1. Executive Summary
This report analyzes a concentrated wave of 92 cybersecurity incidents recorded on or around March 19, 2026. The threat landscape during this period was highly active, characterized by a mix of massive data breaches involving terabytes of sensitive data, widespread and coordinated mass defacement campaigns, and the commercial sale of advanced malware and initial access vectors. The data reveals distinct geopolitical targeting, heavily focusing on Israeli infrastructure and Indian educational sectors, alongside high-profile corporate and military breaches globally.
2. Key Threat Trends and Tactics
A. Coordinated Mass Defacement Campaigns
A significant portion of the incidents involved mass website defacements, primarily functioning as hacktivism or low-tier cyber vandalism. Two distinct campaigns dominated this category:
- The Israeli Campaign (r0ckin & B2Hunters): The threat actor “r0ckin” executed a highly focused campaign against Israeli educational institutions. Victims included the Hebrew University of Jerusalem , Wolfson Faculty of Chemical Engineering , and Campus IL. Simultaneously, the B2Hunters team (operating as Anon.idh) targeted Israeli technology and general websites, indicating a coordinated ideological or geopolitical push against Israeli digital infrastructure.
- The Indian Campaign (XSQDD PHILIPPINE): The threat actor “PredixorX,” affiliated with the XSQDD PHILIPPINE team, launched a sweeping mass defacement operation targeting Indian websites. This campaign predominantly struck the education and technology training sectors, compromising Linux-based servers to alter content on sites like Zeenet Education , Apna Computer Centre , and HTS Digital.
B. High-Impact Data Breaches and Extortion
Data breaches represented the most severe threat to operational security and privacy, with threat actors leaking or selling massive datasets:
- Defense & Military Compromises: The most critical incident was claimed by “APT IRAN,” alleging unauthorized access to U.S. defense contractor Lockheed Martin, resulting in the supposed leak of 375 terabytes (TB) of sensitive data related to military programs and personnel. Additionally, the Israeli military suffered severe breaches; the Guardium Hacker Group claimed to have leaked the coordinates of 64 critical IDF bases , while another report detailed the compromise of secure communication codes used by the Israeli army, derived from foreign telecommunications hardware.
- Corporate & Financial Sector: Financial data was a prime target. ShinyHunters claimed to have breached Berkadia, extracting over 5 million Salesforce records containing PII and corporate data. The threat actor “clavicular” claimed a breach of Polymarket, exposing user account and activity details. In the Middle East, “gtaviispeak” leaked 430,000 user records from the UAE real estate platform Dubizzle.
- Mass Consumer Data Sales: Threat actor “Shinchan” attempted to sell a massive database containing 70 million U.S. consumer marketing records. Other significant sales included a 2-million-record Australian database and a Swiss citizen database containing 34,000 records with detailed personal and employment information.
C. Initial Access Brokering and Malware as a Service (MaaS)
The underground economy for access and tools remains robust:
- Malware Sales: Advanced tools were actively marketed on open web forums. “platovoplomo” advertised a C++ based loader featuring GPU-based encryption, token obfuscation, and anti-debugging techniques. Another actor, “Melatonin,” sold the Atroposia RAT, a suite featuring HVNC, vulnerability scanning, and credential harvesting. The “Aphrobyte RAT 2026” was also leaked, offering remote command execution and real-time C2 communication.
- Initial Access & Credentials: Threat actors frequently sold unauthorized access to content management systems, specifically targeting WordPress sites for U.S. and Israeli online stores. The group “RASHTRIYA CYBER SENA” leaked administrative credentials for Indonesian government portals , while the “Z-PENTEST ALLIANCE” compromised the CCTV systems of a Canadian cannabis facility, gaining real-time control of 16 cameras.
3. Sector Impact Analysis
- Education: Disproportionately targeted by defacement campaigns, particularly in India and Israel. While mostly resulting in reputational damage and temporary downtime, the sheer volume indicates systemic vulnerabilities in academic web hosting. The Académie de Créteil in France also suffered a severe breach, exposing data on 262,000 teachers.
- Government & Military: High-value targets suffered severe breaches. The Iraqi Independent High Electoral Commission’s database was put up for sale , and personal emails from the Ministry of Internal Affairs of Ukraine were allegedly leaked. The military sector saw unprecedented alleged leaks regarding Lockheed Martin and the IDF.
- Critical Infrastructure: The energy sector was targeted, notably with the defacement of SAPPCO (a Saudi petrochemical company) and a massive 937 GB data breach claimed against the Rumaila Operating Organisation in Iraq, potentially exposing oil infrastructure data.
- Public Safety: A disruptive cyberattack hit Intoxalock, taking systems offline and preventing customers from accessing essential device monitoring and compliance services for ignition interlock devices.
4. Notable Threat Actors
- r0ckin: Highly active defacer focused exclusively on Israeli educational and institutional domains.
- PredixorX (XSQDD PHILIPPINE): Prolific actor responsible for a wide-scale Linux server compromise campaign targeting Indian tech and education sites.
- CoinbaseCartel: A ransomware/extortion group claiming data breaches against multiple corporate entities via Tor networks, including Petra Industries , Ariston Group , and Onyx Graphics.
- APT IRAN: Claimed responsibility for the massive 375 TB Lockheed Martin data breach, indicating state-sponsored or highly advanced persistent threat capabilities.
5. Conclusion
The threat landscape documented in this dataset highlights a bifurcated cybersecurity environment. On one end of the spectrum, low-sophistication mass defacement campaigns continue to plague poorly secured Linux servers and educational institutions, driven largely by regional or geopolitical hacktivism. On the other end, highly sophisticated actors are successfully extracting terabytes of military, defense, and corporate data, causing severe operational disruptions (such as the Intoxalock incident) and posing massive national security risks (IDF and Lockheed Martin).
