This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged Data Breach of Robinhood Markets
- Category: Data Breach
- Content: The threat actor claims to have leaked 12.3 million records allegedly linked to Robinhood Markets, Inc. The compromised data reportedly includes Email Address, Phone Number, Full Name, Address, City, State, Postal Code, and other customer information.
- Date: 2025-11-17T23:49:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%92%B8-ROBINHOOD-COM-12-306-300-LINES-CUSTOMER-EMAILS-DUMPED-FOR-SALE-%F0%9F%92%B8–59666)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9203dd91-1f7a-4156-9a25-0a42d17017e0.jpeg
- Threat Actors: jrintel
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: robinhood markets
- Victim Site: robinhood.com
- Alleged Data Breach of Bybit
- Category: Data Breach
- Content: The threat actor claims to have leaked 582,000 records from Bybit. The compromised data includes Email Address, Phone Number, Full Name, Address, City, State, Postal Code, Account Status, Assets Value, etc.
- Date: 2025-11-17T23:27:23Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%87%BA%F0%9F%87%B8%E3%80%90USA%E3%80%91BYBIT-COM-Source-bybit-com-Data-country-USA-Lines-total-582K-lines)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/da429594-634f-4615-bb90-f1ec3fbe3d39.jpeg
- Threat Actors: yeestge33
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: bybit
- Victim Site: bybit.com
- Alleged Data Breach of Japan Financial Investment Education Association
- Category: Data Breach
- Content: The threat actor claims to have leaked 140,000 records from the Japan Financial Investment Education Association, including director details, contact information, location data, and other association records.
- Date: 2025-11-17T23:12:47Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%8D%A5Japan-Financial-Investment-Education-Association-140-000-Source-jfiea-or-jp)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/75575a17-aa1f-4210-9147-7580234f06b4.jpeg
- Threat Actors: yeestge33
- Victim Country: Japan
- Victim Industry: Financial Services
- Victim Organization: japan financial investment education association
- Victim Site: jfiea.or.jp
- Alleged Data Breach of Internal Revenue Service
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Internal Revenue Service. The compromised data includes Name, Age, State, City, Address, Postal Code, Number, Email, etc.
- Date: 2025-11-17T22:22:45Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%87%BA%F0%9F%87%B8USA-%E2%86%92-65yo-citizens-Retiree-Benefits-18-Million-Data-Source-www-irs-gov)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b6999088-765a-4d13-85e4-abd9f2a7c940.png
- Threat Actors: yeestge33
- Victim Country: USA
- Victim Industry: Government Administration
- Victim Organization: internal revenue service
- Victim Site: irs.gov
- Alleged Data Breach of BitBox
- Category: Data Breach
- Content: The threat actor claims to have leaked data from BitBox. The compromised data includes Email, First Name, Last Name, Phone Number, Date Created, IP Address, User Agent, etc.
- Date: 2025-11-17T22:15:23Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%86%95-BITBOX-SWISS-DATABASES-Site-https-bitbox-swiss-Total-lines-1-1-million)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/65447592-dc53-44be-8c34-e999427e9a53.png
- Threat Actors: yeestge33
- Victim Country: Switzerland
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Organization: bitbox
- Victim Site: bitbox.swiss
- Alleged Data Breach of Uttar Pradesh Power Corporation Limited (UPPCL)
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Uttar Pradesh Power Corporation Limited (UPPCL). The compromised data includes Full Names, Account IDs, Statuses, Phone Numbers, Geographic Locations, Towns and Addresses.
- Date: 2025-11-17T22:02:19Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-UPPCL-Data-Breach-Leaked-Download)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/82860862-c4b7-4bba-8e42-1249c31d8d0e.png https://d34iuop8pidsy8.cloudfront.net/75f480a6-9891-4084-94ea-eac0a9a7ba7a.png
- Threat Actors: 888
- Victim Country: India
- Victim Industry: Energy & Utilities
- Victim Organization: uttar pradesh power corporation limited (uppcl)
- Victim Site: uppcl.org
- Alleged Data Breach of Robinhood Markets, Inc
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Robinhood Markets, Inc. The compromised data includes name, address, city, number, gender, monthly subscription fee, profitable projects, interest rate, date of birth, assets, asset management fee, investment, membership privileges, credit score, email, etc.
- Date: 2025-11-17T21:56:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Robinhood-Gold-Membership-Target-site-https-robinhood-com-Data-country-USA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b58fb687-8976-41f2-8479-cd1e390ca1fc.png
- Threat Actors: yeestge33
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: robinhood markets, inc
- Victim Site: robinhood.com
- Alleged Data Breach of Brsk ISP Limited
- Category: Data Breach
- Content: The threat actor claims to have leaked 230,105 Records from Brsk ISP Limited.
- Date: 2025-11-17T21:52:30Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-brsk-co-uk-Telecom-UK)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d87c186e-f029-4c7b-91c6-f3163a4d2854.png
- Threat Actors: fuckoverflow
- Victim Country: UK
- Victum Industry: Network & Telecommunications
- Victim Organization: brsk isp limited
- Victim Site: brsk.co.uk
- Alleged Sale of USA citizens Data
- Category: Data Breach
- Content: Threat actor claims to be selling 317 million USA citizens Data.
- Date: 2025-11-17T21:40:46Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%87%BA%F0%9F%87%B8Usa-Citizens-317-Million-Full-info-avilable)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/61a588be-785c-451f-b8d5-412d634c1e03.png
- Threat Actors: yeestge33
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Air Design Systems, Inc. falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 220 GB of the organization’s data, They intend to publish the data within 1-2 days.
- Date: 2025-11-17T20:44:05Z
- Network: tor
- Published URL: (http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/691b7dd988b6823fa2a7b89c)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/79b04ad4-c1a9-4bd0-a8d4-0de33e542d6d.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: air design systems, inc.
- Victim Site: airdesignsys.com
- Alleged data breach of Silver Falcon Group
- Category: Data Breach
- Content: The Group claims to have obtained data from Silver Falcon Group. The compromised data reportedly includes Customer data, financial transactions, and confidential documents. Note: Silver Falcon Group was reportedly targeted by Z-BL4CX-H4T on November 1, 2025, with the group claiming to have gained admin access.
- Date: 2025-11-17T20:39:07Z
- Network: telegram
- Published URL: (https://t.me/DarK07xxxxxxx/197)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/352686e7-de4a-4d03-bbb7-df35e75be626.png https://d34iuop8pidsy8.cloudfront.net/a4f733d1-2f66-4419-a4a2-5f962e2543d7.png
- Threat Actors: jokeir 07x
- Victim Country: UAE
- Victim Industry: Building and construction
- Victim Organization: silver falcon group
- Victim Site: rushdi.ae
- LincolnIT falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 50 GB of the organization’s data. They intend to publish the data within 2-3 days.
- Date: 2025-11-17T20:35:26Z
- Network: tor
- Published URL: (http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/691b7f0e88b6823fa2a7bec9)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f4bee494-1107-4091-81dd-1fbca11aeaff.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: lincolnit
- Victim Site: lincolnit.com
- H.G. Reynolds Company falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 70 GB of the organization’s data. They intend to publish the data within 7-8 days.
- Date: 2025-11-17T20:27:27Z
- Network: tor
- Published URL: (http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/691b808f88b6823fa2a7ce70)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/83586605-7386-4a59-8a6a-16c2f8821e86.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: h.g. reynolds company
- Victim Site: hgreynolds.net
- KDR Real Estate Svc falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 86 GB of the organization’s data.
- Date: 2025-11-17T20:10:16Z
- Network: tor
- Published URL: (http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=5318fbd8-85b8-3d25-bc11-76f220b5a5cb)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bf60c50e-fdec-4c58-bc57-ef6e1fcbc35b.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: kdr real estate svc
- Victim Site: kdrrealestateservices.com
- Alleged sale of unauthorized access to an online store in UK
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized admin access to an unidentified E-Commerce organization in UK.
- Date: 2025-11-17T20:08:23Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270252/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5555abf3-9684-432b-8e7c-dcd6eb96a5e6.png
- Threat Actors: black18
- Victim Country: UK
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized sale of E-Commerce admin panel with credit card payment access
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized admin access to an unidentified E-Commerce organization in UK with credit card payment access.
- Date: 2025-11-17T19:59:03Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270252/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5555abf3-9684-432b-8e7c-dcd6eb96a5e6.png
- Threat Actors: black18
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of die.co.il
- Category: Data Breach
- Content: The group claims to have leaked data from die.co.il
- Date: 2025-11-17T19:55:54Z
- Network: telegram
- Published URL: (https://t.me/xstucxteam/339)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/32e29dc8-e5e3-43e4-90b1-d842d0df7334.png
- Threat Actors: STUCX TEAM
- Victim Country: Israel
- Victim Industry: Education
- Victim Organization: die.co.il
- Victim Site: die.co.il
- Alleged Sale of Microsoft-Signed Vulnerable Driver Capable of Disabling EDR/XDR Systems
- Category: Malware
- Content: Threat actor claims to be selling a vulnerable driver digitally signed by Microsoft.
- Date: 2025-11-17T19:29:12Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270249/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cc199c04-c4de-4ef0-ac2d-f510a65868b7.png
- Threat Actors: NightRaider
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Physiothletics
- Category: Data Breach
- Content: The group claims to have leaked data from Physiothletics
- Date: 2025-11-17T19:27:25Z
- Network: telegram
- Published URL: (https://t.me/xstucxteam/339)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7618de62-d2e1-4c7f-a67a-5f147f4f7941.png
- Threat Actors: STUCX TEAM
- Victim Country: Israel
- Victim Industry: Hospital & Health Care
- Victim Organization: physiothletics
- Victim Site: physiothletics.co.il
- Alleged data breach of liatgallery.co.il
- Category: Data Breach
- Content: The group claims to have leaked data from liatgallery.co.il
- Date: 2025-11-17T19:15:33Z
- Network: telegram
- Published URL: (https://t.me/xstucxteam/339)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/83f340e0-c702-4edc-9e91-7c91d91cdd45.png
- Threat Actors: STUCX TEAM
- Victim Country: Israel
- Victim Industry: Arts & Crafts
- Victim Organization: liatgallery.co.il
- Victim Site: liatgallery.co.il
- Alleged unauthorized RDP access to U.S. Healthcare Networks
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to healthcare networks in USA.
- Date: 2025-11-17T19:12:43Z
- Network: openweb
- Published URL: (https://ramp4u.io/threads/sell-networks-access.3635/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ef811e9d-00a8-4e7b-bb5e-7af4abed0058.png
- Threat Actors: fokonishi
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: Unknown
- Victim Site: Unknown
- Payouts King Ransomware group adds an unknown victim(l****.com)
- Category: Ransomware
- Content: The group claims to have obtained 116GB of the organization’s data and intends to publish it within 6 to 7 days.
- Date: 2025-11-17T19:11:37Z
- Network: tor
- Published URL: (https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c7812589-4db3-4f91-be35-445c3a3501c9.jpg
- Threat Actors: Payouts King
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of clipim.co.il
- Category: Data Breach
- Content: The group claims to have leaked data from clipim.co.il
- Date: 2025-11-17T19:06:45Z
- Network: telegram
- Published URL: (https://t.me/xstucxteam/339)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/52a5938a-2b89-4374-bd71-bc11d2a56597.png
- Threat Actors: STUCX TEAM
- Victim Country: Israel
- Victim Industry: Entertainment & Movie Production
- Victim Organization: clipim.co.il
- Victim Site: clipim.co.il
- Alleged data breach of Mishan
- Category: Data Breach
- Content: The group claims to have leaked data from Mishan
- Date: 2025-11-17T18:42:08Z
- Network: telegram
- Published URL: (https://t.me/xstucxteam/339)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/dadad848-ce89-4b55-bca0-b17858bbc1d8.png
- Threat Actors: STUCX TEAM
- Victim Country: Israel
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: mishan
- Victim Site: mishan.co.il
- Alleged data breach of Qprint Digital
- Category: Data Breach
- Content: The group claims to have leaked data from Qprint Digital
- Date: 2025-11-17T18:33:47Z
- Network: telegram
- Published URL: (https://t.me/xstucxteam/339)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c9bf12e5-61e2-406c-bf55-9e2cf272ef83.png
- Threat Actors: STUCX TEAM
- Victim Country: Israel
- Victim Industry: Printing
- Victim Organization: qprint digital
- Victim Site: qprintdigital.co.il
- Alleged sale of credit cards from various European Countries
- Category: Data Breach
- Content: Threat actor claims to be selling credit card informations from France, Italy, Spain and different European countries. The compromised data reportedly contains expiry, cvv, name, address and phone number.
- Date: 2025-11-17T18:08:01Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270248/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ca0b90cb-9bd6-464f-95a9-873d22f6765a.png
- Threat Actors: babkin_vnuk
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Poe’s Accounting Services falls victim to PEAR Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 335GB of the organization’s data. The compromised data reportedly includes Firm’s and Its Clients’ Financial Details and Operations, HR, PII & PHI Records, Business Operations, Partners’ and Vendors’ Data, Mailboxes & Email Correspondence, QuickBooks Database, etc
- Date: 2025-11-17T17:51:50Z
- Network: tor
- Published URL: (http://peargxn3oki34c4savcbcfqofjjwjnnyrlrbszfv6ujlx36mhrh57did.onion/Companies/poecpas/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/789de769-88d2-4df0-ab65-da45fe6d3a13.png
- Threat Actors: PEAR
- Victim Country: USA
- Victim Industry: Accounting
- Victim Organization: poe’s accounting services
- Victim Site: poecpas.com
- Quinn Jay Patent falls victim to PEAR Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 380GB of the organization’s data. The compromised data reportedly includes Mary Jaensch’s, Her Firm’s and Its Clients’ Private and Confidential Data, Internal & External Email Correspondence, etc.
- Date: 2025-11-17T17:46:19Z
- Network: tor
- Published URL: (http://peargxn3oki34c4savcbcfqofjjwjnnyrlrbszfv6ujlx36mhrh57did.onion/Companies/quinnjaypatent/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d0f3cbc9-0525-437e-9fb2-4b2f4d7a5a26.png
- Threat Actors: PEAR
- Victim Country: USA
- Victim Industry: Law Practice & Law Firms
- Victim Organization: quinn jay patent
- Victim Site: quinnjaypatent.com
- Law Office of Ronald W. Hillberg falls victim to PEAR Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1 TB of the organization’s data. The compromised data reportedly includes Financials, HR, partners’ and vendors’ data, clients’ privileged & confidential data, PII & PHI records, police reports & court files, exhibits & evidences, mailboxes & email correspondence with all files attached, database, etc.
- Date: 2025-11-17T17:37:46Z
- Network: tor
- Published URL: (http://peargxn3oki34c4savcbcfqofjjwjnnyrlrbszfv6ujlx36mhrh57did.onion/Companies/hillberglaw/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b8824b9b-5d5a-4f1c-a03d-9b58441dbcac.png
- Threat Actors: PEAR
- Victim Country: USA
- Victim Industry: Legal Services
- Victim Organization: law office of ronald w. hillberg
- Victim Site: hillberglaw.biz
- Alleged leak of admin access to Khalifa International Award for Date Palm and Agricultural Innovation (KIAAI) website
- Category: Initial Access
- Content: The threat actor claims to have gained unauthorized admin access to Khalifa International Award for Date Palm and Agricultural Innovation (KIAAI) website.
- Date: 2025-11-17T17:18:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Admin-access-to-the-UAE-website-award-kiaai-ae)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8af1bf91-eb6e-4b6b-8a08-2821de67a062.png
- Threat Actors: crazyboy68
- Victim Country: UAE
- Victim Industry: Agriculture & Farming
- Victim Organization: khalifa international award for date palm and agricultural innovation (kiaai)
- Victim Site: award.kiaai.ae
- Alleged unauthorized access to Al Ain University
- Category: Initial Access
- Content: Group claims to have gained unauthorized access to Al Ain University’s systems and obtained login credentials.
- Date: 2025-11-17T17:06:37Z
- Network: telegram
- Published URL: (https://t.me/DarK07xxxxxxx/192)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e9862d51-1dd4-48f2-90e7-fbe72241eada.png https://d34iuop8pidsy8.cloudfront.net/bb79d7e3-489e-468b-9ab5-08dfae5d6f74.png
- Threat Actors: jokeir 07x
- Victim Country: UAE
- Victim Industry: Education
- Victim Organization: al ain university
- Victim Site: aau.ac.ae
- Charles Rutenberg Realty Inc. falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 91GB of organization’s data. The compromised data includes many personal docs (more than 1,5gb of just scanned docs), (passports, driver licenses, SSNs, phones, addresses, email addresses, credit card details, employee headshots), financials, contracts and agreements, NDA, clients’ information, projects, etc.
- Date: 2025-11-17T17:03:46Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ba85c100-d8aa-4ef6-97c8-b5a4ad883086.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: charles rutenberg realty inc.
- Victim Site: charlesrutenberginc.com
- Alleged sale of unauthorized access to an unidentified retail company in Germany
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to an unidentified retail company in Germany.
- Date: 2025-11-17T16:56:31Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270245/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/856f910c-0eb1-4ecb-8247-12c74f483b2d.png
- Threat Actors: chestniybro
- Victim Country: Germany
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of login credentials from UNIQLO
- Category: Initial Access
- Content: The group claims to have leaked the login credentials from UNIQLO
- Date: 2025-11-17T16:20:48Z
- Network: telegram
- Published URL: (https://t.me/ahloyanonymous/16)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d3acbdb0-10a0-42ce-95e8-9721239b48e9.png
- Threat Actors: Ahloy Anonymous
- Victim Country: Japan
- Victim Industry: Fashion & Apparel
- Victim Organization: uniqlo
- Victim Site: uniqlo.com
- Alleged Sale of 6,000 Fortinet VPN Network Accesses
- Category: Initial Access
- Content: Threat actor claims to be selling 6,000 Fortinet VPN network accesses.
- Date: 2025-11-17T15:55:23Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270242/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/473582fc-3cca-4c74-a584-47e86f2671dc.png
- Threat Actors: anna_s
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- jokeir 07x claims to target UAE
- Category: Alert
- Content: A recent post by the group indicates that they are targeting the infrastructure of the UAE.
