[March-27-2026] Daily Cybersecurity Threat Report

Executive Summary

This report analyzes a concentrated burst of cyber threat activity encompassing over 330 documented incidents. The threat landscape during this period is characterized by a high volume of automated mass defacements, the aggressive distribution of massive credential “combo lists” via Telegram and underground forums, and significant data breaches impacting government, educational, and corporate entities globally. The data suggests a dual-tiered threat environment: widespread, low-sophistication opportunistic attacks (defacements, credential stuffing) operating alongside high-impact data brokerage and initial access sales.


1. Threat Landscape Overview

The incidents analyzed fall into several distinct categories, revealing the current operational focus of active threat actors:

  • Website Defacements: A significant portion of the logged incidents involved website defacements. These were rarely targeted ideological attacks; instead, they were predominantly mass defacement campaigns exploiting widespread vulnerabilities (often on Linux servers or WordPress installations).
  • Credential Leaks (Combo Lists): The sheer volume of compromised credentials distributed during this period is staggering. Threat actors are freely sharing databases containing millions of email/password combinations (Hotmail, Gmail, Yahoo, corporate domains). These are primarily utilized for credential stuffing attacks.
  • Data Breaches & Leaks: High-value data is being actively brokered on forums like BreachForums and Exploit.in. Compromised data ranges from corporate intellectual property and employee records to sensitive government databases and healthcare information.
  • Initial Access & Vulnerabilities: There is a robust market for Initial Access Brokers (IABs). Access is frequently sold in the form of SMTP shell access, WordPress admin credentials, or direct network access. Additionally, threat groups are actively leaking SQL injection vulnerabilities.

2. Key Threat Actor Profiles & TTPs (Tactics, Techniques, and Procedures)

Several highly active threat actors and groups dominated the reporting period:

Defacement Actors

  • systemdarkdenied: This actor executed a massive, automated defacement campaign. They predominantly targeted Indian infrastructure, with a specific focus on educational institutions, local businesses, and “Paying Guest” (PG) accommodations. Their attacks routinely compromised Linux-based servers.
  • CYKOMNEPAL: A highly active group focused on South Asia, specifically targeting Nepal, India, and Bangladesh. They frequently targeted e-commerce, healthcare, and educational sites, often defacing specific sub-pages rather than root domains.
  • DimasHxR: This actor conducted numerous single-site defacements globally, impacting sites in South Africa, the Netherlands, Brazil, and Bangladesh. A recurring TTP for this actor was modifying the readme.txt file on the target servers.
  • Alpha wolf (Attacker XYZ): Executed mass defacement campaigns, particularly targeting Australian IT and commercial sites hosted on Linux systems.

Data Brokers & Credential Distributors

  • CODER: A prolific distributor of massive credential combo lists. They utilized Telegram channels to freely distribute millions of records, including AWS credentials, corporate business emails, and educational sector credentials, while offering related cracking tools.
  • HQcomboSpace: Focused on distributing massive combo lists, including 772,921 Gmail credentials, over 1 million German credentials, and 1.6 million Yahoo credentials.
  • Z-Root: Specialized in discovering and leaking SQL injection vulnerabilities. They heavily targeted educational institutions in India (e.g., Nowgong Girls College, Avantika University) and various organizations in Israel.
  • X Forum Bot: Flooded underground forums with automated posts advertising Initial Access, specifically the sale of SMTP shell access and cPanel compromises across various global targets.

3. Significant Incidents & High-Value Targets

While many incidents were opportunistic, several high-impact breaches occurred:

  • European Commission: Suffered a data breach following the compromise of their Amazon Web Services (AWS) environment. Attackers stole over 350 GB of data, including internal employee information, and threatened to leak it publicly.
  • Dutch National Police: Confirmed a security breach resulting from a successful phishing attack that compromised internal systems. While citizen data was reportedly unaffected, internal police information was impacted.
  • BreachForums Compromise: Threat actor “ShinyHunters” claimed to have breached the cybercriminal forum itself, offering full backups, source code, and data on 346,014 members for sale.
  • French Government (RESANA): Threat actors (resana1 / Resana) claimed to be selling a scraped database containing 1 million records of French government employees, including names, emails, and organizational data.
  • BMW Group & Automotive Sector: Threat actor “xpl0itrs” claimed to sell BMW Group data (dealership docs, PII, certificates) alongside data allegedly from Mercedes-Benz, Toyota, Ford, and Tesla.
  • Omax Autos Limited: Confirmed a ransomware attack on their IT infrastructure. The attack was attributed to Lockbit5.
  • FBI Director Target: The pro-Iranian group “Handala” (or “Handala Hack”) claimed to have compromised the personal account of FBI Director Kash Patel, leaking emails, photographs, and personal documents.

4. Geographical and Sector Impact Analysis

The dataset reveals a broad geographical spread, though certain regions and industries were heavily targeted.

Geographic Hotspots

  • India: Experienced a massive wave of website defacements (largely driven by systemdarkdenied and CYKOMNEPAL) and SQL injection leaks (by Z-Root). Targets included numerous schools, colleges, and local businesses.
  • Europe (France, Germany, Netherlands): Faced significant high-level data breaches, including the French Police, the French Government (RESANA), the Dutch National Police, and the German political party Die Linke (attacked by Qilin ransomware).
  • Israel: Faced targeted activity including Initial Access sales to industrial systems and SQL injection leaks by groups like Z-Root and Z-PENTEST ALLIANCE.
  • Nepal & Bangladesh: Primarily targeted by CYKOMNEPAL and DimasHxR for website defacements.

Targeted Industries

  • Education: Schools and universities were prime targets for defacements and vulnerability leaks, likely due to historically lower cybersecurity budgets and vast attack surfaces.
  • Government & Law Enforcement: High-value targets for data theft and hacktivism. Incidents involved the FBI, European Commission, French Police, and Mexican Tax Administration (SAT).
  • Technology & IT Services: Heavily targeted for Initial Access and database leaks, as compromising these entities often provides supply-chain access to downstream clients.
  • Healthcare: Medical databases in Colombia (Superintendencia Nacional de Salud) and China were actively brokered, highlighting the continued high black-market value of medical records.

Conclusion & Strategic Assessment

The cybersecurity events logged between March 27-28, 2026, illustrate a highly commoditized and automated cybercrime ecosystem.

1. The Automation of Nuisance Attacks: The sheer volume of mass defacements by actors like systemdarkdenied indicates the use of automated scanning and exploitation tools targeting low-hanging fruit (unpatched CMS platforms, specifically WordPress, and misconfigured Linux servers). While individually low-impact, the aggregate volume creates significant noise for security teams.

2. The Credential Stuffing Economy: The free distribution of hundreds of millions of credentials (combo lists) via Telegram by actors like CODER serves as the top of the funnel for the cybercrime economy. These lists enable automated credential stuffing attacks, which eventually lead to the Initial Access sales seen elsewhere in the data.

3. Initial Access as a Service: The proliferation of bots (like X Forum Bot) selling SMTP shell access and cPanel credentials demonstrates a thriving middle-market. Threat actors are specializing in gaining access and selling it to more sophisticated actors for deployment of ransomware or data exfiltration.

4. Cloud and Supply Chain Vulnerabilities: The breach of the European Commission via their AWS environment underscores the critical risk associated with cloud misconfigurations and third-party infrastructure.

Recommendations:

Organizations must prioritize fundamental security hygiene—specifically multi-factor authentication (MFA) to combat the massive influx of leaked combo lists. Furthermore, the volume of SQL injections and defacements targeting web infrastructure necessitates stricter patch management, particularly for open-source CMS platforms like WordPress, and the deployment of robust Web Application Firewalls (WAFs).