Furthermore, the active commercialization of sophisticated malware (like GPU-encrypted C++ loaders) and the steady supply of Initial Access offerings (WordPress admin panels, CCTV networks) guarantee that the barrier to entry for lower-tier cybercriminals remains low, ensuring a continuous volume of future attacks. Organizations must prioritize securing third-party communications hardware, patching outward-facing CMS platforms, and hardening cloud/Salesforce environments to mitigate these prevailing vectors.
Detected Incidents Draft Data
- Alleged data leak of Artists & Clients
Category: Data Breach
Content: Threat actor claims to have leaked data from Artists & Clients. The compromised data reportedly includes emails, names/usernames, hashed passwords, ip addresses etc.
Date: 2026-03-19T23:59:16Z
Network: openweb
Published URL: https://spear.cx/Thread-Database-Artists-Clients-Leaked-Download
Screenshots:
None
Threat Actors: anonmooose
Victim Country: USA
Victim Industry: Hospitality & Tourism
Victim Organization: artists & clients
Victim Site: artistsnclients.com - Alleged unauthorized access to Starlink
Category: Initial Access
Content: The group claims to have gained unauthorized access to the website of Starlink.
Date: 2026-03-19T23:57:38Z
Network: telegram
Published URL: https://t.me/musicarusaesp/11332
Screenshots:
None
Threat Actors: Desinformador ruso
Victim Country: USA
Victim Industry: Unknown
Victim Organization: starlink
Victim Site: starlink.com - Alleged sale of Hotmail email credentials
Category: Combo List
Content: Threat actor redcloud is allegedly selling 7.3K valid Hotmail email credentials described as private and high quality, distributed via Telegram and file sharing platform.
Date: 2026-03-19T23:57:03Z
Network: openweb
Published URL: https://crackingx.com/threads/69220/
Screenshots:
None
Threat Actors: redcloud
Victim Country: Unknown
Victim Industry: Technology
Victim Organization: Microsoft
Victim Site: hotmail.com - Alleged leak of unauthorized access to Lockheed Martin
Category: Initial Access
Content: The group claims to have gained unauthorized access to systems associated with Lockheed Martin, a U.S.-based aerospace and defense organization, and to have leaked sensitive data related to military programs, personnel records, and internal communications. According to the claims, the compromised dataset is estimated to be approximately 375 terabytes (TB).
Date: 2026-03-19T23:28:25Z
Network: telegram
Published URL: https://t.me/c/3575098403/42
Screenshots:
None
Threat Actors: APT IRAN
Victim Country: USA
Victim Industry: Defense & Space
Victim Organization: lockheed martin
Victim Site: lockheedmartin.com - LAPSUS claims to target companies from USA
Category: Alert
Content: A recent post by the group indicates that they are targeting big companies from USA.
Date: 2026-03-19T23:20:44Z
Network: telegram
Published URL: https://t.me/lapsus_groupo/8
Screenshots:
None
Threat Actors: LAPSUS
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of emails from Ministry of Internal Affairs of Ukraine
Category: Data Breach
Content: The group claims to have leaked personal emails belonging to an official associated with the Ministry of Internal Affairs of Ukraine.
Date: 2026-03-19T23:14:20Z
Network: telegram
Published URL: https://t.me/musicarusaesp/11330
Screenshots:
None
Threat Actors: Desinformador ruso
Victim Country: Ukraine
Victim Industry: Government Administration
Victim Organization: ministry of internal affairs of ukraine
Victim Site: mvs.gov.ua - Alleged Sale of Aphrobyte RAT
Category: Malware
Content: Threat actor claims to be selling Aphrobyte RAT 2026, a Remote Access Trojan (RAT) designed for unauthorized control of compromised systems. The malware includes features such as remote command execution, surveillance, credential theft, persistence mechanisms, and real-time communication with command-and-control servers, highlighting evolving sophisticated malware threats.
Date: 2026-03-19T22:32:37Z
Network: openweb
Published URL: https://demonforums.net/Thread-Leak-Aphrobyte-RAT-2026
Screenshots:
None
Threat Actors: rippors
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Kencana Sari
Category: Data Breach
Content: The group claims to have accessed the data of Kencana Sari.
Date: 2026-03-19T22:25:48Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/281
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kencana sari
Victim Site: kencanasari.jakarta.go.id - Alleged Sale of Unauthorized WordPress Access to an Unidentified Medicine Shop in USA
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized WordPress access to an unidentified medicine shop in the USA. The shop has processed approximately 9,443 orders, with recent activity including 139 orders in February and 99 in March, and uses payment methods such as Authorize.Net AIM and PayPal.
Date: 2026-03-19T22:10:42Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278722/
Screenshots:
None
Threat Actors: Emperorcvv
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - r0ckin targets the website of Wolfson Faculty of Chemical Engineering
Category: Defacement
Content: The group claims to have defaced the website of Wolfson Faculty of Chemical Engineering.
Date: 2026-03-19T22:08:38Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609235
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: wolfson faculty of chemical engineering
Victim Site: chemeng.technion.ac.il - Alleged Sale of Unauthorized WordPress Access to an Unidentified Medicine Shop in Israel
Category: Initial Access
Content: The threat actor claims to be selling unauthorized WordPress access to an unidentified medicine shop in Israel, stating that the platform has recorded a total of 15,823 orders, with approximately 101 orders per month, and supports payments via card and PayPal.
Date: 2026-03-19T21:56:08Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278723/
Screenshots:
None
Threat Actors: Emperorcvv
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - r0ckin targets the website of The Academic College of Ramat Gan
Category: Defacement
Content: The group claims to have defaced the website of The Academic College of Ramat Gan.
Date: 2026-03-19T21:54:06Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609234
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: the academic college of ramat gan
Victim Site: iac.ac.il - r0ckin targets the website of Hebrew University of Jerusalem
Category: Defacement
Content: The Group claims to have defaced the website of Hebrew University of Jerusalem.
