[March-9-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report details a concentrated series of cybersecurity incidents primarily recorded on March 9, 2026. The threat landscape during this period is characterized by massive, coordinated data breach campaigns targeting government infrastructures, high-volume credential leaks, and targeted defacement operations. The data highlights a severe vulnerability in regional government portals, particularly within Indonesia, and sustained hacktivist or state-aligned targeting of Israeli institutions.

2. Threat Actor Landscape & Major Campaigns

The incidents are dominated by several highly active threat actors and syndicates, each demonstrating distinct targeting preferences and methodologies.

The INDRAMAYU CHAOS SYSTEM Campaign

The most prolific threat actor in the provided dataset is the “INDRAMAYU CHAOS SYSTEM.” This group executed a massive, coordinated campaign aimed almost exclusively at the Republic of Indonesia.

  • Target Profile: The group focused entirely on government administration, specifically regional regencies, provincial governments, and national ministries.
  • Attack Vector: The incidents are uniformly categorized as “Data Breaches,” specifically involving the leaking of login credentials.
  • Key Victims: Compromised entities include the Ministry of National Development Planning , Ministry of Finance , Ministry of Home Affairs , and the Supreme Court of the Republic of Indonesia.

Hacktivism and Targeted Attacks on Israel

Israel faced a multi-faceted assault from several distinct threat actors, blending hacktivism with severe data exfiltration.

  • Academic Targeting: INDRAMAYU CHAOS SYSTEM expanded its targets to include Israeli educational institutions, leaking credentials from the University of Haifa , Hebrew University of Jerusalem , and Reichman University.
  • Military and Security Data: The “404 CREW CYBER TEAM” allegedly leaked a dataset linked to Israeli Soldiers, including names, addresses, and phone numbers. Furthermore, “Handala Hack” claimed to leak personal information of 50 Israeli Air Force officers, including fighter pilots and drone operators , and also claimed unauthorized access to security cameras in Jerusalem.
  • Critical Infrastructure: The group “Cardinal” claimed unauthorized access to systems associated with a nuclear facility in Dimona, Israel, alleging manipulation of internal control components.

Defacement Operations by L4663R666H05T

The threat actor “L4663R666H05T” engaged in a widespread website defacement campaign.

  • Victims: Targets were geographically and industrially diverse, including ACE Network Ltd in Israel , Entel Chile , and multiple organizations in the UAE such as Showracks Trading LLC and Hard Disk Direct.

3. High-Impact Data Breaches & Corporate Compromises

Several incidents stand out due to the sheer volume of data compromised or the sensitivity of the organizations involved.

  • Infutor (USA): A threat actor named “Spirigatito” claimed to sell a database containing 676,798,866 records of American citizens, exposing full names, dates of birth, addresses, phone numbers, and Social Security Numbers.
  • Sunrise Communications (Switzerland): The actor “Niphra” advertised a database of over 6 million customer records, including payment-related data, usernames, and addresses.
  • Vertex Inc. (USA): The group “ShinyHunters” claimed to have compromised over 2 million records containing personally identifiable information (PII) and internal corporate data.
  • SoundCloud (USA): A leak allegedly exposed 896,470 records of U.S. users, including names, emails, and profile URLs.
  • Isrotel Hotel Chain & Israeli Infrastructure: The actor “Ashborn” claimed to sell a massive 3 GB compilation of 36 databases containing 9.2 million records from Israeli sources, including Isrotel , Arkia Israeli airlines , and Bezeq.

4. Operational Technology (OT) and Initial Access Sales

Beyond data exfiltration, the report indicates active threats against physical infrastructure and the commercialization of network access.

  • Industrial Control Systems (ICS): The “Armenian code” group claimed unauthorized access to a residential heating control system in Azerbaijan, allegedly switching it to gas mode, disabling pumps, and pushing pressure and temperature to maximum levels to trigger emergency alerts. Additionally, “Shadow ClawZ 404” claimed access to an unidentified industrial pumping control system.
  • Initial Access Brokering: Threat actors actively sold access to compromised networks. Examples include SSH access to a Vietnamese live football streaming site containing over 10 servers , unauthorized Magento admin access in the UK , and access to a compromised Mexican e-commerce shop processing payments via OpenPay.

5. Conclusion

The cybersecurity events detailed in this dataset reveal a highly volatile digital environment. The overarching theme is the stark vulnerability of government administrative systems, best evidenced by the systemic compromise of Indonesian public sector credentials. Furthermore, the dataset underscores that geopolitical tensions continue to manifest in cyberspace, as seen in the targeted harassment and data exposure of Israeli military personnel and critical infrastructure.

Finally, the commodification of cybercrime remains robust. The sale of massive citizen databases (such as the Infutor breach), initial access to corporate networks, and the advertisement of specialized malware like “NFCRipper” demonstrate a mature, profit-driven underground economy that poses a continuous threat to global data privacy and operational stability.

Detected Incidents Draft Data

  1. Alleged Unauthorized Access to French customs portal.
    Category: Data Breach
    Content: The group claims to have gained unauthorized access to French customs portal.
    Date: 2026-03-09T23:55:28Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-Douane-gouv-fr-Panel-acces
    Screenshots:
    None
    Threat Actors: M4nifest
    Victim Country: France
    Victim Industry: Government Administration
    Victim Organization: direction générale des douanes et droits indirects
    Victim Site: douane.gov.fr
  2. Alleged Data Breach of Rheinhessen-Bräu
    Category: Data Breach
    Content: The threat actor claims to have breached the data related to Rheinhessen-Bräu, the data includes WordPress login credentials allegedly belonging to a user of the website.
    Date: 2026-03-09T23:38:03Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Leak-Rheinhessen-Br%C3%A4u
    Screenshots:
    None
    Threat Actors: hades1800
    Victim Country: Germany
    Victim Industry: Food & Beverages
    Victim Organization: rheinhessen-bräu
    Victim Site: rheinhessen-braeu.de
  3. Alleged data breach of SPUTNIK
    Category: Data Breach
    Content: The threat actor claims to have leaked a database allegedly associated with SPUTNIK. the leaked dataset contains approximately 119,957 lines of data in TXT format, including personal information such as names, phone numbers, dates of birth, and other details.
    Date: 2026-03-09T22:59:11Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-sputnik64-ru
    Screenshots:
    None
    Threat Actors: X0Frankenstein
    Victim Country: Russia
    Victim Industry: Supermarkets
    Victim Organization: sputnik
    Victim Site: sputnik64.ru
  4. Alleged data breach of Saint Lucia Citizenship by Investment Programme
    Category: Data Breach
    Content: The threat actor claims to have leaked a database allegedly belonging to the Saint Lucia Citizenship by Investment Programme website. the dataset is provided in SQL format and reportedly contains 1,116,935 rows of data. which inclludes usernames, hashed passwords, full names, addresses, phone numbers, emails, passport numbers, and other identification-related information.
    Date: 2026-03-09T22:49:13Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-cipsaintlucia-com-leak
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Saint Lucia
    Victim Industry: Government Administration
    Victim Organization: saint lucia citizenship by investment programme
    Victim Site: cipsaintlucia.com
  5. L4663R666H05T targets the website of ACE Network Ltd
    Category: Defacement
    Content: The Group claims to have defaced the website of ACE Network Ltd.
    Date: 2026-03-09T22:07:50Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41594486
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Retail Industry
    Victim Organization: ace network ltd
    Victim Site: mcstaging3.ace.co.il
  6. Alleged unauthorized access to CCTV Systems in USA
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to multiple CCTV Systems in USA
    Date: 2026-03-09T21:56:20Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/515
    Screenshots:
    None
    Threat Actors: MORNING STAR
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. L4663R666H05T targets the website of Entel Chile
    Category: Defacement
    Content: The Group claims to have defaced the website of Entel Chile.
    Date: 2026-03-09T21:46:07Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41598789
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Chile
    Victim Industry: Network & Telecommunications
    Victim Organization: entel chile
    Victim Site: tiendaempresas.entel.cl
  8. Alleged Sale of Unauthorized Access to a Live Football Streaming Website in Vietnam
    Category: Initial Access
    Content: The threat actor claims to be selling access via SSH to the infrastructure of a live football streaming site in Vietnam, stating that the access includes about 10 servers and more than 100 redirect domains.
    Date: 2026-03-09T21:39:18Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277923/
    Screenshots:
    None
    Threat Actors: William Black
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Cardinal claims to target an unidentified nuclear facility systems in Israel
    Category: Alert
    Content: The group claims to have gained unauthorized access to systems associated with a nuclear facility in Dimona, Israel, alleging manipulation of internal control components and monitoring logs during a specified time window.
    Date: 2026-03-09T21:20:30Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/350
    Screenshots:
    None
    Threat Actors: Cardinal
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged Data Leak of Bandung Regency Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Bandung Regency Government in Indonesia.
    Date: 2026-03-09T20:57:19Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: bandung regency government
    Victim Site: bandungkab.go.id
  11. Alleged Data Leak from Gresik Regency Government
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Gresik Regency Government.
    Date: 2026-03-09T20:55:55Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/535
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: gresik regency government
    Victim Site: gresikkab.go.id
  12. Alleged Data Leak of Bangkalan Regency Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Bangkalan Regency Government in Indonesia.
    Date: 2026-03-09T20:53:29Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: bangkalan regency government
    Victim Site: bangkalankab.go.id
  13. Alleged Data Leak from Government of Gunungkidul Regency
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Government of Gunungkidul Regency.
    Date: 2026-03-09T20:52:30Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/537
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of gunungkidul regency
    Victim Site: gunungkidulkab.go.id
  14. Alleged Data Leak of Bangli Regency Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Bangli Regency Government in Indonesia.
    Date: 2026-03-09T20:49:43Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: bangli regency government
    Victim Site: banglikab.go.id
  15. Alleged Data Leak of Banten Provincial Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Banten Provincial Government in Indonesia.
    Date: 2026-03-09T20:45:31Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: banten provincial government
    Victim Site: bantenprov.go.id
  16. Alleged Data Leak from University of Haifa
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from University of Haifa.
    Date: 2026-03-09T20:44:14Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/536
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: university of haifa
    Victim Site: haifa.ac.il
  17. Alleged Data Leak of Bantul Regency Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Bantul Regency Government in Indonesia.
    Date: 2026-03-09T20:42:13Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: bantul regency government
    Victim Site: bantulkab.go.id
  18. Alleged Data Leak of Ministry of National Development Planning (BAPPENAS)
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Ministry of National Development Planning in Indonesia.
    Date: 2026-03-09T20:38:22Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: ministry of national development planning
    Victim Site: bappenas.go.id
  19. Alleged Data Leak from Herzog Academic College
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Herzog Academic College.
    Date: 2026-03-09T20:38:13Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/536
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: herzog academic college
    Victim Site: herzog.ac.il
  20. Alleged leak of Israeli Soldiers data
    Category: Data Breach
    Content: The group claims to have leaked a dataset allegedly linked to Israeli Soldiers Personal Information, Name, Address, Phone number.
    Date: 2026-03-09T20:30:55Z
    Network: telegram
    Published URL: https://t.me/crewcyber/962
    Screenshots:
    None
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged Data Leak from Hebrew University of Jerusalem
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Hebrew University of Jerusalem.
    Date: 2026-03-09T20:30:05Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/535
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: hebrew university of jerusalem
    Victim Site: new.huji.ac.il
  22. Alleged leak of Israel data
    Category: Data Breach
    Content: The group claims to have leaked a dataset allegedly linked to individuals in Israel, reportedly containing account information, phone numbers, and IP addresses associated with surveillance cameras.
    Date: 2026-03-09T20:25:08Z
    Network: telegram
    Published URL: https://t.me/crewcyber/959
    Screenshots:
    None
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged Data Leak from Provincial Government of West Java
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Provincial Government of West Java.
    Date: 2026-03-09T20:21:10Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/535
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: provincial government of west java
    Victim Site: jabarprov.go.id
  24. Alleged Data Leak of Kabupaten Maros
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Kabupaten Maros
    Date: 2026-03-09T20:15:07Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/550
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kabupaten maros
    Victim Site: maroskab.go.id
  25. Alleged Data Leak from Reichman University
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Reichman University.
    Date: 2026-03-09T20:10:32Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/537
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: reichman university
    Victim Site: runi.ac.il
  26. Alleged Data Leak of Majelis Permusyawaratan Rakyat Republik Indonesia
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Majelis Permusyawaratan Rakyat Republik Indonesia.
    Date: 2026-03-09T19:58:14Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/547
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: majelis permusyawaratan rakyat republik indonesia
    Victim Site: mpr.go.id
  27. Alleged Data Leak of The Academic College of Tel-Aviv, Yaffo
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of The Academic College of Tel-Aviv, Yaffo
    Date: 2026-03-09T19:48:15Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/547
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: the academic college of tel-aviv, yaffo
    Victim Site: mta.ac.il
  28. Alleged Data Leak from Indramayu Regency Government
    Category: Data Breach
    Content: The group claims to have leaked the login credentials from Indramayu Regency Government.
    Date: 2026-03-09T19:48:01Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/537
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: indramayu regency government
    Victim Site: indramayukab.go.id
  29. Alleged Data Leak of National Search and Rescue Agency (BASARNAS)
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of National Search and Rescue Agency in Indonesia.
    Date: 2026-03-09T19:47:29Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: national search and rescue agency
    Victim Site: basarnas.go.id
  30. Alleged Data Leak of Election Supervisory Agency of Indonesia
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Election Supervisory Agency of Indonesia in Indonesia.
    Date: 2026-03-09T19:40:20Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: election supervisory agency of indonesia
