1. Executive Summary
The provided data indicates a high-velocity wave of cyber activity characterized by simultaneous ransomware campaigns, mass website defacements, and significant government data breaches. A total of 104 incidents were analyzed1. The activity is global, with notable concentrations of victims in India, France, Brazil, and Indonesia.
Key trends include:
- Ransomware Aggression: The Qilin and TENGU groups are executing aggressive campaigns across multiple continents.
- Critical Infrastructure Risk: Operational Technology (OT) and SCADA systems in water treatment and heating sectors have been compromised22222.+3
- Hacktivism & Defacement: A surge in low-sophistication but high-volume defacement attacks, particularly targeting Indian and Pakistani educational and commercial sites.
2. Incident Category Analysis
The incidents generally fall into four primary categories:
A. Data Breaches (High Volume)
The majority of incidents involve the exfiltration and sale of databases.
- Government & Public Sector: There were significant leaks from the Australian personal data pool 3, the Fortaleza Municipal Government in Brazil 444, and the Algerian National Center for Commercial Register (CNRC)555.+3
- Medical & Health: Unicancer (France) suffered a breach exposing staff profiles 666, and Agence Régionale de Santé Auvergne‑Rhône‑Alpes saw over 3,000 records leaked77.+4
- Consumer Data: Large datasets were exposed, including a 39GB archive from NAZ.API containing billions of records 8, and banking data (IBAN/DNI) from Spain9.+1
B. Ransomware Campaigns
Several groups are actively extorting organizations, often threatening to publish data within a week.
- Qilin: The most active ransomware group in this dataset, targeting diverse sectors globally, including Orthopaedic Specialists of Massachusetts (USA) 101010, UGS (Singapore/Oil & Gas) 111111, Colacem Spa (Italy/Construction) 121212, and Fluorsid (Italy/Chemicals)13.+3
- TENGU: Targeted Nafae Sanitaire (Malaysia) 1414and Amphibius Accounting System (Dominican Republic)1515.+1
- Kill Security: Compromised the Water Utilities Corporation in Botswana 161616and DR.Claims FL LLC in the USA171717.+4
C. Defacements (Hacktivism)
There is a massive volume of website defacements, often politically motivated or done for notoriety.
- BROTHERHOOD CAPUNG INDONESIA is responsible for a spree of attacks on targets ranging from The American Beat 1818to the Prabharani Institute of Education1919.+1
- NotraSec focused heavily on Indian infrastructure and manufacturing, defacing sites for Lush Granites, Kosh Innovations, and AARCS Engineering2020202020202020.+3
D. Operational Technology (OT) & Initial Access
- SCADA Compromise: A threat actor claimed access to a wastewater treatment SCADA system in Canada, alleging control over pumps and disinfection systems21.
- Heating Systems: The QuietSec group claimed access to MTK-ACMO hybrid heating system controllers, stating they disabled safety protections22.
- Network Access Sales: Actors are selling VPN/RDP access to unidentified telecom companies and SSH servers in the USA2323232323.+3
3. Geographic and Industry Impact
Top Victim Geographies:
- India: Heavily targeted by defacement groups (NotraSec, Team Bangladesh) and data breaches (Assa Abloy India, BNMI)242424242424242424.+2
- France: Sustained significant data breaches across healthcare (Unicancer), government (City of Sevran), and e-commerce (Wobz Print)252525252525252525.+2
- Brazil: A primary target for government-related data exfiltration (Ministry of Culture, SmartGPS)26262626.+1
- USA: Targeted by ransomware (Qilin, Kill Security) and access sales272727272727272727.+4
Targeted Industries:
- Education: Highly vulnerable to defacements and credential leaks (e.g., Canadian University Dubai, Weizmann Institute of Science)28282828.+1
- Government: High-value data leaks from municipal to federal levels in Brazil, Algeria, and Belgium2929292929292929.+3
- Infrastructure & Utilities: Water, wastewater, and energy sectors faced ransomware and unauthorized access30303030303030.+4
4. Threat Actor Profile
The following table summarizes the key actors identified in the report:
| Threat Actor | Primary Activity | Key Targets / Characteristics |
| Qilin | Ransomware | Global targets; Oil & Gas, Healthcare, Construction313131313131313131.+2 |
| BROTHERHOOD CAPUNG INDONESIA | Defacement | High volume of low-security targets; Education, Media32323232.+1 |
| NotraSec | Defacement | Targeted campaign against Indian manufacturing/engineering33333333.+1 |
| TENGU | Ransomware | Threats to publish data within 5-8 days; Wholesale, Software34343434.+1 |
| RuskiNet | Data Leak | Targeted Romanian IT and French Health sectors35353535.+1 |
| ShinyCorporation | Data Leak | Targeted Belgian Data Protection Authority and Venezuelan Foreign Affairs36363636.+1 |
| Infrastructure Destruction Squad | OT Access | Targeted Canadian Wastewater SCADA systems37. |
5. Conclusion
The analysis of the January 17, 2026, incident data reveals a bifurcated threat landscape. On one side, sophisticated criminal groups like Qilin and TENGU are successfully deploying ransomware against critical sectors (Healthcare, Utilities, Construction), posing severe operational risks. The compromise of SCADA systems 38and heating controllers 39 highlights a dangerous escalation toward physical infrastructure disruption.+1
On the other side, a swarm of hacktivist entities (e.g., BROTHERHOOD CAPUNG INDONESIA, NotraSec) is exploiting weak web security in the Education and Manufacturing sectors, particularly in South Asia, to cause reputational damage through mass defacements.
Detected Incidents Draft Data
- Alleged leak of Personal Data from Australia
Category: Data Breach
Content: The threat actor claims to be leaked Personal Data from Australia. The Compromised Data Reportedly contain 438,522 records including First Name, Last Name, Full Name, Gender, Email, Date of Birth, Phone Number, Street Name, City, ZIP Code
Date: 2026-01-17T23:46:13Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-AUSTRALIA-%E2%80%94-National-Personal-Data-Leak
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/44297e5e-343b-4191-83a0-a9c5da25e13d.png
Threat Actors: JackValeX
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of SmartGPS
Category: Data Breach
Content: The threat actor claims to have leaked data from SmartGPS, the compromised data reportedly consists of internal source code.
Date: 2026-01-17T23:44:29Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SOURCE-CODE-SmartGPS-com-br-Data-Breach-Leaked-Download–184698
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6f95d324-769d-4b2d-9e8e-2408d995ac1a.png
Threat Actors: 888
Victim Country: Brazil
Victim Industry: Other Industry
Victim Organization: smartgps
Victim Site: smartgps.com.br - Alleged data breach of Aribaut & Associés
Category: Data Breach
Content: The threat actor claims to be leaked Aribaut & Associés data from march 2021
Date: 2026-01-17T23:23:44Z
Network: openweb
Published URL: https://breachforums.bf/Thread-COLLECTION-3-french-dbs
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6e934712-2f25-4126-a2b2-39bb06a06559.png
Threat Actors: oef50655
Victim Country: France
Victim Industry: Legal Services
Victim Organization: aribaut & associés
Victim Site: aribaut-associes.fr - Alleged data breach of Fortaleza Municipal Government
Category: Data Breach
Content: The threat actor claims to have leaked a municipal government database allegedly belonging to Fortaleza, Ceará (Brazil), distributed in SQL format (20 MB), reportedly containing government or municipal data
Date: 2026-01-17T22:50:05Z
Network: openweb
Published URL: https://breachforums.bf/Thread-BRAZIL-GOV-MUNICIPAL-DB-FORTALEZA-CE
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/37856d86-3ba2-4ced-bac4-4dd81a4fea61.png
Threat Actors: breach3d
Victim Country: Brazil
Victim Industry: Government Administration
Victim Organization: fortaleza municipal government
Victim Site: fortaleza.ce.gov.br - Alleged Data Leak of NAZ.API
Category: Data Breach
Content: Threat Actor claims to have leaked the database of NAZ.API, consisting of a 39GB archive that allegedly contains billions of records, including email addresses, passwords, and log data.
