organization: carglass germany
- Victim Site: carglass.de
- Vitamix falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T01:58:51Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/vitamix-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/edac550f-7d15-4fbd-bf17-ae0ce1ae3a7f.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Manufacturing
- Victim Organization: vitamix
- Victim Site: vitamix.com
- Alleged data sale of China Airlines
- Category: Data Breach
- Content: Threat actor claims to have leaked data from China Airlines. NB: Authenticity of the claim is yet to be verified and the organization was previously breached on May 22, 2025.
- Date: 2025-11-11T01:58:35Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/china-airlines-2025-09-db-avilable-just-dm.45694/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/92da31c6-255d-42cd-9c24-c9a5807a5d5b.png
- Threat Actors: jdudjbdd
- Victim Country: Taiwan
- Victim Industry: Airlines & Aviation
- Victim Organization: china airlines
- Victim Site: china-airlines.com
- Garden of Life, LLC falls victim to CL0P Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data.
- Date: 2025-11-11T01:54:56Z
- Network: tor
- Published URL: (http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/gardenoflife-com)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cf574536-09fb-4127-9324-ea887b3b6410.png
- Threat Actors: CL0P
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: garden of life, llc
- Victim Site: gardenoflife.com
- Shanghai Hongji Metal falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 2.6 TB of the organization’s data, including confidential documents, financial records, HR files, internal contracts, and incident reports. They intend to publish the full data within 3 days.
- Date: 2025-11-11T01:22:22Z
- Network: tor
- Published URL: (http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/691281b188b6823fa267b425)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/16952727-b74c-4816-82ba-a9176fd48adb.png https://d34iuop8pidsy8.cloudfront.net/8755d1b1-2e2e-4513-92e2-8b56ef311d23.png
- Threat Actors: Sinobi
- Victim Country: China
- Victim Industry: Automotive
- Victim Organization: shanghai hongji metal
- Victim Site: hongjimetal.com
- Middlesex Endodontics falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 350 GB of the organization’s data, including customer records, financial information, and other confidential documents. They intend to publish the data within 13 days.
- Date: 2025-11-11T01:09:02Z
- Network: tor
- Published URL: (http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/6910f67688b6823fa25dde23)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0aef1a9d-11cd-4631-aeca-235cbbbf8493.png https://d34iuop8pidsy8.cloudfront.net/05fcfda0-4e6a-4c14-afcd-bef246bf8376.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Medical Practice
- Victim Organization: middlesex endodontics
- Victim Site: middlesexendo.com
- MODCO Media falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Content: The group claims to have exfiltrated 400GB of organizational files, including 5GB of confidential data. The compromised dataset reportedly includes contracts with Rockstar, Siemens, and other popular brands.
- Date: 2025-11-11T00:49:29Z
- Network: tor
- Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/69127ed7e1a4e4b3ffa4d263)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/20bb4c5a-f569-4d6e-b775-785b06f99671.png
- Threat Actors: INC RANSOM
- Victim Country: USA
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: modco media
- Victim Site: modcomedia.com
- Sarulla Operation Ltd. falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s sensitive data, including administrative records, financial operations, budget details, user information, and confidential documents. The compromised dataset reportedly contains over 1,000 passport scans, payment instructions, accounting records, contract discussions, finalized agreements, and HR-related files.
- Date: 2025-11-11T00:38:30Z
- Network: tor
- Published URL: (http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/69029cdfe1a4e4b3ff9b5cec)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ef75d61f-aab9-4612-a02a-908ed3095265.png
- Threat Actors: INC RANSOM
- Victim Country: Indonesia
- Victim Industry: Oil & Gas
- Victim Organization: sarulla operation ltd.
- Victim Site: sarullaoperations.com
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Ransomware attacks are highly prevalent, affecting multiple sectors across various geographies, with groups like CL0P, RansomHouse, GENESIS, ANUBIS, Sarcoma, Sinobi, and INC RANSOM actively listing victims in the USA, UK, Germany, Italy, Finland, Malta, Switzerland, Indonesia, Philippines, and China. These attacks commonly involve the exfiltration of large volumes of sensitive data, including client records, financial documents, confidential contracts, and personal information.
Beyond data compromise, the report also reveals significant activity in Initial Access sales, with threat actors offering unauthorized access to systems in the UAE, Pakistan, Bangladesh, Japan, Iran, and Italy, targeting judicial, agricultural, and industrial control systems. Data Breach incidents remain numerous, involving the sale of databases from organizations in Vietnam, Brazil, Russia, Japan, Switzerland, Taiwan, Colombia, and the Dominican Republic, and the leaking of government, military, and financial technical documents from countries like the Philippines and Israel. The sale of Malware (specifically a cryptocurrency payment processor) and website Defacement are also noted, further demonstrating the breadth of cyber-underground activity.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools.