1. Executive Summary
This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data. The drafted data logs a wide array of malicious activities occurring primarily on March 10, 2026, across various networks, including the “openweb” and Telegram.
The recorded incidents span multiple distinct categories of cyber threats: Data Breaches, Defacements, Initial Access sales, direct Cyber Attacks, and preemptive Alerts issued by threat actors. Threat actors have demonstrated a global reach, compromising government institutions, military and intelligence sectors, financial services, healthcare providers, and private enterprises.
2. Threat Actor Profiling and Campaign Analysis
The data reveals highly active threat groups and individuals conducting coordinated campaigns.
2.1 UNDERGROUND-NET
This threat actor engaged in a massive, coordinated web defacement campaign primarily targeting the Indian manufacturing, electrical, and industrial sectors.
- Target Locations: India (predominantly) and South Africa.
- Victims: Shubham Hall, Savita Engineering, Bhaktia Adiveda, Bhagwati Enterprise, Sahara Machine, Anex Electricals, A.L. Birds Net, Neminath Instruments, Panchal Meditech Pvt. Ltd., COSTOR AUTOMATION, instrumentsexporter.com, divinesalon.co.in, World Wide Conveyor Exports (Pty) Ltd, KS Valves & Pumps, Veer Laser Fab, Bird ControlNet, JRP Enterprise, Thyrocare Lab, and S.P. bird Net.
- Attack Type: Website Defacement.
- Communication Channel: Telegram.
2.2 L4663R666H05T
This group executed a series of website defacements focusing heavily on the Middle East, specifically the UAE, Israel, Qatar, and Kuwait.
- Target Industries: Retail, Luxury Goods, Healthcare, IT Services, and Cosmetics.
- Victims: Syscom, Wonderbooks.ae, LifeCell International, AIGNER UAE, Stuck On You, LUCRIN Geneva, DermaCenter, Gait Kuwait, NARS Cosmetics (multiple regional domains), Babylon Park Israel, Personal Touch, and Mova Israel.
2.3 INDRAMAYU CHAOS SYSTEM
This group heavily targeted the government administration sector of Indonesia and educational institutions in Israel via data leaks and credential theft.
- Targeted Entities: Berau Regency, Meteorology, Climatology, and Geophysics Agency, Pemerintah Provinsi Bengkulu, Regional Government of Pinrang Regency, Regional Government of Purwakarta Regency, Office of the President of the Republic of Indonesia, Regional Government of Lombok Tengah Regency, Kuningan Regency Government, South Kalimantan Provincial Government, North Kalimantan Regional Authority, Pemerintah Daerah Kabupaten Karawang, and Braude Academic College of Engineering.
2.4 Shadow Warrior
An actor specializing in large-scale data breaches across e-commerce, gaming, and marketing sectors globally.
- Breach Victims: Souq.com (32,000 user records), WLT Group, TVLiftCabinet Inc (290,000 records), Tebex Limited (13K records), knowmycustomer.in (20K records), Subito Disponibile (300,000 records), and Gamekaking.
2.5 jrintel
A highly sensitive actor focusing on the exfiltration and sale of classified military and intelligence documentation.
- USA Operations: Leaked a classified PDF containing hazardous material shipment instructions related to Lockheed Martin. Claimed to sell top-secret military and intelligence documents covering U.S. Space Force operations, CIA/DIA reports, and hypersonic weapons development. Leaked private U.S. Department of Defense CAT torpedo manuals.
- China Operations: Claimed to sell top-secret Chinese military documents dated 2025–2026, including data on high-altitude UAVs, stealth enhancements, and Taiwan combat strategies.
3. Incident Analysis by Category
3.1 Data Breaches and Leaks
Data breaches constitute the overwhelming majority of the recorded events.
Government and Public Sector:
- La Région Occitanie (France): Actor “DumpSec” breached the Carte Jeune program, exposing 310,000 records and 270,783 photos (41.7 GB in JSONL format).
- Citizenship by Investment Programme (Saint Lucia): Actor “frog” breached approximately 1,116,935 records in SQL format.
- Ministerio de Hacienda (Spain): “PoliceEspDoxedBF” leaked full names, DNIs, and IBAN bank details of government staff members.
- Government of Israel: Actor “Noaharnaut” claimed to have breached and leaked government emails.
- Chinese ID Cards: Actor “tonywab” leaked 9 million Chinese national ID card records containing PII. Tonywab also claimed to sell over 4,000 Russian passport photos and scans.
- Indonesian Local Governments: Actor “MRLUCK” breached the South Solok Regency Tourism Office and Pemerintah Kota Tangerang. Actor “Shenira6core” breached the Cirebon Regency Government’s Industrial Relations division.
- Pompiers des Bouches-du-Rhône (France): Actor “7ven” claimed to have breached the fire department’s database.
- Ministry of Infrastructure and Transport (Italy): The “Infrastructure Destruction Squad” claimed to exploit security vulnerabilities in the current systems.
Healthcare and Medical:
- Maple Respiratory Colombia: “NyxarGroup” sold 1.8 million patient records.
- USA Clinic: Actor “Heiz” sold 150K patient records, including SSNs and diagnoses, for $10 per record.
- Hospital Universitario Del Valle (Colombia): “delitospenales” sold a 25GB database with 264K records.
Financial and Telecommunications:
- Indian Bank: Actor “dataPenetration” leaked a payment system dataset containing 2,000 unique records.
- GlobalNet (Tunisia): Actor “Dark07xx” breached the internal database of the telecommunications company.
- b2a (Tunisia): Actor “DARK 07x” fully compromised the internal servers and financial records of the firm.
- Ericsson Inc (USA): A breach occurred via a third-party service provider between April 17–22, 2025, exposing employee and customer personal data.
Corporate and E-Commerce:
- Steadfast Courier (Bangladesh): “adminxs” sold a database containing tracking IDs and internal logistics details.
- Office Packaging (UK): Actor “MORPHEUS” leaked 1,192,802 lines of data, including PayPal transaction identifiers.
- Jazeera Airways (Kuwait): Actor “TheAshborn” claimed to sell a 50GB database of 15 million passenger records.
- MagicSlides: Actor “Sythe” sold a database containing 2.3 million emails.
3.2 Initial Access and System Compromise
Several actors monetized initial network footholds.
- Unknown USA Targets: “savel987” claimed to sell unauthorized access to 68 databases and 7 shops in the USA.
- Body Unit Academy (UK): “BROTHERHOOD CAPUNG INDONESIA” leaked login credentials.
- FinTech Organization (Arab Country): Actor “remotedesktop” sold access to Jira (150+ projects) and Confluence (450 users) systems containing POS terminal systems data.
- Dolphin Automatic 2.1 System (Ukraine): “NoName057(16)” claimed unauthorized access to a heating management project controlling gas valves and boilers.
- Hosting DNS Access: Actor “blackwinter99” leaked access to AM CONCEPT (Portugal) and Ocean Digital Cable & Fiber Broadband (Pakistan).
- Sri Lanka Hospitality: Actor “williamblack” sold SSH and CRM access to a hotel and wine shop.
3.3 Direct Cyber Attacks
Operational disruptions were noted against critical infrastructure and software supply chains.
- AppsFlyer (Israel): A cyberattack targeted the SDK infrastructure via code injected into
websdk.appsflyer.com, designed to steal cryptocurrency from affected users. - Bank Melli and Bank Sepah (Iran): Online services, including the Bam banking system, were disrupted by an attack.
- Independent Public Regional Hospital (Poland): A night-time infection forced the facility to switch to paper-based patient records, though emergency services continued.
- Community College of Beaver County (USA): A “cryptolocker” attack forced a lockdown of IT systems, restricting campus technology resources.
3.4 Website Defacements
Aside from the heavy activity by UNDERGROUND-NET and L4663R666H05T, other notable defacements included:
- Malaysian Economic Association: Defaced by BROTHERHOOD CAPUNG INDONESIA.
- Bedco and Diesel Kuwait Online Store: Defaced by the group Simsimi.
- Breve Market (Argentina): Defaced by BROKENPIPE.
- Secret Weapon 1948 (Israel): Defaced by Jav4nyM0uz Corp.
- Auto1 (Israel): Defaced by FRK48.
- Iranian IT Services: Actor DimasHxR defaced Darqomkoja, NILWP, and weblabs.
3.5 Threat Actor Alerts
Groups pre-announced targets, indicating ideological or geopolitical motivations.
- DARK 07x: Indicated they are targeting Tunisia.
- TEAM UCC OPERATIONS: Indicated they are targeting Pakistan.
- Infrastructure Destruction Squad: Claimed to have targeted water stations in India.
- fsociety 1337: Intended to target Israel and the USA within 24 hours.
- Moroccan Soldiers: Stated they are targeting “Unofficial Websites”.
4. Geographic Victimology (Impacted Regions)
The dataset illustrates a highly distributed geographic attack surface:
- North America: The USA faced severe military document leaks, pension data breaches (510,000 records), and ransomware attacks on education infrastructure. Mexico suffered a leak of 14,645 retired individuals’ records and a breach of 1 million manufacturing customer records.
- Middle East: Israel was repeatedly targeted for defacements and government data breaches. The UAE and Kuwait experienced defacements and large-scale aviation data leaks.
- Asia: India suffered a high volume of defacements against local manufacturing alongside a payment system breach. Indonesia’s local government and regency databases were systemically harvested and leaked.
- Europe: Spain (Ministry of Finance), France (La Région Occitanie, Fire Departments), and Poland (Healthcare) suffered significant data loss and operational downtime.
5. Conclusion
The data provided outlines an intensely volatile threat landscape recorded in March 2026. Data breaches remain the dominant method of compromise, targeting high-volume PII for subsequent monetization. Geopolitically motivated actors and hacktivist groups (like INDRAMAYU CHAOS SYSTEM and UNDERGROUND-NET) are prioritizing mass-defacement and the unauthorized exposure of local government credentials. Most critically, the alleged leaking of classified military documents (USA and China) by actors like jrintel, alongside attacks on critical infrastructure such as Ukrainian gas systems and Polish hospitals, underscores a dangerous escalation from simple data theft to kinetic real-world impact and national security threats.
Detected Incidents Draft Data
- Alleged sale of unauthorized access to 68 databases and 7 shops
Category: Initial Access
Content: Threat actor claims to be selling unauthorized access to 68 databases and 7 shops in USA.
Date: 2026-03-10T23:57:40Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277972/
Screenshots:
None
Threat Actors: savel987
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of GlobalNet
Category: Data Breach
Content: The threat actor claims to have breached the database of GlobalNet, the dataset contains internal database records extracted from the company’s systems, website content tables, configuration data, and potentially user or operational records.
Date: 2026-03-10T23:44:07Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-We-announce-the-hacking-of-GlobalNet-a-Tunisian-company-operating-in-the-field-of-in
Screenshots:
None
Threat Actors: Dark07xx
Victim Country: Tunisia
Victim Industry: Network & Telecommunications
Victim Organization: globalnet
Victim Site: globalnet.tn - Alleged Data Leak of Classified Lockheed Martin Hazardous Material Shipment Instructions in USA
Category: Data Breach
Content: Threat actor claims to have leaked a classified PDF containing hazardous material shipment instructions related to Lockheed Martin, allegedly exposing documentation detailing packaging, handling, labeling, transportability, and shipment procedures for hazardous materials.
Date: 2026-03-10T22:20:51Z
Network: openweb
Published URL: https://raidforums.wtf/threads/usa-classified-lockheed-martin-hazardous-material-shipment-instructions-pdf.639/
Screenshots:
None
Threat Actors: jrintel
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Military and Intelligence Documents in USA
Category: Data Breach
Content: Threat Actor claims to be selling alleged top secret military and intelligence documents in USA. The documents purportedly include information related to U.S. Space Force operations, CIA and DIA intelligence reports, cyber operations, hypersonic weapons development, AUKUS defense cooperation, and strategic assessments concerning Ukraine, Taiwan, North Korea, and Southeast Asia. It also includes advanced missile systems, anti-radiation missile programs, maritime anti-submarine warfare capabilities, and emerging military technologies.
Date: 2026-03-10T22:18:46Z
Network: openweb
Published URL: https://raidforums.wtf/threads/usa-top-secret-military-intelligence-documents-for-sale.638/
Screenshots:
None
Threat Actors: jrintel
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged access to Body Unit Academy
Category: Initial Access
Content: The group claims to have leaked login credentials to Body Unit Academy.
Date: 2026-03-10T22:15:29Z
Network: telegram
Published URL: https://t.me/c/3800744258/73
Screenshots:
None
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: UK
Victim Industry: Sports
Victim Organization: body unit academy
Victim Site: bodyunitacademy.com - Alleged Data Leak of U.S. Department of Defense CAT Torpedo Manuals
Category: Data Breach
Content: Threat actor claims to have leaked private U.S. Department of Defense CAT torpedo manuals, allegedly exposing confidential military documentation related to torpedo systems and operational manuals.
Date: 2026-03-10T22:13:28Z
Network: openweb
Published URL: https://raidforums.wtf/threads/usa-private-department-of-defense-cat-torpedo-manuals-leaked.636/
Screenshots:
None
Threat Actors: jrintel
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of La Région Occitanie
Category: Data Breach
Content: A threat actor claims to be selling a large dataset allegedly associated with the Carte Jeune program operated by La Région Occitanie. the dataset contains approximately 310,000 records and 270,783 photos, with a total reported size of 41.7 GB in JSONL format. which includes various personal and administrative fields such as full names, birth information, registration dates, addresses, phone numbers, email addresses, guardian details, school information, class level, and file numbers, along with stored profile photos and documents.
Date: 2026-03-10T22:11:57Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FR-Region-Occitanie-with-PICTURE-41-7%C2%A0Go
Screenshots:
None
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Government & Public Sector
Victim Organization: la région occitanie
Victim Site: laregion.fr - Alleged Sale of Chinese Military Documents
Category: Data Breach
Content: Threat Actor claims to be selling alleged top secret Chinese military documents dated 2025–2026. The documents purportedly include information related to high-altitude long-endurance UAV systems, advanced ship solid-state radar, upgrades to the Jiaolong manned submersible, unmanned vessel technologies, stealth measurement systems, quantum sensing upgrades for the PLA Rocket Force, fifth-generation fighter jet prototype test data and stealth enhancement technologies, as well as intelligence analysis reports on Taiwan’s combat strategy and development plans.
Date: 2026-03-10T22:10:36Z
Network: openweb
Published URL: https://raidforums.wtf/threads/china-top-secret-military-documents-2025-6-for-sale.637/
Screenshots:
None
Threat Actors: jrintel
Victim Country: China
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Indian Bank Payment System Database
Category: Data Breach
Content: A threat actor claims to have leaked a database allegedly related to the payment system of Indian Bank. The dataset reportedly contains 2,000 unique records, which includes passenger names, payment types, mobile numbers, cities, booking days, and email addresses, along with record IDs.
Date: 2026-03-10T22:04:07Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Indian-Bank-Payment-System-2K
Screenshots:
None
Threat Actors: dataPenetration
Victim Country: India
Victim Industry: Financial Services
Victim Organization: indian bank
Victim Site: indianbank.in - Alleged Data Breach of Citizenship by Investment Programme Saint Lucia
Category: Data Breach
Content: Threat Actor claims to have breached the database of Citizenship by Investment Programme Saint Lucia in Saint Lucia. The leaked data is provided in SQL format and reportedly contains approximately 1,116,935 records. The database is dated March 08, 2026, and it includes around 270 email addresses.
Date: 2026-03-10T21:57:06Z
Network: openweb
Published URL: https://leakbase.bz/threads/cipsaintlucia-com-leak.49269/
Screenshots:
None
Threat Actors: frog
Victim Country: Saint Lucia
Victim Industry: Government Administration
Victim Organization: citizenship by investment programme saint lucia
Victim Site: cipsaintlucia.com - Alleged Data Breach of b2a
Category: Data Breach
Content: The group claims to have accessed the database b2 Business Expert, an accounting, auditing, and tax consulting firm, alleging a full system compromise that includes internal servers and databases including financial records, tax data, and client information.
Date: 2026-03-10T21:53:30Z
Network: telegram
Published URL: https://t.me/DarK07xxxxxxx/1694
Screenshots:
None
Threat Actors: DARK 07x
Victim Country: Tunisia
Victim Industry: Financial Services
Victim Organization: b2a
Victim Site: b2a.com.tn - Alleged data breach of Steadfast Courier
Category: Data Breach
Content: A threat actor claims to be selling the full database of Steadfast Courier. the database appears to contain parcel delivery and customer information, including tracking IDs, invoice references, customer names, phone numbers, and detailed delivery addresses. Additional fields suggest internal logistics information such as hub identifiers, delivery status, rider status, parcel weight, billing amounts, and timestamps related to order creation and approval.
Date: 2026-03-10T21:52:46Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Stead-Fast-Courier-Bangladesh
Screenshots:
None
Threat Actors: adminxs
Victim Country: Bangladesh
Victim Industry: Package & Freight Delivery
Victim Organization: steadfast courier
Victim Site: steadfast.com.bd - Alleged Data Breach of Souq.com
Category: Data Breach
Content: Threat Actor claims to have breached the database of Souq.com in UAE, which contains 32000 user records.
Date: 2026-03-10T21:51:18Z
Network: openweb
Published URL: https://darknetarmy.io/threads/arab-e-commerce-souq-com-32k-user.89803/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: UAE
Victim Industry: E-commerce & Online Stores
Victim Organization: souq.com
Victim Site: souq.com - Alleged data leak of Singapore Homeowner Personal Records
Category: Data Breach
Content: A threat actor claims to be leaked a database containing approximately 2,000 records of homeowners in Singapore. the dataset includes personal information such as surname, first name, mobile phone number, country, city, street address, floor, address type, zip code, building number, and building email address.
Date: 2026-03-10T21:39:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Singapore-homeowner-2K
Screenshots:
None
Threat Actors: globalData1
Victim Country: Singapore
Victim Industry: Real Estate
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Office Packaging
Category: Data Breach
Content: A threat actor claims to have leaked the database of Office Packaging.it contains approximately 1,192,802 lines of data, which including billing and shipping details, customer names, email addresses, phone numbers, company names, addresses, payment method information, PayPal transaction identifiers, order totals, and user device details.
Date: 2026-03-10T20:59:14Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-officepackaging-co-uk-DB
Screenshots:
None
Threat Actors: MORPHEUS
Victim Country: UK
Victim Industry: E-commerce & Online Stores
Victim Organization: office packaging
Victim Site: officepackaging.co.uk - Alleged data breach of The World Billiards
Category: Data Breach
Content: A threat actor claims to have leaked a database linked to The World Billiards. the dataset includes usernames, email addresses, password hashes, registration timestamps, activation keys, and other account-related fields.
Date: 2026-03-10T20:53:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-carlos-teofilo-com-theworldbilliards-com-DB
Screenshots:
None
Threat Actors: MORPHEUS
Victim Country: Spain
Victim Industry: E-commerce & Online Stores
Victim Organization: the world billiards
Victim Site: theworldbilliards.com - Alleged data breach of Carlos Teofilo Billiards Shop
Category: Data Breach
Content: A threat actor claims to have leaked a database allegedly associated with Carlos Teofilo Billiards Shop. The leaked information reportedly contains user account details such as display names, usernames, email addresses, password hashes, activation keys, registration dates, and user status fields.
Date: 2026-03-10T20:52:33Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-carlos-teofilo-com-theworldbilliards-com-DB
Screenshots:
None
Threat Actors: MORPHEUS
Victim Country: Spain
Victim Industry: E-commerce & Online Stores
Victim Organization: carlos teofilo billiards shop
Victim Site: carlos-teofilo.com - Alleged Data Breach of WLT Group
Category: Data Breach
Content: Threat Actor claims to have breached the database of WLT Group in UK.
Date: 2026-03-10T20:36:49Z
Network: openweb
Published URL: https://darknetarmy.io/threads/wlt-com-leading-brands-and-agencies-crm-backup.89801/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: UK
Victim Industry: Marketing, Advertising & Sales
Victim Organization: wlt group
Victim Site: wlt.com - Alleged Data Breach of TVLiftCabinet Inc
Category: Data Breach
Content: Threat Actor claims to have breached the database of TVLiftCabinet Inc in USA. The exposed data is provided in SQL format and reportedly contains approximately 290,000 records, including around 19,000 customer entries. It include fields such as email addresses, names, account-related details, and hashed passwords. The database is to originate from 2023 and is reportedly around 100 MB in size.
Date: 2026-03-10T20:29:48Z
Network: openweb
Published URL: https://darknetarmy.io/threads/database-leaked-tvliftcabinet-com.89804/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: USA
Victim Industry: Furniture
Victim Organization: tvliftcabinet inc
Victim Site: tvliftcabinet.com - Alleged Data Leak of 2.4M Chile Leads
Category: Data Breach
Content: Threat actor claims to be selling 2.4M private leads from Chile, allegedly collected from advertising campaigns. The exposed data reportedly includes client names, phone numbers, mobile numbers, personal email addresses, and country information.
Date: 2026-03-10T20:21:35Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278006/
Screenshots:
None
Threat Actors: betway
Victim Country: Chile
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - DARK 07x claims to target Tunisia
Category: Alert
Content: A recent post by the group indicates that they are targetting Tunisia.
Date: 2026-03-10T20:06:09Z
Network: telegram
Published URL: https://t.me/DarK07xxxxxxx/1693
Screenshots:
None
Threat Actors: DARK 07x
Victim Country: Tunisia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the website of Syscom
Category: Defacement
Content: The group claims to have defaced the website of Syscom.
Date: 2026-03-10T19:59:21Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/809539
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Information Technology (IT) Services
Victim Organization: syscom
Victim Site: sysllc.com - Alleged Sale of Unauthorized Access to Confluence and Jira Systems of an Unidentified FinTech Organization in an Arab Country
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to the Confluence and Jira systems of an unidentified fintech organization in an Arab country. The environment allegedly includes approximately 450 Confluence users, POS terminal systems, and applications related to money transfers. The Jira instance contains more than 150 projects, including CRM, CMS, API management, and Digital Wallet projects, along with internal passwords and a large amount of internal information.
Date: 2026-03-10T19:55:22Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277998/
Screenshots:
None
Threat Actors: remotedesktop
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized RDP and Domain Admin Access to an Unidentified Organization in Argentina
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized RDP and domain admin access to an unidentified organization in Argentina.
Date: 2026-03-10T19:39:46Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277991/
Screenshots:
None
Threat Actors: Big-Bro
Victim Country: Argentina
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the Website of Wonderbooks.ae
Category: Defacement
Content: The group claims to have defaced the website of Wonderbooks.ae.
Date: 2026-03-10T19:28:37Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808910
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Retail Industry
Victim Organization: wonderbooks.ae
Victim Site: test.wonderbooks.ae/media/customer_address/c/r - Alleged data breach of Maple Respiratory Colombia
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly belonging to Maple Respiratory Colombia. the dataset reportedly contains approximately 1.8 million records extracted from the organization’s systems. which includes patient details such as names, phone numbers, email addresses, identification numbers, and secondary contact numbers.
Date: 2026-03-10T19:28:33Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-CO-1-8-MILLION-MAPLERESPIRATORY-CO
Screenshots:
None
Threat Actors: NyxarGroup
Victim Country: Colombia
Victim Industry: Hospital & Health Care
Victim Organization: maple respiratory colombia
Victim Site: maplerespiratory.co - L4663R666H05T targets the Website of LifeCell International
Category: Defacement
Content: The group claims to have defaced the website of LifeCell International.
Date: 2026-03-10T19:24:59Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808757
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Hospital & Health Care
Victim Organization: lifecell international
Victim Site: lifecell.ae/media/customer_address/c/r/ - Alleged data breach of Islamic University of North Sumatra
Category: Data Breach
Content: A threat actor claims to have leaked the database of the Islamic University of North Sumatra
Date: 2026-03-10T19:14:42Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-UISU-Islamic-University-of-North-Sumatra-INDONESIA–68716
Screenshots:
None
Threat Actors: YUKA
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: islamic university of north sumatra
Victim Site: uisu.ac.id - BROTHERHOOD CAPUNG INDONESIA targets the website of Malaysian Economic Association
Category: Defacement
Content: The group claims to have defaced the website of Malaysian Economic Association.
Date: 2026-03-10T19:03:32Z
Network: telegram
Published URL: https://t.me/c/3800744258/64
Screenshots:
None
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Malaysia
Victim Industry: Education
Victim Organization: malaysian economic association
Victim Site: pem.org.my - Alleged data leak of Security Service of Ukraine Special Operations Unit
Category: Data Breach
Content: The group claims to have leaked information allegedly related to transport vehicles used by the Security Service of Ukraine Special Operations Unit SBU Alfa Unit in Ukraine. According to the statement, the exposed data reportedly includes vehicle numbers, brands, and VIN codes associated with assets assigned to the unit.
Date: 2026-03-10T19:03:15Z
Network: telegram
Published URL: https://t.me/perunswaroga/1260?single
Screenshots:
None
Threat Actors: Perun Svaroga
Victim Country: Ukraine
Victim Industry: Military Industry
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of American Business Database
Category: Data Breach
Content: A threat actor claims to have leaked a database related to American businesses.
Date: 2026-03-10T18:32:41Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-DATABASE-BUSINESS-AMERICA–190951
Screenshots:
None
Threat Actors: 1LH4MZXSEC
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Simsimi targets the website of Bedco
Category: Defacement
Content: The group claims to have defaced the website of Bedco.
Date: 2026-03-10T18:08:48Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603353
Screenshots:
None
Threat Actors: Simsimi
Victim Country: UAE
Victim Industry: Retail Industry
Victim Organization: bedco
Victim Site: bedco.ae/media/customer_address - Alleged Data Breach Database of Tebex Limited
Category: Data Breach
Content: Threat actor claims to have breached the Tebex Limited database, allegedly exposing 13K records containing data such as usernames, email addresses, IP addresses, and account-related details.
Date: 2026-03-10T18:02:32Z
Network: openweb
Published URL: https://darknetarmy.io/threads/database-tebex-io-13k.89809/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: UK
Victim Industry: Gaming
Victim Organization: tebex limited
Victim Site: tebex.io - L4663R666H05T targets the Website of AIGNER UAE
Category: Defacement
Content: The group claims to have defaced the website of AIGNER UAE.
Date: 2026-03-10T18:01:59Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603191
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Luxury Goods & Jewelry
Victim Organization: aigner uae
Victim Site: aignermunich.ae - L4663R666H05T targets the Website of Stuck On You
Category: Defacement
Content: The group claims to have defaced the website of Stuck On You.
Date: 2026-03-10T17:54:38Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603279
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Arts & Crafts
Victim Organization: stuck on you
Victim Site: stuckonyou.ae/media/customer_address/c/r/ - L4663R666H05T targets the Website of LUCRIN Geneva
Category: Defacement
Content: The group claims to have defaced the website of LUCRIN Geneva
Date: 2026-03-10T17:47:02Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603287
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Luxury Goods & Jewelry
Victim Organization: lucrin geneva
Victim Site: lucrin.ae - Alleged Data leak of knowmycustomer.in
Category: Data Breach
Content: Threat actor claims to have leaked the database of Knowmycustomer.in in India, allegedly exposing 20K records containing data such as region, PMR email, PMR name, product details, account numbers, customer names, company names, emails, phone numbers, addresses, state, city, and pincode.
Date: 2026-03-10T17:46:36Z
Network: openweb
Published URL: https://darknetarmy.io/threads/knowmycustomer-in-tata-tele-business-indias-leadin-20kk.89806/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: knowmycustomer.in - L4663R666H05T targets the website of DermaCenter
Category: Defacement
Content: The group claims to have defaced the website of DermaCenter.
Date: 2026-03-10T17:30:27Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603204
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Qatar
Victim Industry: Retail Industry
Victim Organization: dermacenter
Victim Site: dermacenter.qa - Alleged Sale of Driving License Data in UK
Category: Data Breach
Content: Threat Actor claims to be selling driving license data in UK, which allegedly contains front and back photo.
Date: 2026-03-10T17:26:36Z
Network: openweb
Published URL: https://darknetarmy.io/threads/%F0%9F%87%AC%F0%9F%87%A7-uk-driving-license-front-and-back.80166/
Screenshots:
None
Threat Actors: KYCMyASS
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Subito Disponibile
Category: Data Breach
Content: Threat Actor claims to have breached the database of Subito Disponibile in Italy, allegedly containing around 300,000 records. The exposed data contains customer information such as email addresses, names, dates of birth, and other account-related details.
Date: 2026-03-10T17:17:40Z
Network: openweb
Published URL: https://darknetarmy.io/threads/database-leaked-subitodisponibile-com-300k.89805/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: Italy
Victim Industry: E-commerce & Online Stores
Victim Organization: subito disponibile
Victim Site: subitodisponibile.com - Alleged Data Breach of Gamekaking
Category: Data Breach
Content: A threat actor claims to have breached the database of Gamekaking in India, allegedly exposing data including usernames, email addresses, passwords, and other database details associated with the platform
Date: 2026-03-10T17:17:13Z
Network: openweb
Published URL: https://darknetarmy.io/threads/gamekaking-com-apps-web-games.89807/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: India
Victim Industry: Gaming
Victim Organization: gamekaking
Victim Site: gamekaking.com - Alleged data leak of 44K Job-Seekers Database
Category: Data Breach
Content: A threat actor claims to be selling a database of job seekers allegedly collected from a Canadian job search website. the dataset reportedly contains information on approximately 44,000 users.The exposed data is said to include first and last names, email addresses, phone numbers, and country information.
Date: 2026-03-10T17:08:22Z
Network: openweb
Published URL: https://xss.pro/threads/146349/
Screenshots:
None
Threat Actors: Galaher
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the Website of Gait Kuwait
Category: Defacement
Content: The group claims to have defaced the website of Gait Kuwait.
Date: 2026-03-10T17:00:50Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603422
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Kuwait
Victim Industry: Consumer Electronics
Victim Organization: gait kuwait
Victim Site: gait.com.kw/media/customer_address/c/r/ - Alleged unauthorized access to an unidentified Dolphin Automatic 2.1 system used in Ukraine
Category: Initial Access
Content: The group claims to have gained unauthorized access to the Dolphin Automatic 2.1 system in Ukraine’s “Dovzhenko” heating management project, which controls gas valves with emergency shutdown capability, boilers, heating pumps, and real-time monitoring of pressure, temperature, and system alerts for residential and public buildings.
Date: 2026-03-10T16:58:52Z
Network: telegram
Published URL: https://t.me/c/2787466017/2810
Screenshots:
None
Threat Actors: NoName057(16)
Victim Country: Ukraine
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BROKENPIPE targets the website of Breve Market
Category: Defacement
Content: The group claims to have defaced the website of Breve Market.
Date: 2026-03-10T16:58:10Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41603369?hz=1
Screenshots:
None
Threat Actors: BROKENPIPE
Victim Country: Argentina
Victim Industry: Retail Industry
Victim Organization: breve market
Victim Site: brevemarket.com.ar - Alleged data breach of Ministerio de Hacienda
Category: Data Breach
Content: A threat actor claims to have leaked data allegedly belonging to employees of the Spanish Ministry of Finance. the dataset contains personal information related to government staff members. the exposed data reportedly includes full names, national ID numbers (DNI), phone numbers, email addresses, IBAN bank details, and residential addresses.
Date: 2026-03-10T16:57:33Z
Network: openweb
Published URL: https://breachforums.as/Thread-SPAIN-HACIENDA-GOB-ES-EMPLEADOS
Screenshots:
None
Threat Actors: PoliceEspDoxedBF
Victim Country: Spain
Victim Industry: Government & Public Sector
Victim Organization: ministerio de hacienda
Victim Site: hacienda.gob.es - Alleged Sale of 150K USA Clinic Patient Records
Category: Data Breach
Content: A threat actor claims to be selling a database of 150K patients from a USA clinic, allegedly containing SSN, date of birth, full name, phone number, email, diagnoses, medications, and physicians. The data is stored in a 460 MB SQLite file and is being sold in full or in parts for $10 per record.
Date: 2026-03-10T15:33:10Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277982/
Screenshots:
None
Threat Actors: Heiz
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of login access to thegardens.co.in.anchor.net.in
Category: Initial Access
Content: The group claims to have leaked login access to thegardens.co.in.anchor.net.in.
Date: 2026-03-10T14:04:10Z
Network: telegram
Published URL: https://t.me/c/3800744258/62
Screenshots:
None
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: thegardens.co.in.anchor.net.in - TEAM UCC OPERATIONS claims to target Pakistan
Category: Alert
Content: A recent post by the group indicates that they are targeting Pakistan.
Date: 2026-03-10T14:00:46Z
Network: telegram
Published URL: https://t.me/c/2256516942/168
Screenshots:
None
Threat Actors: TEAM UCC OPERATIONS
Victim Country: Pakistan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyberattack hit AppsFlyer
Category: Cyber Attack
Content: A cyberattack reportedly targeted the SDK infrastructure of AppsFlyer, an Israeli mobile analytics and attribution company, after attackers allegedly injected malicious code into the domain websdk.appsflyer.com. The compromised SDK is said to have been used to deploy code designed to steal cryptocurrency from affected users.