Date: 2026-01-17T22:45:00Z
Network: openweb
Published URL: https://leakbase.la/threads/hq-drop-naz-api-39gb-complete-archive.48270/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/71bc75b7-fefe-49ae-93b5-2c29e1539de4.png
Threat Actors: tryronin
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of IBAN and DNI Banking Data in Spain
Category: Data Breach
Content: Threat Actor claims to have leaked the database of IBAN and DNI banking data in Spain.
Date: 2026-01-17T22:36:22Z
Network: openweb
Published URL: https://leakbase.la/threads/iban_dni_banking_spain.48272/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b23a83fa-aa10-4688-8ba8-bbf3918701e4.png
Threat Actors: Cod3xx
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Unicancer
Category: Data Breach
Content: Threat actor claims to have leaked data from Unicancer, France. The compromised data reportedly contains name, profile url, email, position, etc.
Date: 2026-01-17T22:24:10Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FR-Unicancer
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/84d30a38-3e4b-41c5-98ca-1c1e224a3782.png
Threat Actors: Sahquelfou
Victim Country: France
Victim Industry: Hospital & Health Care
Victim Organization: unicancer
Victim Site: unicancer.fr - 404 CREW CYBER TEAM targets the website of Weizmann Institute of Science
Category: Defacement
Content: The group claims to have defaced the official website of the Weizmann Institute of Science, as well as the subdomain hosting its Conferences Unit.
Date: 2026-01-17T22:22:59Z
Network: telegram
Published URL: https://t.me/crewcyber/567
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f68ad4d2-0c00-4a78-bb36-9af4f47e8f58.png
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Education
Victim Organization: weizmann institute of science
Victim Site: weizmann.ac.il - Alleged data breach of CamSecurity
Category: Data Breach
Content: The group claims to have leaked the internal database of CamSecurity in Ukraine
Date: 2026-01-17T22:22:53Z
Network: telegram
Published URL: https://t.me/perunswaroga/1046?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/966645f8-b04d-4235-918a-c12c6a745786.png
https://d34iuop8pidsy8.cloudfront.net/eb0ceb2b-6676-4277-90ee-9891fe661bf2.png
Threat Actors: Perun Svaroga
Victim Country: Ukraine
Victim Industry: Security & Investigations
Victim Organization: camsecurity
Victim Site: camsecurity.com.ua - Alleged data leak of Prabharani Institute of Education
Category: Data Breach
Content: The group claims to have defaced the website and leaked the internal database, including administrator credentials and student records from Prabharani Institute of Education in India
Date: 2026-01-17T22:09:28Z
Network: telegram
Published URL: https://t.me/c/3054021775/338
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fb922e14-4a0c-4b76-99e1-b93494dd1bb5.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: India
Victim Industry: Education
Victim Organization: prabharani institute of education
Victim Site: prabharaniinstitutebed.in - 404 CREW CYBER TEAM targets the website of Masterclasses
Category: Defacement
Content: The Group claims to have defaced the website of Masterclasses in Israel.
Date: 2026-01-17T22:07:17Z
Network: telegram
Published URL: https://t.me/crewcyber/568
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/aa7a8be4-09a9-4eff-8418-4401a98491fd.png
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Education
Victim Organization: masterclasses
Victim Site: masterclasses.org.il - Alleged data sale of Wobz Print
Category: Data Breach
Content: Threat actor claims to be selling leaked database of the company Wobz Print, formerly known as Dalvin, based in France. The compromised data reportedly contains 134,000 unique data points including id, name, email address, security key etc.
Date: 2026-01-17T21:47:14Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-France-wobz-print-ex-Dalvin-By-Wobz-134-000
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d71fdd6c-b710-4e30-9aa9-7e74d1be721c.png
Threat Actors: Sorb
Victim Country: France
Victim Industry: Glass, Ceramics & Concrete
Victim Organization: wobz print
Victim Site: resellers.wobz-print.com - Alleged Data Breach of Allo-Internet
Category: Data Breach
Content: Threat Actor claims to have breached the database of Allo-Internet in Russia.
Date: 2026-01-17T21:43:51Z
Network: openweb
Published URL: https://leakbase.la/threads/dump-of-the-database-of-internet-shop-of-technology-allo-internet-ru.48269/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7291e831-c9bf-4e03-9289-92a608f02b96.png
Threat Actors: Cod3xx
Victim Country: Russia
Victim Industry: Consumer Electronics
Victim Organization: allo-internet
Victim Site: allo-internet.ru - Alleged data sale of ASSA ABLOY Opening Solutions (India)
Category: Data Breach
Content: Threat actor claims to be selling leaked data of from the Indian division of Assa Abloy Opening Solutions. The compromised data reportedly contains a total of 276,000 personal data items, 276,000 unique phone numbers, 20,000 unique email addresses. The data primarily contains name, phone number, email, bcrypt password hash, address.
Date: 2026-01-17T21:43:09Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-ASSA-ABLOY-Opening-Solutions-India
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/dcd80a87-3970-44a9-8715-252cb02bbdf3.png
https://d34iuop8pidsy8.cloudfront.net/42994d39-86db-4b03-a42d-7bc316b05ed0.png
Threat Actors: Sorb
Victim Country: India
Victim Industry: Electrical & Electronic Manufacturing
Victim Organization: assa abloy opening solutions
Victim Site: assaabloy.com - Alleged data breach of Algerias National Center for Commercial Register (CNRC)
Category: Data Breach
Content: The group claims to have compromised systems belonging to Algeria’s Ministry of Interior Trade and Regulation of the National Market, specifically referencing the National Center for Commercial Records (CNRC) portal. The actor alleges access to databases, sub‑sites, and FTP services used for government file transfers, along with the extraction of server‑side data.
Date: 2026-01-17T21:25:06Z
Network: telegram
Published URL: https://t.me/DarK07xxxxxxx/644
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/52afffb1-89cb-489d-b83f-a30e444e2a0e.png
https://d34iuop8pidsy8.cloudfront.net/26749f7e-f02b-402a-8f0f-1e99ac7e65ea.png
https://d34iuop8pidsy8.cloudfront.net/9b96d497-a161-44f4-abf4-2ffc39c802bf.png
https://d34iuop8pidsy8.cloudfront.net/1be2d9eb-f02a-4b0c-98ac-e608b75e308f.png
https://d34iuop8pidsy8.cloudfront.net/29fb0d85-ab2a-48d7-b347-4b823c5a0051.png
https://d34iuop8pidsy8.cloudfront.net/86e1d197-888b-442f-963e-c18b5ae2d69d.png
https://d34iuop8pidsy8.cloudfront.net/74f9e38c-d08e-41aa-8fd9-9c37e5e56a79.png
Threat Actors: DARK 07x
Victim Country: Algeria
Victim Industry: Government Administration
Victim Organization: national center for commercial register (cnrc)
Victim Site: sidjilcom.cnrc.dz - Alleged sale of french consumers data
Category: Data Breach
Content: Threat actor claims to be selling 442614 records of French consumers data including last name, id, city, address, number, pwd hash, postal code, mail, note.