- Date: 2025-11-17T15:55:15Z
- Network: telegram
- Published URL: (https://t.me/DarK07xxxxxxx/191)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/addce257-c607-4176-bc92-9a0e1ce3db4d.png
- Threat Actors: jokeir 07x
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of 3,000 Fortinet VPN Network Accesses
- Category: Initial Access
- Content: Threat actor claims to be selling 3,000 Fortinet VPN network accesses.
- Date: 2025-11-17T15:44:44Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270239/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a4570743-8964-4f42-a776-7e7a8b5484b6.png
- Threat Actors: anna_s
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- ARH Associates, Inc. falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 12 GB of organization’s data. The compromised data includes employee personal documents (scanned passports, driver licenses, SSNs, phones, addresses, email addresses, credit card details and so on), financials, contracts and agreements, NDA, client personal information, projects, etc.
- Date: 2025-11-17T15:29:15Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e2b726ea-61b4-481b-bdd9-cdd8899fddfd.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Civil Engineering
- Victim Organization: arh associates, inc.
- Victim Site: arh-us.com
- Petrobras falls victim to Everest Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 90 GB of the organization’s data and intends to publish it within 7 to 8 days.
- Date: 2025-11-17T15:13:36Z
- Network: tor
- Published URL: (http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/news/petrobras/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0a6cd5b4-bd2f-442e-91fc-778e37c5e0da.png
- Threat Actors: Everest
- Victim Country: Brazil
- Victim Industry: Oil & Gas
- Victim Organization: petrobras
- Victim Site: petrobras.com.br
- UNDER ARMOUR falls victim to Everest Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 343 GB of the organization’s data and intends to publish it within 7 to 8 days.
- Date: 2025-11-17T15:00:34Z
- Network: tor
- Published URL: (http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/news/UNDER_ARMOUR/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c7c02c18-89fc-4763-a9c8-f2b736d23e8e.png
- Threat Actors: Everest
- Victim Country: USA
- Victim Industry: Fashion & Apparel
- Victim Organization: under armour
- Victim Site: underarmour.com
- Alleged sale of RDweb access to an unidentified Organization in UK
- Category: Initial Access
- Content: Threat actor claims to be selling the RDweb access of an unidentified Organization in UK.
- Date: 2025-11-17T14:55:59Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270231/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5b225508-810b-499f-80bb-1a2acdf1ba24.png
- Threat Actors: samy01
- Victim Country: UK
- Victim Industry: Energy & Utilities
- Victim Organization: Unknown
- Victim Site: Unknown
- Eagle Oil & Gas, LLC falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 70 GB of organization’s data. The compromised data includes employee personal documents (scanned passports, driver licenses, SSNs, phones, addresses, email addresses, credit card payment details and so on), confidential contracts and agreements, NDA, and other client’s files, etc.
- Date: 2025-11-17T14:48:07Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/70d6b9eb-e867-4898-bd33-6fdedc9822b2.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: eagle oil & gas, llc
- Victim Site: eagleog.com
- LG Energy Solution falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 1.67 TB of organization’s data. The compromised data includes employee personal information (visas, US and Korean passports, medical documents, Korean ID cards, addresses, phones, emails and so on), confidential projects, NDAs, confidentiality agreements, detailed financials, information about clients and partners, lots of contracts, etc.
- Date: 2025-11-17T14:42:46Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/40f54791-d270-4195-a953-bbfe0b0906c8.png
- Threat Actors: akira
- Victim Country: South Korea
- Victim Industry: Chemical Manufacturing
- Victim Organization: lg energy solution
- Victim Site: lgensol.com
- Alleged data breach of ADNOC Group
- Category: Data Breach
- Content: The group claims to have compromised the ADNOC website and obtained the VPN access and exfiltrated sensitive internal data, including email addresses, usernames, passwords, files, and operational plans.
- Date: 2025-11-17T14:26:36Z
- Network: telegram
- Published URL: (https://t.me/LulzS1/3)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f2d6ae03-a8ba-43ef-81c7-50cd0c4ada3b.png
- Threat Actors: LulzSec Hackers
- Victim Country: UAE
- Victim Industry: Oil & Gas
- Victim Organization: adnoc group
- Victim Site: adnoc.ae
- AkroStar falls victim to The Gentlemen Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and intends to publish within 9 to 10 days. Update: On November 17, 2025, they revealed the full domain name on their dark web portal.
