[March-16-2026] Daily Cybersecurity Threat Report

Executive Summary

This report details a series of recent cyber incidents, providing key information for each event strictly based on the provided data. The dataset comprises 130 distinct cybersecurity incidents recorded on March 16, 2026. The incidents span various categories, including Defacements, Data Breaches, Initial Access sales, Vulnerability disclosures, and Combo List distributions.

The most prominent trend in the dataset is a massive, coordinated defacement campaign targeting Canadian small and medium-sized businesses (SMBs), primarily in the building and construction sectors. Additionally, significant initial access sales targeting government infrastructure and critical industrial control systems (ICS) highlight a severe escalation in threats to national infrastructure globally.


1. Threat Actor Landscape

Several threat actors and groups demonstrated high volumes of activity or targeted high-value assets.

  • Z-BL4CX-H4T: This group is the most prolific actor in the dataset, responsible for over 40 distinct website defacements. Their campaign overwhelmingly targets Canadian organizations.
  • Escanors Official: This actor focused heavily on data breaches targeting Chinese organizations, particularly in the Financial Services and E-commerce sectors. They also claimed a data breach involving Amazon Web Services (AWS) in the USA.
  • BABAYO EROR SYSTEM: This group specialized in obtaining and selling initial admin-level access, specifically targeting Indonesian government districts and departments. They also engaged in defacements.
  • CinCauGhast: Focused on initial access leaks in Indonesia, targeting broadcast media and government agencies.
  • KTX TEAM: Active in defacements, primarily targeting Iranian IT, network/telecommunications, and staffing organizations , as well as entities in the UAE and China.
  • NoName057(16): Claimed unauthorized access to critical Industrial Heating and Ventilation Control Systems in Lithuania, noting a lack of modern security protections. They also accessed CCTV cameras in Latvia.
  • SnowSoul: Claimed multiple leaks of large datasets (up to 10GB) related to Chinese entities.
  • Fatimion cyber team: Targeted Lebanese broadcast media, specifically MTV Lebanon, leaking employee emails and declaring them a target.

2. Categorical Analysis

A. Data Breaches

Data breaches formed a critical segment of the incidents, exposing PII, corporate data, and government records. Notable breaches include:

Target/VictimThreat ActorCompromised DataSource
Breach ForumsInsider005347,000 user records (Users, Passwords, Emails, PMs, IP logs)
SimpCityRaperdoganOver 6 million records (usernames, emails, metadata)
Russian Border ServiceFlexx1,098,248,515 records (Name, DOB, Citizenship)
US BusinessesLanex200+ records of business/owner fullz data (EIN, SSN, revenue)
Sadenet (Turkish ISP)Raperdogan118,000 subscriber records
Colombian Ministry of HealthIron AtlasFull compromise; complete copy of data extracted
BPJS (Indonesia)ZamXploit447 Records (Address, Name, Gender, DOB, ID)
Mexico CURP & Suppliersfoximiyos390 CURP records and 4,000+ supplier details (IDs, coordinates, tax info)

Additional leaks included 2.5 million Belgian bounced emails , 10,000 cryptocurrency wallet seed phrases , and US military logistics documents by threat actor Cardinal.

B. Initial Access Brokers (IAB)

The sale or leaking of initial access was highly prevalent, particularly targeting e-commerce and government platforms.

  • E-Commerce Platforms: Threat actor “ed1n1ca” sold unauthorized access to unidentified WordPress shops in Canada and the UK, explicitly listing their recent credit card transaction volumes. “Shopify” sold admin and shell access to various UK and Canadian online stores , and “mullah” sold root access to an Australian Magento shop processing PayPal and bank transfers.
  • Government Access: “BABAYO EROR SYSTEM” extensively sold admin access to Indonesian local governments (e.g., Kadudampit District, Kebonpedes District, Sukalarang District). “blackwinter99” sold admin access to the Inspector General of Registration in Odisha, India.
  • Corporate & IT Access: “BamAG” sold access to a US telecommunications company and a US law firm.

C. Industrial Control Systems (ICS) / Operational Technology (OT)

A highly alarming trend is the direct targeting of physical infrastructure via digital means.

  • Ukraine Heating Stations: IT ARMY OF RUSSIA claimed access to Kyiv heating station control systems, manipulating temperature and power levels.
  • Lithuania Heating Systems: NoName057(16) gained full access to industrial heating/ventilation controls, warning of the ability to disrupt processes or create unsafe conditions due to a lack of security.
  • Turkey Agriculture: Armenian code disrupted automated infrastructure, interfering with irrigation, nutrient delivery, and greenhouse climate control systems.

D. Defacement Campaigns

Defacements accounted for the highest sheer volume of recorded incidents.

  • Canadian Infrastructure: As noted, Z-BL4CX-H4T ravaged Canadian web infrastructure. Victims spanned Building & Construction (e.g., EquiBuild, Fraser Form Rental, Father and Son Masonry) , Transportation (YVR Limo Service) , and Healthcare (Therapy Now Clinic).
  • Other Defacements: “Thekitten” defaced the Israel Ministry of Tourism and an e-learning system. RAKYAT AGENCY INDONESIA INTERNASIONAL defaced Italian fitness clubs (20Hours Club, PentaFIT) and a Sri Lankan Divisional Secretariat.

3. Geographical and Industry Impact Analysis

Most Targeted Countries

  1. Canada: Suffered the highest volume of attacks, almost exclusively due to Z-BL4CX-H4T’s defacement spree .
  2. Indonesia: Highly targeted for Initial Access and Data Breaches affecting broadcast media, government agencies, and personal activist data (e.g., Abu Janda).
  3. China: Targeted primarily for data breaches and SSL private key leaks (e.g., Qihoo 360’s 360Claw Platform).
  4. USA: Faced a mix of business data sales, Initial Access to telecom/law firms, AWS data breach claims, and military document leaks.

Most Targeted Industries

  1. Building and Construction: Primarily SMBs in Canada targeted for defacements.
  2. Government Administration: A lucrative target for Initial Access brokers and data thieves in Indonesia, India, Colombia, and Israel.
  3. Financial Services: Targeted mostly in China (e.g., VCREDIT, Geerong, X Financial).
  4. Broadcast Media: Targeted in Indonesia (TRANS7, Trans TV) and Lebanon (MTV Lebanon).

Conclusion

The data recorded on March 16, 2026, indicates a highly active and fragmented cyber threat landscape. We observe low-sophistication, high-volume attacks (mass SMB defacements in Canada) occurring concurrently with high-stakes, potentially devastating operations (ICS manipulation in Ukraine, Turkey, and Lithuania).

The commoditization of access is apparent, with initial access to e-commerce sites being sold with explicit revenue metrics, and root access to government networks being auctioned openly. Furthermore, the exposure of massive datasets—ranging from 1 billion Russian border records to Chinese financial tech data—suggests that identity theft, corporate espionage, and state-level data harvesting remain rampant. Organizations must prioritize securing Initial Access vectors (like WordPress and Magento), hardening Operational Technology (OT) systems against public internet exposure, and maintaining strict vendor risk management.