Detected Incidents Draft Data

  1. BABAYO EROR SYSTEM targets the website of digital.techguru.ai.in
    Category: Defacement
    Content: The group claims to have defaced the website of digital.techguru.ai.in
    Date: 2026-03-27T23:53:46Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/404
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: digital.techguru.ai.in
    Victim Site: digital.techguru.ai.in
  2. Alleged unauthorized access to Kolosok International Natural Science Game
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Kolosok International Natural Science Game, from which they allegedly exfiltrated databases, obtained corporate email credentials, and accessed telephony systems.
    Date: 2026-03-27T23:53:32Z
    Network: telegram
    Published URL: https://t.me/musicarusaesp/11425
    Screenshots:
    None
    Threat Actors: Desinformador ruso
    Victim Country: Ukraine
    Victim Industry: Education
    Victim Organization: kolosok international natural science game
    Victim Site: kolosok.info
  3. Alleged unauthorized access to Zerno
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Zerno, from which they allegedly exfiltrated databases, obtained corporate email credentials, and accessed telephony systems.
    Date: 2026-03-27T23:50:33Z
    Network: telegram
    Published URL: https://t.me/musicarusaesp/11425
    Screenshots:
    None
    Threat Actors: Desinformador ruso
    Victim Country: Ukraine
    Victim Industry: Fashion & Apparel
    Victim Organization: zerno
    Victim Site: zerno.kiev.ua
  4. Website defacement of Fintech Alliance by tirz4sec/jatengblekhet team
    Category: Defacement
    Content: The attacker tirz4sec from the jatengblekhet team defaced the Fintech Alliance website on March 28, 2026. This appears to be a targeted single-site defacement against a financial technology organization.
    Date: 2026-03-27T23:49:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820917
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Financial Technology
    Victim Organization: Fintech Alliance
    Victim Site: fintech-alliance.eu
  5. Alleged unauthorized access to Agrodoska
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Agrodoska, from which they allegedly exfiltrated databases, obtained corporate email credentials, and accessed telephony systems.
    Date: 2026-03-27T23:46:49Z
    Network: telegram
    Published URL: https://t.me/musicarusaesp/11425
    Screenshots:
    None
    Threat Actors: Desinformador ruso
    Victim Country: Ukraine
    Victim Industry: Agriculture & Farming
    Victim Organization: agrodoska
    Victim Site: agrodoska.net
  6. Alleged Data breach of Briley Wealth
    Category: Data Breach
    Content: The group claims to have leaked data from Briley Wealth.
    Date: 2026-03-27T23:43:40Z
    Network: telegram
    Published URL: https://t.me/c/3360072458/253
    Screenshots:
    None
    Threat Actors: Solonik
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: briley wealth
    Victim Site: brileywealth.com
  7. Website defacement of Probio Technologies by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The attacker tirz4sec, associated with the jatengblekhet team, successfully defaced the Probio Technologies website on March 28, 2026. The defacement targeted a specific file (tes.txt) on the Russian technology companys domain.
    Date: 2026-03-27T23:43:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820916
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Russia
    Victim Industry: Technology
    Victim Organization: Probio Technologies
    Victim Site: probiotechnologies.ru
  8. BABAYO EROR SYSTEM targets the website of domain1.webagency.my.id
    Category: Defacement
    Content: The group claims to have defaced the website of domain1.webagency.my.id
    Date: 2026-03-27T23:39:24Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/404
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Information Technology (IT) Services
    Victim Organization: domain1.webagency.my.id
    Victim Site: domain1.webagency.my.id
  9. Alleged unauthorized access to an unidentified industrial control system in Ukraine
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to industrial control systems associated with an industrial facility in Ukraine. The group alleges manipulation of control parameters for Cooling systems, Heating stations, ventilation systems, Stationary methane analyzers, Gas stations.
    Date: 2026-03-27T23:33:44Z
    Network: telegram
    Published URL: https://t.me/itarmyofrussianews/353
    Screenshots:
    None
    Threat Actors: IT ARMY OF RUSSIA
    Victim Country: Ukraine
    Victim Industry: Industrial Automation
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged Sale of Unauthorized Access to OXXO Systems
    Category: Initial Access
    Content: A threat actor claims to be selling unauthorized access to the Peru branch of OXXO. The Exposed data reportedly includes administrative documents and human resources files.
    Date: 2026-03-27T23:24:18Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-OXXO-PERU-ACCESS
    Screenshots:
    None
    Threat Actors: zsnark
    Victim Country: Peru
    Victim Industry: Retail Industry
    Victim Organization: oxxo
    Victim Site: oxxo.com
  11. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing 6,031 Hotmail account credentials through a file sharing platform. The data appears to be distributed for free rather than sold.
    Date: 2026-03-27T23:18:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70114/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  12. Alleged leak of Gmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 772,921 Gmail email and password combinations, claiming the credentials are from fresh leaks and specifically targeting Gmail users.
    Date: 2026-03-27T23:18:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70115/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  13. Alleged unauthorized Access to Abir Sport Ltd.
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Abir Sport Ltd. in Israel. The access includes 7 TB of data and Importing and marketing company for sports equipment, such as gym equipment information.
    Date: 2026-03-27T23:16:11Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/60
    Screenshots:
    None
    Threat Actors: Anonymous, For Justice
    Victim Country: Israel
    Victim Industry: Sports
    Victim Organization: abir sport ltd.
    Victim Site: abirsport.co.il
  14. Alleged data breach of APOIA.se
    Category: Data Breach
    Content: A threat actor claims to have leaked a database belonging to the Brazilian platform APOIA.se. The exposed data reportedly includes approximately 451,000 unique user records, consisting of sensitive personal information. which includes Email addresses,Full names,Physical/home addresses.
    Date: 2026-03-27T23:07:48Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-APOIA-se-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: Ash
    Victim Country: Brazil
    Victim Industry: Financial Services
    Victim Organization: apoia.se
    Victim Site: apoia.se
  15. Alleged leak of Hotmail and Outlook credentials
    Category: Combo List
    Content: Threat actor shared a combolist containing 2,480 email and password combinations for Hotmail and Outlook accounts as a free download on a cybercrime forum.
    Date: 2026-03-27T22:59:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70112/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  16. Alleged distribution of mixed email and password credentials combolist
    Category: Combo List
    Content: A threat actor named steeve75 distributed a combolist containing 110,000 email and password combinations described as fresh high quality credentials through a free download link on CrackingX forum.
    Date: 2026-03-27T22:29:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70110/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged forum post with unclear content
    Category: Data Breach
    Content: A forum post containing only repeated w characters with no clear threat information or data breach details provided.
    Date: 2026-03-27T22:28:52Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-www
    Screenshots:
    None
    Threat Actors: goxoj70632
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a file containing alleged Hotmail email credentials through a MediaFire download link. The post appears to be offering free access to a combolist targeting Hotmail accounts.
    Date: 2026-03-27T22:19:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70106/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  19. Alleged leak of Polish and mixed email credentials
    Category: Combo List
    Content: Threat actor Cl0ud0wner shared a combolist containing Polish and mixed email credentials via MediaFire download link on CrackingX forum.
    Date: 2026-03-27T22:19:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70107/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a file containing mixed email access credentials via a file sharing platform. The post provides a direct download link to the credential list without any payment requirement.
    Date: 2026-03-27T22:19:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70109/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged data breach of FBI Director Kash Patel by pro-Iranian group Handala
    Category: Data Breach
    Content: Pro-Iranian hacking group Handala claims to have compromised FBI Director Kash Patels personal account and leaked emails, photographs, resume, and other personal documents. The leaked materials include years-old photographs and documents, with some records appearing to be more than a decade old.
    Date: 2026-03-27T22:17:51Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Hacked-Kash-Patel-Emails-Handala
    Screenshots:
    None
    Threat Actors: cementine
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: FBI
    Victim Site: Unknown
  22. Alleged Sale of Unauthorized Access to Unidentified WordPress Shop in Israel
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized admin access to an unidentified WordPress-based shop in Israel.
    Date: 2026-03-27T22:04:40Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279339/
    Screenshots:
    None
    Threat Actors: cosmodrome
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged sale of email credentials and account access for multiple platforms
    Category: Initial Access
    Content: Threat actor is selling email account access including credentials and cookies for multiple platforms including Hotmail, Yahoo, Amazon, Facebook, eBay, and PayPal across various geographic regions.
    Date: 2026-03-27T21:56:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70105/
    Screenshots:
    None
    Threat Actors: Xviixi
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple
    Victim Site: hotmail.com
  24. .regnum claims to target Lithuania. Latvia and Estonia
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Lithuania. Latvia and Estonia.
    Date: 2026-03-27T21:55:38Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/417
    Screenshots:
    None
    Threat Actors: .regnum
    Victim Country: Lithuania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged Sale of Unauthorized Access to Unidentified Logistics Company in Argentina
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to an unidentified Logistics Company in Argentina
    Date: 2026-03-27T21:49:48Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279340/
    Screenshots:
    None
    Threat Actors: 1001010
    Victim Country: Argentina
    Victim Industry: Transportation & Logistics
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged distribution of AWS credential combolists
    Category: Combo List
    Content: Threat actor CODER is distributing AWS credential combolists through Telegram channels, offering free access to compromised credentials and related programs for credential stuffing attacks.
    Date: 2026-03-27T21:47:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70104/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Cloud Computing
    Victim Organization: Amazon Web Services
    Victim Site: aws.amazon.com
  27. Alleged contact information sharing on cybercrime forum
    Category: Data Leak
    Content: A forum post shares various contact details including Telegram handle, Discord username, Gmail address, and WhatsApp phone number, potentially for illicit communications or services.
    Date: 2026-03-27T21:41:00Z
    Network: openweb
    Published URL: https://xforums.st/threads/tele-terrellwhitte-discord-active24hrs-gmail-sosaboy959-gmail-com-whatsapp-1-425-531-1773.600299/
    Screenshots:
    None
    Threat Actors: steuerwiesel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged leak of mixed credential combolist from forums
    Category: Combo List
    Content: A threat actor is distributing a mixed credential combolist containing 81,000 valid entries allegedly sourced from various forums. The post appears to offer this data for free to registered forum members.
    Date: 2026-03-27T21:36:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70102/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. r0ckin targets the website of Federal Bureau of Investigation (FBI)
    Category: Defacement
    Content: The group claims to have defaced the website of Federal Bureau of Investigation (FBI).
    Date: 2026-03-27T21:33:05Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41650059
    Screenshots:
    None
    Threat Actors: r0ckin
    Victim Country: USA
    Victim Industry: Law Enforcement
    Victim Organization: federal bureau of investigation (fbi)
    Victim Site: fbi.gov
  30. Alleged data breach of Departmental Fire and Rescue Service of Héraul
    Category: Data Breach
    Content: The threat actor claims to have breached data of Departmental Fire and Rescue Service of Héraul.
    Date: 2026-03-27T21:12:19Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-sdis34-fr
    Screenshots:
    None
    Threat Actors: cockbin
    Victim Country: France
    Victim Industry: Government Administration
    Victim Organization: departmental fire and rescue service of héraul
    Victim Site: sdis34.fr
  31. Alleged sale of SilverBullet credential testing tool and configuration
    Category: Initial Access
    Content: Threat actor is selling SilverBullet 1.1.4 credential testing tool for 5€ in cryptocurrency, along with Microsoft configuration files for an additional 5€.
    Date: 2026-03-27T21:10:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70098/
    Screenshots:
    None
    Threat Actors: bsanana4
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged leak of educational institution credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 117,053 credential pairs allegedly targeting educational domains. The data is being distributed for free via a file sharing service.
    Date: 2026-03-27T21:10:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70099/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged sale of cryptocurrency drainer malware-as-a-service
    Category: Initial Access
    Content: Threat actor multichainsdk is selling a cryptocurrency drainer-as-a-service tool with source code for multiple blockchain networks including Ethereum, Solana, TON, TRON, XRP, and others. The malware package includes complete source code, smart contracts, admin dashboard, and Telegram bot configuration with pricing ranging from $1,500 to $15,000.
    Date: 2026-03-27T21:09:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70100/
    Screenshots:
    None
    Threat Actors: multichainsdk
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged leak of credential logs via DAISY CLOUD service
    Category: Combo List
    Content: Threat actor NEW_DAISYCLOUD shared 5,167 fresh credential logs dated March 27 via cloud storage platform, distributed through underground forum for free download.
    Date: 2026-03-27T21:00:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70095/
    Screenshots:
    None
    Threat Actors: NEW_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged distribution of gaming and adult site credential lists
    Category: Combo List
    Content: Threat actor distributing credential lists containing 7.1 million records allegedly from gaming and adult entertainment platforms through Telegram channels. The actor is offering free combolists and cracking tools to users who join their Telegram groups.
    Date: 2026-03-27T21:00:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70096/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Gaming and Adult Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged leak of crypto-banking credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.5 million credentials targeting crypto-banking platforms via a file sharing service. The credentials appear to be formatted as email:password combinations for potential credential stuffing attacks against cryptocurrency and banking services.
    Date: 2026-03-27T20:59:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70097/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Alleged data leak of Imdaad Group
    Category: Data Leak
    Content: The threat actor claims to have leaked 16.6 GB of data from the Imdaad Group.
    Date: 2026-03-27T20:55:49Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-16GB-IFS-IMDAAD-AE-DATABASE
    Screenshots:
    None
    Threat Actors: coderx
    Victim Country: UAE
    Victim Industry: Facilities Services
    Victim Organization: imdaad group
    Victim Site: ifs.imdaad.ae
  38. Alleged access to Agrodoska
    Category: Initial Access
    Content: The group claims to have gained access to Agrodoska.
    Date: 2026-03-27T20:42:34Z
    Network: telegram
    Published URL: https://t.me/QuietSecurity/18
    Screenshots:
    None
    Threat Actors: QuietSec
    Victim Country: Ukraine
    Victim Industry: Information Services
    Victim Organization: agrodoska
    Victim Site: agrodoska.net
  39. Website defacement of makemyestore.in by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL compromised and defaced the makemyestore.in e-commerce platform website on March 28, 2026. The attack targeted a specific blog page related to highways content on the Indian e-commerce service providers domain.
    Date: 2026-03-27T20:40:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820911
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: India
    Victim Industry: E-commerce
    Victim Organization: MakeMyEstore
    Victim Site: makemyestore.in
  40. Alleged data breach of Police Nationale
    Category: Data Breach
    Content: The threat actor claims to have breached the internal data of Police Nationale. The compromised data reportedly contains a full GraphQL introspection schema, including API query and mutation types, access levels, user roles, deploy keys, and infrastructure-related metadata such as projects, vulnerabilities, and internal documentation.
    Date: 2026-03-27T20:35:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Source-Code-FR-Police-Nationale-GitLab
    Screenshots:
    None
    Threat Actors: breach3d
    Victim Country: France
    Victim Industry: Government Administration
    Victim Organization: police nationale
    Victim Site: police-nationale.interieur.gouv.fr
  41. Alleged Sale of Monero (XMR) Seed Checker Tool with Auto-Withdraw Feature
    Category: Malware
    Content: The threat actor claims to be offering a Monero (XMR) seed checker tool capable of validating seed phrases, parsing wallet data, and enabling automatic withdrawal of funds, with support for multiple wallet types and GPU-based processing.
    Date: 2026-03-27T20:26:02Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279331/
    Screenshots:
    None
    Threat Actors: Darkeen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged data breach of Disdukcapil Kabupaten Musibanyuasin
    Category: Data Breach
    Content: The threat actor claims to have breached the Disdukcapil Kabupaten Musibanyuasin, Musi Banyuasin database. The compromised data reportedly contains sensitive personal information, including NIK, family card numbers (KK), names, dates of birth, gender, and other civil registry data.
    Date: 2026-03-27T20:17:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-LEAK-DUKCAPIL-DATABASE-DPT-KECAMATAN-BABAT-TOMAN
    Screenshots:
    None
    Threat Actors: ANONB2H
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: disdukcapil kabupaten musibanyuasin
    Victim Site: disdukcapil.mubakab.go.id
  43. Alleged distribution of SMTP credential combolists from multiple countries
    Category: Combo List
    Content: Threat actor CODER is distributing SMTP credential combolists containing 13 million records from multiple countries including France, Germany, Italy, India, Colombia, and Japan through Telegram channels.
    Date: 2026-03-27T19:56:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70094/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Website defacement of TPKHP by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: NUCLIER-Y-C-C-M defaced the TPKHP website on March 28, 2026, targeting a specific upload directory on the Nepalese domain.
    Date: 2026-03-27T19:49:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820910
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: TPKHP
    Victim Site: tpkhp.com.np
  45. Alleged Sale of Unauthorized Access to TITUS Network
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to the Titus.de network, including back-office systems and email accounts..
    Date: 2026-03-27T19:34:24Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279333/
    Screenshots:
    None
    Threat Actors: privisnanet
    Victim Country: Germany
    Victim Industry: Retail Industry
    Victim Organization: titus
    Victim Site: titus.de
  46. Alleged data breach of John Hay Management Corporation
    Category: Data Breach
    Content: The threat actor claims to have breached working database of John Hay Management Corporation. The compromised data reportedly contains 21.9GB of data, including 22,667 files, 10 databases, government IDs, passwords, and other confidential documents.
    Date: 2026-03-27T19:29:53Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-PHILIPPINES-John-Hay-Management-Corporation
    Screenshots:
    None
    Threat Actors: F37A
    Victim Country: Philippines
    Victim Industry: Government Administration
    Victim Organization: john hay management corporation
    Victim Site: jhmcorp.ph
  47. Alleged sale of an Android Remote Administration Tool
    Category: Malware
    Content: The threat actor claims to be selling an Android Remote Administration Tool (RAT) allegedly capable of full device compromise, including real-time screen control, keylogging via accessibility services, credential harvesting from banking and crypto apps, and deployment through obfuscated APK droppers.
    Date: 2026-03-27T19:27:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-RELEASE-Darkweb-The-Most-Powerful-Android-Remote-Administration-Tool
    Screenshots:
    None
    Threat Actors: PexRat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Alleged Sale of UK Software Leads Database
    Category: Data Leak
    Content: The threat actor claims to be selling a UK-based software leads database containing over 646,000 records, including names, emails, phone numbers, and mailing addresses, allegedly sourced from reseller marketing campaigns.
    Date: 2026-03-27T19:26:34Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279332/
    Screenshots:
    None
    Threat Actors: betway
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged Data Breach of HBX Group (Hotelbeds)
    Category: Data Breach
    Content: The threat actor claims to have leaked internal data from HBX Group, part of Hotelbeds, including booking records, payment card data, client profiles, and user credentials, allegedly impacting millions of records across multiple countries.
    Date: 2026-03-27T19:19:36Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279328/
    Screenshots:
    None
    Threat Actors: nikifffi
    Victim Country: Spain
    Victim Industry: Information Technology (IT) Services
    Victim Organization: hbx group
    Victim Site: hbxgroup.com
  50. Alleged data incident involving Xcaret
    Category: Data Breach
    Content: A forum post titled XCARET DATA suggests potential involvement of data related to Xcaret organization, though no specific details are available in the post content.
    Date: 2026-03-27T19:17:58Z
    Network: openweb
    Published URL: https://xforums.st/threads/xcaret-data.600282/
    Screenshots:
    None
    Threat Actors: foximiyos
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Xcaret
    Victim Site: Unknown
  51. Alleged leak of German mixed domain credentials
    Category: Combo List
    Content: A threat actor shared a free download link to a combolist containing 242,905 credential pairs allegedly from various German domains.
    Date: 2026-03-27T19:04:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70092/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Alleged distribution of corporate credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing an 11 million record corporate business credential combolist through Telegram channels. The actor operates multiple Telegram groups offering free credential lists and programs.
    Date: 2026-03-27T19:04:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70093/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Alleged data leak of DOr
    Category: Data Leak
    Content: The threat actor claims to be selling data from DOr. The compromised data reportedly contains 123,000 records, including names, email addresses, phone numbers, addresses, and transaction details.
    Date: 2026-03-27T19:03:17Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-FR-Database-OR
    Screenshots:
    None
    Threat Actors: rdm
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged distribution of French identity card generator tool
    Category: Data Leak
    Content: A threat actor shared a French identity card generator tool as an executable file, advising users to run it only on virtual machines or remote desktop connections for security purposes.
    Date: 2026-03-27T19:01:34Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-LEAK-French-identity-card-generator
    Screenshots:
    None
    Threat Actors: csgqegge
    Victim Country: France
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged sale of unauthorized access to Claro Colombia
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorized access to Claro Cloud’s website management system, allegedly compromising more than 30 user sites.
    Date: 2026-03-27T18:58:26Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Access-to-Claro-Cloud-user-sites-more-than-30-sites
    Screenshots:
    None
    Threat Actors: Worrysec
    Victim Country: Mexico
    Victim Industry: Information Technology (IT) Services
    Victim Organization: claro colombia
    Victim Site: claro.com
  56. Alleged sale of an unidentified Serbian hotel database
    Category: Data Leak
    Content: The threat actor claims to be selling an unidentified Serbian hotel database containing over 23,000 users, allegedly including personal details such as names, dates of birth, addresses, identification numbers, and hotel check-in and check-out records.
    Date: 2026-03-27T18:56:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-RS-Selling-Serbia-Hotel-Database
    Screenshots:
    None
    Threat Actors: RatkoMladic
    Victim Country: Serbia
    Victim Industry: Leisure & Travel
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged data sale of GNP National Project Group
    Category: Data Breach
    Content: The threat actor claims to be selling 1 GB of data from the GNP National Project Group, allegedly containing customer records with personal details such as names, surnames, ID numbers, cities, email addresses, phone numbers, and more.
    Date: 2026-03-27T18:53:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-GNP-BPO-Call-Center-Claro-Colombia
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Network & Telecommunications
    Victim Organization: gnp national project group
    Victim Site: gnpsa.com
  58. Alleged leak of T-Online credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 25,664 credential pairs targeting T-Online email service users. The data was shared for free download via a file hosting service.
    Date: 2026-03-27T18:51:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70091/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Germany
    Victim Industry: Telecommunications
    Victim Organization: T-Online
    Victim Site: t-online.de
  59. Alleged leak of USA credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 36,000 credentials allegedly from USA-based users on a cybercrime forum.
    Date: 2026-03-27T18:38:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70090/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged data breach of CIM GmbH
    Category: Data Breach
    Content: The threat actor claims to have breached data from CIM GmbH and intends to publish it within 1-2 days.
    Date: 2026-03-27T18:36:08Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/5682629549/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: Germany
    Victim Industry: Software Development
    Victim Organization: cim gmbh
    Victim Site: cim-logistics.com
  61. Alleged data sale of Confluence Group Insurance brokers
    Category: Data Breach
    Content: The threat actor claims to be selling over 300,000 policy records from Confluence Group Insurance Brokers, allegedly containing client ID, full name, date of birth, age, gender, postal code, address and more.
    Date: 2026-03-27T18:35:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SPAIN-Confluencegroup-es-INSURANCE-300K
    Screenshots:
    None
    Threat Actors: Jenk
    Victim Country: Spain
    Victim Industry: Insurance
    Victim Organization: confluence group insurance brokers
    Victim Site: confluencegroup.es
  62. Alleged leak of 33,000 credential combinations
    Category: Combo List
    Content: A threat actor shared a combolist containing 33,000 high-quality credential combinations on a cybercriminal forum. The credentials appear to be made available for free download to registered forum users.
    Date: 2026-03-27T18:27:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70088/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Alleged leak of mixed international credential data
    Category: Combo List
    Content: A threat actor shared a combolist containing 31,000 credentials allegedly from users across USA, EU, Asia, and Russia. The data is described as valid and fresh, dated March 27th, and is being distributed via a file sharing service.
    Date: 2026-03-27T18:26:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70089/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Alleged data sale of Mutuacat
    Category: Data Breach
    Content: The threat actor claims to be selling 6,000 records from Mutuacat, allegedly containing IDs, names, phone numbers, email addresses, and more.
    Date: 2026-03-27T18:22:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SPAIN-Mutuacat-cat-INSURANCE-FULL-DB
    Screenshots:
    None
    Threat Actors: Jenk
    Victim Country: Spain
    Victim Industry: Hospital & Health Care
    Victim Organization: mutuacat
    Victim Site: mutuacat.cat
  65. Alleged distribution of credential combolist containing 836,000 records
    Category: Combo List
    Content: Threat actor CODER advertises a private combolist containing 836,000 credential records, offering free access through Telegram channels along with related cracking tools and programs.
    Date: 2026-03-27T18:04:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70087/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. European Commission Suffers Data Breach After Amazon Cloud Account Hack
    Category: Data Breach
    Content: The European Commission’s Amazon Web Services (AWS) environment and stolen over 350 GB of data, including multiple databases and internal employee information. The attacker allegedly gained access to email systems and internal data and stated they plan to leak the data publicly at a later date, while the European Commission is currently investigating the security incident.
    Date: 2026-03-27T18:00:11Z
    Network: openweb
    Published URL: https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-account-hack/
    Screenshots:
    None
    Threat Actors:
    Victim Country: Unknown
    Victim Industry: Government Administration
    Victim Organization: european commission
    Victim Site: ec.europa.eu
  67. Website defacement of Akarat Masr by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL conducted a website defacement attack against akarat-masr.com on March 28, 2026. The incident targeted a specific page rather than the main site and was documented with a mirror archived on zone-xsec.com.
    Date: 2026-03-27T17:56:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820903
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Egypt
    Victim Industry: Unknown
    Victim Organization: Akarat Masr
    Victim Site: akarat-masr.com
  68. Website defacement of jdihkuburaya.web.id by Yanagami_X12/Clan_X12
    Category: Defacement
    Content: Clan_X12 member Yanagami_X12 successfully defaced the JDIH Kubu Raya government website on March 28, 2026. This was a targeted home page defacement of an Indonesian local government legal information system.
    Date: 2026-03-27T17:56:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820904
    Screenshots:
    None
    Threat Actors: Yanagami_X12, Clan_X12
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: JDIH Kubu Raya
    Victim Site: jdihkuburaya.web.id
  69. Alleged Sale of BreachForums Database
    Category: Data Breach
    Content: The group claims to be selling a full backup of BreachForums which include backend systems, source code, DDoS-Guard-related components, and a dataset allegedly containing information on 346,014 members.
    Date: 2026-03-27T17:50:15Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/457
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Other Industry
    Victim Organization: breachforums
    Victim Site: breachforums.sb
  70. Alleged leak of email credential combolist via PandaCloud
    Category: Combo List
    Content: A threat actor shared a free download link to a credential combolist containing 36,000 email addresses and passwords, marketed as fresh and valid data from various email providers.
    Date: 2026-03-27T17:50:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70084/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged data breach of Sheraton Hotels and Resorts
    Category: Data Breach
    Content: The threat actor claims to have breached data from Sheraton Hotels and Resorts.
    Date: 2026-03-27T17:43:11Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/0433968074/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: USA
    Victim Industry: Hospitality & Tourism
    Victim Organization: sheraton hotels and resorts
    Victim Site: sheraton.marriott.com
  72. Website defacement of PS College by overthrash1337 (Team Hazardous Pakistan)
    Category: Defacement
    Content: Team Hazardous Pakistan member overthrash1337 defaced the uploads directory of PS Colleges website on March 28, 2026. The attack targeted an Indian educational institutions web infrastructure.
    Date: 2026-03-27T17:38:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820901
    Screenshots:
    None
    Threat Actors: overthrash1337, Team Hazardous Pakistan
    Victim Country: India
    Victim Industry: Education
    Victim Organization: PS College
    Victim Site: www.pscollege.co.in
  73. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 5,200 mixed email credentials via a MediaFire download link on a cybercriminal forum.
    Date: 2026-03-27T17:34:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70081/
    Screenshots:
    None
    Threat Actors: Kommander0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Alleged leak of mixed email provider credentials
    Category: Combo List
    Content: Threat actor alphaxdd distributed a combolist containing 3,622 mixed email credentials including Hotmail accounts via free download on cybercriminal forum.
    Date: 2026-03-27T17:34:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70082/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Alleged sale of Miaoda data
    Category: Data Breach
    Content: The threat actor claims to be selling the data belonging to Miaoda.
    Date: 2026-03-27T17:18:48Z
    Network: telegram
    Published URL: https://t.me/darkromancepub/11
    Screenshots:
    None
    Threat Actors: Dark Romance
    Victim Country: China
    Victim Industry: Software Development
    Victim Organization: miaoda
    Victim Site: miaoda.cn
  76. Alleged sale of French database containing 123,000 records
    Category: Data Breach
    Content: Threat actor rdm is allegedly selling a French database containing 123,000 records for $10,000 on BreachForums. The actor provided proof screenshots and Session contact information for potential buyers.
    Date: 2026-03-27T17:18:14Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-FR-Database-OR
    Screenshots:
    None
    Threat Actors: rdm
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  77. Website defacement of Autopolis car rental service by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced a car rental website belonging to Autopolis in Slovakia on March 28, 2026. The attack targeted a specific page within the autopozicovna (car rental) section of the site.
    Date: 2026-03-27T17:10:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820897
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Slovakia
    Victim Industry: Transportation/Automotive
    Victim Organization: Autopolis
    Victim Site: autopolis.sk
  78. Unlimited2 targets the website of Sightline Design Boutique Studio
    Category: Defacement
    Content: The group claims to have defaced the website of Sightline Design Boutique Studio.
    Date: 2026-03-27T17:08:14Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41650009
    Screenshots:
    None
    Threat Actors: Unlimited2
    Victim Country: UAE
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: sightline design boutique studio
    Victim Site: sightline.ae
  79. Nullsec Philippines claims to target Bahrain
    Category: Alert
    Content: A recent post by the group claims that they are targeting Bahrain.
    Date: 2026-03-27T16:52:34Z
    Network: telegram
    Published URL: https://t.me/nullsechackers/874
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Bahrain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged leak of Yahoo credential combolist targeting crypto users
    Category: Combo List
    Content: A threat actor shared a combolist containing 1.56 million Yahoo email and password combinations specifically targeting cryptocurrency users. The credential list was made available for free download via a file sharing service.
    Date: 2026-03-27T16:40:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70079/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  81. Alleged unauthorized access to Claro Cloud hosting platform
    Category: Initial Access
    Content: Threat actor claims to have gained unauthorized access to Claro Cloud hosting platform, affecting more than 30 client websites. The actor criticizes the platforms security and mentions ability to upload malicious code to hosted sites.
    Date: 2026-03-27T16:38:46Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Access-to-Claro-Cloud-user-sites-more-than-30-sites
    Screenshots:
    None
    Threat Actors: Worrysec
    Victim Country: Unknown
    Victim Industry: Web Hosting
    Victim Organization: Claro Cloud
    Victim Site: Unknown
  82. Alleged data leak of Ledger Global e-payment CRM
    Category: Data Leak
    Content: Forum post claims to have leaked CRM data from Ledger Global, an e-payment service provider, though no specific details about the data or breach are provided in the available content.
    Date: 2026-03-27T16:32:53Z
    Network: openweb
    Published URL: https://xforums.st/threads/ledger-global-e-payment-crm-leaks.600272/
    Screenshots:
    None
    Threat Actors: timturner
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Ledger Global
    Victim Site: Unknown
  83. Alleged sale of email credential checking and data extraction tool
    Category: Initial Access
    Content: Threat actor CyberPaladin is selling an email checker and mail grabber tool for $25-120 that can validate credential lists, download email attachments, and extract cryptocurrency wallet information from Hotmail and mixed email databases. The tool includes functionality to parse crypto wallets from downloaded attachments and emails.
    Date: 2026-03-27T16:27:26Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-Email-Checker-Mail-Grabber-Attachment-Download-Parser-Crypto-Download-email
    Screenshots:
    None
    Threat Actors: CyberPaladin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Website defacement of Siineo by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL conducted a website defacement attack against siineo.com.np on March 27, 2026. The attack targeted a specific blog page rather than the main homepage.
    Date: 2026-03-27T16:24:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820896
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: Siineo
    Victim Site: siineo.com.np
  85. Omax Autos Reports Ransomware Attack — IT Systems Under Investigation After Cyber Breach
    Category: Cyber Attack
    Content: Omax Autos Limited confirmed on March 27, 2026 that it suffered a ransomware attack on its IT infrastructure, following the detection of suspicious anomalies the previous day. While the company reported the incident to the Bombay and Delhi stock exchanges, it specified that its core operations and production chains remain currently intact. Investors reacted with volatility to the news, oscillating between confidence in the security of critical systems and concerns related to a potential leak of sensitive data.
    Date: 2026-03-27T16:23:58Z
    Network: openweb
    Published URL: https://tradebrains.in/omax-autos-reports-ransomware-attack-it-systems-under-investigation-after-cyber-breach/
    Screenshots:
    None
    Threat Actors: Lockbit5
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Omax Autos Limited
    Victim Site: omaxauto.com
  86. Alleged data breach of Leighton
    Category: Data Breach
    Content: The threat actor claims to have breached data from Leighton.
    Date: 2026-03-27T16:23:25Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/1504221778/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: UK
    Victim Industry: Information Services
    Victim Organization: leighton
    Victim Site: leighton.com
  87. Alleged data leak of an Armenian Estate Agency
    Category: Data Leak
    Content: The threat actor claims to have leaked a database belonging to an Armenian Estate Agency.
    Date: 2026-03-27T16:15:23Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-Armenian-Estate-Agency-5K
    Screenshots:
    None
    Threat Actors: zsnark
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. Alleged data leak of Brazil contact database
    Category: Data Leak
    Content: A threat actor named Manha posted on BreachForums claiming to have a full contact database of Brazilian people available. The post directs users to contact via Telegram for ordering and samples.
    Date: 2026-03-27T16:14:29Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Brazil-People-full-contact-DB-Available
    Screenshots:
    None
    Threat Actors: Manha
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Handala Hack claims to target Retail Chains in USA
    Category: Alert
    Content: In a recent post the group claims to target point-of-sale systems across multiple retail chains in the United States
    Date: 2026-03-27T16:13:24Z
    Network: telegram
    Published URL: https://t.me/HANDALA_INTEL/17
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged Sale of Admin Access to unidentified Retail from UAE
    Category: Initial Access
    Content: Threat actor claims to be selling Admin Access to unidentified Retail from UAE.
    Date: 2026-03-27T16:13:17Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279324/
    Screenshots:
    None
    Threat Actors: Big-Bro
    Victim Country: UAE
    Victim Industry: Retail Industry
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Alleged leak of admin access to JDIH Legal Department of the West Halmahera Regency Government
    Category: Initial Access
    Content: The threat actor claims to have leaked admin-level access to the JDIH Legal Department of the West Halmahera Regency Government’s administration system.
    Date: 2026-03-27T16:09:32Z
    Network: telegram
    Published URL: https://t.me/silenterrorsystem/226
    Screenshots:
    None
    Threat Actors: SILENT ERROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: jdih legal department of the west halmahera regency government
    Victim Site: jdih.halbarkab.go.id
  92. Alleged sale of French government database by threat actor resana1
    Category: Data Breach
    Content: Threat actor resana1 is allegedly selling a French government database containing 1 million records with personal information including emails, names, phone numbers, and organizations for 3,000€. The actor claims the database was valued by the state at 70,000€ and has never been sold before.
    Date: 2026-03-27T16:03:05Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-RESANA-DATABASE-FR
    Screenshots:
    None
    Threat Actors: resana1
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Government
    Victim Site: gouv.fr
  93. Alleged data leak of Egyptian Shooting Federation
    Category: Data Leak
    Content: The threat actor claims to have leaked internal files from the Egyptian Shooting Federation.
