1. Executive Summary
This report details a series of recent cyber incidents, providing key information for each event, strictly based on the provided draft data. The dataset contains 87 distinct cybersecurity events recorded on March 11, 2026. The incidents span a global footprint, affecting multiple continents and industries. The primary attack vectors and incident categories identified include Data Breaches, Initial Access sales and claims, Website Defacements, targeted Alerts, and Malware deployment.
The data indicates a highly active threat landscape where both financially motivated actors (selling data and access) and ideologically/geopolitically motivated hacktivists (targeting specific nations like Israel, Iran, and the USA) are operating simultaneously. The exposure of sensitive medical records, classified government documents, and control over cyber-physical systems highlights the severe physical and privacy risks associated with these breaches.
2. Threat Landscape Analysis
2.1. Geographic Distribution of Victims
The cyber incidents recorded on this date show a wide geographic distribution, with certain nations experiencing concentrated targeting:
- Israel: Israel was a highly targeted nation, facing numerous data breach claims, defacements, and direct alerts from threat actors. Threat actors specifically claiming to target Israel include Investigation Anonymous, Mysterious Team Bangladesh, Cardinal, Handala Hack, and Anonymous For Justice.
- United States of America (USA): The USA faced significant data breaches and access sales, impacting companies like Aura Group, Inc., Staples, Peak Toolworks, Stryker, Verifone, and CareerLab.
- Iran: Iran was specifically targeted by the “KTX TEAM,” which claimed multiple website defacements against Iranian media and event organizations.
- Indonesia: Indonesian targets included government entities, banking, and human resources, with actors breaching the West Java Provincial Government, Magelang Regency Citizens, Bank Central Asia, and BSDM.
- Europe: Multiple European nations were targeted, including France (CCTV access, Le Caillebotis Diamond, JDC, Région Occitanie) , Spain (IBAN data sale) , Austria (HB Brantner) , Poland (PrestaShop access) , Finland (Viking Line) , Italy (Cargo Bike Retailer) , and Germany (BMW).
- Middle East & North Africa (MENA): Beyond Israel and Iran, incidents were recorded in the UAE (Ministry of Defense, defacements) , Tunisia (Ministry of Health, CVPT Education) , Saudi Arabia , and Morocco (CCTV access).
2.2. Categorical Breakdown of Incidents
The incidents can be categorized into the following primary types based on the threat actors’ claims:
- Data Breaches (The overwhelming majority): Actors claimed to have stolen, leaked, or deleted data. Targets included government databases, corporate networks, and healthcare providers. Notably, some breaches involved massive datasets, such as the “SkyBase V2” leak allegedly containing over 5.08 billion records (4.47TB) aggregated from major past breaches like Facebook, Equifax, and LinkedIn.
- Initial Access Brokers: Actors offered unauthorized access to various systems for sale or claimed to have established access. Examples include AWS SES SMTP Accounts , Brazilian Police Investigation Panels , South Korean government servers , and multiple e-commerce admin panels.
- Defacement: Websites were visually altered by attackers. This was a common tactic for groups like KTX TEAM and L4663R666H05T.
- Alerts: Threat actors issued public statements indicating their intent to target specific countries or organizations, such as the Middle East Observer targeting Gulf countries or Handala Hack targeting Stryker.
- Malware: One specific instance of malware/downtime was recorded against the Cyprus Ports Authority by NoName057(16).
3. Threat Actor Profiling
Several threat actors and groups demonstrated high activity levels or significant claims on March 11, 2026:
3.1. Anonymous For Justice
This group engaged in a highly targeted, destructive campaign against Israeli organizations, consistently claiming to have “deleted data” rather than merely exfiltrating it.
- Targets: Itzik Haimov Law Firm , Mommy Care , Ofikim , Highway 6 , Soha Zidan , and Shem Shaham (claiming 3 terabytes of deleted data).
- Stated Intent: The group explicitly posted an alert indicating they are targeting Israel and the USA.
3.2. Handala Hack
Handala Hack claimed responsibility for several high-profile attacks, blending defacement and massive data breaches.
- Key Incidents: * Claimed a large-scale cyberattack against Stryker (USA), alleging that over 200,000 systems and devices were wiped and approximately 50 terabytes of internal data were extracted, causing operational shutdowns.
- Claimed a breach of Verifone (USA), alleging disruptions to payment systems and extraction of financial data.
- Defaced the Academy of the Hebrew Language website (Israel).
3.3. KTX TEAM
This group focused entirely on defacing Iranian online infrastructure.
- Targets: Iran International , Mehr News Agency , Iran Trade Fair , and Iran Telecom.
3.4. Whale Hunters Groups
A highly prolific group claiming data breaches and access leaks across diverse geographic locations.
- Targets: Christian China Mission Holy Way School (China) , Breathalyzers in Moscow (Russia) , İstihdam Ofis (Turkey) , ACME Silver & Gold Jewellery Manufactory (China) , and an unspecified leak of Saudi Arabia data.
3.5. Initial Access Brokers (Various)
Multiple actors operated as Initial Access Brokers, selling footholds into corporate and government networks:
- JamieQuinn: Selling AWS SES SMTP Accounts with limits up to 10 million.
- edr & kodexseller: Both actors claimed to sell unauthorized access to a law enforcement investigation platform linked to the Civil Police of the State of São Paulo (Brazil).
- zSenior: Claimed unauthorized access to a South Korea Government server, pivoting to 42 internal hosts and gaining PostgreSQL SuperUser access.
4. Sector-Specific Incident Review
4.1. Government and Public Sector
Government entities were prime targets for data exfiltration and access brokering.
- UAE Ministry of Defense: “JRINTEL FREE DATA V3” claimed to leak classified documents from the Cyber Center.
- Yucatán Government (Mexico): Two separate actors (“wht” and “frog”) claimed breaches involving the
yucatan.gob.mxdomain. The leaked data reportedly contains patient medical information, including CURP numbers, diagnoses, and personal identifiers. - Tunisian Government: “dark07xxxx” and “DARK 07x” claimed breaches of the domain
rns.tnand specifically the Ministry of Health, leaking database information. - Indonesian Local Government: “CyznetAdel” claimed a breach of Magelang Regency Citizens’ data (NIK, names, addresses) , while “BabayoErorSystem” claimed to leak 37,350 records from the West Java Provincial Government.
- French Ministry of Armed Forces: Actor “7ven” claimed to breach the Journée Défense et Citoyenneté (JDC) program, exposing personal info of French users.
- National Public Database: Actor “debian” claimed to leak a 50GB dataset from an unknown national public database.
4.2. Healthcare and Medical Data Exposure
The exposure of Protected Health Information (PHI) was a recurring and critical theme.
- Yucatán Government Health System: As noted, medical records including diagnoses and prescriptions were leaked.
- Unidentified US Gastroenterology Clinic: “StealMan” claimed to leak 167,000 patient medical records, including SSNs, DOBs, and diagnoses.
- Tunisian Ministry of Public Health: Databases were allegedly accessed by multiple threat actors.
4.3. Cyber-Physical Systems and IoT
A highly concerning trend in the data is the unauthorized access to cyber-physical systems, allowing threat actors to manipulate real-world environments.
- Romanian Smart Home: “Z-PENTEST ALLIANCE” claimed full control over a smart home management system in Romania. The actor reported the ability to remotely adjust heating, lighting, ventilation, and window blinds across multiple zones of the residence.
- Ukrainian Industrial Refrigeration: “NoName057(16)” claimed access to an industrial refrigeration climate control system in Ukraine. They alleged visibility and control over compressors, fans, humidifiers, and temperature settings, stating the ability to manually manage cooling which could affect temperature-sensitive goods.
- CCTV Systems: Unauthorized access to CCTV systems was claimed in France (by MORNING STAR) and Morocco (by BlackMaskers Army).
4.4. Corporate, Financial, and Retail
Financially motivated attacks targeted corporate data, consumer PII, and financial infrastructure.
- Aura Group, Inc.: ShinyHunters claimed to compromise over 2 million records containing PII and internal corporate data.
- Staples: CoinbaseCartel claimed a breach of the Staples database.
- Financial Data Sales: Actors sold credit card records from Australia (500 records) and Europe (373 records) , as well as a Spanish database containing 8.15 million records with IBANs. Verified trading accounts with sensitive KYC documents (IDs, proof of residence) and $140,000 in equity were also offered for sale.
- Manufacturing and Automotive: Alleged breaches impacted BMW (internal data leaked by IntelChipX) , HB Brantner (confidential technical drawings and engineering docs) , and Peak Toolworks.
- Telecommunications: A massive dataset containing 18,653,476 WhatsApp phone numbers belonging to Indian citizens was allegedly leaked by CyznetAdel.
5. Strategic Geopolitical Threats & Alerts
The dataset features several proactive alerts and targeting claims by hacktivist groups, highlighting the intersection of geopolitics and cybersecurity:
- Anti-Israel Campaigns: Multiple groups issued alerts targeting Israel. “Investigation Anonymous” , “Mysterious Team Bangladesh” , “Cardinal” , and “Anonymous For Justice” all explicitly stated their intent to attack Israeli infrastructure. “Cardinal” additionally claimed to leak a document containing names, call signs, and positions of Israeli service personnel.
- Middle East Targeting: The “Middle East Observer” issued an alert targeting four Gulf countries: Bahrain, Saudi Arabia, the UAE, and Kuwait. Furthermore, “mehwargun” claimed to target an Iranian bank, as well as Google, Microsoft, and Nvidia infrastructure in the Middle East.
6. Conclusion
Based strictly on the provided draft data from March 11, 2026, the cybersecurity landscape is characterized by a high volume of diverse and severe threats. The data reveals a dual-threat environment: highly motivated hacktivist groups conducting disruptive operations and defacements (particularly focused on Middle Eastern geopolitical tensions involving Israel and Iran) , operating alongside sophisticated cybercriminal entities focused on data theft and initial access brokering.
The most critical risks identified in this report include the exposure of sensitive medical and government databases (such as those in the UAE, Mexico, and Tunisia) , and the alarming compromise of cyber-physical systems (HVAC and refrigeration controls in Romania and Ukraine), which bridge the gap between digital intrusion and real-world physical consequences. The aggregation of massive datasets, exemplified by the 5 billion-record SkyBase V2 leak, further demonstrates the compounding risk of historical data breaches. Organizations across all sectors—particularly Government, Healthcare, and Manufacturing—must recognize that both their proprietary data and their physical operational technology are actively being targeted and traded on open and dark web forums.
Detected Incidents Draft Data
- Alleged leak of UAE Ministry of Defense Cyber Center
Category: Data Breach
Content: The group claims to have leaked data from classified documents from UAE Ministry of Defense Cyber Center.
Date: 2026-03-11T23:27:18Z
Network: telegram
Published URL: https://t.me/topsecretdocumentsleaked/234
Screenshots:
None
Threat Actors: JRINTEL FREE DATA V3
Victim Country: UAE
Victim Industry: Government Administration
Victim Organization: uae ministry of defense cyber center
Victim Site: mod.gov.ae - Alleged data breach of Aura Group, Inc.
Category: Data Breach
Content: A threat actor claims to have compromised the systems of Aura Group, Inc., alleging that over 2 million records containing personally identifiable information (PII) and internal corporate data have been obtained.
Date: 2026-03-11T22:04:19Z
Network: tor
Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
Screenshots:
None
Threat Actors: ShinyHunters
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: aura group, inc.
Victim Site: auragrp.com - InDoM1nus Team targets the website of BSDM
Category: Defacement
Content: The group claims to have defaced the website of BSDM.
Date: 2026-03-11T21:51:15Z
Network: telegram
Published URL: https://t.me/InDoM1nusTe4m/106
Screenshots:
None
Threat Actors: InDoM1nus Team
Victim Country: Indonesia
Victim Industry: Human Resources
Victim Organization: bsdm
Victim Site: bsdm.co.id - Alleged data breach of Yucatán Government Health System
Category: Data Breach
Content: A threat actor claims to have leaked medical records from systems associated with the Yucatán government domain (yucatan.gob.mx). The exposed data patient medical information, including personal identifiers, names, CURP numbers, birth dates, gender, addresses, consultation details, diagnoses, prescriptions, and healthcare provider information.