Detected Incidents Draft Data

  1. Alleged Sale of Breach Forums
    Category: Data Breach
    Content: The threat actor claims to be selling 347,000 user records from Breach Fourms (Breachfourm.as). The compromised data reportedly includes Users, Passwords, Emails, Private Messages, IP logs, Post IP logs, History, Profile change emails, Edit History, Administration Logs, Moderator Logs information.
    Date: 2026-03-16T23:55:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-BreachForums-Database-Source-Code-leaked
    Screenshots:
    None
    Threat Actors: Insider005
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: breach fourms
    Victim Site: breachforums.as
  2. Alleged leak of Chinese data.
    Category: Data Breach
    Content: The threat actor claims to have leaked the Chinese data.
    Date: 2026-03-16T23:25:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1252
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged Sale of Business and Owner Fullz Records in USA
    Category: Data Breach
    Content: Threat Actor claims to be selling more than 200 records containing U.S. business and owner fullz data. The dataset reportedly includes business information such as business name, EIN, business address, industry classification, NAICS code, revenue, year founded, and in some cases contact details like email, website, and phone number. It also includes owner information such as full name, address, date of birth, and SSN.
    Date: 2026-03-16T22:35:26Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278477/
    Screenshots:
    None
    Threat Actors: Lanex
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged unauthorized access to an unidentified CCTV System in Canada
    Category: Initial Access
    Content: The group claims to have gained access to an unidentified CCTV System in Canada.
    Date: 2026-03-16T22:31:50Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/544?single
    Screenshots:
    None
    Threat Actors: MORNING STAR
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Z-BL4CX-H4T targets the website of Dr. Gutters
    Category: Defacement
    Content: The group claims to have defaced the website of Dr. Gutters.
    Date: 2026-03-16T21:54:56Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Civic & Social Organization
    Victim Organization: dr. gutters
    Victim Site: drgutters.ca
  6. Z-BL4CX-H4T targets the website of EquiBuild
    Category: Defacement
    Content: The group claims to have defaced the website of EquiBuild.
    Date: 2026-03-16T21:53:35Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: equibuild
    Victim Site: equibuild.ca
  7. Z-BL4CX-H4T targets the website of Fraser Form Rental
    Category: Defacement
    Content: The group claims to have defaced the website of Fraser Form Rental.
    Date: 2026-03-16T21:50:14Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: fraser form rental
    Victim Site: fraserformrental.ca
  8. Z-BL4CX-H4T targets the website of Group Orbit
    Category: Defacement
    Content: The group claims to have defaced the website of Group Orbit.
    Date: 2026-03-16T21:49:22Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Financial Services
    Victim Organization: group orbit
    Victim Site: grouporbit.ca
  9. Z-BL4CX-H4T targets the website of Envision Immigration
    Category: Defacement
    Content: The group claims to have defaced the website of Envision Immigration.
    Date: 2026-03-16T21:46:54Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Management Consulting
    Victim Organization: envision immigration
    Victim Site: envisionimmigration.ca
  10. Z-BL4CX-H4T targets the website of Father and Son Masonry
    Category: Defacement
    Content: The group claims to have defaced the website of Father and Son Masonry.
    Date: 2026-03-16T21:44:49Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: father and son masonry
    Victim Site: fatherandsonmasonry.ca
  11. Alleged Leak of SimpCity User Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a user database containing over 6 million records from the SimpCity forum. The allegedly exposed data includes usernames, email addresses, account metadata, and user profile information.
    Date: 2026-03-16T21:31:13Z
    Network: openweb
    Published URL: https://breached.st/threads/simpcity-user-dump-6m-2026.1245/
    Screenshots:
    None
    Threat Actors: Raperdogan
    Victim Country: Unknown
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Z-BL4CX-H4T targets the website of Best Meats
    Category: Defacement
    Content: The group claims to have defaced the website of Best Meats.
    Date: 2026-03-16T21:30:47Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Food & Beverages
    Victim Organization: best meats
    Victim Site: bestmeats.ca
  13. Z-BL4CX-H4T targets the website of Modern Millwork
    Category: Defacement
    Content: The group claims to have defaced the website of Modern Millwork.
    Date: 2026-03-16T21:28:55Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Printing
    Victim Organization: modern millwork
    Victim Site: boxmedia.ca
  14. Alleged Sale of Unauthorized Access to an Unidentified WordPress Shop in Canada
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to an unidentified WordPress shop in Canada, stating that the platform recorded 72 credit card Stripe (frame) transactions in February, 63 in January, and 63 in December.
    Date: 2026-03-16T21:26:30Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278440/
    Screenshots:
    None
    Threat Actors: ed1n1ca
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged Leak of Sadenet ISP Subscriber Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a database containing information related to approximately 118,000 subscribers of Sadenet, a Turkish internet service provider. The leaked data reportedly includes subscriber records extracted from the ISP’s subscriber management system.
    Date: 2026-03-16T21:22:13Z
    Network: openweb
    Published URL: https://breached.st/threads/tr-sadenet-isp-leak-118k-subscribers.1242/
    Screenshots:
    None
    Threat Actors: Raperdogan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Z-BL4CX-H4T targets the website of Vanguard Commercial Services
    Category: Defacement
    Content: The Group claims to have defaced the website of Vanguard Commercial Services.
    Date: 2026-03-16T21:13:13Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Facilities Services
    Victim Organization: vanguard commercial services
    Victim Site: vanguardcommercial.ca
  17. Z-BL4CX-H4T targets the website of Chatora Indian Restaurant
    Category: Defacement
    Content: The group claims to have defaced the website of Chatora Indian Restaurant.
    Date: 2026-03-16T21:12:05Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Food & Beverages
    Victim Organization: chatora indian restaurant
    Victim Site: chatorarestaurant.ca
  18. Z-BL4CX-H4T targets the website of BrightLink Trucking Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of BrightLink Trucking Ltd.
    Date: 2026-03-16T21:10:38Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Transportation & Logistics
    Victim Organization: brightlink trucking ltd
    Victim Site: brightlinktrucking.ca
  19. Z-BL4CX-H4T targets the website of Watch Eye Security Inc.
    Category: Defacement
    Content: The Group claims to have defaced the website of Watch Eye Security Inc.
    Date: 2026-03-16T21:08:29Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Security & Investigations
    Victim Organization: watch eye security inc.
    Victim Site: watcheyesecurity.ca
  20. Z-BL4CX-H4T targets the website of Color Wave Painting Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Color Wave Painting Ltd.
    Date: 2026-03-16T21:04:04Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: color wave painting ltd
    Victim Site: colorwavepainting.ca
  21. Z-BL4CX-H4T targets the website of WCI Staffing Solutions
    Category: Defacement
    Content: The Group claims to have defaced the website of WCI Staffing Solutions.
