[February-21-2026] Daily Cybersecurity Threat Report

Executive Summary

This report provides an exhaustive analysis of 133 distinct cybersecurity incidents detected and documented on February 21, 2026. The threat landscape observed during this period is characterized by a high volume of website defacements, massive data breaches involving millions of sensitive records, critical initial access sales, and the distribution of advanced malware and zero-day vulnerabilities. The incidents span multiple geographic regions—with India, France, Bangladesh, and the USA experiencing notable activity—and impact a wide array of industries, including E-commerce, Government Administration, Information Technology, and Healthcare.

This document systematically categorizes these incidents, profiles the predominant threat actors, and analyzes the methods of compromise strictly based on the provided intelligence drafts.


1. High-Impact Data Breaches and Credential Leaks

A significant portion of the recorded events involves the unauthorized exfiltration and subsequent sale or leak of sensitive corporate and personal data on open web forums and Telegram channels.

1.1 Corporate and Franchise Data Breaches

Several major food and beverage franchises suffered data exposures during this reporting period:

  • Burger King France: Threat actor Eliasxy leaked a franchise database. The exposed data allegedly contains restaurant branch details, internal identifiers, API-related information, franchise enterprise records, employee data, and job application information. The breach was published on the open web.
  • McDonalds France: In a seemingly related campaign, Eliasxy also claimed to have breached data from McDonalds France. This was published on an open web forum, targeting the Food & Beverages industry.
  • Innovorder: Threat actor Tenere700 claimed to have breached the database of Innovorder, a French Food & Beverages organization, exposing approximately 41,000 records.

1.2 Financial and Cryptocurrency Breaches

Financial institutions and cryptocurrency platforms were highly targeted:

  • Ledger Hardware Wallet: Threat actor livingstone claimed to possess a 2026 customer leak containing approximately 3,000 records linked to Australian users. The data reportedly includes customer names, phone numbers, email addresses, product names, product codes, currency, and purchase prices.
  • Polymarket: Threat actor GrandTheftCrypto claimed to have breached 93,000 records from USA-based Polymarket. The compromised data reportedly includes wallet IDs, usernames, X (Twitter) usernames, and trading volume (USD).
  • Credit Card Data: Threat actor Yarikmsk77 claimed to be selling 100 USA credit card records, reportedly including credit card numbers, expiry dates, CVVs, names, addresses, phones, and emails.
  • Bank Accounts: Threat actor palexxz advertised leaked bank account details from multiple countries, exposing email credentials, passwords, personal documents, and two-factor authentication (2FA) details.
  • IDPay: Threat actor A K U L A v 2 . 2 claimed to have leaked login credentials to the Iranian financial services organization IDPay via Telegram.

1.3 Government and Public Sector Data Leaks

Public sector entities faced severe data exposures:

  • Lok Sabha Members (India): Threat actor EMIRPASHA leaked a database containing information on 543 Lok Sabha members. The dataset includes member names, political party affiliations, constituencies, permanent addresses, permanent telephone numbers, Delhi addresses, email addresses, and additional contact numbers.
  • Bangladesh ECS: Threat actor Angrboda claimed to be selling a Bangladesh ECS voter database containing 34,105 verified voter records.
  • Korps Brigade Mobil (Indonesia): Threat actor maulnism1337 claimed to have leaked data from this law enforcement organization via Telegram.
  • Pass sport (France): Threat actor tsirijas claimed to have breached the database of Pass sport, a government administration entity in France.
  • Spanish DNI (Identity Cards): Threat actor boto claimed to be selling 1,500 Spanish DNI cards, including front and back images, priced at $300.
  • Government and Police Emails: Threat actor quasarium claimed to be selling government and police email databases from multiple countries, including Hungary, Italy, Greece, Argentina, Brazil, Vietnam, Bangladesh, East Timor, Thailand, Angola, Eswatini, and Nigeria.

1.4 Healthcare and Non-Profit Breaches

  • Fitzgibbon Hospital (USA): Threat actor wwxxcc leaked approximately 14.8 GB of data (3,342 files) belonging to Fitzgibbon Hospital. The data reportedly includes 12.3 GB of PDF emails, 1.66 GB of scanned documents, and 853 MB of CSV files containing internal records.
  • Citizen (UK): Threat actor zestix leaked 203.95 GB of data comprising over 151,000 files from Citizen Housing. The exposed data includes management documents, financial reports, operational databases, backup archives, technical reports, and installation certificates.
  • GPEMAN (Nepal): Threat actor suicid claimed to have breached the database of the General Practice and Emergency Medicine Association of Nepal, exposing the personal information of its members.

2. Massive Email Lead Distribution Campaigns

A highly active threat actor operating under the moniker “injectioninferno” conducted a massive campaign selling bulk email databases across open web forums. These datasets represent an enormous volume of potentially compromised communications:

Target GeographyVolume of RecordsThreat ActorDate/Time DetectedSource
Australia38,187,386 recordsinjectioninferno2026-02-21T11:43:24Z
Bangladesh8,087,202 recordsinjectioninferno2026-02-21T18:12:44Z
Saudi Arabia5,922,146 recordsinjectioninferno2026-02-21T11:21:03Z
Azerbaijan1,465,516 recordsinjectioninferno2026-02-21T18:00:15Z
Austria1,316,201 recordsinjectioninferno2026-02-21T17:26:20Z
Bahrain195,420 recordsinjectioninferno2026-02-21T18:09:25Z
Bahamas36,425 recordsinjectioninferno2026-02-21T17:46:00Z
Aruba15,129 recordsinjectioninferno2026-02-21T07:01:07Z

3. Targeted Credential Harvesting by “A K U L A v 2 . 2”

The threat actor “A K U L A v 2 . 2” focused exclusively on exfiltrating and leaking login credentials via Telegram. Their targeting heavily favored Iranian and Iraqi organizations across diverse industries:

  • Telecommunication Company of Iran (Network & Telecommunications)
  • IDPay (Financial Services, Iran)
  • CyberSec CO (Security & Investigations, Iran)
  • ATA Airlines (Airlines & Aviation, Iran)
  • Keramat Razavi Foundations Servants System (Non-profit, Iran)
  • Etihad food group (Food Production, Iraq)
  • Ministry of Water Resources (Government Administration, Iraq)
  • Al Brouj Group LTD (Information Services, Iraq)

4. Initial Access Broker (IAB) Activity

Initial Access Brokers compromise networks and sell backdoor access to other cybercriminals. Several critical infrastructure and corporate environments were compromised:

  • Sommitecnicas HVAC Control System (Portugal): Z-PENTEST ALLIANCE gained unauthorized access to this system, enabling them to view sensor readings, adjust operating parameters, modify PLC time settings, and change equipment schedules.
  • MiniFarm OT System (South Korea): RipperSec claimed unauthorized access to this Operational Technology system.
  • EU Luxury Hotel Booking Platform: Asian_Baddie offered unauthorized access to an unidentified platform, including IT helpdesk tools with admin privileges, root-level server access, and connectivity to POS, IT, and HR systems affecting 100 devices.
  • Unidentified Business Organization (Spain): Threat actor boto sold webshell/PHP access to a Spanish business association’s website, providing full web app control, PHP file modification, MySQL access, and admin email credentials.
  • Spanish Gambling Centre CCTV: NoName057(16) claimed unauthorized access to unidentified CCTV cameras in a gambling centre in Spain.
  • Polícia Militar do Estado de São Paulo (Brazil): 404 CREW CYBER TEAM claimed to have gained unauthorized access to this law enforcement organization.

5. Mass Defacement Operations

A vast majority of the individual incidents documented on February 21, 2026, were website defacements. These attacks are typically designed for hacktivism, notoriety, or ideological messaging.

5.1 The HellR00ters Team Campaign

The “HellR00ters Team” executed a highly prolific defacement campaign almost exclusively targeting Indian small-to-medium enterprises (SMEs) via Telegram. Their targets included:

  • E-commerce & Online Stores: MS Madan Enterprises, Hiresquare Digitech Private Limited, Hyper Marshal Private Limited, HIRESQUARE DIGITECH, HM Solutions, Midnest World Voyages, KALINGA STUDIO, HH ROCK SALT SUPPLIER, Estavel AI Technologies Private Limited, JFH Enterprises, Chameli Udyog Private Limited, Gaurika Strips Private Limited, Guru Ji Enterprises, Galaxy Shoes, Gelaxy Manufacturing And Services, Globtrx Solutions Private Limited, Beshade enterprises, Dravnexo Global Private Limited, ANARIX SOLUTIONS PRIVATE LIMITED, Classywear Garments Private Limited, GURI FASHION, ANIQUID TECH PAY PRIVATE LIMITED, ANANTSHREE LIFESTYLE PRIVATE LIMITED, DELIGHT WINGS DIGITECH PRIVATE LIMITED, Dalei Enterprises, FELCON EXPO, Cotofied Traders Private Limited, Cornetto Traders Private Limited.
  • Information Technology & Software: LNB Solution, Adviz Digital, Archnet InfoTech, Bue Sparkskills Private Limited, DKB Solution Private Limited, dhamaconsultancyservices.com, Croft IT Service Private Limited, Cloudvista Infotech Private Limited, Joolmart Soft.
  • Fashion, Textiles & Automotive: Mahi Traders, AGT Fashion, Fashion Photography Services, Fashion Frontier Enterprises, Frankwave Textiles, Akash Traders.
  • Other Sectors: Easy schengen visas (UAE, Legal Services), Mqick Resources India Private Limited, Logiwave Logistics, M/S Majhi Traders, Axe Industries, MS Deb Traders, Lapino Marketing, Kalinga Enterprises, Agrobounique Environmental Services, Jetsy Logistics, Eric Fred Fisheries Private Limited.