Date: 2026-03-11T21:39:09Z
Network: openweb
Published URL: https://hydraforums.io/Threads-mexico-medical-records-yucatan-gob-mx
Screenshots:
None
Threat Actors: wht
Victim Country: Mexico
Victim Industry: Hospital & Health Care
Victim Organization: yucatán government health system
Victim Site: yucatan.gob.mx - Allleged data leak of National Public Database
Category: Data Breach
Content: The threat actor claims to have leaked a 50GB dataset from a national public database.
Date: 2026-03-11T21:17:27Z
Network: openweb
Published URL: https://breachforums.as/Thread-National-Public-Database-50GiB
Screenshots:
None
Threat Actors: debian
Victim Country: Unknown
Victim Industry: Government & Public Sector
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Tunisian Ministry of Health
Category: Data Breach
Content: A threat actor claims to have breached the government domain rns.tn, which is reportedly associated with the Tunisian Ministry of Health and its affiliated institutions.
Date: 2026-03-11T21:10:46Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Breach-Statement-Tunisian-Government-Domain-rns-tn
Screenshots:
None
Threat Actors: dark07xxxx
Victim Country: Tunisia
Victim Industry: Government & Public Sector
Victim Organization: tunisian ministry of health
Victim Site: rns.tn - Alleged Data Breach of Government of Yucatán
Category: Data Breach
Content: Threat Actor claims to have breached the database of Government of Yucatán in Mexico. The dataset contains medical records and is provided in JSON format dated March 2026. The data includes two files, one containing 15,529 user records and another containing 6,943 rows of data.
Date: 2026-03-11T20:54:18Z
Network: openweb
Published URL: https://leakbase.bz/threads/mexico-medical-records-yucatan-gob-mx.49274/
Screenshots:
None
Threat Actors: frog
Victim Country: Mexico
Victim Industry: Government Administration
Victim Organization: government of yucatán
Victim Site: yucatan.gob.mx - Alleged data breach of Staples
Category: Data Breach
Content: The threat actor claims to have breached the database of Staples.
Date: 2026-03-11T20:44:56Z
Network: tor
Published URL: http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/staples
Screenshots:
None
Threat Actors: CoinbaseCartel
Victim Country: USA
Victim Industry: Retail Industry
Victim Organization: staples
Victim Site: staples.com - Alleged Sale of Unauthorized Multiple Access to an Unidentified PrestaShop in Poland
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to a PrestaShop-based website located in Poland. The access includes shell access, MySQL database access, and administrator privileges. It also includes several PrestaShop payment modules, including Przelewy24, CashOnDelivery, WirePayment, and x13allegro, along with associated transaction counts from different months.
Date: 2026-03-11T20:36:40Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278095/
Screenshots:
None
Threat Actors: marcomouly
Victim Country: Poland
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Ministry of Public Health
Category: Data Breach
Content: The group claims to have accessed database of the Tunisian government domain, Ministry of Public Health.
Date: 2026-03-11T20:21:38Z
Network: telegram
Published URL: https://t.me/DarK07xxxxxxx/1708
Screenshots:
None
Threat Actors: DARK 07x
Victim Country: Tunisia
Victim Industry: Hospital & Health Care
Victim Organization: ministry of public health
Victim Site: santetunisie.rns.tn - Alleged data leak of Peleg, Sharon & Co
Category: Data Breach
Content: The group claim to have gained 2 TB of data from Peleg, Sharon & Co.
Date: 2026-03-11T20:17:03Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/22
Screenshots:
None
Threat Actors: Investigation Anonymous
Victim Country: Israel
Victim Industry: Law Practice & Law Firms
Victim Organization: peleg, sharon & co
Victim Site: Unknown - Alleged unauthorized access to unidentified CCTV Systems in France
Category: Initial Access
Content: The group claims to have gained unauthorized access to unidentified CCTV Systems in France.
Date: 2026-03-11T20:03:28Z
Network: telegram
Published URL: https://t.me/op_morningstar/523
Screenshots:
None
Threat Actors: MORNING STAR
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged access to MunicipalNET
Category: Initial Access
Content: The group claims to have gained access to MunicipalNET.
Date: 2026-03-11T19:46:47Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/76
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Brazil
Victim Industry: Government Administration
Victim Organization: municipalnet
Victim Site: municipalnet.com.br - Alleged unauthorized access to an unidentified smart home management system in Romania
Category: Initial Access
Content: The group claims to have gained unauthorized access to a smart home management system in Romania, allegedly obtaining full control over components responsible for heating, lighting, ventilation, and window blinds across multiple zones of the residence. According to the statement, the actor reports the ability to adjust temperature settings, manipulate lighting parameters, control blinds, and operate ventilation systems remotely while navigating between different floors and rooms.
Date: 2026-03-11T19:36:50Z
Network: telegram
Published URL: https://t.me/c/3792806777/16
Screenshots:
None
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Romania
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of AIBuilderClub
Category: Data Breach
Content: A threat actor claims to have leaked the database of AIBuilderClub. The exposed dataset reportedly contains several types of user information, including email addresses, full names, user IDs (UIDs), profile images, customer IDs, price IDs, account creation and update timestamps, metadata, and access status fields.
Date: 2026-03-11T19:31:43Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-AIBuilderClub-com-Database
Screenshots:
None
Threat Actors: korea
Victim Country: USA
Victim Industry: Information Technology (IT) Services
Victim Organization: aibuilderclub
Victim Site: aibuilderclub.com - Alleged Data Breach of Christian China Mission Holy Way School
Category: Data Breach
Content: The group claims to have obtained database access and leaked admin credentials to Christian China Mission Holy Way School.
Date: 2026-03-11T19:27:38Z
Network: telegram
Published URL: https://t.me/c/3772103374/3218
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: China
Victim Industry: Education
Victim Organization: christian china mission holy way school
Victim Site: holyword.edu.hk - Alleged Data Leak of SkyBase V2 Database
Category: Data Breach
Content: A threat actor claims to have leaked SkyBase V2, a 4.47TB dataset. which includes over 5.08 billion records and a main text file containing 25 million+ lines of aggregated data. The dataset allegedly compiles data from several major breaches, including Ashley Madison, Equifax, Facebook, Marriott International, Yahoo, Adobe, eBay, LinkedIn, MyFitnessPal, Canva, and Dubsmash.
Date: 2026-03-11T19:26:01Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-SkybaseV2-4-47-TB
Screenshots:
None
Threat Actors: The1F
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Breathalyzers in Moscow
Category: Data Breach
Content: The group claims to have leaked data which includes phone numbers, email addresses, FIO from Breathalyzers in Moscow.
Date: 2026-03-11T19:22:41Z
Network: telegram
Published URL: https://t.me/c/3772103374/3204
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: Russia
Victim Industry: Retail Industry
Victim Organization: breathalyzers in moscow
Victim Site: alkotestery.ru - Investigation Anonymous claims to target Israel
Category: Alert
Content: A recent post by the group indicates that they are targeting Israel.
Date: 2026-03-11T19:19:47Z
Network: telegram
Published URL: https://t.me/investigationAnonYmous0/13304
Screenshots:
None
Threat Actors: Investigation Anonymous
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of İstihdam Ofis
Category: Data Breach
Content: The group claims to have breached the database of İstihdam Ofis.
Date: 2026-03-11T18:50:05Z
Network: telegram
Published URL: https://t.me/c/3772103374/3235
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: Turkey
Victim Industry: Staffing/Recruiting
Victim Organization: istihdam ofis
Victim Site: stihdamofisi.net - Alleged admin access to ACME Silver & Gold Jewellery Manufactory (China) Limited
Category: Initial Access
Content: The group claims to have leaked admin credentials to ACME Silver & Gold Jewellery Manufactory (China) Limited.
Date: 2026-03-11T18:46:20Z
Network: telegram
Published URL: https://t.me/c/3772103374/3219
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: China
Victim Industry: Luxury Goods & Jewelry
Victim Organization: acme silver & gold jewellery manufactory (china) limited
Victim Site: acmejewels.com.hk - Mysterious Team Bangladesh claims to target Israel
Category: Alert
Content: A recent post by the group indicates that they are targeting online infrastructures of Israel.
Date: 2026-03-11T18:37:21Z
Network: telegram
Published URL: https://t.me/MysteriousTeamO/31
Screenshots:
None
Threat Actors: Mysterious Team Bangladesh
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of Saudi Arabia data
Category: Data Breach
Content: The group claims to have leaked data belonging to Saudi Arabia.
Date: 2026-03-11T18:31:33Z
Network: telegram
Published URL: https://t.me/c/3772103374/3215
Screenshots:
None
Threat Actors: Whale Hunters Groups
Victim Country: Saudi Arabia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Handala Hack claims to target
Category: Alert
Content: A recent post by the group indicates that they targeting Stryker.
Date: 2026-03-11T18:09:37Z
Network: telegram
Published URL: https://t.me/HANDALA_HPR2/47
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: USA
Victim Industry: Medical Equipment Manufacturing
Victim Organization: stryker
Victim Site: stryker.com - Alleged Sale of AWS SES SMTP Accounts
Category: Initial Access
Content: Threat Actor claims to be selling AWS SES SMTP Accounts. They provide accounts with random or unknown limits, as well as specific limits starting from 50,000 emails and higher, including 100,000, 200,000, 1 million, and up to 10 million sending limits.
Date: 2026-03-11T18:08:44Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278071/
Screenshots:
None
Threat Actors: JamieQuinn
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - KTX TEAM targets the website of Iran International
Category: Defacement
Content: The group claims to have defaced the website of Iran International .
Date: 2026-03-11T17:41:59Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41604372
Screenshots:
None
Threat Actors: KTX TEAM
Victim Country: Iran
Victim Industry: Online Publishing
Victim Organization: iran international
Victim Site: iranintl.com/en - Alleged access to Acacia Consulting & Research
Category: Initial Access
Content: The group claims to have leaked access to Acacia Consulting & Research.
Date: 2026-03-11T17:41:56Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/75
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Canada
Victim Industry: Research Industry
Victim Organization: acacia consulting & research
Victim Site: acaciaconsulting.ca - Alleged Sale of Unauthorized Sitrix and VPN Access to an Unidentified Company in USA
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to an unidentified company in USA. The access allegedly includes Sitrix and VPN entry points.
Date: 2026-03-11T17:33:30Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278077/
Screenshots:
None
Threat Actors: SantaAd
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - KTX TEAM targets the website of Mehr News Agency
Category: Defacement
Content: The group claims to have defaced the website of Mehr News Agency.
Date: 2026-03-11T17:33:01Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41604371
Screenshots:
None
Threat Actors: KTX TEAM
Victim Country: Iran
Victim Industry: Online Publishing
Victim Organization: mehr news agency
Victim Site: tr.mehrnews.com - Alleged Sale of Business Corporate Data Leads from Netherlands and Belgium
Category: Data Breach
Content: Threat Actor claims to be selling fresh 2025 business datasets from the Netherlands and Belgium, covering companies across more than 10 business sectors. The dataset allegedly includes company name, full address (street, postcode, city, state, country), email address, website, phone and mobile numbers, CEO or company leader name, latest reported annual revenue, number of employees, legal company form, year established, financial holding status, eco activity status, and main business activity or sector.
Date: 2026-03-11T17:24:00Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278067/
Screenshots:
None
Threat Actors: bootje167
Victim Country: Netherlands
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of 18.6 Million WhatsApp Numbers of Indian Citizens
Category: Data Breach
Content: A threat actor claims to have leaked a dataset containing 18,653,476 WhatsApp phone numbers belonging to Indian citizens.
Date: 2026-03-11T16:51:24Z
Network: openweb
Published URL: https://breachforums.as/Thread-18-653-476-WhatsApp-Numbers-of-Indian-Citizens-have-been-leaked-by-Adellnism
Screenshots:
None
Threat Actors: CyznetAdel
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - KTX TEAM targets the website of Iran Trade Fair
Category: Defacement
Content: The group claims to have defaced the website of Iran Trade Fair.