    Date: 2026-03-16T21:01:20Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Staffing/Recruiting
    Victim Organization: wci staffing solutions
    Victim Site: wcistaffing.ca
  22. Z-BL4CX-H4T targets the website of Western Luxury Custom Homes Corp
    Category: Defacement
    Content: The Group claims to have defaced the website of Western Luxury Custom Homes Corp.
    Date: 2026-03-16T20:59:37Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: western luxury custom homes corp
    Victim Site: westernluxury.ca
  23. Alleged data breach of VCREDIT Holdings Limited
    Category: Data Breach
    Content: The threat actor claims to have leaked data allegedly related to VCREDIT, a Chinese financial technology and consumer finance service provider.
    Date: 2026-03-16T20:50:54Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/670
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: China
    Victim Industry: Financial Services
    Victim Organization: vcredit holdings limited
    Victim Site: vcredit.com
  24. Z-BL4CX-H4T targets the website of YVR Limo Service
    Category: Defacement
    Content: The Group claims to have defaced the website of YVR Limo Service.
    Date: 2026-03-16T20:49:57Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Transportation & Logistics
    Victim Organization: yvr limo service
    Victim Site: yvrlimoservice.ca
  25. Alleged data breach of ZXAX Technology
    Category: Data Breach
    Content: The threat actor claims to have leaked data allegedly related to ZXAX Technology, a Chinese IT services company.
    Date: 2026-03-16T20:46:13Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/666
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: China
    Victim Industry: Information Technology (IT) Services
    Victim Organization: zxax technology
    Victim Site: zxaxtech.cn
  26. Alleged data breach of Geerong
    Category: Data Breach
    Content: The threat actor claims to have leaked data related to Geerong, a financial technology platform.
    Date: 2026-03-16T20:39:52Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/665
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: China
    Victim Industry: Financial Services
    Victim Organization: geerong
    Victim Site: geerong.com
  27. Alleged leak of login credentials to Indonesias State Civil Service Agency
    Category: Initial Access
    Content: The group claims to have leaked the login credentials to Indonesias State Civil Service Agency.
    Date: 2026-03-16T20:03:47Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast404/7
    Screenshots:
    None
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: state civil service agency
    Victim Site: bkn.go.id
  28. Alleged data breach of Wuyou Hebao
    Category: Data Breach
    Content: The group claims to have accessed the database of Wuyou Hebao.
    Date: 2026-03-16T20:02:24Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/666
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: China
    Victim Industry: Financial Services
    Victim Organization: wuyou hebao
    Victim Site: wuyouhb.com
  29. Alleged data breach of Hefei Fandi E-commerce
    Category: Data Breach
    Content: The threat group claims to have breached the data of Hefei Fandi E-commerce.
    Date: 2026-03-16T19:58:46Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/666
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: China
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hefei fandi e-commerce
    Victim Site: api.fandidz.cn
  30. Alleged data breach of Amazon Web Services (AWS)
    Category: Data Breach
    Content: The threat group claims to have breached the data of Amazon Web Services (AWS).
    Date: 2026-03-16T19:57:55Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/666
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: amazon web services (aws)
    Victim Site: amazonaws.com
  31. Alleged leak of login credentials to Kaskus
    Category: Initial Access
    Content: The group claims to have leaked the login credentials to Kaskus.
    Date: 2026-03-16T19:57:34Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast404/7
    Screenshots:
    None
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: kaskus
    Victim Site: kaskus.co.id
  32. Alleged leak of login credentials to PT. Duta Visual Nusantara Tivi Tujuh (TRANS7).
    Category: Initial Access
    Content: The group claims to have leaked the login credentials to PT. Duta Visual Nusantara Tivi Tujuh (TRANS7).
    Date: 2026-03-16T19:54:50Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast404/11
    Screenshots:
    None
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Broadcast Media
    Victim Organization: pt. duta visual nusantara tivi tujuh (trans7)
    Victim Site: trans7.co.id
  33. Alleged data breach of X Financial
    Category: Data Breach
    Content: The threat group claims to have breached a data of X Financial.
    Date: 2026-03-16T19:48:14Z
    Network: telegram
    Published URL: https://t.me/c/3398932380/666
    Screenshots:
    None
    Threat Actors: Escanors Official
    Victim Country: China
    Victim Industry: Financial Services
    Victim Organization: x financial
    Victim Site: cardloan.xiaoying.com
  34. Alleged data leak of 2.5 million Belgian bounced email addresses
    Category: Data Breach
    Content: The threat actor claims to be selling a database containing approximately 2.5 million Belgian bounced email addresses.
    Date: 2026-03-16T19:40:24Z
    Network: openweb
    Published URL: https://xss.pro/threads/146447/
    Screenshots:
    None
    Threat Actors: Youzuf BG
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged leak of login credentials to PT Yakult Indonesia Persada
    Category: Initial Access
    Content: The group claims to have leaked the login credentials to PT Yakult Indonesia Persada.
    Date: 2026-03-16T19:39:00Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast404/10
    Screenshots:
    None
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Food & Beverages
    Victim Organization: pt yakult indonesia persada
    Victim Site: yakult.co.id
  36. Alleged leak of MTV Lebanon employee emails
    Category: Data Breach
    Content: The threat group claims to have leaked a dataset containing email addresses associated with MTV Lebanon, a Lebanese broadcast media organization.
    Date: 2026-03-16T19:38:29Z
    Network: telegram
    Published URL: https://t.me/hak994/5315
    Screenshots:
    None
    Threat Actors: Fatimion cyber team
    Victim Country: Lebanon
    Victim Industry: Broadcast Media
    Victim Organization: mtv lebanon
    Victim Site: mtv.com.lb
  37. Alleged Leak of Cryptocurrency Exchange KYC Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a dataset containing KYC information allegedly associated with cryptocurrency exchange users. the dataset may include personal details such as full names, email addresses, phone numbers, dates of birth, and identity numbers .
    Date: 2026-03-16T19:35:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Leaked-XZeeone-Grayhat-KYC-Know-Your-Customer
    Screenshots:
    None
    Threat Actors: XZeeoneOfc
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged access to Trans TV
    Category: Initial Access
    Content: The group claims to have gained access to Trans TV.
    Date: 2026-03-16T19:33:04Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast404/9
    Screenshots:
    None
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Broadcast Media
    Victim Organization: trans tv
    Victim Site: transtv.co.id
  39. XYZ targets the website of cmis.ae
    Category: Defacement
    Content: The group claims to have defaced the website of cmis.ae.
    Date: 2026-03-16T19:20:22Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41606891
    Screenshots:
    None
    Threat Actors: XYZ
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: cmis.ae
    Victim Site: cmis.ae
  40. KTX TEAM targets the website of PartSouq
    Category: Defacement
    Content: The group claims to defaced the website of PartSouq.