Date: 2026-03-10T13:58:18Z
Network: telegram
Published URL: https://t.me/TheGhostITM/351
Screenshots:
None
Threat Actors: Unknown
Victim Country: Israel
Victim Industry: Software
Victim Organization: appsflyer
Victim Site: websdk.appsflyer.com - Alleged data breach of Government of Israel
Category: Data Breach
Content: The threat actor claims to have breached data from the Government of Israel, posting it on March 10, 2026.
Date: 2026-03-10T13:54:03Z
Network: openweb
Published URL: https://breachforums.as/Thread-ISR-Gov-il-emails-Leaked
Screenshots:
None
Threat Actors: Noaharnaut
Victim Country: Israel
Victim Industry: Government Administration
Victim Organization: government of israel
Victim Site: gov.il - Alleged data leak of Department Of Food In Bangladesh
Category: Data Breach
Content: The group claims to have leaked data from Department Of Food In Bangladesh.
Date: 2026-03-10T13:45:25Z
Network: telegram
Published URL: https://t.me/c/2256516942/168
Screenshots:
None
Threat Actors: TEAM UCC OPERATIONS
Victim Country: Bangladesh
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Infrastructure Destruction Squad claims to have targeted water stations in India
Category: Alert
Content: The group claims to have targeted water stations in India.
Date: 2026-03-10T12:52:28Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3893
Screenshots:
None
Threat Actors: Infrastructure Destruction Squad
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Motor Sich JSC
Category: Data Breach
Content: The group claims to have leaked a unique document of the Motor Sich JSC company.
Date: 2026-03-10T12:37:31Z
Network: telegram
Published URL: https://t.me/hackberegini/3199
Screenshots:
None
Threat Actors: Beregini
Victim Country: Ukraine
Victim Industry: Aviation & Aerospace
Victim Organization: motor sich jsc
Victim Site: motorsich.com - Cyberattack hit Bank Melli and Bank Sepah
Category: Cyber Attack
Content: A cyberattack was initially rumored after disruptions affected some online services of Bank Melli Iran and Bank Sepah, including the Bam banking system.
Date: 2026-03-10T11:41:27Z
Network: telegram
Published URL: https://t.me/cyberbannews_ir/20415
Screenshots:
None
Threat Actors: Unknown
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Antichi Sapori dellIrpinia di Zuccardi
Category: Data Breach
Content: The group claims to have breached data from Antichi Sapori dellIrpinia di Zuccardi
Date: 2026-03-10T11:24:18Z
Network: telegram
Published URL: https://t.me/c/3745504505/968
Screenshots:
None
Threat Actors: scattered LAPSUS$ hunters 7.0
Victim Country: Italy
Victim Industry: Supermarkets
Victim Organization: antichi sapori dellirpinia di zuccardi
Victim Site: zuccardi.it - Alleged data breach of South Solok Regency Tourism Office
Category: Data Breach
Content: The threat actor claims to have breached South Solok Regency Tourism Office. The exposed dataset allegedly include National Identification Numbers (NIK), names, birth details, salaries, start dates, NPWP, phone numbers, and admin codes of govt personnel.
Date: 2026-03-10T10:43:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-data-tkd-dinas-pariwisata-kabupaten-solok-selatan
Screenshots:
None
Threat Actors: MRLUCK
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: south solok regency tourism office
Victim Site: disparbud.solokkab.go.id - Alleged data breach of Pemerintah Kota Tangerang
Category: Data Breach
Content: The threat actor claims to have breached Pemerintah Kota Tangerang, The dataset include names, dates of birth, NIK (National Identification Numbers), NIP numbers, job positions, teacher categories, and validation or verification status from education authorities.
Date: 2026-03-10T10:25:22Z
Network: openweb
Published URL: http://breachforums.as/Thread-data-guru-tanggerang
Screenshots:
None
Threat Actors: MRLUCK
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: pemerintah kota tangerang
Victim Site: tangerangkota.go.id - Alleged data leak of Chinese ID card information
Category: Data Breach
Content: The threat actor claims to have leaked 9 million Chinese national ID card records. The dataset reportedly includes personally identifiable information (PII) such as full names, national ID numbers, addresses, and related identification details.
Date: 2026-03-10T10:06:53Z
Network: openweb
Published URL: https://breachforums.as/Thread-9M-CN-Id-card-information
Screenshots:
None
Threat Actors: tonywab
Victim Country: China
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of unauthorized access to AM CONCEPT
Category: Initial Access
Content: The threat actor claims to have leaked unauthorized access to AM CONCEPT.
Date: 2026-03-10T10:02:40Z
Network: openweb
Published URL: https://breachforums.as/Thread-%E2%AD%90Portugal%E2%AD%90-amconcept-pt-hosting-dns-access
Screenshots:
None
Threat Actors: blackwinter99
Victim Country: Portugal
Victim Industry: Architecture & Planning
Victim Organization: am concept
Victim Site: amconcept.pt - Alleged leak of unauthorized access to Ocean Digital Cable & Fiber Broadband
Category: Initial Access
Content: The threat actor claims to have leaked unauthorized access to Ocean Digital Cable & Fiber Broadband.
Date: 2026-03-10T09:58:36Z
Network: openweb
Published URL: https://breachforums.as/Thread-%E2%AD%90Pakistan%E2%AD%90-oceancableandbroadband-pk-hosting-dns-access
Screenshots:
None
Threat Actors: blackwinter99
Victim Country: Pakistan
Victim Industry: Network & Telecommunications
Victim Organization: ocean digital cable & fiber broadband
Victim Site: oceancableandbroadband.pk - Alleged source code and domain sale of AniZen
Category: Data Breach
Content: The group claims to be selling domain and source code of AniZen.
Date: 2026-03-10T09:32:38Z
Network: telegram
Published URL: https://t.me/c/1867326321/567
Screenshots:
None
Threat Actors: TBDF
Victim Country: Unknown
Victim Industry: Broadcast Media
Victim Organization: anizen
Victim Site: anizen.tr - Alleged data breach of Cirebon Regency Government
Category: Data Breach
Content: The threat actor claims to have breached the database related to the Industrial Relations division of Cirebon Regency, the allegedly includes govt decrees on 2025 membership, union reps, employer associations, and internal labor federation correspondence.
Date: 2026-03-10T09:07:06Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-LEAKED-Cirebon-Government-Industrial-Relations-Internal-Data-2025
Screenshots:
None
Threat Actors: Shenira6core
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: cirebon regency government
Victim Site: cirebonkab.go.id - fsociety 1337 claims to target Israel and USA
Category: Alert
Content: A recent post by the group indicates that they intends to target Israel and the USA in the next 24 hours.
Date: 2026-03-10T08:37:42Z
Network: telegram
Published URL: https://t.me/fsosiety1337/7
Screenshots:
None
Threat Actors: fsociety 1337
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach SEGWAY INC.
Category: Data Breach
Content: Threat actor claims to have leaked data from SEGWAY INC.
Date: 2026-03-10T08:35:10Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277939/
Screenshots:
None
Threat Actors: HighRisk
Victim Country: USA
Victim Industry: Other Industry
Victim Organization: segway inc.
Victim Site: segway.com - Alleged data leak of Berau Regency
Category: Data Breach
Content: The group claims to have leaked data from Berau Regency.
Date: 2026-03-10T08:33:03Z
Network: telegram
Published URL: https://t.me/c/3427600175/501
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: berau regency
Victim Site: beraukab.go.id - Alleged data leak of Meteorology, Climatology, and Geophysics Agency
Category: Data Breach
Content: The group claims to have leaked data from Meteorology, Climatology, and Geophysics Agency.
Date: 2026-03-10T08:28:50Z
Network: telegram
Published URL: https://t.me/c/3427600175/494
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: meteorology, climatology, and geophysics agency
Victim Site: bmkg.go.id - UNDERGROUND-NET targets the website of Shubham Hall
Category: Defacement
Content: The group claims to have defaced the website of Shubham Hall.
Date: 2026-03-10T08:25:58Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Events Services
Victim Organization: shubham hall
Victim Site: shubhamhall.in - UNDERGROUND-NET targets the website of Savita Engineering
Category: Defacement
Content: The group claims to have defaced the website of Savita Engineering
Date: 2026-03-10T08:23:57Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Manufacturing
Victim Organization: savita engineering
Victim Site: savitaengineering.com - Alleged data breach of Pemerintah Provinsi Bengkulu
Category: Data Breach
Content: The group claims to have breached data from Pemerintah Provinsi Bengkulu.
Date: 2026-03-10T08:22:56Z
Network: telegram
Published URL: https://t.me/c/3427600175/493
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: pemerintah provinsi bengkulu
Victim Site: bengkuluprov.go.id - UNDERGROUND-NET targets the website of Bhaktia Adiveda
Category: Defacement
Content: The group claims to have defaced the website of Bhaktia Adiveda.
Date: 2026-03-10T07:53:17Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Health & Fitness
Victim Organization: bhaktia adiveda
Victim Site: bhaktiaadiveda.com - UNDERGROUND-NET targets the website of Bhagwati Enterprise
Category: Defacement
Content: The group claims to have defaced the website of Bhagwati Enterprise.
Date: 2026-03-10T07:52:00Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Other Industry
Victim Organization: bhagwati enterprise
Victim Site: bhagwati-enterprise.in - UNDERGROUND-NET targets the website of Sahara Machine
Category: Defacement
Content: The group claims to have defaced the website of Sahara Machine.
Date: 2026-03-10T07:49:46Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Other Industry
Victim Organization: sahara machine
Victim Site: saharamachine.com - UNDERGROUND-NET targets the website of Anex Electricals
Category: Defacement
Content: The group claims to have defaced the website of Anex Electricals.
Date: 2026-03-10T07:48:59Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Electrical & Electronic Manufacturing
Victim Organization: anex electricals
Victim Site: anexelectricals.com - UNDERGROUND-NET targets the website of A.L. Birds Net
Category: Defacement
Content: The group claims to have defaced the website of A.L. Birds Net.
Date: 2026-03-10T07:46:44Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Other Industry
Victim Organization: a.l. birds net
Victim Site: albirdnet.in - UNDERGROUND-NET targets the website of Neminath Instruments
Category: Defacement
Content: The group claims to have defaced the website of Neminath Instruments.
Date: 2026-03-10T07:46:13Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Machinery Manufacturing
Victim Organization: neminath instruments
Victim Site: neminathinstruments.com - UNDERGROUND-NET targets the website of Panchal Meditech Pvt. Ltd.
Category: Defacement
Content: The group claims to have defaced the website of Panchal Meditech Pvt. Ltd.
Date: 2026-03-10T07:44:07Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Medical Equipment Manufacturing
Victim Organization: panchal meditech pvt. ltd.
Victim Site: panchalmeditech.in - UNDERGROUND-NET targets the website of COSTOR AUTOMATION
Category: Defacement
Content: The group claims to have defaced the website of COSTOR AUTOMATION.
Date: 2026-03-10T07:37:23Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Machinery Manufacturing
Victim Organization: costor automation
Victim Site: liftpart.in - Alleged Data Breach of Ericsson Inc
Category: Data Breach
Content: Threat actor claims to havebreached the data of Ericsson Inc., the U.S. subsidiary of Swedish telecommunications company Ericsson, after compromising a third-party service provider. The breach reportedly exposed personal data of an undisclosed number of employees and customers. The incident occurred between April 17–22, 2025, and was discovered on April 28, 2025. Ericsson stated the compromise happened in the vendor’s systems, not its internal infrastructure, and the FBI has been notified.
Date: 2026-03-10T07:35:29Z
Network: openweb
Published URL: https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/
Screenshots:
None
Threat Actors: Unknown
Victim Country: USA
Victim Industry: Network & Telecommunications
Victim Organization: ericsson inc
Victim Site: ericsson.com - UNDERGROUND-NET targets the website of instrumentsexporter.com
Category: Defacement
Content: The group claims to have defaced the website of instrumentsexporter.com.
Date: 2026-03-10T07:35:24Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: instrumentsexporter.com - UNDERGROUND-NET targets the website of divinesalon.co.in
Category: Defacement
Content: The group claims to have defaced the website of divinesalon.co.in.
Date: 2026-03-10T07:34:00Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: divinesalon.co.in - UNDERGROUND-NET targets the website of World Wide Conveyor Exports (Pty) Ltd
Category: Defacement
Content: The group claims to have defaced the website of World Wide Conveyor Exports (Pty) Ltd.
Date: 2026-03-10T07:32:33Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: South Africa
Victim Industry: Import & Export
Victim Organization: world wide conveyor exports (pty) ltd
Victim Site: conveyorexporters.com - UNDERGROUND-NET targets the website of KS Valves & Pumps
Category: Defacement
Content: The group claims to have defaced the website of KS Valves & Pumps.
Date: 2026-03-10T07:30:26Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Manufacturing
Victim Organization: ks valves & pumps
Victim Site: ksvalves.in - UNDERGROUND-NET targets the website of Veer Laser Fab
Category: Defacement
Content: The group claims to have defaced the website of Veer Laser Fab.
Date: 2026-03-10T07:29:33Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Manufacturing & Industrial Products
Victim Organization: veer laser fab
Victim Site: veerlaserfab.in - UNDERGROUND-NET targets the website of Bird ControlNet
Category: Defacement
Content: The group claims to have defaced the website of Bird ControlNet.
Date: 2026-03-10T07:28:02Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Environmental Services
Victim Organization: bird controlnet
Victim Site: birdscontrolnet.in - UNDERGROUND-NET targets the website of JRP Enterprise
Category: Defacement
Content: The group claims to have defaced the website of JRP Enterprise.
Date: 2026-03-10T07:24:03Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Manufacturing
Victim Organization: jrp enterprise
Victim Site: jrpenterprise.in - UNDERGROUND-NET targets the website of Thyrocare Lab
Category: Defacement
Content: The group claims to have defaced the website of Thyrocare Lab.
Date: 2026-03-10T07:24:00Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Hospital & Health Care
Victim Organization: thyrocare lab
Victim Site: thyrocareahmedabad.in - UNDERGROUND-NET targets the website of S.P. bird Net
Category: Defacement
Content: The group claims to have defaced the website of S.P. bird Net
Date: 2026-03-10T07:21:13Z
Network: telegram
Published URL: https://t.me/c/2195292966/1296
Screenshots:
None
Threat Actors: UNDERGROUND-NET
Victim Country: India
Victim Industry: Building and construction
Victim Organization: s.p. bird net
Victim Site: spbirdscontrol.in - Alleged data leak of retired individuals from Mexico
Category: Data Breach
Content: The threat actor claims to have leaked the data of 14,645 retired individuals from Mexico, allegedly containing full name, paternal surname, surname, phone number, address information (colony, street, exterior and interior numbers), postal code, gender, folio, RFC, CURP, NIR, and more.
Date: 2026-03-10T07:20:34Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-M%C3%89XICO-PERSONAS-JUBILADAS-14-645
Screenshots:
None
Threat Actors: MagoSpeak
Victim Country: Mexico
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Hotel Booking Customers from the United States, Canada, and
Category: Data Breach
Content: The threat actor claims to have leaked a hotel booking customers database allegedly containing information on 60,000 individuals from United States, Canada, and Brazil. The compromised data includes name, email, phone number, address, city, region, country, and fax.
Date: 2026-03-10T07:15:07Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Hotel-Booking-Customers-Info-USA-Canada-Brasil-60k-record
Screenshots:
None
Threat Actors: sexyskin
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyberattack Hit Independent Public Regional Hospital in Szczecin
Category: Cyber Attack
Content: A hospital in the western Polish city of Szczecin was hit by a cyberattack that disrupted its IT systems, forcing the facility to temporarily switch to a paper-based system for handling patient records and operations. The attack infected the hospital’s network during the night, blocking access to digital systems used by staff. Hospital officials confirmed that emergency services and patient care continued despite the disruption, while cybersecurity specialists worked to restore systems and investigate the incident. Authorities also launched an inquiry to determine the source and extent of the attack.
Date: 2026-03-10T07:07:13Z
Network: openweb
Published URL: https://tvpworld.com/91986106/hospital-in-western-poland-hit-by-cyberattack
Screenshots:
None
Threat Actors: Unknown
Victim Country: Poland
Victim Industry: Hospital & Health Care
Victim Organization: independent public regional hospital in szczecin
Victim Site: spwsz.szczecin.pl - Cyberattack Hit Community College of Beaver County
Category: Cyber Attack
Content: A cyberattack targeted the Community College of Beaver County (CCBC) in Pennsylvania, forcing the institution to lock down its IT systems to contain the incident. Officials warned that attackers were carrying out an encryption-based “cryptolocker” attack on the college’s data and instructed staff not to turn on laptops or other devices to prevent further spread of the malware. As a precaution, campus technology resources were restricted while the college investigated the scope of the attack and worked to limit damage. At the time of reporting, it was unclear which systems were affected or whether any data had been accessed or stolen.