    Date: 2026-03-27T16:02:18Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Free-Internal-file-of-Egyptian-Shooting-Federation
    Screenshots:
    None
    Threat Actors: zsnark
    Victim Country: Egypt
    Victim Industry: Government Relations
    Victim Organization: egyptian shooting federation
    Victim Site: egyptianshooting.org
  94. Alleged data breach of ORIENT PETROLEUM INC.
    Category: Data Breach
    Content: The threat actor claims to have breached data from ORIENT PETROLEUM INC. and intends to publish it within 1-2 days.
    Date: 2026-03-27T16:00:48Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/8250496889/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: Pakistan
    Victim Industry: Oil & Gas
    Victim Organization: orient petroleum inc.
    Victim Site: orientpetroleum.com
  95. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 6.3K mixed email credentials via a file sharing platform. The credentials appear to be from various email providers and were distributed for free download.
    Date: 2026-03-27T15:53:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70076/
    Screenshots:
    None
    Threat Actors: Kommander0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Alleged leak of 250GB credential collection
    Category: Combo List
    Content: A threat actor has made available a 250GB collection of URL-LOG-PASS credentials in text format, described as private and ultra high quality. The data appears to contain login credentials associated with various URLs.
    Date: 2026-03-27T15:52:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70077/
    Screenshots:
    None
    Threat Actors: TheBash1996
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor noir allegedly leaked a collection of valid Hotmail credentials described as UHQ Mix containing email and password combinations. The credentials are being distributed through Telegram channel @noiraccess.
    Date: 2026-03-27T15:52:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70078/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  98. Alleged source code leak of multiple UAE websites
    Category: Data Leak
    Content: The threat actor claims to have leaked source code belonging to several UAE-based platforms. The actor lists dozens of PHP-based repositories, covering backend systems, mobile app components, internal management tools, and various client-specific projects.
    Date: 2026-03-27T15:51:50Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Source-Code-Multiple-UAE-Websites-Source-code-leak
    Screenshots:
    None
    Threat Actors: hexvior
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged leak of Chinese-American WhatsApp data
    Category: Data Leak
    Content: Forum post claims to have WhatsApp data of Chinese people living in the United States. The threat actor provides a Telegram contact for accessing the data sample.
    Date: 2026-03-27T15:50:03Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Chinese-people-living-in-the-United-States-WhatsApp-Data
    Screenshots:
    None
    Threat Actors: Razia
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: WhatsApp
    Victim Site: whatsapp.com
  100. Alleged data leak of China loan data
    Category: Data Leak
    Content: Threat actor Mizan allegedly shared China loan data containing 2 million records through a Telegram channel. The data appears to be financial records related to loan information from China.
    Date: 2026-03-27T15:49:59Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-In-real-time-China-Loan-Data-2M
    Screenshots:
    None
    Threat Actors: Mizan
    Victim Country: China
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a list of 55,000 German email credentials dated March 27th on a cybercrime forum. The credentials are described as fresh mail access and appear to be freely distributed to registered forum users.
    Date: 2026-03-27T15:39:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70074/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Alleged vulnerability leak of Rangamati Government College
    Category: Vulnerability
    Content: Group claims to have leaked a vulnerability in Rangamati Government College.
    Date: 2026-03-27T15:37:32Z
    Network: telegram
    Published URL: https://t.me/c/3807888281/274
    Screenshots:
    None
    Threat Actors: KONCO ERROR SYSTEM
    Victim Country: Bangladesh
    Victim Industry: Education
    Victim Organization: rangamati government college
    Victim Site: rangamaticollege.gov.bd
  103. Alleged vulnerability leak of Berita Surabaya
    Category: Vulnerability
    Content: Group claims to have leaked a vulnerability in Berita Surabaya.
    Date: 2026-03-27T15:37:09Z
    Network: telegram
    Published URL: https://t.me/c/3807888281/273
    Screenshots:
    None
    Threat Actors: KONCO ERROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Newspapers & Journalism
    Victim Organization: berita surabaya
    Victim Site: beritasurabaya.net/galery_detail2.php
  104. Alleged data breach of kolosok.info
    Category: Data Breach
    Content: The threat group claims to have breached data from kolosok.info. The compromised data contains logs, name, phone numbers etc.
    Date: 2026-03-27T15:30:42Z
    Network: telegram
    Published URL: https://t.me/QuietSecurity/14
    Screenshots:
    None
    Threat Actors: QuietSec
    Victim Country: Ukraine
    Victim Industry: Agriculture & Farming
    Victim Organization: kolosok.info
    Victim Site: kolosok.info
  105. Mass defacement of Border Computers by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement attack targeting Border Computers, an Australian IT services company. The attack occurred on March 27, 2026, and was part of a broader mass defacement campaign rather than a targeted single-site attack.
    Date: 2026-03-27T15:28:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248155
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Technology/IT Services
    Victim Organization: Border Computers
    Victim Site: bordercomputers.com.au
  106. Mass defacement campaign by Alpha wolf team member XYZ targeting transport-talk.com
    Category: Defacement
    Content: The Alpha wolf team, specifically member XYZ, conducted a mass defacement campaign targeting transport-talk.com on March 27, 2026. The attack was part of a broader mass defacement operation rather than targeting this specific site individually.
    Date: 2026-03-27T15:28:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248154
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Transportation
    Victim Organization: Unknown
    Victim Site: transport-talk.com
  107. Website defacement of AWPL by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the AWPL website on March 27, 2026. This was a targeted home page defacement rather than a mass defacement campaign.
    Date: 2026-03-27T15:27:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820892
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: AWPL
    Victim Site: awpl.org.au
  108. Website defacement of AWPL by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the AWPL website on March 27, 2026. The targeted server was running on Linux operating system.
    Date: 2026-03-27T15:27:01Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248152
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: AWPL
    Victim Site: awpl.org.au
  109. Alleged leak of IPTV streaming credentials
    Category: Combo List
    Content: Threat actor shared a list of 32 M3U links for IPTV streaming services, making unauthorized access to television content available for free download.
    Date: 2026-03-27T15:26:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70072/
    Screenshots:
    None
    Threat Actors: ouaaka_06
    Victim Country: Unknown
    Victim Industry: Media and Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Mass defacement campaign by Alpha wolf team targeting Australian commercial sites
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting multiple websites including tripletwenty.com.au on March 27, 2026. The attack was executed by attacker XYZ against a Linux-based server hosting the Australian commercial website.
    Date: 2026-03-27T15:26:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248153
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Triple Twenty
    Victim Site: tripletwenty.com.au
  111. ⚜️ UPGRADES.CX ⚜️ ADOBE ⚡️ YOUTUBE ⚡️ SPOTIFY ⚡️ DISCORD ⚡️ Сanvа [PERSONAL UPGRADES]
    Category: Alert
    Content: New thread posted by bl4cklak3: ⚜️ UPGRADES.CX ⚜️ ADOBE ⚡️ YOUTUBE ⚡️ SPOTIFY ⚡️ DISCORD ⚡️ Сanvа [PERSONAL UPGRADES]
    Date: 2026-03-27T15:26:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70073/
    Screenshots:
    None
    Threat Actors: bl4cklak3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged data breach of zerno.kiev.ua
    Category: Data Breach
    Content: The threat group claims to have breached data from zerno.kiev.ua. The compromised data contains logs, name, phone numbers etc.
    Date: 2026-03-27T15:26:26Z
    Network: telegram
    Published URL: https://t.me/QuietSecurity/14
    Screenshots:
    None
    Threat Actors: QuietSec
    Victim Country: Ukraine
    Victim Industry: Agriculture & Farming
    Victim Organization: zerno.kiev.ua
    Victim Site: zerno.kiev.ua
  113. XYZ defaced transport-talk.com
    Category: Defacement
    Content: Target: http://transport-talk.com/Attacker: XYZTeam: Alpha wolfDate: 2026-03-27 22:24:19OS: LinuxFlags: Mass Defacement (IP: 103.226.223.2)
    Date: 2026-03-27T15:26:22Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248154
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: transport-talk.com
  114. XYZ defaced bordercomputers.com.au
    Category: Defacement
    Content: Target: http://bordercomputers.com.au/Attacker: XYZTeam: Alpha wolfDate: 2026-03-27 22:24:21OS: LinuxFlags: Mass Defacement (IP: 103.226.223.2)
    Date: 2026-03-27T15:26:06Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248155
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bordercomputers.com.au
  115. Alleged distribution of credential combolists via Telegram channels
    Category: Combo List
    Content: Threat actor CODER is distributing free credential combolists through Telegram channels and offering additional combo access via direct contact. The actor operates multiple Telegram groups providing free credential lists and associated programs.
    Date: 2026-03-27T14:54:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70071/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged credential validation service targeting LinkedIn accounts
    Category: Combo List
    Content: Threat actor offers a credential validation service that checks email:password combinations against LinkedIn accounts using IMAP verification and specialized software. The service processes credentials for multiple countries and offers payment of $1-$21 per valid result based on account quality.
    Date: 2026-03-27T14:41:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70070/
    Screenshots:
    None
    Threat Actors: best_linkedin
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: LinkedIn
    Victim Site: linkedin.com
  117. Alleged WordPress-related data leak by threat actor zod
    Category: Combo List
    Content: Threat actor zod posted WordPress-related content on CX forum in the combolists and dumps section, with access requiring password obtained via Telegram channel. Specific data type and scope unknown due to restricted access.
    Date: 2026-03-27T14:31:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70067/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 980,539 Yahoo credentials allegedly from fresh leaks. The credential list was made available for free download via a file hosting service.
    Date: 2026-03-27T14:30:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70068/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  119. ♋ 81k MIX Base With Valid [FORUMS] ♋ (10)
    Category: Combo List
    Content: New thread posted by ValidMail: ♋ 81k MIX Base With Valid [FORUMS] ♋ (10)
    Date: 2026-03-27T14:20:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70064/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  120. Alleged data breach of Mondial Relay involving 6.9 million French user records
    Category: Data Breach
    Content: Threat actor lynxd claims to be selling a database containing 6.9 million French user records allegedly from Mondial Relay, a parcel delivery service company.
    Date: 2026-03-27T14:17:54Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-MONDIAL-RELAY-6-9M-USER-FR
    Screenshots:
    None
    Threat Actors: lynxd
    Victim Country: France
    Victim Industry: Logistics
    Victim Organization: Mondial Relay
    Victim Site: Unknown
  121. Alleged data breach of French government RESANA database
    Category: Data Breach
    Content: Threat actor claims to have scraped a database from the French government containing 1 million records with personal information including names, email addresses, phone numbers, and organizational data. Sample records show government employee data from various French departments and agencies.
    Date: 2026-03-27T14:17:35Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-DATABASE-FRANCE-RESANA
    Screenshots:
    None
    Threat Actors: Resana
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Government (RESANA)
    Victim Site: Unknown
  122. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A forum post claims to share a combolist containing 5,000 unique Hotmail email and password combinations dated March 27, 2026. The actual content requires forum registration to view.
    Date: 2026-03-27T14:06:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70060/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  123. ⭐️ [ 2000 HOTMAIL ] FRESH UQH | GOODTIME CLOUD⭐️
    Category: Combo List
    Content: New thread posted by Lexser: ⭐️ [ 2000 HOTMAIL ] FRESH UQH | GOODTIME CLOUD⭐️
    Date: 2026-03-27T14:06:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70061/
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged data breach of Sterling Bank Ltd
    Category: Data Breach
    Content: The threat actor claims to have breached Sterling Bank Ltd, alleging access to data for ~900,000 customers and over 3,000 employees, including IDs, BVN, NUBAN, financial histories, and credit scores. They also claim compromise of a related Cardinal Stone database and sensitive executive information.
    Date: 2026-03-27T14:06:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-NG-Sterling-Bank-Ltd
    Screenshots:
    None
    Threat Actors: ByteToBreach
    Victim Country: Nigeria
    Victim Industry: Financial Services
    Victim Organization: sterling bank ltd
    Victim Site: sterling.ng
  125. Alleged leak of ULP credential combolist containing 250+ million records
    Category: Combo List
    Content: A threat actor claims to have leaked a ULP (Username:Login:Password) combolist containing over 250 million credential records. The data is being distributed through a Telegram channel.
    Date: 2026-03-27T14:05:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70062/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  126. 1.5K HOTMAIL Fresh Just Valid Mail Access 27.03
    Category: Combo List
    Content: New thread posted by MailAccesss: 1.5K HOTMAIL Fresh Just Valid Mail Access 27.03
    Date: 2026-03-27T14:04:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70063/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  127. Website defacement of Ananthi Tech Edu by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL successfully defaced the contact page of Ananthi Tech Edus website on March 27, 2026. The attack targeted an educational institutions web presence, compromising their contact information page.
    Date: 2026-03-27T13:49:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820890
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Ananthi Tech Edu
    Victim Site: ananthitechedu.com
  128. Alleged Sale of Certera EV Certificate
    Category: Malware
    Content: Threat actor claims to be selling a Certera EV certificate, advertised to bypass/disable Microsoft SmartScreen. The certificate is claimed to be valid for 1 year and supports remote code signing via a provided tool.
    Date: 2026-03-27T13:43:49Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279318/
    Screenshots:
    None
    Threat Actors: blueprint
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Website defacement of Ikshana Therapy by K3bay4 Mer4h (Idiot Crew)
    Category: Defacement
    Content: The Idiot Crew member K3bay4 Mer4h defaced the Ikshana Therapy website on March 27, 2026. This appears to be a redefacement of a previously compromised site targeting a healthcare therapy provider.
    Date: 2026-03-27T13:32:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820889
    Screenshots:
    None
    Threat Actors: K3bay4 Mer4h, Idiot Crew
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Ikshana Therapy
    Victim Site: www.ikshanatherapy.com
  130. Alleged Sale of Webshell access in USA
    Category: Initial Access
    Content: Threat actor claims to be selling Webshell access at shop from USA.
    Date: 2026-03-27T13:29:12Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279317/
    Screenshots:
    None
    Threat Actors: Jurak
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Threat actor TeraCloud1 allegedly leaked a combolist containing 10,000 valid email credentials on CrackingX forum. Additional private cloud access is offered through Telegram contact.
    Date: 2026-03-27T13:16:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70058/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  132. Alleged leak of mixed domain credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 12,000 valid credentials from mixed domains through a paste sharing service. The credentials appear to be distributed for free rather than sold.
    Date: 2026-03-27T13:05:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70056/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Alleged data breach of Sterling Bank Ltd
    Category: Data Breach
    Content: A threat actor allegedly claims to have obtained data from Sterling Bank Ltd, a Nigerian financial institution, though specific details about the nature and extent of the data are not provided in the available post content.
    Date: 2026-03-27T13:02:38Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-NG-Sterling-Bank-Ltd
    Screenshots:
    None
    Threat Actors: bytetobreach
    Victim Country: Nigeria
    Victim Industry: Financial Services
    Victim Organization: Sterling Bank Ltd
    Victim Site: Unknown
  134. Alleged data breach of Sterling Bank Ltd
    Category: Data Breach
    Content: A threat actor posted about Sterling Bank Ltd on a data breach forum, though specific details about the nature of the data or incident are not provided in the available content.
    Date: 2026-03-27T13:02:27Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-NG-Sterling-Bank-Ltd
    Screenshots:
    None
    Threat Actors: bytetobreach
    Victim Country: Nigeria
    Victim Industry: Financial Services
    Victim Organization: Sterling Bank Ltd
    Victim Site: Unknown
  135. Alleged Sale of Unauthorized Access in USA
    Category: Initial Access
    Content: Threat actor claims to be selling Unauthorized Access in USA
    Date: 2026-03-27T12:49:03Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279314/
    Screenshots:
    None
    Threat Actors: jamalunga
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  136. Website defacement of HRDC Nepal by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL conducted a website defacement attack against HRDC Nepals website on March 27, 2026. The attack targeted a specific page within the organizations success stories section.
    Date: 2026-03-27T12:47:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820888
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Human Resources Development
    Victim Organization: HRDC Nepal
    Victim Site: www.hrdcnepal.org
  137. Alleged Leak of Unidentified User Data in Nigeria
    Category: Data Leak
    Content: Threat actor claims to be selling a database of Nigerian user data. According to the listing, the dataset contains approximately 200,000 unique users and includes sensitive information such as names, phone numbers, dates of birth, BVN (Bank Verification Number), and account details.
    Date: 2026-03-27T12:30:57Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279298/
    Screenshots:
    None
    Threat Actors: Datavortex
    Victim Country: Nigeria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Alleged Data Breach of Bienestar
    Category: Data Breach
    Content: Threat actor claims to be selling a database of Mexican users, containing approximately 318,000 records. The dataset is allegedly sourced from bienestar.org and includes personal information such as first name, last name, phone number, email address, and date of birth.
    Date: 2026-03-27T12:29:37Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279302/
    Screenshots:
    None
    Threat Actors: Datavortex
    Victim Country: Mexico
    Victim Industry: Mental Health Care
    Victim Organization: bienestar
    Victim Site: bienestar.org
  139. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 713,738 credential pairs allegedly targeting Hotmail accounts, distributed as a free download via file sharing platform.
    Date: 2026-03-27T12:27:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70052/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  140. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: D4rkNetHub shared a combolist containing 49,796 mixed credentials on CrackingX forum with an expiration date of March 2026.
    Date: 2026-03-27T12:27:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70053/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  141. Alleged leak of 700GB credential combolist
    Category: Combo List
    Content: A threat actor is distributing a 700GB collection of URL-login-password credentials described as private and ultra-high quality. The data is being made available as a free download in text format.
    Date: 2026-03-27T12:26:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70054/
    Screenshots:
    None
    Threat Actors: TheBash1996
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Alleged data breach of Deminima
    Category: Data Breach
    Content: Threat actor claims to have leaked data from Deminima. The compromised data reportedly include 6.6K records of data, including name, phone number, address, emails, etc.
    Date: 2026-03-27T12:25:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-RS-Serbia-Gynecology-Clinic-Database–71403
    Screenshots:
    None
    Threat Actors: RatkoMladic
    Victim Country: Serbia
    Victim Industry: Hospital & Health Care
    Victim Organization: deminima
    Victim Site: deminima.com
  143. Alleged Leak of User Data in Brazil
    Category: Data Leak