Date: 2026-03-19T21:44:09Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609237?hz=1
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: hebrew university of jerusalem
Victim Site: law.huji.ac.il - r0ckin targets the website of ORT Braude College of Engineering
Category: Defacement
Content: The Group claims to have defaced the website of ORT Braude College of Engineering.
Date: 2026-03-19T21:43:22Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609239
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: ort braude college of engineering
Victim Site: w3.braude.ac.il - r0ckin targets the website of Kaye Academic College of Education
Category: Defacement
Content: The group claims to have defaced the website of Kaye Academic College of Education.
Date: 2026-03-19T21:42:45Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609232
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: kaye academic college of education
Victim Site: kaye.ac.il - r0ckin targets the website of Shaarei Mishpat Academic Center
Category: Defacement
Content: The group claims to have defaced the website of Shaarei Mishpat Academic Center.
Date: 2026-03-19T21:42:31Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609236
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: shaarei mishpat academic center
Victim Site: mishpat.ac.il - r0ckin targets the website of Campus IL
Category: Defacement
Content: Group claims to have defaced the website of Campus IL
Date: 2026-03-19T21:40:53Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609213?hz=1
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: E-Learning
Victim Organization: campus il
Victim Site: campus.gov.il - r0ckin targets the website of Academic Center for Law and Business
Category: Defacement
Content: The group claims to have defaced the website of Academic Center for Law and Business.
Date: 2026-03-19T21:40:18Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609231
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: academic center for law and business
Victim Site: clb.ac.il - Alleged Sale of Luxembourg Private Leads
Category: Data Breach
Content: A threat actor claims to be selling 35,000 Luxembourg private leads, allegedly collected from advertising campaigns. The dataset reportedly includes client names, phone numbers, mobile numbers, email addresses, and country information.
Date: 2026-03-19T21:37:41Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278716/
Screenshots:
None
Threat Actors: betway
Victim Country: Luxembourg
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - r0ckin targets the website of The Center for Educational Technology
Category: Defacement
Content: Group claims to have defaced the website of The Center for Educational Technology
Date: 2026-03-19T21:37:20Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609230
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: E-Learning
Victim Organization: the center for educational technology
Victim Site: cet.ac.il - r0ckin targets the website of Western Galilee College
Category: Defacement
Content: The group claims to have defaced the website of Western Galilee College.
Date: 2026-03-19T21:34:14Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41609233
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Israel
Victim Industry: Education
Victim Organization: western galilee college
Victim Site: wgalil.ac.il - Website defacement of Space Cinema by Zod
Category: Defacement
Content: The attacker Zod successfully defaced the Space Cinema website on March 20, 2026. The defacement targeted a specific page rather than the homepage and was archived for documentation purposes.
Date: 2026-03-19T21:25:32Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248045
Screenshots:
None
Threat Actors: Zod, Zod
Victim Country: Nigeria
Victim Industry: Entertainment
Victim Organization: Space Cinema
Victim Site: live.spacecinema.com.ng - Mass defacement of SpaceCinema website by Zod
Category: Defacement
Content: The attacker Zod conducted a mass defacement campaign targeting the SpaceCinema entertainment website in Nigeria. This incident was part of a broader mass defacement operation rather than a targeted single-site attack.
Date: 2026-03-19T21:24:43Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248046
Screenshots:
None
Threat Actors: Zod, Zod
Victim Country: Nigeria
Victim Industry: Entertainment
Victim Organization: SpaceCinema
Victim Site: cinema.spacecinema.com.ng - Alleged Sale of Unauthorized WordPress Access to an Unidentified Auto Parts Shop in the United States
Category: Initial Access
Content: The threat actor claims to be selling unauthorized WordPress access to an unidentified auto parts shop in the United States, stating that payments are processed via Stripe and Authorize.Net through a frame-based setup, with reported transactions of 971 in January, 1000 in February, and 1000 in December.
Date: 2026-03-19T20:40:10Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278714/
Screenshots:
None
Threat Actors: citizenfour
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of C++ Loader
Category: Malware
Content: Threat Actor claims to be selling a C++ based loader bundled with a GitHub-based command-and-control (C2) mechanism and GPU-based encryption capabilities. The tool includes features such as token obfuscation, indirect syscalls, custom hash-based API resolution, in-memory execution, remote process injection, anti-debugging and anti-sandbox techniques, GPU-assisted encryption using compute shaders, and a control panel for deployment, payload management, and real-time command execution.
Date: 2026-03-19T19:35:56Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278709/
Screenshots:
None
Threat Actors: platovoplomo
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of HTX, MEXC, and Stake Accounts
Category: Data Breach
Content: A threat actor claims to be selling ready-made HTX, MEXC, and Stake accounts with completed KYC levels . The actor also offers to complete KYC on existing accounts and accepts individual orders, with pricing stated as negotiable per account.
Date: 2026-03-19T18:45:17Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278704/
Screenshots:
None
Threat Actors: LOGS_KING
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - INDOHAXSEC targets the website of standfor.org.il
Category: Defacement
Content: The group claims to have defaced the website of standfor.org.il.
Date: 2026-03-19T18:02:21Z
Network: telegram
Published URL: https://t.me/IndoHaxSec3/78
Screenshots:
None
Threat Actors: INDOHAXSEC
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: standfor.org.il - White System./404 targets the website of GoSEO
Category: Defacement
Content: The group claims to have defaced the website of GoSEO.
Date: 2026-03-19T17:34:16Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41607937
Screenshots:
None
Threat Actors: White System./404
Victim Country: Israel
Victim Industry: Education
Victim Organization: goseo
Victim Site: goseo.co.il - Alleged Sale of Switzerland citizen Database
Category: Data Breach
Content: A threat actor claims to be selling a Swiss citizen database containing approximately 34,000 records. The dataset reportedly includes personal information such as names, birthdates, phone numbers, email addresses, and detailed address information, along with employment-related details.