Date: 2026-03-10T06:58:31Z
Network: openweb
Published URL: https://dysruptionhub.com/ccbc-cyberattack-it-lockdown-pa/
Screenshots:
None
Threat Actors: Unknown
Victim Country: USA
Victim Industry: Education
Victim Organization: community college of beaver county
Victim Site: ccbc.edu - Alleged Sale of Iranian Nationals Residency Data
Category: Data Breach
Content: The threat actor claims to be selling the database ofIranian Nationals Residenc , allegedly including detailed records.
Date: 2026-03-10T06:28:40Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-UAE-180-000-Iranian-Nationals-residence-of-UAE
Screenshots:
None
Threat Actors: TheAshborn
Victim Country: UAE
Victim Industry: Government Relations
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Universidad Mayor de San Simón (UMSS)
Category: Data Breach
Content: The threat actor claims to be leaked data from Universidad Mayor de San Simón (UMSS). The compromised data reportedly includes National identification numbers (DNI), Phone numbers, Email addresses, Physical addresses, First and last names, Dates of birth, Usernames, Additional sensitive personal information
Date: 2026-03-10T06:00:51Z
Network: openweb
Published URL: https://darkforums.su/Thread-Universidad-Mayor-de-San-Sim%C3%B3n-UMSS-Bolivia-Data-Leak-%E2%80%94-Millions-of-Records-Exposed
Screenshots:
None
Threat Actors: ExploitBolivia
Victim Country: Bolivia
Victim Industry: Education
Victim Organization: universidad mayor de san simón (umss)
Victim Site: umss.edu.bo - Alleged Data Leak of Regional Government of Pinrang Regency
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Regional Government of Pinrang Regency.
Date: 2026-03-10T05:46:42Z
Network: telegram
Published URL: https://t.me/c/3427600175/488
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: regional government of pinrang regency
Victim Site: pinrang.go.id - Alleged Leak of Russian Passport data
Category: Data Breach
Content: The threat actor claims to be selling the Russian Passport data, the dataset contains over 4,000 sets of Russian passport photos and scan.
Date: 2026-03-10T05:46:32Z
Network: openweb
Published URL: https://breachforums.as/Thread-Supplementary-file-A-mixture-of-over-4-000-sets-of-Russian-passport-photos-and-scann
Screenshots:
None
Threat Actors: tonywab
Victim Country: Russia
Victim Industry: Government Relations
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Regional Government of Purwakarta Regency
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Regional Government of Purwakarta Regency.
Date: 2026-03-10T05:44:53Z
Network: telegram
Published URL: https://t.me/c/3427600175/485
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: regional government of purwakarta regency
Victim Site: purwakartakab.go.id - Alleged data leak of Office of the President of the Republic of Indonesia
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Office of the President of the Republic of Indonesia.
Date: 2026-03-10T05:41:25Z
Network: telegram
Published URL: https://t.me/c/3427600175/486
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: office of the president of the republic of indonesia
Victim Site: presiden.go.id - Jav4nyM0uz Corp targets the Website of Secret Weapon 1948
Category: Defacement
Content: The group claims to have defaced the website of Secret Weapon 1948
Date: 2026-03-10T05:38:21Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808508
Screenshots:
None
Threat Actors: Jav4nyM0uz Corp
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: secret weapon 1948
Victim Site: secret-weapon-1948.co.il - Alleged Sale of Jazeera Airways Passenger Database
Category: Data Breach
Content: The threat actor claims to be selling the database of Jazeera Airways, the dataset contains 15 million passenger records.
Date: 2026-03-10T05:34:29Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Kuwait-15-000-000-Airline-Passengers-Data-jazeeraairways-com-50-GB
Screenshots:
None
Threat Actors: TheAshborn
Victim Country: Kuwait
Victim Industry: Airlines & Aviation
Victim Organization: jazeera airways
Victim Site: jazeeraairways.com - L4663R666H05T targets the Website of NARS Cosmetics
Category: Defacement
Content: The group claims to have defaced the website of NARS Cosmetics
Date: 2026-03-10T05:30:19Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/806550
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Cosmetics
Victim Organization: nars cosmetics
Victim Site: narscosmetics.co.il - L4663R666H05T targets the website of Babylon Park Israel
Category: Defacement
Content: The group claims to have defaced the website of Babylon Park Israel
Date: 2026-03-10T05:24:47Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/807919
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Business and Economic Development
Victim Organization: babylon park israel
Victim Site: shop.babylonpark.co.il - Alleged Sale of Qatar Security Force Lekhwiya
Category: Data Breach
Content: The threat actor claims to be selling the database of Qatar Security Force Lekhwiya, the dataset contains 1900 personnel data.
Date: 2026-03-10T05:22:42Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Qatar-1900X-Personnel-Data-of-Security-Forces
Screenshots:
None
Threat Actors: TheAshborn
Victim Country: Qatar
Victim Industry: Government Administration
Victim Organization: lekhwiya
Victim Site: lekhwiya.gov.qa - Alleged data leak of Regional Government of Lombok Tengah Regency
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Regional Government of Lombok Tengah Regency.
Date: 2026-03-10T05:22:38Z
Network: telegram
Published URL: https://t.me/c/3427600175/473
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: regional government of lombok tengah regency
Victim Site: lomboktengahkab.go.id - L4663R666H05T targets the Website of Personal Touch
Category: Defacement
Content: The group claims to have defaced the website of Personal Touch
Date: 2026-03-10T05:22:31Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/807108
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Cosmetics
Victim Organization: personal touch
Victim Site: personal-touch.co.il - L4663R666H05T targets the website of Mova Israel
Category: Defacement
Content: The group claims to have defaced the website of Mova Israel
Date: 2026-03-10T05:21:14Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/806449
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Consumer Electronics
Victim Organization: mova israel
Victim Site: mova-tech.co.il - Alleged data leak of Kuningan Regency Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Kuningan Regency Government.
Date: 2026-03-10T05:17:48Z
Network: telegram
Published URL: https://t.me/c/3427600175/482
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kuningan regency government
Victim Site: kuningankab.go.id - L4663R666H05T targets the website of NARS Cosmetics
Category: Defacement
Content: The group claims to have defaced the website of NARS Cosmetics
Date: 2026-03-10T05:05:34Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/806549
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Cosmetics
Victim Organization: nars cosmetics
Victim Site: nars.stg.fisha.co.il - Alleged Sale of MagicSlides Database
Category: Data Breach
Content: The threat actor claims to be selling the database of MagicSlides, containing millions of email records and user-related data.
Date: 2026-03-10T04:47:16Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-MagicSlides-App-Database-2-3-million-emails
Screenshots:
None
Threat Actors: Sythe
Victim Country: Unknown
Victim Industry: Information Technology (IT) Services
Victim Organization: magicslides
Victim Site: magicslides.app - FRK48 Targets the Website of Auto1
Category: Defacement
Content: The group claims to have defaced the website of Auto1
Date: 2026-03-10T04:35:32Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808461
Screenshots:
None
Threat Actors: FRK48
Victim Country: Israel
Victim Industry: Automotive
Victim Organization: auto1
Victim Site: auto1.co.il - DimasHxR Targets the Website of Darqomkoja
Category: Defacement
Content: The group claims to have defaced the website of Darqomkoja.
Date: 2026-03-10T04:28:20Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808475
Screenshots:
None
Threat Actors: DimasHxR
Victim Country: Iran
Victim Industry: Information Technology (IT) Services
Victim Organization: darqomkoja
Victim Site: darqomkoja.ir - DimasHxR Targets the Website of NILWP
Category: Defacement
Content: The group claims to have defaced the website of NILWP.
Date: 2026-03-10T04:20:06Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808484
Screenshots:
None
Threat Actors: DimasHxR
Victim Country: Iran
Victim Industry: Information Technology (IT) Services
Victim Organization: nilwp
Victim Site: nilwp.ir - Simsimi targets the website of Diesel Kuwait Online Store
Category: Defacement
Content: The group claims to have defaced the website of Diesel Kuwait Online Store
Date: 2026-03-10T04:17:57Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41594485
Screenshots:
None
Threat Actors: Simsimi
Victim Country: Kuwait
Victim Industry: E-commerce & Online Stores
Victim Organization: diesel kuwait online store
Victim Site: kw.diesel.com - DimasHxR targets the website of weblabs
Category: Defacement
Content: The group claims to have defaced the website of weblabs.