    Date: 2026-03-16T18:40:59Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41606878
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: UAE
    Victim Industry: Machinery Manufacturing
    Victim Organization: partsouq
    Victim Site: partsouq.com
  41. Z-BL4CX-H4T targets the website of Bedi Creative
    Category: Defacement
    Content: The group claims to defaced the website of Bedi Creative.
    Date: 2026-03-16T18:23:44Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Information Technology (IT) Services
    Victim Organization: bedi creative
    Victim Site: laravel-test.bedicreative.ca
  42. Alleged leak of USA Military Data
    Category: Data Breach
    Content: The group claims to have leaked the Military Data of USA.
    Date: 2026-03-16T18:21:21Z
    Network: telegram
    Published URL: https://t.me/ruskinetgroup/88
    Screenshots:
    None
    Threat Actors: RuskiNet
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alleged Leak of SSL Private Key of Qihoo 360’s 360Claw Platform
    Category: Data Breach
    Content: Content:A security issue has reportedly exposed the SSL private key associated with Qihoo 360’s 360Claw platform. According to the post, the private key was allegedly included within the software installer, potentially allowing unauthorized parties to access it. If confirmed, the exposed key could enable attackers to impersonate legitimate servers or intercept encrypted communications associated with the platform. NB :- The authenticity of the claim is yet to be verified.
    Date: 2026-03-16T18:20:32Z
    Network: openweb
    Published URL: https://www.reddit.com/r/China_irl/comments/1rv5b94/%E5%91%A8%E9%B8%BF%E7%A5%8E%E9%BE%99%E8%99%BE%E4%BA%A7%E5%93%81360claw%E8%AF%81%E4%B9%A6%E7%A7%81%E9%92%A5%E8%A2%AB%E6%B3%84%E9%9C%B2%E9%AB%98%E5%8D%B1%E9%A3%8E%E9%99%A9%E4%BC%9A%E5%8A%AB%E6%8C%81%E7%BD%91%E7%AB%99%E5%B9%B6%E6%9A%B4%E9%9C%B2%E4%BD%BF%E7%94%A8%E8%80%85%E9%9A%90%E7%A7%81/?captcha=1
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: China
    Victim Industry: Information Technology (IT) Services
    Victim Organization: qihoo 360 technology co. ltd.
    Victim Site: 360.cn
  44. Alleged Leak of SQL Injection Vulnerability in Alayosh Company
    Category: Vulnerability
    Content: The group claims to have leaked SQL Injection vulnerability in Alayosh Company.
    Date: 2026-03-16T18:12:51Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/103
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Palestine
    Victim Industry: Food & Beverages
    Victim Organization: alayosh company
    Victim Site: alayosh.com
  45. RAKYAT AGENCY INDONESIA INTERNASIONAL targets the website of 20Hours Club
    Category: Defacement
    Content: The group claims to have defaced the website of 20Hours Club .
    Date: 2026-03-16T18:10:55Z
    Network: telegram
    Published URL: https://t.me/TEAM_CY8ER_N4TI0N_IND/176
    Screenshots:
    None
    Threat Actors: RAKYAT AGENCY INDONESIA INTERNASIONAL
    Victim Country: Italy
    Victim Industry: Health & Fitness
    Victim Organization: 20hours club
    Victim Site: gesfit2023.best.20hours.it
  46. Z-BL4CX-H4T targets the website of Stratwit Solutions Ltd.
    Category: Defacement
    Content: The group claims to defaced the website of Stratwit Solutions Ltd.
    Date: 2026-03-16T18:10:25Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Information Technology (IT) Services
    Victim Organization: stratwit solutions ltd.
    Victim Site: testgithub.bedicreative.ca
  47. Fatimion cyber team claims to target MTV Lebanon
    Category: Alert
    Content: A recent post by the group indicates that they are targeting MTV Lebanon.
    Date: 2026-03-16T18:07:55Z
    Network: telegram
    Published URL: https://t.me/hak994/5299
    Screenshots:
    None
    Threat Actors: Fatimion cyber team
    Victim Country: Lebanon
    Victim Industry: Broadcast Media
    Victim Organization: mtv lebanon
    Victim Site: mtv.com.lb
  48. Alleged Sale of CURP Database Records in Mexico
    Category: Data Breach
    Content: Threat Actor claims to be selling a database allegedly containing 390 records related to Mexico’s CURP system. The dataset includes personal information such as first and last names, second last name, date of birth, sex or gender, nationality, CURP identifiers, state and municipality codes, registration year, record numbers, and related registry details.
    Date: 2026-03-16T18:05:36Z
    Network: openweb
    Published URL: https://xforums.st/threads/curps-mx.535081/
    Screenshots:
    None
    Threat Actors: foximiyos
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Z-BL4CX-H4T targets the website of Therapy Now Clinic
    Category: Defacement
    Content: The group claims to defaced the website of Therapy Now Clinic.
    Date: 2026-03-16T18:03:31Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Hospital & Health Care
    Victim Organization: therapy now clinic
    Victim Site: therapy.bedicreative.ca
  50. Z-BL4CX-H4T targets the website of Udupi Palace Restaurant
    Category: Defacement
    Content: The group claims to defaced the website of Udupi Palace Restaurant.
    Date: 2026-03-16T18:02:10Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Restaurants
    Victim Organization: udupi palace restaurant
    Victim Site: udupisurrey.ca
  51. Alleged Sale of Supplier Register Database in Mexico
    Category: Data Breach
    Content: Threat Actor claims to be selling a supplier register database allegedly containing information on more than 4,000 suppliers in Mexico. The dataset includes extensive supplier and company information such as full name, Mexican National ID (CURP), contact details, phone numbers, email addresses, company descriptions, tax registration numbers, business activities, addresses, geographic coordinates, additional administrative, legal, and registry-related details.
    Date: 2026-03-16T17:52:11Z
    Network: openweb
    Published URL: https://xforums.st/threads/supplier-register.534937/
    Screenshots:
    None
    Threat Actors: foximiyos
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Z-BL4CX-H4T targets the website of Connect FM
    Category: Defacement
    Content: The group claims to defaced the website of Connect FM .
    Date: 2026-03-16T17:51:51Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Broadcast Media
    Victim Organization: connect fm
    Victim Site: vaisakhi.connectfm.ca
  53. Z-BL4CX-H4T targets the website of AAA Plumbing & Heating
    Category: Defacement
    Content: The group claims to have defaced the website of AAA Plumbing & Heating.
    Date: 2026-03-16T17:51:32Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: aaa plumbing & heating
    Victim Site: aaaplumbing.ca
  54. Z-BL4CX-H4T targets the website of Alectra Electrical Services Ltd
    Category: Defacement
    Content: The group claims to defaced the website of Alectra Electrical Services Ltd
    Date: 2026-03-16T17:46:07Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: alectra electrical services ltd
    Victim Site: alectraelectrical.ca
  55. Z-BL4CX-H4T targets the website of Shah Driving School Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Shah Driving School Ltd
    Date: 2026-03-16T17:42:50Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Professional Training
    Victim Organization: shah driving school ltd
    Victim Site: shahdrivingschool.ca
  56. Z-BL4CX-H4T targets the website of Rai Star Custom Homes Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Rai Star Custom Homes Ltd
    Date: 2026-03-16T17:41:24Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: rai star custom homes ltd
    Victim Site: raistarframing.ca
  57. Z-BL4CX-H4T targets the website of Anisa Homes & Developments Ltd
    Category: Defacement
    Content: The group claims to defaced the website of Anisa Homes & Developments Ltd
    Date: 2026-03-16T17:35:23Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: anisa homes & developments ltd
    Victim Site: anisahomes.ca
  58. Z-BL4CX-H4T targets the website of Surrey Podcast Studio