- Date: 2025-11-17T13:47:26Z
- Network: tor
- Published URL: (http://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/560416f4-6ee6-4c8e-a504-7d6590561fd2.png
- Threat Actors: The Gentlemen
- Victim Country: China
- Victim Industry: Semiconductors
- Victim Organization: akrostar
- Victim Site: akrostar-tech.com
- UNDERGROUND-NET targets the website of Bilkent University
- Category: Defacement
- Content: Group claims to have defaced the website of Bilkent University
- Date: 2025-11-17T13:14:49Z
- Network: telegram
- Published URL: (https://t.me/c/2195292966/1233)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bd270153-1472-4728-8f8a-80ee79d3a245.JPG
- Threat Actors: UNDERGROUND-NET
- Victim Country: Turkey
- Victim Industry: Education
- Victim Organization: bilkent university
- Victim Site: obiyedek.bilkent.edu.tr
- Pharaoh’s Team targets the website of Haraj Syria
- Category: Defacement
- Content: Group claims to have defaced the website of Haraj Syria
- Date: 2025-11-17T12:18:19Z
- Network: telegram
- Published URL: (https://t.me/Pharaohs_n/332)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/03071455-09cf-447f-b395-ae48787f07e1.JPG
- Threat Actors: Pharaoh’s Team
- Victim Country: Syria
- Victim Industry: E-commerce & Online Stores
- Victim Organization: haraj syria
- Victim Site: haraaj.sy
- The Gentlemen Ransomware group adds an unknown victim (A***-****.com)
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and plans to publish within 1 day.
- Date: 2025-11-17T12:09:14Z
- Network: tor
- Published URL: (http://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f81c22f8-dec3-4778-b198-e4470718ba99.png
- Threat Actors: The Gentlemen
- Victim Country: Unknown
- Victim Industry: Semiconductors
- Victim Organization: Unknown
- Victim Site: Unknown
- HellR00ters Team targets the website of Journal of Buddhist Educational Administration
- Category: Defacement
- Content: The group claims to have defaced the website of Journal of Buddhist Educational Administration.
- Date: 2025-11-17T11:35:21Z
- Network: telegram
- Published URL: (https://t.me/c/2758066065/307)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/de3322ec-94ae-499a-88d9-7ef684cd04c6.png
- Threat Actors: HellR00ters Team
- Victim Country: Thailand
- Victim Industry: Publishing Industry
- Victim Organization: journal of buddhist educational administration
- Victim Site: jbea.mcu.ac.th
- MOBI falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained data from MOBI. The compromised data reportedly includes financial information such as audits, payment details, and invoices, as well as employees’ personal financial details and accounting files.
- Date: 2025-11-17T11:26:51Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f4c0f51e-eee7-4d55-a572-775f2ca04de2.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Consumer Electronics
- Victim Organization: mobi
- Victim Site: mobiusa.com
- Bold+ falls victim to Akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data. The compromised data includes financial details of employees, accounting files, etc.
- Date: 2025-11-17T11:10:37Z
- Network: tor
- Published URL: (https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0bd3613b-4f5b-458a-85b1-1b7eca5f78fd.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Furniture
- Victim Organization: bold+
- Victim Site: bold-plus.com
- Alleged data breach of an unidentified Germany organization
- Category: Data Breach
- Content: The group claims to have compressed files from an unidentified Germany organization.
- Date: 2025-11-17T10:59:33Z
- Network: tor
- Published URL: (http://brohoodyaifh2ptccph5zfljyajjabwjjo4lg6gfp4xb6ynw5w7ml6id.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a852b9c2-4155-4544-81a5-4ef552bdea10.png
- Threat Actors: BROTHERHOOD
- Victim Country: Germany
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- NOT-CTBER targets the website of ThinkView
- Category: Defacement
- Content: The group claims to have defaced the website of ThinkView
- Date: 2025-11-17T10:56:31Z
- Network: telegram
- Published URL: (https://t.me/notctber/1418)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f56579f6-05f9-49d0-a1c0-ba4c2ce8f3ff.png
- Threat Actors: NOT-CTBER
- Victim Country: Vietnam
- Victim Industry: Information Technology (IT) Services
- Victim Organization: thinkview
- Victim Site: thinkview.vn
- Alleged sale of access to an unidentified Casino gaming company
- Category: Initial Access
- Content: The threat actor claims to be selling Jenkins server access to an unidentified casino gaming company in the USA.
- Date: 2025-11-17T10:51:32Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Casino-gaming-company)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1b6cdc68-40ad-455a-90d3-e499c8bd6daa.png
- Threat Actors: Near
- Victim Country: USA
- Victim Industry: Business and Economic Development
- Victim Organization: Unknown
- Victim Site: Unknown
- DEVMAN 2.0 ransomware group adds an unknown victim (****clinic.com.**)
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and plans to publish within 5-6 days.
- Date: 2025-11-17T10:40:05Z
- Network: tor
- Published URL: (http://devmanblggk7ddrtqj3tsocnayow3bwnozab2s4yhv4shpv6ueitjzid.onion/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/00a6b8e7-ea87-448c-91d3-992da351f333.png
- Threat Actors: DEVMAN 2.0
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of PT Brantas Abipraya Persero
- Category: Data Breach
- Content: The group claims to have gained unauthorized access to PT Brantas Abipraya Persero’s systems, potentially exposing internal data or infrastructure.