Date: 2026-03-10T04:10:59Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808503
Screenshots:
None
Threat Actors: DimasHxR
Victim Country: Iran
Victim Industry: Information Technology (IT) Services
Victim Organization: weblabs
Victim Site: weblabs.ir - Alleged sale of customers personal data from an unidentified Mexican manufacturing company
Category: Data Breach
Content: The threat actor claims to be leaked customers personal data from an unidentified Mexican manufacturing company. The compromised data reportedly contain 1 million records including customer names, addresses, phone numbers, tax identification numbers (RFC), region codes, contract numbers, site numbers, delivery unit details, city, state, ZIP codes, and record creation dates.
Date: 2026-03-10T03:47:21Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-MEXICO-1M-DATA-OF-PERSONAL-INFORMATION-OF-MANUFACTURING-COMPANY-CUSTOMERS
Screenshots:
None
Threat Actors: Shinchan
Victim Country: Mexico
Victim Industry: Manufacturing
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Hospital Universitario Del Valle Database
Category: Data Breach
Content: The threat actor claims to be selling a dataset allegedly belonging to Hospital Universitario Del Valle, containing hundreds of thousands of records including personal and medical-related information.
Date: 2026-03-10T03:36:37Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-SELLING-Hospital-Universitario-Del-Valle-264K-25GB
Screenshots:
None
Threat Actors: delitospenales
Victim Country: Colombia
Victim Industry: Hospital & Health Care
Victim Organization: hospital universitario del valle
Victim Site: huv.gov.co - Alleged sale of data from TicketToGo
Category: Data Breach
Content: The threat actor claims to be leaked data from TicketToGo. The compromised data reportedly contain 20,000 customer records including names, phone numbers, email addresses, password hashes, birth dates, user roles, authentication tokens, confirmation tokens, and account creation dates.
Date: 2026-03-10T03:16:34Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-MEXICO-20K-PERSONAL-CUSTOMER-INFORMATION-DATA-tickettogo-com-mx
Screenshots:
None
Threat Actors: Shinchan
Victim Country: Mexico
Victim Industry: Entertainment & Movie Production
Victim Organization: tickettogo
Victim Site: tickettogo.com.mx - Alleged Data Breach of Pompiers des Bouches-du-Rhône
Category: Data Breach
Content: The threat actor claims to have breached database of Pompiers des Bouches-du-Rhône.
Date: 2026-03-10T03:08:12Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-SDIS13-POMPIER13
Screenshots:
None
Threat Actors: 7ven
Victim Country: France
Victim Industry: Government Administration
Victim Organization: sdis13 – service départemental d’incendie et de secours des bouches-du-rhône
Victim Site: sdis13.fr - Alleged Data breach of Instituto de Capacitación para el Trabajo del Estado de Sonora (ICATSON)
Category: Data Breach
Content: The threat actor claims to have leaked data from Instituto de Capacitación para el Trabajo del Estado de Sonora (ICATSON). The exposed data fields allegedly include Students records and much more information.
Date: 2026-03-10T02:50:37Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-MEXICO-INSTITUTO-DE-CAPACITACI%C3%93N-PARA-EL-TRABAJO-DEL-ESTADO-DE-SONORA–68656
Screenshots:
None
Threat Actors: Alz_157s
Victim Country: Mexico
Victim Industry: Education
Victim Organization: instituto de capacitación para el trabajo del estado de sonora (icatson)
Victim Site: icatson.sonora.gob.mx - Alleged Data breach of Naval Store Sub Depo Dhaka (NSSD) Bangladesh Navy
Category: Data Breach
Content: The threat actor claims to have leaked data from Naval Store Sub Depo Dhaka (NSSD) Bangladesh Navy. The exposed data fields allegedly include Name, Email ID, Address, Telephone, and much more information.
Date: 2026-03-10T02:37:55Z
Network: openweb
Published URL: https://darkforums.su/Thread-NSSD-Bangladesh-Navy-FULL-DATABASE-EXPORT-SQL-FILE
Screenshots:
None
Threat Actors: Lei
Victim Country: Bangladesh
Victim Industry: Government & Public Sector
Victim Organization: naval store sub depo dhaka (nssd) bangladesh navy
Victim Site: nssd.navy.mil.bd - Alleged data leak of South Kalimantan Provincial Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of South Kalimantan Provincial Government.
Date: 2026-03-10T02:31:36Z
Network: telegram
Published URL: https://t.me/c/3427600175/470
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: south kalimantan provincial government
Victim Site: kalselprov.go.id - Alleged data leak of North Kalimantan Regional Authority
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of North Kalimantan Regional Authority
Date: 2026-03-10T02:27:21Z
Network: telegram
Published URL: https://t.me/c/3427600175/471
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: north kalimantan regional authority
Victim Site: kaltara.go.id - Alleged data breach of Ministry of Infrastructure and Transport (MIT)
Category: Data Breach
Content: The group claims to have compromised systems of the Ministry of Infrastructure and Transport in Italy, allegedly exploiting security vulnerabilities in the current systems.
Date: 2026-03-10T02:19:12Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3891
Screenshots:
None
Threat Actors: Infrastructure Destruction Squad
Victim Country: Italy
Victim Industry: Government & Public Sector
Victim Organization: ministry of infrastructure and transport (mit)
Victim Site: mit.gov.it - Alleged data leak of Pemerintah Daerah Kabupaten Karawang
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Pemerintah Daerah Kabupaten Karawang.
Date: 2026-03-10T02:16:41Z
Network: telegram
Published URL: https://t.me/c/3427600175/464
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: pemerintah daerah kabupaten karawang
Victim Site: karawangkab.go.id - Alleged data leak of Braude Academic College of Engineering
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Braude Academic College of Engineering.
Date: 2026-03-10T02:03:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/595
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Higher Education/Acadamia
Victim Organization: braude academic college of engineering
Victim Site: braude.ac.il - Alleged Data Leak of Government Pension System in USA
Category: Data Breach
Content: Threat actor claims to be selling a dataset containing over 510,000 records of U.S. fullz, allegedly sourced from a government retirement or pension system. The exposed data fields reportedly include SSN, first name, last name, date of birth, and ZIP code.
Date: 2026-03-10T02:01:51Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277931/
Screenshots:
None
Threat Actors: agcash6
Victim Country: USA
Victim Industry: Government Relations
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of CAEFF
Category: Data Breach
Content: Threat actor claims to have leaked a SQL database associated with Instituto Técnico Superior – MEC, reportedly linked to the domain CAEFF caeff.com.py. The shared dataset is described as an SQL dump dated March 06, 2026, allegedly containing approximately 143,692 rows and around 1,000 email records. Sample data indicates fields such as user ID, username, email address, hashed password, remember token, full name, role permissions, department, and designation.
Date: 2026-03-10T01:45:55Z
Network: openweb
Published URL: https://leakbase.bz/threads/caeff-com-py-leak.49259/
Screenshots:
None
Threat Actors: frog
Victim Country: Paraguay
Victim Industry: Education
Victim Organization: caeff
Victim Site: caeff.com.py - Moroccan Soldiers Claims to Target Unofficial Websites
Category: Alert
Content: A recent post by the group indicates that they are targeting Unofficial Websites
Date: 2026-03-10T01:45:23Z
Network: telegram
Published URL: https://t.me/MOROCCANSOLDIERS2/521
Screenshots:
None
Threat Actors: Moroccan Soldiers
Victim Country: Unknown
Victim Industry: Information Technology (IT) Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of 100 USA credit cards records
Category: Data Breach
Content: Threat actor claims to be selling 100 credit card records from USA. The compromised data reportedly includes card number, month, year, cvv, first name, last name, telephone number, email etc.
Date: 2026-03-10T00:36:08Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277911/
Screenshots:
None
Threat Actors: urbsnv
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized SSH and CRM access to hotel and wine shop
Category: Initial Access
Content: Threat actor claims to be selling unauthorized SSH and CRM access to unidentified hotel and wineshop in Sri Lanka.
Date: 2026-03-10T00:16:17Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277926/
Screenshots:
None
Threat Actors: williamblack
Victim Country: Sri Lanka
Victim Industry: Restaurants
Victim Organization: Unknown
Victim Site: Unknown