    Category: Defacement
    Content: The group claims to have defaced the website of Surrey Podcast Studio
    Date: 2026-03-16T17:34:20Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Media Production
    Victim Organization: surrey podcast studio
    Victim Site: surreypodcaststudio.ca
  59. Z-BL4CX-H4T targets the website of Best Look Roofing Ltd
    Category: Defacement
    Content: The group claims to defaced the website of Best Look Roofing Ltd.
    Date: 2026-03-16T17:33:02Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: best look roofing ltd
    Victim Site: bestlookroofing.ca
  60. Z-BL4CX-H4T targets the website of Est Choice Security
    Category: Defacement
    Content: The group claims to defaced the website of Est Choice Security.
    Date: 2026-03-16T17:32:02Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Security & Investigations
    Victim Organization: est choice security
    Victim Site: estchoicesecurity.ca
  61. KTX TEAM targets the website of ParsOnline Group
    Category: Defacement
    Content: The group claims to have defaced the website of ParsOnline Group.
    Date: 2026-03-16T17:20:39Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41606879
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: parsonline group
    Victim Site: parsonline.com
  62. Z-BL4CX-H4T targets the website of Surrey Podcast Studio
    Category: Defacement
    Content: The group claims to have defaced the website of Surrey Podcast Studio
    Date: 2026-03-16T17:19:27Z
    Network: openweb
    Published URL: https://surreypodcaststudio.ca/
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Media Production
    Victim Organization: surrey podcast studio
    Victim Site: surreypodcaststudio.ca
  63. Z-BL4CX-H4T targets the website of Journeyman
    Category: Defacement
    Content: The group claims to have defaced the website of Journeyman
    Date: 2026-03-16T17:12:35Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Graphic & Web Design
    Victim Organization: journeyman
    Victim Site: journeyman.bedicreative.ca
  64. KTX TEAM targets the website of Gigago
    Category: Defacement
    Content: The group claims to defaced the website of Gigago
    Date: 2026-03-16T17:10:16Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41606886?hz=1
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: China
    Victim Industry: Network & Telecommunications
    Victim Organization: gigago
    Victim Site: gigago.com/iran-sim-card/
  65. Z-BL4CX-H4T targets the website of Open Staircase
    Category: Defacement
    Content: The group claims to have defaced the website of Open Staircase.
    Date: 2026-03-16T17:09:09Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: open staircase
    Victim Site: openstaircase.com
  66. Z-BL4CX-H4T targets the website of Northern Lights Contracting
    Category: Defacement
    Content: The group claims to have defaced the website of Northern Lights Contracting.
    Date: 2026-03-16T17:08:45Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: northern lights contracting
    Victim Site: northernlightscontracting.ca
  67. Z-BL4CX-H4T targets the website of Outlaw Industries
    Category: Defacement
    Content: The group claims to have defaced the website of Outlaw Industries.
    Date: 2026-03-16T17:05:05Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: outlaw industries
    Victim Site: outlawindustries.ca
  68. KTX TEAM targets the website of IranTalent
    Category: Defacement
    Content: The group claims to defaced the website of IranTalent.
    Date: 2026-03-16T17:03:29Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41606881
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Staffing/Recruiting
    Victim Organization: irantalent
    Victim Site: irantalent.com/en/company/pars-online-group/
  69. KTX TEAM targets the website of MTN Irancell
    Category: Defacement
    Content: The group claims to defaced the website of MTN Irancell.
    Date: 2026-03-16T17:03:13Z
    Network: openweb
    Published URL: https://zone-h.org/mirror/id/41606882?hz=1
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Network & Telecommunications
    Victim Organization: mtn irancell
    Victim Site: irancell.ir
  70. Z-BL4CX-H4T targets the website of Pro-Direct Transport Inc
    Category: Defacement
    Content: The group claims to have defaced the website of Pro-Direct Transport Inc.
    Date: 2026-03-16T16:59:40Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Transportation & Logistics
    Victim Organization: pro-direct transport inc
    Victim Site: prodirecttransport.ca
  71. Z-BL4CX-H4T targets the website of Punjab Optical
    Category: Defacement
    Content: The group claims to have defaced the website of Punjab Optical.
    Date: 2026-03-16T16:56:44Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: punjab optical
    Victim Site: punjabopticals.ca
  72. Z-BL4CX-H4T targets the website of Moody Park Homes Industry
    Category: Defacement
    Content: The group claims to have defaced the website of Moody Park Homes Industry.
    Date: 2026-03-16T16:56:30Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: moody park homes industry
    Victim Site: moodyparkhomes.ca
  73. BABAYO EROR SYSTEM targets the subdomains of Modern Cooking Academy (MCA)
    Category: Defacement
    Content: The group claims to defaced the subdomains of Modern Cooking Academy (MCA).The subdomains include:developer.mca-edu.commca-edu.com.modernitsbd.combm.mca-edu.commca-edu.com
    Date: 2026-03-16T16:51:57Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/229
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Bangladesh
    Victim Industry: Education
    Victim Organization: modern cooking academy (mca)
    Victim Site: developer.mca-edu.com
  74. Z-BL4CX-H4T targets the website of MRM Homes Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of MRM Homes Ltd.
    Date: 2026-03-16T16:49:55Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: mrm homes ltd
    Victim Site: mrmhomes.ca
  75. Z-BL4CX-H4T targets the website of Nanak Construction & Framing Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Nanak Construction & Framing Ltd.
    Date: 2026-03-16T16:48:42Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: nanak construction & framing ltd
    Victim Site: nanakconstruction.ca
  76. Z-BL4CX-H4T targets the website of Nanny On Call Near Me
    Category: Defacement
    Content: The group claims to have defaced the website of Nanny On Call Near Me.
    Date: 2026-03-16T16:41:12Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Consumer Services
    Victim Organization: nanny on call near me
    Victim Site: nannyoncallnearme.ca
  77. Alleged unauthorized access to an unidentified Industrial Heating and Ventilation Control System in Lithuania
    Category: Initial Access
    Content: The group claims to have gained access to a monitoring and control system managing industrial heating and ventilation equipment in Lithuania. The exposed interface reportedly allows control over air circulation, valves, electric heaters, and pumps, with basic settings for airflow and temperature management. According to the group, The system lacks modern security protections and contains multiple log errors related to key components, potentially allowing disruption of the heating process or the creation of unsafe operating conditions.
    Date: 2026-03-16T16:37:07Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2938
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Lithuania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged leak of personal data of Indonesian activist Abu Janda
    Category: Data Breach
    Content: The threat group claims to have leaked extensive personal information related to Indonesian activist Abu Janda. The exposed dataset reportedly includes sensitive details such as a photo, national ID number, full name and aliases, date and place of birth, religion, marital status, profession, gender, city and regional address details, phone numbers, email addresses, vehicle records, education history, family member information, and social media accounts.