Date: 2026-01-17T21:24:09Z
Network: openweb
Published URL: https://breachforums.bf/Thread-FAKE-442614-FRENCH-CONSUMERS
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4b6add82-3fa9-46d9-98d7-8058ee966b92.png
Threat Actors: oef50655
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of cartedepeche.fr
Category: Data Breach
Content: Threat actor claims to have leaked data from cartedepeche.fr, a service platform operated by the Fédération Nationale de la Pêche en France. The compromised data reportedly contains 4 files containing data from all the city of the Gironde.
Date: 2026-01-17T21:14:40Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-NO-LEAK-DUMP-cartedepeche-fr-2026
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9bfc4080-8360-4d8d-afe7-af3a05e9efd5.png
https://d34iuop8pidsy8.cloudfront.net/1315fa7a-9b42-4457-a9df-8719add131d2.png
Threat Actors: AnonymeTorNet
Victim Country: France
Victim Industry: Fishery
Victim Organization: cartedepeche.fr
Victim Site: cartedepeche.fr - Alleged sale of unauthorized access to an unidentified Network & Telecommunications Company
Category: Initial Access
Content: Threat actor claims to be selling unauthorized VPN and multiple RDP users access with development and PROD DB server connections to an unidentified Network & Telecommunications Company. The compromised organization reportedly contain 17 hosts on same subnet and revenue of 105 Million.
Date: 2026-01-17T21:05:52Z
Network: openweb
Published URL: https://breachforums.bf/Thread-VPN-VPN-RDP-WITH-PROD-DB-TELECOM-NETWORK
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/faf82184-69de-4bd7-8701-868cc3887555.png
Threat Actors: CHONG
Victim Country: Unknown
Victim Industry: Network & Telecommunications
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of PoradnikZdrowie
Category: Data Breach
Content: Threat actor claims to have leaked the database of forum PoradnikZdrowie. The forum was compromised on November 2019 and the compromised data reportedly contains 87,879 records including usernames, email addresses, MD5-hashed passwords with salt, and IP addresses.
Date: 2026-01-17T20:26:25Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-PoradnikZdrowie-forum-poradnikzdrowie-pl-2019-11-87-87K-Users
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e6f30e2a-2e42-41b3-a2ea-ba10951a679a.png
Threat Actors: thelastwhitehat
Victim Country: Poland
Victim Industry: Social Media & Online Social Networking
Victim Organization: poradnikzdrowie
Victim Site: forum.poradnikzdrowie.pl - 7 Proxies targets the website of Kachipara Md. Abdur Rashid Mia Degree College
Category: Defacement
Content: The group claims to have defaced the website of Kachipara Md. Abdur Rashid Mia Degree College in Bangladesh
Date: 2026-01-17T20:13:14Z
Network: telegram
Published URL: https://t.me/c/2366703983/935
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/97fdecbd-aad7-4dd4-879e-023c8ea9dce6.png
Threat Actors: 7 Proxies
Victim Country: Bangladesh
Victim Industry: Education
Victim Organization: kachipara md. abdur rashid mia degree college
Victim Site: karmdc.edu.bd - Alleged admin access to an unidentified messaging system in Malaysia
Category: Initial Access
Content: The group claims to have gained administrative access to a Malaysian messaging system, alleging the ability to modify user accounts, permissions, queues, and routing configurations.
Date: 2026-01-17T19:49:33Z
Network: telegram
Published URL: https://t.me/c/3041653742/68
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c7b12925-e2a7-411a-9adb-7a8f18d93c76.png
Threat Actors: AL-MUJAHIDEEN FORCE 313
Victim Country: Malaysia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged access to multiple CCTV systems in Italy
Category: Initial Access
Content: The group claims to have gained unauthorized access to multiple CCTV surveillance systems in Italy
Date: 2026-01-17T19:36:54Z
Network: telegram
Published URL: https://t.me/op_morningstar/205?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/55f56413-c7cc-4029-95dd-47d93c9614f6.png
https://d34iuop8pidsy8.cloudfront.net/4f00a972-be17-4dbf-bd0c-301d4f4fd501.png
Threat Actors: MORNING STAR
Victim Country: Italy
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Nafae Sanitaire falls victim to TENGU Ransomware
Category: Ransomware
Content: The group claims to have obtained 18.2 GB of the organizations data and they intend to publish it within 5-6 days.
Date: 2026-01-17T19:31:32Z
Network: tor
Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/b4a7f8a258b93ba3de493134d47355ffb5b1247dc32f06d17d036c2fab17c457/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b065cd80-fcaf-49a1-b423-5760bc7ba0dd.png
https://d34iuop8pidsy8.cloudfront.net/a7f38690-968b-4c5b-b62b-ebee6e32e773.png
https://d34iuop8pidsy8.cloudfront.net/bb4e8251-28b8-40f9-8632-6795b56042bb.png
Threat Actors: TENGU
Victim Country: Malaysia
Victim Industry: Wholesale
Victim Organization: nafae sanitaire
Victim Site: nafaesanitaire.com - Alleged data breach of Data Protection Authority
Category: Data Breach
Content: Threat actor claims to have leaked data from Data Protection Authority of Belgium. The compromised data reportedly contains 1 million records including name, date of birth, email address, postal address, etc.
Date: 2026-01-17T19:19:42Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-BELGIAN-DATA-PROTECTION-AUTHORITY
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e4630319-e6b1-4751-8fc0-b7ed6fdca10b.png
Threat Actors: ShinyCorporation
Victim Country: Belgium
Victim Industry: Government Administration
Victim Organization: data protection authority
Victim Site: dataprotectionauthority.be - Alleged data breach of Ministry of Culture
Category: Data Breach
Content: Threat actor claims to have leaked database of Ministry of Culture, Brazil. The compromised data reportedly contains 2.9 GB of data.
Date: 2026-01-17T19:18:12Z
Network: openweb
Published URL: https://breachforums.cz/index.php?threads/brazilian-ministry-of-culture.17/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a885cdcf-dd95-406d-a71c-cae68446161c.png
Threat Actors: breach3d
Victim Country: Brazil
Victim Industry: Government Administration
Victim Organization: ministry of culture
Victim Site: cultura.gov.br - Alleged sale of Spain Crypto-Forex Leads
Category: Data Breach
Content: Threat actor claims to be selling crypto-forex leads from Spain. The compromised data reportedly contains 275,000 records including full name, phone number, email, location and whatsapp.
Date: 2026-01-17T19:08:44Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Crypto-Spain-Forex-Leads
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/13143f85-b29f-459d-9ee6-e587e6571670.png
Threat Actors: Highlo
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Ministry of Popular Power for Foreign Affairs
Category: Data Breach
Content: Threat actor claims to have leaked data from Ministry of Popular Power for Foreign Affairs (MPPRE) of Venezuela. The compromised data reportedly contains around 2 million records including full name, email address, national identification number, address, city, etc.