Date: 2026-03-11T16:49:46Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41604376
Screenshots:
None
Threat Actors: KTX TEAM
Victim Country: Iran
Victim Industry: Events Services
Victim Organization: iran trade fair
Victim Site: irantradefair.com/iran-telecom - KTX TEAM targets the website of Iran Telecom
Category: Defacement
Content: The group claims to have defaced the website of Iran Telecom
Date: 2026-03-11T16:42:48Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41604377
Screenshots:
None
Threat Actors: KTX TEAM
Victim Country: Iran
Victim Industry: Network & Telecommunications
Victim Organization: iran telecom
Victim Site: iran-telecom.info - Alleged Sale of Unauthorized Magento Admin Access in Netherlands
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized Magento admin access in Netherlands.
Date: 2026-03-11T16:40:32Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278066/
Screenshots:
None
Threat Actors: hubert
Victim Country: Netherlands
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Verifone
Category: Data Breach
Content: The group claims to have breached Verifone, a global provider of payment solutions and point-of-sale (POS) terminals. The group alleges that the compromise caused disruptions to payment systems and terminals and that transaction-related and financial data associated with the company’s infrastructure was extracted.
Date: 2026-03-11T16:18:30Z
Network: openweb
Published URL: https://handala-hack.to/verifone-hacked/
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: verifone
Victim Site: verifone.com - Alleged data breach of HB Brantner
Category: Data Breach
Content: Threat Actor claims to have breached the database of Hans Brantner & Sohn Fahrzeugbaugesellschaft m.b.H. in Austria. The exposed data reportedly includes customer records, internal correspondence, vehicle documentation, non-disclosure agreements, confidential technical drawings, engineering documentation, and other corporate materials related to agricultural transport trailers and equipment manufacturing
Date: 2026-03-11T14:59:30Z
Network: tor
Published URL: http://nleakk6sejx45jxtk7x6iyt65hwvfrkifc5v7ertdlwm3gttbpvlvxqd.onion/view_article.php?article=QZjdSV4DYe8UEAUi4LXjEq7mx6tQv0M05SJtPkU7l4lkPaVvEjVpbURzgV4R1WP7
Screenshots:
None
Threat Actors: Leaknet
Victim Country: Austria
Victim Industry: Machinery Manufacturing
Victim Organization: hb brantner
Victim Site: hb-brantner.at - Alleged data breach of Viking Line
Category: Data Breach
Content: A threat actor claims to have leaked data allegedly belonging to Viking Line Ferries. the dataset reportedly contains a database with travelers’ personal information, including passenger details and vehicle registration plates.
Date: 2026-03-11T14:46:18Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FI-Viking-Line-Ferries–191050
Screenshots:
None
Threat Actors: bytetobreach
Victim Country: Finland
Victim Industry: Transportation & Logistics
Victim Organization: viking line
Victim Site: vikingline.com - Alleged Unauthorized Access to CVPT Education
Category: Initial Access
Content: The group claims to have gained unauthorized access to CVPT Education.
Date: 2026-03-11T14:11:35Z
Network: telegram
Published URL: https://t.me/firewirBackupChannel/226
Screenshots:
None
Threat Actors: Fire Wire
Victim Country: Tunisia
Victim Industry: Professional Training
Victim Organization: cvpt education
Victim Site: education.cvpt.tn - Alleged leak of document on Israeli service personnel
Category: Data Breach
Content: The threat actor claims to have obtained a document allegedly containing detailed information on individuals described as Israeli service personnel. The document reportedly includes names, call signs, workplaces, positions, contact details, and additional personal data.
Date: 2026-03-11T14:05:07Z
Network: telegram
Published URL: https://t.me/c/2869875394/355
Screenshots:
None
Threat Actors: Cardinal
Victim Country: Israel
Victim Industry: Military Industry
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Peak Toolworks
Category: Data Breach
Content: The threat actor claims to have breached data from Peak Toolworks and intends to publish it within 1-2 days.
Date: 2026-03-11T13:54:50Z
Network: tor
Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/4402916269/overview
Screenshots:
None
Threat Actors: Worldleaks
Victim Country: USA
Victim Industry: Manufacturing & Industrial Products
Victim Organization: peak toolworks
Victim Site: peaktoolworks.com - Alleged data breach of Stryker
Category: Data Breach
Content: The threat actor claims to have conducted a large-scale cyberattack against Stryker, alleging that over 200,000 systems and devices were wiped and approximately 50 terabytes of internal data were extracted. The actor asserts that the breach forced operational shutdowns across Stryker’s global offices.
Date: 2026-03-11T13:44:39Z
Network: openweb
Published URL: https://handala-hack.to/stryker-corporation-hacked/
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: USA
Victim Industry: Medical Equipment Manufacturing
Victim Organization: stryker
Victim Site: stryker.com - Alleged data breach of Itzik Haimov Law Firm
Category: Data Breach
Content: Group claims to have deleted data from the systems of Itzik Haimov Law Firm.
Date: 2026-03-11T13:22:09Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/20
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Law Practice & Law Firms
Victim Organization: itzik haimov law firm
Victim Site: Unknown - Alleged data breach of Mommy Care
Category: Data Breach
Content: Group claims to have deleted data from the systems of Mommy Care.
Date: 2026-03-11T13:15:42Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/21
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: mommy care
Victim Site: Unknown - Alleged data breach of Ofikim
Category: Data Breach
Content: Group claims to have deleted data from the systems of Ofikim.
Date: 2026-03-11T13:14:34Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/19
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Human Resources
Victim Organization: ofikim
Victim Site: Unknown - Alleged data breach of LakMobile Technology
Category: Data Breach
Content: The threat actor claims to have breached the source codes from LakMobile Technology.