    Date: 2026-03-16T16:33:57Z
    Network: telegram
    Published URL: https://t.me/IndoHaxSec3/75
    Screenshots:
    None
    Threat Actors: INDOHAXSEC
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged Sale of Unauthorized Access to an Unidentified WordPress Shop in United Kingdom
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to an unidentified WordPress shop in the United Kingdom, stating that the platform recorded 771 credit card native form transactions in February, 731 in January, and 691 in December.
    Date: 2026-03-16T16:33:15Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278446/
    Screenshots:
    None
    Threat Actors: ed1n1ca
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Z-BL4CX-H4T targets the website of New Design Homes Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of New Design Homes Ltd.
    Date: 2026-03-16T16:32:51Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: new design homes ltd
    Victim Site: ndhomes.ca
  81. Z-BL4CX-H4T targets the website of H & S Insulation Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of H & S Insulation Ltd.
    Date: 2026-03-16T16:31:13Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: h & s insulation ltd
    Victim Site: hsinsulation.ca
  82. Z-BL4CX-H4T targets the website of JBS Auto Sales & Services Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of JBS Auto Sales & Services Ltd.
    Date: 2026-03-16T16:26:17Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Automotive
    Victim Organization: jbs auto sales & services ltd
    Victim Site: jbsauto.ca
  83. Z-BL4CX-H4T targets the website of Modern Tech Heating & Cooling Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Modern Tech Heating & Cooling Ltd
    Date: 2026-03-16T16:17:40Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: modern tech heating & cooling ltd
    Victim Site: moderntechheatingandcooling.ca
  84. Z-BL4CX-H4T targets the website of IGR Contracting
    Category: Defacement
    Content: The group claims to have defaced the website of IGR Contracting.
    Date: 2026-03-16T16:17:33Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: igr contracting
    Victim Site: igrcontracting.ca
  85. Z-BL4CX-H4T targets the website of Maple Roofing Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of Maple Roofing Ltd.
    Date: 2026-03-16T16:13:26Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/456
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: maple roofing ltd
    Victim Site: mapleroofingltd.ca
  86. Alleged Sale of Roundcube Business Webmail Leads
    Category: Data Breach
    Content: A threat actor claims to be selling 800,000 Roundcube business webmail B2B leads, allegedly collected from various mail servers. The listing mentions that the dataset is offered along with a Judger cPanel script and is priced at $800.
    Date: 2026-03-16T15:45:34Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278438/
    Screenshots:
    None
    Threat Actors: Spectre6272
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Alleged sale of admin access to Kadudampit District
    Category: Initial Access
    Content: The group claims to have selling admin-level access to the Kadudampit District.
    Date: 2026-03-16T15:42:20Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/228
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kadudampit district
    Victim Site: kec-kadudampit.sukabumikab.go.id
  88. Alleged sale of admin access to Kebonpedes District
    Category: Initial Access
    Content: The group claims to have selling admin-level access to the Kebonpedes District.
    Date: 2026-03-16T15:31:56Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/228
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kebonpedes district
    Victim Site: kec-kebonpedes.sukabumikab.go.id
  89. RAKYAT AGENCY INDONESIA INTERNASIONAL targets the website of PentaFIT
    Category: Defacement
    Content: The group claims to have defaced the website of PentaFIT.
    Date: 2026-03-16T15:27:25Z
    Network: telegram
    Published URL: https://t.me/TEAM_CY8ER_N4TI0N_IND/173
    Screenshots:
    None
    Threat Actors: RAKYAT AGENCY INDONESIA INTERNASIONAL
    Victim Country: Italy
    Victim Industry: Health & Fitness
    Victim Organization: pentafit
    Victim Site: gesfit24.gestione.pentafit.it
  90. Z-BL4CX-H4T targets the website of American Fast Freight Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of American Fast Freight Ltd.
    Date: 2026-03-16T15:15:29Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/452
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Transportation & Logistics
    Victim Organization: american fast freight ltd
    Victim Site: fastfreight.info
  91. RAKYAT AGENCY INDONESIA INTERNASIONAL targets the website of Badulla Divisional Secretariat
    Category: Defacement
    Content: The group claims to have defaced the website of Badulla Divisional Secretariat.
    Date: 2026-03-16T15:12:11Z
    Network: telegram
    Published URL: https://t.me/TEAM_CY8ER_N4TI0N_IND/172
    Screenshots:
    None
    Threat Actors: RAKYAT AGENCY INDONESIA INTERNASIONAL
    Victim Country: Sri Lanka
    Victim Industry: Government Administration
    Victim Organization: badulla divisional secretariat
    Victim Site: divisecbadulla.com/frontofficenew/admin
  92. Alleged sale of admin access to Sukalarang District Office
    Category: Initial Access
    Content: The threat actor claims to have selling admin-level access to the Sukalarang District Office.
    Date: 2026-03-16T15:02:35Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/228
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sukalarang district office
    Victim Site: kec-sukalarang.sukabumikab.go.id
  93. Alleged sale of admin access to Department of Public Works – Sukabumi Regency
    Category: Initial Access
    Content: The threat group claims to have selling admin-level access to the Department of Public Works – Sukabumi Regency.
    Date: 2026-03-16T14:57:16Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/228
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: department of public works – sukabumi regency
    Victim Site: dpu.sukabumikab.go.id
  94. Alleged leak of Unauthorized WordPress Admin Access to Explora Pucon
    Category: Initial Access
    Content: The group claims to have leaked unauthorized wordpress admin access to Explora Pucon.
    Date: 2026-03-16T14:38:06Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1309
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: Chile
    Victim Industry: Leisure & Travel
    Victim Organization: explora pucon
    Victim Site: explorapucon.cl
  95. Alleged Sale of unauthorized access to an unidentified telecommunication company in USA
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to an unidentified telecommunication company in USA.
    Date: 2026-03-16T14:33:49Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278429/
    Screenshots:
    None
    Threat Actors: BamAG
    Victim Country: USA
    Victim Industry: Network & Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Alleged Sale of unauthorized access to an unidentified law firm company in USA
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to an unidentified law firm company in USA.
    Date: 2026-03-16T14:31:28Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278429/
    Screenshots:
    None
    Threat Actors: BamAG
    Victim Country: USA
    Victim Industry: Law Practice & Law Firms
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged leak of Chinese data
    Category: Data Breach
    Content: The threat actor claims to have leaked 10GB of Chinese data.
    Date: 2026-03-16T14:27:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Chinese-data-Free-download-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1247
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  98. Alleged data leak of an Chinese organization
    Category: Data Breach
    Content: The threat actor claims to have leaked 10GB of data related to an Chinese organization.