- Date: 2025-11-17T10:38:04Z
- Network: telegram
- Published URL: (https://t.me/kingsman_india1/757)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9e4c3b49-7c42-4f48-aa76-52692cad28bf.png https://d34iuop8pidsy8.cloudfront.net/8b7a884b-65ac-4ed1-a419-3ef456c2b8c9.png
- Threat Actors: KINGSMAN INDIA
- Victim Country: Indonesia
- Victim Industry: Building and construction
- Victim Organization: pt brantas abipraya persero
- Victim Site: brantas-abipraya.co.id
- TRUTH LEGION 707 targets the website of Top Clinique
- Category: Defacement
- Content: TRUTH LEGION 707 targets the website of Top Clinique.
- Date: 2025-11-17T09:38:22Z
- Network: telegram
- Published URL: (https://t.me/c/3186755612/48)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d7c362e4-3623-4f7e-836f-319d965a0758.JPG
- Threat Actors: TRUTH LEGION 707
- Victim Country: Morocco
- Victim Industry: Hospital & Health Care
- Victim Organization: top clinique
- Victim Site: topclinique.ma
- Alleged leak of Moroccan citizens database
- Category: Data Breach
- Content: The group actor claims to have leaked a Moroccan citizens database.
- Date: 2025-11-17T09:09:27Z
- Network: telegram
- Published URL: (https://t.me/c/3186755612/46)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f55497c7-113b-4e4a-8f39-4df36433f2ee.png
- Threat Actors: TRUTH LEGION 707
- Victim Country: Morocco
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Youngster Nepal targets the website of CG Electronics
- Category: Defacement
- Content: The group claims to have defaced the website of CG Electronics.
- Date: 2025-11-17T08:49:58Z
- Network: telegram
- Published URL: (https://t.me/youngsternepal/7)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ea5dd5c4-f7e7-43ae-9463-9636db936374.png https://d34iuop8pidsy8.cloudfront.net/8c7108c4-fe28-4dc2-ac6a-55fa97c9a164.png
- Threat Actors: Youngster Nepal
- Victim Country: Nepal
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Organization: cg electronics
- Victim Site: crm.cgelectronics.com.np
- Alleged Data Leak of Malwarebytes Forum User Records
- Category: Data Breach
- Content: A threat actor has posted claiming to possess the Malwarebytes forum database allegedly exposed during the breach occured in 2014. The post states that approximately 111,000 member records were compromised, including email addresses, IP addresses, usernames, birth dates, website activity, and passwords stored using weak salted hashes.
- Date: 2025-11-17T06:24:54Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/usa-forums-malwarebytes-com-popular-cybersecurity-company-members-111k-2014.46096/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8d390689-c53f-463e-af3d-533e1b52de72.jpeg https://d34iuop8pidsy8.cloudfront.net/9beb6fbb-c878-4525-a677-9e6f242c7621.png
- Threat Actors: wonder
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of unauthorized access to an unidentified shop in USA
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to an unidentified shop in USA.
- Date: 2025-11-17T04:40:56Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270205/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/49e654b4-033f-446e-9023-16f4784f098d.png
- Threat Actors: corptoday
- Victim Country: USA
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Japan Advance Create Insurance Product
- Category: Data Breach
- Content: A threat actor claims to have leaked a database from Japan Advance Create, allegedly containing customer records tied to an insurance product. The post indicates that the compromised data includes details for male customers aged 35 and above with policy amounts of 5,000,000, along with associated personally identifiable information (ID numbers, gender, date of birth, age, and last names).
- Date: 2025-11-17T03:54:36Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/japan-advance-create-insurance-product-pure-male-age-35-policy-amount-5-000-000-data-points-required-id-gender-date-of-birth-age-last-na.46085/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9be6bd9e-66f3-4740-bc32-7adc40f8d5df.png
- Threat Actors: guatafa
- Victim Country: Japan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Information Communication Board (ICB SCAC)
- Category: Data Breach
- Content: Threat actor claims to have leaked 360 MB SQL Dump of Information Communication Board of the Sarawak Chinese Annual Conference of the Methodist Church in Malaysia.
- Date: 2025-11-17T03:29:02Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-icbscac-org-SQL-Dump-360MB)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/03dbf67b-c289-4be5-ad2b-05cebc840402.png
- Threat Actors: Syntax
- Victim Country: Malaysia
- Victim Industry: Broadcast Media
- Victim Organization: information communication board (icb scac)
- Victim Site: icbscac.org
- Alleged data leak of Russian Tupolev Tu-160
- Category: Data Breach
- Content: Threat actor claims to have leaked classified technical documents related to the Russian Tupolev Tu-160 strategic bomber program.