Date: 2026-03-19T17:33:31Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278701/
Screenshots:
None
Threat Actors: Andropa1221
Victim Country: Switzerland
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Académie de Créteil
Category: Data Breach
Content: The threat actor claims to have breached 262,000 of data from Académie de Créteil, The dataset reportedly includes 206,169 addresses, 262,651 emails, and 231,941 phone numbers, with proof links to verify the dataset.
Date: 2026-03-19T17:26:55Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-FR-AC-Cretail-262K-Teachers
Screenshots:
None
Threat Actors: HexDex
Victim Country: France
Victim Industry: Education
Victim Organization: académie de créteil
Victim Site: ac-creteil.fr - Alleged unauthorized access to unidentified organizations in Brazil
Category: Initial Access
Content: The threat actor claims to have selling unauthorized access to unidentified organization, The post mentions two separate targets first target is a Food & Beverage retail/distribution company with 74.96 GB of data being sold for $500. The second is a Meat/Butcher company with 37.19 GB of data priced at $200.
Date: 2026-03-19T17:26:45Z
Network: openweb
Published URL: https://darkforums.su/Thread-Corporate-Cloud-Accesses-2
Screenshots:
None
Threat Actors: vexin
Victim Country: Brazil
Victim Industry: Food & Beverages
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of organizations in China
Category: Data Breach
Content: The threat actor claims to have leaked the database related to Chinas organisations. The post indicates interest in acquiring previously unused or unsold datasets, suggesting potential intent to obtain sensitive financial and user-related information.
Date: 2026-03-19T17:01:04Z
Network: openweb
Published URL: https://darkforums.su/Thread-Buying-Looking-for-China-region-data-online-loan-overdue-records-gambling-user-withdrawal
Screenshots:
None
Threat Actors: loveusd
Victim Country: China
Victim Industry: Financial Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Ron Shpigel Architects
Category: Data Breach
Content: The group claims to have deleted data from Ron Shpigel Architects.
Date: 2026-03-19T16:57:10Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/42
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Architecture & Planning
Victim Organization: ron shpigel architects
Victim Site: shpigelarch.co.il - TEGAL CYBER TEAM targets the website of Nextgen Laser Tech
Category: Defacement
Content: The group claims to have defaced the website of Nextgen Laser Tech.
Date: 2026-03-19T16:52:24Z
Network: telegram
Published URL: https://t.me/tegalcyberteamch/260
Screenshots:
None
Threat Actors: TEGAL CYBER TEAM
Victim Country: India
Victim Industry: Machinery Manufacturing
Victim Organization: nextgen laser tech
Victim Site: nextgenlaser.in - Alleged Leak of Coruna RCE
Category: Data Breach
Content: The threat actor claims that a leaked version of the “Coruna” exploit is currently being used against iOS 26.3 devices.
Date: 2026-03-19T16:14:08Z
Network: openweb
Published URL: https://xss.pro/threads/146488/
Screenshots:
None
Threat Actors: ski
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Website defacement of mepwer.com by systemdarkdenied
Category: Defacement
Content: The attacker systemdarkdenied successfully defaced the mepwer.com website on March 19, 2026. This was an isolated single-target defacement incident targeting a Linux-based web server.
Date: 2026-03-19T15:56:09Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248044
Screenshots:
None
Threat Actors: systemdarkdenied
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: mepwer.com - Alleged data breach of Berkadia
Category: Data Breach
Content: The threat actor claims to have obtained and leaked a database from Berkadia. The leaked data reportedly includes over 5 million Salesforce records containing PII and internal corporate information.
Date: 2026-03-19T15:26:36Z
Network: tor
Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
Screenshots:
None
Threat Actors: ShinyHunters
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: berkadia
Victim Site: berkadia.com - Alleged leak of LinkedIn data from Iraq
Category: Data Breach
Content: The group claims to have leaked 76.8 MB of LinkedIn data from Iraq.
Date: 2026-03-19T15:13:03Z
Network: telegram
Published URL: https://t.me/c/3398932380/1106
Screenshots:
None
Threat Actors: Escanors Official
Victim Country: Iraq
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Website defacement of SAPPCO by systemdarkdenied
Category: Defacement
Content: The attacker systemdarkdenied defaced the SAPPCO website on March 19, 2026. SAPPCO is a Saudi Arabian petrochemical company, making this an attack against critical energy infrastructure.
Date: 2026-03-19T15:08:22Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248043
Screenshots:
None
Threat Actors: systemdarkdenied
Victim Country: Saudi Arabia
Victim Industry: Oil and Gas
Victim Organization: SAPPCO
Victim Site: www.sappco.com.sa - Cyberattack Hits Intoxalock
Category: Cyber Attack
Content: A cyberattack disrupted the services of Intoxalock after its systems were taken offline, impacting customers’ ability to access essential functions such as device monitoring, account management, and support services. The incident caused widespread inconvenience, particularly for users dependent on ignition interlock devices for compliance requirements. While the exact nature of the attack has not been fully disclosed, the company acknowledged the disruption and has been working to restore services. No confirmation of data compromise has been reported, and an investigation into the incident is ongoing.
Date: 2026-03-19T14:21:50Z
Network: openweb
Published URL: https://www.ceoutlook.com/2026/03/18/cyberattack-disrupts-intoxalock-services/
Screenshots:
None
Threat Actors: Unknown
Victim Country: USA
Victim Industry: Public Safety
Victim Organization: intoxalock
Victim Site: intoxalock.com - Hax.or targets the website of sof-sof.co.il
Category: Defacement
Content: The group claims to have defaced the website of sof-sof.co.il.
Date: 2026-03-19T13:30:48Z
Network: telegram
Published URL: https://t.me/ctifeeds/129263
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: sof-sof.co.il - Alleged leak of login credentials to SIPPELA
Category: Initial Access
Content: The group claims to have leaked the login credentials to SIPPELA.
