[January-22-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a comprehensive analysis of 124 distinct cybersecurity incidents recorded on January 22, 2026. The intelligence data indicates a highly volatile threat landscape characterized by a synchronized surge in ransomware campaigns, massive unauthorized data disclosures, and targeted attacks on critical infrastructure and operational technology (OT) systems.

The reporting period was dominated by three primary vectors of activity:

  1. Ransomware Resurgence: A coordinated or coincidental spike in activity from major ransomware groups, specifically CL0P, Akira, Qilin, and Brain Cipher. The CL0P group, in particular, demonstrated a distinct targeting pattern focused on the architecture, engineering, and construction (AEC) sectors in North America and Europe.
  2. Mega-Breaches and Data Brokers: High-value corporate and government entities faced alleged data compromise. Significant claims involve Nike, Inc., Squarespace, Binance (Brazil), and the Japanese Government (specifically regarding rare earth metal mining). The scale of data exposure ranges from thousands of sensitive medical records to datasets exceeding 30 million entries.
  3. OT and Critical Infrastructure Targeting: A disturbing trend of “Infrastructure Destruction” actors targeting building automation and heating systems in France and the USA, moving beyond data theft to potential physical disruption.

This report dissects these incidents by category, threat actor, and geopolitical impact to provide an operational picture of the current cyber threat environment.


2. Threat Landscape Overview

2.1. Operational Metrics

  • Total Events: 124
  • Dominant Attack Type: Data Breach (approx. 55%), followed closely by Ransomware (approx. 25%) and Website Defacement (approx. 10%).
  • Key Threat Actors: CL0P, Akira, Qilin, Brain Cipher, 0xy0um0m (prolific data broker), and hacktivist groups like chinafans and ZenXPloit.

2.2. Geographic Heatmap Analysis

The incidents recorded on January 22 display a global distribution with intense concentrations in specific regions:

  • North America (USA/Canada): Heavily targeted by ransomware groups (CL0P, Akira) and financial data breaches. The focus on architectural and environmental firms is notable.
  • Europe (France/Germany/UK/Belgium): High volume of diverse attacks. France faced significant data leaks (education, logistics) and OT attacks. Germany suffered multiple cyberattacks disrupting public transport (VGMT) and audit institutions (IDW).
  • Asia-Pacific (China/India/Japan/Bangladesh): dominated by large-scale personal data leaks (consumer data, app user bases) and strategic government leaks (Japan).
  • Middle East (UAE/Israel/Syria): A mix of financial fraud (UAE bank accounts), government data leaks (Abu Dhabi Mobility), and hacktivist defacements targeting Israeli businesses.
  • South America (Brazil/Argentina/Chile/Colombia): Persistent ransomware activity (Qilin targeting Argentina) and municipal data breaches.

3. Deep Dive: The Ransomware Offensive

January 22, 2026, marked a significant escalation in ransomware activity. The data suggests that several major Ransomware-as-a-Service (RaaS) groups were conducting simultaneous campaigns.

3.1. The CL0P Group: Targeted Campaign Against the AEC Sector

The CL0P ransomware group was the most prolific threat actor in this category during the reporting period, executing what appears to be a sector-specific campaign targeting Architecture, Engineering, and Construction (AEC) firms.

  • Victim Profile: The group claimed victims including Elk Air Conditioning & Heating , Smith Dalia Architects , BAQUS Construction (UK) , Eastern Platinum Ltd. (Canada) , Montalba Architects , itRobotics , Warranty First , Taylor Oballa Murray Leyland LLP , Integroy Construction , and Environmental Corporation of America.
  • Tactical Analysis: The rapid succession of these listings on CL0P’s leak site suggests a bulk exploitation event or a completed campaign where victims were posted en masse. The focus on architecture and environmental services suggests the group may be leveraging a specific vulnerability in software common to this industry (e.g., CAD software, project management tools, or specialized file transfer systems).
  • Data Sensitivity: The stolen data likely includes high-value intellectual property, blueprints, critical infrastructure diagrams (in the case of environmental and heating firms), and client financial data.

3.2. Akira Ransomware: Industrial and Construction Focus

The Akira ransomware group continued its operations with a focus on heavy industry, manufacturing, and construction, maintaining a “double extortion” tactic where data is exfiltrated prior to encryption.

  • Ocean Fish (Romania): A food production company. Akira claims to hold 10 GB of data, including employee personal info, financial records, and project files. Notably, this organization was reportedly hit by LYNX Ransomware just days prior, indicating a “double-tap” scenario where a weakened victim is targeted by a second group.
  • Van Eycken Metal Construction (Belgium): Akira claims to have exfiltrated 69 GB of data, including passport details, scanned IDs, and HR records.
  • Universal Builders Supply (USA): A claim of 22 GB of data exfiltration involving SSNs, passports, and driver’s licenses.
  • Radial Engineering (Canada): A music/manufacturing entity where 31 GB of data, including NDAs and customer info, was allegedly stolen.
  • Spiros Industries (USA): A manufacturing victim listed without specific data volume details.

3.3. Qilin Ransomware: International Reach

Qilin (also known as Agenda) demonstrated a global reach, hitting diverse sectors from energy to finance.

  • EDF Group (USA) & SiNetCon GmbH (Germany): Both IT service providers were listed, suggesting Qilin may be targeting the supply chain to leverage access into downstream clients.
  • Provincia Leasing S.A. (Argentina): A financial services firm.
  • Farmacias Vilela (Argentina): A retail pharmacy chain.
  • Copetrol (Paraguay): An oil and gas entity, highlighting the group’s willingness to target critical energy sectors.

3.4. Brain Cipher: Data Heavyweights

The Brain Cipher group distinguished itself by claiming massive data exfiltration volumes, posing severe regulatory risks for victims.

  • Kansai Integrated Systems (Japan): The group claims to have 500 GB of SQL and Oracle databases, along with internal documents.
  • FLB Group Limited (UK): A printing company where the group alleges to have stolen 700 GB of data.
  • NorthWind Land Resources Inc. (Canada): An environmental services firm with 42 GB of data allegedly compromised.

3.5. Emerging and Other Ransomware Variants

  • PLAY Ransomware: Targeted California Tax Data (USA), a government relations entity, claiming possession of highly sensitive budget, payroll, and tax information.
  • STORMOUS: Targeted Claro Chile S.A., a major telecommunications provider, threatening to publish data within 1-2 days.
  • INC RANSOM: Targeted the legal firm Elmore Goldsmith Kelley & Deholl.
  • TENGU: A lesser-known group targeting Strong Wings LLP (India, Automotive) with 23 GB of data.
  • Benzona: Claimed a massive 300 GB theft from an unidentified victim (hinted as *a*ame*i*a.com.g*), potentially a media or government entity.
  • Sinobi: Targeted Onsight (UK Media Production), claiming a massive 700 GB exfiltration.

4. Operational Technology (OT) and Critical Infrastructure Attacks

Perhaps the most alarming trend in the January 22 report is the shift towards physical systems manipulation. Unlike standard data breaches, these incidents involve unauthorized access to building management systems (BMS) and industrial controls, posing physical safety risks.

4.1. Heating and Building Control Systems

  • College du Val d’Arros (France): The “Infrastructure Destruction Squad” claimed access to the centralized building control system. They provided screenshots allegedly showing control over boilers, circulation pumps, and thermal energy infrastructure. The threat actors highlighted their ability to manipulate operating schedules and temperature thresholds.
  • Bunker Hill Engine Service LLC (USA): The “Z-PENTEST ALLIANCE” claimed administrative control over heating and snowmelt systems. They explicitly stated they could monitor and manipulate temperatures and boilers, acknowledging that such actions led to “system disruption and hazardous conditions”.

4.2. Industrial Automation

  • INELSUR (Spain): The “Infrastructure Destruction Squad” also claimed unauthorized access to this industrial automation company.
  • VGMT (Germany): A malware-based cyberattack on the Verkehrsgesellschaft Main-Tauber mbH transport company encrypted servers. While buses kept running, the mobility center and communication lines were paralyzed.

These incidents represent a dangerous convergence of cyber threats and physical safety, often referred to as Cyber-Physical Systems (CPS) attacks.


5. Major Data Breaches and Corporate Espionage

The volume of data allegedly available for sale or leaked on January 22 is staggering. This section analyzes the most significant breaches based on data sensitivity and victim profile.

5.1. Corporate Giants and Strategic Entities

  • Nike, Inc. (USA): The threat group “Worldleaks” claims to have obtained data from the retail giant and intends to publish it within 48 hours. If confirmed, this could involve millions of consumer records and proprietary product data.
  • Squarespace (USA): A threat actor “spacingsquares” claims to have breached internal portals, exposing data of 2 million users. The breach is attributed to a lack of 2FA and reliance on simple credentials. This poses a risk of domain hijacking for Squarespace customers.
  • Binance (Brazil): A database of 31,000 users (names, emails, phones) was shared, allegedly obtained via phishing.
  • Salesfloor (Canada): A massive claim by “LAPSUS-GROUP” involving 4TB of uncompressed data, including source code and internal databases from the retail clienteling platform.
  • Japanese Government (Rare Earth Mining): A threat actor “jrintel” claims to have leaked confidential documents related to rare earth metal mining, supply chains, and resource extraction policies. This is an event with significant geopolitical and economic security implications.

5.2. Healthcare and Medical Data (PHI)

  • CallOnDoc (USA): An alleged breach of 1.14 million patient records including medical conditions, prescriptions, and payment details.
  • Metro Contracting Company LLC (UAE): A sale of 97,000 records involving medical training and hospital affiliations.
  • Covid Patients Database (Venezuela): A leak of sensitive health data and contact info for COVID-19 patients.
  • Santa Maria das Barreiras (Brazil): A 37 GB breach of a municipal hospital including lab tests and medical visit records.

5.3. Government and Public Sector

  • Dresden State Art Collections (Germany): A confirmed cyberattack paralyzed the museum network’s digital infrastructure, including ticket sales and shops.
  • Ministry of Higher Education (Algeria): Unauthorized access and database exfiltration claimed by “DARK 07x”.
  • Embassy of Albania in Greece: A leak of 2,800 sensitive diplomatic files.
  • Abu Dhabi Mobility (UAE): A leak of a “girls database” including driver’s licenses and documents.
  • Pengadilan Negeri Jayapura (Indonesia): A district court database leak.

5.4. E-Commerce and Consumer Data

Prolific threat actors like 0xy0um0m flooded forums with databases from various smaller vendors.

  • Rue du Commerce (France): A significant breach of 2.1 million user records.
  • Lola Pizza (Russia): 279,000 order records and 84,000 user records.
  • ShowMyParking (India): 650,000 records including vehicle numbers.
  • MyZJK, 7Ai App, XFSBZ, HQY E-Will (China): Millions of combined records involving phone numbers and user details leaked by 0xy0um0m.

6. The “Access-as-a-Service” Market

Beyond data leaks, the report highlights a thriving market for Initial Access Brokers (IABs) and malware developers, facilitating future attacks.

6.1. Initial Access Sales

  • University Access (Argentina): RCE (Remote Code Execution) access to a private university was listed for sale, a critical vulnerability allowing total system control.
  • CCTV Systems (Czech Republic): The “MORNING STAR” group claimed access to multiple surveillance systems.
  • UAE Bank Accounts: Access to personal and business accounts for fund handling was advertised.
  • Baspar Test Accuracy (Iran): WordPress admin access being sold.

6.2. Malware and Evasion Tools

  • Windows Defender Bypass: A threat actor offered “CastleCrypt,” a service to obfuscate malware to evade Windows Defender and SmartScreen.
  • In-Memory Cryptor: A tool for executing payloads directly in memory (fileless malware) to avoid antivirus detection.
  • Unique Windows Installation: Traffic selling for malware distribution via custom Windows builds.

7. Hacktivism and Website Defacements

Political and ideological motivations continue to drive low-sophistication but high-visibility attacks.

  • Anti-Israel Activity: The group chinafans executed a wave of website defacements against Israeli businesses, including Lagansky Bar, Cards And Cases, Eyal Segal Photography, and others.
  • ZenXPloit Campaign: This group targeted websites in Mexico (Veta Vertical, Phoenix Insumos), Brazil (Studio Synergy Fit), and the UK (MaxiBeat Ltd) with defacements.
  • Ukraine/Russia/Other: Outsiders targeted a UK parish council (Appleton & Eaton) but the victim country was listed as Ukraine in the source, possibly indicating a misidentified target or proxy war spillover.

8. Detailed Regional Analysis

8.1. North America (USA & Canada)

The region remains the primary target for high-stakes ransomware. The CL0P campaign against architecture firms suggests a strategic assessment by threat actors that these firms have critical deadlines and high willingness to pay. The Squarespace and Nike breaches highlight the vulnerability of the digital supply chain. The Bunker Hill heating system hack introduces a physical safety dimension to US cyber threats.

8.2. Europe (Germany, France, UK)

Germany is currently besieging a wave of disruptive attacks on public institutions (Dresden Museum, VGMT transport, Leinerstift social services). France is seeing a mix of industrial sabotage (College du Val d’Arros) and large-scale data leaks (Rue du Commerce, Fédération Nationale des Chasseurs). The UK faced ransomware attacks on FLB Group, Warranty First, and BAQUS Construction.

8.3. Asia (China, Japan, India)

China is experiencing a “leak wave” where millions of user records from various apps are being dumped on forums, likely by financially motivated actors like 0xy0um0m. Japan faces a serious economic security incident with the Rare Earth mining document leak. India is seeing breaches in the education (Yellow Slate, Proz.in) and transport (ShowMyParking) sectors.

8.4. Middle East (UAE, Israel)

The UAE is a hotspot for data monetization, with breaches in construction, mobility, and banking. Israel continues to be a lightning rod for hacktivist defacements, likely correlated with regional geopolitical tensions.


9. Conclusion

The events of January 22, 2026, illustrate a cyber threat landscape that is aggressive, diversified, and increasingly physical.

Key Takeaways:

  1. Sector-Specific Targeting is Mature: The CL0P ransomware campaign against the architecture and construction industry is not random. It indicates high-level reconnaissance and an understanding of sector-specific pressure points.
  2. The Rise of “Infrastructure Destruction”: The claims regarding the manipulation of heating and boiler systems in France and the USA by groups like “Infrastructure Destruction Squad” and “Z-PENTEST ALLIANCE” mark a dangerous evolution. These are not just data breaches; they are attempts to cause physical damage or create hazardous environments.
  3. Data as a Commodity: The sheer volume of data dumps—from Nike corporate secrets to COVID-19 patient records and French hunting licenses—shows that the data brokerage market is saturated. Threat actors are monetizing everything from high-value IP to trivial user logs.
  4. Supply Chain Fragility: Breaches at Squarespace and Salesfloor demonstrate how compromising a single service provider can expose millions of downstream users and businesses.
  5. Global Ransomware Synchronization: The simultaneous activity of Akira, Qilin, Brain Cipher, and CL0P suggests that January 2026 is a period of peak operational tempo for RaaS groups.

Strategic Recommendations:

  • Immediate Patching & Segmentation: Organizations in the Architecture and Construction sectors must immediately review security postures, specifically regarding file transfer appliances and remote access portals, given the CL0P campaign.
  • OT Security Audit: Facilities management in public institutions (schools, hospitals) must segregate building control systems (heating, HVAC) from public-facing networks to prevent the type of exploitation seen at College du Val d’Arros.
  • Credential Hygiene: The Squarespace breach reinforces the mandatory need for Multi-Factor Authentication (MFA) on all administrative portals.
  • Supply Chain Vigilance: Companies using third-party IT or retail platforms (like Salesfloor or Zendesk) should verify their vendors’ security status immediately.

This report confirms that the cyber domain remains a contested space where criminal profit seeking, hacktivist ideology, and state-adjacent espionage overlap with increasing intensity.