    Date: 2026-03-16T14:26:00Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Chinese-data-Free-download-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1247
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged Unauthorized Access to Heating Station Control Systems in Ukraine
    Category: Initial Access
    Content: The group claims to have accessed heating station control systems in Kyiv, Ukraine, allegedly manipulating operational parameters such as temperature and power levels while operators attempted to restore normal settings.
    Date: 2026-03-16T14:01:09Z
    Network: telegram
    Published URL: https://t.me/itarmyofrussianews/347
    Screenshots:
    None
    Threat Actors: IT ARMY OF RUSSIA
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged Unauthorized Access to Agricultural Irrigation and Greenhouse Control Systems in Turkey
    Category: Initial Access
    Content: The group claims to have disrupted automated agricultural infrastructure in Turkey, alleging interference with two irrigation and nutrient delivery systems and three greenhouse climate control systems responsible for temperature and humidity regulation.
    Date: 2026-03-16T11:17:14Z
    Network: telegram
    Published URL: https://t.me/armeniancode_eng/77
    Screenshots:
    None
    Threat Actors: Armenian code
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged data leak of U.S. military document
    Category: Data Breach
    Content: The threat actor claims to have obtained and disclosed a classified U.S. military logistics document alleging emergency resupply details following a reported cyber incident affecting components of Israel’s air-defense systems.
    Date: 2026-03-16T11:06:48Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/383
    Screenshots:
    None
    Threat Actors: Cardinal
    Victim Country: USA
    Victim Industry: Military Industry
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Cardinal claims to target USA
    Category: Alert
    Content: A recent post by the group indicates that they are targeting USA.
    Date: 2026-03-16T10:36:57Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/378
    Screenshots:
    None
    Threat Actors: Cardinal
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Alleged Sale of 100K Corporate Mail Pass Credentials
    Category: Combo List
    Content: The threat actor claims to be selling a dataset containing approximately 100,000 corporate email and password combinations in mailpass format, reportedly compiled from multiple sources.
    Date: 2026-03-16T10:09:02Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278416/
    Screenshots:
    None
    Threat Actors: Domainstore
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged sale of UAE Business (B2B) data
    Category: Data Breach
    Content: The threat actor claims to be selling a UAE Business (B2B) database allegedly containing business directory records, free zone company data, startup records, Dubai business tower records, real estate databases, telecall research data, and DMCC records.
    Date: 2026-03-16T09:41:52Z
    Network: openweb
    Published URL: https://niflheim.world/threads/uae-buisness-b2b-database-breach.163522/#post-379930
    Screenshots:
    None
    Threat Actors: Exorcist
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged unauthorized access to an unidentified Industrial Heating and Ventilation Control System in Lithuania
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to an unidentified Industrial Heating and Ventilation Control System in Lithuania. They allegedly have full access to the control and monitoring interface of an industrial heating and ventilation system, allowing them to view system data and potentially control air supply and circulation, adjust temperature settings, and operate components such as valves, electric heaters, and pumps.
    Date: 2026-03-16T09:07:30Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2926
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Lithuania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Alleged unauthorized cctv access to an unidentified shop in Latvia
    Category: Initial Access
    Content: The group claims to have gained CCTV cameras of Kekava and Firmas Veikals meat and sausage stores in Latvia.
    Date: 2026-03-16T08:47:04Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2925
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Latvia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Alleged breach of the Colombian Ministry of Health
    Category: Data Breach
    Content: The threat actor claims to have fully compromised systems of the Colombian Ministry of Health. They allege that a complete copy of the ministry’s data and internal components was extracted and made publicly accessible
    Date: 2026-03-16T07:56:23Z
    Network: telegram
    Published URL: https://t.me/ironatlas_organization/44?single
    Screenshots:
    None
    Threat Actors: Iron Atlas New Generation
    Victim Country: Colombia
    Victim Industry: Government Administration
    Victim Organization: ministry of health and social protection
    Victim Site: minsalud.gov.co
  108. Hax.or targets the website of brilliant.ae
    Category: Defacement
    Content: The group claims to have defaced the website of brilliant.ae.
    Date: 2026-03-16T07:52:09Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129180
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: brilliant
    Victim Site: brilliant.ae
  109. Alleged sale of access to go.id
    Category: Initial Access
    Content: The group claims to be selling unauthorized admin access to go.id
    Date: 2026-03-16T07:26:49Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/227
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: go.id
  110. Alleged data leak of The Purr Company
    Category: Data Breach
    Content: The threat actor claims to have leaked data allegedly taken from The Purr Company.
    Date: 2026-03-16T07:13:56Z
    Network: telegram
    Published URL: https://t.me/silenterrorsystem/158
    Screenshots:
    None
    Threat Actors: SILENT ERROR SYSTEM
    Victim Country: UK
    Victim Industry: E-commerce & Online Stores
    Victim Organization: the purr company
    Victim Site: thepurrcompany.com
  111. Hax.or targets the website of Brillscan Building Inspection Services
    Category: Defacement
    Content: The group claims to have defaced the website of Brillscan Building Inspection Services
    Date: 2026-03-16T07:12:29Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129206
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: UAE
    Victim Industry: Building and construction
    Victim Organization: brillscan building inspection services
    Victim Site: brillscan.ae
  112. Thekitten targets the website of unidentified Israeli government e-learning system
    Category: Defacement
    Content: The group claims to have defaced the website of Israeli government e-learning system.
    Date: 2026-03-16T06:22:47Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20510?single
    Screenshots:
    None
    Threat Actors: Thekitten
    Victim Country: Israel
    Victim Industry: Higher Education/Acadamia
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Thekitten targets the website of Israel Ministry of Tourism
    Category: Defacement
    Content: The group claims to have defaced the website of Israel Ministry of Tourism.
    Date: 2026-03-16T06:12:18Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20510?single
    Screenshots:
    None
    Threat Actors: Thekitten
    Victim Country: Israel
    Victim Industry: Government Administration
    Victim Organization: israel ministry of tourism
    Victim Site: gov.il
  114. Alleged sale of unauthorized admin access to Inspector General of Registration and Commissioner of Stamps Odisha.
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to Inspector General of Registration and Commissioner of Stamps Odisha.
    Date: 2026-03-16T06:06:54Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90INDIA%E2%AD%90-Government-igrodisha-gov-in-Admin-Access