Date: 2026-03-19T13:26:51Z
Network: telegram
Published URL: https://t.me/CinCauGhast404/16
Screenshots:
None
Threat Actors: CinCauGhast
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: sippela
Victim Site: sippela.bandung.go.id - Israeli Army’s Secure Communications Suffers Breach
Category: Data Breach
Content: Tasnim News Agency reports that specialized communications groups have allegedly compromised secure-communication codes used by the Israeli army. According to the report, the breach occurred after gaining insight into the companies and telecommunications hardware supporting the military’s encrypted infrastructure—equipment sourced from Italy, Germany, Austria, and France.Critical battlefield communications, including long-range wireless connectivity with command-and-control systems, reportedly rely on an encrypted internet-based telephony system built on these foreign platforms. Following the leak of underlying infrastructure data, cyber specialists are said to have obtained associated encryption systems.The Israeli army has reportedly acknowledged awareness of the leaked information and is considering deploying a new communications system, although such a transition is expected to be difficult and slow.
Date: 2026-03-19T13:20:27Z
Network: openweb
Published URL: https://tasnimnews.ir/en/news/2026/03/19/3544754/codes-of-secure-communication-infrastructure-in-israeli-army-leaked
Screenshots:
None
Threat Actors: Unknown
Victim Country: Israel
Victim Industry: Military Industry
Victim Organization: israel defense forces
Victim Site: idf.il - Alleged Data Breach of Polymarket
Category: Data Breach
Content: The threat actor claims to have breached data from Polymarket.The compromised data includes account details, activity information, and other associated records.
Date: 2026-03-19T13:17:09Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278688/
Screenshots:
None
Threat Actors: clavicular
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: polymarket
Victim Site: polymarket.com - Hax.or targets the website of SunTech
Category: Defacement
Content: The group claims to have defaced the website of SunTech.
Date: 2026-03-19T13:15:56Z
Network: telegram
Published URL: https://t.me/ctifeeds/129262
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Israel
Victim Industry: Events Services
Victim Organization: suntech
Victim Site: suntech.org.il - Alleged Sale of Atroposia RAT Malware Suite
Category: Malware
Content: The threat actor claims to be selling a multifunctional malware toolkit named Atroposia RAT, featuring remote access, data exfiltration, credential harvesting, and system control capabilities. The tool reportedly includes modules for HVNC, file management, vulnerability scanning, and network manipulation, enabling attackers to monitor, control, and extract sensitive data from compromised systems.
Date: 2026-03-19T13:09:20Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278681/
Screenshots:
None
Threat Actors: Melatonin
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Mass defacement targeting Israeli websites by B2Hunters team member Anon.idh
Category: Defacement
Content: B2Hunters team member Anon.idh conducted a mass defacement campaign targeting Israeli websites including sof-sof.co.il on March 19, 2026. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
Date: 2026-03-19T12:23:32Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248041
Screenshots:
None
Threat Actors: Anon.idh, B2Hunters
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: sof-sof.co.il - Mass defacement targeting Israeli technology organizations by B2Hunters team
Category: Defacement
Content: The B2Hunters team, operating under the alias Anon.idh, conducted a mass defacement campaign targeting Israeli websites including suntech.org.il on March 19, 2026. This attack was part of a broader coordinated effort against multiple Israeli technology sector websites rather than an isolated incident.
Date: 2026-03-19T12:23:03Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248042
Screenshots:
None
Threat Actors: Anon.idh, B2Hunters
Victim Country: Israel
Victim Industry: Technology
Victim Organization: Suntech
Victim Site: suntech.org.il - Alleged Leak of Israeli Military Sites data
Category: Data Breach
Content: The Guardium Hacker Group announced that it has continued its cyber-operations by allegedly uncovering the precise coordinates of 24 critical military bases belonging to Israel Defense Forces in Israel. According to the group’s statement, a total of 64 locations—comprising primary IDF bases, strategic military installations, and factories associated with defense production—were disclosed.
Date: 2026-03-19T12:10:28Z
Network: telegram
Published URL: https://t.me/cyberbannews_ir/20621?single
Screenshots:
None
Threat Actors: Unknown
Victim Country: Israel
Victim Industry: Military Industry
Victim Organization: israel defense forces
Victim Site: idf.il - Alleged Sale of Identity Documents and Personal Data Packages
Category: Data Breach
Content: The threat actor claims to be selling identity document packages and personal data, including UK and US records. The offering reportedly includes scanned IDs, passports, selfies, and text files containing sensitive information such as full names, dates of birth, addresses, SSNs, and other identification details, along with data search services.
Date: 2026-03-19T11:57:42Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278676/
Screenshots:
None
Threat Actors: My_World
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Aleged data breach of Petra Industries, LLC.
Category: Data Breach
Content: The group claims to have breached the organizations data.
Date: 2026-03-19T11:44:42Z
Network: tor
Published URL: http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/petra
Screenshots:
None
Threat Actors: CoinbaseCartel
Victim Country: USA
Victim Industry: Wholesale
Victim Organization: petra industries, llc.
Victim Site: petra.com - Alleged data breach of Government Post Graduate Collage
Category: Data Breach
Content: Threat actor claims to have breached data from Government Post Graduate Collage.
Date: 2026-03-19T11:42:00Z
Network: telegram
Published URL: https://t.me/c/3807888281/98
Screenshots:
None
Threat Actors: konco Indonesian Team official
Victim Country: India
Victim Industry: Education
Victim Organization: government post graduate collage
Victim Site: thalisaingdc.ac.in - Aleged data breach of Ariston Group
Category: Data Breach
Content: The group claims to have breached the organizations data.
Date: 2026-03-19T11:39:35Z
Network: tor
Published URL: http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/ariston
Screenshots:
None
Threat Actors: CoinbaseCartel
Victim Country: Italy
Victim Industry: Manufacturing
Victim Organization: ariston group
Victim Site: ariston.com - Aleged data breach of Onyx Graphics, Inc.