    Victim Site: bawaslu.go.id
  31. ShinyHunters Threaten Data Breaches in Salesforce Aura Campaign
    Category: Alert
    Content: threat actor has announced a campaign claiming that several hundred companies are at risk of having their data published if they fail to comply with the group’s demands.
    Date: 2026-03-09T19:36:46Z
    Network: tor
    Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged Data Leak of Bekasi Regency Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Government of Bekasi Regency Government in Indonesia.
    Date: 2026-03-09T19:35:45Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: bekasi regency government
    Victim Site: bekasikab.go.id
  33. Alleged Data Leak of Government of Bengkulu Province
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Government of Bengkulu Province in Indonesia.
    Date: 2026-03-09T19:32:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/503
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of bengkulu province
    Victim Site: bengkulu.go.id
  34. Alleged data leak of Ciamis Regency Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Ciamis Regency Government.
    Date: 2026-03-09T19:31:59Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: ciamis regency government
    Victim Site: ciamiskab.go.id
  35. Alleged data leak of Cianjur Regency Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Cianjur Regency Government.
    Date: 2026-03-09T19:28:41Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: cianjur regency government
    Victim Site: cianjurkab.go.id
  36. Alleged data leak of Regional Representative Council of Indonesia (DPD RI)
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Regional Representative Council of Indonesia (DPD RI).
    Date: 2026-03-09T19:25:44Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: regional representative council of indonesia (dpd ri)
    Victim Site: dpd.go.id
  37. Alleged data leak of House of Representatives of the Republic of Indonesia (DPR RI)
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the House of Representatives of the Republic of Indonesia (DPR RI).
    Date: 2026-03-09T19:22:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: house of representatives of the republic of indonesia (dpr ri)
    Victim Site: dpr.go.id
  38. Alleged data leak of Fakfak Regency Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Fakfak Regency Government.
    Date: 2026-03-09T19:18:34Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: fakfak regency government
    Victim Site: fakfakkab.go.id
  39. Alleged data leak of Garut Regency Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Garut Regency Government.
    Date: 2026-03-09T19:15:32Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: garut regency government
    Victim Site: garutkab.go.id
  40. Alleged data leak of Gianyar Regency Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Gianyar Regency Government.
    Date: 2026-03-09T19:13:01Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: gianyar regency government
    Victim Site: gianyarkab.go.id
  41. Alleged Unauthorized Access to Azerbaijani Heating Control System
    Category: Initial Access
    Content: Threat group claims to have gained unauthorized access to another heating control system in Azerbaijan, allegedly affecting a residential heating infrastructure. According to the actor, the system was switched to gas mode, and the operational settings were modified. The attacker claims they disabled pumps and increased system pressure and temperature values to maximum levels, which reportedly triggered multiple system alerts and emergency notifications.
    Date: 2026-03-09T19:10:42Z
    Network: telegram
    Published URL: https://t.me/armeniancode_eng/63
    Screenshots:
    None
    Threat Actors: Armenian code
    Victim Country: Azerbaijan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged data leak of Gorontalo City Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Gorontalo City Government.
    Date: 2026-03-09T19:10:38Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: gorontalo city government
    Victim Site: gorontalo.go.id
  43. Alleged Data Breach of Vertex Inc.
    Category: Data Breach
    Content: A threat actor claims to have compromised over 2 million records containing personally identifiable information (PII) and other internal corporate data.
    Date: 2026-03-09T19:09:08Z
    Network: tor
    Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: vertex inc.
    Victim Site: vertexinc.com
  44. Alleged data leak of Gorontalo Provincial Government
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Gorontalo Provincial Government.
    Date: 2026-03-09T19:08:01Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/585
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: gorontalo provincial government
    Victim Site: gorontaloprov.go.id
  45. Alleged Leak of 896K U.S. User Records from SoundCloud Database
    Category: Data Breach
    Content: A threat actor claims to have leaked U.S. user data from a SoundCloud database, allegedly containing 896,470 user records. The dataset reportedly includes fields such as user ID, account creation date, last modified date, username, first name, last name, full name, email address, country code, permalink, profile URL, follower count, and following count.
    Date: 2026-03-09T18:43:49Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-US-Soundcloud-US-Users
    Screenshots:
    None
    Threat Actors: hirohero89
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Alleged data leak of Netanya Academic College
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Netanya Academic College.
    Date: 2026-03-09T18:29:15Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/548
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: netanya academic college
    Victim Site: netanya.ac.il
  47. Alleged Sale of Unauthorized WordPress Admin Access in USA
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized WordPress admin panel access to a website in the United States. The listing indicates recent transaction activity, including hundreds of debit/credit card Stripe payments across multiple months, suggesting active order processing through the platform.
    Date: 2026-03-09T18:03:56Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277905/
    Screenshots:
    None
    Threat Actors: manofworld
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Alleged Sale of Unauthorized Magento Admin Access in UK
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized Magento admin access to a website in the United Kingdom, noting recent order activity and the use of a credit card iframe for payments.
    Date: 2026-03-09T18:03:38Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277904/
    Screenshots:
    None
    Threat Actors: manofworld
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged Leak of 267K Records from Exposed Government Servers
    Category: Data Breach
    Content: A threat actor claims to have exported data from exposed government servers. The leaked archive allegedly contains 267,462 lines of data with a total size of 18.85 MB.
    Date: 2026-03-09T17:45:32Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-COLLECTION-Exposed-Government-Data
    Screenshots:
    None
    Threat Actors: The1F
    Victim Country: Unknown
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged Sale of Région Pays de la Loire Mobility Observatory Transport Database
    Category: Data Breach
    Content: Threat Actor claims to be selling a dataset allegedly associated with the Région Pays de la Loire Mobility Observatory in France. The dataset includes multimodal transportation and mobility data covering regional transport networks such as rail stations, bus stops, routes, timetables, and network topology. The data is provided in formats including NetEx and GTFS, along with CSV and Parquet exports, and contains historical and operational information related to passenger flows, origin–destination movement patterns, and transportation infrastructure within the region.
    Date: 2026-03-09T17:41:57Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277908/
    Screenshots:
    None
    Threat Actors: rythem
    Victim Country: France
    Victim Industry: Government Administration
    Victim Organization: région pays de la loire
    Victim Site: paysdelaloire.fr
  51. Alleged data leak of Nusa Tenggara Timur
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Nusa Tenggara Timur.
    Date: 2026-03-09T17:39:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/547
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: nusa tenggara timur
    Victim Site: nttprov.go.id
  52. Alleged data breach of Hotel Lucerna Tijuana
    Category: Data Breach
    Content: A threat actor claims have leaked the data from hotel management system of Hotel Lucerna Tijuana.The exposed data allegedly includes live guest names, room numbers, guest stay details, housekeeping status, and more than two years of internal wake-up call logs.
    Date: 2026-03-09T17:38:57Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-LEAK-Hotel-Lucerna-Tijuana-78-Live-Guests-2-Years-Call-Logs-Mexico-2026
    Screenshots:
    None
    Threat Actors: macaroni
    Victim Country: Mexico
    Victim Industry: Hospitality & Tourism
    Victim Organization: hotel lucerna tijuana
    Victim Site: hotellucernatijuana.com
  53. Alleged data breach of Sunrise Communications
    Category: Data Breach
    Content: A threat actor claims to be selling a database containing over 6 million customer records allegedly from Sunrise. The data reportedly includes usernames, passwords, phone numbers, addresses, subscription plans, and other personal information, with payment-related data.
    Date: 2026-03-09T17:29:53Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-VERIFIED-Switzerland-Sunrise-ch-Data-Breach-6M
    Screenshots:
    None
    Threat Actors: Niphra
    Victim Country: Switzerland
    Victim Industry: Network & Telecommunications
    Victim Organization: sunrise communications
    Victim Site: sunrise.ch
  54. Alleged data breach of Le Matin
    Category: Data Breach
    Content: A threat actor claims to have leaked the second part of the database from lematin.ma. The exposed data allegedly includes user IDs, names, email addresses, and account details from the website’s user database.
    Date: 2026-03-09T17:23:31Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-lematin-ma-leak-data-PART-2
    Screenshots:
    None
    Threat Actors: p1radox
    Victim Country: Morocco
    Victim Industry: Newspapers & Journalism
    Victim Organization: le matin
    Victim Site: lematin.ma
  55. Alleged Data Leak of Bezala in Finland
    Category: Data Breach
    Content: Threat Actor claims to have leaked the database of Bezala in Finland. The exposed information includes employee details such as names, email addresses, roles, account identifiers, employment information, and system configuration data. The leaked records also includes company information, tax settings, and address details.
    Date: 2026-03-09T17:22:15Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/69
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Finland
    Victim Industry: Financial Services
    Victim Organization: bezala
    Victim Site: app.bezala.com
  56. Alleged leak of Israel data
    Category: Data Breach
    Content: The group claims to have leaked data from Israel.
    Date: 2026-03-09T17:22:05Z
    Network: telegram
    Published URL: https://t.me/Akatsukiyberteam/712
    Screenshots:
    None
    Threat Actors: Akatsuki cyber team (official)