    Content: Threat actor claims to be selling a database of Brazilian user data, containing approximately 198,000 email and password combinations.
    Date: 2026-03-27T12:21:03Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279300/
    Screenshots:
    None
    Threat Actors: Datavortex
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Alleged leak of Xbox and PSN credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 11,312 lines targeting Xbox and PlayStation Network accounts. The data is distributed via Telegram with password protection.
    Date: 2026-03-27T12:15:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70050/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Xbox and PlayStation Network
    Victim Site: Unknown
  145. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 10,530 Hotmail credentials for free download on a cybercriminal forum.
    Date: 2026-03-27T12:15:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70051/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  146. Alleged leak of data from TN State Scholarship Portal
    Category: Data Breach
    Content: Threat actor claims to have leaked data from TN State Scholarship Portal. The compromised data reportedly contain 13 million records of data including name, aadhar number, phone number, address, email, password and more.
    Date: 2026-03-27T12:10:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-India-13kk-Tamil-Nadu-Intergrated-State-Scholarship-Portal
    Screenshots:
    None
    Threat Actors: Sorb
    Victim Country: India
    Victim Industry: Government Administration
    Victim Organization: tn state scholarship portal
    Victim Site: umisfees.tnega.org
  147. Alleged data breach of Kuwaiti Ministry of Higher Education
    Category: Data Breach
    Content: Threat actor a313ip claims to have data from Kuwaits Ministry of Higher Education containing information on Kuwaiti citizens and is offering it for sale on BreachForums.
    Date: 2026-03-27T12:03:11Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-Kuwaiti-Ministry-of-Higher-Education-data-for-sale
    Screenshots:
    None
    Threat Actors: a313ip
    Victim Country: Kuwait
    Victim Industry: Government
    Victim Organization: Ministry of Higher Education
    Victim Site: Unknown
  148. Alleged Data Leak of Multiple websites
    Category: Data Leak
    Content: Threat actor claims to be selling a dataset allegedly associated with NATO-related resources, specifically referencing the domain tide.act.nato.int, with a total size of approximately 427 MB.
    Date: 2026-03-27T12:02:41Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279309/
    Screenshots:
    None
    Threat Actors: DataHouse
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  149. Dutch National Police Suffers Data Breach
    Category: Data Breach
    Content: The Dutch National Police confirmed it experienced a security breach after a successful phishing attack compromised internal systems, prompting immediate containment and investigation measures. Authorities stated that the incident had limited impact and did not affect citizens’ data, with the breach primarily impacting internal police-related information. The organization implemented security measures to mitigate the incident and is continuing to assess the scope and strengthen protections against similar attacks.
    Date: 2026-03-27T12:01:30Z
    Network: openweb
    Published URL: https://www.bleepingcomputer.com/news/security/dutch-police-discloses-security-breach-after-phishing-attack/
    Screenshots:
    None
    Threat Actors:
    Victim Country: Netherlands
    Victim Industry: Law Enforcement
    Victim Organization: police netherlands
    Victim Site: politie.nl
  150. Alleged Sale of Leak Bazaar Data
    Category: Data Leak
    Content: Threat actor claims to be leaking Bazaar, a data exchange platform allegedly designed to facilitate the sale and analysis of stolen corporate datasets. According to the post, the platform allows users to process large data dumps, extract valuable information such as financial records, source code, and personal data, and sell selected segments of the data to potential buyers.
    Date: 2026-03-27T11:55:52Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279299/
    Screenshots:
    None
    Threat Actors: BlackSnow
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  151. Alleged distribution of Office-related credential combolist via Telegram
    Category: Combo List
    Content: Threat actor CODER is distributing Office-related credential combolists for free through Telegram channels. The actor is also providing related tools through separate Telegram groups.
    Date: 2026-03-27T11:53:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70049/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Mass defacement campaign by Idiot Crew targeting ikshanatherapy.com
    Category: Defacement
    Content: The attacker K3bay4 Mer4h from Idiot Crew conducted a mass defacement campaign targeting ikshanatherapy.com on March 27, 2026. The attack was part of a broader mass defacement operation rather than a targeted attack on the specific healthcare organization.
    Date: 2026-03-27T11:50:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248146
    Screenshots:
    None
    Threat Actors: K3bay4 Mer4h, Idiot Crew
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Ikshana Therapy
    Victim Site: www.ikshanatherapy.com
  153. Mass website defacement by systemdarkdenied targeting rajadhirajcaferestro.in
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including a restaurant website in India. This incident was part of a broader mass defacement operation rather than a targeted attack on the specific organization.
    Date: 2026-03-27T11:50:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248147
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Food & Beverage
    Victim Organization: Rajadhiraj Cafe Restaurant
    Victim Site: rajadhirajcaferestro.in
  154. Mass website defacement campaign by systemdarkdenied targeting Indian educational institution
    Category: Defacement
    Content: Threat actor systemdarkdenied conducted a mass defacement campaign targeting safalboyspg.in, an Indian educational institutions website. The attack was part of a broader mass defacement operation rather than a targeted individual attack.
    Date: 2026-03-27T11:50:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248148
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Safal Boys PG
    Victim Site: safalboyspg.in
  155. Mass defacement campaign by systemdarkdenied targeting solar cleaning company
    Category: Defacement
    Content: Threat actor systemdarkdenied conducted a mass defacement campaign targeting multiple websites including a solar panel cleaning service company in India. The attack occurred on March 27, 2026 and was part of a broader mass defacement operation rather than a targeted attack.
    Date: 2026-03-27T11:49:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248149
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Renewable Energy/Solar Services
    Victim Organization: Shiv Shakti Solar Cleaning
    Victim Site: shivshaktisolarcleaniing.in
  156. Mass defacement targeting library website by systemdarkdenied
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting the SVDK Library website. The incident occurred on March 27, 2026, affecting a Linux-based server hosting the librarys web services.
    Date: 2026-03-27T11:49:31Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248150
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: SVDK Library
    Victim Site: svdklibrary.com
  157. Mass website defacement by systemdarkdenied targeting The Knowledge Academy
    Category: Defacement
    Content: Attacker systemdarkdenied conducted a mass defacement campaign targeting The Knowledge Academys Indian website. The incident was part of a broader mass defacement operation affecting multiple sites simultaneously.
    Date: 2026-03-27T11:49:03Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248151
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Education
    Victim Organization: The Knowledge Academy
    Victim Site: the-knowledge-academy.co.in
  158. Alleged SQL Injection Vulnerability Leak in Nowgong Girls College
    Category: Vulnerability
    Content: The group claims to have leaked an SQL injection vulnerability in Nowgong Girls College.
    Date: 2026-03-27T11:46:03Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: India
    Victim Industry: Education
    Victim Organization: nowgong girls college
    Victim Site: nowgonggirlscollege.edu.in
  159. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 5,000 unique Hotmail email and password combinations dated March 27, 2026 on a cybercrime forum.
    Date: 2026-03-27T11:43:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70048/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  160. Mass website defacement by systemdarkdenied targeting Indian educational institution
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including an Indian educational institutions website. This incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-03-27T11:43:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248139
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Mansarovar Boys PG
    Victim Site: mansarovarboyspg.in
  161. Mass defacement campaign by systemdarkdenied targeting hair and beauty websites
    Category: Defacement
    Content: Attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including a hair and beauty salon. The attack occurred on March 27, 2026 and affected a Linux-based web server hosting the Meraki Hair and Skin Studio website.
    Date: 2026-03-27T11:42:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248140
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Beauty and Personal Care
    Victim Organization: Meraki Hair and Skin Studio
    Victim Site: merakihairandskinstudio.com
  162. Mass website defacement campaign by systemdarkdenied targeting Indian accommodation service
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including an Indian apartment and paying guest accommodation service. This incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-03-27T11:42:34Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248141
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Hospitality
    Victim Organization: Mukta Apartment PG Service
    Victim Site: muktaapartmentpgservice.in
  163. Qilin: Linkspartei meldet russischen Ransomware-Angriff
    Category: Cyber Attack
    Content: The German political party Die Linke reported a cybersecurity incident involving ransomware attributed to the Russian hacker group Qilin, forcing the party to take its infrastructure offline on Thursday. While the party has filed a complaint and is in contact with authorities, member data was not compromised and the extent of affected internal data remains to be determined. This incident is part of a series of attacks targeting German political parties, with the CDU also falling victim to a cyberattack in May 2024.
    Date: 2026-03-27T11:42:30Z
    Network: openweb
    Published URL: https://www.heise.de/news/Qilin-Linkspartei-meldet-russischen-Ransomware-Angriff-11227181.html
    Screenshots:
    None
    Threat Actors:
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Die Linke
    Victim Site: die-linke.de
  164. Mass defacement targeting Indian sites by systemdarkdenied
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor systemdarkdenied targeting multiple websites including muktapg.in on March 27, 2026. The attack affected sites running on Linux servers as part of a coordinated campaign.
    Date: 2026-03-27T11:42:16Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248142
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: muktapg.in
  165. Mass website defacement targeting nalandaboyspg.in by systemdarkdenied
    Category: Defacement
    Content: The threat actor systemdarkdenied conducted a mass defacement campaign targeting nalandaboyspg.in, an educational institution website in India. This was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-03-27T11:41:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248143
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Nalanda Boys PG
    Victim Site: nalandaboyspg.in
  166. Alleged SQL Injection Vulnerability Leak in JSPMs Imperial College
    Category: Vulnerability
    Content: The group claims to have leaked an SQL injection vulnerability in JSPMs Imperial College of Engineering and Research.
    Date: 2026-03-27T11:40:17Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: India
    Victim Industry: Education
    Victim Organization: jspms imperial college
    Victim Site: jspmicoer.edu.in
  167. Alleged SQL Injection Vulnerability Leak in Avantika University
    Category: Vulnerability
    Content: The group claims to have leaked an SQL injection vulnerability in Avantika University.
    Date: 2026-03-27T11:39:36Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: India
    Victim Industry: Education
    Victim Organization: avantika university
    Victim Site: avantikauniversity.edu.in
  168. Mass defacement targeting digitriv.com by systemdarkdenied
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor systemdarkdenied targeting digitriv.com on March 27, 2026. The attack was part of a broader mass defacement campaign rather than a targeted single-site compromise.
    Date: 2026-03-27T11:30:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248133
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Digitriv
    Victim Site: digitriv.com
  169. Mass defacement campaign by systemdarkdenied targeting water purification company
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including Ashapura Purifier, a water purification company. The incident occurred on March 27, 2026, affecting the companys website hosted on a Linux server.
    Date: 2026-03-27T11:30:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248131
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Water Treatment/Purification
    Victim Organization: Ashapura Purifier
    Victim Site: ashapurapurifier.in
  170. systemdarkdenied defaced digitriv.com
    Category: Defacement
    Content: Target: https://digitriv.com/indexKK.htmlAttacker: systemdarkdeniedDate: 2026-03-27 18:28:21OS: LinuxFlags: Mass Defacement (IP: 147.93.17.162)
    Date: 2026-03-27T11:30:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248133
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: digitriv.com
  171. Mass website defacement campaign by systemdarkdenied targeting multiple sites
    Category: Defacement
    Content: The threat actor systemdarkdenied conducted a mass defacement campaign targeting multiple websites including Digitriv Technologies. The attack was part of a broader campaign affecting numerous sites simultaneously rather than targeting a single organization.
    Date: 2026-03-27T11:29:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248134
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Digitriv Technologies
    Victim Site: digitrivtechnologies.com
  172. Mass defacement campaign by systemdarkdenied targeting fairytalegirlspg.in
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting fairytalegirlspg.in on March 27, 2026. The incident was part of a broader mass defacement operation rather than targeting this specific site individually.
    Date: 2026-03-27T11:29:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248135
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Entertainment
    Victim Organization: Fairytale Girls PG
    Victim Site: fairytalegirlspg.in
  173. Mass website defacement targeting Indian hostel website by systemdarkdenied
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including an Indian boys hostel website. This incident was part of a broader mass defacement operation rather than a targeted attack on the specific organization.
    Date: 2026-03-27T11:29:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248136
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Hospitality
    Victim Organization: Joy Living 2 Boys Hostel
    Victim Site: joyliving2boyshostel.in
  174. Mass website defacement campaign by systemdarkdenied targeting Indian educational institution
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including an Indian educational hostel facility. This incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-03-27T11:28:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248137
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Joy Living Boys Hostel
    Victim Site: joylivingboyshostel.in
  175. Alleged sale of unauthorized admin access to an unidentified wordpress shop in Australia
    Category: Initial Access
    Content: Threat actor claims to be selling admin access to an unidentified wordpress shop in Australia.
    Date: 2026-03-27T11:28:12Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279303/
    Screenshots:
    None
    Threat Actors: cosmodrome
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Mass website defacement by systemdarkdenied targeting adventuretattooschool.com
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting adventuretattooschool.com on March 27, 2026. This was part of a broader mass defacement operation rather than a targeted attack on the tattoo school specifically.
    Date: 2026-03-27T11:23:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248127
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Adventure Tattoo School
    Victim Site: adventuretattooschool.com
  177. Alleged leak of confidential data related to FBI Director Kash Patel
    Category: Data Leak
    Content: The threat actor claims to have obtained and leaked confidential personal data belonging to Kash Patel, asserting access to emails, documents, conversations, and other sensitive materials.
    Date: 2026-03-27T11:22:51Z
    Network: openweb
    Published URL: https://handala-team.to/kash-patel-current-director-of-the-fbi-hacked/
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  178. Mass defacement by systemdarkdenied targeting antilliaboyspg.com
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor systemdarkdenied against antilliaboyspg.com on March 27, 2026. The attack targeted a Linux-based server and was part of a broader mass defacement campaign rather than an isolated incident.
    Date: 2026-03-27T11:22:47Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248128
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: antilliaboyspg.com
  179. Mass defacement campaign by systemdarkdenied targeting educational institution
    Category: Defacement
    Content: The attacker systemdarkdenied conducted a mass defacement campaign targeting multiple websites including an Indian educational institution. The attack occurred on March 27, 2026, affecting a Linux-based server hosting the Antillia Param Girls PG website.
    Date: 2026-03-27T11:22:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248129
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Antillia Param Girls PG
    Victim Site: antilliaparamgirlspg.in
  180. Mass defacement campaign by systemdarkdenied targeting antilliapg.com
    Category: Defacement
    Content: The threat actor systemdarkdenied conducted a mass defacement campaign targeting antilliapg.com on March 27, 2026. This was part of a broader mass defacement operation affecting multiple websites simultaneously.
    Date: 2026-03-27T11:22:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248130
    Screenshots:
    None
    Threat Actors: systemdarkdenied
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: antilliapg.com
  181. Alleged SQL Injection Vulnerability Leak in MRG School
    Category: Vulnerability
    Content: The group claims to have leaked an SQL injection vulnerability in MRG School.
    Date: 2026-03-27T11:18:11Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: India
    Victim Industry: Education
    Victim Organization: mrg school
    Victim Site: mrgschool.edu.in
  182. Alleged Leak of SQL Injection Vulnerability in Oz & Hadar group
    Category: Vulnerability
    Content: The group claims to have leaked SQL injection vulnerability in Oz & Hadar group
    Date: 2026-03-27T11:08:11Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: Israel
    Victim Industry: Food Production
    Victim Organization: oz & hadar group
    Victim Site: ozvehadar.co.il
  183. Alleged cybercriminal advertising intermediary services for illicit forum marketing
    Category: Initial Access
    Content: User vlesskey offers intermediary services to advertise illicit goods and services across various forums, specifically seeking sellers of eSIM cards, Telegram premium status, and document services for citizenship/visa applications. The actor facilitates transactions using cryptocurrency payments and escrow services.
    Date: 2026-03-27T11:02:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70045/
    Screenshots:
    None
    Threat Actors: vlesskey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Website defacement of SAAJ by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL conducted a website defacement attack against SAAJs Nepali domain on March 27, 2026. The attack targeted a specific blog page rather than the main homepage.
    Date: 2026-03-27T10:43:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820886
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: SAAJ
    Victim Site: www.saaj.com.np
  185. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: A threat actor is distributing a collection of 100 Hotmail credential lists with full account information through Telegram channels and paste sites.
    Date: 2026-03-27T10:42:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70044/
    Screenshots:
    None
    Threat Actors: hqtabbb
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  186. Alleged Leak of SQL Injection Vulnerability in green-kids.co.il
    Category: Vulnerability
    Content: The group claims to have leaked SQL injection vulnerability in green-kids.co.il
    Date: 2026-03-27T10:38:25Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: green-kids.co.il
  187. Website defacement of Classic RO by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Classic RO website on March 27, 2026. The attack targeted a specific product detail page on the Nepalese companys website.
    Date: 2026-03-27T10:37:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820884
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: Classic RO
    Victim Site: classicro.com.np
  188. Website defacement of featt.fr by Mr.sorban (IslamicCyberTeam)
    Category: Defacement
    Content: The website featt.fr was defaced by attacker Mr.sorban affiliated with IslamicCyberTeam on March 27, 2026. The defacement targeted a specific page within the WordPress installation of the French domain.
    Date: 2026-03-27T10:36:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820885
    Screenshots:
    None
    Threat Actors: Mr.sorban, IslamicCyberTeam
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: featt.fr
  189. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor shared 759 fresh Hotmail credential combinations organized by country with inbox access verification. The leak includes sorted country-specific targeting lists for compromised accounts.
    Date: 2026-03-27T10:32:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70043/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  190. Alleged Leak of SQL Injection Vulnerability in Denver Community Center
    Category: Vulnerability
    Content: The group claims to have leaked SQL injection vulnerability in Denver Community Center
    Date: 2026-03-27T10:30:39Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/228
    Screenshots:
    None
    Threat Actors: Z-Root
    Victim Country: Israel
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: denver community center
    Victim Site: denver.atarix.co.il
  191. Website defacement of blfbd.org by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL successfully defaced the blfbd.org website on March 27, 2026. The attack targeted a specific page on the Bangladeshi domain, with the defacement archived on zone-xsec mirror service.
    Date: 2026-03-27T10:25:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820883
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: blfbd.org
  192. Alleged leak of corporate email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 66,154 email and password combinations allegedly from corporate mail systems with SMTP access.
    Date: 2026-03-27T10:11:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70042/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Alleged Data Breach of USHA International Ltd
    Category: Data Breach
    Content: The threat claims to have breached the database of USHA International Ltd, the dataset contains Customer information, Internal business recordsEmployee-related data, Contact details and Potential authentication related data.
    Date: 2026-03-27T10:05:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-%F0%9D%90%83%F0%9D%90%AE%F0%9D%90%A6%F0%9D%90%A9%F0%9D%90%A2%F0%9D%90%A7%F0%9D%90%A0-%F0%9D%90%94%F0%9D%90%92%F0%9D%90%87%F0%9D%90%80-%F0%9D%90%88%F0%9D%90%8D%F0%9D%90%93%F0%9D%90%84%F0%9D%90%91%F0%9D%90%8D%F0%9D%90%80%F0%9D%90%93%F0%9D%90%88%F0%9D%90%8E%F0%9D%90%8D%F0%9D%90%80%F0%9D%90%8B-%F0%9D%90%8B%F0%9D%90%AD%F0%9D%90%9D-%F0%9D%90%83%F0%9D%90%80%F0%9D%90%93%F0%9D%90%80%F0%9D%90%81%F0%9D%90%80%F0%9D%90%92%F0%9D%90%84–71380
    Screenshots:
    None
    Threat Actors: Alpha02z
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: usha international ltd
    Victim Site: usha.com
  194. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Actor HollowKnight07 shared a sample of 950 Hotmail credentials as a free download on a cybercriminal forum. This appears to be a combolist containing email and password combinations.
    Date: 2026-03-27T10:01:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70041/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  195. Website defacement of Dhanyanchal organization by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Dhanyanchal organizations website on March 27, 2026. The attack targeted a specific page within the About section of the Nepalese organizations website.
    Date: 2026-03-27T09:56:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820880
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: Dhanyanchal
    Victim Site: www.dhanyanchal.com.np
  196. Website defacement of kalinchowkdarshan.com.np by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the kalinchowkdarshan.com.np website on March 27, 2026. The attack targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-03-27T09:56:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820881
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: Kalinchowk Darshan
    Victim Site: kalinchowkdarshan.com.np
  197. SILENT ERROR SYSTEM targets the website of Indian Staffing Federation
    Category: Defacement
    Content: Group claims to have defaced the website of Indian Staffing Federation.
    Date: 2026-03-27T09:53:31Z
    Network: telegram
    Published URL: https://t.me/silenterrorsystem/224
    Screenshots:
    None
    Threat Actors: SILENT ERROR SYSTEM
    Victim Country: India
    Victim Industry: Staffing/Recruiting
    Victim Organization: indian staffing federation
    Victim Site: indianstaffingfederation.org
  198. 100k+ GMAIL GOODS D4RKNETHUB $ (7)
    Category: Combo List
    Content: New thread posted by D4rkNetHub: 100k+ GMAIL GOODS D4RKNETHUB $ (7)
    Date: 2026-03-27T09:51:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70040/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. CYKOMNEPAL defaced www.dhanyanchal.com.np/About/I…
    Category: Defacement
    Content: Target: www.dhanyanchal.com.np/About/I…Attacker: CYKOMNEPALTeam: CYKOMNEPALDate: 2026-03-27 16:45:48
    Date: 2026-03-27T09:50:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820880
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: United States of America
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: www.dhanyanchal.com.np/About/I…
  200. Alleged Data Breach of Instituto Tecnológico Superior de
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Instituto Tecnológico Superior de Irapuato; the dataset contains highly sensitive personally identifiable informations.
    Date: 2026-03-27T09:44:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-M%C3%89XICO-INSTITUTO-TECNOLOGICO-SUPERIOR-DE-IRAPUATO
    Screenshots:
    None
    Threat Actors: SpeakTeam
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: instituto tecnológico superior de irapuato
    Victim Site: itesi.edu.mx
  201. Alleged leak of credential combolist containing 250,000 records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 250,000 URL:username:password combinations on a cybercrime forum. The data is being distributed for free to registered forum members.
    Date: 2026-03-27T09:40:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70039/
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Alleged distribution of mixed credential data via D4RKNETHUB
    Category: Logs
    Content: Threat actor D4rkNetHub allegedly made available a collection of 10,245 mixed credential records through a cloud storage service. The post was made in a forum section dedicated to mail access and credential lists.
    Date: 2026-03-27T09:32:50Z
    Network: openweb
    Published URL: https://xforums.st/threads/10-245-good-mixed-goods-d4rknethub-cloud-26-03-2026.599771/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor named D4rkNetHub claimed to have leaked 170,000 Hotmail credentials on a cybercriminal forum. The post was made in a section dedicated to credential lists and data dumps.
    Date: 2026-03-27T09:17:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70037/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  204. Alleged leak of Hotmail credential combos
    Category: Combo List
    Content: Threat actor shared 450 Hotmail credentials with full account access information through a Telegram channel offering free daily credential combos.
    Date: 2026-03-27T09:16:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70038/
    Screenshots:
    None
    Threat Actors: hqtabbb
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  205. Alleged data leak of Rasi Seeds database
    Category: Data Leak
    Content: Actor SnowSoul shared database files from Rasi Seeds including .bak, .mdf, and .log files through file sharing links. The leak appears to contain database backup and log files from the agricultural companys website.
    Date: 2026-03-27T09:15:35Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SnowSoul-ID-1227-RASI-SEEDS-si-rasiseeds-com
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: Unknown
    Victim Industry: Agriculture
    Victim Organization: Rasi Seeds
    Victim Site: si.rasiseeds.com
  206. Alleged leak of educational credentials combolist
    Category: Combo List
    Content: Threat actor CODER distributes educational sector credential combolists for free through Telegram channels. The actor operates multiple Telegram groups offering both credential lists and related programs.
    Date: 2026-03-27T09:04:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70036/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  207. Alleged data breach of Nakamura Co database
    Category: Data Breach
    Content: Threat actor Kyyzo is selling a 17GB database allegedly containing 850,000+ user records from Nakamura Co, including full names, emails, phone numbers, addresses, dates of birth, bank account information, KTP photos, and social media links for $500 USD.
    Date: 2026-03-27T09:02:33Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-LEAK-DATABASE-850-000-MEMBER-NAKAMURA-CO-ID-17gb
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Nakamura Co
    Victim Site: nakamura.co.id
  208. Alleged caller ID spoofing service offering VoIP fraud capabilities
    Category: Initial Access
    Content: Threat actor advertises a caller ID spoofing service supporting 200+ countries with capabilities to bypass security measures at exchanges, banks, and major platforms. The service offers various dialing methods, voice changing technology, and claims all caller IDs pass verification systems.
    Date: 2026-03-27T08:44:54Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Spoof-Global-%E2%80%93-200-Countries-Spoof-Any-Caller-ID-SpoofGlobalBot
    Screenshots:
    None
    Threat Actors: spoofglobal
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Alleged promotion of traffic boosting and SEO tools
    Category: Alert
    Content: Forum post advertising traffic boosting, SEO, and visitor view tools with mention of organic methods and site autth.rest.
    Date: 2026-03-27T08:44:32Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-Release-Original-powerful-tools-for-business
    Screenshots:
    None
    Threat Actors: sxxone
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  210. Alleged BMW data breach and multi-company automotive data sale
    Category: Data Breach
    Content: Threat actor claims to be selling BMW Group data including dealership documents, customer and employee PII, and Root PEM certificates for $30,000. The alleged breach also exposed data from multiple other automotive companies including Mercedes-Benz, Toyota, Ford, Tesla and others, along with Shell gas station information.
    Date: 2026-03-27T08:44:11Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-BMW-IDOR-Docs
    Screenshots:
    None
    Threat Actors: xpl0itrs
    Victim Country: Unknown
    Victim Industry: Automotive
    Victim Organization: BMW Group
    Victim Site: Unknown
  211. Alleged sale of Chinese online gambling platform database
    Category: Data Breach
    Content: Actor claims to be selling a database containing 3.3 million records of Chinese online gambling customers including usernames, phone numbers, IP addresses, locations, and detailed financial transaction data including recharge and withdrawal amounts.
    Date: 2026-03-27T08:43:51Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-Chinese-online-gambling-customers-3300K
    Screenshots:
    None
    Threat Actors: technicianA
    Victim Country: China
    Victim Industry: Gaming/Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  212. Alleged data breach of Mexican Tax Administration Service (SAT)
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing over 500,000 Mexican tax records including full names, tax IDs, addresses, phone numbers, and email addresses from the Tax Administration Service.
    Date: 2026-03-27T08:43:34Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-Database-sat-gob-mx-500-000-RFCs
    Screenshots:
    None
    Threat Actors: dkoss
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Tax Administration Service (SAT)
    Victim Site: sat.gob.mx
  213. Alleged sale of Spanish banking database containing IBAN records
    Category: Data Breach
    Content: Threat actor ModernStealer claims to have access to a database containing 14 million Spanish IBAN records including personal information, phone numbers, and banking details from institutions like Abanca and Banco Sabadell. Contact information provided for purchasing the complete database.
    Date: 2026-03-27T08:43:13Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-SPAIN-IBAN-DATA
    Screenshots:
    None
    Threat Actors: ModernStealer
    Victim Country: Spain
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  214. Alleged data leak of Yantai International Labor Service Company
    Category: Data Leak
    Content: Actor SnowSoul leaked data from Yantai International Labor Service Company in Shandong Province, China. The leaked data appears to contain study abroad materials, visa information, student data, and university partnership documents totaling approximately 10.8GB across multiple file hosting links.
    Date: 2026-03-27T08:42:47Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1263
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Professional Services
    Victim Organization: Yantai International Labor Service Company
    Victim Site: Unknown
  215. Alleged data breach of Nakamura Co
    Category: Data Breach
    Content: Threat actor Kyyzo is selling a database allegedly containing 850,000+ user records from Nakamura Co including full names, emails, phone numbers, addresses, dates of birth, bank account details, KTP photos, and social media links for $1,500 USD.
    Date: 2026-03-27T08:42:44Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-LEAK-DATABASE-NAKAMURA-CO-ID
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Nakamura Co
    Victim Site: nakamura.co.id
  216. Website defacement of DealSell e-commerce platform by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL group defaced the DealSell e-commerce website on March 27, 2026. The attack targeted a specific product page on the Nepalese online retail platform.
    Date: 2026-03-27T08:41:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820873
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: E-commerce
    Victim Organization: DealSell
    Victim Site: www.dealsell.com.np
  217. Website defacement of MobiMeds healthcare platform by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the about-us page of MobiMeds, a Nepalese healthcare platform, on March 27, 2026. The attack targeted a single page rather than the entire website or multiple sites simultaneously.
    Date: 2026-03-27T08:29:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820861
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Healthcare
    Victim Organization: MobiMeds
    Victim Site: www.mobimeds.com.np
  218. Website defacement of PulseHealth by DimasHxR
    Category: Defacement
    Content: Healthcare website pulsehealth.online was defaced by attacker DimasHxR on March 27, 2026. The incident targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-03-27T08:29:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820862
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: PulseHealth
    Victim Site: pulsehealth.online
  219. Website defacement of ctg-aggregate.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the ctg-aggregate.com website on March 27, 2026. The defacement targeted a specific file (readme.txt) rather than the homepage and was not part of a mass campaign.
    Date: 2026-03-27T08:28:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820864
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ctg-aggregate.com
  220. Website defacement of fpreklama.ru by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Russian advertising company FP Reklamas website on March 27, 2026. The defacement targeted a specific file (readme.txt) rather than the main homepage.
    Date: 2026-03-27T08:28:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820867
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Russia
    Victim Industry: Advertising/Marketing
    Victim Organization: FP Reklama
    Victim Site: fpreklama.ru
  221. Website defacement of inspirationcenterbeyou.nl by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the inspirationcenterbeyou.nl website on March 27, 2026. The incident appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-03-27T08:27:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820870
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Inspiration Center Be You
    Victim Site: inspirationcenterbeyou.nl
  222. Website defacement of kolozoom.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced a specific page on kolozoom.com on March 27, 2026. This appears to be a targeted single-page defacement rather than a mass attack.
    Date: 2026-03-27T08:27:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820871
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Kolozoom
    Victim Site: kolozoom.com
  223. Website defacement of afrisoul.co.za by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the afrisoul.co.za website on March 27, 2026, targeting a readme.txt file on the domain.
    Date: 2026-03-27T08:21:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820851
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: South Africa
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: afrisoul.co.za
  224. Website defacement of auracliq.com by DimasHxR
    Category: Defacement
    Content: Single website defacement targeting auracliq.com conducted by threat actor DimasHxR on March 27, 2026. The attack specifically targeted the readme.txt file on the victims website.
    Date: 2026-03-27T08:20:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820852
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: AuraCliq
    Victim Site: auracliq.com
  225. Website defacement of Dajos Organic by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Dajos Organic website on March 27, 2026. The defacement targeted a South African organic products companys readme.txt file.
    Date: 2026-03-27T08:19:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820856
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: South Africa
    Victim Industry: Organic/Agriculture
    Victim Organization: Dajos Organic
    Victim Site: dajosorganic.co.za
  226. Website defacement of Spoil Me Rotten by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced the spoilmerotten.co.za website on March 27, 2026, targeting the readme.txt file. This was an individual defacement incident with no team affiliation claimed.
    Date: 2026-03-27T08:19:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820860
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: South Africa
    Victim Industry: Unknown
    Victim Organization: Spoil Me Rotten
    Victim Site: spoilmerotten.co.za
  227. Website defacement of Empasoft by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against Empasofts website on March 27, 2026. The attack targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-03-27T08:13:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820838
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Mongolia
    Victim Industry: Technology
    Victim Organization: Empasoft
    Victim Site: empasoft.mn
  228. Website defacement of Alabed Roastery by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the website of Alabed Roastery on March 27, 2026. The defacement targeted a specific page rather than the homepage and was not part of a mass campaign.
    Date: 2026-03-27T08:12:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820839
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Food and Beverage
    Victim Organization: Alabed Roastery
    Victim Site: alabed-roastery.com
  229. Alleged distribution of email credential combolist containing 11.3 million records
    Category: Combo List
    Content: Threat actor CODER distributing an 11.3 million email:password combolist through Telegram channels. The actor operates multiple Telegram groups providing free credential lists and programs for SMTP targeting purposes.
    Date: 2026-03-27T08:12:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70035/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  230. Website defacement of 7heavenonline.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced 7heavenonline.com on March 27, 2026, targeting a readme.txt file on the domain.
    Date: 2026-03-27T08:12:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820840
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: 7 Heaven Online
    Victim Site: 7heavenonline.com
  231. Alleged data leak of Hualen New Materials (Jiangsu) Co., Ltd.
    Category: Data Leak
    Content: Threat actor SnowSoul leaked approximately 20GB of database files from Chinese chemical manufacturing company Hualen New Materials, distributing the data through multiple file hosting links. The leaked data includes various database file formats including .bak, .MDF, .ldf, and other operational system files.
    Date: 2026-03-27T08:11:21Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Chinese-data-Free-download-30-G-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-1243
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Manufacturing
    Victim Organization: Hualen New Materials (Jiangsu) Co., Ltd.
    Victim Site: oa.hualunchem.com
  232. Alleged leak of Chinese industrial data
    Category: Data Leak
    Content: Threat actor SnowSoul shared multiple download links claiming to contain Chinese industrial data. The post is written in Chinese and provides several file hosting links for free download of the alleged data.
    Date: 2026-03-27T08:11:01Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1247
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Industrial
    Victim Organization: Unknown
    Victim Site: Unknown
  233. Alleged leak of social media and e-commerce credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 646,200 credential pairs allegedly targeting social media and shopping platforms for 2026. The data was made available as a free download via a file sharing service.
    Date: 2026-03-27T08:02:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70033/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  234. ❄️❄️ 992x PREMIUM HOTMAIL HITS ❄️❄️
    Category: Combo List
    Content: New thread posted by alphaxdd: ❄️❄️ 992x PREMIUM HOTMAIL HITS ❄️❄️
    Date: 2026-03-27T08:02:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70034/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  235. Website defacement of Dubai furniture delivery service by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a Dubai-based furniture delivery service website on March 27, 2026. The incident was a targeted single-site defacement rather than a mass campaign.
    Date: 2026-03-27T08:00:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820823
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Arab Emirates
    Victim Industry: Retail/E-commerce
    Victim Organization: Furniture Delivery Service Dubai
    Victim Site: furnituredeliveryservicedubai….
  236. Website defacement of NextCare Movers by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the NextCare Movers website on March 27, 2026, targeting the readme.txt file. This was an individual attack rather than part of a mass defacement campaign.