Date: 2026-01-17T18:55:14Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-MINISTRY-OF-FOREIGN-AFFAIRS-OF-VENEZUELA
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3a0a3be1-3fbc-42b0-a432-59c7b9a0bfa9.png
Threat Actors: ShinyCorporation
Victim Country: Venezuela
Victim Industry: Government Administration
Victim Organization: ministry of popular power for foreign affairs
Victim Site: mppre.gob.ve - Alleged data breach of Service Public Federal Justice
Category: Data Breach
Content: Threat actor claims to have leaked data from Service Public Federal Justice, Belgium. The compromised data reportedly contains more than 50 confidential files including PDFs from lawyers and more.
Date: 2026-01-17T18:46:32Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SPF-Justice-HawkSec-Belgium
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/08015626-9d53-4fa6-8936-8937189ca5b8.png
https://d34iuop8pidsy8.cloudfront.net/f1c25ea7-53c6-47e3-ad03-46c27b1a94b2.png
Threat Actors: HawkSec
Victim Country: Belgium
Victim Industry: Government Administration
Victim Organization: service public federal justice
Victim Site: justice.belgium.be - Alleged data breach of Apilage AI
Category: Data Breach
Content: Threat actor claims to have leaked full database of Apilage AI, a Sri Lankan AI learning platform. The compromised data reportedly contains over 1200 students data including all tables, PII (names, emails, phones, student IDs), chat histories, registration details, etc.
Date: 2026-01-17T18:32:44Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-Apilage-AI-apilageai-lk-Sri-Lanka-Student-Platform-Full-DB-1-2k-Records
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/806512e3-f4fa-4945-8c51-ceb60c2e30b0.png
Threat Actors: l4z4rusv01d
Victim Country: Sri Lanka
Victim Industry: E-Learning
Victim Organization: apilage ai
Victim Site: apilageai.lk - Alleged data sale of yachtshop.it
Category: Data Breach
Content: Threat actor claims to be selling unauthorized access and leaked database of yachtshop.it. The compromised data reportedly contains 35,000 records including ID, name, telephone, email, password, mobile, etc.
Date: 2026-01-17T18:22:04Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-yachtshop-it-full-access-on-database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/161e8cb3-8802-472f-9d3e-16c1f8e18155.png
https://d34iuop8pidsy8.cloudfront.net/3a46f412-58b8-4065-a62a-9858ba79be6c.png
Threat Actors: Disease
Victim Country: Italy
Victim Industry: E-commerce & Online Stores
Victim Organization: yachtshop.it
Victim Site: yachtshop.it - Alleged data leak of WebDo
Category: Data Breach
Content: Threat actor claims to have leaked data from WebDo, a cloud-based website builder and hosting platform operated by Q-bis Consult S.R.L., based in Romania. The compromised data reportedly contains 500,000 records including last name, first name, job title, phone, email, url, city, and country code.
Date: 2026-01-17T18:10:34Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-WebDo-com-Breached-500K-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3225f194-1008-4476-9300-b335bdf40ded.png
Threat Actors: RuskiNet
Victim Country: Romania
Victim Industry: Information Technology (IT) Services
Victim Organization: webdo
Victim Site: webdo.com - Alleged leak of over 19,000 Algerian institutional email credentials
Category: Data Breach
Content: The group claims to have leaked 19,381 email accounts and passwords allegedly belonging to Algerian government entities, companies, universities, and banks.
Date: 2026-01-17T17:32:11Z
Network: telegram
Published URL: https://t.me/DarK07xxxxxxx/637?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0e0046a6-5d2d-4a91-b823-c4565621fb4b.png
Threat Actors: DARK 07x
Victim Country: Algeria
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Orthopaedic Specialists of Massachusetts falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained of organizations data.
Date: 2026-01-17T17:19:15Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=570dc719-84f3-3537-b786-46fae6eb04cf
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cd067804-64bb-4af1-9a77-546bc6fb88e9.png
https://d34iuop8pidsy8.cloudfront.net/183e19b0-1f9e-4118-bb97-cfe11e2feeed.png
https://d34iuop8pidsy8.cloudfront.net/c7bd0b1b-8dfc-4711-9301-2daa542059fc.png
Threat Actors: Qilin
Victim Country: USA
Victim Industry: Medical Practice
Victim Organization: orthopaedic specialists of massachusetts
Victim Site: orthomass.com - AN0M949_GHOST_TRACK targets the website of Koyandes Institute of Fashion Studies
Category: Defacement
Content: The group claims to have defaced the website of Koyandes Institute of Fashion Studies
Date: 2026-01-17T15:47:01Z
Network: telegram
Published URL: https://t.me/CyaberGhost/357
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9642c246-1130-421c-ac2f-b0aaed97e119.png
Threat Actors: AN0M949_GHOST_TRACK
Victim Country: India
Victim Industry: Professional Training
Victim Organization: koyandes institute of fashion studies
Victim Site: koyandesfashion.in - Alleged unauthorized access to MTK‑ACMO Heating System Controllers
Category: Initial Access
Content: The group claims to have gained unauthorized access to MTK‑ACMO, a controller used in hybrid heating systems produced by Italian manufacturer MTK. The actor alleges they modified operational parameters, disabled safety protections, altered heating logic, and enabled engineering‑level controls.
Date: 2026-01-17T15:37:59Z
Network: telegram
Published URL: https://t.me/QuietSecOfficial/147
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/47422832-c4f6-41c6-9aed-1b6ecda82ae0.png
https://d34iuop8pidsy8.cloudfront.net/0094fed7-53c3-42dc-949b-8ca7da528c08.png
https://d34iuop8pidsy8.cloudfront.net/1dbbd316-687f-4a48-abe4-af4ea112d9c1.png
Threat Actors: QuietSec
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Unauthorized Access to a Wastewater Treatment SCADA System in Canada
Category: Initial Access
Content: The group claims to have accessed the SNAW-NAW-AS SCADA system at a wastewater treatment plant in Canada, reportedly providing visibility into automated control of pumps, tanks, bioreactors, filtration, disinfection systems, real-time data, alarms, and operational logs.
Date: 2026-01-17T14:43:46Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3361
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e6d0f823-f8f4-4515-b5e4-3f0bad563074.png
https://d34iuop8pidsy8.cloudfront.net/8b698b46-c3f5-4542-9244-223de9f9528d.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: Canada
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of Air France-KLM
Category: Data Breach
Content: The group claims to have leaked the organisations data.
Date: 2026-01-17T13:46:00Z
Network: telegram
Published URL: https://t.me/Team_Cy8er_N4ti0n/74?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9951624c-03bb-463d-b726-3303bd64d909.JPG
Threat Actors: CY8ER N4TI0N
Victim Country: France
Victim Industry: Airlines & Aviation
Victim Organization: air france-klm
Victim Site: airfranceklm.com - Amphibius Accounting System falls victim to TENGU Ransomware
Category: Ransomware
Content: The group claims to have obtained 24 GB of the organizations data and they intend to publish it within 7-8 days.
Date: 2026-01-17T13:39:28Z
Network: tor
Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/effd2f3a99a333472d7397332f60f208e445cb97d57df4fb019cbbc4e77be843/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4a0c023b-fd75-4bb8-9fdf-98a203192300.jpg
https://d34iuop8pidsy8.cloudfront.net/1b57f946-8222-4613-9030-dc91b8e33ff1.jpg
Threat Actors: TENGU
Victim Country: Dominican Republic
Victim Industry: Software Development
Victim Organization: amphibius accounting system
Victim Site: anfibius.net - CyberOprationCulture targets the website of Gunturi Family
Category: Defacement
Content: The group claims to have defaced the website of Gunturi Family.Mirror : https://haxor.id/archive/mirror/242972
Date: 2026-01-17T13:38:27Z
Network: telegram
Published URL: https://t.me/c/3421269527/85
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c54c77f5-698d-4112-a576-d3961735b915.png
Threat Actors: CyberOprationCulture
Victim Country: India
Victim Industry: Individual & Family Services
Victim Organization: gunturi family
Victim Site: gunturifamily.com - Alleged leak of McDonalds
Category: Data Breach
Content: The group claims to have leaked the organisations data.