Date: 2026-03-11T12:54:27Z
Network: openweb
Published URL: https://breachforums.as/Thread-SOURCE-CODE-Lakmobile-com-Data-Breach-Leaked-Download
Screenshots:
None
Threat Actors: 888
Victim Country: Sri Lanka
Victim Industry: Information Technology (IT) Services
Victim Organization: lakmobile technology
Victim Site: lakmobile.com - Alleged Unauthorized Access to Industrial Refrigeration Climate Control System in Ukraine
Category: Initial Access
Content: The group claims to have accessed an industrial refrigeration chamber climate control system in Ukraine developed by M.A.S. Systems, reportedly gaining visibility into and control over compressors, fans, humidifiers, ventilation, and temperature and humidity settings. They allege the ability to modify operational parameters and manually manage cooling and air exchange processes, which could affect the storage conditions of temperature-sensitive goods.
Date: 2026-03-11T12:53:58Z
Network: telegram
Published URL: https://t.me/c/2787466017/2826
Screenshots:
None
Threat Actors: NoName057(16)
Victim Country: Ukraine
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyber Islamic resistance targets the website of Vegan Recipes
Category: Defacement
Content: The group claims to have defaced the website of Vegan Recipes.
Date: 2026-03-11T12:20:46Z
Network: telegram
Published URL: https://t.me/CIR48/1699
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Unknown
Victim Industry: Food & Beverages
Victim Organization: vegan recipes
Victim Site: veganrecipes101.com - Cyber Islamic resistance targets the website of PAKTOTO
Category: Defacement
Content: The group claims to have defaced the website of PAKTOTO
Date: 2026-03-11T12:09:08Z
Network: telegram
Published URL: https://t.me/CIR48/1699
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Unknown
Victim Industry: Gaming
Victim Organization: paktoto
Victim Site: diamondfinancepvt.com - Alleged Sale of Corporate Access data
Category: Data Breach
Content: The threat actor claims to be selling unauthorized access and internal data from multiple companies across Spain, the UK, Brazil, Guatemala, Mexico, and India, including developer repositories, SSO configurations, and customer databases.
Date: 2026-03-11T11:58:49Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278049/
Screenshots:
None
Threat Actors: BugMakeSoap
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Magelang Regency Citizens
Category: Data Breach
Content: The threat actor claims to have breached citizens data belonging to residents of Magelang Regency. The dataset allegedly include National Identification Numbers (NIK), full names, addresses, marital status, occupations, and other demographic details.
Date: 2026-03-11T11:43:27Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-DATA-WARGA-KABUPATEN-MAGELANG
Screenshots:
None
Threat Actors: CyznetAdel
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: magelang regency government
Victim Site: magelangkab.go.id - Alleged unauthorized access to south korea government server
Category: Initial Access
Content: The threat actor claims have gained unauthorized access to South Korea Govt server, pivoted to 42 internal hosts, gained PostgreSQL SuperUser access on 192.168.0.147, exposing PII. Claims RCE access on other internal systems.
Date: 2026-03-11T11:32:55Z
Network: openweb
Published URL: https://breachforums.as/Thread-South-Korea-Gov-Root-Access-Lateral-Movement
Screenshots:
None
Threat Actors: zSenior
Victim Country: South Korea
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of verified trading accounts
Category: Data Breach
Content: The threat actor claims to be selling a collection of verified trading accounts with a reported total equity of $140,000. the leak allegedly contains sensitive KYC docs for account holders, including names, DOBs, mobile numbers, and scans of IDs and proof of residence.
Date: 2026-03-11T11:13:52Z
Network: openweb
Published URL: https://breachforums.as/Thread-547-Verified-Trading-Accounts-%E2%80%93-140K-Total-Equity
Screenshots:
None
Threat Actors: FFFV
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cardinal claims to target Israel
Category: Alert
Content: A recent post by the group indicating that they are targeting Israel.
Date: 2026-03-11T10:47:49Z
Network: telegram
Published URL: https://t.me/c/2869875394/354
Screenshots:
None
Threat Actors: Cardinal
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of low-authority websites list
Category: Cyber Attack
Content: The group claims to be selling a list of low-authority websites likely intended for use in future cyberattacks.
Date: 2026-03-11T10:20:33Z
Network: telegram
Published URL: https://t.me/phteammarket/335
Screenshots:
None
Threat Actors: Pharaohs Team market
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - INDOHAXSEC targets the website of CareerLab
Category: Defacement
Content: The group claims to have defaced the website of CareerLab.
Date: 2026-03-11T09:48:08Z
Network: telegram
Published URL: https://t.me/IndoHaxSec3/70
Screenshots:
None
Threat Actors: INDOHAXSEC
Victim Country: USA
Victim Industry: Professional Training
Victim Organization: careerlab
Victim Site: careerlab.com - Handala Hack targts the website of Academy of the Hebrew Language
Category: Defacement
Content: Group claims to have defaced the website of Academy of the Hebrew Language.
Date: 2026-03-11T09:43:47Z
Network: telegram
Published URL: https://t.me/HANDALA_HPR2/27
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: Israel
Victim Industry: Education
Victim Organization: academy of the hebrew language
Victim Site: hebrew-academy.org.il - Alleged unauthorized access to Unidentified CCTV of Moroccan home
Category: Initial Access
Content: The group claims to have gained unauthorized access to Unidentified CCTV of Moroccan home.
Date: 2026-03-11T09:12:05Z
Network: telegram
Published URL: https://t.me/TheBlackMaskers/288
Screenshots:
None
Threat Actors: BlackMaskers Army
Victim Country: Morocco
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the website of Bevarabia UAE
Category: Defacement
Content: The group claims to have defaced the website of Bevarabia UAE.
Date: 2026-03-11T08:41:17Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/809069
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Food & Beverages
Victim Organization: bevarabia uae
Victim Site: uae.bevarabia.com - Anonymous For Justice claims to target Israel and USA
Category: Alert
Content: A recent post by the group indicates that they are targeting Israel and USA.
Date: 2026-03-11T08:38:06Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/14
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the website of Vapes UAE
Category: Defacement
Content: The group claims to have defaced the website of Vapes UAE.
Date: 2026-03-11T08:36:34Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808924
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: E-commerce & Online Stores
Victim Organization: vapes uae
Victim Site: vapesuae.com - Alleged data breach of Highway 6
Category: Data Breach
Content: Group claims to have deleted data from the systems of Highway 6.