    Date: 2026-03-27T07:59:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820824
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Transportation/Moving Services
    Victim Organization: NextCare Movers
    Victim Site: nextcaremovers.com
  237. Website defacement of Zara Movers by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the website of Zara Movers, a moving/logistics company, on March 27, 2026. The defacement targeted a specific page rather than the main homepage.
    Date: 2026-03-27T07:59:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820825
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Transportation/Logistics
    Victim Organization: Zara Movers
    Victim Site: zaramovers.com
  238. Website defacement of ajkerfact.com by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the Bangladeshi news website ajkerfact.com on March 27, 2026. The attack targeted a specific file (readme.txt) rather than the main homepage.
    Date: 2026-03-27T07:58:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820831
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Bangladesh
    Victim Industry: Media/News
    Victim Organization: Ajker Fact
    Victim Site: ajkerfact.com
  239. Website defacement of TechMediaBD by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the TechMediaBD website on March 27, 2026, targeting the readme.txt file. This appears to be a single-target defacement operation rather than a mass campaign.
    Date: 2026-03-27T07:57:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820835
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Bangladesh
    Victim Industry: Technology/Media
    Victim Organization: TechMediaBD
    Victim Site: techmediabd.com
  240. Website defacement of elaceitederatero.com by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against elaceitederatero.com on March 27, 2026. This was an individual attack rather than part of a mass defacement campaign.
    Date: 2026-03-27T07:51:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820800
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: elaceitederatero.com
  241. Website defacement of United Investimentos by DimasHxR
    Category: Defacement
    Content: Brazilian investment company United Investimentos suffered a website defacement attack by threat actor DimasHxR on March 27, 2026. The attacker compromised a specific page on the companys website rather than conducting a mass defacement campaign.
    Date: 2026-03-27T07:51:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820801
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Financial Services
    Victim Organization: United Investimentos
    Victim Site: united-investimentos.com
  242. Website defacement of kryobot.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced kryobot.com on March 27, 2026, targeting a specific page rather than the main site homepage.
    Date: 2026-03-27T07:50:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820802
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Kryobot
    Victim Site: kryobot.com
  243. Website defacement of b2ihub.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced b2ihub.com on March 27, 2026, targeting a specific page rather than the main site. The incident was documented and archived with mirror evidence available.
    Date: 2026-03-27T07:50:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820803
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: B2I Hub
    Victim Site: b2ihub.com
  244. Website defacement of driventoencourage.com by DimasHxR
    Category: Defacement
    Content: The website driventoencourage.com was defaced by the attacker DimasHxR on March 27, 2026. This was an isolated defacement incident targeting a specific page on the domain.
    Date: 2026-03-27T07:49:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820818
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: driventoencourage.com
  245. ⚡⚡HOTMAIL⚡⚡PRIVATE⚡⚡FRESH⚡⚡CHEKED BY klyne05 ⚡⚡
    Category: Combo List
    Content: New thread posted by klyne05: ⚡⚡HOTMAIL⚡⚡PRIVATE⚡⚡FRESH⚡⚡CHEKED BY klyne05 ⚡⚡
    Date: 2026-03-27T07:31:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70032/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  246. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A forum post allegedly contains a combolist of 5,000 unique Hotmail email and password combinations. The post appears to be offering the credentials as a free download or leak rather than for sale.
    Date: 2026-03-27T07:24:21Z
    Network: openweb
    Published URL: https://xforums.st/threads/27-03-26-hotmail-unique-combo_1_5000.599437/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  247. Alleged leak of corporate email credentials
    Category: Combo List
    Content: Threat actor HQcomboSpace shared a combolist containing 181,081 corporate email credentials via Mega file sharing service. The credentials are described as suitable for lead targeting purposes.
    Date: 2026-03-27T07:20:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70030/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  248. Alleged leak of forum credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 81,000 mixed forum credentials on a cybercriminal forum.
    Date: 2026-03-27T07:10:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70029/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  249. Website defacement of Adi Anadolu by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced the adipanadolu.org website on March 27, 2026. This was a targeted single-site defacement rather than a mass campaign.
    Date: 2026-03-27T06:59:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820664
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Adi Anadolu
    Victim Site: adipanadolu.org
  250. Alleged sale of 10K corporate email access in the USA and Europe
    Category: Combo List
    Content: Threat actor claims to be selling 10,000 corporate email accounts with passwords from organizations in the United States and Europe.
    Date: 2026-03-27T06:54:12Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279292/
    Screenshots:
    None
    Threat Actors: Kay
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Alleged Sale of 1K Office365 Corporate data in USA
    Category: Data Leak
    Content: Threat actor claims to be selling 1k office365 corp data in USA.
    Date: 2026-03-27T06:46:32Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279291/
    Screenshots:
    None
    Threat Actors: Kay
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  252. Alleged data leak of buddy.in
    Category: Data Leak
    Content: Threat actor claims to have leaked data from buddy.in
    Date: 2026-03-27T06:37:55Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Buddy-In-DB
    Screenshots:
    None
    Threat Actors: zsnark
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: buddy.in
  253. Alleged leak of mixed domain credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 26,000 high-quality credentials from mixed domains on a cybercriminal forum.
    Date: 2026-03-27T06:29:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70028/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  254. Website defacement of St. Anns School by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: NUCLIER-Y-C-C-M successfully defaced the toppers section of St. Anns School Roorkees website on March 27, 2026. The attack targeted an educational institutions web presence, affecting their student achievement pages.
    Date: 2026-03-27T06:24:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820222
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: India
    Victim Industry: Education
    Victim Organization: St. Anns School Roorkee
    Victim Site: www.stannsroorkee.org
  255. Alleged data leak of Chinese EMR and insurance records
    Category: Data Leak
    Content: The group claims to have leaked a database containing approximately 56.9 million Chinese EMR and insurance records, including sensitive information such as names, IDs, medical histories, diagnoses, treatments, and organizational details.
    Date: 2026-03-27T06:06:20Z
    Network: telegram
    Published URL: https://t.me/c/3481649019/46
    Screenshots:
    None
    Threat Actors: ShellForce
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  256. Alleged data leak of C&A Mexico
    Category: Data Breach
    Content: Threat actor claims to have leaked database from C&A Mexico.
    Date: 2026-03-27T05:59:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-C-A-MODAS%C2%A0-Mexico-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: injectioninferno2
    Victim Country: Mexico
    Victim Industry: Fashion & Apparel
    Victim Organization: c&a mexico
    Victim Site: cyamoda.com
  257. Alleged leak of unauthorized access to Miaoda
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Miaoda. The compromised data includes a wide range of sensitive information such as AI-related data, personal details (addresses, IDs, nicknames, and mobile numbers), payment and KYC information, project and corporate records, third-party storage data, chat-related metadata (chat room IDs, titles, tags, UIDs, and receipt IDs), partner and agency information, as well as multimedia content including photos and videos.
    Date: 2026-03-27T05:57:33Z
    Network: telegram
    Published URL: https://t.me/c/3481649019/46
    Screenshots:
    None
    Threat Actors: ShellForce
    Victim Country: China
    Victim Industry: Information Technology (IT) Services
    Victim Organization: miaoda
    Victim Site: miaoda.cn
  258. Website defacement of CPBBD by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The attacker NUCLIER-Y-C-C-M successfully defaced the homepage of www.cpbbd.org on March 27, 2026. This was a single-target defacement rather than part of a mass campaign.
    Date: 2026-03-27T05:56:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/819621
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: CPBBD
    Victim Site: www.cpbbd.org
  259. THE GARUDA EYE claims to target Indonesia
    Category: Cyber Attack
    Content: A recent post by the group suggests a planned cyber attack targeting Indonesia, with a countdown of 2 days to the operation.
    Date: 2026-03-27T05:54:58Z
    Network: telegram
    Published URL: https://t.me/GarudaEye/1363
    Screenshots:
    None
    Threat Actors: THE GARUDA EYE
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,992 fresh Hotmail credentials on a cybercriminal forum. The credentials appear to be recently obtained and made available for free download to registered forum users.
    Date: 2026-03-27T05:39:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70027/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  261. Hax.or targets the website of KPS Himalayan Public School
    Category: Defacement
    Content: The group claims to have defaced the website of KPS Himalayan Public School.
    Date: 2026-03-27T05:33:10Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129372
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: India
    Victim Industry: Education
    Victim Organization: kps himalayan public school
    Victim Site: kpsranikhet.in
  262. Website defacement of dspc.org by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced dspc.org on March 27, 2026. The attack targeted a specific file directory on the website rather than the main homepage.
    Date: 2026-03-27T05:32:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/819246
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dspc.org
  263. Alleged data leak of C&A MODAS Mexico customer database
    Category: Data Leak
    Content: Threat actor injectioninferno leaked a database containing 286,094 records from C&A MODAS Mexico, including names, birthdates, government IDs, phone numbers, and email addresses. The data is being distributed for free download on cybercriminal forums.
    Date: 2026-03-27T05:25:49Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-COLLECTION-C-A-MODAS%C2%A0-Mexico-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: injectioninferno
    Victim Country: Mexico
    Victim Industry: Fashion/Retail
    Victim Organization: C&A MODAS
    Victim Site: Unknown
  264. Alleged leak of Gmail cryptocurrency-focused credential list
    Category: Combo List
    Content: A threat actor leaked a combolist containing 591,590 Gmail credentials targeting cryptocurrency users, made available for free download.
    Date: 2026-03-27T05:06:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70026/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Gmail
    Victim Site: gmail.com
  265. Alleged data breach of BreachForums version 5
    Category: Data Breach
    Content: The threat actor claims to have breached the BreachForums platform including domains .sb, .ac, .fi, .us, etc. The actor further claims possession of full backup data from the platform, including private messages, email addresses, IP logs, and user-generated content. The actor claims that the original BreachForums platform was seized by the FBI on October 10, 2025, and that all currently active versions are fraudulent replicas.
    Date: 2026-03-27T05:05:18Z
    Network: tor
    Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  266. Alleged data leak of Saint Lucia Citizenship by Investment Programme database
    Category: Data Leak
    Content: A threat actor claiming to have leaked a SQL database from the Saint Lucia Citizenship by Investment Programme containing over 1.1 million records including personal information, contact details, identification numbers, and passport data of program participants.
    Date: 2026-03-27T04:36:58Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-cipsaintlucia-com-leak
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Saint Lucia
    Victim Industry: Government
    Victim Organization: Saint Lucia Citizenship by Investment Programme
    Victim Site: cipsaintlucia.com
  267. Mass defacement campaign by r¡xzXsploit targeting Indian educational institution
    Category: Defacement
    Content: The threat actor r¡xzXsploit conducted a mass defacement campaign targeting the KPS Ranikhet educational institution website. This attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-03-27T04:25:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248126
    Screenshots:
    None
    Threat Actors: r¡xzXsploit, alone
    Victim Country: India
    Victim Industry: Education
    Victim Organization: KPS Ranikhet
    Victim Site: www.kpsranikhet.in
  268. Alleged data leak of Mossad
    Category: Data Leak
    Content: Threat actor claims to have leaked data from Mossad.
    Date: 2026-03-27T04:19:26Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-Mossad-data-leaked
    Screenshots:
    None
    Threat Actors: ANONB2H
    Victim Country: Israel
    Victim Industry: Government Relations
    Victim Organization: mossad official
    Victim Site: mossad.gov.il
  269. Alleged leak of credential combolist in ULP format
    Category: Combo List
    Content: A threat actor shared a credential combolist in URL:LOGIN:PASS (ULP) format on an underground forum. The post claims to contain high-quality private credentials but provides no specific details about the source, quantity, or affected services.
    Date: 2026-03-27T04:16:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70021/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Alleged distribution of USA and Europe credential combolist
    Category: Combo List
    Content: Threat actor distributing a combolist containing credentials from USA and Europe regions. The post advertises it as an exclusive mix of credential combinations for potential credential stuffing attacks.
    Date: 2026-03-27T04:16:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70022/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Alleged distribution of European and US credential combolists
    Category: Combo List
    Content: Threat actor gsmfix claims to distribute high quality credential combolists targeting Europe and USA regions. The post emphasizes full validity of the credential data being shared.
    Date: 2026-03-27T04:16:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70023/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  272. Alleged leak of phone number and password credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing phone numbers and passwords, claiming it to be high quality and private content on a cybercrime forum.
    Date: 2026-03-27T04:15:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70024/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  273. Alleged leak of WordPress credentials
    Category: Combo List
    Content: Forum post claims to contain WordPress login credentials in URL:login:password format. No content is visible in the post body to verify the claim or determine scope.
    Date: 2026-03-27T04:15:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70025/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  274. Alleged SMTP service offering on cybercriminal forum
    Category: Initial Access
    Content: A forum post titled 1x G SMTP was identified on a cybercriminal forum, likely advertising SMTP access or services. No additional content was available for analysis.
    Date: 2026-03-27T04:06:39Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-g-smtp.598572/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  275. Fatimion cyber team claims to target Isreal
    Category: Alert
    Content: The group claims to have inviting individuals, offering encrypted communication and support to engage in coordinated cyber activities, targeting regions including the UAE, Saudi Arabia, Qatar, and Bahrain.
    Date: 2026-03-27T04:04:46Z
    Network: telegram
    Published URL: https://t.me/hak994/5492
    Screenshots:
    None
    Threat Actors: Fatimion cyber team
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Alleged data leak of government administrative records from Jatigede District
    Category: Data Leak
    Content: Threat actor claims to have obtained and shared administrative data from Jatigede sub-district, reportedly containing sensitive personal information such as national ID numbers, addresses, contact details, and demographic records.
    Date: 2026-03-27T04:04:08Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-Jatigede-District-Sumedang-Regency-DATA-LEAKED–71226
    Screenshots:
    None
    Threat Actors: ANONB2H
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  277. Alleged sale of John Lewis Broadband SMTP access
    Category: Initial Access
    Content: Forum post allegedly offers access to John Lewis Broadband SMTP services. No additional details are available due to lack of post content.
    Date: 2026-03-27T04:02:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-johnlewisbroadband-smtp.598574/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: United Kingdom
    Victim Industry: Telecommunications
    Victim Organization: John Lewis Broadband
    Victim Site: johnlewisbroadband.com
  278. 1x ABSOLUZ SMTP 📧 📬
    Category: Alert
    Content: New thread posted by X Forum Bot: 1x ABSOLUZ SMTP 📧 📬
    Date: 2026-03-27T03:58:53Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-absoluz-smtp.598575/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  279. Alleged Data Leak of Israeli Jewish Jewelry Shop Database
    Category: Data Leak
    Content: Threat Actor claims to have leaked a database allegedly associated with an Israeli jewish jewelry shop, containing approximately 387,000 records. The dataset includes personal information such as first and last names, email addresses, phone numbers, and physical addresses.
    Date: 2026-03-27T03:52:40Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/483-387k-israel-jewish-jawels-shop.98230/
    Screenshots:
    None
    Threat Actors: DBHunter
    Victim Country: Israel
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: Unknown
    Victim Site: Unknown
  280. Alleged compromise of dayblog.fr WordPress admin credentials
    Category: Initial Access
    Content: Forum post indicates potential compromise of WordPress admin login credentials for dayblog.fr website. No additional details or post content available for analysis.
    Date: 2026-03-27T03:49:52Z
    Network: openweb
    Published URL: https://xforums.st/threads/www-dayblog-fr-admin-wp-login.598577/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dayblog.fr
  281. Alleged SMTP service offering on cybercriminal forum
    Category: Initial Access
    Content: A forum post advertising SMTP shell services with cPanel access was posted on a cybercriminal marketplace, though no specific content details are available.
    Date: 2026-03-27T03:43:25Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-service-fibre-smtp.598578/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Alleged SMTP service offering – PARABELLUM SMTP
    Category: Initial Access
    Content: A forum post advertising PARABELLUM SMTP service, likely offering email sending capabilities for malicious purposes. No specific content details are available to determine the exact nature of the offering.
    Date: 2026-03-27T03:32:10Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-parabellum-smtp.598580/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  283. Alleged sale of unauthorized access to Sinun Tech Ltd
    Category: Initial Access
    Content: A threat actor claims to be offering unauthorized access to systems associated with A.D Sinun Technologies Ltd., citing political motivations. The listing suggests potential access to company networks, indicating possible compromise or initial access brokerage involving industrial and potentially sensitive operational environments.
    Date: 2026-03-27T03:28:27Z
    Network: telegram
    Published URL: https://t.me/AmericanAnoymous/304
    Screenshots:
    None
    Threat Actors: BlackH4t Tools Anonymous
    Victim Country: Israel
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: a.d sinun technologies ltd.
    Victim Site: en.sinun.co.il
  284. Alleged SMTP service offering on underground forum
    Category: Initial Access
    Content: Forum post advertising SMTP shell access through cPanel services, likely offering email infrastructure for malicious campaigns.
    Date: 2026-03-27T03:26:25Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-smartblocks-smtp.598581/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  285. Alleged Data Breach of Mahaveer Institute of Technology & Science (MITS), Jadan
    Category: Data Breach
    Content: The group claims to have breached the MITS Jadan website, exposing database information via SQL injection.
    Date: 2026-03-27T03:23:22Z
    Network: telegram
    Published URL: https://t.me/c/3713998822/17
    Screenshots:
    None
    Threat Actors: Channel BadakSecTeam
    Victim Country: India
    Victim Industry: Higher Education/Acadamia
    Victim Organization: mahaveer institute of technology & science (mits), jadan