Category: Data Breach
Content: The group claims to have breached the organizations data.
Date: 2026-03-19T11:34:22Z
Network: tor
Published URL: http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/onyx
Screenshots:
None
Threat Actors: CoinbaseCartel
Victim Country: USA
Victim Industry: Software Development
Victim Organization: onyx graphics, inc.
Victim Site: onyxgfx.com - Alleged leak of login credentials to WM Center
Category: Initial Access
Content: The group claims to have leaked login credentials to WM Center.
Date: 2026-03-19T10:41:09Z
Network: telegram
Published URL: https://t.me/teamRcs/150
Screenshots:
None
Threat Actors: RASHTRIYA CYBER SENA
Victim Country: Indonesia
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: wm center
Victim Site: wmcenter.id - Alleged admin access to unidentified organization in Bangladesh
Category: Initial Access
Content: The group claims to have gained unauthorized admin access to unidentified organization in Bangladesh.
Date: 2026-03-19T10:39:44Z
Network: telegram
Published URL: https://t.me/teamRcs/148
Screenshots:
None
Threat Actors: RASHTRIYA CYBER SENA
Victim Country: Bangladesh
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Tanda Tangan Elektronik Pemerintah Kabupaten Badung
Category: Data Breach
Content: The group claims to have breached internal data from Tanda Tangan Elektronik Pemerintah Kabupaten Badung.
Date: 2026-03-19T10:38:48Z
Network: telegram
Published URL: https://t.me/teamRcs/151
Screenshots:
None
Threat Actors: RASHTRIYA CYBER SENA
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: tanda tangan elektronik pemerintah kabupaten badung
Victim Site: tte.badungkab.go.id - Alleged leak of login credentials to DKI Jakarta Population and Civil Registration Service
Category: Initial Access
Content: The group claims to have leaked the login credentials to Dinas Kependudukan dan Pencatatan Sipil DKI Jakarta.
Date: 2026-03-19T10:33:38Z
Network: telegram
Published URL: https://t.me/CinCauGhast404/13
Screenshots:
None
Threat Actors: CinCauGhast
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: dki jakarta population and civil registration service
Victim Site: datawarga-dukcapil.jakarta.go.id - Alleged data leak of unidentified US organisation
Category: Data Breach
Content: The threat actor claims to have accessed and extracted data from an unidentified US organisation. They allege possession of ‘official data’ and additional sensitive information obtained over a two-month intrusion into an unspecified internal system.
Date: 2026-03-19T10:11:20Z
Network: telegram
Published URL: https://t.me/petrusinformation/449
Screenshots:
None
Threat Actors: Petrusnism
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - InDoM1nus Team targets the website of PTUN
Category: Defacement
Content: The group claims to have defaced the website of PTUN.
Date: 2026-03-19T09:55:33Z
Network: telegram
Published URL: https://t.me/InDoM1nusTe4m/118
Screenshots:
None
Threat Actors: InDoM1nus Team
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: ptun
Victim Site: latun.or.id - Alleged data leak of Israel
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly containing email addresses and phone numbers of individuals based in Israel.
Date: 2026-03-19T08:38:37Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-EMAIL-CONTACT-ISRAEL
Screenshots:
None
Threat Actors: D4nzXploit
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of SQL Injection Vulnerability in Department of Environment and Forestry of Riau Province
Category: Vulnerability
Content: The group claims to have leaked SQL injection vulnerability in Department of Environment and Forestry of Riau Province website.
Date: 2026-03-19T08:23:32Z
Network: telegram
Published URL: https://t.me/c/3807888281/93
Screenshots:
None
Threat Actors: konco Indonesian Team official
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: department of environment and forestry of riau province
Victim Site: dislhk.riau.go.id - Website defacement of latun.or.id by AmbaZy
Category: Defacement
Content: The website latun.or.id was defaced by an individual attacker identified as AmbaZy on March 19, 2026. The attack targeted a Linux-based server and appears to be an isolated defacement rather than part of a mass campaign.
Date: 2026-03-19T07:59:12Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248040
Screenshots:
None
Threat Actors: Hacked By AmbaZy
Victim Country: Indonesia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: latun.or.id - Alleged Sale of Australia Data
Category: Data Breach
Content: Threat actor claims to be selling a database containing approximately 2 million records from Australia. The leaked data reportedly includes personal information such as names, email addresses, and phone numbers.
Date: 2026-03-19T06:37:19Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278663/
Screenshots:
None
Threat Actors: Goldstones
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Dubizzle
Category: Data Breach
Content: Threat actor claims to have leaked data from Dubizzle. The compromised dataset reportedly contains approximately 430,000 user records, including email addresses, phone numbers, names, gender, location details (city, neighborhood, address, ZIP code, coordinates), as well as transaction-related information such as total spending, transaction counts, account activity, and device details.
Date: 2026-03-19T06:36:35Z
Network: openweb
Published URL: https://darkforums.su/Thread-430k-United-Arab-Emirates-https-www-dubizzle-com-User-profiles-email-phonetrans
Screenshots:
None
Threat Actors: gtaviispeak
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: dubizzle
Victim Site: dubizzle.com - Alleged Data Leak of ntlworld.com
Category: Data Breach
Content: Threat actor claims to be leaking a database containing approximately 6,000+ email:password combinations allegedly associated with the ntlworld.com domain.
Date: 2026-03-19T06:12:40Z
Network: openweb
Published URL: http://niflheim.world/threads/6-035-lines-ntlworld-com-domain-target.164329/
Screenshots:
None
Threat Actors: BestCombo
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: ntlworld
Victim Site: ntlworld.com - Alleged Sale of Unauthorized Admin Access to bimehnovingilan.ir
Category: Initial Access
Content: Threat Actor claims to have leaked unauthorized admin access to bimehnovingilan.ir
Date: 2026-03-19T05:54:35Z
Network: openweb
Published URL: https://xforums.st/threads/bimehnovingilan-ir-admin-wp-login.538537/
Screenshots:
None
Threat Actors: X Forum Bot
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: bimehnovingilan.ir - BABAYO EROR SYSTEM targets the website of Dulwich College School Tondano
Category: Defacement
Content: The group claims to have defaced the website of Dulwich College School Tondano.