5.2 The BABAYO EROR SYSTEM Campaign

The “BABAYO EROR SYSTEM” targeted a more geographically dispersed set of organizations:

  • Aha (USA, Marketing)
  • Digital Tech Desk (Nigeria, IT Services)
  • PRIMER TEC (Brazil, Telecommunications)
  • Mi Propio Web (Colombia, Software)
  • ZMC-Transport (Romania, Logistics)
  • Various unidentified international sites including devine.famitech.qpon, iopi.nessentielle.com, wfda-eg.org, musa.jobpickers.com, webchoiceindia.webdesignchoice.co.in, finance.short2link.com, shipstationapp.mintbig.com, digitalstudyz.com, and juwarabisnis.com.

5.3 Additional Defacements

The EXADOS group claimed to have defaced Thai government administration websites, specifically the Bang Sala Subdistrict Administrative Organization and the Ban Khuan Subdistrict Administrative Organization.


6. Malware, Exploits, and Alerts

Beyond data theft and access brokering, the threat landscape included the sale of sophisticated malware and zero-day vulnerabilities.

  • ETH Address Poisoning Bot: Threat actor x3000 advertised an Ethereum blockchain tracking system designed for automated execution. The tool continuously scans the blockchain at one-second intervals for deposits or withdrawals and automatically triggers predefined actions, such as sending 0 ETH transactions to targeted wallets.
  • Orange Livebox Routers 0-Day: Threat actor breach3d advertised two private 0-day vulnerabilities affecting Orange Livebox routers. These vulnerabilities reportedly allow for Remote Code Execution (RCE) and/or Local Privilege Escalation (LPE) via buffer overflow or write-what-where conditions.
  • Logins.zip Infostealer: The threat actor “logins.zip” claimed to sell access to an infostealer service after acquiring its source code. The malware includes an EV-signed userland backdoor, automated session hijacking, file-grabbing capabilities, and a web-based control panel.
  • Campaign Alert: Vector-Z announced a targeting campaign against Ukraine named “Shortcircuit”, allegedly in alliance with HackHax, Overflame, and BD Anonymous.

Conclusion

The data provided for February 21, 2026, illustrates a highly volatile cybersecurity environment. While mass defacements by groups like HellR00ters represent the highest volume of individual incidents, the most critical risks stem from the activities of Initial Access Brokers targeting Operational Technology and corporate infrastructure, as well as the massive exfiltration of PII and financial records by actors like injectioninferno and Eliasxy. Organizations must prioritize securing initial access vectors and monitoring for credential leaks to mitigate the prevailing threats outlined in this report.

Detected Incidents Draft Data

  1. Alleged sale of 100 credit card records
    Category: Data Breach
    Content: Threat actor claims to be selling 100 credit card records from USA. The compromised data reportedly includes credit card number, expiry, cvv, name, address, city, state, zip, country, phone, and email.
    Date: 2026-02-21T23:35:12Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276605/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3fb1804d-89ac-4902-be8b-dc94e238bcdb.png
    Threat Actors: Yarikmsk77
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Alleged sale of ETH Address Poisoning Bot
    Category: Malware
    Content: Threat actor claims to be selling a ETH blockchain tracking system designed for blockchain monitoring and automated execution. The actor claims the tool continuously scans the blockchain at one-second intervals, monitoring targeted wallets for deposits or withdrawals. When activity is detected, it automatically triggers predefined actions, including sending 0 ETH transactions to the monitored wallet, with claims of fast and reliable execution.
    Date: 2026-02-21T23:16:30Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/276599/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/433629aa-17a4-4806-9cc4-f2724571cec6.png
    https://d34iuop8pidsy8.cloudfront.net/4a2ffc1c-9ff8-4ec3-bfe7-ddd8aece4dc2.png
    Threat Actors: x3000
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. BABAYO EROR SYSTEM targets the website of Aha
    Category: Defacement
    Content: The group claims to have defaced the website of Aha.
    Date: 2026-02-21T22:20:14Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/227
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9c54839b-8054-4568-a9e4-21dc85f474a4.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: USA
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: aha
    Victim Site: aha.inc
  4. Alleged data leak of Ledger hardware wallet customer database
    Category: Data Breach
    Content: The threat actor claims to possess a 2026 Ledger hardware wallet customer leak containing approximately 3,000 records allegedly linked to Australian users. The dataset reportedly includes personal and purchase-related information such as customer names, phone numbers, email addresses, product names, product codes, currency, and purchase prices
    Date: 2026-02-21T22:18:21Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-2026-Ledger-Hardware-Wallet-Coustomer-Leak
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/957e0c38-b0fe-44bf-b66f-472284d03cb4.png
    Threat Actors: livingstone
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Alleged data leak of 8K Canada Depositor Leads
    Category: Data Breach
    Content: The threat actor claims to be selling 8,000 fresh Canada HQ depositor leads, the dataset that allegedly includes personal and financial marketing data such as names, emails, phone numbers, deposit amounts, broker details, and offer metadata.
    Date: 2026-02-21T21:06:38Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-8K-Canada-Hot-Depositor-Leads
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b7036be1-e8f0-4f17-9f67-341608c9da76.png
    Threat Actors: livingstone
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged data breach of Burger King France
    Category: Data Breach
    Content: A threat actor claims to have leaked the franchise database of Burger King France. the exposed data allegedly contains restaurant branch details, internal identifiers, API-related information, franchise enterprise records, employee data, and job application information.
    Date: 2026-02-21T20:40:18Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Database-Burger-King-France-Franchise-Database-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/335e53da-357b-4ad5-a115-6af5b438160e.png
    https://d34iuop8pidsy8.cloudfront.net/c9e4d924-f50a-4448-a7d7-9c6657ea76a8.png
    https://d34iuop8pidsy8.cloudfront.net/589ecbe4-bc1e-45a1-ad4e-a573575cd6a2.png
    Threat Actors: Eliasxy
    Victim Country: France
    Victim Industry: Food & Beverages
    Victim Organization: burger king france
    Victim Site: burgerking.fr
  7. Alleged Unauthorized Access to Sommitecnicas HVAC Control System
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Sommitecnicas (Portugal)’s HVAC control system, enabling them to monitor and configure equipment. This access allows them to view current sensor readings, adjust operating parameters, modify PLC time settings, and change equipment schedules, providing a high degree of control over the automation system and representing a clear instance of initial access to the target environment.
    Date: 2026-02-21T20:21:26Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1089
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7030606d-b2ef-4100-a25e-0cdead16d53f.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data leak of Lok Sabha Members Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a database containing information on 543 Lok Sabha members. the dataset as including details of Members of Parliament (MPs) elected to the Lower House of India’s Parliament ,the exposed data allegedly contains member names, political party affiliations, constituencies (state), permanent addresses, permanent telephone numbers, Delhi addresses, email addresses, and additional contact numbers.
    Date: 2026-02-21T20:18:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DOCUMENTS-543-lok-Sabha-members-database-leaked-free-sample
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fa350b57-1242-4a3d-9a33-4dd50080f972.png
    Threat Actors: EMIRPASHA
    Victim Country: Unknown
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Alleged data breach of Universitas Diponegoro
    Category: Data Breach
    Content: A threat actor claims to have leaked the database of Universitas Diponegoro (Diponegoro University) in Semarang.
    Date: 2026-02-21T19:55:25Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-DATABASE-UNIVERSITAS-DIPONEGORO-SEMARANG
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7e5a4268-3eec-4d09-8262-70548b2357d8.png
    Threat Actors: 1LH4MZXSEC
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: universitas diponegoro
    Victim Site: undip.ac.id
  10. Alleged data breach of Kirkify
    Category: Data Breach
    Content: A threat actor claims to have leaked the database of Kirkify.the exposed data includes subscription information, face swap images and videos, billing events, credit transactions, credit balances, blog posts, email addresses, usernames, and user IDs.
    Date: 2026-02-21T19:33:10Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Kirkify-net-Database-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7628d75f-02cd-4d36-81ba-11595cb5546c.png
    https://d34iuop8pidsy8.cloudfront.net/c2952bf2-1223-4bb7-8937-610d1f27ed5b.png
    Threat Actors: Sythe
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: kirkify
    Victim Site: kirkify.net
  11. EXADOS targets the website of Bang Sala Subdistrict Administrative Organization
    Category: Defacement
    Content: The group claims to have defaced the website of Bang Sala Subdistrict Administrative Organization.
    Date: 2026-02-21T19:18:53Z
    Network: telegram
    Published URL: https://t.me/EXA_DOS_KH/161
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/79817219-8677-438c-a471-43d03ce036d8.png
    Threat Actors: EXADOS
    Victim Country: Thailand
    Victim Industry: Government Administration
    Victim Organization: bang sala subdistrict administrative organization
    Victim Site: bangsala.go.th
  12. EXADOS targets the website of Ban Khuan Subdistrict Administrative Organization
    Category: Defacement
    Content: The group claims to have defaced the website of Ban Khuan Subdistrict Administrative Organization.
    Date: 2026-02-21T18:58:48Z
    Network: telegram
    Published URL: https://t.me/EXA_DOS_KH/162
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a53b06b9-02ea-4a7c-82e8-e4f958a6ee4e.png
    Threat Actors: EXADOS
    Victim Country: Thailand
    Victim Industry: Government Administration
    Victim Organization: ban khuan subdistrict administrative organization
    Victim Site: bankhuan.go.th
  13. Alleged Unauthorized Access to the MiniFarm OT System in South Korea
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to the MiniFarm OT (Operational Technology) system in South Korea.
    Date: 2026-02-21T18:43:17Z
    Network: telegram
    Published URL: https://t.me/c/2875163062/689
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eb0a6250-18bc-44c2-ad6f-a76127816978.png
    Threat Actors: RipperSec
    Victim Country: South Korea
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged leak of Japan-based eBay and VPS accounts
    Category: Data Breach
    Content: The threat actor claims to have leaked a dataset containing 1,500 records associated with Japan-based eBay and VPS accounts. The exposed data reportedly includes sensitive information such as eBay user IDs, Gmail addresses and passwords, eBay login credentials, VPS provider details, control panel access credentials, IP addresses, etc.
    Date: 2026-02-21T18:15:57Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/276582/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1995d51d-10d7-4358-9a14-37b4a2db9c7f.png
    Threat Actors: palexxz
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged data leak of bank accounts
    Category: Data Breach
    Content: The threat actor claims to be selling leaked bank account details from multiple countries. The exposed data reportedly includes associated email credentials, passwords, personal documents, and two-factor authentication (2FA) details etc.
    Date: 2026-02-21T18:15:13Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/276583/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bce06a72-ecfa-4a99-bcd3-a0d8059bfd9b.png
    Threat Actors: palexxz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Alleged sale of Bangladesh Email Leads
    Category: Data Breach
    Content: A threat actor is leaked a large email leads database allegedly containing 8,087,202 email records associated with Bangladesh.
    Date: 2026-02-21T18:12:44Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Leads-Emails-Bangladesh-8-087-202
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d24d6622-0ce4-44e7-b4d2-2b16f459afb2.png
    Threat Actors: injectioninferno
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged data Breach of Citizen
    Category: Data Breach
    Content: The threat actor claims to be obtained and leaked a database from Citizen. The exposed dataset reportedly contains 203.95 GB of data comprising over 151,000 files, including management documents, financial reports, operational databases, backup archives, energy retrofit project records, technical reports, installation certificates, insurance documents, address-based reports, project progress tracking files, and related internal documentation.
    Date: 2026-02-21T18:10:46Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/276584/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/66c40924-df8b-41c0-8135-3be837664fc9.png
    https://d34iuop8pidsy8.cloudfront.net/ac51c7db-6663-4ce4-9962-06c846566802.png
    https://d34iuop8pidsy8.cloudfront.net/88e2bb28-9fb7-46d0-b7ba-f21d210b3eba.png
    https://d34iuop8pidsy8.cloudfront.net/bbde5ed9-043e-45cf-bc67-4cfe98e331af.png
    https://d34iuop8pidsy8.cloudfront.net/b4777e31-e1e7-481e-bdb1-b5758ff163b7.png
    Threat Actors: zestix
    Victim Country: UK
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: citizen
    Victim Site: citizenhousing.org.uk
  18. Alleged sale of Bahrain Email Leads
    Category: Data Breach
    Content: A threat actor is advertising a database allegedly containing 195,420 email addresses associated with Bahrain. which includes sample email entries and promotes Telegram channels for distribution.
    Date: 2026-02-21T18:09:25Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Leads-Emails-Bahrain-195-420
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ae850b84-2126-4137-a6a5-8a954513291a.png
    Threat Actors: injectioninferno
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged sale of Azerbaijan Email Leads
    Category: Data Breach
    Content: A threat actor is leaked a large email leads database allegedly containing 1,465,516 Azerbaijani email addresses. which includes sample email entries and promotes Telegram channels for distribution.
    Date: 2026-02-21T18:00:15Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Leads-Emails-Azerbaiy%C3%A1n-1-465-516
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/728b4ccb-4964-407c-8e3c-ce3b771f3349.png
    Threat Actors: injectioninferno
    Victim Country: Azerbaijan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged data leak of Lebanese WhatsApp User Database
    Category: Data Breach
    Content: A threat actor is advertising the sale of a Lebanese WhatsApp user database allegedly containing approximately 3,685,000 records. the dataset includes phone numbers, gender information, and profile photos of active WhatsApp users
    Date: 2026-02-21T17:48:23Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Lebanese-WhatsApp-database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f3ff4486-ff4c-4b9e-976e-e797fa532fa4.png
    Threat Actors: IMAN
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged data leak of Bahamas Email Database
    Category: Data Breach
    Content: A threat actor is advertising a database titled “Emails Complete Bahamas 36,425.” The post suggests a collection of 36,425 email records allegedly related to individuals or entities in the Bahamas.
    Date: 2026-02-21T17:46:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Emails-Bahamas-36-425
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1455d041-927a-436f-a7ee-d9261dd83463.png
    Threat Actors: injectioninferno
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Alleged unauthorized access to a Food Establishment in Germany
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a food establishment in Germany.
    Date: 2026-02-21T17:38:30Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1088
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cab45597-0376-4674-87fd-655559522f3c.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged sale of unauthorized access to unidentified luxury hotel booking platform
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to an unidentified EU based luxury hotel booking platform, including access to an IT helpdesk tool with admin privileges and root-level server access. This access reportedly enables connectivity to POS, IT, HR, and other internal systems, affecting 100 devices.
    Date: 2026-02-21T17:38:13Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/276580/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e4c25843-6e29-4960-8163-53fd0024c42e.png
    Threat Actors: Asian_Baddie
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged sale of Austria Email Leads
    Category: Data Breach
    Content: A threat actor is leaked a large email leads database allegedly containing 1,316,201 Austrian email addresses.
    Date: 2026-02-21T17:26:20Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-LEADS-EMAILS-AUSTRIA-1-316-201
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6a420a94-8fa6-4316-9152-d25bee3841bf.png
    Threat Actors: injectioninferno
    Victim Country: Austria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged data breach of Emploi en Tunisie
    Category: Data Breach
    Content: A threat actor is advertising the sale of a dataset allegedly originating from Emploi en Tunisie. The post claims approximately 137,000 user records containing contact details, job applications, and support ticket data. Exposed fields reportedly include full names, emails, phone numbers, dates of birth, addresses, job application details, recruiter information, and internal support communications.
    Date: 2026-02-21T17:00:47Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-137k-Tunisia-user-data-leak-https-www-emploi-en-tunisie-com-contact-and-employm
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/079d61ce-5b57-4015-ad54-0ed9c6a43d39.png
    Threat Actors: TelephoneHooliganism
    Victim Country: Tunisia
    Victim Industry: Human Resources
    Victim Organization: emploi en tunisie
    Victim Site: emploi-en-tunisie.com
  26. Alleged data breach of AXA Mutuelle Avocats
    Category: Data Breach
    Content: A threat actor claims to have breached AXA Mutuelle Avocats and is releasing a fresh database dump. the database is 35MB compressed (214MB uncompressed) in ZIP format. Allegedly exposed data includes emails, password hashes, and personally identifiable information (names, civil details), along with additional sensitive records.
    Date: 2026-02-21T16:24:40Z
    Network: openweb
    Published URL: https://breachforums.in/index.php?threads/french-axa-mutuelle-avocats.637/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/986b63a2-be7a-4ef9-9d76-a2d63d647a1f.png
    Threat Actors: breach3d
    Victim Country: France
    Victim Industry: Insurance
    Victim Organization: axa mutuelle avocats
    Victim Site: axa.fr
  27. Alleged sale of Private 0-Day Vulnerabilities for Orange Livebox Routers
    Category: Vulnerability
    Content: A threat actor is advertising two private 0-day vulnerabilities affecting Orange Livebox routers (multiple firmware versions). The vulnerabilities are described as potential RCE and/or LPE via buffer overflow or write-what-where conditions.
    Date: 2026-02-21T15:52:19Z
    Network: openweb
    Published URL: https://breachforums.in/index.php?threads/exclusive-orange-livebox-0-day-private.638/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/06ed6454-38da-4f9a-ab36-09503e685b34.png
    Threat Actors: breach3d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged data leak of Korps Brigade Mobil
    Category: Data Breach
    Content: Group claims to have leaked data from Korps Brigade Mobil.
    Date: 2026-02-21T14:39:59Z
    Network: telegram
    Published URL: https://t.me/maul1337anon/997?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e477ac97-8bc0-42fc-95df-3d08f9447aed.png
    Threat Actors: maulnism1337
    Victim Country: Indonesia
    Victim Industry: Law Enforcement
    Victim Organization: korps brigade mobil
    Victim Site: korbrimob.polri.go.id
  29. Alleged leak of login credentials to Telecommunication Company of Iran
    Category: Data Breach
    Content: The group claims to have leaked login credentials to sub domain of Telecommunication Company of Iran.
    Date: 2026-02-21T14:36:33Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074809
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f53b740d-0d32-4319-b704-7fcfd035bc27.jpg
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Network & Telecommunications
    Victim Organization: telecommunication company of iran
    Victim Site: internet.tci.ir
  30. Alleged unauthorized Access to an unidentified CCTV cameras in gambling centre in Spain
    Category: Initial Access
    Content: The group claims to have gained alleged unauthorized access to an unidentified CCTV cameras in gambling centre in Spain.
    Date: 2026-02-21T14:22:07Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2437
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3476eb94-4d51-4602-a0e7-9579e34542c8.jpg
    Threat Actors: NoName057(16)
    Victim Country: Spain
    Victim Industry: Gambling & Casinos
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data breach of bangladesh ECS
    Category: Data Breach
    Content: The threat actor claims to be selling a Bangladesh ECS voter database containing 34,105 verified voter records.
    Date: 2026-02-21T14:16:58Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Bangladesh-ECS-Voter-Database-34-105-Records-Political-Preference-Tracking
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ef69b3fb-aeee-4da0-9f2b-87a4adf65f8a.png
    https://d34iuop8pidsy8.cloudfront.net/054a4d79-89de-4adf-a960-f8ebee8fb309.png
    Threat Actors: Angrboda
    Victim Country: Bangladesh
    Victim Industry: Government Administration
    Victim Organization: bangladesh ecs
    Victim Site: ecs.gov.bd
  32. Alleged data breach of Polymarket
    Category: Data Breach
    Content: A threat actor claims to have breached 93,000 records from Polymarket. The compromised data reportedly includes wallet IDs, usernames, X (Twitter) usernames, trading volume (USD), and additional information.
    Date: 2026-02-21T14:04:50Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276569/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/27ca6730-1df4-4dfc-b48e-bafc5292bc82.png
    Threat Actors: GrandTheftCrypto
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: polymarket
    Victim Site: polymarket.com
  33. HellR00ters Team targets the website of Easy schengen visas
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Easy schengen visas
    Date: 2026-02-21T13:53:52Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/930ddd38-74fe-4db0-95b3-4ade455abf4e.png
    Threat Actors: HellR00ters Team
    Victim Country: UAE
    Victim Industry: Legal Services
    Victim Organization: easy schengen visas
    Victim Site: easyschengenvisas.com
  34. Alleged sale of wp admin access to an unidentified shop in India
    Category: Initial Access
    Content: A threat actor claims to be selling wp-admin access to an unidentified shop in india
    Date: 2026-02-21T13:41:45Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276562/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/46630fee-6903-432f-a35c-61c817bac318.png
    Threat Actors: Baiden
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. HELLROOTERS TEAM targets the website of MS Madan Enterprises
    Category: Defacement
    Content: The Group claims to have defaced the website of MS Madan Enterprises.
    Date: 2026-02-21T13:33:25Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bb15e934-f722-4e1e-9c09-d51e1743d022.png
    https://d34iuop8pidsy8.cloudfront.net/f40c9114-50a2-42f2-a566-f447bfb5c064.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: ms madan enterprises
    Victim Site: ms-madanenterprises.com
  36. HellR00ters Team targets the website of Hiresquare Digitech Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Hiresquare Digitech Private Limited.
    Date: 2026-02-21T13:28:33Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f1cbbe74-313e-485c-bd14-610135eac780.png
    https://d34iuop8pidsy8.cloudfront.net/6401bfaa-c5b8-4587-89ee-ae016b1e1807.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hiresquare digitech private limited
    Victim Site: hiresquaredigitech.com
  37. HELLROOTERS TEAM targets the website of Mahi Traders.
    Category: Defacement
    Content: The Group claims to have defaced the website of Mahi Traders.
    Date: 2026-02-21T13:28:27Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eae59e3f-8d06-4cc8-bc6e-00ace5ad3ba2.png
    https://d34iuop8pidsy8.cloudfront.net/caa4e52a-8fe4-48e0-8d55-9d68ced80444.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Fashion & Apparel
    Victim Organization: mahi traders
    Victim Site: mahi-traders.com
  38. HellR00ters Team targets the website of Hyper Marshal Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Hyper Marshal Private Limited.
    Date: 2026-02-21T13:27:36Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/608c05b0-a315-4a01-8e56-21345349faa2.png
    https://d34iuop8pidsy8.cloudfront.net/3d06f224-f9b5-44a3-abcc-294db9658178.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hyper marshal private limited
    Victim Site: hyper-marshal.com
  39. HELLROOTERS TEAM targets the website of Mqick Resources India Private Limited
    Category: Defacement
    Content: The Group claims to have defaced the website of Mqick Resources India Private Limited.
    Date: 2026-02-21T13:15:54Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ed374fef-494d-470f-ae33-794c3261e064.png
    https://d34iuop8pidsy8.cloudfront.net/c8d01ff5-1cfd-4532-94f2-1620ba00478d.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Business Supplies & Equipment
    Victim Organization: mqick resources india private limited
    Victim Site: mqickresourcesindia.com
  40. HellR00ters Team targets the website of Logiwave Logistics
    Category: Defacement
    Content: The group claims to have defaced the website of Logiwave Logistics.
    Date: 2026-02-21T13:14:15Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2074e8ea-3ae5-481e-9a6e-2226b3cca82c.jpg
    https://d34iuop8pidsy8.cloudfront.net/f3fbe9c2-0dcb-47c2-ad2a-9eb217412721.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Transportation & Logistics
    Victim Organization: logiwave logistics
    Victim Site: logiwave-logistics.com
  41. HellR00ters Team targets the website of AGT Fashion
    Category: Defacement
    Content: The group claims to have defaced the website of AGT Fashion.
    Date: 2026-02-21T13:13:57Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dbd3298d-74ec-41ee-8d8f-956fb9524f35.png
    https://d34iuop8pidsy8.cloudfront.net/4ecdac82-0b46-459f-a62d-a2f41070ccf1.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Fashion & Apparel
    Victim Organization: agt fashion
    Victim Site: agt-fashion.com
  42. HellR00ters Team targets the website of M/S Majhi Traders
    Category: Defacement
    Content: The Group claims to have defaced the website of M/S Majhi Traders
    Date: 2026-02-21T13:13:52Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c74f8f24-54d1-40c3-a9cf-f328c7c6d56d.png
    https://d34iuop8pidsy8.cloudfront.net/b1a53416-68d1-47bb-a9ef-96607c5daab3.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Food Production
    Victim Organization: m/s majhi traders
    Victim Site: msmajhitraders.com
  43. HellR00ters Team targets the website of HIRESQUARE DIGITECH
    Category: Defacement
    Content: The group claims to have defaced the website of HIRESQUARE DIGITECH.
    Date: 2026-02-21T13:13:14Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f071a691-c87e-4151-9320-6f2706d5a1e1.png
    https://d34iuop8pidsy8.cloudfront.net/094f5ba4-9b27-47fa-889e-b64e462e4183.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hiresquare digitech
    Victim Site: hedigitech.org
  44. HellR00ters Team targets the website of HM Solutions
    Category: Defacement
    Content: The group claims to have defaced the website of HM Solutions.
    Date: 2026-02-21T13:10:55Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7c30b121-64e5-4f43-9a7f-c39752837b8c.png
    https://d34iuop8pidsy8.cloudfront.net/3c797f05-f28a-46a3-9183-0fde26343dcc.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hm solutions
    Victim Site: hm-solutions.org
  45. HellR00ters Team targets the website of Axe Industries
    Category: Defacement
    Content: The group claims to have defaced the website of Axe Industries.
    Date: 2026-02-21T13:10:09Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/26e5013b-51e0-4d70-bc17-276a5fc64bb7.png
    https://d34iuop8pidsy8.cloudfront.net/c77631d1-1ab7-483f-b729-22075b0b82c1.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: axe industries
    Victim Site: axeindustries.com
  46. HELLROOTERS TEAM targets the website of Midnest World Voyages
    Category: Defacement
    Content: The Group claims to have defaced the website of Midnest World Voyages.
    Date: 2026-02-21T13:07:17Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9cdaa6c0-d4e6-4e4c-8f3b-cdbe6cb2dbbd.png
    https://d34iuop8pidsy8.cloudfront.net/9c2c439e-0774-4077-9d14-4524276b5698.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: midnest world voyages
    Victim Site: midnestworldvoyages.com
  47. HELLROOTERS TEAM targets the website of MS Deb Traders
    Category: Defacement
    Content: The group claims to have defaced the website of MS Deb Traders.
    Date: 2026-02-21T13:01:52Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/140b08ff-9ecf-4a59-8671-a7c5d8564a50.png
    https://d34iuop8pidsy8.cloudfront.net/a885070b-abda-417e-973e-be351fcc9166.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Wholesale
    Victim Organization: ms deb traders
    Victim Site: msdebtraders.com
  48. HellR00ters Team targets the website of LNB Solution
    Category: Defacement
    Content: The group claims to have defaced the website of LNB Solution.
    Date: 2026-02-21T13:00:42Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a80044b1-a264-4e4b-a5b7-42cfc1bd7744.jpg
    https://d34iuop8pidsy8.cloudfront.net/01fbca4d-512e-461b-8b39-836e6ea4be1c.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: lnb solution
    Victim Site: lnb-solution.com
  49. HellR00ters Team targets the website of Lapino Marketing
    Category: Defacement
    Content: The group claims to have defaced the website of Lapino Marketing.
    Date: 2026-02-21T12:57:32Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4012d231-5850-4ee2-a979-87f198a36851.jpg
    https://d34iuop8pidsy8.cloudfront.net/27ba7886-2d33-4362-a33f-87b98e6d6ea2.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: lapino marketing
    Victim Site: lapinomarketing.com
  50. HellR00ters Team targets the website of Adviz Digital
    Category: Defacement
    Content: The group claims to have defaced the website of Adviz Digital.
    Date: 2026-02-21T12:55:03Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/babc335c-4dff-490d-8f79-a4ddc82fe429.png
    https://d34iuop8pidsy8.cloudfront.net/e2e84732-7f44-4f0c-9227-ff9c9bdcb098.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: adviz digital
    Victim Site: advizdigital.com
  51. HellR00ters Team targets the website of KALINGA STUDIO
    Category: Defacement
    Content: The group claims to have defaced the website of KALINGA STUDIO.
    Date: 2026-02-21T12:54:50Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1b516724-fa74-4328-bf6f-03133296bfc8.jpg
    https://d34iuop8pidsy8.cloudfront.net/e7133da3-0e93-4c81-a5b8-cf3a83c2fe35.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: kalinga studio
    Victim Site: ks-studios.com
  52. Vector-Z claims to target Ukraine
    Category: Alert
    Content: A recent post by the group is targeting Ukraine under the campaign name Shortcircuit , allegedly in alliance with HackHax, Overflame, and BD Anonymous.
    Date: 2026-02-21T12:53:58Z
    Network: telegram
    Published URL: https://t.me/c/3585517592/120
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fbcec971-ecc7-4166-8fb2-fd7da792606d.jpg
    https://d34iuop8pidsy8.cloudfront.net/721aff58-e414-4cd4-91bb-a420f3a06558.jpg
    https://d34iuop8pidsy8.cloudfront.net/65c0dfc3-c6b9-43d8-bd5f-5987a39b17c3.jpg
    Threat Actors: Vector-Z
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. HellR00ters Team targets the website of Kalinga Enterprises
    Category: Defacement
    Content: The group claims to have defaced the website of Kalinga Enterprises.
    Date: 2026-02-21T12:49:40Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f59ca6cc-13eb-4d1a-a62e-b576362cbe88.jpg
    https://d34iuop8pidsy8.cloudfront.net/9744d8f8-93c4-4164-a121-7e0c9fc7e14b.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: kalinga enterprises
    Victim Site: kalinga-enterprises.com
  54. HellR00ters Team targets the website of Archnet InfoTech
    Category: Defacement
    Content: The group claims to have defaced the website of Archnet InfoTech.
    Date: 2026-02-21T12:43:42Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a181c964-9ce7-4da4-8d40-227c9551c588.png
    https://d34iuop8pidsy8.cloudfront.net/ce516e31-387b-43db-87a3-47303981061b.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: archnet infotech
    Victim Site: archnetinfo.com
  55. HellR00ters Team targets the website of Fashion Photography Services
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Fashion Photography Services
    Date: 2026-02-21T12:33:06Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ab604987-e8ef-4129-bbcc-9eb0b7a1c8e7.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Fashion & Apparel
    Victim Organization: fashion photography services
    Victim Site: fashionphotographyservices.com
  56. HellR00ters Team targets the website of HH ROCK SALT SUPPLIER
    Category: Defacement
    Content: The group claims to have defaced the website of HH ROCK SALT SUPPLIER.
    Date: 2026-02-21T12:32:58Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7984d964-c907-4913-9b01-832dbc89f491.png
    https://d34iuop8pidsy8.cloudfront.net/17bc7aae-2268-4381-9f5d-6cc3cbcd9811.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hh rock salt supplier
    Victim Site: hhrocksaltsupplier.com
  57. HellR00ters Team targets the website of Fashion Frontier Enterprises
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Fashion Frontier Enterprises
    Date: 2026-02-21T12:26:20Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f3ea275f-6b9f-4c25-abd4-6ba011e5be0a.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Fashion & Apparel
    Victim Organization: fashion frontier enterprises
    Victim Site: fashionfrontierenterprises.com
  58. Alleged unauthorized admin access to promosera
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to promosera.
    Date: 2026-02-21T12:24:55Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-%E2%AD%90Coupon-Codes-promosera-com-website-admin-access%E2%AD%90
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/81b3df05-0d85-4392-a768-fed46850ec24.png
    Threat Actors: blackwinter99
    Victim Country: Unknown
    Victim Industry: E-commerce & Online Stores
    Victim Organization: promosera
    Victim Site: promosera.com
  59. HellR00ters Team targets the website of Estavel AI Technologies Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Estavel AI Technologies Private Limited.
    Date: 2026-02-21T12:23:53Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/96e2de10-8a57-459f-8f84-800d66c8b5e1.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: estavel ai technologies private limited
    Victim Site: estavelaitechnologies.com
  60. HellR00ters Team targets the website of JFH Enterprises
    Category: Defacement
    Content: The group claims to have defaced the website of JFH Enterprises.
    Date: 2026-02-21T12:23:26Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c4c5fd66-a76d-4ad9-8424-fdf0cd87b6f5.jpg
    https://d34iuop8pidsy8.cloudfront.net/16c6670a-ac2f-4972-96c2-540c45ffd80d.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: jfh enterprises
    Victim Site: jfh-enterprises.com
  61. HellR00ters Team targets the website of Chameli Udyog Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Chameli Udyog Private Limited.
    Date: 2026-02-21T12:23:06Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/80e613a3-69ff-45b5-bbc5-a79802bbcebb.png
    https://d34iuop8pidsy8.cloudfront.net/3d57d50b-0a65-4cb3-a004-86ac3330e56a.png
    Threat Actors: HellR00ters Team
    Victim Country: Unknown
    Victim Industry: E-commerce & Online Stores
    Victim Organization: chameli udyog private limited
    Victim Site: chameliudyog.com
  62. HellR00ters Team targets the website of Gaurika Strips Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Gaurika Strips Private Limited.
    Date: 2026-02-21T12:21:08Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c8c2f323-d9e6-4a1f-bc68-8d6a7ac383fb.png
    https://d34iuop8pidsy8.cloudfront.net/2e86eed0-dfd5-4d33-994b-5b281f07f909.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: gaurika strips private limited
    Victim Site: gaurika-strips.com
  63. HellR00ters Team targets the website of Joolmart Soft
    Category: Defacement
    Content: The group claims to have defaced the website of Joolmart Soft.
    Date: 2026-02-21T12:20:52Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/449ba09f-8a1b-4155-b307-e7438b476e21.jpg
    https://d34iuop8pidsy8.cloudfront.net/62be02a6-e925-4286-bea1-e452ab00e946.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: joolmart soft
    Victim Site: joolmartsoft.com
  64. HellR00ters Team targets the website of Agrobounique Environmental Services
    Category: Defacement
    Content: The group claims to have defaced the website of Agrobounique Environmental Services.
    Date: 2026-02-21T12:20:47Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fd57d929-f3ac-43c1-b7ad-2b1d283d84bc.png
    https://d34iuop8pidsy8.cloudfront.net/03e63707-c12c-4273-ad36-de3005d85cd1.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Environmental Services
    Victim Organization: agrobounique environmental services
    Victim Site: agrobouniqueenvindia.com
  65. HellR00ters Team targets the website of Guru Ji Enterprises
    Category: Defacement
    Content: The group claims to have defaced the website of Guru Ji Enterprises.
    Date: 2026-02-21T12:18:25Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0904c746-b095-4622-9fbf-6ad3b9e4fb77.png
    https://d34iuop8pidsy8.cloudfront.net/3b35f990-8863-42d7-8431-bf8f7e9595a6.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: guru ji enterprises
    Victim Site: guru-jienterprises.com
  66. HellR00ters Team targets the website of Galaxy Shoes
    Category: Defacement
    Content: The group claims to have defaced the website of Galaxy Shoes.
    Date: 2026-02-21T12:17:45Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/742679b9-8576-42d1-9da0-5277e174b801.png
    https://d34iuop8pidsy8.cloudfront.net/3decd13b-1d26-4a1c-b4d6-8903df79ae5e.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: galaxy shoes
    Victim Site: galaxy-shoes.com
  67. HellR00ters Team targets the website of Jetsy Logistics
    Category: Defacement
    Content: The group claims to have defaced the website of Jetsy Logistics.
    Date: 2026-02-21T12:15:48Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/37eddf7b-28ab-4e28-97f8-b79d4438ee27.jpg
    https://d34iuop8pidsy8.cloudfront.net/0c8b0b13-ae52-4f10-b6f0-926c8d7ae3c0.jpg
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Transportation & Logistics
    Victim Organization: jetsy logistics
    Victim Site: jetsy-logistics.com
  68. HellR00ters Team targets the website of Gelaxy Manufacturing And Services
    Category: Defacement
    Content: The group claims to have defaced the website of Gelaxy Manufacturing And Services
    Date: 2026-02-21T12:15:29Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/27d90a58-ca71-49f6-9815-e444d5b37983.png
    https://d34iuop8pidsy8.cloudfront.net/d7ed4082-3e59-4f2f-ba67-caf9d43654cb.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: gelaxy manufacturing and services
    Victim Site: gelaxymanufacturing.com
  69. HellR00ters Team targets the website of Globtrx Solutions Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Globtrx Solutions Private Limited
    Date: 2026-02-21T12:13:38Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/48bb94b7-22f3-469a-ad7a-81fd3028a7e2.png
    https://d34iuop8pidsy8.cloudfront.net/1e8c36d6-76a4-42ce-9756-d986d1c02b0c.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: globtrx solutions private limited
    Victim Site: globtrx-solutions.com
  70. HellR00ters Team targets the website of Beshade enterprises
    Category: Defacement
    Content: The group claims to have defaced the website of Beshade enterprises.
    Date: 2026-02-21T12:11:59Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ccef261b-fecb-4e49-9a96-a7e32cfb23b1.png
    https://d34iuop8pidsy8.cloudfront.net/f94f0778-f749-4ab1-bdea-b54b44ace6f7.png
    Threat Actors: HellR00ters Team
    Victim Country: Unknown
    Victim Industry: E-commerce & Online Stores
    Victim Organization: beshade enterprises
    Victim Site: beshadeenterprises.com
  71. HellR00ters Team targets the website of Bue Sparkskills Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Bue Sparkskills Private Limited.
    Date: 2026-02-21T12:08:18Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/25339144-fb3c-49a4-b3de-bb67563a5a1b.png
    https://d34iuop8pidsy8.cloudfront.net/d2438f66-5be9-4fb7-a294-2606906c3dac.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: bue sparkskills private limited
    Victim Site: buesparkskills.com
  72. HellR00ters Team targets the website of Dravnexo Global Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Dravnexo Global Private Limited
    Date: 2026-02-21T12:07:53Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/19aa8ac3-74e1-49f8-953f-a5962492d6a2.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: dravnexo global private limited
    Victim Site: dravnexoglobal.com
  73. HellR00ters Team targets the website of ANARIX SOLUTIONS PRIVATE LIMITED
    Category: Defacement
    Content: The group claims to have defaced the website of ANARIX SOLUTIONS PRIVATE LIMITED.
    Date: 2026-02-21T12:01:22Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3feb3b65-6544-4f5c-8ad4-7e9e1a4ec2d2.png
    https://d34iuop8pidsy8.cloudfront.net/df08c8db-fed6-4c34-948d-80ba5b4f70e8.png
    Threat Actors: HellR00ters Team
    Victim Country: Unknown
    Victim Industry: E-commerce & Online Stores
    Victim Organization: anarix solutions private limited
    Victim Site: anarixsolutions.com
  74. HellR00ters Team targets the website of Classywear Garments Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Classywear Garments Private Limited.
    Date: 2026-02-21T11:59:46Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b433c0dc-8abf-4dfa-b538-978783c02005.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: classywear garments private limited
    Victim Site: classyweargarments.com
  75. HellR00ters Team targets the website of GURI FASHION
    Category: Defacement
    Content: The group claims to have defaced the website of GURI FASHION.
    Date: 2026-02-21T11:58:45Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/98256ef3-08e3-44b3-9807-64cd8469f1ff.png
    https://d34iuop8pidsy8.cloudfront.net/4372daa3-7417-46e0-a21b-1214c454b726.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: guri fashion
    Victim Site: gurifashion.com
  76. HellR00ters Team targets the website of DKB Solution Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of DKB Solution Private Limited
    Date: 2026-02-21T11:54:19Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d9c37df6-537b-41f8-a5a2-cb434370d1b1.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Software Development
    Victim Organization: dkb solution private limited
    Victim Site: dkb-solution.com/8.txt
  77. HellR00ters Team targets the website of ANIQUID TECH PAY PRIVATE LIMITED
    Category: Defacement
    Content: The group claims to have defaced the website of ANIQUID TECH PAY PRIVATE LIMITED.
    Date: 2026-02-21T11:52:09Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1e228511-a0d7-4efe-8b0f-f9e2a5967885.png
    https://d34iuop8pidsy8.cloudfront.net/9eeb9fb1-3d0b-4dd0-a935-92e31a629590.png
    Threat Actors: HellR00ters Team
    Victim Country: Unknown
    Victim Industry: E-commerce & Online Stores
    Victim Organization: aniquid tech pay private limited
    Victim Site: aniquidtechpay.com
  78. HellR00ters Team targets the website of ANANTSHREE LIFESTYLE PRIVATE LIMITED
    Category: Defacement
    Content: The group claims to have defaced the website of ANANTSHREE LIFESTYLE PRIVATE LIMITED.
    Date: 2026-02-21T11:51:10Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/50632832-630d-4937-b826-0dfeb222e644.png
    https://d34iuop8pidsy8.cloudfront.net/c1d8beae-7a52-4176-985e-b47fa11644cc.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: anantshree lifestyle private limited
    Victim Site: anantshreelifestyle.com
  79. HellR00ters Team targets the website of Eric Fred Fisheries Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Eric Fred Fisheries Private Limited
    Date: 2026-02-21T11:47:54Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/db49d16f-4ac0-4bc7-b37d-f1c0ec610a86.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Food Production
    Victim Organization: eric fred fisheries private limited
    Victim Site: ericfredfisheries.com
  80. Alleged Data breach of Innovorder
    Category: Data Breach
    Content: The threat actor claims to have breached the database belonging to Innovorder. The compromised dataset reportedly contains approximately 41,000 records.
    Date: 2026-02-21T11:45:23Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-FR-INNOVORDER-COM-41K-Extract-by-Portal-acces
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ab694a92-10d4-4f05-bb7c-3f110293bc71.png
    Threat Actors: Tenere700
    Victim Country: France
    Victim Industry: Food & Beverages
    Victim Organization: innovorder
    Victim Site: innovorder.com
  81. HellR00ters Team targets the website of dhamaconsultancyservices.com
    Category: Defacement
    Content: The threat actor claims to have defaced the website of dhamaconsultancyservices.com
    Date: 2026-02-21T11:45:05Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/053ce1d6-f71f-436e-b524-bb80c2881fc1.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: dhamaconsultancyservices.com
    Victim Site: dhamaconsultancyservices.com
  82. Alleged leak of email records from Australia
    Category: Data Breach
    Content: The threat actor claims to have leaked the 38.1 million email records from Australia.
    Date: 2026-02-21T11:43:24Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Leads-Emails-Australia-38-187-386
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9a90b60b-fa13-4156-b056-f43f6ff6730b.png
    Threat Actors: injectioninferno
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. HellR00ters Team targets the website of Croft IT Service Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Croft IT Service Private Limited.
    Date: 2026-02-21T11:37:25Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c853435e-b788-4436-b894-9c485d1e1954.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Software
    Victim Organization: croft it service private limited
    Victim Site: croftitservice.com
  84. HellR00ters Team targets the website of Frankwave Textiles
    Category: Defacement
    Content: The group claims to have defaced the website of Frankwave Textiles.
    Date: 2026-02-21T11:27:58Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f56fba99-d35f-4368-b894-f293fd9b02c7.png
    https://d34iuop8pidsy8.cloudfront.net/e3b39a7d-ffa6-4924-8cc7-ff0fb16979d7.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Textiles
    Victim Organization: frankwave textiles
    Victim Site: frankwavetextiles.com
  85. HellR00ters Team targets the website of DELIGHT WINGS DIGITECH PRIVATE LIMITED
    Category: Defacement
    Content: The threat actor claims to have defaced the website of DELIGHT WINGS DIGITECH PRIVATE LIMITED.
    Date: 2026-02-21T11:24:23Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4ef669cb-d9ee-4391-8484-c9101fc3d995.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: delight wings digitech private limited
    Victim Site: delightwingsdigitech.com
  86. HellR00ters Team targets the website of Dalei Enterprises
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Dalei Enterprises.
    Date: 2026-02-21T11:22:27Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e7a26d13-1511-4933-a400-933687e4c5a7.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: dalei enterprises
    Victim Site: daleienterprises.com
  87. Alleged Sale of Leads Saudi Arabia
    Category: Data Breach
    Content: Threat actor claims to have leaked a massive dataset containing 5,922,146 email records belonging to individuals in Saudi Arabia.
    Date: 2026-02-21T11:21:03Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Leads-Saudi-Arabia-EMAILS-5-922-146
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c8cbdcc-1b96-4c4e-9245-0fc409719138.png
    Threat Actors: injectioninferno
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. HellR00ters Team targets the website of FELCON EXPO
    Category: Defacement
    Content: The group claims to have defaced the organizations website.
    Date: 2026-02-21T11:19:17Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/75546512-949a-4ea3-a153-d69707939cb7.png
    https://d34iuop8pidsy8.cloudfront.net/25268c97-9676-4d83-a664-97ef4667bd30.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: felcon expo
    Victim Site: felconexpo.com
  89. HellR00ters Team targets the website of Cotofied Traders Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Cotofied Traders Private Limited.
    Date: 2026-02-21T11:18:31Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8ae76df6-87d7-4ba8-ae68-1e318c1c6502.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: cotofied traders private limited
    Victim Site: cotofiedtraders.com
  90. HellR00ters Team targets the website of Cornetto Traders Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Cornetto Traders Private Limited.
    Date: 2026-02-21T11:15:35Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b7d50986-8986-4632-9ac9-4e3b00ded4f0.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: cornetto traders private limited
    Victim Site: cornettotraders.com
  91. HellR00ters Team targets the website of Cloudvista Infotech Private Limited
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Cloudvista Infotech Private Limited.
    Date: 2026-02-21T11:12:16Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9470329b-9198-43b2-aca0-3f6cd4d1f1f3.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Software
    Victim Organization: cloudvista infotech private limited
    Victim Site: cloudvista-infotech.com
  92. HellR00ters Team targets the website of Akash Traders
    Category: Defacement
    Content: The group claims to have defaced the website of Akash Traders.
    Date: 2026-02-21T11:09:02Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/1050
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/40bbe740-bb6c-47c4-9430-89ba0520678d.png
    https://d34iuop8pidsy8.cloudfront.net/7b17eeb7-74d0-4ed8-9230-78ac810e55fd.png
    Threat Actors: HellR00ters Team
    Victim Country: India
    Victim Industry: Automotive
    Victim Organization: akash traders
    Victim Site: akashtraders.com
  93. BABAYO EROR SYSTEM targets the website of Digital Tech Desk
    Category: Defacement
    Content: The group claims to have defaced the website of Digital Tech Desk.
    Date: 2026-02-21T11:04:36Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/210
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3aaf489a-6bff-4807-8bd5-30da3eea177f.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Nigeria
    Victim Industry: Information Technology (IT) Services
    Victim Organization: digital tech desk
    Victim Site: digitaltechdesk.com.ng
  94. BABAYO EROR SYSTEM targets the website of PRIMER TEC
    Category: Defacement
    Content: The group claims to have defaced the website of PRIMER TEC.
    Date: 2026-02-21T10:49:10Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/210
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/08b102f2-afe4-4f80-aa30-d201017f68fb.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Brazil
    Victim Industry: Network & Telecommunications
    Victim Organization: primer tec
    Victim Site: maisumchinelo.primer.tec.br
  95. BABAYO EROR SYSTEM targets the website of Mi Propio Web
    Category: Defacement
    Content: The group claims to have defaced the website of Mi Propio Web
    Date: 2026-02-21T10:40:54Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/210
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dc797813-29e7-4534-a349-dc1769010b11.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Colombia
    Victim Industry: Software
    Victim Organization: mi propio web
    Victim Site: mipropioweb.com
  96. BABAYO EROR SYSTEM targets the website of devine.famitech.qpon
    Category: Defacement
    Content: The group claims to have defaced the website of devine.famitech.qpon
    Date: 2026-02-21T10:34:50Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/210
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e19669eb-f622-45f3-8b37-b475c451bd92.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: devine.famitech.qpon
  97. Alleged leak of unauthorized admin access to 24onbd
    Category: Data Breach
    Content: The threat actor claims to have leaked unauthorised admin access to 24onbd.
    Date: 2026-02-21T10:12:45Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Bangladesh-Admin-access-to-the-largest-news-website-%E2%AD%9024onbd-com%E2%AD%90
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b2664d02-7ea8-44a4-bcad-a301aeb04e9a.png
    Threat Actors: blackwinter99
    Victim Country: Bangladesh
    Victim Industry: Newspapers & Journalism
    Victim Organization: 24onbd
    Victim Site: 24onbd.com
  98. Alleged unauthorized access to shilpindia
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorised access to shilpindia
    Date: 2026-02-21T09:53:47Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Indian-shilpindia-in-admin-access
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/14768095-bd57-4211-8d28-2180f047f2cd.png
    Threat Actors: blackwinter99
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: shilp india
    Victim Site: shilpindia.in
  99. BABAYO EROR SYSTEM targets the website of iopi.nessentielle.com
    Category: Defacement
    Content: The group claims to have defaced the website of iopi.nessentielle.com.
    Date: 2026-02-21T09:51:28Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/210
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/47353804-e930-4cdd-abbd-3243db8a7345.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: iopi.nessentielle.com
  100. BABAYO EROR SYSTEM targets the website of ZMC-Transport
    Category: Defacement
    Content: The group claims to have defaced the website of ZMC-Transport.
    Date: 2026-02-21T09:45:08Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/205
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/51c7d8e4-177d-42d9-bc39-2af6ca3eb1ea.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Romania
    Victim Industry: Transportation & Logistics
    Victim Organization: zmc-transport
    Victim Site: zmc-transport.ro
  101. BABAYO EROR SYSTEM targets the website of wfda-eg.org
    Category: Defacement
    Content: The group claims to have defaced the website of wfda-eg.org.
    Date: 2026-02-21T09:29:29Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/204
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eb6f3e60-c123-46b2-b69e-94b64fa82c1c.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: wfda-eg.org
  102. BABAYO EROR SYSTEM targets the website of musa.jobpickers.com
    Category: Defacement
    Content: The group claims to have defaced the website of musa.jobpickers.com
    Date: 2026-02-21T09:26:41Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/195
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cd18bb6d-bbeb-40a2-8154-65ed7cfc060f.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: musa.jobpickers.com
  103. BABAYO EROR SYSTEM targets the website of webchoiceindia.webdesignchoice.co.in
    Category: Defacement
    Content: The group claims to have defaced the website of webchoiceindia.webdesignchoice.co.in
    Date: 2026-02-21T09:26:28Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/195
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f7470e4c-fb60-44a4-81ed-768362685215.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: webchoiceindia.webdesignchoice.co.inl
  104. Alleged leak of login credentials to IDPay
    Category: Data Breach
    Content: The group claims to have leaked login credentials to IDPay.
    Date: 2026-02-21T09:21:56Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074693
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0e0145f8-0782-447d-91fe-aac17d3dd6d6.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Financial Services
    Victim Organization: idpay
    Victim Site: idpay.ir
  105. Alleged data sale of moralis
    Category: Data Breach
    Content: The threat actor claims to be selling internal data from Moralis.
    Date: 2026-02-21T09:14:07Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-moralis-io-website-providing-powerful-APIs-for-accessing-blockchain-data
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/edd8a530-fa4a-46b0-8bf8-f13d51262155.png
    Threat Actors: blackwinter99
    Victim Country: Sweden
    Victim Industry: Software Development
    Victim Organization: moralis
    Victim Site: moralis.com
  106. Alleged data breach of McDonalds
    Category: Data Breach
    Content: The threat actor claims to have breached data from McDonalds.
    Date: 2026-02-21T09:02:50Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-McDonalds-France-Franchise-Database-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8bb1cd7e-3966-475e-b11d-f01a637da4d4.png
    https://d34iuop8pidsy8.cloudfront.net/3604f13b-a7b7-4840-8b04-99ec3944c45b.png
    Threat Actors: Eliasxy
    Victim Country: France
    Victim Industry: Food & Beverages
    Victim Organization: mcdonalds
    Victim Site: mcdonalds.fr
  107. Alleged Unauthorized Access to online library
    Category: Initial Access
    Content: The threat actor claims to have unauthorised access to Online library.
    Date: 2026-02-21T08:39:22Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-thuvienonline-com-vn-Vietnamese-online-library-admin-access
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2bf1be03-4849-4897-bc57-08ddfddc360b.png
    Threat Actors: blackwinter99
    Victim Country: Vietnam
    Victim Industry: Education
    Victim Organization: online library
    Victim Site: thuvienonline.com.
  108. BABAYO EROR SYSTEM targets the website of finance.short2link.com
    Category: Defacement
    Content: The group claims to have defaced the website of finance.short2link.com.
    Date: 2026-02-21T08:33:10Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/195
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9c0e08d3-d121-40c1-8a3a-af189e394f99.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: finance.short2link.com
  109. BABAYO EROR SYSTEM targets the website of shipstationapp.mintbig.com
    Category: Defacement
    Content: The group claims to have defaced the website of shipstationapp.mintbig.com
    Date: 2026-02-21T08:17:27Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/195
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f304adcd-e9ad-467f-a04d-381ad2a5911e.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: shipstationapp.mintbig.com
  110. BABAYO EROR SYSTEM targets the website of digitalstudyz.com
    Category: Defacement
    Content: The group claims to have defaced the website of digitalstudyz.com.
    Date: 2026-02-21T08:12:38Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/195
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c5449447-146d-4b04-8275-58704ddecdc1.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: coach.digitalstudyz.com
  111. BABAYO EROR SYSTEM targets the website of juwarabisnis.com
    Category: Defacement
    Content: The group claims to have defaced the website of juwarabisnis.com
    Date: 2026-02-21T08:10:30Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSysteam2/197
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3cc5fc43-d4d4-46b3-8e2f-374284d6b57f.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: juwarabisnis.com
  112. Alleged leak of Chinese data
    Category: Data Breach
    Content: The threat actor claims to have leaked the Chinese data.
    Date: 2026-02-21T08:03:31Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Chinese-data-Free-download-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1247
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ecb9c3b5-e1a6-481b-9a88-9c2b6e0c0d23.png
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Alleged unauthorized access to Polícia Militar do Estado de São Paulo
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Polícia Militar do Estado de São Paulo.
    Date: 2026-02-21T08:00:25Z
    Network: telegram
    Published URL: https://t.me/crewcyber/739
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/38454418-b9f6-4178-af17-c9a9744e9de8.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Brazil
    Victim Industry: Law Enforcement
    Victim Organization: polícia militar do estado de são paulo
    Victim Site: policiamilitar.sp.gov.br
  114. Alleged Sale of Aruba-Based Email Lead List
    Category: Data Breach
    Content: The actor claims to be selling a dataset containing 15,129 email leads reportedly linked to individuals in Aruba.
    Date: 2026-02-21T07:01:07Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Leads-Emails-Aruba-15-129
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/531de5a5-9acd-417c-875d-c554bb532c6f.png
    Threat Actors: injectioninferno
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Alleged Sale of Unauthorized Access to an Unidentified Business organization in Spain
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized webshell/PHP access to a Spanish business association’s website, providing full web app control, PHP file modification, MySQL access, and admin email credentials, potentially enabling data theft and mass abuse of trusted mailing lists.
    Date: 2026-02-21T06:34:08Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276556/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/555bbf22-fa0f-4591-90a2-49d7d2db4630.png
    Threat Actors: boto
    Victim Country: Spain
    Victim Industry: Business and Economic Development
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged Data Breach of Pass sport
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Pass sport,france.
    Date: 2026-02-21T06:31:20Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-PASS-SPORT-FR-CLEAN
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8968f6a5-7e36-4381-b354-47d1021c3fa3.png
    Threat Actors: tsirijas
    Victim Country: France
    Victim Industry: Government Administration
    Victim Organization: pass sport
    Victim Site: pass.sports.gouv.fr
  117. Alleged Sale of DNI (Identity Cards) data from Spain
    Category: Data Breach
    Content: Threat actor claims to be selling 1,500 Spanish DNI (national ID) cards, including front and back images, offered as a one-time bulk sale. The seller states the dataset originates from a different source than prior listings and is priced at $300.
    Date: 2026-02-21T06:10:50Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276557/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/97f0e652-9609-48f9-a793-a3b839dd1899.png
    Threat Actors: boto
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Alleged Sale of Logins.zip Infostealer With EV-Signed Backdoor
    Category: Malware
    Content: Threat actor claims to be selling access to the Logins.zip infostealer service after allegedly acquiring the original project and source code. The offering reportedly includes an EV-signed userland backdoor, automated session hijacking, file-grabbing capabilities, and a web-based control panel. Each buyer is said to receive a dedicated server and domain.
    Date: 2026-02-21T05:28:50Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276547/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ee25ee2e-4bcb-4c19-8651-21088c6a122b.png
    https://d34iuop8pidsy8.cloudfront.net/ba319050-eb39-45ca-9581-a174b2207b85.png
    https://d34iuop8pidsy8.cloudfront.net/2ecc1a51-d313-47db-aff6-a8365d14d0df.png
    https://d34iuop8pidsy8.cloudfront.net/3ed9243a-9879-4adc-89f6-15bc75b6ecdf.png
    Threat Actors: logins.zip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Alleged leak of login credentials to Etihad food group
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Etihad food group
    Date: 2026-02-21T04:37:19Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074351
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9a7b7580-6ad9-4764-bddf-252fe95110bc.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iraq
    Victim Industry: Food Production
    Victim Organization: etihad food group
    Victim Site: etihad.iq
  120. Alleged Sale of eSIM Database
    Category: Data Breach
    Content: Threat actor claims to be selling the database of eSIM.
    Date: 2026-02-21T04:16:36Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-eSIM-database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/71904e82-5a73-4243-9016-2f9cda8bfea1.png
    Threat Actors: p0ppin
    Victim Country: Unknown
    Victim Industry: Network & Telecommunications
    Victim Organization: esim
    Victim Site: Unknown
  121. Alleged leak of login credentials to CyberSec CO
    Category: Data Breach
    Content: The group claims to have leaked login credentials to CyberSec CO
    Date: 2026-02-21T03:47:09Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074305
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e85266d1-9151-4fe9-a31f-a1337e1e1e0e.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Security & Investigations
    Victim Organization: cybersec co
    Victim Site: cybersec.ir
  122. Alleged leak of login credentials to ATA Airlines
    Category: Data Breach
    Content: The group claims to have leaked login credentials to ATA Airlines
    Date: 2026-02-21T03:46:37Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074323
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/aa524c5a-b703-464c-adbc-13aba5dd5d6d.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Airlines & Aviation
    Victim Organization: ata airlines
    Victim Site: ataair.ir
  123. Alleged Sale of HappyEnding24 database
    Category: Data Breach
    Content: Threat actor claims to be selling the database of HappyEnding24, the database contains user records, administrative files, subscription data, city and center exports, and image/ID-related content.
    Date: 2026-02-21T03:41:42Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-IT-happyending24-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9847127b-3ea9-41e5-97ee-897944ebbca5.png
    https://d34iuop8pidsy8.cloudfront.net/c0a4a596-ea68-4949-baa7-37d7fd1e30c7.png
    Threat Actors: suicid
    Victim Country: Italy
    Victim Industry: Other Industry
    Victim Organization: happyending24
    Victim Site: happyendings24.com
  124. Alleged leak of login credentials to Ministry of Water Resources
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Ministry of Water Resources
    Date: 2026-02-21T03:40:43Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074347
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4bae3f9e-eda2-49ed-9414-0cbeb1773a3b.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iraq
    Victim Industry: Government Administration
    Victim Organization: ministry of water resources
    Victim Site: mowr.gov.iq
  125. Alleged Data Breach of GPEMAN
    Category: Data Breach
    Content: Threat actor claims to have breached the database of GPEMAN; the dataset contains personal informations of members.
    Date: 2026-02-21T03:15:14Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-NP-gpeman-org-np-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/41eec8e2-d547-4203-95fe-a4b618b0cd0d.png
    Threat Actors: suicid
    Victim Country: Nepal
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: general practice and emergency medicine association of nepal (gpeman)
    Victim Site: gpeman.org.np
  126. Alleged sale of Government and Police Emails for EDR/Subpoena from Multiple Countries
    Category: Data Breach
    Content: The threat actor claims to be selling government and police email databases from multiple countries, including the Government of Hungary, Polizia di Stato (Italy police), Greek Police, the Police of Argentina, Buenos Aires Province, the Military Police of Brazil, Vietnam, Bangladesh Police, East Timor, the Secretariat of Penitentiary Administration of Brazil, Royal Thai Police, Angola, Eswatini, and Nigeria.
    Date: 2026-02-21T03:14:27Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Government-and-Police-Emails-for-EDR-Subpoena
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/898be3a2-9961-4205-ba5a-95e5b47122ab.png
    Threat Actors: quasarium
    Victim Country: Unknown
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  127. Alleged Data Breach of Steer wings
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Steer wings.
    Date: 2026-02-21T01:11:12Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-steerwings-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/abe14392-c742-41ac-8dc0-44cd8b5d1b2a.png
    Threat Actors: HXH_HAYXHACKER
    Victim Country: India
    Victim Industry: Education
    Victim Organization: steer wings
    Victim Site: steerwings.com
  128. Alleged Sale of Unidentified Hotel Reservation in Saudi Arabia
    Category: Data Breach
    Content: Threat actor claims to be selling Saudi Arabia hotel reservation and flight data. The dataset reportedly contains around 2,500 hotel reservation PDF files with extracted text. The exposed information allegedly includes PII such as names, email addresses, phone numbers, stay details, and hotel information. Some records may also contain ID and payment-related data, along with flight information for multiple airports in Saudi Arabia.
    Date: 2026-02-21T01:10:19Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/276543/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2e811e2c-1c1e-4d9a-beb9-64f62366221d.png
    https://d34iuop8pidsy8.cloudfront.net/4091b030-2ea2-41b1-b4a5-c0bbcf1a15f9.png
    https://d34iuop8pidsy8.cloudfront.net/e311ff42-adfa-4c00-88d2-804818a7943d.png
    Threat Actors: rythem
    Victim Country: Saudi Arabia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged Data Breach of E-accounting
    Category: Data Breach
    Content: Threat actor claims to have breached the database of E-accounting.
    Date: 2026-02-21T01:06:38Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SOURCE-CODE-E-accounting-co-kr-Data-Breach-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/aff6cf7f-c50a-412c-8631-f12175981811.png
    Threat Actors: 888
    Victim Country: South Korea
    Victim Industry: Software
    Victim Organization: e-accounting
    Victim Site: e-accounting.co.kr
  130. Alleged leak of login credentials to Keramat Razavi Foundations Servants System
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Keramat Razavi Foundations Servants System
    Date: 2026-02-21T01:02:47Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074082
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fd11c0f1-7f03-4bf7-aa27-01c5ef25d3f8.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: keramat razavi foundations servants system
    Victim Site: khademyar.razavi.ir
  131. Alleged leak of login credentials to Al Brouj Group LTD
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Al Brouj Group LTD
    Date: 2026-02-21T00:43:52Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1074066
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b1736120-f4f9-4d3a-a840-bb460e957c35.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iraq
    Victim Industry: Information Services
    Victim Organization: al brouj group ltd
    Victim Site: btc-iq.com
  132. Alleged data breach of Fitzgibbon Hospital (USA)
    Category: Data Breach
    Content: The threat actor claims to have leaked the database of Fitzgibbon Hospital (USA). The leaked data reportedly includes emails in PDF format, scanned documents, and CSV files containing internal records and structured data. The total size of the disclosed dataset is approximately 14.8 GB (3,342 files), primarily consisting of 12.3 GB of PDF emails, 1.66 GB of scanned documents, and 853 MB of CSV files.
    Date: 2026-02-21T00:23:24Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Daixin-s-Leaks-Pack
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e0b14e1d-d733-4c06-b7ab-60a620f03b2d.png
    https://d34iuop8pidsy8.cloudfront.net/398bf435-c217-4bb5-b3f1-f2f66626d731.png
    https://d34iuop8pidsy8.cloudfront.net/0c1ba18e-792f-4db9-ad99-95a73927f07e.png
    Threat Actors: wwxxcc
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: fitzgibbon hospital
    Victim Site: fitzgibbon.org
  133. Alleged access to NAVER
    Category: Initial Access
    Content: The group claims to have gained access to NAVER
    Date: 2026-02-21T00:18:17Z
    Network: telegram
    Published URL: https://t.me/c/2875163062/676
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/aae2bcdf-eb9e-49f8-b800-8f9f52ef84e3.png
    https://d34iuop8pidsy8.cloudfront.net/14816fae-4ccb-48b8-a04a-dfa087db0133.png
    Threat Actors: RipperSec
    Victim Country: South Korea
    Victim Industry: E-commerce & Online Stores
    Victim Organization: naver
    Victim Site: naver.com