    Screenshots:
    None
    Threat Actors: blackwinter99
    Victim Country: India
    Victim Industry: Government Administration
    Victim Organization: inspector general of registration and commissioner of stamps odisha
    Victim Site: igrodisha.gov.in
  115. Alleged sale of unauthorized admin access to Comunicate Web.
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to Comunicate Web.
    Date: 2026-03-16T05:55:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90ITALY%E2%AD%90-comunicateweb-it-admin-access
    Screenshots:
    None
    Threat Actors: blackwinter99
    Victim Country: Italy
    Victim Industry: Network & Telecommunications
    Victim Organization: comunicate web
    Victim Site: comunicateweb.it
  116. Alleged sale of unauthorized admin access to KFA Cafe
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to KFA Cafe .
    Date: 2026-03-16T05:43:41Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-kfacafe-ct-ws-admin-access
    Screenshots:
    None
    Threat Actors: blackwinter99
    Victim Country: Unknown
    Victim Industry: Food & Beverages
    Victim Organization: kfa cafe
    Victim Site: kfacafe.ct.ws
  117. Alleged data breach of Border Service of the Federal Security Service of the Russian Federation.
    Category: Data Breach
    Content: Threat actor claims to be leaked data from Border Service of the Federal Security Service of the Russian Federation. The compromised data reportedly contains 1,098,248,515 records including Name, DOB, Citizenship, Country and much more information.
    Date: 2026-03-16T05:12:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Russian-Federal-Border-Service-1kkk
    Screenshots:
    None
    Threat Actors: Flexx
    Victim Country: Russia
    Victim Industry: Government Administration
    Victim Organization: border service of the federal security service of the russian federation
    Victim Site: ps.fsb.ru
  118. Alleged Leak of Cryptocurrency Wallet Users Data
    Category: Data Breach
    Content: The threat actor claims to have leaked 10,000 cryptocurrency wallet seed phrases associated with BTC, SOL, and EVM-based wallets.
    Date: 2026-03-16T04:59:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-10-000-FREE-SEED-PHRASES-SOL-BTC-EVM
    Screenshots:
    None
    Threat Actors: dolboebina
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Alleged sale of unauthorized admin and shell access to an unidentified store
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in UK.
    Date: 2026-03-16T04:53:41Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278331/
    Screenshots:
    None
    Threat Actors: Shopify
    Victim Country: UK
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  120. Alleged breach of Badan Penyelenggara Jaminan Sosial Kesehatan (BPJS)
    Category: Data Breach
    Content: The threat actor claims to be leaked 447 Records from Badan Penyelenggara Jaminan Sosial Kesehatan (BPJS). The exposed data fields allegedly include Address, Name, Gender, DOB, ID and much more information.
    Date: 2026-03-16T04:41:26Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FRESH-bpjs-kalsel-org-Leaked
    Screenshots:
    None
    Threat Actors: ZamXploit
    Victim Country: Indonesia
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: badan penyelenggara jaminan sosial kesehatan (bpjs)
    Victim Site: bpjs-kalsel.org
  121. Alleged sale of unauthorized admin and shell access to unidentified store
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in Canada.
    Date: 2026-03-16T04:39:36Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278327/
    Screenshots:
    None
    Threat Actors: Shopify
    Victim Country: Canada
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  122. Alleged sale of unauthorized admin and shell access to unidentified store
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in Canada.
    Date: 2026-03-16T04:35:24Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278326/
    Screenshots:
    None
    Threat Actors: Shopify
    Victim Country: Canada
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  123. Alleged sale of unauthorized admin and shell access to an unidentified store in UK
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in UK.
    Date: 2026-03-16T04:34:16Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278325/
    Screenshots:
    None
    Threat Actors: Shopify
    Victim Country: UK
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  124. DEFACER INDONESIAN TEAM targets the website of Dino Di Basilio
    Category: Defacement
    Content: The group claims to have defaced the website of Dino Di Basilio.
    Date: 2026-03-16T03:33:34Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1306
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: Italy
    Victim Industry: Music
    Victim Organization: dino di basilio
    Victim Site: dinodibasilio.it
  125. Alleged data breach of Iran International
    Category: Data Breach
    Content: The group claims to have leaked data belonging to more than 2,000 users of Iran International after allegedly gaining unauthorized access to the outlet’s messaging bot. The exposed data reportedly includes information from users who submitted videos, photos, and news through the platform.
    Date: 2026-03-16T03:09:16Z
    Network: telegram
    Published URL: https://t.me/Separekorosh/6
    Screenshots:
    None
    Threat Actors: Separekorosh
    Victim Country: UK
    Victim Industry: Broadcast Media
    Victim Organization: iran international
    Victim Site: iranintl.com
  126. Z-BL4CK-H4T targets the website of Para-Puan
    Category: Defacement
    Content: The group claims to have defaced the website of Para-Puan
    Date: 2026-03-16T03:05:00Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/450
    Screenshots:
    None
    Threat Actors: Z-BL4CK-H4T
    Victim Country: Turkey
    Victim Industry: Information Technology (IT) Services
    Victim Organization: para-puan
    Victim Site: para-puan.com
  127. Alleged Sale of Root Access to Magento Shop in Australia
    Category: Initial Access
    Content: Threat actor claims to be selling root access to an Australia-based Magento e-commerce shop. The listing includes order statistics from 2023–2026 with payments reportedly processed via methods such as PayPal Express, bank transfer, and other gateways. The auction reportedly starts at USD 3,000 with a buy-now price of USD 6,000.
    Date: 2026-03-16T02:51:16Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278399/
    Screenshots:
    None
    Threat Actors: mullah
    Victim Country: Australia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged data breach of MTV Channel
    Category: Data Breach
    Content: The group claims to have breached data from MTV Channel
    Date: 2026-03-16T02:49:33Z
    Network: telegram
    Published URL: https://t.me/hak994/5268
    Screenshots:
    None
    Threat Actors: Fatimion cyber team
    Victim Country: Lebanon
    Victim Industry: Broadcast Media
    Victim Organization: mtv lebanon
    Victim Site: mtv.com.lb
  129. TikusXploit targets the website of Clear Fonts Graphics Ltd
    Category: Defacement
    Content: The group claims to have taken down the website of Clear Fonts Graphics Ltd.
    Date: 2026-03-16T02:26:39Z
    Network: telegram
    Published URL: https://t.me/bertahan1ci/47
    Screenshots:
    None
    Threat Actors: TikusXploit
    Victim Country: Unknown
    Victim Industry: Printing
    Victim Organization: clear fonts graphics ltd
    Victim Site: clearfontsprint.com
  130. DEFACER INDONESIAN TEAM targets the website of whatsapp2019.unblog.fr
    Category: Defacement
    Content: The group claims to have defaced the website of whatsapp2019.unblog.fr .
    Date: 2026-03-16T02:04:06Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1305
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: France
    Victim Industry: Online Publishing
    Victim Organization: Unknown
    Victim Site: whatsapp2019.unblog.fr