Date: 2026-03-11T08:27:21Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/16
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Transportation & Logistics
Victim Organization: highway 6
Victim Site: Unknown - Alleged sale of unauthorized access to Civil Police of the State of São Paulo
Category: Initial Access
Content: The threat actor claims to be selling alleged full-access credentials to a law enforcement investigation platform linked to the Civil Police of the State of São Paulo, including internal VPN access, an institutional webmail account.
Date: 2026-03-11T08:23:00Z
Network: openweb
Published URL: https://breached.st/threads/full-access-investigation-brazilian-police-panel-law-enforcement-webmail.1164/
Screenshots:
None
Threat Actors: edr
Victim Country: Brazil
Victim Industry: Government Administration
Victim Organization: civil police of the state of são paulo
Victim Site: policiacivil.sp.gov.br - Alleged data breach of Soha Zidan
Category: Data Breach
Content: Group claims to have deleted data from the systems of Soha Zidan.
Date: 2026-03-11T08:19:50Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/17
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: soha zidan
Victim Site: Unknown - Alleged data breach of Shem Shaham
Category: Data Breach
Content: The group claims to have deleted 3 terabytes of data from the systems of Shem Shaham.
Date: 2026-03-11T08:10:46Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/18
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Accounting
Victim Organization: shem shaham
Victim Site: Unknown - NoName targets the website of Cyprus Ports Authority
Category: Malware
Content: Proof of downtime: http://check-host.net/check-report/3b784fcak404
Date: 2026-03-11T07:47:52Z
Network: telegram
Published URL: https://t.me/c/2787466017/2817
Screenshots:
None
Threat Actors: NoName057(16)
Victim Country: Cyprus
Victim Industry: Government Administration
Victim Organization: cyprus ports authority
Victim Site: cpa.gov.cy - Alleged sale of IBAN data from Spain
Category: Data Breach
Content: The threat actor claims to be selling data from Spain. Dataset includes 8.15 million records of names, addresses, phone numbers, emails, IBANs, and financial institution operating.
Date: 2026-03-11T07:43:38Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-LEADS-IBAN-SPAIN
Screenshots:
None
Threat Actors: injectioninferno
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Palestine Memory
Category: Data Breach
Content: The threat actor claims to have breached a 172.8 GB database archive allegedly belonging to the Palestine Memory Project, reportedly containing archival materials documenting the history of Palestine, including documents, memoirs, correspondence, photographs, and publications spanning from the early 1900s to the present.
Date: 2026-03-11T07:30:59Z
Network: openweb
Published URL: https://breachforums.as/Thread-PS-IL-172-8-GB-palestine-memory-org-Full-Archive-Since-1900s
Screenshots:
None
Threat Actors: CVDEAD
Victim Country: Unknown
Victim Industry: Non-profit & Social Organizations
Victim Organization: palestine memory
Victim Site: palestine-memory.org - L4663R666H05T targets the website of SYS LLC
Category: Defacement
Content: The group claims to have defaced the website of SYS LLC
Date: 2026-03-11T07:23:55Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/809539
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Other Industry
Victim Organization: sys llc
Victim Site: sysllc.ae - Alleged Data breach of Bank Central Asia (BCA)
Category: Data Breach
Content: The threat actor claims to have leaked data from Bank Central Asia (BCA). The compromised data reportedly contains 1,753 records, The exposed data fields allegedly include ID, password, password (hash), username, domain, phone, email information.
Date: 2026-03-11T06:11:16Z
Network: openweb
Published URL: https://breachforums.as/Thread-ID-1k-BCA-accounts
Screenshots:
None
Threat Actors: VFVCT
Victim Country: Indonesia
Victim Industry: Banking & Mortgage
Victim Organization: bank central asia (bca)
Victim Site: bca.co.id - Middle East Observer Claims to Target multiple middle east countries
Category: Alert
Content: A recent post by the group indicates that they are targeting 4 Gulf countries, attacks on Bahrain, Saudi Arabia, the UAE, and Kuwait.
Date: 2026-03-11T05:52:43Z
Network: telegram
Published URL: https://t.me/me_observer_TG/829522
Screenshots:
None
Threat Actors: Middle East Observer
Victim Country: Bahrain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - InDoM1nuS Team targets the website of CelloCard
Category: Defacement
Content: The group claims to have defaced the website of CelloCard
Date: 2026-03-11T05:50:30Z
Network: telegram
Published URL: https://t.me/InDoM1nusTe4m/105
Screenshots:
None
Threat Actors: InDoM1nuS Team
Victim Country: Israel
Victim Industry: Marketing, Advertising & Sales
Victim Organization: cellocard
Victim Site: cellocard.co.il - Alleged leak of Patient Medical Records from Unidentified Gastroenterology (GI) Clinic
Category: Data Breach
Content: The threat actor claims to be leaked 167,000 Patient Medical Records from undefined Gastroenterology (GI) Clinic. The exposed data fields allegedly include SSNs, DOBs, names, diagnoses information.
Date: 2026-03-11T05:13:58Z
Network: openweb
Published URL: https://darkforums.su/Thread-US-GI-clinic-167k-patients-fullz-phone-email-diagnoses-medications
Screenshots:
None
Threat Actors: StealMan
Victim Country: USA
Victim Industry: Hospital & Health Care
Victim Organization: Unknown
Victim Site: Unknown - Alleged Unauthorized Access to American Outlets website
Category: Initial Access
Content: The group claims to have gained unauthorized access to a user account on the Israeli online shopping site American Outlets. The allegedly compromised account data includes personal information such as the user’s name, date of birth, national ID number, email address, password, phone number, and default billing and shipping addresses associated with the account.
Date: 2026-03-11T05:05:01Z
Network: telegram
Published URL: https://t.me/IndoHaxSec3/68
Screenshots:
None
Threat Actors: INDOHAXSEC
Victim Country: Israel
Victim Industry: E-commerce & Online Stores
Victim Organization: american outlets
Victim Site: americanoutlets.co.il - Alleged sale of 500 credit card records
Category: Data Breach
Content: Threat actor claims to be selling 500 credit card records from Australia. The compromised data reportedly includes card number, expiry, cvv, full name, address, city, state, zip, country etc.