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged data breach of Instituto Colombiano del Dolor
    Category: Data Breach
    Content: A threat actor claims to be selling a database of 750,000 Colombian individuals allegedly linked to INCODOL. The leaked data reportedly includes identification numbers, full names, birth dates, gender, marital status, addresses, phone numbers, occupation, and workplace details.
    Date: 2026-03-09T17:16:18Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-CO-750K-INCODOL
    Screenshots:
    None
    Threat Actors: NyxarGroup
    Victim Country: Colombia
    Victim Industry: Hospital & Health Care
    Victim Organization: instituto colombiano del dolor
    Victim Site: incodol.com
  58. Alleged Leak of Malang City Citizen Population Data
    Category: Data Breach
    Content: A threat actor claims to have leaked citizen population data from Malang City. The exposed dataset allegedly contains names, national ID numbers (NIK), and addresses of residents.
    Date: 2026-03-09T17:12:08Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-DATA-PENDUDUK-KOTA-MALANG
    Screenshots:
    None
    Threat Actors: CyznetAdel
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged data leak of East Lombok Regency Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to East Lombok Regency Government
    Date: 2026-03-09T17:05:00Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/551
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: east lombok regency government
    Victim Site: lomboktimurkab.go.id
  60. Alleged data leak of Israeli Air Force Officers
    Category: Data Breach
    Content: The group claims to have leaked personal information allegedly belonging to 50 officers associated with the Israeli Air Force in Israel. The exposed dataset reportedly includes full names, identification numbers, phone numbers, addresses, photographs, and professional roles, including fighter pilots, drone operators, maintenance technicians, and airstrike planning personnel.
    Date: 2026-03-09T16:59:57Z
    Network: telegram
    Published URL: https://t.me/HANDALA_HPR2/21
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged data breach of Kejaksaan Negeri Gowa
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials for the Kejari Gowa website.
    Date: 2026-03-09T16:58:46Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/588
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Law Enforcement
    Victim Organization: kejaksaan negeri gowa
    Victim Site: kejari-gowa.go.id
  62. Alleged data leak of North Lombok Regency Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to North Lombok Regency Government.
    Date: 2026-03-09T16:52:24Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/551
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: north lombok regency government
    Victim Site: lombokutarakab.go.id
  63. Alleged data leak of Indonesia Deposit Insurance Corporation (LPS)
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Indonesia Deposit Insurance Corporation (LPS)
    Date: 2026-03-09T16:47:55Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/551
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: indonesia deposit insurance corporation (lps)
    Victim Site: lps.go.id
  64. Alleged data leak of Supreme Court of the Republic of Indonesia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Supreme Court of the Republic of Indonesia.
    Date: 2026-03-09T16:45:32Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/551
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Judiciary
    Victim Organization: supreme court of the republic of indonesia
    Victim Site: mahkamahagung.go.id
  65. Alleged data leak of Majalengka Regency Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Majalengka Regency Government.
    Date: 2026-03-09T16:45:28Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/558
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: majalengka regency government
    Victim Site: majalengkakab.go.id
  66. Alleged data leak of Malang Regency Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Malang Regency Government.
    Date: 2026-03-09T16:39:59Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/547
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: malang regency government
    Victim Site: malangkab.go.id
  67. Kementerian Perindustrian Republik Indonesia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Perindustrian Republik Indonesia.
    Date: 2026-03-09T16:38:38Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian perindustrian republik indonesia
    Victim Site: kemenperin.go.id
  68. Alleged Sale of 4 Billion Israeli Phone Numbers and Police Contact Information
    Category: Data Breach
    Content: Threat Actor claims to be selling a massive dataset allegedly containing up to 4 billion Israeli phone numbers, including contact numbers associated with Israeli police.
    Date: 2026-03-09T16:36:19Z
    Network: telegram
    Published URL: https://t.me/c/2878397916/540
    Screenshots:
    None
    Threat Actors: Hider_Nex
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Alleged data leak of Kementerian Pemuda dan Olahraga Republik Indonesia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Pemuda dan Olahraga Republik Indonesia.
    Date: 2026-03-09T16:34:26Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian pemuda dan olahraga republik indonesia
    Victim Site: kemenpora.go.id
  70. Alleged Data Leak of Indonesia Ministry of Education Credentials
    Category: Data Breach
    Content: A threat actor claims to have leaked login credentials associated with multiple platforms under the Indonesia Ministry of Education, Culture, Research, and Technology. The exposed data allegedly includes emails, usernames, IDs, and passwords linked to various education portals such as SSO Datadik, GTK, BOS, ANBK, PIP, and other internal systems.
    Date: 2026-03-09T16:30:34Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of education, culture, research, and technology
    Victim Site: kemdikbud.go.id
  71. Alleged data leak of Kementerian Pemberdayaan Perempuan dan Perlindungan Anak
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Pemberdayaan Perempuan dan Perlindungan Anak.
    Date: 2026-03-09T16:28:05Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian pemberdayaan perempuan dan perlindungan anak
    Victim Site: kemenpppa.go.id
  72. Alleged data leak of Otoritas Jasa Keuangan
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Otoritas Jasa Keuangan.
    Date: 2026-03-09T16:27:39Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/547
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Financial Services
    Victim Organization: otoritas jasa keuangan
    Victim Site: ojk.go.id
  73. Kementerian Pertahanan Republik Indonesia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Pertahanan Republik Indonesia.
    Date: 2026-03-09T16:25:44Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Defense & Space
    Victim Organization: kementerian pertahanan republik indonesia
    Victim Site: kemhan.go.id
  74. Alleged data leak of Kementerian Sosial Republik Indonesia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Sosial Republik Indonesia.
    Date: 2026-03-09T16:21:22Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian sosial republik indonesia
    Victim Site: kemensos.go.id
  75. Alleged Data Leak of Indonesia Ministry of Religious Affairs Credentials
    Category: Data Breach
    Content: A threat actor claims to have leaked login credentials associated with multiple platforms under the Indonesia Ministry of Religious Affairs. The exposed data allegedly includes usernames, emails, and passwords linked to various government education and administrative portals such as EMIS, Madrasah systems, BOS, and internal services
    Date: 2026-03-09T16:21:00Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of religious affairs of the republic of indonesia
    Victim Site: kemenag.go.id
  76. Alleged data leak of Kementerian Kesehatan Republik Indonesia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Kesehatan Republik Indonesia.
    Date: 2026-03-09T16:19:52Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian kesehatan republik indonesia
    Victim Site: kemkes.go.id
  77. Alleged Sale of 40K Land Registry Records in Israel
    Category: Data Breach
    Content: Threat Actor claims to be selling a database allegedly containing approximately 40,000 land registry records in Israel. The dataset includes details such as identity information, category, company names, email addresses, state, city, phone numbers, and website information.
    Date: 2026-03-09T16:15:37Z
    Network: telegram
    Published URL: https://t.me/c/2878397916/540
    Screenshots:
    None
    Threat Actors: Hider_Nex
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged data leak of
    Category: Data Breach
    Content: The group claims to have leaked login credentials to The Open University of Israel.
    Date: 2026-03-09T16:15:29Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/546
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: the open university of israel
    Victim Site: openu.ac.il
  79. Alleged Sale of 10k Email Accounts in Israel
    Category: Data Breach
    Content: Threat Actor claims to be selling a database containing more than 10,000 email accounts allegedly associated with individuals or entities in Israel.
    Date: 2026-03-09T16:15:24Z
    Network: telegram
    Published URL: https://t.me/c/2878397916/540
    Screenshots:
    None
    Threat Actors: Hider_Nex
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged Sale of Bioterrorism Data in Israel
    Category: Data Breach
    Content: Threat Actor claims to be selling a database containing bioterrorism data in Israel.
    Date: 2026-03-09T16:13:58Z
    Network: telegram
    Published URL: https://t.me/c/2878397916/540
    Screenshots:
    None
    Threat Actors: Hider_Nex
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Alleged data leak of Maluku Provincial Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Maluku Provincial Government.
    Date: 2026-03-09T16:11:47Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/554
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: maluku provincial government
    Victim Site: malukuprov.go.id
  82. Alleged Sale of Occupation Data in Israel
    Category: Data Breach
    Content: Threat Actor claims to be selling a database containing occupation data in Israel.
    Date: 2026-03-09T16:09:57Z
    Network: telegram
    Published URL: https://t.me/c/2878397916/540
    Screenshots:
    None
    Threat Actors: Hider_Nex
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. Alleged Data Leak of Indonesia Ministry of Trade Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Trade. The exposed data allegedly includes usernames, email addresses, company accounts, and passwords linked to multiple trade, export, licensing, and procurement portals, indicating potential unauthorized access to ministry systems.
    Date: 2026-03-09T16:09:34Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of trade of the republic of indonesia
    Victim Site: kemendag.go.id
  84. Alleged Data Leak of Indonesia Ministry of Villages and Rural Development Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Villages, Development of Disadvantaged Regions, and Transmigration. The exposed data allegedly includes usernames, identification numbers, email addresses, phone numbers, and passwords linked to multiple government portals and internal systems, indicating potential unauthorized access to ministry services and administrative platforms.
    Date: 2026-03-09T16:08:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of villages, development of disadvantaged regions, and transmigration
    Victim Site: kemendesa.go.id
  85. Alleged data leak of Government of North Maluku Province
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Government of North Maluku Province.
    Date: 2026-03-09T16:07:36Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/560
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of north maluku province
    Victim Site: malut.go.id
  86. Alleged Data Leak of Indonesia Ministry of Home Affairs Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Home Affairs. The exposed data allegedly includes usernames, identification numbers, emails, and passwords linked to multiple government systems and regional administrative portals.
    Date: 2026-03-09T16:04:13Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of home affairs
    Victim Site: kemendagri.go.id
  87. Alleged data leak of Pemerintah Kabupaten Pamekasan
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Pemerintah Kabupaten Pamekasan.
    Date: 2026-03-09T16:01:10Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/544
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: pemerintah kabupaten pamekasan
    Victim Site: pamekasankab.go.id
  88. Alleged data leak of Riau Islands Provincial Communication and Information Office
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Riau Islands Provincial Communication and Information Office.
    Date: 2026-03-09T15:56:28Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: riau islands provincial communication and information office
    Victim Site: kepriprov.go.id
  89. Alleged Data Leak of Indonesia Ministry of Finance Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Finance. The exposed data allegedly includes usernames, email addresses, identification numbers, and passwords linked to multiple government portals and internal systems, indicating potential unauthorized access to financial and administrative services.
    Date: 2026-03-09T15:53:53Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of finance of the republic of indonesia
    Victim Site: kemenkeu.go.id
  90. Alleged data leak of Kementerian Komunikasi dan Digital RI
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Kementerian Komunikasi dan Digital RI.
    Date: 2026-03-09T15:51:09Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian komunikasi dan digital ri
    Victim Site: kominfo.go.id
  91. Alleged Data Leak of Indonesia Ministry of Cooperatives and SMEs Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked multiple login credentials associated with platforms under the Indonesian Ministry of Cooperatives and Small and Medium Enterprises . The exposed data allegedly includes usernames, email addresses, and passwords linked to several ministry portals and services, indicating potential unauthorized access to government systems.
    Date: 2026-03-09T15:48:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of cooperatives and small and medium enterprises
    Victim Site: kemenkopukm.go.id
  92. Alleged data leak of Komisi Nasional Hak Asasi Manusia
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Komisi Nasional Hak Asasi Manusia.
    Date: 2026-03-09T15:41:04Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: komisi nasional hak asasi manusia
    Victim Site: komnasham.go.id
  93. Alleged Data Leak of Indonesia Ministry of Law and Human Rights Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Law and Human Rights. The exposed data allegedly includes account usernames, email addresses, and passwords linked to various government portals and internal systems, indicating potential unauthorized access to multiple ministry services.
    Date: 2026-03-09T15:40:28Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of law and human rights of the republic of indonesia
    Victim Site: kemenkumham.go.id
  94. Alleged data leak of Komisi Pemberantasan Korupsi
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Komisi Pemberantasan Korupsi.
    Date: 2026-03-09T15:38:38Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/561
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: komisi pemberantasan korupsi
    Victim Site: kpk.go.id
  95. Alleged Data Leak of Indonesia Ministry of Tourism and Creative Economy Accounts
    Category: Data Breach
    Content: Threat Actor claims to have leaked multiple login credentials associated with platforms under the Indonesian Ministry of Tourism and Creative Economy (kemenparekraf.go.id). The exposed data allegedly includes numerous account credentials linked to various ministry services and portals, indicating potential unauthorized access to government-related systems and user accounts.
    Date: 2026-03-09T15:35:20Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/571
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: indonesian ministry of tourism and creative economy
    Victim Site: kemenparekraf.go.id
  96. Alleged leak of data related to Basij Forces
    Category: Data Breach
    Content: Group claims to have leaked personal data of about 40,000 Basij forces across Iran.
    Date: 2026-03-09T15:32:52Z
    Network: telegram
    Published URL: https://t.me/youranon_storm/1319
    Screenshots:
    None
    Threat Actors: Anonymous
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged data leak of North Maluku Provincial Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to North Maluku Provincial Government.
    Date: 2026-03-09T15:17:27Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/554
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: north maluku provincial government
    Victim Site: malutprov.go.id
  98. Alleged data leak of Manokwari Regency Government
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Manokwari Regency Government.
    Date: 2026-03-09T15:11:41Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/554
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: manokwari regency government
    Victim Site: manokwarikab.go.id
  99. Alleged Leak of Admin and Login Credentials to Arty.mn
    Category: Data Breach
    Content: The group claims to have leaked Admin and Login Credentials to Arty.mn.
    Date: 2026-03-09T15:08:12Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/70
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Mongolia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: arty.mn
    Victim Site: arty.mn
  100. Alleged data breach of Slavia Pojišťovna
    Category: Data Breach
    Content: A threat actor claims to have leaked 150GB of insurance data from Slavia Pojišťovna. The data allegedly includes insurance documents, claims, and client communications.
    Date: 2026-03-09T14:56:08Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-CZ-Slavia-Pojistovna-Insurance
    Screenshots:
    None
    Threat Actors: bytetobreach
    Victim Country: Czech Republic
    Victim Industry: Insurance
    Victim Organization: slavia pojišťovna
    Victim Site: slavia-pojistovna.cz
  101. Alleged data leak of National Defence University, Pakistan
    Category: Data Breach
    Content: National Defence UniversityThe threat actor claims to have leaked data from National Defence University (NDU). the exposed information include details of officers affiliated with or associated with the university,
    Date: 2026-03-09T14:37:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Leak-Data-National-Defence-University-Pakistan
    Screenshots:
    None
    Threat Actors: Jon1234
    Victim Country: Pakistan
    Victim Industry: Government Administration
    Victim Organization: national defence university
    Victim Site: ndu.edu.pk
  102. Alleged data sale of Isrotel Hotel Chain
    Category: Data Breach
    Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including Isrotel Hotel Chain, along with data from multiple Israeli hotel websites.
    Date: 2026-03-09T14:33:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
    Screenshots:
    None
    Threat Actors: Ashborn
    Victim Country: Israel
    Victim Industry: Hospitality & Tourism
    Victim Organization: isrotel hotel chain
    Victim Site: isrotel.com
  103. Alleged data sale of Arkia Israeli airlines
    Category: Data Breach
    Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including Arkia Israeli airlines, along with data from multiple Israeli hotel websites.
    Date: 2026-03-09T14:25:21Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
    Screenshots:
    None
    Threat Actors: Ashborn
    Victim Country: Israel
    Victim Industry: Airlines & Aviation
    Victim Organization: arkia israeli airlines
    Victim Site: arkia.co.il
  104. Alleged data breach of Ministry of Health of Mexico
    Category: Data Breach
    Content: The threat actor claims to have breached the database from Ministry of Health of Mexico, reportedly containing 22,077 files. The leaked materials allegedly include official letters, emails, internal documentation, and administrative records.
    Date: 2026-03-09T14:24:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-Mexico-Secretaria-de-Salud-Tamaulipas-22-077-files
    Screenshots:
    None
    Threat Actors: Straightonumberone
    Victim Country: Mexico
    Victim Industry: Government Administration
    Victim Organization: ministry of health of mexico
    Victim Site: tamaulipas.gob.mx
  105. Alleged data sale of Bezeq
    Category: Data Breach
    Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including Bezeq, along with data from multiple Israeli hotel websites.
    Date: 2026-03-09T14:18:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
    Screenshots:
    None
    Threat Actors: Ashborn
    Victim Country: Israel
    Victim Industry: Network & Telecommunications
    Victim Organization: bezeq
    Victim Site: bezeq.co.il
  106. Alleged data sale of Israel Post
    Category: Data Breach
    Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including IsraelPost, along with data from multiple Israeli hotel websites.
    Date: 2026-03-09T14:17:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
    Screenshots:
    None
    Threat Actors: Ashborn
    Victim Country: Israel
    Victim Industry: Government Administration
    Victim Organization: israel post
    Victim Site: israelpost.co.il
  107. Alleged data breach of Jambi Provincial Government
    Category: Data Breach
    Content: The group claims to have breached data from Jambi Provincial Government.
    Date: 2026-03-09T14:11:07Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/521
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: jambi provincial government
    Victim Site: jambiprov.go.id
  108. Alleged Sale of Casino Data from Brazil and China
    Category: Data Breach
    Content: The threat actor claims to be selling casino-related data allegedly sourced from organizations in Brazil and China.
    Date: 2026-03-09T13:56:17Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277879/
    Screenshots:
    None
    Threat Actors: faqwe789
    Victim Country: China
    Victim Industry: Gambling & Casinos
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged data leak of Government of the Province of Bangka Belitung Islands
    Category: Data Breach
    Content: The group claims to have leaked data from Government of the Province of Bangka Belitung Islands.
    Date: 2026-03-09T13:56:13Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/516
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of the province of bangka belitung islands
    Victim Site: babelprov.go.id
  110. Alleged data breach of Lev Academic Center
    Category: Data Breach
    Content: The group claims to have breached data from Lev Academic Center.
    Date: 2026-03-09T13:42:51Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/521
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: lev academic center
    Victim Site: jct.ac.il
  111. Alleged Advertisement of NFC Payment Emulation Tool “NFCRipper”
    Category: Malware
    Content: The threat actor claims to be advertising an Android-based application named NFCRipper, which is designed for NFC relay, capture, replay, and contactless payment emulation. The tool supports features such as recording NFC sessions, replaying captured data, cloning cards, and emulating contactless payments at POS or ATM terminals. The application can operate using two phones or an external chip reader and includes a web panel for managing devices, monitoring logs, and controlling relay sessions. The post also mentions capabilities such as CVM bypass and session tracking, with access reportedly secured through a server-side TOTP system.
    Date: 2026-03-09T13:42:36Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277888/
    Screenshots:
    None
    Threat Actors: jinkusu01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: nfccripper.su
  112. Alleged data leak of jogja.go.id
    Category: Data Breach
    Content: The group claims to have leaked data from jogja.go.id
    Date: 2026-03-09T13:41:45Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/521
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jogja.go.id
  113. Alleged unauthorized access to a remote heating system in Baku
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to an unidentified remote heating system in Baku.
    Date: 2026-03-09T13:37:25Z
    Network: telegram
    Published URL: https://t.me/armeniancode_eng/59
    Screenshots:
    None
    Threat Actors: Armenian code
    Victim Country: Azerbaijan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  114. Alleged data leak of jatim.go.id
    Category: Data Breach
    Content: The group claims to have leaked data from jatim.go.id
    Date: 2026-03-09T13:34:40Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/521
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jatim.go.id
  115. Alleged Sale of Spain PrestaShop Order Redirect Access
    Category: Initial Access
    Content: The threat actor claims to be selling access to a Spain-based PrestaShop redirect associated with 3,216 orders generated over a three-month period (from 2025-12-08 to 2026-03-08), allegedly processed via Redsys.
    Date: 2026-03-09T13:30:46Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277886/
    Screenshots:
    None
    Threat Actors: WOC
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged data leak of Government of Kulon Progo Regency
    Category: Data Breach
    Content: The group claims to have leaked data from Government of Kulon Progo Regency.
    Date: 2026-03-09T13:28:08Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/482
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of kulon progo regency
    Victim Site: kulonprogokab.go.id
  117. Alleged Sale of Compromised Mexican E-commerce Shop Access
    Category: Initial Access
    Content: The threat actor claims to be selling access to a compromised Mexico-based online shop that sells Xiaomi electronics. The actor allegedly obtained database access through an SQL injection vulnerability in the ECSHOP CMS and claims to have administrative panel access with full admin permissions. The actor states that this access allows running SQL queries and uploading plugins and themes. The shop processes credit card payments via OpenPay redirect and reportedly has over 580,000 total orders, with hundreds of credit card transactions recorded in recent months
    Date: 2026-03-09T13:24:05Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277883/
    Screenshots:
    None
    Threat Actors: savel987
    Victim Country: Mexico
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Alleged data leak of Government of Kutai Kartanegara Regency
    Category: Data Breach
    Content: The group claims to have leaked data from Government of Kutai Kartanegara Regency.
    Date: 2026-03-09T13:22:53Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/482
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of kutai kartanegara regency
    Victim Site: kutaikartanegarakab.go.id
  119. Alleged data leak of Government of Lampung Province
    Category: Data Breach
    Content: The group claims to have leaked data from Government of Lampung Province.
    Date: 2026-03-09T13:20:58Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/482
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: government of lampung province
    Victim Site: lampungprov.go.id
  120. Alleged Sale of 330 U.S. Credit Card Records
    Category: Data Breach
    Content: The threat actor claims to be selling 330 U.S.-based credit card records, allegedly with a 70% valiaddresses. The actor states that the dataset includes sensitive financial and personal information such as credit card numbers, expiration dates, CVV2 codes, full names, addresses, emails, and phone numbers
    Date: 2026-03-09T13:20:11Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277882/
    Screenshots:
    None
    Threat Actors: corptoday
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Alleged leak of AID receipt database
    Category: Data Breach
    Content: The threat actor claims to have leaked an AID receipt database containing personal records, including names, national identification numbers (NIK), addresses, and related registration details.
    Date: 2026-03-09T13:19:02Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Aid-Receipt-Database-Share-By-YanXploit
    Screenshots:
    None
    Threat Actors: YanXploit
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  122. Alleged data leak of Lembaga Administrasi Negara
    Category: Data Breach
    Content: The group claims to have leaked data from Lembaga Administrasi Negara.
    Date: 2026-03-09T13:05:04Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/473
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: lembaga administrasi negara
    Victim Site: lan.go.id
  123. Alleged data breach of Tabanan Regency Government
    Category: Data Breach
    Content: The group claims to have breached data from Tabanan Regency Government.
    Date: 2026-03-09T13:04:47Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/433
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: tabanan regency government
    Victim Site: tabanankab.go.id
  124. Alleged data leak of LKPP
    Category: Data Breach
    Content: The group claims to have leaked data from LKPP.
    Date: 2026-03-09T12:59:34Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/474
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: lkpp
    Victim Site: lkpp.go.id
  125. Alleged data leak of Badung Regency Government
    Category: Data Breach
    Content: The group claims to have leaked data from Badung Regency Government.
    Date: 2026-03-09T12:58:49Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/515
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: badung regency government
    Victim Site: badungkab.go.id
  126. Alleged data leak of Subang Regency Government
    Category: Data Breach
    Content: The group claims to have leaked data from Subang Regency Government.
    Date: 2026-03-09T12:53:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/453
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: subang regency government
    Victim Site: subang.go.id
  127. Ministry of State Secretariat of the Republic of Indonesia
    Category: Data Breach
    Content: Ministry of State Secretariat of the Republic of Indonesia.
    Date: 2026-03-09T12:51:58Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/458
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: ministry of state secretariat of the republic of indonesia
    Victim Site: setneg.go.id
  128. Alleged data leak of Central Lombok Regency Government
    Category: Data Breach
    Content: The group claims to have leaked data from Central Lombok Regency Government.
    Date: 2026-03-09T12:51:05Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/473
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: central lombok regency government
    Victim Site: lomboktengahkab.go.id
  129. Alleged data leak of Sidrap Regency Government
    Category: Data Breach
    Content: The group claims to have leaked data from Sidrap Regency Government
    Date: 2026-03-09T12:50:26Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/456
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sidrap regency government
    Victim Site: sidrapkab.go.id
  130. Alleged data breach of Tel-Hai University of Kiryat Shmona in the Galilee
    Category: Data Breach
    Content: The group claims to have breached data from Tel-Hai University of Kiryat Shmona in the Galilee.
    Date: 2026-03-09T12:50:23Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/433
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: tel-hai university of kiryat shmona in the galilee
    Victim Site: telhai.ac.il
  131. Alleged data leak of West Kalimantan Provincial Government
    Category: Data Breach
    Content: Group claims to have leaked data from West Kalimantan Provincial Government.
    Date: 2026-03-09T12:49:09Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/469
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: west kalimantan provincial government
    Victim Site: kalbarprov.go.id
  132. Alleged data leak of Provincial Government of North Kalimantan
    Category: Data Breach
    Content: Group claims to have leaked data from Provincial Government of North Kalimantan.
    Date: 2026-03-09T12:47:44Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/469
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: provincial government of north kalimantan
    Victim Site: kaltaraprov.go.id
  133. Alleged data leak of Sekretariat Kabinet Republik Indonesia
    Category: Data Breach
    Content: The group claims to have leaked data from Sekretariat Kabinet Republik Indonesia
    Date: 2026-03-09T12:47:04Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/459
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sekretariat kabinet republik indonesia
    Victim Site: setkab.go.id
  134. Alleged data leak of Kabupaten Lombok Barat
    Category: Data Breach
    Content: The group claims to have leaked data from Kabupaten Lombok Barat.
    Date: 2026-03-09T12:43:27Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/475
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kabupaten lombok barat
    Victim Site: lombokbaratkab.go.id
  135. Alleged data leak of Sleman Regency Government
    Category: Data Breach
    Content: The group claims to have leaked data from Sleman Regency Government.
    Date: 2026-03-09T12:42:11Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/455
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sleman regency government
    Victim Site: sleman.go.id
  136. Alleged leak of data from the official Portal of the Riau Provincial Government
    Category: Data Breach
    Content: The threat actor claims to have leaked data from the official Portal of the Riau Provincial Government.
    Date: 2026-03-09T12:40:13Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/483
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: official portal of the riau provincial government
    Victim Site: riau.go.id
  137. Alleged data leak of Sorong Regency Government
    Category: Data Breach
    Content: The group claims to have leaked data from Sorong Regency Government.
    Date: 2026-03-09T12:39:39Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/454