Date: 2026-01-17T13:34:00Z
Network: telegram
Published URL: https://t.me/Team_Cy8er_N4ti0n/79
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ecceb156-c3e1-4cf2-ac33-4f70022fd211.JPG
Threat Actors: CY8ER N4TI0N
Victim Country: USA
Victim Industry: Food & Beverages
Victim Organization: mcdonalds
Victim Site: mcdonalds.com - Alleged data leak of unidentified laboratory information operating system
Category: Data Breach
Content: The group claims to have leaked the organisations data, allegedly including record no, name, code, hospital type, upper group, region, city and more.
Date: 2026-01-17T13:33:35Z
Network: telegram
Published URL: https://t.me/dienet3/104
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3d2198f5-894f-4664-998a-52f67dae9532.JPG
Threat Actors: DieNet
Victim Country: Turkey
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of login access to Storrekeys
Category: Initial Access
Content: The group claims to be selling webshell access to Storrekeys
Date: 2026-01-17T12:16:25Z
Network: telegram
Published URL: https://t.me/c/2412030007/2059
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c6e17cbc-dc63-4f85-98d7-e9eda875d2f6.jpg
Threat Actors: HMEI7
Victim Country: Yemen
Victim Industry: E-commerce & Online Stores
Victim Organization: storrekeys
Victim Site: storrekeys.com - Alleged leak of login access to Buildamatic
Category: Initial Access
Content: The group claims to be selling webshell access to Buildamatic
Date: 2026-01-17T12:12:16Z
Network: telegram
Published URL: https://t.me/c/2412030007/2059
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/19fae465-84db-409c-a871-5709edfb7fce.JPG
Threat Actors: HMEI7
Victim Country: Pakistan
Victim Industry: Civil Engineering
Victim Organization: buildamatic
Victim Site: buildamatic.com - Alleged leak of login access to Nawafiz
Category: Initial Access
Content: The group claims to be selling webshell access to Nawafiz
Date: 2026-01-17T11:57:46Z
Network: telegram
Published URL: https://t.me/c/2412030007/2059
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e0f96aa0-255f-4db1-9fb2-22d1a6d47185.JPG
Threat Actors: HMEI7
Victim Country: Yemen
Victim Industry: Information Technology (IT) Services
Victim Organization: nawafiz
Victim Site: maffraq.com - Alleged leak of Malaysian data
Category: Data Breach
Content: The group claims to have obtained organization data.
Date: 2026-01-17T11:56:26Z
Network: telegram
Published URL: https://t.me/Team_Cy8er_N4ti0n/64
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b5c0bfcf-38e5-4645-a31d-2fabba83c5ec.png
Threat Actors: CY8ER N4TI0N
Victim Country: Malaysia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of web shell access to Nawafed AI
Category: Initial Access
Content: The group claims to be selling web shell access to Nawafed AI
Date: 2026-01-17T11:51:51Z
Network: telegram
Published URL: https://t.me/c/2412030007/2060
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fe4f3582-4cd0-4322-baf9-64fef76fb1a5.png
Threat Actors: HMEI7
Victim Country: Unknown
Victim Industry: Information Technology (IT) Services
Victim Organization: nawafed ai
Victim Site: nawafed-ai.nawafednet.com - Alleged sale of web shell access to Siginews
Category: Initial Access
Content: The group claims to be selling web shell access to Siginews.
Date: 2026-01-17T11:50:12Z
Network: telegram
Published URL: https://t.me/c/2412030007/2060
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cc8ed808-69e5-43ce-9489-ce9b68fef712.png
Threat Actors: HMEI7
Victim Country: Indonesia
Victim Industry: Newspapers & Journalism
Victim Organization: siginews
Victim Site: siginews.com - BROTHERHOOD CAPUNG INDONESIA targets the website of TamilBlasters
Category: Defacement
Content: The group claims to have defaced the website of TamilBlasters.
Date: 2026-01-17T11:33:15Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c5747711-bf61-48b9-8455-28b4e887196b.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: India
Victim Industry: Legal Services
Victim Organization: tamilblasters
Victim Site: tamilblasters.com.in - Alleged leak of login access to Aasaan Holidays
Category: Initial Access
Content: The group claims to be selling webshell access to Aasaan Holidays
Date: 2026-01-17T11:30:06Z
Network: telegram
Published URL: https://t.me/c/2412030007/2059
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f0a34ffc-45d4-4b14-836e-6ce3ec865a60.JPG
Threat Actors: HMEI7
Victim Country: India
Victim Industry: Leisure & Travel
Victim Organization: aasaan holidays
Victim Site: aasaanholidays.com - 404 CREW CYBER TEAM targets the website of Soravit on Granville
Category: Defacement
Content: The group claims to have defaced the website of Soravit on Granville.
Date: 2026-01-17T11:29:42Z
Network: telegram
Published URL: https://t.me/crewcyber/560
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/40f346c5-fa08-47fd-91e8-c0c698d4a151.jpg
Threat Actors: 404 CREW CYBER TEAM
Victim Country: China
Victim Industry: Hospitality & Tourism
Victim Organization: soravit on granville
Victim Site: soravitgranville.com - BROTHERHOOD CAPUNG INDONESIA targets the website of The American Beat
Category: Defacement
Content: The group claims to have defaced the website of The American Beat
Date: 2026-01-17T11:27:08Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7c39755f-ba6b-46e2-bced-44af4f8a1e9b.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: USA
Victim Industry: Online Publishing
Victim Organization: the american beat
Victim Site: theamericanbeat.site - Alleged leak of login credentials from Canadian University Dubai
Category: Initial Access
Content: Group claims to have leaked login credentials from Canadian University Dubai.
Date: 2026-01-17T11:26:10Z
Network: telegram
Published URL: https://t.me/c/2451084701/451163
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3148f031-4c86-47ae-a0d7-ab860810619a.png
Threat Actors: Buscador
Victim Country: UAE
Victim Industry: Education
Victim Organization: canadian university dubai
Victim Site: cudportal.cud.ac.ae - Alleged leak of login access to Top Digital Expert
Category: Initial Access
Content: The group claims to have leaked login access to Top Digital Expert, also allegedly claiming to have defaced the website.
Date: 2026-01-17T11:15:49Z
Network: telegram
Published URL: https://t.me/z_bl4cx_h4t_id/11
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3081d630-03f4-4053-ba97-6f7d494eaf9c.JPG
Threat Actors: Z-BL4CX-H4T.ID
Victim Country: Spain
Victim Industry: Information Technology (IT) Services
Victim Organization: top digital expert
Victim Site: topdigitalhome.com - BROTHERHOOD CAPUNG INDONESIA targets the website of SajnaAmo
Category: Defacement
Content: The group claims to have defaced the website of SajnaAmo
Date: 2026-01-17T11:15:31Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e4e188ff-3e1f-41a3-81f7-d29ba9e5b881.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Unknown
Victim Industry: Media Production
Victim Organization: sajnaamo
Victim Site: sajnaamo.com - BROTHERHOOD CAPUNG INDONESIA targets the website of streetwearhub.info
Category: Defacement
Content: The group claims to have defaced the website of streetwearhub.info
Date: 2026-01-17T11:15:02Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/674fb59d-d1ca-4235-b5df-7906e3d32bbe.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: streetwearhub.info - BROTHERHOOD CAPUNG INDONESIA targets the website of DigiReach Solutions
Category: Defacement
Content: The group claims to have defaced the website of DigiReach Solutions.
Date: 2026-01-17T11:04:35Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1cfbe19a-9d1d-4dca-a313-d16ce90aa56e.jpg
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: UK
Victim Industry: Marketing, Advertising & Sales
Victim Organization: digireach solutions
Victim Site: new.digireach.uk - Alleged data breach of Brimob Polda Jabar
Category: Data Breach
Content: The group claims to leaked the organisations dataNB: The authenticity of the post is yet to be verified
Date: 2026-01-17T11:04:17Z
Network: telegram
Published URL: https://t.me/Team_Cy8er_N4ti0n/48
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/852d4c62-810e-4689-ae27-ad974e50eaab.JPG
Threat Actors: CY8ER N4TI0N
Victim Country: Indonesia
Victim Industry: Law Enforcement
Victim Organization: brimob polda jabar
Victim Site: brimobpoldajabar.com - BROTHERHOOD CAPUNG INDONESIA targets the website of ScriptBari
Category: Defacement
Content: The group claims to have defaced the website of ScriptBari
Date: 2026-01-17T11:01:46Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7daa61e7-dad2-4d47-b691-e5a08ff71de9.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Bangladesh
Victim Industry: Information Services
Victim Organization: scriptbari
Victim Site: scriptbari.com - BROTHERHOOD CAPUNG INDONESIA targets the website of Out Linkify
Category: Defacement
Content: The group claims to have defaced the website of Out Linkify.
Date: 2026-01-17T10:56:46Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/502b0b16-bbca-4687-9790-383fcfa7a5b6.jpg
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Pakistan
Victim Industry: Marketing, Advertising & Sales
Victim Organization: out linkify
Victim Site: outlinkify.net - BROTHERHOOD CAPUNG INDONESIA targets the website of Learners Academy
Category: Defacement
Content: The group claims to have defaced the website of Learners Academy.
Date: 2026-01-17T10:48:38Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6bdb3220-baf6-4090-aa87-404b205bcd91.jpg
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Pakistan
Victim Industry: Education
Victim Organization: learners academy
Victim Site: learnersacademyhyd.pk - BROTHERHOOD CAPUNG INDONESIA targets the website of The Internet Chicks
Category: Defacement
Content: The group claims to have defaced the website of The Internet Chicks
Date: 2026-01-17T10:43:51Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d18cded5-373d-415b-b575-caa38aa20d9a.JPG
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: UK
Victim Industry: Media Production
Victim Organization: the internet chicks
Victim Site: theinternetchicks.co.uk - Alleged leak of Health center database of Indonesia
Category: Data Breach
Content: The group claims to have leaked data from Health center of Indonesia.
Date: 2026-01-17T10:39:57Z
Network: telegram
Published URL: https://t.me/Team_Cy8er_N4ti0n/53
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b6322635-ed06-4a87-aca1-fc9f3e4fb656.png
Threat Actors: CY8ER N4TI0N
Victim Country: Indonesia
Victim Industry: Hospital & Health Care
Victim Organization: Unknown
Victim Site: Unknown - BROTHERHOOD CAPUNG INDONESIA targets the website of MARIO COTOV
Category: Defacement
Content: The group claims to have defaced the websites of MARIO COTOV.
Date: 2026-01-17T10:28:59Z
Network: telegram
Published URL: https://t.me/c/3054021775/335
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a3ff8b75-bd5d-4371-8fca-d66642630431.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Netherlands
Victim Industry: Graphic & Web Design
Victim Organization: mario cotov
Victim Site: mariocotov.com - BROTHERHOOD CAPUNG INDONESIA targets the website of urduquran.pk
Category: Defacement
Content: The group claims to have defaced the website of urduquran.pk
Date: 2026-01-17T10:28:21Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b035a8a8-6596-44e5-816e-f1bbfbe57c80.JPG
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Pakistan
Victim Industry: Education
Victim Organization: urduquran.pk
Victim Site: urduquran.pk - BROTHERHOOD CAPUNG INDONESIA targets the website of thrivecrafter.com
Category: Defacement
Content: The group claims to have defaced the website of thrivecrafter.com
Date: 2026-01-17T10:25:46Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d49c2e0e-0b11-4fce-a431-3c840998f9c5.JPG
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: thrivecrafter.com - BROTHERHOOD CAPUNG INDONESIA targets the websites of getradio.online
Category: Defacement
Content: The group claims to have defaced the websites of getradio.online.
Date: 2026-01-17T10:20:08Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e63a9972-c1a0-4497-947e-466a7f7b389c.png
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: getradio.online - BROTHERHOOD CAPUNG INDONESIA targets the website of websitespeedtest.online
Category: Defacement
Content: The group claims to have defaced the website of websitespeedtest.online
Date: 2026-01-17T10:00:30Z
Network: telegram
Published URL: https://t.me/c/3054021775/333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2a3e154d-86d0-41d4-a507-aba9eb8c71e5.JPG
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: websitespeedtest.online - Water Utilities Corporation falls victim to Kill Security Ransomware
Category: Ransomware
Content: The group claims to have obtained organizations data.
Date: 2026-01-17T09:59:57Z
Network: tor
Published URL: http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion/?view=WZrs7quhczIF46K1GbKWvRXZ
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/35e1b460-edf9-4638-a4c2-360b12a68c6f.png
Threat Actors: Kill Security
Victim Country: Botswana
Victim Industry: Energy & Utilities
Victim Organization: water utilities corporation
Victim Site: wuc.bw - Benzona ransomware group adds an unknown victim (emint-ho.com) Category: Ransomware Content: The group claims to have obtained 80 GB of the organization’s data. The compromised data includes financial, Hr documents. Date: 2026-01-17T09:17:28Z Network: tor Published URL: http://benzona6x5ggng3hx52h4mak5sgx5vukrdlrrd3of54g2uppqog2joyd.onion/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/1d40811e-8bee-4a13-be6d-467b75802e80.jpg Threat Actors: Benzona Victim Country: Unknown Victim Industry: Unknown Victim Organization: Unknown Victim Site: emint-ho.com
- Alleged data breach of Computer Society of India (CSI)
Category: Data Breach
Content: The group claims to have leaked data from Computer Society of India (CSI).
Date: 2026-01-17T08:59:04Z
Network: telegram
Published URL: https://t.me/eightsixroot/340
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/09a144a4-cd8f-44bd-815e-f09cdac1e81f.png
Threat Actors: EIGHT-SIX ROOT
Victim Country: India
Victim Industry: Non-profit & Social Organizations
Victim Organization: computer society of india
Victim Site: csiindia.org - DR.Claims FL LLC falls victim to Kill Security Ransomware
Category: Ransomware
Content: The group claims to have obtained 350 GB of the organizations data.
Date: 2026-01-17T08:24:04Z
Network: tor
Published URL: http://ks5424y3wpr5zlug5c7i6svvxweinhbdcqcfnptkfcutrncfazzgz5id.onion/index.php?view=e7OMIcnZ0RCf3MAY5rhZSkjs
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ca0faadf-307c-4ac4-b9cd-57c299986558.jpg
https://d34iuop8pidsy8.cloudfront.net/ac2ae368-e5a5-4dee-b5c6-05ea30b14edd.jpg
Threat Actors: Kill Security
Victim Country: USA
Victim Industry: Insurance
Victim Organization: dr.claims fl llc
Victim Site: dr.claims - MAD GHOST claims to target Nova Group
Category: Alert
Content: A Telegram post titled ‘Those who bought tickets for the Ben Gvir real estate conference in September 2025’ is circulating and publicly lists company websites, including Farkash Group. The claims in the post are unverified, and the listed organizations may face increased cyber risk.
Date: 2026-01-17T08:20:00Z
Network: telegram
Published URL: https://t.me/ARABIAN_GHOSTS/1687
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/51c998b4-9f17-40f9-9f87-554daa8c2a12.png
Threat Actors: MAD GHOST
Victim Country: Poland
Victim Industry: Consumer Goods
Victim Organization: nova group
Victim Site: nova-group.co - Alleged leak of Turkish market data
Category: Data Breach
Content: The threat actor claims to have leaked 116,000 user records from a Turkish market platform.
Date: 2026-01-17T08:06:40Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-Turkish-Market-116K-USER
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fc50f2b2-cc06-4e17-89e5-4eb157cd3907.png
Threat Actors: Brazzers
Victim Country: Turkey
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - UGS falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained of organizations data.
Date: 2026-01-17T07:42:20Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=93466c9a-0736-33e6-89bd-bee553f49f05
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c99039f7-e658-497f-9a27-3e82b055c7f7.png
Threat Actors: Qilin
Victim Country: Singapore
Victim Industry: Oil & Gas
Victim Organization: ugs
Victim Site: ugs.com.sg - Alleged data breach of Tirta Sewakadarma
Category: Data Breach
Content: A threat actor claims to have leaked 5,000 customer records from Tirta Sewakadarma. The compromised data reportedly includes customer numbers, customer names, customer addresses, and additional information.
Date: 2026-01-17T07:37:33Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DOCUMENTS-5000-PDAM-customer-data-from-Denpasar-City-Bali-was-leaked
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/87361dbb-6112-4e3d-bab1-a70d7bd7d75b.png
Threat Actors: AYYUBI
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: tirta sewakadarma
Victim Site: pdam.denpasarkota.go.id - Colacem Spa falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained of organizations data.
Date: 2026-01-17T07:37:17Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=9cde3498-8e26-3ca3-9f27-4c6de50f3a77
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ec1b8ee5-29ec-4606-9d3e-11a37ea41637.png
Threat Actors: Qilin
Victim Country: Italy
Victim Industry: Building and construction
Victim Organization: colacem spa
Victim Site: colacem.com - Ilumno falls victim to Qilin ransomware
Category: Ransomware
Content: The threat actor claims to have obtained the organisations data.
Date: 2026-01-17T07:28:19Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=9f5b5e3a-0e3a-3d34-ac31-a2d090269f7b
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4f879a3f-6f19-44fa-87b8-cc0fa129a5be.JPG
Threat Actors: Qilin
Victim Country: USA
Victim Industry: Information Technology (IT) Services
Victim Organization: ilumno
Victim Site: ilumno.com - Laboratorios Smasac falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained of organizations data.
Date: 2026-01-17T06:41:33Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=bd2149c3-8de3-3674-9846-8bef1
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8853c719-61b0-4e3a-a962-c5c825dd259e.png
Threat Actors: Qilin
Victim Country: Peru
Victim Industry: Chemical Manufacturing
Victim Organization: laboratorios smasac
Victim Site: smasac.com - Alleged Leak of Personal Data From Panama.
Category: Data Breach
Content: The threat actor claims to be leaked personal data from Panama. The compromised data reportedly contain 2,666 records including Full names, Phone numbers, Phone numbers.
Date: 2026-01-17T06:39:23Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-%F0%9F%87%B5%F0%9F%87%A6-1k-Panama-people-Name-Phone-Mail%F0%9F%94%A5
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/006fc8ad-b9b5-4050-968e-fd0c9126a126.png
Threat Actors: BrokenSygnal
Victim Country: Panama
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - TRASER SEC TEAM targets the website of mihdm.edu.bd
Category: Defacement
Content: The group claims to have defaced the website mihdm.edu.bd
Date: 2026-01-17T06:33:57Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228314
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7a9fec10-188c-4588-8a39-d60aaacf91ec.png
Threat Actors: TRASER SEC TEAM
Victim Country: Bangladesh
Victim Industry: Education
Victim Organization: muhammadia islamia hafizia dakhil madrasah
Victim Site: mihdm.edu.bd - NotraSec targets the website of Lush Granites LLC
Category: Defacement
Content: The group claims to have defaced the website of Lush Granites LLC.
Date: 2026-01-17T06:28:55Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228962
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1b2b39d1-cbc6-4f43-8504-2c66e9e993f4.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Manufacturing
Victim Organization: lush granites llc
Victim Site: lushgranites.com - NotraSec targets the website of Kosh Innovations
Category: Defacement
Content: The group claims to have defaced the website of Kosh Innovations.
Date: 2026-01-17T06:26:20Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228959
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e6ff21ed-e3be-46e8-b8be-4f913d05cc48.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Manufacturing
Victim Organization: kosh innovations
Victim Site: koshinnovations.com - Team Bangladesh cyber squad targets the website of ideatore.net.in
Category: Defacement
Content: The group claims to have defaced the website of ideatore.net.in
Date: 2026-01-17T06:11:47Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228976
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e4659713-447f-428e-80af-4ed5f8ab6c71.png
Threat Actors: Team Bangladesh cyber squad
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: ideatore.net.in - NotraSec targets the website of AARCS Engineering
Category: Defacement
Content: The group claims to have defaced the website of AARCS Engineering
Date: 2026-01-17T06:07:07Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228936
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f251d6b9-097a-4708-8959-44f0acc7401e.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Building and construction
Victim Organization: aarcs engineering
Victim Site: aarcsengineering.com - NotraSec targets the website of LV Solar Solutions
Category: Defacement
Content: The group claims to have defaced the website of LV Solar Solutions
Date: 2026-01-17T06:06:13Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228963
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a709930f-86d2-4d82-9af7-7eb679d55c3d.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Other Industry
Victim Organization: lv solar solutions
Victim Site: lvsolarsolutions.in - Notrasec targets the website of Kosh Electra
Category: Defacement
Content: The group claims to have defaced the website of Kosh Electra.
Date: 2026-01-17T06:05:04Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228958
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7b604966-bfce-489a-ac25-a961934d7fd3.png
Threat Actors: NotraSec
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: kosh electra
Victim Site: koshelectra.com - Team Bangladesh cyber squad targets the website of HTM Solutions
Category: Defacement
Content: The group claims to have defaced the website of HTM Solutions.
Date: 2026-01-17T06:04:18Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228977
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/35af04b2-2ee3-4c22-aeb0-cf224dff8a88.png
Threat Actors: Team Bangladesh cyber squad
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: htm solutions
Victim Site: htmsolutions.in - NotraSec targets the website of Aqua Green Hotel
Category: Defacement
Content: The group claims to have defaced the website of Aqua Green Hotel
Date: 2026-01-17T06:02:34Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228940
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ce4920d5-47a7-426d-9923-187902f01fd3.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Hospitality & Tourism
Victim Organization: aqua green hotel
Victim Site: aquagreenhotel.com - Central Group Roofing and Building Solutions falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained of organizations data.
Date: 2026-01-17T06:01:50Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ddfb1940-3f0b-35b9-a8bd-6c943cec8967
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/62935015-2d76-4bc9-a589-949ab156bf40.png
Threat Actors: Qilin
Victim Country: UK
Victim Industry: Building and construction
Victim Organization: central group roofing and building solutions
Victim Site: centralroofing.co.uk - NotraSec targets the website of Maha Hydraulics
Category: Defacement
Content: The group claims to have defaced the website of Maha Hydraulics
Date: 2026-01-17T05:58:02Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228964
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5e8f25ac-a3fa-4bda-9c16-08fa97232ddc.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Manufacturing
Victim Organization: maha hydraulics
Victim Site: mahahydraulics.com - NotraSec targets the website of Grand Builders
Category: Defacement
Content: The group claims to have defaced the website of Grand Builders
Date: 2026-01-17T05:51:50Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228952
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3befc95e-3b11-48a0-94a4-34940758c7f2.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Real Estate
Victim Organization: grand builders
Victim Site: grandbuilders.in - NotraSec targets the website of Arunai Super Green Ventures
Category: Defacement
Content: The group claims to have defaced the website of Arunai Super Green Ventures
Date: 2026-01-17T05:47:49Z
Network: openweb
Published URL: https://defacer.id/mirror/id/228942
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6157220a-df40-4129-a4f5-714e95b84a79.png
Threat Actors: NotraSec
Victim Country: India
Victim Industry: Real Estate
Victim Organization: arunai super green ventures
Victim Site: arunaisupergreenventures.com - FLUORSID falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained organizations data.
Date: 2026-01-17T05:41:07Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=684eeabb-ed60-3f08-a0d2-e51c04fa6333
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3cc1176f-893e-4088-922d-3b77a0562359.png
Threat Actors: Qilin
Victim Country: Italy
Victim Industry: Chemical Manufacturing
Victim Organization: fluorsid
Victim Site: fluorsid.com - Alleged Sale of Exelo Combo Tool v2
Category: Malware
Content: Threat actor claims to be offering Exelo Combo Tool v2, a high-volume combo processing and filtering suite designed for handling large-scale credential datasets. The tool is marketed toward power users requiring precise control over combo structure, cleanliness, and output at scale.
Date: 2026-01-17T05:40:09Z
Network: openweb
Published URL: https://demonforums.net/Thread-Exelo-Combo-Tool-v2
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/800607d0-df3f-4939-a66b-f2923a79150f.png
https://d34iuop8pidsy8.cloudfront.net/cdea1d76-d74f-4885-8d29-9ce5c5d1d9f9.png
Threat Actors: Starip
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of DelTaco Checker
Category: Malware
Content: Threat actor claims to be offering DelTaco Checker, a high-speed capture-based credential checking and validation tool. The tool is designed for large-scale checking operations, emphasizing raw throughput, minimal UI overhead, and real-time performance metrics.
Date: 2026-01-17T05:36:16Z
Network: openweb
Published URL: https://demonforums.net/Thread-DelTaco-Checker-by-sup1s2d
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bd2385fb-bb67-47c4-80e3-4123ec9358d2.png
Threat Actors: Starip
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of North Korea
Category: Data Breach
Content: The group claims to have leaked North Korea databases.
Date: 2026-01-17T05:22:41Z
Network: telegram
Published URL: https://t.me/eightsixroot/336
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c1aeadbf-80e1-41c2-9626-3e1c368da20b.png
Threat Actors: EIGHT-SIX ROOT
Victim Country: North Korea
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Agence Régionale de Santé Auvergne‑Rhône‑Alpes
Category: Data Breach
Content: The threat actor claims to have leaked data related to Auvergne, a state public establishment in France. The compromised data reportedly contains 3,824 records, including municipality names, user details, email addresses, project statuses, and health policy-related information.
Date: 2026-01-17T04:06:25Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FRENCH-auvergne-rhone-alpes-ars-sante-fr-Leaked
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4a5c73c5-9d30-4fb7-99f8-32f595ec98e7.png
https://d34iuop8pidsy8.cloudfront.net/2db5615a-afbd-4cb7-9b63-7f90cc727b09.png
Threat Actors: RuskiNet
Victim Country: France
Victim Industry: Hospital & Health Care
Victim Organization: agence régionale de santé auvergne‑rhône‑alpes
Victim Site: auvergne-rhone-alpes.ars.sante.fr - Alleged data leak of UK databases
Category: Data Breach
Content: The group claims to have leaked over 5000 of UK databases. The compromised data reportedly includes Email, Name and Mobile Phone.
Date: 2026-01-17T03:03:23Z
Network: telegram
Published URL: https://t.me/PRIMZX/60
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b7caf9bc-3ea5-461c-a4d6-9f8cf9028905.png
Threat Actors: PRIMZX
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of unidentified Gambling store in Thailand
Category: Data Breach
Content: The group claims to have leaked Thailand Gambling Database.
Date: 2026-01-17T03:01:58Z
Network: telegram
Published URL: https://t.me/PRIMZX/60?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/121600be-3cd0-4bbe-ad73-99641c2178f8.png
Threat Actors: PRIMZX
Victim Country: Thailand
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Access to USA-Based SSH Servers
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to four USA-based SSH access credentials.
Date: 2026-01-17T02:37:03Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-4x-USA-BASED-SSH-ACCESS
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7c55b610-85f3-4255-8f6f-1bc568cbbbce.png
Threat Actors: innocentzero
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Belgium
Category: Data Breach
Content: The group claims to have leaked Belgium data. The compromised data reportedly includes phone, email, name, Date of birth and Address.
Date: 2026-01-17T02:34:19Z
Network: telegram
Published URL: https://t.me/PRIMZX/61
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/91607cac-ed3c-43bb-ad3d-6c2d3fd06188.png
Threat Actors: PRIMZX
Victim Country: Belgium
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of BNMI India
Category: Data Breach
Content: The threat actor claims to be leaked data from BNMI India.
Date: 2026-01-17T02:29:50Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-Database-Leak-https-bnmiindia-com
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6e1408f3-1770-4aea-a3dd-c121a3407331.png
Threat Actors: humptydumpty_008
Victim Country: India
Victim Industry: Education
Victim Organization: bnmi india
Victim Site: bnmiindia.com - Alleged Data Breach of City of Sevran
Category: Data Breach
Content: The threat actor claims an alleged data breach involving the City of Sevran, the exposed data originates from a structured CSV directory containing professional and administrative information related to municipal staff members for the period 2023–2025.
Date: 2026-01-17T02:16:30Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FR-Sevran-city-staff-2025
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/19794620-8581-4017-ade8-69ca9e06b230.png
Threat Actors: 307sql
Victim Country: France
Victim Industry: Government Administration
Victim Organization: city of sevran
Victim Site: ville-sevran.fr - Alleged Data Breach of PIX
Category: Data Breach
Content: The threat actor claims an alleged data breach of PIX, the leaked database contains approximately 35,000 records related to students and participants who used the PIX platform during 2023–2024.
Date: 2026-01-17T01:49:21Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-PIX-FR-FRENCH-WEBSITE-35K
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/40952ef6-827f-4a0f-93a5-766ba7da774f.png
Threat Actors: 307sql
Victim Country: France
Victim Industry: E-Learning
Victim Organization: pix
Victim Site: pix.fr