Detected Incidents Draft Data

  1. Alleged Sale of Windows Defender Bypass
    Category: Malware
    Content: Threat actor claims to be offering CastleCrypt, a manual crypting service for executable files. The service allegedly provides obfuscation and encryption techniques designed to evade detection by Windows Defender, Chrome security mechanisms, and Microsoft SmartScreen.
    Date: 2026-01-22T23:52:47Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274366/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/51a73d4b-21f0-4b06-a83e-87cf5387a4f2.png
    https://d34iuop8pidsy8.cloudfront.net/648b0cfb-e149-4ff8-b26b-db85152bc4e1.png
    Threat Actors: castle
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Alleged data sale of Metro Contracting Company LLC
    Category: Data Breach
    Content: Threat actor claims to be selling medical training records & hospital affiliations database from Metro Contracting Company LLC, UAE. The compromised data reportedly contains 97,000 records including record id, program batch, program name, participant sequence, participant first name, participant last name, etc.
    Date: 2026-01-22T23:17:51Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-97k-United-Arab-Emirates-https-www-google-com-search-q-metrouae-com-Medical-P
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/66003d86-db0a-49d0-a38c-9c5f577254bc.png
    Threat Actors: gtaviispeak
    Victim Country: UAE
    Victim Industry: Building and construction
    Victim Organization: metro contracting company llc
    Victim Site: metrouae.com
  3. Cyber Attack hits Dresden State Art Collections
    Category: Cyber Attack
    Content: Dresden State Art Collections has confirmed a targeted cyberattack that disrupted large parts of its digital infrastructure, paralyzing the websites of its entire museum network. As a result, online services—including the online shop and ticket sales—are currently unavailable, and the organization is experiencing significant telephone and digital communication restrictions. on-site ticket counters and museum visits remain operational, and physical security systems were not affected. The scope and perpetrators of the attack have not been disclosed, and recovery timelines remain unclear.
    Date: 2026-01-22T22:43:59Z
    Network: openweb
    Published URL: https://www.mdr.de/nachrichten/sachsen/dresden/dresden-radebeul/hackerangriff-staatliche-kunstsammlungen-100.html
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Germany
    Victim Industry: Museums & Institutions
    Victim Organization: dresden state art collections
    Victim Site: skd.museum
  4. Alleged sale of unauthorized access to an unidentified private university in Argentina
    Category: Initial Access
    Content: The threat actor claims to be selling alleged remote code execution (RCE) access to an unidentified private university in Argentina
    Date: 2026-01-22T22:40:36Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Selling-Selling-access-to-a-private-university-in-Argentina
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4ba8f5a-c792-4ce7-8b5f-30c12aaf332d.png
    Threat Actors: Kom_Nara
    Victim Country: Argentina
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Cyber Attack hits Verkehrsgesellschaft Main-Tauber mbH (VGMT)
    Category: Cyber Attack
    Content: Verkehrsgesellschaft Main-Tauber mbH (VGMT) has confirmed a malware-based cyberattack affecting its office and the Lauda mobility center, resulting in the encryption of servers and files. Public transport services, including regular, school bus, and taxi operations, remain unaffected, but VGMT and the mobility center are temporarily unreachable by phone and email and closed to the public. Cybersecurity authorities, police, insurers, and the state data protection commissioner have been notified, and recovery efforts are underway with enhanced security measures.
    Date: 2026-01-22T22:36:10Z
    Network: openweb
    Published URL: https://www.main-tauber-kreis.de/Landratsamt/Aktuelles/Pressemitteilungen/VGMT-und-Mobilit%C3%A4tszentrale-von-Cyberangriff-betroffen.php
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Germany
    Victim Industry: Transportation & Logistics
    Victim Organization: verkehrsgesellschaft main-tauber mbh (vgmt)
    Victim Site: vgmt.de
  6. Alleged sale of a cryptor/loader tool with in‑memory execution capabilities
    Category: Malware
    Content: The threat actor claims to be selling a cryptor/loader tool designed to encrypt Windows executables and execute them directly in memory, describing features such as AES‑based payload encryption, polymorphic builds, and in‑memory loading techniques, and stating that the tool is provided with its source code.
    Date: 2026-01-22T22:31:00Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274354/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cd0d392b-d11c-43ca-9e2f-0e037af641cf.png
    https://d34iuop8pidsy8.cloudfront.net/c59eac8f-0b01-407a-9d1e-b007b0417eb7.png
    Threat Actors: c2flow
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged data leak of an unidentified insurance company in UK
    Category: Data Breach
    Content: The threat actor claims to have gained unauthorized access to an unidentified UK‑based insurance company and extracted information belonging to more than 4,000 insurance brokers.
    Date: 2026-01-22T22:26:13Z
    Network: openweb
    Published URL: https://leakbase.la/threads/uk-insurance-company-access.48356/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4e72b3dc-a1ad-4dd2-9da0-938255e028a5.png
    Threat Actors: .dba
    Victim Country: UK
    Victim Industry: Insurance
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data leak of Covid Patients database
    Category: Data Breach
    Content: A dataset allegedly containing records of COVID-19 patients from Venezuela was exposed . The leaked data reportedly includes personal and contact information such as phone numbers, and in some cases additional sensitive health-related details associated with COVID-19 cases.
    Date: 2026-01-22T22:23:00Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/36d43d27-eb1c-45f3-9fd9-3d4cee78a615.png
    https://d34iuop8pidsy8.cloudfront.net/be5464e6-0c53-4a0e-885e-d761a8b4f982.png
    Threat Actors: 0xy0um0m
    Victim Country: Venezuela
    Victim Industry: Hospital & Health Care
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Alleged data breach of Municipality of Coronel Sapucaia
    Category: Data Breach
    Content: The group claims to have breached the database of Municipality of Coronel Sapucaia and leaked administrative and user tables containing names, email addresses, login usernames, and password hashes for multiple municipal staff and administrators, including accounts linked to procurement, communication, and press functions
    Date: 2026-01-22T22:18:36Z
    Network: telegram
    Published URL: https://t.me/crewcyber/589
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a0668c81-767c-4f8e-b45d-223af50f3d5b.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Brazil
    Victim Industry: Government Administration
    Victim Organization: municipality of coronel sapucaia
    Victim Site: coronelsapucaia.ms.gov.br
  10. Cyber Attack hits Blijdorp vzw
    Category: Cyber Attack
    Content: Blijdorp vzw has confirmed a cybersecurity incident that led to the precautionary shutdown of its local servers. The attack was quickly detected by IT staff, and while phone access at the Buggenhout site was temporarily unavailable, cloud-based care systems continued to operate normally. the impact appears limited, and IT teams are working with external cybersecurity experts to analyze the incident and restore full operations as quickly as possible. There has been no reported disruption to client care services.
    Date: 2026-01-22T22:16:57Z
    Network: openweb
    Published URL: https://www.nieuwsblad.be/regio/oost-vlaanderen/denderregio/dendermonde/blijdorp-getroffen-door-cyberattack-geen-hinder-voor-clienten/125675899.html
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Belgium
    Victim Industry: Hospital & Health Care
    Victim Organization: blijdorp vzw
    Victim Site: blijdorp.be
  11. Alleged data breach of GestionShop
    Category: Data Breach
    Content: The threact actor claims to have leaked data from GestionShop. The exposed data reportedly includes customer and business account records, such as email addresses, contact details, and order- or service-related information.
    Date: 2026-01-22T22:13:56Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8e631b02-c29f-4ab7-b84d-ee3624ab1545.png
    https://d34iuop8pidsy8.cloudfront.net/ad938f85-85e8-4c2b-af20-c9a10ebdc3b1.png
    Threat Actors: 0xy0um0m
    Victim Country: Colombia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: gestionshop
    Victim Site: gestionshop.co
  12. Alleged data breach of Lola Pizza
    Category: Data Breach
    Content: Threat actor claims to be selling leaked orders and users data from Lola Pizza. The compromised data reportedly contains 279,000 rows of order data including id, order name, phone number, client request response, etc and 84,000 rows of user data including id, username, email, password hash, Ip address, etc.
    Date: 2026-01-22T22:12:11Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-full-database-of-lolapizza-ru
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2605b76a-feb8-4763-92fd-c67f2b235bb0.png
    Threat Actors: scorpion1337
    Victim Country: Russia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: lola pizza
    Victim Site: lolapizza.ru
  13. Alleged data breach of Hishabee
    Category: Data Breach
    Content: The threat actor claims to have accessed Hishabee systems, exposing merchant and user-related data. The leaked information reportedly includes names, phone numbers, email addresses, business details, account-related metadata, and other associated personal information.
    Date: 2026-01-22T22:06:29Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3982cafa-3879-4fb1-b6eb-62e01e14c0a5.png
    https://d34iuop8pidsy8.cloudfront.net/1c44ed50-b628-4cc9-a2dc-7fc8af5de830.png
    Threat Actors: 0xy0um0m
    Victim Country: Bangladesh
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: hishabee
    Victim Site: hishabee.io
  14. Alleged data breach of Rue du Commerce
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset from Rue du Commerce, containing 2,167,681 user records with names, email addresses, phone numbers, and full postal address information.
    Date: 2026-01-22T21:57:14Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274357/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/08603ecd-f20d-4812-bfa6-6e57483d72b2.png
    Threat Actors: renn
    Victim Country: France
    Victim Industry: E-commerce & Online Stores
    Victim Organization: rue du commerce
    Victim Site: rueducommerce.fr
  15. Alleged data breach of Baguero
    Category: Data Breach
    Content: The threat actor claims to have obtained a database containing customer records, including email addresses, phone numbers, and other marketing-related contact information.
    Date: 2026-01-22T21:56:16Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1845fd82-8889-4fed-9608-6dd6c0227ba7.png
    https://d34iuop8pidsy8.cloudfront.net/53ccb9e8-ec66-4f87-ae1d-a9292b5f7054.png
    Threat Actors: 0xy0um0m
    Victim Country: Colombia
    Victim Industry: Consumer Services
    Victim Organization: baguero
    Victim Site: baguero.co
  16. Alleged data breach of Dinesh Gahlot
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 500,000 Dinesh Gahlot user records, containing email addresses and phone numbers, allegedly originating from dineshgahlot.org.
    Date: 2026-01-22T21:52:32Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2791a0b5-b243-464d-9059-aaeb30223efc.png
    https://d34iuop8pidsy8.cloudfront.net/7c0bc14e-8514-468a-a543-3585a1547e3a.png
    Threat Actors: 0xy0um0m
    Victim Country: India
    Victim Industry: Education
    Victim Organization: dinesh gahlot
    Victim Site: dineshgahlot.org
  17. Alleged data breach of Bisemultan University
    Category: Data Breach
    Content: The threat actor claims to have breached Bisemultan University systems, exposing student and examination-related records.
    Date: 2026-01-22T21:46:08Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e5295b66-917b-4718-9bc6-14d3d286bfa3.png
    https://d34iuop8pidsy8.cloudfront.net/a8159b9a-69e3-4769-96b2-9c3731d12129.png
    Threat Actors: 0xy0um0m
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: bisemultan university
    Victim Site: bisemultan.edu.pk
  18. Alleged data breach of Proz.in
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 800,000 Proz.in records, including unique contact information and around 36,000 teacher records containing full school details, allegedly originating from proz.in.
    Date: 2026-01-22T21:40:32Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fc9aae43-5c5b-408a-baf0-9393bdae1f87.png