    Victim Site: mitsjadan.ac.in
  286. Alleged SMTP service offering on cybercrime forum
    Category: Initial Access
    Content: Forum post advertising SMTP shell access or service related to ALTEXTRANSPORTATION, potentially offering unauthorized email server access for malicious activities.
    Date: 2026-03-27T03:23:11Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-altextransportation-smtp.598583/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Transportation
    Victim Organization: ALTEXTRANSPORTATION
    Victim Site: Unknown
  287. Alleged unauthorized access to SocialByGeeks WordPress admin panel
    Category: Initial Access
    Content: Forum post references admin WordPress login credentials for socialbygeeks.com website, though no content details are available to confirm the nature of the threat.
    Date: 2026-03-27T03:17:54Z
    Network: openweb
    Published URL: https://xforums.st/threads/www-socialbygeeks-com-admin-wp-login.598584/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: SocialByGeeks
    Victim Site: socialbygeeks.com
  288. Alleged SMTP service offering on cybercriminal forum
    Category: Initial Access
    Content: A cybercriminal forum post advertising GRINPARAPHA SMTP service, likely offering compromised email server access for malicious email campaigns.
    Date: 2026-03-27T03:10:29Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-grinparapha-smtp.598586/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  289. Alleged data breach of Alltricks
    Category: Data Breach
    Content: A threat actor claims to have leaked a database sourced from Alltricks.fr containing approximately 821,000 records. The exposed data allegedly includes personal information such as first and last names, email addresses, gender/civility, dates of birth, physical addresses, postal codes, cities, and mobile phone numbers.
    Date: 2026-03-27T02:57:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-France-Citizens-Database-821k
    Screenshots:
    None
    Threat Actors: fent888
    Victim Country: France
    Victim Industry: E-commerce & Online Stores
    Victim Organization: alltricks
    Victim Site: alltricks.fr
  290. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,400 allegedly valid Hotmail email credentials via MediaFire download link. The actor claims the credentials are private and high quality, dated March 27, 2026.
    Date: 2026-03-27T02:53:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70016/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  291. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: Forum user noir allegedly shared a collection of valid Hotmail email credentials described as UHQ (Ultra High Quality) through their Telegram channel. The post indicates the credentials are verified as valid and sourced from a private cloud.
    Date: 2026-03-27T02:52:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70017/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  292. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1.6 million Yahoo email and password combinations through a file sharing service. The credentials are claimed to be from fresh leaks and are being distributed for free.
    Date: 2026-03-27T02:52:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70020/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  293. Alleged data breach of University of Georgia
    Category: Data Breach
    Content: A threat actor claims to have breached the University of Georgia. The leaked data allegedly includes employee-related information such as home addresses, personal phone numbers, and identification details.
    Date: 2026-03-27T02:50:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-ShadowByt3-hacks-University-Of-Georgia
    Screenshots:
    None
    Threat Actors: BlackVortex1
    Victim Country: USA
    Victim Industry: Higher Education/Acadamia
    Victim Organization: university of georgia
    Victim Site: uga.edu
  294. Alleged data leak of Camelot Electronics Technology Co
    Category: Data Leak
    Content: Threat actor leaked approximately 80GB of data from Chinese electronics company Camelot Electronics Technology Co, including an 8GB SQL database and various corporate documents containing project information, customer data, and personal information.
    Date: 2026-03-27T02:50:22Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DOCUMENTS-Camelot-electronics-technology-co-data-leak-%E9%87%91%E7%A6%84%E7%94%B5%E5%AD%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8
    Screenshots:
    None
    Threat Actors: Moneyistime
    Victim Country: China
    Victim Industry: Electronics/Automotive
    Victim Organization: Camelot Electronics Technology Co
    Victim Site: Unknown
  295. Alleged data leak of Superintendencia Nacional de Salud de Colombia medical database
    Category: Data Leak
    Content: Threat actor claims to have leaked a 2TB database containing 50 million records from Colombias National Health Superintendency, including patient medical information, personal details, and internal staff data. The actor threatens to release additional packages unless contacted via encrypted messaging.
    Date: 2026-03-27T02:50:16Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-FREE-2TB-LEAK-Superintendencia-Nacional-de-Salud-de-Colombia
    Screenshots:
    None
    Threat Actors: delitospenales
    Victim Country: Colombia
    Victim Industry: Healthcare
    Victim Organization: Superintendencia Nacional de Salud de Colombia
    Victim Site: Unknown
  296. Alleged SMTP shell access offering for CVBCAMBRILS
    Category: Initial Access
    Content: Forum post allegedly offering SMTP shell access related to CVBCAMBRILS organization, though specific details are not available in the post content.
    Date: 2026-03-27T02:39:29Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-cvbcambrils-smtp.598144/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: CVBCAMBRILS
    Victim Site: Unknown
  297. Alleged SMTP service offering on cybercriminal forum
    Category: Initial Access
    Content: Forum post advertising TUNINGV2 SMTP service, likely offering compromised email server access for malicious email campaigns. No detailed content available for analysis.
    Date: 2026-03-27T02:29:50Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-tuningv2-smtp.598147/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  298. Alleged data leak of Government Employee Records
    Category: Data Leak
    Content: Threat actor claims to have leaked data from Government Employee Database of Philippines. The compromised data reportedly includes personal details, family background, education, employment history, and civil service eligibility.
    Date: 2026-03-27T02:26:20Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Data-Breach-Philippines-Government-Employee-Records-Exposed
    Screenshots:
    None
    Threat Actors: hhhhhaplus
    Victim Country: Philippines
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  299. Alleged unauthorized SMTP access to FriendsFamilyHomeCare
    Category: Initial Access
    Content: A threat actor allegedly offers SMTP shell access to FriendsFamilyHomeCare organization, potentially enabling email-based attacks and unauthorized communications.
    Date: 2026-03-27T02:21:20Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-friendsfamilyhomecare-smtp.598148/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: FriendsFamilyHomeCare
    Victim Site: Unknown
  300. Alleged data breach of Superintendencia Nacional de Salud
    Category: Data Breach
    Content: A threat actor claims to have leaked the data from Superintendencia Nacional de Salud.The leaked data allegedly includes highly sensitive personal and medical information such as patient identities, document numbers, birth dates, contact details, full addresses, and healthcare affiliations.
    Date: 2026-03-27T02:12:26Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Free-FREE-2TB-LEAK-Superintendencia-Nacional-de-Salud-de-Colombia
    Screenshots:
    None
    Threat Actors: delitospenales
    Victim Country: Colombia
    Victim Industry: Government Administration
    Victim Organization: superintendencia nacional de salud
    Victim Site: supersalud.gov.co
  301. Alleged distribution of SMTP credentials
    Category: Data Leak
    Content: A forum post claims to offer SMTP credentials, though no specific details about the source, quantity, or distribution method are available due to missing content.
    Date: 2026-03-27T02:12:02Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-aluno-smtp.598150/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  302. Website defacement of CLEBS Nepal by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The NUCLIER-Y-C-C-M group successfully defaced the clebsnepal.com website on March 27, 2026, targeting a specific notice details page. This appears to be a targeted single-site defacement rather than a mass campaign.
    Date: 2026-03-27T02:11:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/816599
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: CLEBS Nepal
    Victim Site: clebsnepal.com
  303. Alleged SMTP access offering on cybercriminal forum
    Category: Initial Access
    Content: A forum post titled 1x IPT-SA SMTP was identified on a cybercriminal forum, suggesting potential SMTP server access being offered. No additional content or details were available in the post.
    Date: 2026-03-27T02:00:39Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-ipt-sa-smtp.598153/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  304. Alleged data breach of Banco Agropecuario
    Category: Data Breach
    Content: A threat actor claims to have leaked a database from Banco Agropecuario (Agrobanco), a Peruvian agricultural bank. The dataset reportedly contains around 50,000 records. The exposed data appears to include sensitive personal and financial-related information such as phone numbers, national ID numbers, full names, email addresses, and geographic details.
    Date: 2026-03-27T01:57:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Database-of-Banco-Agropecuario-Peru
    Screenshots:
    None
    Threat Actors: injectioninferno2
    Victim Country: Peru
    Victim Industry: Financial Services
    Victim Organization: banco agropecuario
    Victim Site: agrobanco.com.pe
  305. Alleged SMTP credential offering
    Category: Initial Access
    Content: Forum post mentions SMTP credentials but provides no additional details about the nature, source, or scope of the alleged offering.
    Date: 2026-03-27T01:50:32Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-mdp-smtp.598155/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  306. Alleged sale of SMTP access credentials
    Category: Initial Access
    Content: Forum post advertising SMTP shell access through cPanel, likely offering compromised email server credentials for unauthorized access.
    Date: 2026-03-27T01:41:14Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-pollocks-smtp.598156/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  307. Alleged compromise of cgarchives.com WordPress admin access
    Category: Initial Access
    Content: Forum post indicates potential compromise of WordPress administrator login credentials for cgarchives.com domain. No additional details available due to missing post content.
    Date: 2026-03-27T01:38:05Z
    Network: openweb
    Published URL: https://xforums.st/threads/cgarchives-com-admin-wp-login.598157/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: cgarchives.com
  308. Alleged SMTP service offering
    Category: Initial Access
    Content: Forum post advertising SMTP shell access with cPanel functionality, though no content details are available for analysis.
    Date: 2026-03-27T01:29:50Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-youspeakit-smtp.598159/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  309. Alleged SMTP access offering for Carteret Barbier
    Category: Initial Access
    Content: Forum post allegedly offering SMTP shell access related to Carteret Barbier organization, though specific details are not available in the post content.
    Date: 2026-03-27T01:26:07Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-carteretbarbier-smtp.598161/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Carteret Barbier
    Victim Site: Unknown
  310. Alleged SMTP service offering
    Category: Initial Access
    Content: Forum post advertising SMTP shell access with cPanel functionality, though specific details are not available due to lack of post content.
    Date: 2026-03-27T01:22:42Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-pita-smtp.598162/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Alleged SMTP access offering involving MANDIETHOMPSON account
    Category: Initial Access
    Content: Forum post references SMTP shell access related to a MANDIETHOMPSON account, but no specific content or details are available for analysis.
    Date: 2026-03-27T01:19:58Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-mandiethompson-smtp.598164/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  312. Alleged unauthorized access to WordPress admin panel of cgastar.000webhostapp.com
    Category: Initial Access
    Content: Forum post indicates potential unauthorized access to WordPress administrator login credentials for cgastar.000webhostapp.com hosted on 000webhost platform.
    Date: 2026-03-27T01:17:27Z
    Network: openweb
    Published URL: https://xforums.st/threads/cgastar-000webhostapp-com-admin-wp-login.598165/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: cgastar.000webhostapp.com
  313. Alleged data leak of BreachForums.as
    Category: Data Leak
    Content: A threat actor claims to have leaked the database of BreachForums.as from a February 2026 incident. The breach reportedly affects over 339,000 unique users. The exposed data allegedly includes extensive user account information such as user IDs, usernames, email addresses, hashed passwords with salts, login keys, IP addresses, and activity metadata.
    Date: 2026-03-27T01:15:07Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-BreachForums-as-Database-2026-Leaked-Download
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Alleged sale of SMTP access credentials
    Category: Initial Access
    Content: Forum post advertising SMTP shell access with cPanel functionality, likely for unauthorized email sending capabilities.
    Date: 2026-03-27T01:14:52Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-sman4-pbl-smtp.598167/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  315. Alleged SMTP server compromise involving CCHSRAMS
    Category: Initial Access
    Content: A forum post references SMTP access potentially related to CCHSRAMS organization, though no content is available for analysis.
    Date: 2026-03-27T01:10:15Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-cchsrams-smtp.598169/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: CCHSRAMS
    Victim Site: Unknown
  316. Alleged sale of GRIDGROUP SMTP access
    Category: Initial Access
    Content: Forum post advertising GRIDGROUP SMTP access, though specific details about the offering are not available in the content.
    Date: 2026-03-27T01:03:20Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-gridgroup-smtp.598170/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: GRIDGROUP
    Victim Site: Unknown
  317. Alleged compromise of kakek88slots.net WordPress admin credentials
    Category: Initial Access
    Content: Forum post allegedly containing WordPress admin login credentials for kakek88slots.net gambling website. No post content was available for analysis.
    Date: 2026-03-27T00:59:53Z
    Network: openweb
    Published URL: https://xforums.st/threads/kakek88slots-net-admin-wp-login.598171/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Gaming/Gambling
    Victim Organization: Kakek88 Slots
    Victim Site: kakek88slots.net
  318. Alleged compromise of AIDOCTORS SMTP services
    Category: Initial Access
    Content: Forum post references SMTP shell access to AIDOCTORS services. No additional details available in the post content.
    Date: 2026-03-27T00:49:52Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-aidoctors-smtp.598173/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: AIDOCTORS
    Victim Site: Unknown
  319. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1 million credential pairs targeting German users through a file hosting service. The combolist appears to contain mixed targets from Germany.
    Date: 2026-03-27T00:44:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70007/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  320. Alleged leak of credential combolist containing 580,000 login credentials
    Category: Combo List
    Content: A threat actor shared a link to download a combolist containing 580,000 URL, username, and password combinations via a file hosting service.
    Date: 2026-03-27T00:44:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70008/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  321. Alleged leak of mixed email and password credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 120,000 email and password combinations described as fresh high quality credentials. The credentials appear to be from mixed sources and are being distributed through a hidden download link.
    Date: 2026-03-27T00:44:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70009/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  322. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor distributes a combolist containing 430,000 Hotmail email and password combinations through Telegram and file sharing platforms. The actor claims to provide fresh email credential lists with daily updates.
    Date: 2026-03-27T00:43:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70012/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  323. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: Forum user ValidMail allegedly shared a combolist containing 81,000 mixed credentials specifically targeting forums. The credentials are claimed to be valid and are being distributed on the CrackingX forum.
    Date: 2026-03-27T00:43:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70013/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  324. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.3 million credential pairs targeting Yahoo accounts. The data is being distributed as a free download via file sharing service.
    Date: 2026-03-27T00:43:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70015/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  325. Alleged data leak of CasinoVale Turkish casino database
    Category: Data Leak
    Content: Threat actor LockBitData leaked a database dump from Turkish casino CasinoVale containing 554,009 records with comprehensive customer data including personal information, gambling activity, financial transactions, and account details.
    Date: 2026-03-27T00:41:48Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-2025-CASINOVALE-TURKISH-CASINO-DATABASE
    Screenshots:
    None
    Threat Actors: LockBitData
    Victim Country: Turkey
    Victim Industry: Gaming and Gambling
    Victim Organization: CasinoVale
    Victim Site: Unknown
  326. Alleged SMTP service offering
    Category: Initial Access
    Content: Forum post advertising SMTP service with no additional content available for analysis.
    Date: 2026-03-27T00:29:20Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-pucgo-smtp.597690/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  327. Alleged offering of MOBILO SMTP access
    Category: Initial Access
    Content: Forum post advertising SMTP shell access related to MOBILO service on cPanel platform. No additional content details were available for analysis.
    Date: 2026-03-27T00:24:57Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-mobilo-smtp.597693/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: MOBILO
    Victim Site: Unknown
  328. Alleged offering of SMTP credentials
    Category: Initial Access
    Content: Forum post claims to offer SMTP credentials, though no specific content details are available in the post body.
    Date: 2026-03-27T00:22:20Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-sminfo-smtp.597695/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  329. Alleged Unauthorized Access to Israeli Industrial Silo Control System (ISIS)
    Category: Initial Access
    Content: Threat Actor claims to have gained unauthorized access to industrial silo control systems in Israel. The access includes full control over operational parameters, including weight, temperature, and other system metrics in real time, with the ability to modify settings, reset values, remotely start or stop equipment, and access multiple silos along with associated auxiliary systems.
    Date: 2026-03-27T00:21:59Z
    Network: telegram
    Published URL: https://t.me/Z_Pentest_Alliance_ru/911
    Screenshots:
    None
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  330. Alleged Sale of Unauthorized Access to 600 Compromised Systems
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to more than 600 compromised systems, including corporate networks, point-of-sale (POS) systems, and personal computers.
    Date: 2026-03-27T00:15:59Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/279279/
    Screenshots:
    None
    Threat Actors: francogambino83
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  331. Alleged compromise of TancorCorporation SMTP credentials
    Category: Initial Access
    Content: Forum post references SMTP credentials for TancorCorporation, potentially providing email server access for malicious activities.
    Date: 2026-03-27T00:14:03Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-tancorcorporation-smtp.597696/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: TancorCorporation
    Victim Site: Unknown
  332. Alleged compromise of virtualchurchoka.esy.es WordPress admin access
    Category: Initial Access
    Content: A forum post claims to provide WordPress admin login credentials for virtualchurchoka.esy.es, a religious organization website. No additional details or post content were available for analysis.
    Date: 2026-03-27T00:08:58Z
    Network: openweb
    Published URL: https://xforums.st/threads/virtualchurchoka-esy-es-admin-wp-login.597697/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Religious Organizations
    Victim Organization: Virtual Church OKA
    Victim Site: virtualchurchoka.esy.es
  333. Alleged offering of ICLAMON SMTP access
    Category: Initial Access
    Content: Forum post titled 1x ICLAMON SMTP suggests potential unauthorized access to ICLAMON SMTP services, though no content details are available for verification.
    Date: 2026-03-27T00:01:05Z
    Network: openweb
    Published URL: https://xforums.st/threads/1x-iclamon-smtp.597699/
    Screenshots:
    None
    Threat Actors: X Forum Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: ICLAMON
    Victim Site: Unknown