Date: 2026-03-19T05:37:00Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/273
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: dulwich college school tondano
Victim Site: mail.smadcs-tdo.sch.id - Alleged Leak of US Driver’s License and Selfie Data
Category: Data Breach
Content: The threat actor claims to have leaked the dataset allegedly containing identity-related documents from Arkansas, USA.
Date: 2026-03-19T05:28:06Z
Network: openweb
Published URL: https://spear.cx/Thread-Free-USA-Arkansas-DL-Selfie-FRESH
Screenshots:
None
Threat Actors: DataIntel
Victim Country: USA
Victim Industry: Government Relations
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Akrunow Securities Investment Database
Category: Data Breach
Content: The threat actor claims to be selling a dataset allegedly associated with Akrunow Securities investment platform. The dataset contains personal and investment related user data.
Date: 2026-03-19T04:42:05Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Malaysian-Akrunow-Securities-stock-investment-1300k
Screenshots:
None
Threat Actors: DDying
Victim Country: Malaysia
Victim Industry: Financial Services
Victim Organization: akrunow securities
Victim Site: akrunow.com - Alleged Sale of U.S. Consumer Marketing Database
Category: Data Breach
Content: The threat actor claims to be selling a large-scale dataset containing over 70 million U.S. consumer records.
Date: 2026-03-19T03:51:51Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-USA-70M-PERSONAL-DATA-INFORMATION-CONSUMER-MARKETING-RECORDS
Screenshots:
None
Threat Actors: Shinchan
Victim Country: USA
Victim Industry: Marketing, Advertising & Sales
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Iraqi Election Database
Category: Data Breach
Content: The threat actor claims to be selling Iraqi Election Database. The dataset contains Iraqi election-related data sourced from the Independent High Electoral Commission (IHEC).
Date: 2026-03-19T03:36:51Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-USA-70M-PERSONAL-DATA-INFORMATION-CONSUMER-MARKETING-RECORDS
Screenshots:
None
Threat Actors: Shinchan
Victim Country: Iraq
Victim Industry: Government Relations
Victim Organization: independent high electoral commission (ihec)
Victim Site: ihec.iq - Mass defacement targeting Indian educational institutions by XSQDD PHILIPPINE team member PredixorX
Category: Defacement
Content: The XSQDD PHILIPPINE team, specifically attacker PredixorX, conducted a mass defacement campaign targeting Indian educational websites including zeenetedu.in. This incident was part of a broader coordinated attack affecting multiple educational institutions rather than an isolated single-site compromise.
Date: 2026-03-19T03:24:39Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248029
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: Zeenet Education
Victim Site: www.zeenetedu.in - Mass website defacement by PredixorX (XSQDD PHILIPPINE) targeting Indian computer center
Category: Defacement
Content: PredixorX from XSQDD PHILIPPINE team conducted a mass defacement campaign targeting multiple websites including Apna Computer Centre in India. The attack occurred on March 19, 2026 against a Linux-based server hosting the computer training centers website.
Date: 2026-03-19T03:24:10Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248030
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education/Technology Training
Victim Organization: Apna Computer Centre
Victim Site: apnacomputercentre.in - Mass website defacement by XSQDD PHILIPPINE targeting htsdigital.in
Category: Defacement
Content: The threat actor PredixorX from XSQDD PHILIPPINE team conducted a mass defacement campaign targeting htsdigital.in on March 19, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
Date: 2026-03-19T03:23:40Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248031
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Technology
Victim Organization: HTS Digital
Victim Site: htsdigital.in - Alleged data breach of VUCE Colombia
Category: Data Breach
Content: The threat actor claims to be breached VUCE Colombia. The exposed data fields includes Company name, company address, company email, company number, address, name, home address, phone number, email and much more information.
Date: 2026-03-19T03:22:46Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-CO-50K-PBN-VUCE-GOV-CO
Screenshots:
None
Threat Actors: darkso
Victim Country: Colombia
Victim Industry: Government & Public Sector
Victim Organization: vuce colombia
Victim Site: pbn.vuce.gov.co - Website defacement of MCEC by PredixorX (XSQDD PHILIPPINE team)
Category: Defacement
Content: The website mcec.in was defaced by attacker PredixorX from the XSQDD PHILIPPINE team on March 19, 2026. This was part of a mass defacement campaign targeting multiple websites.
Date: 2026-03-19T03:22:37Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248032
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: MCEC
Victim Site: mcec.in - Mass website defacement of M2 Institute by PredixorX/XSQDD PHILIPPINE
Category: Defacement
Content: PredixorX from the XSQDD PHILIPPINE team conducted a mass defacement attack targeting M2 Institutes website on March 19, 2026. The attack was part of a broader mass defacement campaign rather than a targeted single-site attack.
Date: 2026-03-19T03:22:12Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248034
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: M2 Institute
Victim Site: m2institute.in - Mass defacement campaign by XSQDD PHILIPPINE targeting scilm.in
Category: Defacement
Content: XSQDD PHILIPPINE threat group conducted a mass defacement campaign targeting scilm.in on March 19, 2026. The attack was carried out by threat actor PredixorX as part of a broader mass defacement operation affecting multiple websites.
Date: 2026-03-19T03:21:39Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248035
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: scilm.in - Mass defacement targeting Indian technology company by XSQDD Philippine team member PredixorX
Category: Defacement
Content: The website of Xectiq India was defaced by PredixorX, a member of the XSQDD Philippine team, as part of a mass defacement campaign. The attack targeted the Indian technology companys website on March 19, 2026.
Date: 2026-03-19T03:21:08Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248036
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Technology
Victim Organization: Xectiq India
Victim Site: www.xectiqindia.in - Mass defacement campaign by XSQDD PHILIPPINE targeting malikcomputers.in
Category: Defacement
Content: XSQDD PHILIPPINE threat group conducted a mass defacement campaign targeting multiple websites including malikcomputers.in on March 19, 2026. The attack was executed by threat actor PredixorX as part of a broader coordinated defacement operation.
Date: 2026-03-19T03:20:18Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248037
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Technology/Computer Services
Victim Organization: Malik Computers
Victim Site: malikcomputers.in - Mass defacement campaign by XSQDD PHILIPPINE targeting pkcomputerpvtltd.in
Category: Defacement
Content: The XSQDD PHILIPPINE team conducted a mass defacement campaign targeting multiple websites including PK Computer Pvt Ltds website. The attack was executed by threat actor PredixorX on March 19, 2026, compromising a Linux-based server.
Date: 2026-03-19T03:19:46Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248039
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Technology
Victim Organization: PK Computer Pvt Ltd
Victim Site: pkcomputerpvtltd.in - Mass website defacement campaign by XSQDD PHILIPPINE targeting indiasiit.in
Category: Defacement
Content: XSQDD PHILIPPINE threat actor conducted a mass defacement campaign targeting indiasiit.in on March 19, 2026. The attack was executed by PredixorX and represents part of a broader mass defacement operation rather than a targeted single-site attack.
Date: 2026-03-19T03:14:02Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248024
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: SIIT India
Victim Site: indiasiit.in - Mass defacement campaign by XSQDD PHILIPPINE targeting educational institutions
Category: Defacement
Content: The XSQDD PHILIPPINE group conducted a mass defacement campaign targeting educational websites, with attacker PredixorX compromising the NCEP Computer website as part of a broader coordinated attack. The incident was part of a mass defacement operation rather than a targeted individual attack.
Date: 2026-03-19T03:13:35Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248025
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: NCEP Computer
Victim Site: www.ncepcomputer.in - Mass website defacement by XSQDD PHILIPPINE targeting educational institution
Category: Defacement
Content: XSQDD PHILIPPINE group conducted a mass defacement attack targeting multiple websites including Hojai Computer Academys educational platform. The attack was executed by threat actor PredixorX on March 19, 2026.
Date: 2026-03-19T03:12:59Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248026
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: Hojai Computer Academy
Victim Site: old.hojaicomputeracademy.in - Mass defacement campaign by XSQDD PHILIPPINE targeting rcppindia.in
Category: Defacement
Content: The threat actor PredixorX from XSQDD PHILIPPINE team conducted a mass defacement campaign targeting rcppindia.in on March 19, 2026. The attack was part of a broader mass defacement operation rather than targeting a specific homepage.
Date: 2026-03-19T03:12:20Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248027
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Unknown
Victim Organization: RCPP India
Victim Site: rcppindia.in - Mass website defacement by PredixorX/XSQDD PHILIPPINE targeting byteinstitute.in
Category: Defacement
Content: PredixorX from the XSQDD PHILIPPINE team conducted a mass defacement attack targeting byteinstitute.in on March 19, 2026. The attack was part of a larger mass defacement campaign rather than targeting this specific educational institution.
Date: 2026-03-19T03:11:59Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248028
Screenshots:
None
Threat Actors: PredixorX, XSQDD PHILIPPINE
Victim Country: India
Victim Industry: Education
Victim Organization: Byte Institute
Victim Site: byteinstitute.in - Alleged Sale of Classified U.S. Intelligence Document
Category: Data Breach
Content: The threat actor claims to be selling a classified intelligence document reportedly produced by a U.S. intelligence entity.
Date: 2026-03-19T03:10:15Z
Network: openweb
Published URL: https://darkforums.su/Thread-Document-TOP-SECRET-Classified-US-intelligence-document-for-sale
Screenshots:
None
Threat Actors: dsdave
Victim Country: USA
Victim Industry: Government Administration
Victim Organization: u.s. intelligence community
Victim Site: Unknown - Alleged Unauthorized Access to the CCTV System of The Green Bouquet Cannabis Inc.
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to the CCTV system of The Green Bouquet Cannabis Inc., a cannabis facility reportedly in Australia. They report real-time access and full control over 16 CCTV cameras, monitoring key areas of the premises, indicating a potential complete compromise of the surveillance system.
Date: 2026-03-19T01:55:06Z
Network: telegram
Published URL: https://t.me/c/3792806777/24
Screenshots:
None
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Canada
Victim Industry: Retail Industry
Victim Organization: the green bouquet cannabis inc
Victim Site: thegreenbouquetcannabis.com - BABAYO EROR SYSTEM targets the website of Ribersol Aquecedores
Category: Defacement
Content: The group claims to have defaced the website of Ribersol Aquecedores .
Date: 2026-03-19T00:44:19Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/272
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Brazil
Victim Industry: Energy & Utilities
Victim Organization: ribersol aquecedores
Victim Site: ribersolaquecedores.com.br - Alleged unauthorized access to CCTV Systems
Category: Initial Access
Content: The group claims to have gained unauthorized access to multiple CCTV Systems
Date: 2026-03-19T00:43:36Z
Network: telegram
Published URL: https://t.me/op_morningstar/556?single
Screenshots:
None
Threat Actors: MORNING STAR
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Rumaila Operating Organisation
Category: Data Breach
Content: The threat actor claims to have breached 937 GB of internal data from Rumaila Operating Organization, reportedly including sensitive information related to oil infrastructure and operational systems.
Date: 2026-03-19T00:17:03Z
Network: openweb
Published URL: http://nasir.cc/pages/rumaila.html
Screenshots:
None
Threat Actors: Nasir Security
Victim Country: Iraq
Victim Industry: Oil & Gas
Victim Organization: rumaila operating organisation
Victim Site: rumaila.iq