- Date: 2025-11-17T03:03:10Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/top-secret-russ1an-full-tu-160-supersonic-nuclear-heavy-strategic-bomber-blueprints.46086/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/08c4d842-bb13-4306-acda-bffb32f2d776.png
- Threat Actors: guatafa
- Victim Country: Russia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Leak of Advance Create Co., Ltd..
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Advance Create Co., Ltd.. The compromised data includes internal policy documents, service operation files, financial strategy reports, and insurance-market development materials.
- Date: 2025-11-17T02:45:33Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%8D%A5Japan-Advance-Create-Insurance-Policy-Amount-5-000-00)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/af8bd6c5-edfd-4ecf-80d7-7163dcd3ae74.jpeg
- Threat Actors: yeestge33
- Victim Country: Japan
- Victim Industry: Insurance
- Victim Organization: hoken ichiba information services ltd
- Victim Site: advancecreate.co.jp
- Alleged Data Leak of Hoken Ichiba Information Services Ltd.
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Hoken Ichiba Information Services Ltd. The compromised data includes internal policy documents, service operation files, financial strategy reports, and insurance-market development materials.
- Date: 2025-11-17T02:07:04Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-%F0%9F%8D%A5Japan-Advance-Create-Insurance-Policy-Amount-5-000-00)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/af8bd6c5-edfd-4ecf-80d7-7163dcd3ae74.jpeg
- Threat Actors: yeestge33
- Victim Country: Japan
- Victim Industry: Insurance
- Victim Organization: hoken ichiba information services ltd
- Victim Site: advancecreate.co.jp
- Alleged data breach of District One Medical Examiner Support, Inc. (D1MEO)
- Category: Data Breach
- Content: Threat actor claims to have leaked 29.4 GB data of confidential medico-legal records covering 2021–2022, including autopsy files, toxicology reports, hospital medical records, law-enforcement reports, next-of-kin PII, Social Security numbers, driver’s license data, home addresses, and cadaver images.
- Date: 2025-11-17T01:07:15Z
- Network: openweb
- Published URL: (https://forum.exploit.biz/topic/270193/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/566a5fdc-52c8-4e23-a54b-72109762283f.png https://d34iuop8pidsy8.cloudfront.net/fab04ccf-a766-478b-ae86-5be1f8382f6f.png https://d34iuop8pidsy8.cloudfront.net/b7c62501-beda-44fa-a64c-9b4f063e12f5.png https://d34iuop8pidsy8.cloudfront.net/4b85b72f-9d5e-4dcb-b45a-5de12cbd96e3.png https://d34iuop8pidsy8.cloudfront.net/ad068011-cb7a-4b44-9e85-5eaf4420f1a8.png
- Threat Actors: zestix
- Victim Country: USA
- Victim Industry: Medical Practice
- Victim Organization: district one medical examiner support, inc. (d1meo)
- Victim Site: d1meo.org
- Lotus Powergear Pvt Ltd., falls victim to NightSpire
- Category: Ransomware
- Content: The group claims to have obtained 43 GB of organization’s data, which they intend to publish within a day.
- Date: 2025-11-17T00:06:19Z
- Network: tor
- Published URL: (http://nspirebcv4sy3yydtaercuut34hwc4fsxqqv4b4ye4xmo6qp3vxhulqd.onion/database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9ad0122a-becf-4243-8378-334e29795c12.png
- Threat Actors: NightSpire
- Victim Country: India
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Organization: lotus powergear pvt ltd.
- Victim Site: lppl.in
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from Financial Services, Education, and Healthcare to E-commerce, Oil & Gas, and Building and construction, and impacting countries including USA, Japan, Switzerland, India, UK, UAE, Israel, Brazil, South Korea, China, Turkey, Syria, Thailand, Vietnam, Morocco, Nepal, and Russia. The compromised data ranges from customer records, personal user information, and financial details to confidential operational documents, government records, and classified technical data. Beyond data compromise, the report also reveals significant activity in Initial Access sales, with threat actors offering unauthorized access to E-commerce sites, healthcare networks, corporate VPNs (Fortinet), and an unidentified casino gaming company. The proliferation of Ransomware attacks by groups like Sinobi, Qilin, PEAR, Payouts King, Akira, Everest, The Gentlemen, and DEVMAN 2.0 targeting industries like Real Estate, Accounting, Legal Services, and Manufacturing further underscores the constant threat landscape. The inclusion of Malware (vulnerable driver) and Defacement activities targeting various websites demonstrates the wide array of malicious capabilities available in the cyber underground. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.