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sorong regency government
    Victim Site: sorongkab.go.id
  138. Alleged data leak of Kejaksaan Agung Republik Indonesia
    Category: Data Breach
    Content: Group claims to have leaked data from Kejaksaan Agung Republik Indonesia.
    Date: 2026-03-09T12:37:15Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/467
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kejaksaan agung republik indonesia
    Victim Site: kejaksaan.go.id
  139. Alleged data leak of SCE – Shamoon College of Engineering
    Category: Data Breach
    Content: The group claims to have leaked data from SCE – Shamoon College of Engineering.
    Date: 2026-03-09T12:35:32Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/460
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Higher Education/Acadamia
    Victim Organization: sce – shamoon college of engineering
    Victim Site: sce.ac.il
  140. Alleged data leak of Ruppin Academic Center
    Category: Data Breach
    Content: The group claims to have leaked data from Ruppin Academic Center.
    Date: 2026-03-09T12:33:52Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/462
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: ruppin academic center
    Victim Site: ruppin.ac.il
  141. Alleged data leak of Sukabumi Regency
    Category: Data Breach
    Content: The group claims to have leaked data from Sukabumi Regency.
    Date: 2026-03-09T12:32:56Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/452
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sukabumi regency
    Victim Site: sukabumikab.go.id
  142. Alleged data leak of West Sulawesi Provincial Government
    Category: Data Breach
    Content: The group claims to have leaked data from West Sulawesi Provincial Government.
    Date: 2026-03-09T12:21:22Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/451
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: west sulawesi provincial government
    Victim Site: sulbarprov.go.id
  143. Alleged data breach of Yantai Dehe Labor Service Co., Ltd.
    Category: Data Breach
    Content: The threat actor claims to have breached the databse from Yantai Dehe Labor Service Co., Ltd. the reportedly include files related to employment contracts, employee resumes, contact details, business reports, and internal administrative records.
    Date: 2026-03-09T12:18:59Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1263
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Information Services
    Victim Organization: yantai dehe labor service co., ltd.
    Victim Site: yttrade.com
  144. Alleged data leak of Regional Government of Sumenep Regency
    Category: Data Breach
    Content: The group claims to have leaked data from Regional Government of Sumenep Regency.
    Date: 2026-03-09T12:13:47Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/444
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: regional government of sumenep regency
    Victim Site: sumenepkab.go.id
  145. Alleged data leak of Southeast Sulawesi Province
    Category: Data Breach
    Content: The group claims to have leaked data from Southeast Sulawesi Province.
    Date: 2026-03-09T12:09:22Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/447
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: southeast sulawesi province
    Victim Site: sultraprov.go.id
  146. SYLHET GANG-SG claims to target unidentified web cameras in Israel
    Category: Alert
    Content: A recent post by the group indicates that they are targeting unidentified web cameras in Israel .
    Date: 2026-03-09T11:42:17Z
    Network: telegram
    Published URL: https://t.me/SylhetGangSG1/7503
    Screenshots:
    None
    Threat Actors: SYLHET GANG-SG
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  147. Alleged sale of MBoster Traffic V4
    Category: Malware
    Content: The threat actor claims to be selling a malware tool called MBoster Traffic V4, allegedly designed to automate international web traffic and manipulate SEO metrics, featuring Advanced HTTP Injection and a video/browser engine to simulate real user activity.
    Date: 2026-03-09T11:40:45Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-RELEASE-AND-LATEST-MBOSTER-TRAFFIC-V4-AUTO-ADVANCED-INTERNATIONAL-VISIT-AND-SEO
    Screenshots:
    None
    Threat Actors: sxxone
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  148. XYZ targets the website stanleyoil.ae
    Category: Defacement
    Content: The threat actor claims to have defaced the website stanleyoil.ae
    Date: 2026-03-09T10:16:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808460
    Screenshots:
    None
    Threat Actors: XYZ
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: stanleyoil
    Victim Site: stanleyoil.ae
  149. L4663R666H05T targets the website of Showracks Trading LLC
    Category: Defacement
    Content: The group claims to have defaced the website of Showracks Trading LLC.
    Date: 2026-03-09T10:12:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808139
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Professional Services
    Victim Organization: showracks trading llc
    Victim Site: showrack.ae
  150. Alleged data breach of Lycée Déodat de Séverac
    Category: Data Breach
    Content: The threat actor claims to have breached the database from Lycée Déodat de Séverac, The dataset contains 6,227 student records.
    Date: 2026-03-09T10:12:16Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-Lyc%C3%A9e-D%C3%A9odat-de-S%C3%A9verac-deodat-mon-ent-occitanie-fr-6227-kids
    Screenshots:
    None
    Threat Actors: GenesisGroup
    Victim Country: France
    Victim Industry: Education
    Victim Organization: lycée déodat de séverac
    Victim Site: deodat.mon-ent-occitanie.fr
  151. L4663R666H05T targets the website of Satraj
    Category: Defacement
    Content: Group claims to have defaced the website of Satraj.
    Date: 2026-03-09T10:09:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/807789
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: E-commerce & Online Stores
    Victim Organization: satraj
    Victim Site: satraj.ae
  152. L4663R666H05T targets the website of Hard Disk Direct
    Category: Defacement
    Content: The group claims to have defaced the website Hard Disk Direct.
    Date: 2026-03-09T10:08:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/807029
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Computer Hardware
    Victim Organization: hard disk direct
    Victim Site: harddiskdirect.ae
  153. L4663R666H05T targets the website of Homes r Us
    Category: Defacement
    Content: Group claims to have deface the website of Homes r Us.
    Date: 2026-03-09T10:07:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/806108
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Furniture
    Victim Organization: homes r us
    Victim Site: mcstaging2.homesrus.ae
  154. L4663R666H05T targets the website ITProduts.ae
    Category: Defacement
    Content: The group claims to have defaced the website ITProduts.ae
    Date: 2026-03-09T10:07:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/807478
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: E-commerce & Online Stores
    Victim Organization: itproduts.ae
    Victim Site: itproduts.ae
  155. Alleged data breach of ASPTT Omnisports Federation
    Category: Data Breach
    Content: The threat actor claims to have breached 1,005,361 unique records from ASPTT Omnisports Federation, registration data from 2014 to 2026. The dataset reportedly includes email addresses, phone numbers, and club-related information.
    Date: 2026-03-09T09:58:46Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-FR-F%C3%A9d%C3%A9ration-Omnisports-ASPTT
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: asptt omnisports federation
    Victim Site: asptt.com
  156. Alleged data breach of Côte Sushi
    Category: Data Breach
    Content: The threat actor claims to have breached 1,101,303 records from Côte Sushi, The dataset reportedly includes personal information such as first and last names, dates of birth, email addresses, and phone numbers belonging to customers.
    Date: 2026-03-09T09:56:28Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-Cote-Sushi-cotesushi-com-1-101-303-users
    Screenshots:
    None
    Threat Actors: GenesisGroup
    Victim Country: France
    Victim Industry: Food & Beverages
    Victim Organization: côte sushi
    Victim Site: cotesushi.com
  157. Alleged data breach of Earth Telecommunication Pvt Ltd
    Category: Data Breach
    Content: The group claims to have compromised systems associated with Earth Telecommunication Pvt. Ltd. and disclosed login credentials along with references to a large database allegedly exceeding 300 GB. The compromised data reportedly contains device and tracking-related information such as IMEI numbers, tracker IDs, device types, location data, and decoded messaging records.
    Date: 2026-03-09T09:45:44Z
    Network: telegram
    Published URL: https://t.me/Solo_apt_by_kafir/2
    Screenshots:
    None
    Threat Actors: SOLO APT by Kafir
    Victim Country: Bangladesh
    Victim Industry: Network & Telecommunications
    Victim Organization: earth telecommunication pvt ltd
    Victim Site: earth.net.bd
  158. Alleged unauthorized access to unidentified industrial pumping control system
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorized access to an industrial control system (ICS) associated with pumping equipment.
    Date: 2026-03-09T09:21:29Z
    Network: telegram
    Published URL: https://t.me/ShadowClawZ404/49
    Screenshots:
    None
    Threat Actors: Shadow ClawZ 404
    Victim Country: Unknown
    Victim Industry: Industrial Automation
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Hax.or targets the website of dailyplanner.w3inventor.pw
    Category: Defacement
    Content: The group claims to have defaced the website of dailyplanner.w3inventor.pw.
    Date: 2026-03-09T08:20:38Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129064
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dailyplanner.w3inventor.pw
  160. Alleged data breach of Calai
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Calai, The compressed 1.49GB file reportedly contains sensitive information for 3 million users. The allegedly dataset Includes emails, DOBs, names, height, weight, gender, subscription details, meal tracking, exercise goals, referrals, and transaction IDs.
    Date: 2026-03-09T08:01:24Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-calai-app-Vibecoded-Slop-Calorie-Tracking-App-3M-Subscribers-FRESH-RELEASE
    Screenshots:
    None
    Threat Actors: vibecodelegend
    Victim Country: USA
    Victim Industry: Health & Fitness
    Victim Organization: calai
    Victim Site: calai.app
  161. Hax.or targets the websites of GEO-SUD
    Category: Defacement
    Content: The group claims to have defaced the websites of GEO-SUD.
    Date: 2026-03-09T08:00:36Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129066
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Morocco
    Victim Industry: Civil Engineering
    Victim Organization: geo-sud
    Victim Site: geosud.ma
  162. Hax.or targets the website of heavy.stagingweb.net
    Category: Defacement
    Content: The group claims to have defaced the website of heavy.stagingweb.net
    Date: 2026-03-09T07:48:47Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129063
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: heavy.stagingweb.net
  163. Hax.or targets the website of Tapteng Regency
    Category: Defacement
    Content: The group claims to have defaced the website of Tapteng Regency.
    Date: 2026-03-09T07:44:47Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129062
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: tapteng regency
    Victim Site: terangdinaskb.tapteng.go.id
  164. Alleged unauthorized access to security cameras in Jerusalem
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to security cameras in the city of Jerusalem, Israel.
    Date: 2026-03-09T07:37:19Z
    Network: openweb
    Published URL: https://x.com/HPRSEC/status/2030903146248019975
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged unauthorized access to unidentified music system in Israel
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorized access to an unidentified music system in Israel, alleging control over parts of the platform’s infrastructure and the ability to monitor internal operations.
    Date: 2026-03-09T07:32:03Z
    Network: telegram
    Published URL: https://t.me/teambcs404/347
    Screenshots:
    None
    Threat Actors: Team Bangladesh cyber squad
    Victim Country: Israel
    Victim Industry: Music
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Alleged login access to A.J. Plast Public Company Limited
    Category: Initial Access
    Content: The group claims to have gained login access to A.J. Plast Public Company Limited
    Date: 2026-03-09T06:22:50Z
    Network: telegram
    Published URL: https://t.me/blueshadow67/221
    Screenshots:
    None
    Threat Actors: Blue Shadow
    Victim Country: Thailand
    Victim Industry: Plastics
    Victim Organization: a.j. plast public company limited
    Victim Site: ajplast.co.th
  167. Alleged Data Breach of Be Yeu
    Category: Data Breach
    Content: Threat actor claims to have leaked data associated with beyeu.com.Beyeu.com was a Vietnam-based e-commerce platform focused on baby and family products and later transitioned into the Bé Yêu pregnancy and baby care application.
    Date: 2026-03-09T05:44:01Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277861/?tab=comments#comment-1660753
    Screenshots:
    None
    Threat Actors: HighRisk
    Victim Country: Vietnam
    Victim Industry: E-commerce & Online Stores
    Victim Organization: be yeu
    Victim Site: beyeu.com
  168. Alleged Sale of Besox Bank Customer Information
    Category: Data Breach
    Content: The threat actor claims to be selling the database of Besox Bank, the dataset contains bank customer informations. The dataset with a stated price of $5,000, described as negotiable.
    Date: 2026-03-09T05:31:55Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Besox-Bank-Customer-Info
    Screenshots:
    None
    Threat Actors: Yrmnxcro
    Victim Country: Switzerland
    Victim Industry: Banking & Mortgage
    Victim Organization: besox bank
    Victim Site: besox.be
  169. Alleged sale of unauthorized Multiple accesses to unidentified Presta shop in Portugal
    Category: Initial Access
    Content: Threat actor claims to be selling administrator access, including webshell access, to a Portugal-based PrestaShop e-commerce store. The listing reports approximately 141,218 total orders, with recent transactions reportedly processed via card payments through a redirect to Vivapayments. The access is offered via auction starting at USD 400 with a buy-now price of USD 1,000.
    Date: 2026-03-09T05:25:37Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277863/
    Screenshots:
    None
    Threat Actors: Matteo
    Victim Country: Portugal
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Alleged Data Breach of Free Mobile Panel Access
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Free Mobile; the dataset contains login credentials providing access to internal Free Mobile panels.
    Date: 2026-03-09T05:15:09Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FREE-MOBILE-PANEL-LOGIN-FRANCE
    Screenshots:
    None
    Threat Actors: M4nifest
    Victim Country: France
    Victim Industry: Network & Telecommunications
    Victim Organization: free mobile
    Victim Site: mobile.free.fr
  171. Alleged data breach of Auchan
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Auchan. The compromised data reportedly contain 1,087,650 records including Customer ID, Customer Name, First name, Last name, Phone number, Email, Card Number, Address, Zip code information.
    Date: 2026-03-09T04:51:54Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-VERIFIED-FR-AUCHAN-FR-BREACH
    Screenshots:
    None
    Threat Actors: keta
    Victim Country: France
    Victim Industry: E-commerce & Online Stores
    Victim Organization: auchan
    Victim Site: auchan.fr
  172. Alleged Data Breach of Yummy Rides
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Yummy Rides, the dataset includes photos of drivers alongside their full names, suggesting the data may originate from driver profiles or internal platform records.
    Date: 2026-03-09T04:17:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FREE-DB-YUMMY-RIDES-Venezuela-30k-Images-With-Full-Names-Of-The-Drivers
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Venezuela
    Victim Industry: Transportation & Logistics
    Victim Organization: yummy rides
    Victim Site: yummyrides.com
  173. Alleged Unauthorized Access to a Bar Video Surveillance System in the USA
    Category: Initial Access
    Content: The group claims to have gained remote access to the video surveillance system of a bar located in Palmerton, Pennsylvania, USA.
    Date: 2026-03-09T03:54:46Z
    Network: telegram
    Published URL: https://t.me/c/3792806777/12
    Screenshots:
    None
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: USA
    Victim Industry: Food & Beverages
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Alleged Leak of UK Consumer Leads Dataset
    Category: Data Breach
    Content: The threat actor claims to have leaked UK Consumer Leads Dataset, the dataset contains personal contact information such as names, email addresses, phone numbers, dates of birth, and full residential addresses within the United Kingdom.
    Date: 2026-03-09T03:53:39Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DOCUMENTS-UK-FULL-INFO-CONSUMER-LEADS-1M
    Screenshots:
    None
    Threat Actors: smokethislist
    Victim Country: UK
    Victim Industry: Consumer Services
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Alleged unauthorized access to National Center of Informatics
    Category: Initial Access
    Content: The group claims to have allegedly gained unauthorized access to National Center of Informatics.
    Date: 2026-03-09T02:48:07Z
    Network: telegram
    Published URL: https://t.me/TheBlackMaskers/268
    Screenshots:
    None
    Threat Actors: BlackMaskers Army
    Victim Country: Tunisia
    Victim Industry: Government & Public Sector
    Victim Organization: national center of informatics
    Victim Site: cni.tn
  176. THE GHOSTS IN THE MACHINE claims to target Israel Defense Forces
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Israel Defense Forces
    Date: 2026-03-09T02:27:26Z
    Network: telegram
    Published URL: https://t.me/TheGhostITM/339
    Screenshots:
    None
    Threat Actors: THE GHOSTS IN THE MACHINE
    Victim Country: Israel
    Victim Industry: Defense & Space
    Victim Organization: israel defense forces
    Victim Site: Unknown
  177. Cyber Islamic Resistance targets the website of University of Business and Technology
    Category: Defacement
    Content: The group claims to have defaced the website of University of Business and Technology.
    Date: 2026-03-09T02:09:57Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1696
    Screenshots:
    None
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Saudi Arabia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: university of business and technology
    Victim Site: staging.ubt.edu.sa
  178. Alleged unauthorized access to yayasan-wahdini.or.id
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to yayasan-wahdini.or.id
    Date: 2026-03-09T02:07:18Z
    Network: telegram
    Published URL: https://t.me/c/2622575053/1591
    Screenshots:
    None
    Threat Actors: NOTRASEC TEAM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: yayasan-wahdini.or.id
  179. Alleged Data Breach of Agencia Tributaria
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Agencia Tributaria , the dataset contains personal information of employees.
    Date: 2026-03-09T01:49:24Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SPAIN-AGENCIA-TRIBUTARIA-AEAT
    Screenshots:
    None
    Threat Actors: PoliceEspDoxedBF
    Victim Country: Spain
    Victim Industry: Government Administration
    Victim Organization: agencia estatal de administración tributaria (aeat)
    Victim Site: agenciatributaria.es
  180. Alleged leak of Israel database
    Category: Data Breach
    Content: The group claims to have leaked passports and birth certificates of 120 Israeli citizens.
    Date: 2026-03-09T01:37:01Z
    Network: telegram
    Published URL: https://t.me/Akatsukiyberteam/705
    Screenshots:
    None
    Threat Actors: Akatsuki cyber team (official)
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged Data Breach of Weizmann Institute of Science
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Weizmann Institute of Science. The dataset contains information related to students, researchers, and academic staff.
    Date: 2026-03-09T01:36:53Z
    Network: telegram
    Published URL: https://t.me/MR_X10_SY/100—
    Screenshots:
    None
    Threat Actors: MRX10-SY
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: weizmann institute of science
    Victim Site: weizmann.ac.il
  182. 313 Team targets the official website of Specialized Medical Care Center
    Category: Defacement
    Content: Group claims to have defaced the official website of Specialized Medical Care Center.
    Date: 2026-03-09T01:21:22Z
    Network: telegram
    Published URL: https://t.me/xX313XxTeam/687
    Screenshots:
    None
    Threat Actors: 313 Team
    Victim Country: Saudi Arabia
    Victim Industry: Hospital & Health Care
    Victim Organization: specialized medical care center
    Victim Site: smcc.sa
  183. Alleged Sale of Infutor Database
    Category: Data Breach
    Content: Threat actor claims to be selling the database of Infutor. The dataset contains 676,798,866 records of American citizens, including information such as full names, dates of birth, addresses, phone numbers, and Social Security Numbers.
    Date: 2026-03-09T00:30:52Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Infutor-com-676M
    Screenshots:
    None
    Threat Actors: Spirigatito
    Victim Country: USA
    Victim Industry: Consumer Services
    Victim Organization: infutor
    Victim Site: infutor.com
  184. Alleged Data Breach of Pompiers 13
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Pompiers 13, the dataset contains 6,841 records.
    Date: 2026-03-09T00:16:29Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-Pompier-du-13-SDIS13
    Screenshots:
    None
    Threat Actors: GenesisGroup
    Victim Country: France
    Victim Industry: Government Relations
    Victim Organization: pompiers 13
    Victim Site: pompiers13.fr
  185. Alleged Sale of Stripe Accounts in USA
    Category: Initial Access
    Content: Threat actor claims to be selling five ID-verified Stripe accounts registered in the United States. The seller states each account includes a USD 10 clean charge and is ready for card processing. The listing is offered via auction starting at USD 1,600 with a buy-now price of USD 2,200.
    Date: 2026-03-09T00:03:53Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277848/
    Screenshots:
    None
    Threat Actors: Cuatro
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown