1. Executive Summary
This report details a series of recent cyber incidents, providing key information for each event strictly based on the provided data. The dataset reveals a highly active global cyber threat landscape characterized by politically motivated hacktivism, opportunistic defacements, the sale of initial access to corporate networks, and large-scale data breaches. The targeting is geographically diverse, though concentrated clusters of activity are visible in the Middle East (Israel, UAE) and Asia (India).
2. Threat Landscape by Attack Category
The incidents analyzed fall into four primary categories: Defacement, Data Breach, Initial Access, and Alerts.
Data Breaches
Data breaches account for a significant portion of the reported incidents, ranging from small organizational leaks to massive national datasets.
- High-Volume Consumer Data: A major leak involved approximately 7 million records allegedly belonging to Experian Ltd in the UK, containing names, dates of birth, contact details, and financial data. Another significant claim involves 4.69 million Israeli citizens’ personal data.
- Aviation Sector: The threat actor Everestgroup claimed to have leaked massive datasets from Atlas Air (1.2 terabytes) and Tsunami Tsolutions (562 GB).
- Healthcare and Social Services: Sensitive medical records were allegedly leaked from a Paris Hospital database by the actor “epi”. Furthermore, data from the French STEM education initiative C Génial was breached by the FAD Team.
- Corporate & Tech: An actor claimed to sell a database of 12,000 Italy-based forex and cryptocurrency depositor leads. Additionally, the AI product Komiko suffered a breach where an attacker alleged exfiltration of user IDs and email addresses, though passwords were not exposed.
Website Defacements
Defacements represent the highest volume of individual incidents in the dataset, primarily driven by a few highly active threat actor groups.
- Mass Campaigns: Actors like BABAYO EROR SYSTEM, Nicotine, and Hax.or engage in rapid, low-sophistication website takeovers. Nicotine, for example, heavily targeted small-to-medium businesses in the UAE, such as Coco N Curry and Sweet Home Spa.
- Educational Targeting: Educational institutions were frequent targets for defacement. BABAYO EROR SYSTEM defaced websites belonging to William & Mary , Auburn University , and Universitas Gadjah Mada.
Initial Access Brokers & Critical Infrastructure
The sale or claiming of initial access poses severe operational risks, particularly when involving critical infrastructure.
- Water Treatment Facilities: The Infrastructure Destruction Squad claimed unauthorized access to the Delhi Water Supply and Sewerage Board, specifically the Coronation Water Treatment Plant. They also claimed access to the Joda ULB water treatment plant control system.
- SCADA/ICS Systems: The IT ARMY OF RUSSIA claimed unauthorized access to industrial greenhouse climate control systems in Kyiv, Ukraine, allegedly manipulating temperature controls. Cyber Islamic resistance claimed to have compromised over 130 remote control systems of Control Applications Ltd across multiple countries.
- Commercial Access Brokers: Actors frequently posted on forums selling access to various entities, such as a WordPress pet supply shop in Chile and administrative access to a PrestaShop in the USA enabling payment redirection.
Threat Alerts
Several groups issued forward-looking threats and alerts indicating planned campaigns.
- Geopolitical Threats: The FAD Team indicated they are targeting the USA as well as Qatar, Saudi Arabia, Bahrain, Jordan, Kuwait, and the UAE. The Russian Legion claimed to have gained access to the Iron Dome of Israel.
3. Key Threat Actor Profiles
The table below highlights the most prolific and impactful threat actors identified in the dataset.
| Threat Actor | Primary Category | Target Geographies | Key Activities / Targets |
| BABAYO EROR SYSTEM | Defacement | India, USA, Philippines, Indonesia | Highly active in defacing educational and government portals, alongside various private businesses. |
| Nicotine | Defacement | UAE | Exclusively targeted UAE-based businesses across retail, hospitality, and automotive sectors. |
| Hax.or | Defacement | UAE, Qatar | Heavily targeted real estate, engineering, and service companies in the UAE. |
| FAD Team | Data Breach, Defacement, Alert | France, India, Vietnam, USA, Middle East | Claimed data breaches of educational institutions and issued broad geopolitical threats. |
| Infrastructure Destruction Squad | Initial Access | India | Focused on gaining control over critical water treatment facilities and industrial control networks. |
| Cyber Islamic resistance | Initial Access, Alert | Israel, Jordan | Claimed access to IoT camera infrastructure and widespread industrial control systems. |
| Everestgroup | Data Breach | USA | Responsible for massive alleged data leaks in the aviation sector, targeting Atlas Air and Tsunami Tsolutions. |
4. Geographic Victimology
The dataset highlights specific regional targeting trends based on actor motivations.
- Israel: Israel is the most frequently targeted nation in this dataset, primarily facing politically motivated attacks. The Cyber Isnaad Front claimed to disrupt military and government communication infrastructure. Other actors leaked data from Israeli Facebook users , citizens’ passports , and breached corporate entities like Hermon Laboratories.
- United Arab Emirates (UAE): The UAE experienced a massive volume of website defacements. Actors like Nicotine, Hax.or, and Rayzky_ targeted dozens of private enterprises, ranging from digital media companies to local cafes.
- India: India faced a mix of nuisance defacements and severe critical infrastructure threats. While BABAYO EROR SYSTEM defaced numerous commercial websites , the Infrastructure Destruction Squad claimed access to vital water management systems in Delhi and Odisha.
- United States: U.S. organizations suffered from high-impact data breaches and the sale of initial access. Actors sold access to U.S. corporate cloud buckets , leaked large banking lead databases , and compromised massive datasets from aviation companies.
- France: France was a frequent target for data breaches. The actor “epi” leaked data from the secure messaging platform Tchap , Bioserveur , and a Paris hospital.
5. Conclusion
The threat intelligence derived from this dataset illustrates a bifurcated threat landscape. On one end, there is a high volume of low-sophistication “noise” generated by defacement groups like Nicotine and BABAYO EROR SYSTEM, who seek visibility and disruption. On the other end, there are highly critical, targeted attacks threatening operational technology (SCADA/ICS) , essential utilities (water treatment) , and resulting in the exfiltration of terabytes of sensitive corporate and consumer data. Organizations must prioritize securing Internet-facing industrial controls, locking down cloud storage buckets, and preparing for the persistent threat of hacktivism tied to geopolitical conflicts.
Detected Incidents Draft Data
- Alleged unauthorized access to Delhi Water Supply and Sewerage Board system
Category: Initial Access
Content: The group claims to have gained unauthorized access to system of the Delhi Water Supply and Sewerage Board. which is affiliated with the Indian government, and gained full control over the Coronation Water Treatment Plant
Date: 2026-03-02T23:59:55Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3857
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d2a97f2e-2b8f-4925-8c74-09ef2073aae5.png
https://d34iuop8pidsy8.cloudfront.net/8ae4b448-523c-4454-9cc2-abe5dbc4ddb5.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - alleged unauthorized access to government and military communication infrastructure of Israel
Category: Initial Access
Content: The group claims to have gained unauthorized access to government and military communication infrastructure of Israel. which contain more than 160 data centers that manage internal networks in various cities of the occupied territories. It disrupted all military, government, and private communications and destroyed all their data and documents.
Date: 2026-03-02T23:27:58Z
Network: telegram
Published URL: https://t.me/CyberIsnaadFront2/560?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d121276b-9180-4873-a990-8885560fdc78.png
https://d34iuop8pidsy8.cloudfront.net/8eb1c138-9903-46a2-bf67-32bba44c28fa.png
https://d34iuop8pidsy8.cloudfront.net/2f07e01d-7f59-460c-b2a3-efeb794f6ccb.png
Threat Actors: Cyber Isnaad Front
Victim Country: Israel
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM targets the website of Natural Hair Replacement Centre
Category: Defacement
Content: The group claims to have defaced the website of Natural Hair Replacement Centre
Date: 2026-03-02T23:26:41Z
Network: telegram
Published URL: https://t.me/c/3716986899/218
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3b322c50-9b75-4a4b-b6ad-1a64fc4ca38c.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Cosmetics
Victim Organization: natural hair replacement centre
Victim Site: naturalhrc.com - BABAYO EROR SYSTEM targets the website of Ram Publicity
Category: Defacement
Content: The group claims to have defaced the website of Ram Publicity
Date: 2026-03-02T23:23:44Z
Network: telegram
Published URL: https://t.me/c/3716986899/218
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0712624a-0fdf-4f97-bc5b-0c3ecf848e2a.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Marketing, Advertising & Sales
Victim Organization: ram publicity
Victim Site: rampublicity.com - BABAYO EROR SYSTEM targets the website of Enchanting Kashmir Tours
Category: Defacement
Content: The group claims to have defaced the website of Enchanting Kashmir Tours
Date: 2026-03-02T23:22:45Z
Network: telegram
Published URL: https://t.me/c/3716986899/218
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4a67acc9-bc19-43e7-8393-240ee9975451.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Hospitality & Tourism
Victim Organization: enchanting kashmir tours
Victim Site: enchantingkashmirtours.com - BABAYO EROR SYSTEM targets the website of Core technologies
Category: Defacement
Content: The group claims to have defaced the website of Core technologies
Date: 2026-03-02T23:17:26Z
Network: telegram
Published URL: https://t.me/c/3716986899/218
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/38c1eed7-dfcd-4b66-a358-d9fef10ecc37.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Wholesale
Victim Organization: core technologies
Victim Site: coretechnologies.in - BABAYO EROR SYSTEM targets the website of DK CHM Print Solution
Category: Defacement
Content: The group claims to have defaced the website of DK CHM Print Solution
Date: 2026-03-02T23:13:52Z
Network: telegram
Published URL: https://t.me/c/3716986899/218
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4ea271ff-e665-4cc6-bfca-3acdb0a00827.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Printing
Victim Organization: dk chm print solution
Victim Site: dkchmprintsolution.in - Alleged breach of Sharjah National Oil Corporation (SNOC)
Category: Data Breach
Content: The group claims to have breached 1.3 TB of the Sharjah National Oil Corporation (SNOC) database. The compromised data allegedly contains financial records, contracts, and internal documents, along with statements alleging disruption of critical infrastructure.
Date: 2026-03-02T23:08:56Z
Network: openweb
Published URL: https://x.com/HANDALA_RSS/status/2028571378933248241
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/94b4913a-807b-4dc5-a60f-83d4b0c65854.png
Threat Actors: Handala
Victim Country: UAE
Victim Industry: Oil & Gas
Victim Organization: sharjah national oil corporation (snoc)
Victim Site: snoc.ae - BABAYO EROR SYSTEM targets the website of Gujarat Book of Records
Category: Defacement
Content: The group claims to have defaced the website of Gujarat Book of Records
Date: 2026-03-02T23:05:59Z
Network: telegram
Published URL: https://t.me/c/3716986899/218
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/04e69859-a81e-4e4e-a7ba-7e21c68badb0.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Unknown
Victim Organization: gujarat book of records
Victim Site: gujaratbookofrecords.org - Alleged Leak of Business Accounts Data in multiple countries
Category: Data Breach
Content: Threat actor claims to be selling verified personal and business bank accounts across the UK, USA, and EU regions. The listing includes accounts from various financial institutions, payment platforms, and crypto exchanges, with claims of included email access, phone number access, ID documents, and business verification documents.
Date: 2026-03-02T22:58:40Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277408/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d79c2251-6b03-40a7-9a5d-ddd1b9f718c1.png
https://d34iuop8pidsy8.cloudfront.net/4b4badc1-1159-40d9-b2e6-e28112255191.png
https://d34iuop8pidsy8.cloudfront.net/6f5eecc2-a5a9-4d0e-920f-8401a4823593.png
Threat Actors: VIRTUALBANKSERVI
Victim Country: UK
Victim Industry: Banking & Mortgage
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Access to a WordPress Pet Supply Shop in Chile
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to a wordpress pet supply shop in Chile. The store processes payments via Mercado Pago and supports card transactions.
Date: 2026-03-02T22:10:32Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277405/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c7c003b7-f1ac-451b-b005-2e0e5ba3b84c.png
Threat Actors: Emperorcvv
Victim Country: Chile
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of 12K Italy Forex & Crypto Depositors Leads
Category: Data Breach
Content: A threat actor is advertising the alleged sale of a database containing approximately 12,000 Italy-based forex and cryptocurrency depositor leads. The dataset is claimed to include personal and financial-related lead information such as names, email addresses, phone numbers, broker details, deposit status, and other marketing-related fields.
Date: 2026-03-02T21:44:37Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-12K-Italy-Country-Forex-Crypto-Depositors-Leads
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/20a5c119-2f97-4863-ba85-c6aab9b9ab4f.png
Threat Actors: kaareds
Victim Country: Italy
Victim Industry: Financial Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized FTP access to Kan
Category: Initial Access
Content: Group claims to be leaked unauthorized FTP access to Kan
Date: 2026-03-02T21:42:22Z
Network: telegram
Published URL: https://t.me/crewcyber/864
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/20bafa33-cba9-477d-976e-aa39e4e62b21.jpg
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Broadcast Media
Victim Organization: kan
Victim Site: kan.org.il - BABAYO EROR SYSTEM targets the website of Atma Jaya Catholic University of Indonesia
Category: Defacement
Content: The group claims to have defaced the website of Atma Jaya Catholic University of Indonesia.
Date: 2026-03-02T21:37:54Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e962e793-9779-46ca-a129-4fca95b6a349.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Higher Education/Acadamia
Victim Organization: atma jaya catholic university of indonesia
Victim Site: atmajaya.ac.id - BABAYO EROR SYSTEM targets the website of City Government of Tagaytay
Category: Defacement
Content: The group claims to have defaced the website of City Government of Tagaytay
Date: 2026-03-02T21:27:36Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1795c21b-d803-47a0-ba32-75d9fd8de1e1.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Philippines
Victim Industry: Government & Public Sector
Victim Organization: city government of tagaytay
Victim Site: tagaytay.gov.ph - Alleged data breach of Sadenet
Category: Data Breach
Content: A threat actor claims to have leaked data belonging to Sadenet, a Turkish internet service provider. the database allegedly contains 169,213 records.The leaked dataset is said to contain sensitive personal information, including Turkish TC ID numbers, TC serial numbers, full names, residential addresses, phone numbers, email addresses, gender details, birthplace information, and various internal system-related fields.
Date: 2026-03-02T21:15:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-TR-Sadenet-ISP-160K-Records-TC-Serials
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/99ffcdcf-abbf-4589-9a11-9fe264ec7e49.png
Threat Actors: Raperdogan
Victim Country: Turkey
Victim Industry: Network & Telecommunications
Victim Organization: sadenet
Victim Site: sadenet.com.tr - Alleged Data leak of Amos Spacecom
Category: Data Breach
Content: The group claims to have leaked the employee data from Israelis satellite operator Spacecom, which includes employee records, non-disclosure agreements.
Date: 2026-03-02T21:01:29Z
Network: telegram
Published URL: https://t.me/anonymous_algeria_Original/3289
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bf6117e9-ada9-47ce-bf42-784e42d103f0.png
Threat Actors: Anonymous Algeria
Victim Country: Israel
Victim Industry: Network & Telecommunications
Victim Organization: amos spacecom
Victim Site: amos-spacecom.com - Alleged unauthorized access to multiple unidentified cctv systems in Israel
Category: Initial Access
Content: The group claims to have gained unauthorized access to multiple unidentified cctv systems in Israel
Date: 2026-03-02T20:53:49Z
Network: telegram
Published URL: https://t.me/LulzSecBlack/4701
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6121a9ea-3d12-4c62-b6eb-069295c62893.jpg
Threat Actors: LulzSec Black
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to municipal systems in Saudi Arabia
Category: Initial Access
Content: The group claims to have gained unauthorized access to municipal systems in Saudi Arabia, specifically referencing prominent cities including Mecca and Medina. According to the statement, the activity is framed as politically and ideologically motivated. The actor alleges unauthorized access to multiple city control interfaces
Date: 2026-03-02T20:44:02Z
Network: telegram
Published URL: https://t.me/r3_6j/1851?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7bbde99b-7783-4ed8-92fb-c97cd50650e6.jpg
Threat Actors: FAD Team
Victim Country: Saudi Arabia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - ANONYMOUS SYRIA HACKERS claims to target Iran
Category: Cyber Attack
Content: A recent post by the group indicates that they are targetting Iran
Date: 2026-03-02T20:39:51Z
Network: telegram
Published URL: https://t.me/anonymous_syriaa/4
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b6a7dc05-c523-4c67-9203-8977d3384184.jpg
Threat Actors: ANONYMOUS SYRIA HACKERS
Victim Country: Iran
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of EU Police Email Accounts
Category: Data Breach
Content: A threat actor claims to have leaked European Union law enforcement email accounts.
Date: 2026-03-02T20:37:12Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-First-World-EU-High-Quality-Police-Emails
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b130ac0b-a196-4a85-8f98-393752abc748.png
Threat Actors: lucy
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM targets the websites of iGreentec Engineering
Category: Defacement
Content: The group claims to have defaced the website of iGreentec Engineering
Date: 2026-03-02T20:31:40Z
Network: telegram
Published URL: https://t.me/c/3716986899/185
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c9f743c7-6fee-4f35-afd3-62014ad007fe.jpg
Threat Actors: BABAYO EROR SYSTEM
Victim Country: UAE
Victim Industry: Information Technology (IT) Services
Victim Organization: igreentec engineering
Victim Site: igreentec.ae - Alleged data breach Ahmedabad Institute of Technology
Category: Data Breach
Content: The threat actor claims to have leaked data allegedly belonging to Ahmedabad Institute of Technology.
Date: 2026-03-02T20:25:54Z
Network: telegram
Published URL: https://t.me/r3_6j/1841
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0134da0d-cf1e-4619-8873-63cfd6a767b7.png
https://d34iuop8pidsy8.cloudfront.net/8a45593f-e9a0-4160-b6ea-97d4e0e8595e.png
Threat Actors: FAD Team
Victim Country: India
Victim Industry: Education
Victim Organization: ahmedabad institute of technology
Victim Site: aitindia.in - Alleged Data Breach of Fondation CGénial
Category: Data Breach
Content: The group claims to have compromised the database of La Fondation C Génial, a French non-profit promoting STEM education, to steal internal rules and official emails.
Date: 2026-03-02T20:25:07Z
Network: telegram
Published URL: https://t.me/r3_6j/1849
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9ec3dc54-affc-44d8-a9d8-22607a9cdf30.png
Threat Actors: FAD Team
Victim Country: France
Victim Industry: Civic & Social Organization
Victim Organization: fondation cgénial
Victim Site: cgenial.org - BABAYO EROR SYSTEM targets the website of Department of Social Welfare and Development – Field Office 1 (DSWD FO1)
Category: Defacement
Content: The group claims to have defaced the website of Department of Social Welfare and Development – Field Office 1 (DSWD FO1).
Date: 2026-03-02T20:12:20Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c215da60-b735-40ab-854a-ca113f65b73b.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Philippines
Victim Industry: Government Administration
Victim Organization: department of social welfare and development – field office 1 (dswd fo1)
Victim Site: fo1.dswd.gov.ph - BABAYO EROR SYSTEM targets the website of William & Mary
Category: Defacement
Content: The group claims to have defaced the website of William & Mary
Date: 2026-03-02T20:08:34Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4f481d53-09d8-42fb-87fb-3850292a6d66.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: USA
Victim Industry: Higher Education/Acadamia
Victim Organization: william & mary
Victim Site: wm.edu - BABAYO EROR SYSTEM targets the website of Auburn University
Category: Defacement
Content: The group claims to have defaced the website of Auburn University.
Date: 2026-03-02T20:06:13Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/90ebc126-c06d-41d5-9021-dca148a524c7.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: USA
Victim Industry: Higher Education/Acadamia
Victim Organization: auburn university
Victim Site: cadc.auburn.edu - BABAYO EROR SYSTEM targets the website of Center for Advanced Defense Community (CADC), Auburn University
Category: Defacement
Content: The group claims to have defaced the website of Center for Advanced Defense Community (CADC), Auburn University.
Date: 2026-03-02T20:04:39Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8212c643-d58f-44ab-9c07-68e078953853.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: USA
Victim Industry: Education
Victim Organization: center for advanced defense community (cadc), auburn university
Victim Site: cadc.auurn.edu - Alleged data breach of unidentifed Law Firm company in israel.
Category: Data Breach
Content: The group claims to have leaked data of Unidentified Law Firm company in Israel.
Date: 2026-03-02T20:02:24Z
Network: telegram
Published URL: https://t.me/c/2767021745/40
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/698978c1-cd06-4aef-955e-de63c10bad15.png
Threat Actors: Team insane Pakistan
Victim Country: Israel
Victim Industry: Law Practice & Law Firms
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM targets the websites of Sekolah Pascasarjana UNIVERSITAS GADJAH MADA
Category: Defacement
Content: The group claims to have defaced the website of Sekolah Pascasarjana UNIVERSITAS GADJAH MADA.
Date: 2026-03-02T20:01:18Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a218420b-82c2-4179-a60c-0d848a00e746.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Higher Education/Acadamia
Victim Organization: sekolah pascasarjana universitas gadjah mada
Victim Site: pasca.ugm.ac.id - BABAYO EROR SYSTEM targets the websites of Universitas Budi Luhur
Category: Defacement
Content: The group claims to have defaced the website of Universitas Budi Luhur.
Date: 2026-03-02T19:51:34Z
Network: telegram
Published URL: https://t.me/c/3716986899/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8d919afe-34db-4aca-a183-6bb4d15b11cb.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Higher Education/Acadamia
Victim Organization: universitas budi luhur
Victim Site: journal.budiluhur.ac.id - Alleged data breach of Hermon Laboratories
Category: Data Breach
Content: The group claims to have leaked data allegedly belonging to Hermon Laboratories.
Date: 2026-03-02T19:48:10Z
Network: telegram
Published URL: https://t.me/c/2767021745/40
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/22a462bc-b83f-4842-91ff-53a43544441a.jpg
Threat Actors: Team insane Pakistan
Victim Country: Israel
Victim Industry: Research Industry
Victim Organization: hermon laboratories
Victim Site: hermonlabs.com - Alleged Data Breach of Dr. Oshrat Kastel
Category: Data Breach
Content: Threat Actor claims to have breached the database of Dr. Oshrat Kastel in Israel.
Date: 2026-03-02T19:44:10Z
Network: telegram
Published URL: https://t.me/c/2259100562/929
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3b31c216-3546-43ae-9b47-bbc992397744.png
https://d34iuop8pidsy8.cloudfront.net/f56c88ff-8601-4647-a396-f0df9f4877f6.png
Threat Actors: NATION OF SAVIORS
Victim Country: Israel
Victim Industry: Hospital & Health Care
Victim Organization: dr. oshrat kastel
Victim Site: dr-kastel.co.il - Alleged data breach of Income and Sales Tax Department (ISTD)
Category: Data Breach
Content: A threat actor claims to have leaked a data from the Income and Sales Tax Department (ISTD)
Date: 2026-03-02T19:32:21Z
Network: telegram
Published URL: https://t.me/r3_6j/1833
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1ea5b5fe-a8e9-416c-9632-bd5cdc33f644.png
Threat Actors: FAD Team
Victim Country: Jordan
Victim Industry: Government Administration
Victim Organization: income and sales tax department (istd)
Victim Site: istd.gov.jo - Alleged data breach of Alumgate
Category: Data Breach
Content: The threat actor claims to have leaked data allegedly belonging to Alumgate.
Date: 2026-03-02T19:27:15Z
Network: telegram
Published URL: https://t.me/c/2767021745/40
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8423af4c-72b6-4a09-b6bf-b6f925fc3fc1.png
Threat Actors: Team insane Pakistan
Victim Country: Israel
Victim Industry: Building and construction
Victim Organization: alumgate
Victim Site: alumgate.co.il - Alleged data breach of C Génial
Category: Data Breach
Content: A threat actor claims to have leaked a data from the French STEM education initiative C Génial.
Date: 2026-03-02T19:16:15Z
Network: telegram
Published URL: https://t.me/r3_6j/1829
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/70ddd915-8865-44c3-807a-1f5224022e23.png
Threat Actors: FAD Team
Victim Country: France
Victim Industry: Education
Victim Organization: c génial
Victim Site: cgenial.org - Alleged data breach of NauticGear.nl
Category: Data Breach
Content: A threat actor claims to sell a database allegedly belonging to NauticGear.nl. the dataset reportedly contains 95,138 total records, including 94,633 unique email addresses and 90,514 unique phone numbers. the exposed data includes customer details such as full names, email addresses, phone numbers, dates of birth, tax or VAT numbers, and detailed billing information including street addresses, postal codes, cities, and company names.
Date: 2026-03-02T19:10:38Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-nauticgear-nl
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/108cb9b4-cce4-4e2c-994c-980b2e023664.png
Threat Actors: Wadjet
Victim Country: Netherlands
Victim Industry: E-commerce & Online Stores
Victim Organization: nauticgear.nl
Victim Site: nauticgear.nl - BABAYO EROR SYSTEM targets the websites of Igreentec Engineering India Pvt Ltd
Category: Defacement
Content: The group claims to have defaced the website of Igreentec Engineering India Pvt Ltd
Date: 2026-03-02T19:09:38Z
Network: telegram
Published URL: https://t.me/c/3716986899/185
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/aa32ddc7-544f-4c2e-90ba-281ab48ddf1e.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Manufacturing & Industrial Products
Victim Organization: igreentec engineering india pvt ltd
Victim Site: igreentec.in - BABAYO EROR SYSTEM targets the website of IGREEN TECHNOLOGIES
Category: Defacement
Content: The group claims to have defaced the website of IGREEN TECHNOLOGIES.
Date: 2026-03-02T19:05:26Z
Network: telegram
Published URL: https://t.me/c/3716986899/185
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/de0d45de-1feb-4de9-950b-8d6284b9abc8.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: India
Victim Industry: Machinery Manufacturing
Victim Organization: igreen technologies
Victim Site: igreentechnologies.in - Alleged data breach of SkiWebShop
Category: Data Breach
Content: A threat actor claims to sell a database allegedly associated with SkiWebShop.nl. the exposed database allegedly contains structured customer records with fields such as entity ID, full name, email address, group ID, website ID, confirmation status, account creation date, date of birth, gender, tax/VAT information, account lock expiration, and detailed billing and shipping informations.
Date: 2026-03-02T19:05:23Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-skiwebshop-nl
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a3039189-17ba-42d1-8e54-6c041f06252d.png
Threat Actors: Wadjet
Victim Country: Netherlands
Victim Industry: E-commerce & Online Stores
Victim Organization: skiwebshop
Victim Site: skiwebshop.nl - Alleged data breach of Fenerbahçe SK
Category: Data Breach
Content: A threat actor claims to sell data allegedly from Fenerbahçe SK. the dataset reportedly includes 52,953 consumer records and 174,479 virtual credit card entries. The data allegedly contains personal information such as full names, email addresses, phone numbers, dates of birth, and identification numbers.
Date: 2026-03-02T18:57:19Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-fenerbahce-org
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f3ef2612-6d50-49d0-9319-7aca370b9604.png
https://d34iuop8pidsy8.cloudfront.net/2032bfb1-7da2-4b28-894f-5f21623e2fff.png
Threat Actors: Wadjet
Victim Country: Turkey
Victim Industry: Education
Victim Organization: fenerbahçe sk
Victim Site: fenerbahce.org - Alleged unauthorized access to industrial greenhouse climate control (SCADA/ICS) systems
Category: Initial Access
Content: Threat actor claims to have gained unauthorized access to industrial greenhouse climate control (SCADA/ICS) systems in Kyiv, Ukraine, allegedly manipulating automated temperature controls and disrupting operations.
Date: 2026-03-02T18:56:45Z
Network: telegram
Published URL: https://t.me/itarmyofrussianews/340
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1db255ec-3388-4c76-bcd6-25418fef237e.png
Threat Actors: IT ARMY OF RUSSIA
Victim Country: Ukraine
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Blackstore
Category: Data Breach
Content: A threat actor claims to have a French database allegedly related to Blackstore.fr, stating that the dataset contains more than 124,000 entries. the exposed data allegedly includes last name, first name, email address, phone number, internal ID numbers, and additional numeric identifiers.
Date: 2026-03-02T18:52:13Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-blackstore-fr
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/01b04af5-428e-4489-9fbd-e99c02d93f58.png
Threat Actors: TimeoRakin
Victim Country: France
Victim Industry: Retail Industry
Victim Organization: blackstore
Victim Site: blackstore.fr - Alleged data breach of Trường THPT Lý Phú Dôn
Category: Data Breach
Content: The threat actor claims to have leaked the data from Trường THPT Lý Phú Dôn, a high school located in Ho Chi Minh City, Vietnam.
Date: 2026-03-02T18:44:11Z
Network: telegram
Published URL: https://t.me/r3_6j/1816
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/601cb021-612b-4a12-8a0c-1b930106a032.png
https://d34iuop8pidsy8.cloudfront.net/1eed70e7-5932-4984-88c9-d592c24136df.png
https://d34iuop8pidsy8.cloudfront.net/33db1ecf-13fa-40a2-bb74-bc79da86799d.png
Threat Actors: FAD Team
Victim Country: Vietnam
Victim Industry: Education
Victim Organization: trường thpt lý phú dôn
Victim Site: thptlyphudon.hcm.edu.vn - Russian Legion claims to target Iron Dome of Israel
Category: Alert
Content: A recent post by the group indicates that they have gained access to the Iron Dome of Israel
Date: 2026-03-02T18:35:30Z
Network: telegram
Published URL: https://t.me/ruLegionn/176?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ae34c63d-ea83-4eab-959a-4c25559f76fe.jpg
Threat Actors: Russian Legion
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Fatimion cyber team claims to target Kuwait
Category: Alert
Content: A recent post by the group indicates that they have leaked the database of the state of Kuwait
Date: 2026-03-02T18:33:13Z
Network: telegram
Published URL: https://t.me/hak994/4885
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2a4571a6-128b-4c68-b491-e10fc71df8d5.jpg
Threat Actors: Fatimion cyber team
Victim Country: Kuwait
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Dr. Panjabrao Deshmukh Krishi Vidyapeeth
Category: Data Breach
Content: A threat actor claims to have breached the official website of Dr. Panjabrao Deshmukh Krishi Vidyapeeth (pdkv.ac.in). The leaked data reportedly includes administrative access details, internal portal information, database credentials, and other sensitive university system data.
Date: 2026-03-02T18:31:35Z
Network: telegram
Published URL: https://t.me/r3_6j/1807
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cbfbee8e-d862-47fd-9a96-0ea630e3999c.png
https://d34iuop8pidsy8.cloudfront.net/30546c9b-40e2-4d51-be1b-4e28c9052994.png
Threat Actors: FAD Team
Victim Country: India
Victim Industry: Higher Education/Acadamia
Victim Organization: dr. panjabrao deshmukh krishi vidyapeeth
Victim Site: pdkv.ac.in - Alleged data leak of French Passport PSD
Category: Data Breach
Content: The threat actor claims to have leaked data from French Passport
Date: 2026-03-02T18:31:09Z
Network: openweb
Published URL: https://breachforums.as/Thread-French-Passport-PSD
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d9317f3f-145c-437e-a53b-48a4ec4b116d.png
Threat Actors: Vassilx
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Unauthorized Access to Unidentified Camera System of Maccabi Health Services in Israel
Category: Initial Access
Content: The group claims to have gained unauthorized access to unidentified internal camera systems of Maccabi Health Services, a major Israeli healthcare provider, by targeting its Internet of Things (IoT) infrastructure.
Date: 2026-03-02T18:30:29Z
Network: telegram
Published URL: https://t.me/c/1651470668/1584
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d10daadb-eaa9-4cbd-9484-d782c644995a.png
Threat Actors: Cyber Islamic resistance
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Aura.Build
Category: Data Breach
Content: The threat actor claims to have leaked a data from Aura.Build .the database reportedly contains information on more than 132,000 unique users.the exposed data includes user profile details and subscription-related information. which includes user ID, full name, biography, account creation and update timestamps, avatar URL, subscription status, subscription tier, Stripe customer and subscription IDs, subscription billing periods, cancellation details, administrative flags, usage metrics, available credits, project counts, feature flags, account status, email address, website, and location data.
Date: 2026-03-02T18:20:03Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Aura-Build-Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/657ff0b5-a67a-4fd8-a1e1-f3dffa702f28.png
https://d34iuop8pidsy8.cloudfront.net/a3fb29bd-b26a-4e29-95d3-ad8ea05d23a3.png
Threat Actors: ImVec4
Victim Country: Unknown
Victim Industry: Information Technology (IT) Services
Victim Organization: aura.build
Victim Site: aura.build - FAD Team targets the website of Syrian Astronomical Association
Category: Defacement
Content: The group claims to have defaced the website of Syrian Astronomical Association
Date: 2026-03-02T18:11:41Z
Network: telegram
Published URL: https://t.me/r3_6j/1799
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c80b77d1-6f56-4ec3-9145-b04f755a9cf7.png
Threat Actors: FAD Team
Victim Country: Syria
Victim Industry: Non-profit & Social Organizations
Victim Organization: syrian astronomical association
Victim Site: saa.sy - Alleged data leak of Israeli Population Database
Category: Data Breach
Content: The threat actor claims to have be leaked a database allegedly containing more than 3,000 records of Israeli citizens.
Date: 2026-03-02T18:08:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-3000-ISRAELI-POPULATION-DATA
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d3f188e5-5fde-48e8-9386-06fe84a535a1.png
Threat Actors: ShadowNex
Victim Country: Israel
Victim Industry: Government & Public Sector
Victim Organization: Unknown
Victim Site: Unknown - FAD Team claims to target USA
Category: Alert
Content: A recent post by the group indicated that they are targeting USA.
Date: 2026-03-02T18:07:58Z
Network: telegram
Published URL: https://t.me/r3_6j/1797
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/762fb34a-d442-49d1-ada8-1946d7554cba.png
Threat Actors: FAD Team
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Pakistani Government Procurement Tenders
Category: Data Breach
Content: The group caims to have compromised procurement tender databases associated with government entities in Pakistan, alleging full access to records spanning approximately 23 years. The purportedly affected entities include the Military Engineering Services (Air Force), the State Bank of Pakistan, Combined Military Hospital, Pakistan Navy, and Sui Northern Gas Limited, among others.
Date: 2026-03-02T18:05:52Z
Network: telegram
Published URL: https://t.me/c/2156569801/2969
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8dd15648-787c-4354-878b-72e5036a637f.jpg
Threat Actors: The Red Eagle
Victim Country: Pakistan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Habib Bank Limited
Category: Data Breach
Content: The group claims to have breached Habib Bank Limited (HBL), Pakistan, and gained access to sensitive database information. According to the post, the alleged data includes names, positions, contact numbers, Gmail addresses, account information, and payment transaction details.NB: They also warned that they will leak the database soon.
Date: 2026-03-02T17:57:11Z
Network: telegram
Published URL: https://t.me/c/2156569801/2963
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fd9b33b6-c463-4cc1-8478-6df233894c3c.png
Threat Actors: The Red Eagle
Victim Country: Pakistan
Victim Industry: Banking & Mortgage
Victim Organization: habib bank limited
Victim Site: hbl.com - Fatimion cyber team claims to target Qatar
Category: Alert
Content: A recent post by the group indicates that they are targeting Qatar.
Date: 2026-03-02T17:48:42Z
Network: telegram
Published URL: https://t.me/hak994/4866
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/31da7642-e264-451a-b857-6f712c12943e.png
Threat Actors: Fatimion cyber team
Victim Country: Qatar
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin Access to an Unidentified Presta Shop in USA
Category: Initial Access
Content: The threat actor claims to be selling unauthorized PrestaShop admin panel access to a U.S.-based, allegedly enabling payment redirection via Stripe without login and indicating full administrative control over the website’s operations and transactions.
Date: 2026-03-02T17:08:20Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277377/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9e2d0a6d-fba6-4420-9007-6dc325745768.png
Threat Actors: YourDevExpert
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of ABAN Logistics
Category: Data Breach
Content: The group claims to have hacked into the systems of Aban Logistics and have leaked professional association membership cards, certificates of incorporation, and official operating permits linked to the company
Date: 2026-03-02T16:29:33Z
Network: openweb
Published URL: https://x.com/AnonymousBsns/status/2028495132375347558?s=20
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d4eb6374-e41e-4df5-9777-7f340ea73baf.jpg
Threat Actors: Anonymous
Victim Country: Iran
Victim Industry: Transportation & Logistics
Victim Organization: aban logistics
Victim Site: abanlog.com - HackHax claims to target Israel
Category: Alert
Content: A recent post by the group indicates that theyre targeting Israel
Date: 2026-03-02T16:20:20Z
Network: telegram
Published URL: https://t.me/c/2532678208/480
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/38d986e4-6c54-4614-bb4d-4e09ee828cba.jpg
Threat Actors: HackHax
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Keymous Plus claims to target Kuwait
Category: Alert
Content: A recent post by the group indicates that theyre targeting Kuwait
Date: 2026-03-02T16:15:48Z
Network: telegram
Published URL: https://t.me/c/2588114907/823
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/594e1e52-d440-4c57-981c-4c5f9ab9606a.jpg
Threat Actors: Keymous Plus
Victim Country: Kuwait
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to the systems of Delhi Jal Board (DJB)
Category: Initial Access
Content: The group claims to have compromised systems associated with the Delhi Jal Board in India, alleging control over the Coronation Water Treatment Plant, reportedly producing approximately 20 million gallons per day. According to the statement, the actor asserts takeover of the main control system, historical databases, equipment networks, tunnel systems, HVAC components, and server infrastructure.
Date: 2026-03-02T16:02:37Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3853
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d10440a3-d872-4a0e-936e-f74e1d25b06d.jpg
Threat Actors: Infrastructure Destruction Squad
Victim Country: India
Victim Industry: Government Administration
Victim Organization: delhi jal board (djb)
Victim Site: djb.gov.in - Alleged Unauthorized Access to Industrial Energy Management Terminal
Category: Initial Access
Content: Threat actor claims to have gained unauthorized access to an industrial energy management and smart building control terminal, allegedly providing centralized control over energy consumption monitoring, heating systems, security controls, alarm systems, and solar panel infrastructure.
Date: 2026-03-02T15:59:40Z
Network: telegram
Published URL: https://t.me/op_morningstar/499
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/80caaa8b-2524-4d65-a459-dfab1f8ec4f9.png
Threat Actors: MORNING STAR
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Al-Istiqlal University
Category: Data Breach
Content: The threat actor claims to be sharing a database allegedly containing approximately 4,200 records from Al-Istiqlal University. The threat actor states that the university specializes in security, military, and police sciences. The data which includes student number, email, birthdate details (year, month, day), and personal name fields (first name, father name, grandfather, family name).
Date: 2026-03-02T15:59:03Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Al-Istiqlal-University-4-2K-alistiqlal-edu-ps
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bdb779a9-8428-4e8d-ab0f-6a2b673a9545.png
Threat Actors: CVDEAD
Victim Country: Palestine
Victim Industry: Education
Victim Organization: al-istiqlal university
Victim Site: alistiqlal.edu.ps - Alleged data leak of 450K USA Banking Leads Database
Category: Data Breach
Content: Threat Actor Claims to Be Selling 450K USA Banking Leads Database.
Date: 2026-03-02T15:34:56Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277372/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a1e8aa3d-0623-49ed-852e-7b18b2333d82.png
Threat Actors: HighRisk
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Tchap
Category: Data Breach
Content: The threat actor claims to have scraped approximately 10,000+ member records and 7 conversations from Tchap, a secure messaging platform developed by the French government for public officials and civil servants. The data allegedly includes user email addresses associated with French government domains, sample images, and references to several scraped groups such as Police Nationale and other administrative groups.
Date: 2026-03-02T15:27:20Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-FR-TCHAP-GOUV
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a023a470-2ed7-4519-b6a2-8ddac71368ce.png
Threat Actors: epi
Victim Country: France
Victim Industry: Government & Public Sector
Victim Organization: tchap
Victim Site: tchap.gouv.fr - Alleged Unauthorized Access to Joda ULB Water Treatment Plant Control System, India
Category: Initial Access
Content: The group claims to have gained access to the control and treatment system of the Joda ULB water treatment plant in Joda, operated by Water Corporation of Odisha (WATCO), and used the VoltRuptor tool to scan the network, identifying other connected systems within the same infrastructure and the spread of malware across the plant’s industrial control system network.
Date: 2026-03-02T15:20:38Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3852
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9b5bddd4-d480-40c5-8b30-875164f719a5.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Bioserveur
Category: Data Breach
Content: The threat actor claims to have exported approximately 2KB of data from Bioserveur, a secure online platform primarily used by healthcare professionals in France .
Date: 2026-03-02T15:20:10Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-BIOSERVEUR
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ddc31392-195d-416c-8e99-45507923edaa.png
Threat Actors: epi
Victim Country: France
Victim Industry: Hospital & Health Care
Victim Organization: bioserveur
Victim Site: bioserveur.com - Alleged leak of Israel data
Category: Data Breach
Content: The group claims to have leaked a dataset containing Facebook user information and personal details.
Date: 2026-03-02T14:59:05Z
Network: telegram
Published URL: https://t.me/llllllllllllllllllllal/185
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1f424557-bde0-4697-ba8b-7404ee16b250.jpg
Threat Actors: TikusXploit
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - FAD Team claims to target Qatar, Saudi Arabia, Bahrain, Jordan, Kuwait and UAE
Category: Alert
Content: A recent post by the group indicated that they are targeting Qatar, Saudi Arabia, Bahrain, Jordan, Kuwait and UAE.
Date: 2026-03-02T14:52:31Z
Network: telegram
Published URL: https://t.me/r3_6j/1789
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/14f6c9a8-0232-4d53-8fe1-2932beb6a2cc.png
Threat Actors: FAD Team
Victim Country: Qatar
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyber Islamic resistance claims to target Israel
Category: Alert
Content: A recent post by the group indicated that they intends to target Israel
Date: 2026-03-02T14:50:28Z
Network: telegram
Published URL: https://t.me/c/1651470668/1583
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8f34f1e8-a637-41f9-bf62-1319c6253213.jpg
Threat Actors: Cyber Islamic resistance
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Evil Markhors -Dark Side of Pakistan Alliance targets the website of Deck & Engine Personnel Training Centre (DEPTC)
Category: Defacement
Content: The group claims to have defaced the website of Deck & Engine Personnel Training Centre (DEPTC)
Date: 2026-03-02T14:49:27Z
Network: telegram
Published URL: https://t.me/c/2337310341/363
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/78bbd3b2-fe5d-4567-b7e0-1e9f9b4adced.png
Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
Victim Country: Bangladesh
Victim Industry: Professional Training
Victim Organization: deck & engine personnel training centre (deptc)
Victim Site: deptcbarishal.com - Alleged database leak of Attorney (CPA) Aaron Chismedia
Category: Data Breach
Content: The group claims to have breached the database of attorney (CPA) Aaron Chismedia.
Date: 2026-03-02T13:15:46Z
Network: telegram
Published URL: https://t.me/c/2337310341/360
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/78829aaa-8f93-4bd3-8bc7-c7a4ba2af6bf.png
Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
Victim Country: Israel
Victim Industry: Law Practice & Law Firms
Victim Organization: attorney (cpa) aaron chismedia\
Victim Site: atz-law.co.il - Alleged data breach of Sumo Creative
Category: Data Breach
Content: The group claims to have breached data from Sumo Creative.
Date: 2026-03-02T13:07:42Z
Network: telegram
Published URL: https://t.me/c/2337310341/360
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/59fa69e9-37b4-4926-a483-6a56f17d609a.png
Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
Victim Country: Israel
Victim Industry: Graphic & Web Design
Victim Organization: sumo creative
Victim Site: sumocreative.co.il - Alleged data breach of WOOD STORY
Category: Data Breach
Content: The group claims to have breached data from WOOD STORY.
Date: 2026-03-02T13:01:27Z
Network: telegram
Published URL: https://t.me/c/2337310341/360
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/38502635-1a1c-47b0-8152-692c7e952579.png
Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
Victim Country: Israel
Victim Industry: Architecture & Planning
Victim Organization: wood story
Victim Site: laser-cnc.co.il - Alleged leak of Garment Exporter Database
Category: Data Breach
Content: The threat actor claims to have leaked the Garment Exporter Database. The compromised data reportedly contain exporter names, factory addresses, office addresses, etc.
Date: 2026-03-02T12:56:58Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Database-Eksportir-Garmen-India-Bangladesh
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5c3c65b2-1dfa-44a3-96ad-b9af02940b85.png
Threat Actors: XZeeoneOfc
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged database leak of Through the hands
Category: Data Breach
Content: The group claims to have breached database of Through the hands.
Date: 2026-03-02T12:55:11Z
Network: telegram
Published URL: https://t.me/c/2337310341/360
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/83ea2128-05a3-48d7-b1c5-a2abbedc604e.png
Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
Victim Country: Israel
Victim Industry: Education
Victim Organization: through the hands
Victim Site: derech-hayadaim.co.il - Alleged data breach of Dr. Castel
Category: Data Breach
Content: The group claims to have breached data from Dr. Castel.
Date: 2026-03-02T12:52:02Z
Network: telegram
Published URL: https://t.me/c/2337310341/360
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7758eb11-e787-4347-a9b2-3bf1917dc92c.png
Threat Actors: Evil Markhors -Dark Side of Pakistan Alliance
Victim Country: Israel
Victim Industry: Hospital & Health Care
Victim Organization: dr. castel
Victim Site: dr-kastel.co.il - HellR00ters Team claims to target USA
Category: Alert
Content: A recent post by the group indicated that they intends to target USA.
Date: 2026-03-02T12:49:54Z
Network: telegram
Published URL: https://t.me/c/2758066065/1081
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/395ea544-1c6c-4475-aff5-64884c00eaec.png
Threat Actors: HellR00ters Team
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of Human Rights Monitoring Database
Category: Data Breach
Content: The threat actor claims to have leaked the Human Rights Monitoring Database. The compromised data reportedly contain general information, region details, report publication dates, etc.
Date: 2026-03-02T12:46:05Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-Leaked-by-Zeeone-Grayhat-Human-Rights-Monitoring-Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cafc8eaa-75fe-4bf4-8733-6a3a2dc269a9.png
Threat Actors: XZeeoneOfc
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Nicotine targets the website of Gabisha Air Couture UAE
Category: Defacement
Content: The threat actor claims to have defaced the website of Gabisha Air Couture UAE
Date: 2026-03-02T12:43:19Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796571
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/17e6dc3c-b7be-49ad-b343-b3a5c54d9321.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Other Industry
Victim Organization: gabisha air couture uae
Victim Site: gabishaircoutureuae.com - Nicotine targets the website of Super Car Auto Accessories Fitting LLC
Category: Defacement
Content: Group claims to have take down the website of Super Car Auto Accessories Fitting LLC.
Date: 2026-03-02T12:40:11Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796589
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3cd7bf8c-55f3-46f6-8986-5932c3579ad5.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Automotive
Victim Organization: super car auto accessories fitting llc
Victim Site: supercargarageuae.com - Nicotine targets the website of Rubix
Category: Defacement
Content: The threat actor claims to have defaced the website of Rubix.
Date: 2026-03-02T12:37:36Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796414
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f0d477d2-4fd8-4978-af64-0743e8d6576a.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Building and construction
Victim Organization: rubix
Victim Site: rubix-uae.com - Nicotine targets the website of HD Digital Media
Category: Defacement
Content: Group claims to have defaced the website of HD Digital Media.
Date: 2026-03-02T12:37:12Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796576
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ff5b5a56-a9b1-4ea9-b9ff-54583187af57.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Marketing, Advertising & Sales
Victim Organization: hd digital media
Victim Site: hdmediauae.com - Nicotine targets the website of kaffeology cafe
Category: Defacement
Content: Group claims to have deface the website of kaffeology cafe.
Date: 2026-03-02T12:33:58Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796579
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c361edf6-6764-416b-9413-b3a02838bc67.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Restaurants
Victim Organization: kaffeology cafe
Victim Site: kaffeologydubai.com - Nicotine targets the website of Sweet Home Spa
Category: Defacement
Content: The threat actor claims to have defaced the website of Sweet Home Spa.
Date: 2026-03-02T12:33:05Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796590
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/67f0ba23-90c3-4615-851f-bc68224d8086.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Recreational Facilities & Services
Victim Organization: sweet home spa
Victim Site: sweethomespadubai.com - Nicotine targets the website of Coco N Curry
Category: Defacement
Content: The Group claims to have defaced the website of Coco N Curry.
Date: 2026-03-02T12:32:06Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796568
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8f2dcddb-1f3d-4423-9be3-9e1792f4775b.jpg
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Food & Beverages
Victim Organization: coco n curry
Victim Site: coconcurrydubai.com - Nicotine targets the website of Al Falak Cafe
Category: Defacement
Content: Group claims to have defaced the website of Al Falak Cafe.
Date: 2026-03-02T12:30:18Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796556
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7bb08a2c-dbbf-449b-9561-2394d74e311d.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Hospital & Health Care
Victim Organization: al falak cafe
Victim Site: alfalakcafedubai.com - Nicotine targets the website of MerryGlam Beauty Salon
Category: Defacement
Content: The threat actor claims to have defaced the website of MerryGlam Beauty Salon.
Date: 2026-03-02T12:27:41Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796584
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a8f564e6-f890-4cc6-a900-9e75116b9c7d.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Other Industry
Victim Organization: merryglam beauty salon
Victim Site: merryglamdubai.com - Nicotine targets the website of Luna Land Dubai
Category: Defacement
Content: The threat actor claims to have defaced the website of Luna Land Dubai.
Date: 2026-03-02T12:25:38Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796582
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/600abc95-70f2-4816-bc59-78fcf4de95c5.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Retail Industry
Victim Organization: luna land
Victim Site: lunalanddubai.com - EXADOS targets the website of Klong Suan Organization
Category: Defacement
Content: Group claims to have defaced the website of Klong Suan Organization.
Date: 2026-03-02T12:11:30Z
Network: telegram
Published URL: https://t.me/EXA_DOS_KH/179
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/31d1982d-4757-4128-8e8e-155254eddf10.png
Threat Actors: EXADOS
Victim Country: Thailand
Victim Industry: Education
Victim Organization: klong suan organization
Victim Site: ph-klongsuan.org - Alleged leak of admin access to SB Express Courier
Category: Initial Access
Content: The group claims to have leaked admin login credentials to SB Express Courier.
Date: 2026-03-02T12:10:08Z
Network: telegram
Published URL: https://t.me/ZeroCertHackers/1241
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/23f28826-ad36-4363-adca-46b5ef1fa3f7.png
Threat Actors: KINGSMAN SOCIAL WING
Victim Country: Bangladesh
Victim Industry: Package & Freight Delivery
Victim Organization: sb express courier
Victim Site: sbexpress.com.bd - Alleged breach of Israel Opportunity – Energy Resources, LP
Category: Data Breach
Content: The group has claimed responsibility for a cyberattack targeting Israel Opportunity Energy, an oil and gas exploration company. They allege that the company’s systems have been compromised and that elements of the broader oil and gas sector’s cyber infrastructure are being impacted.
Date: 2026-03-02T12:02:36Z
Network: openweb
Published URL: https://x.com/HANDALA_RSS/status/2028429133399671108?s=20
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b0d8a328-f998-4fce-8c95-f212d932e430.jpg
Threat Actors: Handala
Victim Country: Israel
Victim Industry: Oil & Gas
Victim Organization: israel opportunity – energy resources, lp
Victim Site: oilandgas.co.il - Alleged Hack of Israel Opportunity
Category: Cyber Attack
Content: Group claims to have hacked the Israel Opportunity company.
Date: 2026-03-02T11:59:59Z
Network: openweb
Published URL: https://x.com/HANDALA_RSS/status/2028429133399671108
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7fa9f477-9b40-44f6-a5e9-e4a90005a693.png
Threat Actors: Handala Hack
Victim Country: Israel
Victim Industry: Oil & Gas
Victim Organization: israel opportunity
Victim Site: oilandgas.co.il - Akatsuki cyber team targets CCTV cameras from Israel
Category: Alert
Content: Group claims to have hacked 4,150 CCTV and security cameras from Israel.
Date: 2026-03-02T11:42:22Z
Network: telegram
Published URL: https://t.me/Akatsukiyberteam/652
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9e61a788-2c9f-4e03-b144-7e150ca6cb90.png
Threat Actors: Akatsuki cyber team (official)
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of passports and birth certificates from Israel
Category: Data Breach
Content: The group claims to have leaked 120 passports and birth certificates of Israeli citizens.
Date: 2026-03-02T11:40:11Z
Network: telegram
Published URL: https://t.me/Akatsukiyberteam/656
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7d2062fd-b16c-4096-a1f1-54468c6b51da.png
Threat Actors: Akatsuki cyber team (official)
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM claims to target Israel
Category: Alert
Content: A recent post by the group indicated that they intends to target Israel.
Date: 2026-03-02T11:36:04Z
Network: telegram
Published URL: https://t.me/c/3716986899/175
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/48eba23b-5ca2-41a7-9407-97bce40329f2.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of GSIS
Category: Data Breach
Content: The threat actor claims to have leaked GSIS subsidy beneficiary information
Date: 2026-03-02T11:29:59Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-GSIS-SUBSIDY-BENEFICIARY-INFORMATION
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4d72b065-3502-431c-b60a-b874dbd6e0ef.png
Threat Actors: N0XV3RITAS
Victim Country: India
Victim Industry: Education
Victim Organization: Unknown
Victim Site: gsis.ac.in - Nicotine targets the website of Unique Homes
Category: Defacement
Content: The group claims to have defaced the website of Unique Homes.
Date: 2026-03-02T11:08:54Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796591
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/972ef61a-03f9-4cb5-aab4-ca79377112ac.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: unique homes
Victim Site: uniquehomes.ae - Nicotine targets the website of Grillino
Category: Defacement
Content: Group claims to have defaced the website of Grillino.
Date: 2026-03-02T11:06:54Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796567
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/95a6cbbb-eba7-46e0-8bcf-d7a0a755691a.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Food & Beverages
Victim Organization: grillino
Victim Site: chickenhouse.ae - Nicotine targets the website of HD Digital Media
Category: Defacement
Content: The group claims to have defaced the website of HD Digital Media.
Date: 2026-03-02T11:06:13Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796575
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fb430842-4ff2-4be7-9acf-b26f1f45ea2c.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Marketing, Advertising & Sales
Victim Organization: hd digital media
Victim Site: hddigitalmedia.ae - Nicotine targets the website of Cash For Gold
Category: Defacement
Content: Group claims to have deface the website of Cash For Gold.
Date: 2026-03-02T11:01:18Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796566
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/78b0bad5-d336-4c39-8616-29ded6ee9cba.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Luxury Goods & Jewelry
Victim Organization: cash for gold
Victim Site: cashforgold.ae - Nicotine targets the website of Aster Flower
Category: Defacement
Content: Group claims to have deface the website of Aster Flower.
Date: 2026-03-02T10:58:43Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796559
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c18a62e7-3e65-43c1-937c-c55462385e74.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Retail Industry
Victim Organization: aster flower
Victim Site: asterflower.ae - Nicotine targets the website of Hascut Gents Salon
Category: Defacement
Content: The group claims to have defaced the website of Hascut Gents Salon.
Date: 2026-03-02T10:58:13Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796574
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5b6b03bf-1d8f-464c-889f-e1afd062d837.png
Threat Actors: Nicotine
Victim Country: UAE
Victim Industry: Other Industry
Victim Organization: hascut gents salon
Victim Site: hascut.ae - Alleged data breach of Facebook
Category: Data Breach
Content: Threat actor claims to have breached data from Facebook. The compromised data reportedly contain phone numbers, Facebook IDs, names, gender, location, relationship status, city, country, and other profile-related details.
Date: 2026-03-02T10:42:36Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-DATA-BASE-FACEBOOK-COUNTRY-ISRAEL-305-419-THOUSAND
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a44e6848-d222-44fe-aac1-779686161347.png
Threat Actors: CinCauGhas
Victim Country: Israel
Victim Industry: Social Media & Online Social Networking
Victim Organization: facebook
Victim Site: facebook.com - Hax.or targets the website of CRAFTD
Category: Defacement
Content: Group claims to have deface the website of CRAFTD.
Date: 2026-03-02T10:29:00Z
Network: telegram
Published URL: https://t.me/ctifeeds/108652
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/73e1627d-cc18-440c-9d71-a5c38212a149.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Furniture
Victim Organization: craftd
Victim Site: craftd.ae - Alleged data breach of Mobile Premier League (MPL)
Category: Data Breach
Content: The threat actor claims to have breached data from Mobile Premier League (MPL).
Date: 2026-03-02T10:18:34Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277341/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f4021100-3e32-403f-a1d2-78c7ad5ea69b.png
Threat Actors: HighRisk
Victim Country: India
Victim Industry: Gambling & Casinos
Victim Organization: mobile premier league (mpl)
Victim Site: mpl.live - Alleged Data Breach of High-Rich Online Shoppe
Category: Data Breach
Content: Threat Actor claims to have breached data from High-Rich Online Shoppe.
Date: 2026-03-02T10:08:20Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277340/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c3b59a11-9f9c-4e67-b6ff-341ede0318bc.png
Threat Actors: HighRisk
Victim Country: India
Victim Industry: Retail Industry
Victim Organization: high-rich online shoppe
Victim Site: highrich.in - Alleged Leak of France Big Data
Category: Data Breach
Content: The threat actor claims to have leaked a large French dataset along with five additional databases.
Date: 2026-03-02T10:05:16Z
Network: openweb
Published URL: https://leakbase.la/threads/france-big-data-5-db-uhq.49206/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/30b3461f-bb81-48b3-94d2-eee9826a4264.png
Threat Actors: ForensicBoy
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Allegedly leaked 250 k US SSN with personal data
Category: Data Breach
Content: Group claims to have access to US 250K SSN.
Date: 2026-03-02T09:41:56Z
Network: openweb
Published URL: https://leakbase.la/threads/250-k-usa-ssn-leak.49220/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e6d6f22f-dde7-4e11-9040-451cc3d45054.png
Threat Actors: breezzaz
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Hax.or targets the website of PENTA TECHNICAL SERVICES LLC
Category: Defacement
Content: The group claims to have defaced the website of PENTA TECHNICAL SERVICES LLC
Date: 2026-03-02T09:29:55Z
Network: telegram
Published URL: https://t.me/ctifeeds/112902
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a120040e-267b-4257-8765-e24e23fc57df.jpg
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Mechanical or Industrial Engineering
Victim Organization: penta technical services llc
Victim Site: pentaa.ae - Alleged leak of USA High Income data
Category: Data Breach
Content: Threat actor claims to have leaked USA High Income Database.
Date: 2026-03-02T09:23:47Z
Network: openweb
Published URL: https://breachforums.as/Thread-USA-High-Income-Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c5b13bfd-5284-4c38-89a6-4a9e413742db.png
Threat Actors: Heferi
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Hax.or targets the website of Al Furjan Villas
Category: Defacement
Content: Group claims to have deface the website of Al Furjan Villas.
Date: 2026-03-02T09:22:57Z
Network: telegram
Published URL: https://t.me/ctifeeds/111658
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a01330ff-aab8-4723-a856-594a6257cb43.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: al furjan villas
Victim Site: alfurjanvillas.ae - Hax.or targets the website of visionenergyksa.ae
Category: Defacement
Content: The group claims to have defaced the website of visionenergyksa.ae.
Date: 2026-03-02T09:20:26Z
Network: telegram
Published URL: https://t.me/ctifeeds/112912
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1b02b840-d570-4b2f-8466-773b98dbbeec.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: visionenergyksa.ae - Alleged defacement of Teeba Engineering Industries LLC
Category: Defacement
Content: Reports indicate that the website of Teeba Engineering Industries LLC was defaced.
Date: 2026-03-02T09:19:58Z
Network: telegram
Published URL: https://t.me/ctifeeds/111828
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/375e56da-84eb-4029-8a96-c72d2f7be6e8.png
Threat Actors: Unknown
Victim Country: UAE
Victim Industry: Machinery Manufacturing
Victim Organization: teeba engineering industries llc
Victim Site: teeba.ae - Hax.or targets the website of Genesis group
Category: Defacement
Content: The group claims to have defaced the website of Genesis group.
Date: 2026-03-02T09:07:58Z
Network: telegram
Published URL: https://t.me/ctifeeds/112904
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b2dee472-ae06-464a-b593-e1b52c880fca.jpg
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Manufacturing & Industrial Products
Victim Organization: genesis group
Victim Site: genesisgt.ae - Alleged unauthorized access to the remote control systems of Control Applications Ltd
Category: Initial Access
Content: The group claims to have compromised over 130 remote control systems of Control Applications Ltd deployed in multiple countries, including Israel, Turkey, Poland, and several Gulf states.
Date: 2026-03-02T09:00:11Z
Network: telegram
Published URL: https://t.me/c/1651470668/1565
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3d829b38-32f3-421b-9554-e59aec0c9480.png
Threat Actors: Cyber Islamic resistance
Victim Country: Israel
Victim Industry: Manufacturing
Victim Organization: control applications ltd
Victim Site: ddc.co.il - Hax.or targets the website of Smart Union
Category: Defacement
Content: The group claims to have defaced the website of Smart Union.
Date: 2026-03-02T08:52:09Z
Network: telegram
Published URL: https://t.me/ctifeeds/114495
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/19d0add2-fe91-408d-93b6-70dd689da216.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Banking & Mortgage
Victim Organization: smart union
Victim Site: smartunion.ae - Hax.or targets the website of MIB Consultants
Category: Defacement
Content: The group claims to have defaced the website of MIB Consultants.
Date: 2026-03-02T08:40:50Z
Network: telegram
Published URL: https://t.me/ctifeeds/115855
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/98b0efbc-b3d6-47ac-b974-9ad82a6f7e96.jpg
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Human Resources
Victim Organization: mib consultants
Victim Site: mibconsultants.ae - Alleged Data Leak of Experian Ltd UK Consumer Database
Category: Data Breach
Content: A threat actor claims to have leaked a UK consumer database. The dataset reportedly contains around 7 million records, including names, dates of birth, contact details, addresses, employment information, and financial data of UK residents,
Date: 2026-03-02T08:01:51Z
Network: openweb
Published URL: https://breachforums.as/Thread-Finally-found-a-real-database-4-U-which-I-know-will-get-downloaded
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4286818e-019a-4af2-9621-a38b8eacbba4.png
https://d34iuop8pidsy8.cloudfront.net/b6a1948d-869c-45cc-8e41-ef73a5f71009.png
Threat Actors: OriginalCrazyOldFart
Victim Country: UK
Victim Industry: Financial Services
Victim Organization: experian ltd
Victim Site: experian.co.uk - Z-Net claims to target Israel
Category: Alert
Content: A recent post by the group indicated that they intends to target Israel.
Date: 2026-03-02T07:44:58Z
Network: telegram
Published URL: https://t.me/ZNet_official/22
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7ca219be-9ce8-4498-ab1d-1c6e61399f76.png
Threat Actors: Z-Net
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Hax.or targets the website of Daukal Rizq
Category: Defacement
Content: The group claims to have defaced the website of Daukal Rizq
Date: 2026-03-02T07:41:42Z
Network: telegram
Published URL: https://t.me/ctifeeds/117609
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2a8ee8aa-7d4a-4efe-b543-be3e23ccf76b.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Unknown
Victim Organization: daukal rizq
Victim Site: daukalrizq.ae - Cyberattack hit Nobitex
Category: Cyber Attack
Content: A cyberattack hit Iran’s largest cryptocurrency exchange, Nobitex.
Date: 2026-03-02T07:39:20Z
Network: openweb
Published URL: https://x.com/306_vishal80616/status/2028320717482393825?s=20
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/da748919-b09b-4a3f-b281-7dc32f497a85.png
Threat Actors: Unknown
Victim Country: Iran
Victim Industry: Financial Services
Victim Organization: nobitex
Victim Site: nobitex.market - Alleged data leak of Israel Citizens
Category: Data Breach
Content: The threat actor claims to have leaked a dataset containing personal information of approximately 4.69 million Israeli citizens. The exposed data allegedly includes phone numbers, user IDs, email addresses, first and last names, gender, date registered, date of birth, location, hometown, relationship status, last year of education, work details, groups, pages, last update timestamp, and account creation time.
Date: 2026-03-02T07:31:59Z
Network: openweb
Published URL: https://leakbase.la/threads/4-69m-israel-million-citizens-data.49219/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9104fe43-7472-42c5-9bd3-1127be728d62.png
Threat Actors: bzaari
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of National Consortium for the Study of Terrorism and Responses to Terrorism
Category: Data Breach
Content: A threat actor claims to have leaked data from the National Consortium for the Study of Terrorism and Responses to Terrorism , University of Maryland. The compromised data reportedly contains 209,705 records, IDs, dates, locations, attack types, target information, casualty figures, weapon types, and perpetrator details.
Date: 2026-03-02T07:22:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-GTD-%E2%80%93-Global-Terrorism-Database-209-705-Entries-JSON-602-7-MB
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5a6ef0b4-01d1-422b-a299-e3e6e766bdb8.png
https://d34iuop8pidsy8.cloudfront.net/61aaa37c-fd84-4a1b-8180-2d38013cc15f.png
Threat Actors: Kinda
Victim Country: USA
Victim Industry: Research Industry
Victim Organization: national consortium for the study of terrorism and responses to terrorism
Victim Site: start.umd.edu - Hax.or targets the website of PlotLocator.ae
Category: Defacement
Content: The group claims to have defaced the website of PlotLocator.ae.
Date: 2026-03-02T07:07:14Z
Network: telegram
Published URL: https://t.me/ctifeeds/117622
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a631bb74-1db3-4da0-8134-40dc328fdd1a.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Government & Public Sector
Victim Organization: plotlocator.ae
Victim Site: plotlocator.ae - BABAYO EROR SYSTEM targets the website of donnapiromalli.servicereviews.net
Category: Defacement
Content: The group claims to have defaced the website of donnapiromalli.servicereviews.net
Date: 2026-03-02T07:05:38Z
Network: telegram
Published URL: https://t.me/c/3716986899/159
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/429f2bef-ec43-4e88-b970-4650545bae78.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: donnapiromalli.servicereviews.net - Hax.or targets the website of AVC Properties
Category: Defacement
Content: The group claims to have defaced the website of AVC Properties.
Date: 2026-03-02T07:01:21Z
Network: telegram
Published URL: https://t.me/ctifeeds/117625
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d58d3533-5cba-4dab-9901-6f04a207f7ce.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: avc properties
Victim Site: avcholding.com - Hax.or targets the website of Legacy Homes Development
Category: Defacement
Content: The group claims to have defaced the website of Legacy Homes Development
Date: 2026-03-02T06:49:31Z
Network: telegram
Published URL: https://t.me/ctifeeds/127143
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6d9362e9-04cd-46ab-aa54-babd82330f0a.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: legacy homes development
Victim Site: legacy-homes.ae - Alleged data leak of Unistream Bank & Money Transfers
Category: Data Breach
Content: Threat actor claims to have leaked a database of Unistream Bank & Money Transfers. The compromised data reportedly includes full name, full identification, phone numbers, passport details etc.
Date: 2026-03-02T06:35:22Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-unistream-ru-107kk-SELL
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1bcab3cc-2859-4607-a377-9705fbd86868.png
Threat Actors: btCC
Victim Country: Russia
Victim Industry: Financial Services
Victim Organization: unistream bank & money transfers
Victim Site: unistream.ru - Alleged Data Breach of Universidad de Investigación y Desarrollo
Category: Data Breach
Content: The threat actor claims to have breached the database of Universidad de Investigación y Desarrollo (UDI), the dataset contains student-related information including student identification numbers, names, and institutional email addresses.
Date: 2026-03-02T06:34:43Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-CO-UDI-EDU-CO
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5009e71b-c40c-457b-a5af-ddcc8ac3a3ed.png
Threat Actors: NyxarGroup
Victim Country: Colombia
Victim Industry: Education
Victim Organization: universidad de investigación y desarrollo (udi)
Victim Site: udi.edu.co - Hax.or targets the website of Metastar Events
Category: Defacement
Content: The group claims to have defaced the website of Metastar Events.
Date: 2026-03-02T06:30:26Z
Network: telegram
Published URL: https://t.me/ctifeeds/117623
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d105e675-6845-4d24-b536-d01faf2ae61f.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Events Services
Victim Organization: metastar events
Victim Site: metastar.ae - Alleged unauthorized access to Jordan Silos company
Category: Initial Access
Content: The group claims to have gained unauthorized access to Jordan Silos company
Date: 2026-03-02T06:29:46Z
Network: telegram
Published URL: https://t.me/c/1651470668/1559
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/20836ada-b3fe-411a-85c9-dfa648fb13bb.png
https://d34iuop8pidsy8.cloudfront.net/8c0de1d7-92a6-4bd6-88df-5e997315c3d8.png
Threat Actors: Cyber Islamic resistance
Victim Country: Jordan
Victim Industry: Import & Export
Victim Organization: jordan silos company
Victim Site: josilos.com - Hax.or targets the website of Wild Goose Events
Category: Defacement
Content: The group claims to have defaced the website of Wild Goose Events
Date: 2026-03-02T06:16:11Z
Network: telegram
Published URL: https://t.me/ctifeeds/127151
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7b0fcc3e-f72f-49c6-957f-6205f6b5e4bd.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Events Services
Victim Organization: wild goose events
Victim Site: wildgoose.ae.socialnetworkdubai.com - Hax.or targets the website of Woodtech LLC
Category: Defacement
Content: Group claims to have defaced the website of Woodtech LLC
Date: 2026-03-02T06:15:18Z
Network: telegram
Published URL: https://t.me/ctifeeds/127910
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a3cf9927-a731-4004-8728-b37ca6e26429.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Manufacturing
Victim Organization: woodtech llc
Victim Site: woodtechllc.ae - Hax.or targets the website of AVC Properties
Category: Defacement
Content: The group claims to have defaced the website of AVC Properties.
Date: 2026-03-02T06:11:41Z
Network: telegram
Published URL: https://t.me/ctifeeds/117621
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/182c3938-a7ad-467c-8303-d8f83d17fae4.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: avc properties
Victim Site: tenancycontract.ae - Hax.or targets the website of The Legacy Homes
Category: Defacement
Content: The group claims to have defaced the website of The Legacy Homes.
Date: 2026-03-02T06:03:00Z
Network: telegram
Published URL: https://t.me/ctifeeds/127143
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f323e81e-f587-40ec-9e11-b25bdce7a85c.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: the legacy homes
Victim Site: legacyhomes.ae - Alleged data leak of InterPals
Category: Data Breach
Content: The group claims to have leaked data from InterPalsNB: The organization was previously breached on 16 June 2025
Date: 2026-03-02T05:56:18Z
Network: telegram
Published URL: https://t.me/c/3716986899/157
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3387a479-2d71-414e-ba1d-5189aa360de0.png
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Israel
Victim Industry: Social Media & Online Social Networking
Victim Organization: interpals
Victim Site: interpals.net - L4663R666H05T targets the website of Homes r Us
Category: Defacement
Content: The group claims to have defaced the website of Homes r Us, Qatar.
Date: 2026-03-02T05:38:53Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/795989
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/13dd4c72-ad3c-4a6a-bee3-450ee90e067f.png
Threat Actors: L4663R666H05T
Victim Country: Qatar
Victim Industry: Furniture
Victim Organization: homes r us
Victim Site: homesrus.qa - Hax.or targets the website of RJAC Solutions
Category: Defacement
Content: Group claims to have defaced the website of RJAC Solutions.
Date: 2026-03-02T05:31:30Z
Network: telegram
Published URL: https://t.me/ctifeeds/128402
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ccce8d98-3462-4a6b-9fc3-15976012b527.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Management Consulting
Victim Organization: rjac solutions
Victim Site: rjacsolutions.ae - L4663R666H05T targets the website of Sports Corner
Category: Defacement
Content: The group claims to have defaced the website of Sports Corner, Qatar.
Date: 2026-03-02T05:27:15Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796104
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/19ac9de1-8c8e-41ef-88d8-558de290665f.png
Threat Actors: L4663R666H05T
Victim Country: Qatar
Victim Industry: E-commerce & Online Stores
Victim Organization: sports corner
Victim Site: sportscorner.qa - Alleged Data Breach of SiCepat
Category: Data Breach
Content: The threat actor claims to have breached the database of SiCepat. The dataset contains employee-related records, including national identification numbers (NIK), personal information, employment classifications, and branch assignment details.
Date: 2026-03-02T05:21:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-SICEPAT
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/85ff43ff-3527-4ee9-92e6-93a0520d128d.png
Threat Actors: lllllllllllllllllili
Victim Country: Indonesia
Victim Industry: Transportation & Logistics
Victim Organization: sicepat ekspres
Victim Site: sicepat.com - Hax.or targets the website of SVECO Engineering Consultants
Category: Defacement
Content: Group claims to have defaced the website of SVECO Engineering Consultants.
Date: 2026-03-02T05:13:37Z
Network: telegram
Published URL: https://t.me/ctifeeds/128430
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/28d10e34-bdc0-4529-ba5d-2297680837db.png
Threat Actors: Hax.or
Victim Country: UAE
Victim Industry: Building and construction
Victim Organization: sveco engineering consultants
Victim Site: sveco.ae - L4663R666H05T targets thee website of Sports for less
Category: Defacement
Content: The group claims to have defaced the website of Sports for less, Qatar.
Date: 2026-03-02T05:12:59Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/796105
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/84cdb0d9-e3d9-4fe6-b16e-1e33a66b08c8.png
Threat Actors: L4663R666H05T
Victim Country: Qatar
Victim Industry: E-commerce & Online Stores
Victim Organization: sports for less
Victim Site: sportsforless.qa - Alleged Data Leak of Paris Hospital database
Category: Data Breach
Content: The threat actor claims to have leaked the Paris Hospital database. The dataset allegedly contains medical records and sensitive patient information.
Date: 2026-03-02T04:48:54Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-HOPITAL-DE-PARIS
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3d86b1ad-6f8f-4689-8ebd-c696497bd345.png
Threat Actors: epi
Victim Country: France
Victim Industry: Hospital & Health Care
Victim Organization: Unknown
Victim Site: Unknown - Simsimi targets the website of Alsultan Sweets
Category: Defacement
Content: The group claims to have defaced the website of Alsultan Sweets, UAE.
Date: 2026-03-02T04:40:44Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41579383
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/16268a21-6e1e-441e-a159-1df773caf6fa.png
Threat Actors: Simsimi
Victim Country: UAE
Victim Industry: Food & Beverages
Victim Organization: alsultan sweets
Victim Site: alsultansweets.ae - Alleged Data Breach of DVM Records
Category: Data Breach
Content: The threat actor claims to have breached the database of DVM Records, the dataset includes sample records displaying customer email addresses, personal identifiers, and shipping details.
Date: 2026-03-02T04:32:05Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-DVM-RECORDS
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e23390e4-b9b8-492d-9c6c-45f12ef43b95.png
Threat Actors: epi
Victim Country: France
Victim Industry: Music
Victim Organization: dvm records
Victim Site: dvmrecords.com - DieNet claims to target multiple targets
Category: Alert
Content: The group claims to targets multiple websites. The group lists the following entities among its alleged targets:Public Institution for Social Security Services (Kuwait)General Organization for Social Insurance (Bahrain)Abu Dhabi Digital AuthorityGovernment Media Office of QatarNational Center for Crisis Management (Kuwait)Yah Bank
Date: 2026-03-02T04:31:46Z
Network: telegram
Published URL: https://t.me/dienet3/320
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b30fe94a-86ce-4c75-9bc8-1128303bfc6e.png
Threat Actors: DieNet
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: public institution for social security services (kuwait)
Victim Site: Unknown - 1H3X-TN targets the website of filehurt.ir
Category: Defacement
Content: The group claims to have defaced the website of filehurt.ir.
Date: 2026-03-02T04:16:46Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41580714
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a6aa0357-8dab-4179-a8cf-cceb9b3d6009.png
Threat Actors: 1H3X-TN
Victim Country: Iran
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: filehurt.ir - Alleged data leak of Tsunami Tsolutions
Category: Data Breach
Content: Threat actor claims to have leaked the database of Tsunami Tsolutions, allegedly containing 562 GB of compromised data.
Date: 2026-03-02T04:02:09Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277092/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b0b91c03-0f27-4f5f-a61c-214024221031.png
Threat Actors: Everestgroup
Victim Country: USA
Victim Industry: Airlines & Aviation
Victim Organization: tsunami tsolutions
Victim Site: tsunamitsolutions.com - Hax.or targets the website of PSG Academy Qatar
Category: Defacement
Content: Group claims to have defaced the website of PSG Academy Qatar.
Date: 2026-03-02T03:56:32Z
Network: telegram
Published URL: https://t.me/ctifeeds/128426
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d6545861-6ed7-4520-836e-033487ae28a3.png
Threat Actors: Hax.or
Victim Country: Qatar
Victim Industry: Education
Victim Organization: psg academy qatar
Victim Site: register.psgacademy.qa - Alleged data leak of Atlas Air
Category: Data Breach
Content: Threat actor claims to have leaked a database of Atlas Air, allegedly containing approximately 1.2 terabytes of compromised data.
Date: 2026-03-02T03:48:09Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277094/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7b6a156e-9abf-4bcb-b22c-e43a06295ae4.png
Threat Actors: Everestgroup
Victim Country: USA
Victim Industry: Airlines & Aviation
Victim Organization: atlas air
Victim Site: atlasair.com - Komiko Suffers Data Breach
Category: Data Breach
Content: Komiko, an AI product of Entropia Inc., disclosed a security incident after receiving a credible threat from an external actor claiming unauthorized access to its database. The attacker alleges exfiltration of user IDs, email addresses, and potentially user-generated content, while the company confirmed that passwords and payment card data were not stored in the affected database and therefore were not exposed. Komiko is actively investigating the scope of the breach, the attack vector, and whether AI-generated user content was accessed, has engaged cybersecurity professionals, and reported the matter to law enforcement.
Date: 2026-03-02T03:39:41Z
Network: discord
Published URL: https://discord.com/channels/1251608148649709678/1268101403184992257/1477210764157915136
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a786bbd1-1540-4059-8291-d4a89cebda90.jpg
Threat Actors: Unknown
Victim Country: USA
Victim Industry: Information Technology (IT) Services
Victim Organization: komiko
Victim Site: komiko.app - Rayzky_ targets the website of General Maintenance UAE
Category: Defacement
Content: The group claims to have defaced the website of General Maintenance UAE.
Date: 2026-03-02T03:36:24Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41579101?hz=1
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fbe3b181-fb5b-4234-abb6-de0620c4793a.png
Threat Actors: Rayzky_
Victim Country: UAE
Victim Industry: Facilities Services
Victim Organization: general maintenance uae
Victim Site: generalmaintenance.ae - Fatimion cyber team claims to target government websites in Kuwait
Category: Alert
Content: A recent post by the group claims that they are targeting all government websites in Kuwait.
Date: 2026-03-02T03:21:01Z
Network: telegram
Published URL: https://t.me/hak994/4853
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c8c52118-b0fb-4222-b182-da7b94bfc774.png
Threat Actors: Fatimion cyber team
Victim Country: Kuwait
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized access to unidentified store
Category: Initial Access
Content: Threat actor claims to be selling unauthorized access to an unidentified online store in Spain.
Date: 2026-03-02T03:19:13Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277073/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/433953f0-108a-4e13-990e-baf2d40e5ed6.png
Threat Actors: ed1n1ca
Victim Country: Spain
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to surveillance cameras in USA
Category: Initial Access
Content: The group claims to have gained unauthorized access to surveillance cameras in USA.
Date: 2026-03-02T03:17:08Z
Network: telegram
Published URL: https://t.me/zpentestalliance/1113
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5694152a-91a0-45d3-8187-0cde9ab3dd0a.png
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized access to unidentified store
Category: Initial Access
Content: Threat actor claims to be selling unauthorized access to an unidentified online store in France.
Date: 2026-03-02T02:58:49Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277074/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f388c9ac-e78a-4aea-b983-a164fd014821.png
Threat Actors: ed1n1ca
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Rayzky_ targets the website of Khunji Group
Category: Defacement
Content: The group claims to have defaced the website of Khunji Group, UAE
Date: 2026-03-02T02:58:30Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41579147
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2bc1c9df-fb4d-4148-a3ba-6529c71ec3c1.png
Threat Actors: Rayzky_
Victim Country: UAE
Victim Industry: Textiles
Victim Organization: khunji group
Victim Site: khunjigroup.ae - Alleged data breach of Komiko
Category: Data Breach
Content: The threat actor claims to have gained unauthorized access and leaked the data belonging to Komiko. The compromised data includes userid, email address and user generated content.
Date: 2026-03-02T02:54:05Z
Network: openweb
Published URL: https://x.com/troyhunt/status/2028273847376765139
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bbb07657-386a-4345-b0db-c06f1fc08071.png
Threat Actors: Komiko-chan
Victim Country: USA
Victim Industry: Software
Victim Organization: komiko
Victim Site: komiko.ai - Rayzky_ targets the website of Rayyan Water (UAE)
Category: Defacement
Content: The group claims to have defaced the website of Rayyan Water, UAE.
Date: 2026-03-02T02:14:04Z
Network: openweb
Published URL: https://zone-h.org/mirror/id/41579315
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/96bf8462-861f-4520-8195-6f934e28be38.png
https://d34iuop8pidsy8.cloudfront.net/81413b51-b4d8-4faf-aaf0-0cf97a617a8d.png
Threat Actors: Rayzky_
Victim Country: UAE
Victim Industry: Food & Beverages
Victim Organization: rayyan water
Victim Site: rayyanwater.ae - Alleged sale of unauthorized access to an unidentified store
Category: Initial Access
Content: Threat actor claims to be selling unauthorized access to an unidentified online store in France.
Date: 2026-03-02T02:10:37Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277075/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6867eaf7-20c1-4727-a4af-b5a762061a65.png
Threat Actors: ed1n1ca
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified manufacturing organization
Category: Initial Access
Content: Threat actor claims to be selling unauthorized local admin access to an unidentified manufacturing organization in Brazil.
Date: 2026-03-02T02:04:19Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277264/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/78bea7eb-cfb1-4d60-bcfe-1db3de9417b5.png
Threat Actors: Big-Bro
Victim Country: Brazil
Victim Industry: Manufacturing
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to Water Corporation of Odisha
Category: Initial Access
Content: The group claims to have gained unauthorized access to Water Corporation of Odisha
Date: 2026-03-02T02:03:55Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3849
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/52452b2e-fc95-4b60-8dcf-0d0b5649b062.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: India
Victim Industry: Energy & Utilities
Victim Organization: water corporation of odisha
Victim Site: watcoodisha.co.in - Alleged sale of unauthorized admin access to unidentified IT company
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified IT company in Brazil.
Date: 2026-03-02T01:53:08Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277265/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bfafb4c1-fdf7-4e57-9970-668c3f97ceee.png
Threat Actors: Big-Bro
Victim Country: Brazil
Victim Industry: Information Technology (IT) Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified gift shop
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified gift shop in Spain.
Date: 2026-03-02T01:48:35Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277271/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a72442c6-6939-4bef-b673-5a919e8c2042.png
Threat Actors: savel987
Victim Country: Spain
Victim Industry: Supermarkets
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of 330 credit card records
Category: Data Breach
Content: Threat actor claims to be selling 330 credit card records from USA. The compromised data reportedly includes credit card number, expiry month, expiry year, cvv2, full name, phone number, address, city, state, zip, email, and country.
Date: 2026-03-02T01:33:59Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277281/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a141f241-244e-45cc-ab7a-4a49f088f7b7.png
Threat Actors: corptoday
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the website of Azarim
Category: Defacement
Content: The group claims to have defaced the website of Azarim.
Date: 2026-03-02T01:06:33Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/795387
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0595ac95-d4b4-4e0d-9a38-fc0e2cbb1755.png
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Medical Equipment Manufacturing
Victim Organization: azarim
Victim Site: azarimedic.co.il - Alleged Data Breach of SISCONMP
Category: Data Breach
Content: The threat actor claims to have breached the database of SISCONMP, the dataset contains personal identification details, license information, and institutional affiliations.
Date: 2026-03-02T01:05:40Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-SISCONMP-Sistema-de-Informaci%C3%B3n-de-Conductores-que-Transportan-Mercanc%C3%ADas-Peligrosa
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b9911d5d-5a1d-4c5e-a6ac-08b2221711f0.png
Threat Actors: delitospenales
Victim Country: Colombia
Victim Industry: Government Relations
Victim Organization: sisconmp – information system for drivers transporting dangerous goods
Victim Site: web.mintransporte.gov.co - chinafans targets the website of DENTIST – Dr.Tal Meir
Category: Defacement
Content: The group claims to have defaced the website of DENTIST – Dr.Tal Meir
Date: 2026-03-02T01:00:07Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/795807
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/960585ee-0a14-46ee-b096-7c0812e423a6.png
Threat Actors: chinafans
Victim Country: Israel
Victim Industry: Hospital & Health Care
Victim Organization: dentist – dr.tal meir
Victim Site: dr-tal.co.il - L4663R666H05T targets the website of Globalonline
Category: Defacement
Content: The team claims to have defaced the website of Globalonline.
Date: 2026-03-02T00:50:49Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/795386
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9338ace6-6c5b-4df7-b7f4-3edbfd68ad1d.png
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Textiles
Victim Organization: globalonline
Victim Site: globalonline.co.il - L4663R666H05T targets the website of TREK-ER FORCES
Category: Defacement
Content: The Group claims to have defaced the website of TREK-ER FORCES.
Date: 2026-03-02T00:50:27Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/795388
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/80cb1024-613d-473e-9d38-3a03573a33a5.png
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: E-commerce & Online Stores
Victim Organization: trek-er forces
Victim Site: trekerforces.co.il - johnfelix777 targets the website of Homekey
Category: Defacement
Content: The group claims to have defaced the website of Homekey.
Date: 2026-03-02T00:45:54Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/795367
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/018665c6-7aa3-43b6-b1b0-33a713d25a11.png
Threat Actors: johnfelix777
Victim Country: Israel
Victim Industry: Real Estate
Victim Organization: homekey
Victim Site: homekey.co.il - Alleged Sale of Unauthorized Access to Unidentified Organization in USA
Category: Initial Access
Content: Threat actor claims to be selling access and secret keys to an S3 bucket belonging to a U.S.-based corporation with reported revenue of approximately USD 8 million.
Date: 2026-03-02T00:20:55Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277314/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/335d2ea4-6977-40af-a965-d579c6a78b9b.png
Threat Actors: AckLine
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyb3r Drag0nz targets the website of maarazplus.co.il
Category: Defacement
Content: The group claims to have defaced the website of maarazplus.co.il
Date: 2026-03-02T00:15:42Z
Network: telegram
Published URL: https://t.me/c/3504564040/175
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/73df62d5-6227-49d4-b760-212969de2bb1.png
Threat Actors: Cyb3r Drag0nz
Victim Country: Israel
Victim Industry: Retail Industry
Victim Organization: Unknown
Victim Site: maarazplus.co.il