    https://d34iuop8pidsy8.cloudfront.net/d3d3857f-b400-406c-ae7b-f6297f1ab0fd.png
    Threat Actors: 0xy0um0m
    Victim Country: India
    Victim Industry: Education
    Victim Organization: proz.in
    Victim Site: proz.in
  19. Claro Chile S.A. falls victim to STORMOUS Ransomware
    Category: Ransomware
    Content: Group claims to have obtained organizations data and they intend to publish it within 1-2 days.
    Date: 2026-01-22T21:39:08Z
    Network: tor
    Published URL: http://pdcizqzjitsgfcgqeyhuee5u6uki6zy5slzioinlhx6xjnsw25irdgqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/52e88978-86ea-4d57-abf5-13f8c629a136.png
    Threat Actors: STORMOUS
    Victim Country: Chile
    Victim Industry: Network & Telecommunications
    Victim Organization: claro chile s.a.
    Victim Site: clarochile.cl
  20. Alleged data breach of MyZJK
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 657,500 MyZJK user records, containing phone numbers and additional personal information, allegedly originating from myzjk.com.
    Date: 2026-01-22T21:38:15Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5d1f29f6-5bac-4d96-b51f-9b4f224037e7.png
    https://d34iuop8pidsy8.cloudfront.net/83dd8cf4-5aa7-4888-af27-7c7d77cd90f9.png
    Threat Actors: 0xy0um0m
    Victim Country: China
    Victim Industry: Retail Industry
    Victim Organization: myzjk
    Victim Site: myzjk.com
  21. Alleged data breach of Sinovcloud Trade
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 360,000 Sinovcloud Trade customer records, including about 6,600 records containing payment card numbers, allegedly originating from trade.sinovcloud.com.
    Date: 2026-01-22T21:35:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f2393237-72a8-41a1-b797-16826b87da8b.png
    https://d34iuop8pidsy8.cloudfront.net/d8a45ed5-a676-4d2d-8e88-2218b8fd7d37.png
    Threat Actors: 0xy0um0m
    Victim Country: China
    Victim Industry: Information Technology (IT) Services
    Victim Organization: sinovcloud trade
    Victim Site: trade.sinovcloud.com
  22. Alleged data breach of 7Ai App
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 460,000 7Ai App user records, containing email addresses and phone numbers, allegedly originating from 7ai.app.
    Date: 2026-01-22T21:31:34Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e1ed718b-021f-40ab-a5f5-6b09a829f5ac.png
    https://d34iuop8pidsy8.cloudfront.net/71b39d0c-441a-42d2-b815-0dfeba9de669.png
    Threat Actors: 0xy0um0m
    Victim Country: China
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: 7ai app
    Victim Site: 7ai.app
  23. Alleged data breach of ShowMyParking
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 650,000 ShowMyParking records, containing contact details and vehicle number information, allegedly originating from showmyparking.com.
    Date: 2026-01-22T21:28:53Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e78b0ee2-2a08-4f4e-933c-7e8fbef84ec1.png
    https://d34iuop8pidsy8.cloudfront.net/0a6f2ef0-9aa9-405b-a476-1c337517365c.png
    Threat Actors: 0xy0um0m
    Victim Country: India
    Victim Industry: Transportation & Logistics
    Victim Organization: showmyparking
    Victim Site: showmyparking.com
  24. Alleged data breach of XFSBZ
    Category: Data Breach
    Content: The threat actor claims to have leaked approximately 2 million XFSBZ customer records, consisting primarily of phone numbers, allegedly originating from xfsbz.cn.
    Date: 2026-01-22T21:28:21Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8b52375a-c7ca-4335-890e-693266df9a8c.png
    https://d34iuop8pidsy8.cloudfront.net/9c212f4b-8977-4223-bcec-caa366ea25e1.png
    Threat Actors: 0xy0um0m
    Victim Country: China
    Victim Industry: Consumer Services
    Victim Organization: xfsbz
    Victim Site: xfsbz.cn
  25. Alleged data breach of HQY E-Will
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 600,000 HQY E-Will customer records, consisting primarily of phone numbers, allegedly originating from hqy.ewill.cn.
    Date: 2026-01-22T21:27:31Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ee4b23d6-aa23-4d3e-93d3-06e155a2ac7a.png
    https://d34iuop8pidsy8.cloudfront.net/28b5f2d5-53ca-407a-936e-b20a59715092.png
    Threat Actors: 0xy0um0m
    Victim Country: China
    Victim Industry: Consumer Services
    Victim Organization: hqy e-will
    Victim Site: hqy.ewill.cn
  26. Kansai Integrated Systems falls victim to Brain Cipher Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 500 GB of the organizations data. The data contains SQL and Oracle databases, along with various other internal files and documents containing sensitive corporate as well as personal information. They intend to publish the data within 14-15 days.
    Date: 2026-01-22T21:20:34Z
    Network: tor
    Published URL: http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/n/kisnet
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/54481cef-fe28-408b-ae1c-1c5bcfc4fab1.png
    Threat Actors: Brain Cipher
    Victim Country: Japan
    Victim Industry: Software
    Victim Organization: kansai integrated systems
    Victim Site: kisnet.co.jp
  27. FLB Group Limited falls victim to Brain Cipher Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 700 GB of the organizations data. The data contains databases, email containers, various other internal files and documents containing sensitive corporate as well as personal information. They intend to publish the data within 5-6 days.
    Date: 2026-01-22T21:19:44Z
    Network: tor
    Published URL: http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/n/flbgroup
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bd248d67-a6a5-429d-9cf3-50b082ca1e95.png
    Threat Actors: Brain Cipher
    Victim Country: UK
    Victim Industry: Printing
    Victim Organization: flb group limited
    Victim Site: flbgroup.com
  28. Alleged Access to Multiple CCTV Surveillance Systems in Czech Republic
    Category: Initial Access
    Content: The Group claims to have gained unauthorized access to multiple CCTV surveillance systems in Czech Republic.
    Date: 2026-01-22T21:13:36Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/254
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d58a3f4e-2d13-4dfc-ab75-f280d4db7e94.png
    https://d34iuop8pidsy8.cloudfront.net/84190861-3216-4ca0-af49-cdbfc766110a.png
    Threat Actors: MORNING STAR
    Victim Country: Czech Republic
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged data breach of Dorongadget
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 2.18 million Dorongadget customer records, containing phone numbers and order-related information, allegedly originating from dorongadget.com.
    Date: 2026-01-22T21:11:10Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/84a362ed-91f7-46dc-8c3f-010524d17ce6.png
    https://d34iuop8pidsy8.cloudfront.net/ee972c64-a63e-4014-b65a-d359677725b4.png
    Threat Actors: 0xy0um0m
    Victim Country: Indonesia
    Victim Industry: Retail Industry
    Victim Organization: dorongadget
    Victim Site: dorongadget.com
  30. NorthWind Land Resources Inc. falls victim to Brain Cipher Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 42 GB of the organizations data. The data contains general documents, client data, project files and other internal corporate information. They intend to publish the data within 16 days.
    Date: 2026-01-22T21:08:18Z
    Network: tor
    Published URL: http://vkvsgl7lhipjirmz6j5ubp3w3bwvxgcdbpi3fsbqngfynetqtw4w5hyd.onion/n/nwlr
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3d2596f4-65e6-4a5a-8408-6281d2606ece.png
    Threat Actors: Brain Cipher
    Victim Country: Canada
    Victim Industry: Environmental Services
    Victim Organization: northwind land resources inc.
    Victim Site: nwlr.ca
  31. Alleged unauthorized access to Baspar Test Accuracy Company
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorized access to the WordPress administrative login for Baspar Test Accuracy Company in Iran.
    Date: 2026-01-22T20:53:20Z
    Network: openweb
    Published URL: https://xforums.st/threads/basparco-ir-admin-wp-login.484819/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8b271271-da9a-45f1-9242-31332450d184.png
    Threat Actors: X Forum Bot
    Victim Country: Iran
    Victim Industry: Research Industry
    Victim Organization: baspar test accuracy company
    Victim Site: basparco.ir
  32. Alleged data breach of BrandoWap
    Category: Data Breach
    Content: The threat actor claims to have leaked over 15 million BrandoWap marketing lead records, containing email addresses and full contact information, allegedly originating from brandowap.com.br.
    Date: 2026-01-22T20:41:00Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/15d7b897-84d3-4b18-9ffa-bfc3ee69e43d.png
    https://d34iuop8pidsy8.cloudfront.net/cbf4c76d-8ec3-47d9-b561-501d28071031.png
    Threat Actors: 0xy0um0m
    Victim Country: Brazil
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: brandowap
    Victim Site: brandowap.com.br
  33. Alleged data breach of GS25 Travel
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 370,000 GS25 Travel client records, containing email addresses and phone numbers, allegedly originating from gs25travel.com.
    Date: 2026-01-22T20:34:25Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/24e87f7f-6dd6-4b2b-934e-44e21c67d6aa.png
    https://d34iuop8pidsy8.cloudfront.net/38074c77-8022-464b-b47f-f49ae69752ba.png
    Threat Actors: 0xy0um0m
    Victim Country: Thailand
    Victim Industry: Hospitality & Tourism
    Victim Organization: gs25 travel
    Victim Site: gs25travel.com
  34. California Tax Data falls victim to PLAY Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organization’s data. The data includes Private and personal confidential data, clients documents, budget, payroll, IDs, taxes, finance information and etc.They intend to publish the data within 5 days.
    Date: 2026-01-22T20:30:45Z
    Network: tor
    Published URL: http://mbrlkbtq5jonaqkurjwmxftytyn2ethqvbxfu4rgjbkkknndqwae6byd.onion/topic.php?id=8RB76PhPYU3A24
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4c28b86d-64e3-4159-8c14-65f7b6ca3fcb.png
    Threat Actors: PLAY
    Victim Country: USA
    Victim Industry: Government Relations
    Victim Organization: california tax data
    Victim Site: californiataxdata.com
  35. Alleged data breach of Holistic Choice Fruits and Veggies
    Category: Data Breach
    Content: The threat actor claims to have breached Holistic Choice Fruits and Veggies and extracted 2.8 million customer records, including names, email addresses, phone numbers, location details, campaign identifiers, timestamps, and partial payment card descriptors.
    Date: 2026-01-22T20:25:13Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274316/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/90930486-a314-4807-a6d2-b894b7a878ab.png
    Threat Actors: betway
    Victim Country: USA
    Victim Industry: Consumer Goods
    Victim Organization: holistic choice
    Victim Site: fruitsandveggiesoffer.com
  36. Alleged data breach of Test-IG
    Category: Data Breach
    Content: The threat actor claims to have obtained and leaked approximately 1.1 million Test-IG user records, consisting primarily of user account data with associated email addresses.
    Date: 2026-01-22T20:21:52Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-0x0xbase-Discount-sale-dumps-24-25-yy
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1b156dd8-7604-4627-b1d9-0f4958bf5fa0.png
    Threat Actors: 0xy0um0m
    Victim Country: USA
    Victim Industry: Education
    Victim Organization: test-ig
    Victim Site: test-ig.org
  37. Alleged data leak of UK KYC verification data
    Category: Data Breach
    Content: The threat actor claims to have leaked approximately 12 GB of KYC verification data. The dataset allegedly includes identity verification records, which may contain personal identifiable information (PII) such as identity documents, verification files, and related compliance data.
    Date: 2026-01-22T20:01:52Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-12GB-KYC-Verification-Data-KYC-UK
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/90b933d5-56fa-4351-8a44-1f653a563eb2.png
    Threat Actors: itskilim
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged data leak of Franc macon book
    Category: Data Breach
    Content: The threat actor claims to have shared a collection of 2,190 French-language PDF books related to French Freemasonry, originating from the so-called “Franc Mason papers” .
    Date: 2026-01-22T19:41:25Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-FR-Franc-macon-book
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4cc608e5-da7c-4632-b4a3-fc8dbc9e31a3.png
    Threat Actors: Didiplayer
    Victim Country: France
    Victim Industry: Civic & Social Organization
    Victim Organization: Unknown
    Victim Site: Unknown
  39. ZenXPloit targets the website of Studio Synergy Fit
    Category: Defacement
    Content: The group claims to have defaced the website of Studio Synergy Fit