Date: 2026-03-11T04:39:00Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277984/
Screenshots:
None
Threat Actors: old_pirat
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Unauthorized Access to Italian Cargo Bike Retailer
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to Italian Cargo Bike Retailer.
Date: 2026-03-11T04:37:19Z
Network: openweb
Published URL: https://breachforums.as/Thread-Access-Italian-Cargo-Bike-Retailer
Screenshots:
None
Threat Actors: fluffyduck
Victim Country: Italy
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Thai Petroleum & Trading Co., Ltd.
Category: Data Breach
Content: The threat actor claims to be selling 512 GB data from Thai Petroleum & Trading Co., Ltd.
Date: 2026-03-11T04:35:39Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Thai-Petroleum-Trading-Co-Ltd-512-GB
Screenshots:
None
Threat Actors: Gunra
Victim Country: Thailand
Victim Industry: Oil & Gas
Victim Organization: thai petroleum & trading co., ltd.
Victim Site: tpt.co.th - Alleged sale of 373 credit card records
Category: Data Breach
Content: Threat actor claims to be selling 373 credit card records from Europe. The compromised data reportedly includes card number, expiry, cvv, address, zip, city, state, country etc.
Date: 2026-03-11T04:32:50Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277958/
Screenshots:
None
Threat Actors: infamous
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Le Caillebotis Diamond
Category: Data Breach
Content: The threat actor claims to be selling 413 GB data from Le Caillebotis Diamond.
Date: 2026-03-11T04:25:59Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Le-Caillebotis-Diamond
Screenshots:
None
Threat Actors: Gunra
Victim Country: France
Victim Industry: Building and construction
Victim Organization: le caillebotis diamond
Victim Site: le-caillebotis-diamond.fr - Alleged Sale of unauthorized access to Brazilian Police Investigation Panel
Category: Initial Access
Content: Threat actor claims to be selling unauthorized access to Brazilian Police Investigation Panel.
Date: 2026-03-11T04:19:48Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Full-Access-Investigation-Brazilian-Police-Panel-Law-Enforcement-Webmail
Screenshots:
None
Threat Actors: kodexseller
Victim Country: Brazil
Victim Industry: Government Administration
Victim Organization: polícia civil do estado de são paulo
Victim Site: policiacivil.sp.gov.br - Alleged Sale of Région Occitanie
Category: Data Breach
Content: The threat actor claims to have breached the database of Région Occitanie, the dataset contains including user records and a large collection of pictures.
Date: 2026-03-11T04:03:01Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FR-Region-Occitanie-with-PICTURE-41-7%C2%A0Go
Screenshots:
None
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Government Relations
Victim Organization: région occitanie
Victim Site: laregion.fr - mehwargun Claims to Target Iranian bank
Category: Alert
Content: A recent post by the group indicates that they are targeting Iranian target bank that includes Google, Microsoft, and Nvidia in the Middle East
Date: 2026-03-11T03:37:01Z
Network: telegram
Published URL: https://t.me/mehwargun/6699?single
Screenshots:
None
Threat Actors: mehwargun
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of BMW Internal Data
Category: Data Breach
Content: The threat actor claims to have leaked the data of bmw.
Date: 2026-03-11T03:31:34Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-REPOST-Complete-BMW-Leak-13-Parts-Released
Screenshots:
None
Threat Actors: IntelChipX
Victim Country: Germany
Victim Industry: Automotive
Victim Organization: bmw group
Victim Site: bmw.com - Z-BL4CX-H4T-ID targets the website of mydang.kr
Category: Defacement
Content: The group claims to have defaced the website of mydang.kr
Date: 2026-03-11T03:24:57Z
Network: telegram
Published URL: https://t.me/z_bl4cx_h4t_id/79
Screenshots:
None
Threat Actors: Z-BL4CX-H4T-ID
Victim Country: South Korea
Victim Industry: Real Estate
Victim Organization: Unknown
Victim Site: mydang.kr - Alleged Data Breach of JDC
Category: Data Breach
Content: The threat actor claims to have breached the database of Journée Défense et Citoyenneté (JDC)(French Ministry of Armed Forces), and the dataset allegedly contains personal information of French users who completed the JDC program.
Date: 2026-03-11T03:11:47Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-JDC-presaje-sga-defense-gouv-fr
Screenshots:
None
Threat Actors: 7ven
Victim Country: France
Victim Industry: Defense & Space
Victim Organization: journée défense et citoyenneté (jdc)
Victim Site: presaje.sga.defense.gouv.fr - Alleged Data Leak of NR CAPITAL CO ,LTD
Category: Data Breach
Content: Threat actor claims to be selling a CSV database allegedly associated with NR Capital Loan linked to the domain NR Capital.The listing advertises approximately 2TB of data, reportedly originating from a South Korean loan service.
Date: 2026-03-11T02:03:48Z
Network: openweb
Published URL: https://leakbase.bz/threads/nrcapital-co-kr.49272/#post-277175
Screenshots:
None
Threat Actors: FantancyHacker
Victim Country: South Korea
Victim Industry: Financial Services
Victim Organization: nr capital co ,ltd
Victim Site: nrcapital.co.kr - Alleged Sale of Australia Ledger
Category: Data Breach
Content: The threat actor claims to have selling 3000 Australia Ledger .The exposed data fields allegedly include Customer name, email id, order id, country and much more information.
Date: 2026-03-11T01:39:46Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Australia-Ledger-Private-3k-Leads
Screenshots:
None
Threat Actors: Donleads
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data breach of West Java Provincial Government
Category: Data Breach
Content: The threat actor claims to have leaked data from West Java Provincial Government. The compromised data reportedly contains 37,350 records, The exposed data fields allegedly include Name, DOB, Employee Identification Number, Rank, Address, Email, Phone number and much more information.
Date: 2026-03-11T00:04:14Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-DATA-BASE-SELURUH-PEGAWAI-PROV-JABAR-37-35-THOUSAND
Screenshots:
None
Threat Actors: BabayoErorSystem
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: west java provincial government
Victim Site: jabarprov.go.id