    Date: 2026-01-22T19:29:47Z
    Network: telegram
    Published URL: https://t.me/httpsHwjwodnnfhdjHjkVY/910
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0eb96e7c-b27e-42c7-8cc5-fafa01d908a6.jpg
    Threat Actors: ZenXPloit
    Victim Country: Brazil
    Victim Industry: Health & Fitness
    Victim Organization: studio synergy fit
    Victim Site: synergyfit.com.br
  40. ZenXPloit targets the website of Veta Vertical
    Category: Defacement
    Content: The Group claims to have defaced the website of Veta Vertical in Mexico.
    Date: 2026-01-22T19:22:10Z
    Network: telegram
    Published URL: https://t.me/httpsHwjwodnnfhdjHjkVY/910
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e8f47df3-5976-4f3a-95ed-78469aef489c.png
    Threat Actors: ZenXPloit
    Victim Country: Mexico
    Victim Industry: Building and construction
    Victim Organization: veta vertical
    Victim Site: vetavertical.com.mx
  41. ZenXploit targets the website of Phoenix Insumos Hospitalarios
    Category: Defacement
    Content: The Group claims to have defaced the website of Phoenix Insumos Hospitalarios in Mexico.
    Date: 2026-01-22T19:19:04Z
    Network: telegram
    Published URL: https://t.me/httpsHwjwodnnfhdjHjkVY/910
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2102ce52-4d7f-4896-a050-c066d57391d5.png
    Threat Actors: ZenXPloit
    Victim Country: Mexico
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: phoenix insumos hospitalarios
    Victim Site: phoenixinsumoshospitalarios.com
  42. ZenXPloit targets the website of MaxiBeat Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of
    Date: 2026-01-22T19:12:32Z
    Network: telegram
    Published URL: https://t.me/httpsHwjwodnnfhdjHjkVY/910
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/522c6205-4fa4-4558-b7ce-13099826c70d.jpg
    Threat Actors: ZenXPloit
    Victim Country: UK
    Victim Industry: Import & Export
    Victim Organization: maxibeat ltd
    Victim Site: maxibeat.info
  43. Alleged data breach of Epitech
    Category: Data Breach
    Content: The threat actor claims to have shared a scraped database from Epitech containing personal information such as first and last names, phone numbers, and email addresses. The dataset is reported to be approximately 5.4 MB in size.
    Date: 2026-01-22T18:48:33Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Epitech-fr
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9c73a1d4-47b8-407a-a85d-726adf0bf984.png
    https://d34iuop8pidsy8.cloudfront.net/9e52ff71-9c8a-42f6-bc35-8215c1c9cbf8.png
    Threat Actors: telaviv
    Victim Country: France
    Victim Industry: Education
    Victim Organization: epitech
    Victim Site: epitech.eu
  44. Alleged data leak of Japanese Government
    Category: Data Breach
    Content: The threat actor claims to have leaked confidential Japanese government documents related to rare earth metal mining, potentially including strategic, operational, or policy-related information concerning resource extraction and national supply chains.
    Date: 2026-01-22T18:18:17Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-JAPAN-CONFIDENTIAL-GOV-RARE-EARTH-METAL-MINING-DOCUMENT-LEAKED
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a1366ab4-fad6-4fc9-b4e3-098699dde8c4.png
    https://d34iuop8pidsy8.cloudfront.net/c205f102-6df9-4559-9028-10847eaf11d5.png
    Threat Actors: jrintel
    Victim Country: Japan
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Elk Air Conditioning & Heating falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T18:03:01Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/elkair-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f94fd40a-37be-47e5-8074-58daf065b112.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: elk air conditioning & heating
    Victim Site: elkair.com
  46. AERIFY.io falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:59:00Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/aerify-io
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5526fba3-36d7-414c-b85c-dd95480b0310.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: aerify.io
    Victim Site: aerify.io
  47. Smith Dalia Architects falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:47:48Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/smithdalia-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7a554312-7d14-4eae-9bd4-c30aee6d9a03.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: Architecture & Planning
    Victim Organization: smith dalia architects
    Victim Site: smithdalia.com
  48. BAQUS Construction and Property Consultancy falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:47:00Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/baqus-co-uk
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b716c9d8-afcf-483c-9289-35869230382c.png
    Threat Actors: CL0P
    Victim Country: UK
    Victim Industry: Building and construction
    Victim Organization: baqus construction and property consultancy
    Victim Site: baqus.co.uk
  49. Eastern Platinum Ltd. falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:41:46Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/eastplats-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2c9e24f6-debe-44ba-9fad-4ff6197551a9.png
    Threat Actors: CL0P
    Victim Country: Canada
    Victim Industry: Mining/Metals
    Victim Organization: eastern platinum ltd.
    Victim Site: eastplats.com
  50. Montalba Architects falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:34:25Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/montalbaarchitects-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e325ea79-c984-47f3-be06-f3353171cf68.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: Architecture & Planning
    Victim Organization: montalba architects
    Victim Site: montalbaarchitects.com
  51. Alleged Unauthorized Access to College du Val d’Arros in France
    Category: Initial Access
    Content: Threat Actor claims to have gained unauthorized access to the centralized building control and management system of Collège du Val d’Arros in France. The compromised system is reportedly used to monitor and control the institution’s heating systems, thermal energy infrastructure, and domestic hot water systems (ECS), covering multiple independent zones with real-time temperature monitoring and configurable threshold. The system allows control over boilers, circulation pumps, zone-specific pipelines, and operating schedules for both active and inactive periods and also displays equipment status, active alarms, operational parameters, and historical logs via a data logger.
    Date: 2026-01-22T17:32:49Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3421
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fe2c57d0-e2a9-492e-9e08-d4218e531898.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: France
    Victim Industry: Education
    Victim Organization: college du val d’arros
    Victim Site: val-arros.mon-ent-occitanie.fr
  52. Alleged data breach of Salesfloor
    Category: Data Breach
    Content: The threat actor claims to have leaked Salesfloor’s source code and internal databases, including developer data, logs, user images, SQL files, and customer-related information. The dataset reportedly totals approximately 1TB compressed and 4TB uncompressed, and allegedly includes data linked to multiple retail clients.
    Date: 2026-01-22T17:21:42Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-4TB-Salesfloor-net-Source-Code-Database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f8497e85-61da-4604-99c0-1f26271882ed.png
    https://d34iuop8pidsy8.cloudfront.net/cc4fd025-46c9-49b7-8933-fee8af1fb667.png
    Threat Actors: LAPSUS-GROUP
    Victim Country: Canada
    Victim Industry: Retail Industry
    Victim Organization: salesfloor
    Victim Site: salesfloor.net
  53. Alleged data breach of Nike, Inc
    Category: Data Breach
    Content: Group claims to have obtained organizations data and intent to publish it within 1-2 days
    Date: 2026-01-22T17:21:13Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/1560961974/overview
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dd692880-58be-4da1-9be8-087fed4baef7.png
    Threat Actors: Worldleaks
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: nike, inc
    Victim Site: nike.com
  54. itRobotics falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:19:31Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/itrobotics-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d97de226-e0f0-4153-b472-d72b6006d34f.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: Oil & Gas
    Victim Organization: itrobotics
    Victim Site: itrobotics.com
  55. Warranty First falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:16:22Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/warrantyfirst-co-uk
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2700fa4d-86a6-4acd-9f43-f9b62da21b3b.png
    Threat Actors: CL0P
    Victim Country: UK
    Victim Industry: Automotive
    Victim Organization: warranty first
    Victim Site: warrantyfirst.co.uk
  56. Taylor Oballa Murray Leyland LLP falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:14:44Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/tomllawyers-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a723bcfe-d36b-4b21-809c-c3646c80e8d2.png
    Threat Actors: CL0P
    Victim Country: Canada
    Victim Industry: Legal Services
    Victim Organization: taylor oballa murray leyland llp
    Victim Site: tomllawyers.com
  57. EDF Group falls victim to falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-22T17:11:39Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ebf5b97a-2e56-38cb-9297-6d6d59342f4d
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/27ec4d3b-b26d-4e29-b621-7f3dd061e52f.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: edf group
    Victim Site: theedfgroup.com
  58. SiNetCon GmbH falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-22T17:08:19Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=6d84461f-8361-3668-8b95-618697b34111
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/00e47f87-6aac-475e-9d7f-b2c4b55bb9bc.png
    Threat Actors: Qilin
    Victim Country: Germany
    Victim Industry: Information Technology (IT) Services
    Victim Organization: sinetcon gmbh
    Victim Site: sinetcon.de
  59. Integroy Construction Inc. falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T17:03:04Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/integroy-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8031c044-048c-4d8a-9fb5-8e612aa31e67.png
    Threat Actors: CL0P
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: integroy construction inc.
    Victim Site: integroy.com
  60. Provincia Leasing S.A. falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-22T17:01:41Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=e10f1b29-a0ad-3531-8f4f-68cee13b7144
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/81ea0f25-4fdd-403b-848d-376d4caa5338.png
    Threat Actors: Qilin
    Victim Country: Argentina
    Victim Industry: Financial Services
    Victim Organization: provincia leasing s.a.
    Victim Site: provincialeasing.com.ar
  61. Farmacias Vilela falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-22T16:56:09Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ee254ee9-70a3-3aa0-ba73-331aba1702c2
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/de69e39e-3076-4985-b22e-4f59e18bc476.png
    Threat Actors: Qilin
    Victim Country: Argentina
    Victim Industry: Retail Industry
    Victim Organization: farmacias vilela
    Victim Site: farmaciasvilela.com.ar
  62. Environmental Corporation of America falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-22T16:47:30Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/eca-usa-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/27915d94-0747-4238-98b1-8a047ccfb57b.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: Environmental Services
    Victim Organization: environmental corporation of america
    Victim Site: eca-usa.com
  63. Alleged Data Leak of French Education Portal
    Category: Data Breach
    Content: The threat actor claims to have leaked a database from a French education portal containing approximately 3,000 records with professor and staff identifiers, names, email addresses, login details, user IDs, and associated domain information.
    Date: 2026-01-22T16:45:35Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-FR-3K-FRENCH-EDUCATION-DATABASE
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c0b58238-c5e9-453b-af96-5f557dee87d8.png
    Threat Actors: xmlrpc
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Infinite International claims to target Rcell
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Rcell
    Date: 2026-01-22T16:38:32Z
    Network: telegram
    Published URL: https://t.me/infinitena/280
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6ad85f99-4dd9-4ddc-b454-3c057aef3e60.jpg
    Threat Actors: Infinite International
    Victim Country: Syria
    Victim Industry: Network & Telecommunications
    Victim Organization: rcell
    Victim Site: rcell.me
  65. Ocean Fish falls victim to akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 10 GB of the organization’s data. The compromised data reportedly includes employee personal information, financial and payment records, project files, partner information, and other internal confidential documents.NB: The organization previously fell victim to LYNX Ransomware on Jan 18 2026
    Date: 2026-01-22T16:10:44Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d62b15cc-cff6-4bd8-9142-8de8b4de7a17.png
    Threat Actors: akira
    Victim Country: Romania
    Victim Industry: Food Production
    Victim Organization: ocean fish
    Victim Site: oceanfish.ro
  66. Alleged data breach of K-CHESS
    Category: Data Breach
    Content: The threat actor claims to have extracted the complete K-CHESS user database containing approximately 83,000 user records. The exposed data reportedly includes user account information such as usernames, email addresses, personal details, authentication identifiers, avatars, chess ratings across multiple modes, game statistics, preferences, friend and challenge settings, moderation flags, activity status, timestamps, and subscription-related metadata.
    Date: 2026-01-22T15:43:22Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-K-CHESS-COM-83K
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/56104d35-ad80-4478-93b0-630486f92ef1.png
    Threat Actors: marak
    Victim Country: France
    Victim Industry: E-Learning
    Victim Organization: k-chess
    Victim Site: k-chess.com
  67. BD Anonymous claims to target XPHONE 018 LTD
    Category: Alert
    Content: A recent post by the group indicates that they are targeting XPHONE 018 LTD.
    Date: 2026-01-22T15:39:54Z
    Network: telegram
    Published URL: https://t.me/httpstmeVl8Cr1np5kxhYjd0/1745
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b97a8233-b75d-4ca1-9512-ea95d1d0f7bb.png
    Threat Actors: BD Anonymous
    Victim Country: Israel
    Victim Industry: Network & Telecommunications
    Victim Organization: xphone 018 ltd
    Victim Site: xphone.co.il
  68. Van Eycken Metal Construction falls victim to akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 69 GB of the organization’s data. The compromised data reportedly includes employees information (passport details and scanned identification documents), HR records, financial documents, project files, and confidentiality agreements.
    Date: 2026-01-22T15:32:37Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0576535c-0d07-401d-8a3c-bdec8eb32d62.png
    Threat Actors: akira
    Victim Country: Belgium
    Victim Industry: Building and construction
    Victim Organization: van eycken metal construction
    Victim Site: vaneycken.be
  69. Copetrol falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-22T15:28:57Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=80d3146a-fb96-3ff6-984d-a80998f7eb6f
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ea894d79-f4c9-43e6-8c93-964f0ad124fa.png
    Threat Actors: Qilin
    Victim Country: Paraguay
    Victim Industry: Oil & Gas
    Victim Organization: copetrol
    Victim Site: copetrol.com.py
  70. Universal Builders Supply falls victim to akira Ransomware
    Category: Ransomware
    Content: he group claims to have obtained 22 GB of the organization’s data. The compromised data reportedly includes employees information (addresses, SSNs, passport and driver’s license scans, bank and credit card details), HR records, financial documents, project files, and confidential materials such as NDAs.
    Date: 2026-01-22T15:23:16Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2e2448e5-9980-4c9d-aea3-eaa36ebc8479.png
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: universal builders supply
    Victim Site: ubs1.com
  71. Alleged data breach of iPage
    Category: Data Breach
    Content: The group claims to have leaked database of iPage , exposing both user and administrative account data. The compromised dataset reportedly includes user identifiers, device and business details, full names, email addresses, passwords, one-time passwords and expiry timestamps, phone numbers, countries, full postal addresses, verification and status flags, as well as administrator records containing names, usernames, email addresses, password hashes, privilege levels, activity status, and last login timestamps.
    Date: 2026-01-22T15:14:22Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/331
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dbaa738b-80a5-4c9f-9ba9-df516bf61f11.jpg
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: ipage
    Victim Site: iappsorg.ipage.com
  72. Radial Engineering falls victim to akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 31 GB of the organization’s data. The compromised data reportedly includes employee and customer information, financial records, project files, and confidential documents such as NDAs.
    Date: 2026-01-22T14:54:53Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f32b0f05-43ac-4bf6-bb5f-50dbe7634570.png
    Threat Actors: akira
    Victim Country: Canada
    Victim Industry: Music
    Victim Organization: radial engineering
    Victim Site: radialeng.com
  73. Spiros Industries falls victim to akira ransomware
    Category: Ransomware
    Content: The threat actor claims to have obtained the organisations data.
    Date: 2026-01-22T14:50:23Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5b5b1acc-8fde-4510-87f5-5d2203284ff6.JPG
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Manufacturing
    Victim Organization: spiros industries
    Victim Site: spirosind.com
  74. Alleged data breach of Yellow Slate
    Category: Data Breach
    Content: The threat actor claims to have shared a dataset allegedly associated with Yellow Slate, which operates the school search platform yellowslate.com. The data is described as a CSV file containing more than 21,000 records.
    Date: 2026-01-22T14:45:58Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Yellow-Slate-yellowslate-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3fafcadb-98c7-4aa2-a98e-fd6b9bc5f464.png
    Threat Actors: X0Frankenstein
    Victim Country: India
    Victim Industry: Education
    Victim Organization: yellow slate
    Victim Site: yellowslate.com
  75. Alleged unauthorized access to Bunker Hill Engine Service LLC
    Category: Initial Access
    Content: The group claims that they have gained unauthorized access to the heating and snowmelt control system of Bunker Hill Engine Service LLC in USA. According to the claim, the access of full administrative control over the heating and snowmelt control system, allowing them to monitor and manipulate temperatures, boilers, operating modes, and snowmelt zones, which led to system disruption and hazardous conditions.
    Date: 2026-01-22T14:35:38Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/991
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5739d19a-741a-4097-9755-1977828f4789.jpg
    https://d34iuop8pidsy8.cloudfront.net/935766a1-aa25-407a-9421-0516d642aa5d.jpg
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: USA
    Victim Industry: Mechanical or Industrial Engineering
    Victim Organization: bunker hill engine service llc
    Victim Site: bunkerhillengine.com
  76. Alleged leak of WordPress configuration files linked to multiple French organizations
    Category: Data Breach
    Content: The threat actor claims to have leaked WordPress configuration files allegedly originating from a web agency and linked to several organizations, including Airbus, ArianeGroup, and Vinci Construction Maritime et Fluvial.
    Date: 2026-01-22T14:33:34Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SOURCE-CODE-wp-config-Airbus-Ariane-Dorel
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3bef1483-3968-4e53-97d0-a60a9ee7d70e.png
    Threat Actors: ldopanda2
    Victim Country: France
    Victim Industry: International Trade & Development
    Victim Organization: airbus avions & atlantic cfe-cgc
    Victim Site: airbus.avions.cfe-cgc.fr
  77. Cyber Attack hits Institut der Wirtschaftsprüfer in Deutschland e.V.
    Category: Cyber Attack
    Content: The Institut der Wirtschaftsprüfer in Deutschland (IDW), the professional association for auditors in Germany, has reportedly been the victim of a cyberattack in which data from auditors and partner organisations may have been exfiltrated. According to reports, the incident disrupted key communication systems and server connections, and the IDW has warned that sensitive business and personal data could have fallen into criminal hands, raising concerns about potential follow-on threats such as identity theft and phishing.
    Date: 2026-01-22T14:28:39Z
    Network: openweb
    Published URL: https://www.finance-magazin.de/banking-berater/wirtschaftspruefer/cyberangriff-auf-idw-daten-von-wirtschaftspruefern-und-partnern-abgeflossen-234940/
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Germany
    Victim Industry: Accounting
    Victim Organization: institut der wirtschaftsprüfer in deutschland e.v.
    Victim Site: idw.de
  78. Alleged data breach of Valorissimo
    Category: Data Breach
    Content: The threat actor claims to have leaked data of Valorissimo, a subsidiary of Bouygues Immobilier. The dataset is dated 2021 and reportedly includes account, company, and company contact records. The compromised data contains personal and corporate information such as names, email addresses, phone numbers, physical addresses, and company identifiers affecting over 13,000 user accounts and several thousand associated companies and contacts.
    Date: 2026-01-22T14:20:47Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-FR-Valorissimo
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/69fce18a-9233-4252-a185-268ab86b69a3.png
    https://d34iuop8pidsy8.cloudfront.net/56960c3e-dbbb-4ed9-b640-0d03eb13602d.png
    Threat Actors: ldopanda2
    Victim Country: France
    Victim Industry: Real Estate
    Victim Organization: valorissimo
    Victim Site: partenaires.valorissimo.com
  79. Alleged data sale of ORPI AFG Immobilier
    Category: Data Breach
    Content: The threat actor claims to be selling 85 GB of data of the organisation.
    Date: 2026-01-22T14:17:56Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FR-85GB-200K-Files-Orpi-AFG-Immobilierr
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/098d45dc-0d44-447c-9bff-56bc30ef5aed.JPG
    https://d34iuop8pidsy8.cloudfront.net/b98b93f7-5242-469e-a55d-18b0a536e7da.JPG
    Threat Actors: HexDex2
    Victim Country: France
    Victim Industry: Real Estate
    Victim Organization: orpi afg immobilier
    Victim Site: orpi.com
  80. Alleged data sale of CallonDoc
    Category: Data Breach
    Content: The threat actor claims to be selling database of CallOnDoc (callondoc.com), a telemedicine and medical clinic platform, exposing 1,144,223 patient records tied to a breach dated December 2025. The dataset is said to include sensitive patient information such as names, contact details, addresses, medical categories and conditions, prescribed services, transaction numbers, and payment amounts. If verified, the incident represents a serious exposure of protected health information (PHI).
    Date: 2026-01-22T14:10:20Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Massive-American-Data-Breach-1-1M-Patient-Profiles-Exposed
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f1f119c9-76a4-460d-9fae-4f7a0918d3c7.png
    https://d34iuop8pidsy8.cloudfront.net/8670722f-3369-4cca-aed8-64d5f0bb4594.png
    https://d34iuop8pidsy8.cloudfront.net/de8d7ad2-3e8f-4eeb-875e-a98a411c8b85.png
    https://d34iuop8pidsy8.cloudfront.net/66bdf7de-d776-4df6-bde8-7cfed336dd2a.png
    https://d34iuop8pidsy8.cloudfront.net/fd7b40f9-f7d3-4fda-87e3-5d9fbfe106d4.png
    Threat Actors: iProfessor
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: callondoc
    Victim Site: callondoc.com
  81. Alleged data breach of Ministry of Higher Education and Scientific Research (Algeria)
    Category: Data Breach
    Content: Group claims to have gained unauthorized access to the systems of the Ministry of Higher Education and Scientific Research (Algeria), allegedly obtaining database and confidential information.
    Date: 2026-01-22T14:01:41Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1106?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4c08483c-feb6-4386-9e12-bb9a2a2bd0e6.png
    Threat Actors: DARK 07x
    Victim Country: Algeria
    Victim Industry: Government Administration
    Victim Organization: ministry of higher education and scientific research
    Victim Site: mesrs.dz
  82. ELMORE GOLDSMITH KELLEY & DEHOLL falls victim to INC RANSOM ransomware
    Category: Ransomware
    Content: The threat actor claims to have obtained the organisations data.
    Date: 2026-01-22T13:21:30Z
    Network: tor
    Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/696f63048f1d14b7432dbc14
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/85907641-5e78-4974-b463-26541c924dd1.JPG
    https://d34iuop8pidsy8.cloudfront.net/bac1937b-a695-41b2-9929-d8d6cdeada44.JPG
    Threat Actors: INC RANSOM
    Victim Country: USA
    Victim Industry: Legal Services
    Victim Organization: elmore goldsmith kelley & deholl
    Victim Site: elmoregoldsmith.com
  83. Alleged unauthorized access to a server belonging to an unidentified entity in the UAE
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to a server belonging to an unidentified entity in the UAE and intends to publish the files soon.
    Date: 2026-01-22T13:16:45Z
    Network: telegram
    Published URL: https://t.me/LulzSecHackers/319
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/940639c2-c54a-4a1f-ac15-4e4bc4574834.png
    Threat Actors: LulzSec Hackers
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. STRONG WINGS LLP falls victim to TENGU Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 23 GB of organizations data. They intend to publish in 5 – 6 days.
    Date: 2026-01-22T12:50:37Z
    Network: tor
    Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/ab9f49b923161544d6fc0c3d7cd0bdf867adcfcffa4af758f4ccda040e76f6f9/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e79d1bb3-e8cf-45af-b183-255d9650929d.png
    Threat Actors: TENGU
    Victim Country: India
    Victim Industry: Automotive
    Victim Organization: strong wings llp
    Victim Site: Unknown
  85. Outsiders targets the website of Appleton & Eaton Parish Council
    Category: Defacement
    Content: The group claims to have defaced the website of Appleton & Eaton Parish Council
    Date: 2026-01-22T11:48:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/783800
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e8703917-3cc7-4f9d-8d0c-8b28b12af9d0.JPG
    Threat Actors: ./Outsiders
    Victim Country: Ukraine
    Victim Industry: Government Administration
    Victim Organization: appleton & eaton parish council
    Victim Site: appleton-eaton-pc.gov.uk
  86. Benzona ransomware group adds an unknown victim (aameia.com.g*)
    Category: Ransomware
    Content: The group claims to have obtained 300 GB of the organization’s data. The compromised data includes financial, client data.
    Date: 2026-01-22T11:19:05Z
    Network: tor
    Published URL: http://benzona6x5ggng3hx52h4mak5sgx5vukrdlrrd3of54g2uppqog2joyd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c30d0da6-9548-4bb7-adde-6cc924b9f125.png
    Threat Actors: Benzona
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: *aameia.com.g
  87. Alleged unauthorized access to Radio Algeria
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to the website of Radio Algeria.
    Date: 2026-01-22T10:55:34Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1098
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4c90103b-3040-4e97-bb08-2ac5c226cfef.png
    Threat Actors: DARK 07x
    Victim Country: Algeria
    Victim Industry: Broadcast Media
    Victim Organization: radio algeria
    Victim Site: radioalgerie.dz
  88. chinafans defaced the website of Lagansky Bar
    Category: Defacement
    Content: Group claims to have defaced the website of Lagansky Bar.
    Date: 2026-01-22T09:52:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/784128
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4ff10a5d-f61d-4f96-a9dd-73fef839f2ac.png
    Threat Actors: chinafans
    Victim Country: Israel
    Victim Industry: Food & Beverages
    Victim Organization: lagansky bar
    Victim Site: lagansky.com
  89. chinafans targets the website of Cards And Cases
    Category: Defacement
    Content: The group claims to have defaced the organizations website.
    Date: 2026-01-22T09:31:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/784102
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/04c92984-86cc-4d63-89f7-6f2135b30ef3.png
    Threat Actors: chinafans
    Victim Country: Israel
    Victim Industry: E-commerce & Online Stores
    Victim Organization: cards and cases
    Victim Site: cardsandcases.co.il
  90. chinafans targets the website of Amina Healthcare Group
    Category: Defacement
    Content: The group claims to have defaced the organizations website.
    Date: 2026-01-22T09:26:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/784090
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/296d7fa3-4927-45f9-8be2-046082433b79.png
    Threat Actors: chinafans
    Victim Country: UAE
    Victim Industry: Hospital & Health Care
    Victim Organization: amina healthcare group
    Victim Site: dev1.aminahealthcare.ae
  91. chinafans targets the website of Eyal Segal Eilat Photography
    Category: Defacement
    Content: Group claims to have defaced the website of Eyal Segal Eilat Photography.
    Date: 2026-01-22T09:25:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/784114
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a16e89fd-6903-4bc7-a3d2-99b59a7ffa36.png
    Threat Actors: chinafans
    Victim Country: Israel
    Victim Industry: Photography
    Victim Organization: eyal segal eilat photography
    Victim Site: segalphotography.co.il
  92. chinafans targets the website of Oron Tires
    Category: Defacement
    Content: Group claims to have defaced the website of Oron Tires.
    Date: 2026-01-22T09:20:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/784127
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b5990889-d7c9-4181-9b6a-b69ef34052f6.png
    Threat Actors: chinafans
    Victim Country: Israel
    Victim Industry: Wholesale
    Victim Organization: oron tires
    Victim Site: oronstires.co.il
  93. chinafans targets the Hanan Website
    Category: Defacement
    Content: The group claims to have defaced the organizations website.
    Date: 2026-01-22T09:10:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/784124
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7f42dc86-cdbd-491d-b4e2-11afe0d4185b.png
    Threat Actors: chinafans
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: hanan website
    Victim Site: chnana.co.il
  94. Alleged leak of sensitive documents from the Embassy of the Republic of Albania in Greece
    Category: Data Breach
    Content: The threat actor claims to have leaked approximately 2,800 files allegedly associated with the Embassy of the Republic of Albania in Greece. According to the post, the leaked material consists of multiple folders totalling nearly 1 GB in size and is described as containing sensitive diplomatic documents.
    Date: 2026-01-22T08:10:52Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Document-2-8-THOUSAND-SENSITIVE-DOCUMENTS-EMBASSY-OF-THE-REPUBLIC-OF-ALBANIA-IN-GREECE
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b0d50765-faee-406b-a306-1c0d42427883.png
    Threat Actors: HaxChipper
    Victim Country: Albania
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Alleged leak of Minecraft database
    Category: Data Breach
    Content: Threat actor claims to have leaked Minecraft database.
    Date: 2026-01-22T07:31:00Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-DB-MINECRAFT
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b5f5055d-db9a-4bb4-9aa0-c4706286c312.png
    Threat Actors: CY8ER_N4TI0N
    Victim Country: Sweden
    Victim Industry: Gaming
    Victim Organization: minecraft
    Victim Site: minecraft.net
  96. Z-BL4CX-H4T.ID targets the website of BMW
    Category: Defacement
    Content: The group claims to have defaced the website of BMW
    Date: 2026-01-22T07:25:13Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/27
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a68e3cd8-baf1-43fd-870f-ac1f1e850717.JPG
    Threat Actors: Z-BL4CX-H4T.ID
    Victim Country: Vietnam
    Victim Industry: Manufacturing
    Victim Organization: bmw
    Victim Site: bmwhcmc.vn
  97. Alleged access to National Center for HIV/AIDS, Dermatology and STD
    Category: Initial Access
    Content: The group claims to have leaked access to National Center for HIV/AIDS, Dermatology and STD.
    Date: 2026-01-22T06:31:12Z
    Network: telegram
    Published URL: https://t.me/thaiisgodalert/313
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/47c904dd-6ccd-4f48-b665-bbceb98c7ac9.png
    https://d34iuop8pidsy8.cloudfront.net/6ca52945-30ed-49e1-a934-3c5260c6478a.png
    Threat Actors: thai is god
    Victim Country: Cambodia
    Victim Industry: Hospital & Health Care
    Victim Organization: national center for hiv/aids, dermatology and std
    Victim Site: mpi.nchads.gov.kh
  98. Alleged Sale of UAE Bank Accounts
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to UAE personal and business bank accounts for handling funds.
    Date: 2026-01-22T06:28:50Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274290/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9b127212-2379-4394-b713-67621d0e9d3f.png
    Threat Actors: KURDI
    Victim Country: UAE
    Victim Industry: Banking & Mortgage
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged Data Breach of Gran Concursos Públicos
    Category: Data Breach
    Content: Threat actor claims to have leaked user data belonging to Gran Concursos Públicos, a Brazil-based EdTech platform. The dataset allegedly contains approximately 570,000 customer records, including session data, IP addresses, user agents, and email-related identifiers, sourced from MS and PHP session logs.
    Date: 2026-01-22T06:28:46Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274301/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2c25eb11-4707-4ae9-b3dd-469681002af8.png
    Threat Actors: hubert
    Victim Country: Brazil
    Victim Industry: Education
    Victim Organization: gran concursos públicos
    Victim Site: grancursosonline.com.br
  100. Alleged Data Breach of Squarespace
    Category: Data Breach
    Content: Threat actor claims to have breached internal Squarespace web portals used for domain sales and management, allegedly exposing data of approximately 2 million users, including WHOIS-protected records and migrated Google Domains customers, due to systems lacking 2FA and relying only on username/password authentication.
    Date: 2026-01-22T06:17:44Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274298/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fd757a9a-8c53-4d2c-ae9d-387e31ff9cfe.png
    https://d34iuop8pidsy8.cloudfront.net/0fd6e29c-f1c3-468b-abd4-0145241d98f8.png
    Threat Actors: spacingsquares
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: squarespace
    Victim Site: squarespace.com
  101. Alleged Data Breach of Credit Glory
    Category: Data Breach
    Content: Threat actor claims to have breached data from Credit Glory, a US-based credit repair company. The alleged dataset includes nearly 500,000 customer records with names, emails, phone numbers, client IDs, billing and CRM data, as well as credit report details, dispute status, average scores, and look-alike data containing addresses, DOBs, ZIP codes, and age.
    Date: 2026-01-22T06:16:08Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274303/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d4016f92-936a-4c71-8bba-d0db92bbd471.png
    https://d34iuop8pidsy8.cloudfront.net/db681dbd-e4af-47f6-8db7-255670cd7aaf.png
    Threat Actors: hubert
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: credit glory
    Victim Site: creditglory.com
  102. Cyber Attack hits Zendesk ticket systems
    Category: Cyber Attack
    Content: People worldwide are being impacted by a cyber incident involving unsecured Zendesk support systems, which is being exploited to launch a large-scale cyber attack. Victims report receiving hundreds of unsolicited emails, some with disturbing or alarming subject lines. The situation is under investigation, and the timeline for full remediation remains uncertain.
    Date: 2026-01-22T06:07:33Z
    Network: openweb
    Published URL: https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam-wave/
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: USA
    Victim Industry: Entertainment & Movie Production
    Victim Organization: zendesk ticket systems
    Victim Site: zendesk.com
  103. Alleged sale of data belonging to employees of an unidentified C-level company
    Category: Data Breach
    Content: Threat actor is offering an alleged database of over 19 million records containing contact details of wealthy individuals and C-level executives. The data reportedly includes names, company names, email addresses, phone numbers, and job titles, collected from aggregated marketing and mailing sources. The dataset is advertised for lead generation and outreach purposes and is listed for sale at a price of $10,000.
    Date: 2026-01-22T05:24:19Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274299/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/844c47dc-3910-4791-8167-5554b35167da.png
    Threat Actors: GeeksforGeeks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged Sale of Unique Windows Installation
    Category: Malware
    Content: Threat actor claims to be selling Windows installation traffic, offering unique and bundled installs for .exe payload delivery. The service is marketed for malware distribution, with traffic delivered via custom builds and installation bundles.
    Date: 2026-01-22T05:22:54Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274292/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4b7bd10e-2d66-4f6a-85e6-b8ce02a576a3.png
    Threat Actors: Scarlet_sc
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged Data Breach of Fédération Nationale des Chasseurs
    Category: Data Breach
    Content: The threat actor claims to have breached the Fédération Nationale des Chasseurs data, the dataset includes insurance invoices, validation PDFs for hunting licenses, and personal information of licensed hunters.
    Date: 2026-01-22T04:10:01Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FEDERATION-CHASSEUR-DE-FRANCE-PERMIS-CHASSE
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9d995d86-546f-4837-a158-79785d2c6f94.png
    Threat Actors: marak
    Victim Country: France
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: fédération nationale des chasseurs
    Victim Site: chasseurdefrance.com
  106. Alleged unauthorized access to INELSUR
    Category: Initial Access
    Content: The group claim to have gained unauthorized access to INELSUR.
    Date: 2026-01-22T03:40:11Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3419
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c8e2d12-85b6-4355-8a45-0d9a1c74068a.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Spain
    Victim Industry: Industrial Automation
    Victim Organization: inelsur
    Victim Site: inelsur.es
  107. Alleged data breach of Pengadilan Negeri Jayapura Kelas IA
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Pengadilan Negeri Jayapura Kelas IA
    Date: 2026-01-22T03:17:15Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-Pengadilan-Negeri-Jayapura-Kelas-IA
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cd2ded5a-d4cb-47d1-8a9a-6b0a331bdc82.png
    Threat Actors: CY8ER_N4TI0N
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: pengadilan negeri jayapura kelas ia
    Victim Site: pn-jayapura.go.id
  108. Alleged Data Breach of CarsDir
    Category: Data Breach
    Content: The threat actor claims to have leaked the user database of CarsDir, The dataset contains approximately 118,900 member records, including account credentials and associated metadata.
    Date: 2026-01-22T03:14:22Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-www-carsdir-com-118-9k-Members-Dehashed
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4748e6e-63d6-4ad1-aa74-9e8873914e1d.png
    Threat Actors: Al-Sheikh
    Victim Country: Unknown
    Victim Industry: Automotive
    Victim Organization: carsdir
    Victim Site: carsdir.com
  109. Alleged data breach of Kemahasiswaan Mitra
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Kemahasiswaan Mitra
    Date: 2026-01-22T03:03:28Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-kemahasiswaan-mitra
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4d5206b5-f3c0-40f2-a804-6ee6d42bfde4.png
    Threat Actors: CY8ER_N4TI0N
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: kemahasiswaan mitra
    Victim Site: kemahasiswaan.umiba.ac.id
  110. Alleged data breach of Santa Maria das Barreiras
    Category: Data Breach
    Content: The group claims to be breached 37.58 GB data from Hospital Municipal de Santa Maria das Barreiras. The compromised data reportedly includes information about patients, results of laboratory tests and records of medical visits.
    Date: 2026-01-22T03:01:53Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3414
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/705b7747-4c90-480d-8bbe-044ba378c3ce.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Brazil
    Victim Industry: Hospital & Health Care
    Victim Organization: santa maria das barreiras
    Victim Site: santamariadasbarreiras.pa.gov.br
  111. Alleged leak of Hotmail Account
    Category: Data Breach
    Content: The threat actor claims to be leaked 2.8k Hotmail Account
    Date: 2026-01-22T02:55:43Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-2-8k-HOTMAIL-HITS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c1e20076-8c74-4329-ad07-dbc02853eb7b.png
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged Leak of Global Passenger Flight and Travel Data
    Category: Data Breach
    Content: The threat actor claim to be leaked Global Passenger Flight and Travel Data. The compromised data reportedly includes personal identifiers, passport numbers, flight details, travel history, hotel addresses, emergency contact information
    Date: 2026-01-22T02:25:25Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Global-Flight-Information
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8743a2ee-dd90-45fe-828b-bfbddc0963f1.png
    https://d34iuop8pidsy8.cloudfront.net/e19d2dce-debc-4bb2-bebe-d022e48fc9f6.png
    Threat Actors: 5gbstoragevpn
    Victim Country: Unknown
    Victim Industry: Airlines & Aviation
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Alleged Sale of Global Casino and Gambling Lead Database
    Category: Data Breach
    Content: The threat actor claims to be selling Global Casino and Gambling Lead Database. The Compromised Data contain 790,000 records including Full name, Login, username, Physical address, Country, currency, Phone number, Email address
    Date: 2026-01-22T02:09:41Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Premium-Casino-Gambling-Leads-High-Converting-Global-2026-Fresh-Dump-Unsold
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0702485f-dede-4d11-98a8-0559943856e9.png
    Threat Actors: taking0ver
    Victim Country: Unknown
    Victim Industry: Gambling & Casinos
    Victim Organization: Unknown
    Victim Site: Unknown
  114. Cyber Attack hits Leinerstift e.V.
    Category: Cyber Attack
    Content: The Leinerstift in Großefehn has been affected by a cyberattack that temporarily restricted access to its IT systems. Despite the disruption, care and support services for individuals continued without interruption. The incident was detected recently, and investigations are ongoing. Technical teams and management are currently working to restore full system functionality, though no clear timeline for complete recovery has been announced.
    Date: 2026-01-22T02:05:39Z
    Network: openweb
    Published URL: https://www.ga-online.de/artikel/1626122/Leinerstift-in-Grossefehn-Ziel-von-Cyber-Kriminellen
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Germany
    Victim Industry: Civic & Social Organization
    Victim Organization: leinerstift e.v.
    Victim Site: leinerstift.de
  115. Alleged data breach of Abu Dhabi Mobility
    Category: Data Breach
    Content: The group claims to have leaked the data of Abu Dhabi Mobility. The compromised data includes girls database including names, email addresses, phone numbers, documents, and drivers licenses.
    Date: 2026-01-22T01:45:25Z
    Network: telegram
    Published URL: https://t.me/LulzSecHackers/231
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eeb23778-2777-4d80-857e-ba62a1fd956a.png
    Threat Actors: LulzSec Hackers
    Victim Country: UAE
    Victim Industry: Government Administration
    Victim Organization: abu dhabi mobility
    Victim Site: admobility.gov.ae
  116. Alleged Sale of Russian Business Executives And Corporate Contacts Data Leak
    Category: Data Breach
    Content: The threat actor claims to have leaked possession and distribution of a large scale structured data containing corporate contacts and executive level business information.
    Date: 2026-01-22T01:39:01Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Russian-Business-Executives-Corporate-Contacts-Database-2-49M-Records-CSV
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9e377bb1-3c0e-44af-9ced-cbdf6f05570c.png
    https://d34iuop8pidsy8.cloudfront.net/6888d219-368a-461d-9bb5-d89245b12bcc.png
    Threat Actors: ProxyBurning
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of unidentified organization data from France
    Category: Data Breach
    Content: The threat actor claims to have leaked unidentified organization data from France.
    Date: 2026-01-22T01:34:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-COLLECTION-repack-mix-database-francee
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d7356475-70bd-43fb-81c5-0e64d2c4cdcc.png
    Threat Actors: harmoniafione
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Onsight falls victim to Sinobi Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 700 GB of organizations data. The compromised data includes contracts and confidential data. They intend to publish it within 8 – 9 days.
    Date: 2026-01-22T01:21:24Z
    Network: tor
    Published URL: http://sinobi6rlec6f2bgn6rd72xo7hvds4a5ajiu2if4oub2sut7fg3gomqd.onion/leaks/6971248e6387a4c9a2929a67
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3ec9be9c-f96e-4145-b599-d7b5e578d0c5.png
    https://d34iuop8pidsy8.cloudfront.net/291e17a7-a5d2-445c-a622-5855da171da5.png
    Threat Actors: Sinobi
    Victim Country: UK
    Victim Industry: Media Production
    Victim Organization: onsight
    Victim Site: onsight.co.uk
  119. Alleged Data Breach of MHz Group
    Category: Data Breach
    Content: The threat actor claims to have breached MHz Group data base.
    Date: 2026-01-22T01:12:39Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SOURCE-CODE-MHz-group-com-Data-Breach-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/75ef5368-5a83-473d-9d6e-41e1ea5a0b52.png
    Threat Actors: 888
    Victim Country: UAE
    Victim Industry: Management Consulting
    Victim Organization: mhz grou
    Victim Site: mhz-group.com
  120. Alleged data leak of UAE
    Category: Data Breach
    Content: The group claims to have leaked data of the UAE.
    Date: 2026-01-22T01:09:04Z
    Network: telegram
    Published URL: https://t.me/LulzSecHackers/226
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/53b8330c-bc8b-490d-9a46-069aa6069cf8.png
    https://d34iuop8pidsy8.cloudfront.net/2ec7f124-d61f-4e9a-9cdd-ea7ce9bcbfa8.png
    https://d34iuop8pidsy8.cloudfront.net/11c7bdef-4e06-405a-8a68-81dac22b8a28.png
    https://d34iuop8pidsy8.cloudfront.net/4a91292d-9a2f-4793-8dc4-133aaeb4a83d.png
    https://d34iuop8pidsy8.cloudfront.net/45567fe8-0855-42b4-99ca-723bb7e3b228.png
    Threat Actors: LulzSec Hackers
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Alleged Data Breach of Syrian Arab Monetary Fund
    Category: Data Breach
    Content: The threat actor claims to have breached Syrian Arab Monetary Fund documents.
    Date: 2026-01-22T00:51:56Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-SYRIA-ARAB-MONETARY-FUND-LEAKED-DOCUMENTS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/958e3f63-2c2f-43a8-8e9f-4ca23f41e136.png
    Threat Actors: temp123
    Victim Country: Syria
    Victim Industry: Banking & Mortgage
    Victim Organization: syrian arab monetary fund
    Victim Site: Unknown
  122. Alleged Data Breach of colisprivé
    Category: Data Breach
    Content: The threat actor claims to have leaked customer-related data associated with colisprivé, the dataset contains full names, phone numbers, email addresses, physical addresses, postal codes, and messaging identifiers.
    Date: 2026-01-22T00:41:54Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-colispriv%C3%A9r-fr
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/34c61135-bc33-435f-a452-ff6ef3708b5b.png
    Threat Actors: lysanaflare
    Victim Country: France
    Victim Industry: Transportation & Logistics
    Victim Organization: colis privé
    Victim Site: colisprivé.fr
  123. Alleged Data Leak of Binance
    Category: Data Breach
    Content: Threat actor shared an alleged Binance Brazil database obtained via phishing. The leak reportedly contains names, email addresses, and phone numbers of users, totaling approximately 31,000 records.
    Date: 2026-01-22T00:15:32Z
    Network: openweb
    Published URL: https://leakbase.la/threads/binance-brazil-2026.48349/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f92de90f-c9a8-45f3-b2eb-3193258b6528.png
    Threat Actors: zoozkooz
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged Leak of +3WiFi Compromised Wi-Fi Networks Database
    Category: Data Breach
    Content: Threat actor claims to be leaked associated with +3WiFi, The dataset contains over 30 million records of Wi-Fi access points, including technical parameters, geolocation data, and network configuration details.
    Date: 2026-01-22T00:00:58Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-3WiFi-database-of-compromised-Wi-Fi-networks-LEAK-30223735-ROWS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4867b3c6-6a15-41a3-8c17-b5b10997e832.png
    https://d34iuop8pidsy8.cloudfront.net/6b81bfdf-4473-4a78-8bfb-fd232a947683.png
    Threat Actors: ProxyBurning
    Victim Country: Unknown
    Victim Industry: Network & Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown