[March-28-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a detailed analysis of a series of cybersecurity incidents recorded between March 28 and March 29, 2026. The provided intelligence details 182 distinct cyber events spanning multiple threat categories, including the mass distribution of credential combo lists, website defacements, high-impact data breaches, and the unauthorized sale of initial access to corporate and government networks.

The threat landscape observed during this period is characterized by the vast, free distribution of sensitive data across open web forums (such as crackingx.com) and Telegram channels. High-profile incidents include the alleged leak of 250 million Personally Identifiable Information (PII) records from the USA , the breach of the Indian Council of Medical Research involving 815 million records , and targeted disruptive attacks on critical infrastructure and retail operations by groups like Handala Hack.

2. Threat Landscape Overview

An analysis of the provided dataset reveals a distinct breakdown of cybercriminal activities into four primary categories:

  • Credential Combo Lists: The overwhelming majority of recorded incidents involve the distribution of parsed login credentials.
  • Website Defacements: A significant number of incidents involve the unauthorized alteration of web pages, largely driven by hacktivist groups or actors seeking notoriety.
  • Data Breaches and Leaks: High-impact incidents involving the exfiltration and exposure of sensitive corporate, government, and individual data.
  • Initial Access and Vulnerabilities: The brokering or exposure of unauthorized access to industrial control systems, surveillance networks, and corporate environments.

3. Detailed Vector Analysis

3.1 Credential Combo Lists and Access Brokers

The most frequent event in the dataset is the distribution of “Combo Lists”—datasets containing millions of usernames, emails, and passwords, often formatted as URL:LOGIN:PASS.

Volume and Scale:

  • A threat actor named Knight allegedly shared multiple massive databases, including a 100 million record combo list , a 21 million record list , a 10 million record list , and an 11GB credential list.
  • The actor Daxus distributed 34.95 million URL:LOG:PASS entries through a Telegram bot and the Daxus.pro service.
  • CODER distributed a combo list containing 17 million banking credentials. This actor also shared an 11 million record mixed corporate combo list.

Targeted Platforms and Regions:

  • Technology Providers: Microsoft (Hotmail) and Google (Gmail) were heavily targeted. Actor D4rkNetHub leaked over 100,000 Gmail credentials. Numerous actors, including MailAccesss, HollowKnight07, and HQcomboSpace, leaked varying volumes of Hotmail credentials, with one list containing 1.7 million records. Yahoo credentials were also targeted, including a list of 161,822 records and a Japan-specific list of 6,541 records.
  • Regional Targeting: Specific combo lists were curated by geography. HQcomboSpace targeted German domains with 314,190 records and German shopping sites with 1.1 million pairs. Other localized lists targeted Sweden (87,000 records) , Denmark (78,000 records) , Russia (5,400 records) , Poland , France , and China.

Distribution Methods:

  • The vast majority of these credentials are being shared for free.
  • Data is primarily distributed via registered accounts on forums like crackingx.com , file-sharing services like Mega.nz , and Telegram channels like PandaCloud04.

3.2 Website Defacements

Website defacement remains a highly active vector for demonstrating capability, ideological messaging, or cyber-vandalism. The dataset indicates both single-target attacks and mass campaigns.

Prominent Defacement Actors:

  • NUCLIER-Y-C-C-M: This actor or group is the most prolific defacer in the dataset. They conducted targeted attacks against a wide array of victims, including the Lebanon Book Fair , AAA Nutri Foods , Asquare Pharmaceutical in Bangladesh , Residie Ons , and numerous other commercial and educational sites.
  • KEJE ARMY / ARJUN-X001: This group focused on home page defacements, targeting domains like nialaretta.com , Horizen Academy , and specific IP addresses like 209.15.116.52 and 52.248.40.42.
  • Alpha wolf / XYZ: Conducted single and mass defacements, notably targeting pymedia.cl in Chile and executing a mass campaign against mtaapu.net.
  • Aptisme: Targeted international organizations, including the Fleurieu Peninsula Visitor Guide in Australia and Avaz in Vietnam.

3.3 High-Impact Data Breaches and Leaks

The report highlights several severe data breaches involving the exfiltration of sensitive organizational databases and large-scale PII.

Government and Public Sector Breaches:

  • Indian Council of Medical Research (ICMR): Actor pow claims to be selling a database of 815 million records containing Aadhaar numbers, passport numbers, demographics, and addresses.
  • Iran Government Leak: The group Anonymous claims to have extracted over 750GB of sensitive data, including internal orders on nationwide censorship and filtering logs.
  • Alcaldía de Medellín (Colombia): NyxarGroup leaked administrative records, citizen information, and financial data from the Medellín government platform.
  • Gauteng Provincial Government (South Africa): Actor XP95 breached systems, exposing approximately 3.6 million files related to government operations.

Corporate and Financial Breaches:

  • Massive USA PII Leak: Actor KrimCo claims to have leaked personal information of over 250 million US individuals, including income details and demographics.
  • Binance Database: Actor PexRat is allegedly selling a database of 1.5 million Binance users, containing KYC status, 2FA status, and full PII.
  • Good Food Store (USA): Handala Hack wiped 4 terabytes of data, forcing a complete operational shutdown of the retail store in Missoula.
  • Fenie Energía S.A. (Spain): A 430GB dataset was leaked containing ID cards, IBAN numbers, and contracts.
  • Chronopost (France): Actor aeter leaked 860,000 customer records from the French courier service, including locker locations and shipment status.

3.4 Initial Access and Vulnerability Exploitation

Threat actors actively traded and leaked initial access points, posing severe supply-chain and physical security risks.

  • Industrial Control Systems (ICS): The group NetStrike claimed unauthorized access to a UniLogic Kernel-based ICS, alleging the ability to manipulate physical operations like valves and turbines. They also claimed access to a power plant control system in Tel Aviv, Israel.
  • Surveillance Systems: The Z-PENTEST ALLIANCE claimed access to CCTV cameras in a Polish laboratory , while MORNING STAR claimed access to multiple CCTV systems in the USA.
  • Corporate Access Brokering: Threat actors attempted to sell VPN access to a Netherlands manufacturing company , admin access to an electronics manufacturer in India , and firewall access to a Chinese luxury retail company.

4. Threat Actor Profiling

Based strictly on the provided data, several prominent actors and groups emerge:

  • CYBER U.N.I.T.Y: A highly active group exhibiting state-aligned or hacktivist motivations, predominantly targeting Israeli infrastructure. Their targets included the Israeli Air Force , Transport Infrastructure , and Bank Card data. They also targeted the Ministry of National Defence in Romania and the UAE Passport system.
  • Handala Hack: Operates with a highly destructive methodology. They claimed responsibility for wiping 4TB of data from the Good Food Store and taking 2,680 Point of Sale (POS) terminals offline across 110 US companies (North Country Business Products).
  • HQcomboSpace & Knight: Specialized data brokers focused strictly on the curation, aggregation, and free distribution of massive credential combo lists across open web forums.

5. Geographical and Industry Impact

Geographical Hotspots:

  • United States: Faced severe breaches (250M PII leak ), destructive retail attacks (Good Food Store , POS terminal shutdowns ), and CCTV compromises.
  • Israel: Heavily targeted by ideological groups (CYBER U.N.I.T.Y, NetStrike), suffering breaches to Air Force databases , transport infrastructure , and power plant control systems.
  • Germany: Frequent target for credential scraping (T-Online , German shopping sites ) and corporate breaches (German Doner Kebab , Volkswagen ).
  • India: Suffered the largest single numerical breach recorded in the dataset (815M ICMR records).

Industry Vulnerabilities:

  • Government & Public Sector: High-value targets for data exfiltration (Medellín , South Africa , Iran ).
  • Technology & Communications: Microsoft, Google, and Yahoo were continuously targeted via credential stuffing and combo list generation.
  • Financial Services: Cryptocurrency platforms (Binance , CoinMarketCap ) and regional financial data (Israeli banks , Serlefin Colombia ) were prime targets for monetization.

6. Conclusion

The cybersecurity events recorded between March 28 and March 29, 2026, illustrate a highly volatile threat landscape characterized by the commoditization of stolen data.

The most pervasive threat identified is the widespread, freely available distribution of credential combo lists containing tens of millions of records. Because these lists are shared freely on forums like CrackingX and via Telegram, they drastically lower the barrier to entry for novice cybercriminals, fueling secondary attacks such as credential stuffing, account takeovers, and subsequent data breaches.

Furthermore, the intelligence highlights the persistent threat to physical and critical infrastructure. Claims of access to Industrial Control Systems (ICS) and the destructive wiper attacks on retail infrastructure demonstrate that threat actors are actively seeking to bridge the gap between digital exploitation and physical disruption.

Finally, hacktivism remains a highly visible element of the cyber domain. Groups like CYBER U.N.I.T.Y and NUCLIER-Y-C-C-M utilize defacements and targeted data leaks to cause reputational damage and push ideological messaging against state-level targets, particularly in the Middle East. Organizations across all sectors—particularly Government, Retail, and Technology—must prioritize robust identity access management, enforce strict multi-factor authentication to combat combo lists, and aggressively monitor initial access vectors like VPNs and remote administrative tools.

Detected Incidents Draft Data

  1. Alleged distribution of banking credential combolist
    Category: Combo List
    Content: Threat actor distributing a combolist containing 17 million banking credentials through Telegram channels. The credentials are being shared for free through multiple Telegram groups.
    Date: 2026-03-28T23:38:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70244/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Website defacement of nialaretta.com by ARJUN-X001 (KEJE ARMY)
    Category: Defacement
    Content: ARJUN-X001 from the KEJE ARMY group conducted a home page defacement of nialaretta.com on March 29, 2026. This was an isolated defacement targeting a single website rather than a mass attack campaign.
    Date: 2026-03-28T23:30:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821023
    Screenshots:
    None
    Threat Actors: ARJUN-X001, KEJE ARMY
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: nialaretta.com
  3. Alleged leak of German mixed-target combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.1 million credential pairs targeting German entities across multiple sectors. The credential list was made available for free download via a file sharing service.
    Date: 2026-03-28T23:28:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70243/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Website defacement of 209.15.116.52 by ARJUN-X001 (KEJE ARMY)
    Category: Defacement
    Content: ARJUN-X001 from the KEJE ARMY group successfully defaced a website hosted at IP address 209.15.116.52 on March 29, 2026. This was a single home page defacement rather than a mass attack.
    Date: 2026-03-28T23:18:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821021
    Screenshots:
    None
    Threat Actors: ARJUN-X001, KEJE ARMY
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 209.15.116.52
  5. Website defacement by ARJUN-X001 (KEJE ARMY) targeting IP address 52.248.40.42
    Category: Defacement
    Content: ARJUN-X001 from the KEJE ARMY group successfully defaced a website hosted at IP address 52.248.40.42 on March 29, 2026. This appears to be a single-target home page defacement rather than a mass attack.
    Date: 2026-03-28T23:06:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821020
    Screenshots:
    None
    Threat Actors: ARJUN-X001, KEJE ARMY
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 52.248.40.42
  6. Alleged leak of mixed email-password credential list
    Category: Combo List
    Content: Actor shared a combolist containing 100,000 email and password combinations from mixed sources. The credentials are offered as a free download to registered forum users.
    Date: 2026-03-28T22:51:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70240/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Website defacement of levharulo.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced a specific page on www.levharulo.com on March 29, 2026. This appears to be an isolated defacement targeting a single page rather than a mass attack campaign.
    Date: 2026-03-28T22:49:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821018
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: www.levharulo.com
  8. Alleged data breach of Shelter Indonesia
    Category: Data Breach
    Content: The threat actor claims to have breached the database from Shelter Indonesia. The compromised dataset reportedly includes full names, Indonesian national ID numbers (NIK/KTP), phone/WhatsApp numbers, location details, and file/date references.
    Date: 2026-03-28T22:42:36Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-PT-SHELTER-EMPLOYEE-DATA-SHELTER-VENDOR-OS-SHELTER-FREE-DOWNLOAD
    Screenshots:
    None
    Threat Actors: hamzahcorp
    Victim Country: Indonesia
    Victim Industry: Staffing/Recruiting
    Victim Organization: shelter indonesia
    Victim Site: shelterindonesia.id
  9. Website defacement of Horizen Academy by ARJUN-X001/KEJE ARMY
    Category: Defacement
    Content: ARJUN-X001 from the KEJE ARMY team successfully defaced the Horizen Academy educational website on March 29, 2026. This was a single-site home page defacement targeting the educational institutions primary domain.
    Date: 2026-03-28T22:37:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821017
    Screenshots:
    None
    Threat Actors: ARJUN-X001, KEJE ARMY
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Horizen Academy
    Victim Site: horizenacademy.com
  10. Website defacement of chenar-khayyam.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: NUCLIER-Y-C-C-M group defaced the chenar-khayyam.com website on March 29, 2026. The attack targeted a specific blog page rather than the main homepage.
    Date: 2026-03-28T22:01:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821013
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: chenar-khayyam.com
  11. Alleged leak of credential combolist containing 34.95 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 34.95 million URL:LOG:PASS entries through their Telegram bot and website. The data is being distributed through the Daxus.pro service with associated support channels.
    Date: 2026-03-28T21:53:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70238/
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged leak of sensitive government and network data in Iran
    Category: Data Leak
    Content: Group claims to have extracted over 750 gigabytes of sensitive data, including confidential government reports, internal orders on nationwide censorship, user-profiling and filtering logs and information about private networks involved in DNS blocking and “White Internet” operations.
    Date: 2026-03-28T21:46:11Z
    Network: telegram
    Published URL: https://t.me/youranon_storm/1414
    Screenshots:
    None
    Threat Actors: Anonymous
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Website defacement of kiyje.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced the about page of kiyje.com on March 29, 2026. This appears to be an isolated defacement incident targeting a single webpage rather than a mass or redefacement attack.
    Date: 2026-03-28T21:44:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821012
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kiyje.com
  14. Alleged leak of Gmail credentials
    Category: Combo List
    Content: Threat actor claims to have leaked over 100,000 Gmail credentials on a cybercriminal forum. The post appears to offer Gmail credential data but access requires forum registration to view full details.
    Date: 2026-03-28T21:43:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70237/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  15. Website defacement of swiftgh.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced swiftgh.com/page/wow on March 29, 2026. This appears to be an isolated defacement incident targeting a Ghanaian website.
    Date: 2026-03-28T21:38:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821011
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Ghana
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: swiftgh.com
  16. Website defacement of myupavan.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: NUCLIER-Y-C-C-M defaced the myupavan.com e-commerce website on March 29, 2026. The attack targeted a product page on the commercial platform.
    Date: 2026-03-28T21:32:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821010
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: MyUpavan
    Victim Site: myupavan.com
  17. Alleged leak of educational sector credentials and social media data
    Category: Combo List
    Content: A threat actor leaked a combolist containing 151,879 credential records allegedly targeting educational, social media, and shopping platforms. The data is being distributed for free via a file-sharing service.
    Date: 2026-03-28T21:17:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70234/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged leak of URL-LOG-PASS credential combolist
    Category: Combo List
    Content: Threat actor TheBash1996 shared a 530GB collection of URL-LOG-PASS credential data described as fresh and private. The data appears to be browser history combined with login credentials in text format.
    Date: 2026-03-28T21:06:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70232/
    Screenshots:
    None
    Threat Actors: TheBash1996
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged unauthorized access to an unidentified industrial control system
    Category: Initial Access
    Content: The group claims to have gained access to an unidentified industrial control system. They claims that they have control over UniLogic Kernel -based industrial control system and potentially the ability to monitor or manipulate physical operations like valves and turbines, though the extent of this control may be exaggerated.
    Date: 2026-03-28T21:00:06Z
    Network: telegram
    Published URL: https://t.me/netstrikegroup/50
    Screenshots:
    None
    Threat Actors: NetStrike
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged leak of Hotmail credential list
    Category: Combo List
    Content: A threat actor allegedly leaked a credential list containing 355,000 Hotmail account credentials on a cybercriminal forum.
    Date: 2026-03-28T20:56:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70230/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  21. Alleged unauthorized access to Telvinet Sp. z o.o
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Telvinet Sp. z o.o.
    Date: 2026-03-28T20:29:44Z
    Network: telegram
    Published URL: https://t.me/kittysearchnews/255
    Screenshots:
    None
    Threat Actors: Kitty Search
    Victim Country: Poland
    Victim Industry: Information Technology (IT) Services
    Victim Organization: telvinet sp. z o.o
    Victim Site: telvinet.pl
  22. Website defacement of mtaapu.net by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, with attacker XYZ, successfully defaced the mtaapu.net website on March 29, 2026. This was a single home page defacement rather than a mass attack.
    Date: 2026-03-28T20:24:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821005
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mtaapu.net
  23. Website defacement of 365generic.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M defaced the 365generic.com website on March 29, 2026. The defacement targeted the terms and conditions page of the site.
    Date: 2026-03-28T20:24:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821006
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 365generic.com
  24. Mass website defacement by Alpha wolf team targeting mtaapu.net
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement attack targeting mtaapu.net on March 29, 2026. This was part of a larger mass defacement campaign rather than a targeted attack on a single organization.
    Date: 2026-03-28T20:23:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248162
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Tonga
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mtaapu.net
  25. Alleged leak of admin access to pros.ophony.com
    Category: Initial Access
    Content: The group claims to have leaked unauthorized admin access to pros.ophony.com .
    Date: 2026-03-28T20:19:28Z
    Network: telegram
    Published URL: https://t.me/kittysearchnews/256
    Screenshots:
    None
    Threat Actors: Kitty Search
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pros.ophony.com
  26. Website defacement of Asian Buddha Hotel by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The NUCLIER-Y-C-C-M threat actor successfully defaced the Asian Buddha Hotel website on March 29, 2026. This was a targeted single-site attack rather than part of a mass defacement campaign.
    Date: 2026-03-28T20:17:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821003
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Hospitality
    Victim Organization: Asian Buddha Hotel
    Victim Site: www.asianbuddhahotel.com
  27. Website defacement of jobkaroge.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The hacker group NUCLIER-Y-C-C-M defaced the privacy policy page of jobkaroge.com, a job portal website, on March 29, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-03-28T20:16:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/821004
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Employment Services
    Victim Organization: JobKaroge
    Victim Site: jobkaroge.com
  28. Title: Alleged Data Breach of German Doner Kebab
    Category: Data Breach
    Content: The threat actor claims to have breached data from German Doner Kebab.The compromised data includes names, email addresses, phone numbers, dates of birth, and addresses and more.
    Date: 2026-03-28T20:12:58Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279397/
    Screenshots:
    None
    Threat Actors: KrimCo
    Victim Country: Germany
    Victim Industry: Food & Beverages
    Victim Organization: german doner kebab
    Victim Site: germandonerkebab.com
  29. Alleged unauthorized access to an unidentified Israeli power plant control system
    Category: Initial Access
    Content: The group claims to have gained access to the an unidentified control systems of a power plant in Tel Aviv, alleging full control over its operations and infrastructure.
    Date: 2026-03-28T20:12:52Z
    Network: telegram
    Published URL: https://t.me/netstrikegroup/49
    Screenshots:
    None
    Threat Actors: NetStrike
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Alleged data breach of Serlefin
    Category: Data Breach
    Content: The threat actor claims to have breached the database from Serlefin. The compromised data includes customer folders, transaction records, and audio recordings, reportedly in a very large volume.
    Date: 2026-03-28T20:10:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Serlefin-BPO-Banco-Davivienda-Colombia
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Financial Services
    Victim Organization: serlefin
    Victim Site: serlefin.com
  31. Alleged Leak of 250M USA PII Records
    Category: Data Leak
    Content: The threat actor claims to have leaked a massive database containing personal information of over 250 million individuals in the United States, including names, email addresses, phone numbers, physical addresses, income details, and other sensitive demographic data, with the original source reportedly unknown.
    Date: 2026-03-28T20:03:41Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279398/
    Screenshots:
    None
    Threat Actors: KrimCo
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged leak of credential combolist containing 21 million records
    Category: Combo List
    Content: A threat actor shared a combolist containing 21 million URL:LOGIN:PASS combinations on a cybercriminal forum. The post content is hidden behind registration requirements.
    Date: 2026-03-28T19:57:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70223/
    Screenshots:
    None
    Threat Actors: Knight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged leak of 100 million credentials
    Category: Combo List
    Content: A threat actor is allegedly sharing a combolist containing 100 million URL:login:password combinations on a cybercriminal forum.
    Date: 2026-03-28T19:57:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70224/
    Screenshots:
    None
    Threat Actors: Knight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Website defacement of Lebanon Book Fair by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The NUCLIER-Y-C-C-M threat actor successfully defaced the Lebanon Book Fair website on March 29, 2026. The attack targeted the cultural organizations main website, compromising their online presence.
    Date: 2026-03-28T19:54:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820999
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Lebanon
    Victim Industry: Publishing/Literature
    Victim Organization: Lebanon Book Fair
    Victim Site: lebanonbookfair.com
  35. Website defacement of pymedia.cl by XYZ/Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the PyMedia website on March 29, 2026. The incident appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-03-28T19:47:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248160
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Chile
    Victim Industry: Media
    Victim Organization: PyMedia
    Victim Site: pymedia.cl
  36. Website defacement of PyMedia by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, with attacker XYZ, successfully defaced the pymedia.cl website on March 29, 2026. The attack targeted the .well-known directory of the Chilean website.
    Date: 2026-03-28T19:42:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820998
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: PyMedia
    Victim Site: pymedia.cl
  37. Website defacement of AAA Nutri Foods by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The NUCLIER-Y-C-C-M threat group successfully defaced the AAA Nutri Foods website on March 29, 2026. The attack targeted a specific file (wow.txt) on the companys domain, with evidence archived on zone-xsec mirror platform.
    Date: 2026-03-28T19:36:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820996
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Food and Nutrition
    Victim Organization: AAA Nutri Foods
    Victim Site: aaanutrifoods.com
  38. Alleged data leak of SAPA BANSOS
    Category: Data Breach
    Content: A threat group claims to have leaked a database belonging to SAPA BANSOS
    Date: 2026-03-28T19:27:03Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/415
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sapa bansos
    Victim Site: sapabansos.dinsos.jatimprov.go.id
  39. Alleged leak of 10 million credentials
    Category: Combo List
    Content: A threat actor named Knight allegedly shared a combolist containing 10 million URL:LOGIN:PASS credential combinations on a cybercrime forum.
    Date: 2026-03-28T19:21:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70219/
    Screenshots:
    None
    Threat Actors: Knight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged leak of 46,000 email credentials
    Category: Combo List
    Content: Threat actor TeraCloud1 allegedly made available 46,000 valid email credentials on a cybercriminal forum, with additional access offered through a private Telegram channel.
    Date: 2026-03-28T19:21:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70220/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged leak of German domain credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 314,190 credential pairs targeting German domains via a Mega.nz download link on a cybercrime forum.
    Date: 2026-03-28T19:12:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70217/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged leak of 8 million credentials
    Category: Combo List
    Content: A threat actor named Knight allegedly shared a credential list containing 8 million URL:username:password combinations on a cybercrime forum.
    Date: 2026-03-28T19:11:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70218/
    Screenshots:
    None
    Threat Actors: Knight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Website defacement of Asquare Pharmaceutical by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The NUCLIER-Y-C-C-M group successfully defaced the blog section of Asquare Pharmaceuticals website on March 29, 2026. This appears to be a targeted defacement against the Bangladeshi pharmaceutical company rather than part of a mass campaign.
    Date: 2026-03-28T19:02:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820994
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Bangladesh
    Victim Industry: Pharmaceutical
    Victim Organization: Asquare Pharmaceutical
    Victim Site: asquarepharmaceutical.com
  44. Website defacement of owiedreamclub.com by CYKOMNEPAL
    Category: Defacement
    Content: The CYKOMNEPAL threat actor successfully defaced the owiedreamclub.com website on March 29, 2026. This appears to be an isolated defacement incident targeting a single website rather than part of a broader campaign.
    Date: 2026-03-28T19:01:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820995
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Owie Dream Club
    Victim Site: owiedreamclub.com
  45. Alleged leak of credential combolist containing 1.1 million records
    Category: Combo List
    Content: A forum user shared a credential combolist containing 1.1 million URL-login-password combinations dated March 29, 2026. The content is hidden behind user registration requirements on the cracking forum.
    Date: 2026-03-28T19:00:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70213/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Alleged leak of mixed forum credential list
    Category: Combo List
    Content: A threat actor shared a collection of 81,000 mixed valid forum credentials in a combolist format on an underground forum.
    Date: 2026-03-28T19:00:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70216/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Website defacement of halo-guru.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: NUCLIER-Y-C-C-M defaced a classroom page on the Halo Guru educational website on March 29, 2026. The attack targeted a specific page rather than the main site, suggesting a targeted defacement of the online learning platform.
    Date: 2026-03-28T18:49:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820993
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Halo Guru
    Victim Site: halo-guru.com
  48. Alleged leak of PandaCloud email credential combolist
    Category: Combo List
    Content: Threat actor shared a credential combolist containing 5.2K email:password combinations branded as PandaCloud through a Telegram channel and file sharing platform. The actor claims to add fresh databases daily with only relevant and latest data.
    Date: 2026-03-28T18:48:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70210/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged leak of credential combolist containing 11GB of data
    Category: Combo List
    Content: A threat actor named Knight allegedly shared an 11GB credential combolist containing URL:LOGIN:PASS combinations on a cybercrime forum. The post content is hidden behind registration requirements, preventing further analysis of the specific data contents or victim details.
    Date: 2026-03-28T18:48:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70211/
    Screenshots:
    None
    Threat Actors: Knight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged leak of credential combolist containing 7 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 7 million URL:Login:Pass combinations on a cybercrime forum. The specific source or victim organization of these credentials is not disclosed in the available information.
    Date: 2026-03-28T18:47:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70212/
    Screenshots:
    None
    Threat Actors: Knight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Alleged sale of 200 credit card records
    Category: Data Leak
    Content: Threat actor claims to be selling 200 credit card records from USA.
    Date: 2026-03-28T18:45:32Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279392/
    Screenshots:
    None
    Threat Actors: old_pirat
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Website defacement of BitLogicX by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: NUCLIER-Y-C-C-M threat actor successfully defaced the BitLogicX company website on March 29, 2026. This was a targeted home page defacement rather than a mass attack campaign.
    Date: 2026-03-28T18:43:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820992
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: BitLogicX
    Victim Site: bitlogicx.com
  53. Alleged leak of Swedish email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 87,000 Swedish email and password combinations on a cybercriminal forum. The credentials are being distributed freely to registered forum users.
    Date: 2026-03-28T18:38:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70209/
    Screenshots:
    None
    Threat Actors: Immanuel_Kant
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged leak of Denmark credential data
    Category: Combo List
    Content: A threat actor is freely distributing a credential dataset containing 78,000 records allegedly from Denmark. The data is being shared on a cybercrime forum specializing in combolists and data dumps.
    Date: 2026-03-28T18:28:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70207/
    Screenshots:
    None
    Threat Actors: Immanuel_Kant
    Victim Country: Denmark
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged distribution of mixed corporate credential lists
    Category: Combo List
    Content: Threat actor CODER is distributing an 11 million record mixed corporate combolist through Telegram channels. The actor operates free Telegram groups sharing credential lists and programs.
    Date: 2026-03-28T18:27:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70208/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged leak of mixed email provider credentials
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 3,999 email credentials from various providers including Hotmail and other mixed email services. The credentials are being offered as a free download through Telegram contact.
    Date: 2026-03-28T18:08:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70204/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Mixed Email Providers
    Victim Site: Unknown
  57. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,700 allegedly valid Hotmail email credentials on a cybercrime forum. The credentials are described as TOP Quality and dated March 28th.
    Date: 2026-03-28T17:57:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70203/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  58. Alleged Data Breach of Good Food Store.
    Category: Data Breach
    Content: The group claims to have breached the database of Good Food Store in Missoula, USA, resulting in the deletion of 4 terabytes of data and forcing a complete shutdown of the store’s operations.
    Date: 2026-03-28T17:51:16Z
    Network: openweb
    Published URL: https://handala-hack.tw/4-terabytes-wiped-good-food-store-shut-down-after-major-cyberattack/
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: good food store
    Victim Site: goodfoodstore.com
  59. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Threat actor klyne05 shared a mixed email combolist on CrackingX forum, claiming the credentials are private, fresh, and checked. The post offers the credential list as a free download.
    Date: 2026-03-28T17:25:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70200/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged leak of mixed email credentials
    Category: Combo List
    Content: Actor snowstormxd shared a combolist containing mixed email credentials through free download links on Pasteview and Telegram. The data appears to be distributed at no cost to forum members.
    Date: 2026-03-28T17:12:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70199/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post distributing a free download of 510 Hotmail email credentials described as fresh and high quality.
    Date: 2026-03-28T17:02:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70198/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  62. Alleged leak of Gmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1.8 million Gmail email and password combinations, claiming the data consists of fresh leaks from shopping-related targets.
    Date: 2026-03-28T16:52:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70197/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Gmail
    Victim Site: gmail.com
  63. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 2,485 premium Hotmail credentials on a cybercrime forum. The credentials are described as valid and include mixed email accounts from a private cloud.
    Date: 2026-03-28T16:43:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70195/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  64. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor FlashCloud2 allegedly made available a collection of 1,800 validated Hotmail credentials on a cybercriminal forum. The post indicates these are private, verified credential pairs that require forum registration to access.
    Date: 2026-03-28T16:43:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70196/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  65. Mass defacement targeting Albanian government portal by maw3six
    Category: Defacement
    Content: Albanian municipal government website was defaced by threat actor maw3six as part of a mass defacement campaign. The attack targeted the online portal of the Municipality of Kavaje.
    Date: 2026-03-28T16:36:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248159
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Albania
    Victim Industry: Government
    Victim Organization: Municipality of Kavaje
    Victim Site: online.bashkiakavaje.gov.al
  66. Alleged leak of USA-based email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 2,750 email credentials with mail access, targeting USA-based accounts. The credentials are being distributed as a free download on a cybercriminal forum.
    Date: 2026-03-28T16:24:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70194/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged vulnerability leak of Fair Trade India
    Category: Vulnerability
    Content: Group claims to have leaked a vulnerability in Fair Trade India.
    Date: 2026-03-28T15:54:45Z
    Network: telegram
    Published URL: https://t.me/c/3807888281/283
    Screenshots:
    None
    Threat Actors: KONCO ERROR SYSTEM
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: fair trade india
    Victim Site: fairtradeindia.in
  68. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor noir claims to have valid Hotmail credentials available through their Telegram channel. The post advertises high-quality credential lists but requires forum registration to view full details.
    Date: 2026-03-28T15:52:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70193/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  69. Website defacement of velumds.com by maw3six
    Category: Defacement
    Content: The website velumds.com was defaced by threat actor maw3six on March 28, 2026. The attacker operated independently without team affiliation and compromised the cloud-hosted target.
    Date: 2026-03-28T15:45:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248158
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: velumds.com
  70. Alleged leak of German credential combolist via PandaCloud
    Category: Combo List
    Content: A threat actor shared a free German credential combolist containing 53,000 records via Telegram channel PandaCloud04. The actor claims to regularly add fresh email databases with only relevant and latest data.
    Date: 2026-03-28T15:41:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70192/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 3.6K mixed email credentials through a file sharing platform. The credentials appear to be from various email providers and were made available as a free download.
    Date: 2026-03-28T15:31:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70191/
    Screenshots:
    None
    Threat Actors: Kommander0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Mysterious Team Bangladesh claims to target Uganda
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Uganda.
    Date: 2026-03-28T15:22:58Z
    Network: telegram
    Published URL: https://t.me/MysteriousTeamO/53
    Screenshots:
    None
    Threat Actors: Mysterious Team Bangladesh
    Victim Country: Uganda
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Hax.or targets the website of United Pen Press
    Category: Defacement
    Content: The group claims to have defaced the website of United Pen Press.
    Date: 2026-03-28T15:16:05Z
    Network: telegram
    Published URL: https://t.me/ctifeeds/129396
    Screenshots:
    None
    Threat Actors: Hax.or
    Victim Country: USA
    Victim Industry: Publishing Industry
    Victim Organization: united pen press
    Victim Site: unitedpenpress.com
  74. Alleged leak of T-Online credentials
    Category: Combo List
    Content: A combolist containing 12,597 credentials targeting the T-Online domain was shared on a cybercriminal forum. The data was made available as a free download via a cloud storage link.
    Date: 2026-03-28T15:12:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70190/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Germany
    Victim Industry: Telecommunications
    Victim Organization: T-Online
    Victim Site: t-online.de
  75. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample of 1,030 Hotmail credentials on a cybercrime forum. The post appears to offer free access to the credential list rather than selling it.
    Date: 2026-03-28T15:02:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70189/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  76. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor allegedly leaked a combolist containing 2,800 Hotmail email credentials described as fresh and high quality.
    Date: 2026-03-28T14:51:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70188/
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  77. Alleged leak of European education sector credential list
    Category: Combo List
    Content: A threat actor shared a combolist containing 165,311 credential pairs allegedly targeting European educational institutions. The data is being distributed for free via a file sharing service.
    Date: 2026-03-28T14:41:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70185/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged sale of premium account upgrades for multiple services
    Category: Initial Access
    Content: Forum post advertising personal account upgrades for multiple popular services including Adobe, YouTube, Spotify, Discord, and Canva. No specific content details are available in the post.
    Date: 2026-03-28T14:41:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70187/
    Screenshots:
    None
    Threat Actors: bl4cklak3
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Adobe, YouTube, Spotify, Discord, Canva)
    Victim Site: Unknown
  79. Alleged leak of premium credential hits and email targets
    Category: Combo List
    Content: Threat actor leaked 459 premium credential hits along with inbox targets and country-sorted data on cracking forum. The leak includes working credentials and email targets organized by geographic location.
    Date: 2026-03-28T14:17:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70180/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 43,000 allegedly valid German email credentials dated March 28th on an underground forum.
    Date: 2026-03-28T14:16:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70182/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Mass defacement campaign by Zod targeting unitedpenpress.com
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting unitedpenpress.com on March 28, 2026. This was part of a broader mass defacement operation affecting multiple websites beyond the primary target.
    Date: 2026-03-28T14:05:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248157
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Media/Publishing
    Victim Organization: United Pen Press
    Victim Site: unitedpenpress.com
  82. Alleged data leak from Algeria Press Service
    Category: Data Breach
    Content: Group claims to have leaked database from Algeria Press Service. The compromised data include emails, contracts, internal data, passwords.
    Date: 2026-03-28T13:57:35Z
    Network: telegram
    Published URL: https://t.me/N3XUS_SH13LD/32?single
    Screenshots:
    None
    Threat Actors: N3XUS SH13LD
    Victim Country: Algeria
    Victim Industry: Newspapers & Journalism
    Victim Organization: algeria press service
    Victim Site: aps.dz
  83. Alleged leak of Japanese email credentials via PandaCloud service
    Category: Combo List
    Content: Threat actor distributes fresh Japanese credential lists containing 4,100 valid email and password combinations through Telegram channel and file sharing platform. The actor claims to add new credential databases daily.
    Date: 2026-03-28T13:56:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70179/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Alleged leak of WordPress credentials
    Category: Combo List
    Content: User zod shared WordPress credentials on CrackingX forum in the Combolists & Dumps section. The content is password protected and distributed via Telegram channel.
    Date: 2026-03-28T13:34:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70178/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: WordPress
    Victim Site: wordpress.com
  85. Alleged data leak shared via ULP by threat actor zod
    Category: Combo List
    Content: Threat actor zod shared a ULP (User Link Password) file on CrackingX forum with password-protected access via Telegram channel. The specific nature and scope of the leaked data is unclear from the available information.
    Date: 2026-03-28T13:24:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70176/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  86. Alleged Data Breach of Unidentified Business Products in North Country
    Category: Data Leak
    Content: Threat actor claims responsibility for breaching North Country Business Products, alleging that 2,680 POS terminals across 110 U.S. companies were taken offline, disrupting retail operations nationwide and causing significant business i
    Date: 2026-03-28T13:18:37Z
    Network: openweb
    Published URL: https://handala-hack.tw/north-country-business-products-breached-2680-pos-terminals-disabled-nationwide/
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Alleged leak of Russian email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 5,400 Russian email credentials with full mail access, dated March 28th. The credentials appear to be leaked or distributed for free download on a cybercrime forum.
    Date: 2026-03-28T13:12:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70174/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,700 Japanese email credentials dated March 28th, described as fresh and top quality.
    Date: 2026-03-28T13:12:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70175/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Alleged leak of Polish email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 11,150 email credential combinations, primarily targeting Polish users and other regions. The credentials are being distributed as a free download on cybercriminal forums.
    Date: 2026-03-28T13:01:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70173/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged sale of data from Indian Council of Medical Research (ICMR)
    Category: Data Breach
    Content: The threat actor claims to be selling data from Indian Council of Medical Research (ICMR). The compromised data reportedly contains 815 million records including including full names, father’s names, phone numbers, passport numbers, Aadhaar numbers, age, gender and detailed address information such as district, state, town, and pincode.
    Date: 2026-03-28T13:01:09Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-ICMR-Database-815-Million
    Screenshots:
    None
    Threat Actors: pow
    Victim Country: India
    Victim Industry: Government & Public Sector
    Victim Organization: indian council of medical research
    Victim Site: icmr.gov.in
  91. Alleged leak of cryptocurrency and banking credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.96 million credentials allegedly targeting cryptocurrency and banking platforms. The data is distributed via a file sharing service without apparent cost.
    Date: 2026-03-28T12:52:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70172/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Alleged leak of Chinese email credentials
    Category: Combo List
    Content: Forum post claims to share 1,200 fresh Chinese email access credentials dated March 28th. The content is hidden and requires forum registration to view.
    Date: 2026-03-28T12:38:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70171/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,550 mixed email credentials for free download on a cybercrime forum.
    Date: 2026-03-28T12:29:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70168/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a mixed credential combolist containing 175,086 lines of compromised credentials. The data is distributed for free through a Telegram channel.
    Date: 2026-03-28T12:29:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70169/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.7 million Hotmail email and password combinations through a file sharing service. The credentials are being distributed for free as a downloadable list targeting social media accounts.
    Date: 2026-03-28T12:29:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70170/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  96. Alleged leak of French email credentials
    Category: Combo List
    Content: A threat actor shared 1,600 allegedly fresh and valid French email access credentials dated March 28th on an underground forum.
    Date: 2026-03-28T12:19:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70167/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 28,000 mixed email credentials via a file hosting service. The credentials appear to be from various sources and are being distributed for free download.
    Date: 2026-03-28T12:09:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70165/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  98. Alleged sale of VPN access to a Manufacturing company in Netherlands
    Category: Initial Access
    Content: Threat actor claims to be selling VPN access to a Manufacturing company in Netherlands.
    Date: 2026-03-28T12:05:00Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279377/
    Screenshots:
    None
    Threat Actors: yesdaddy
    Victim Country: Netherlands
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 81,000 mixed forum credentials described as valid. The post was made available on a cracking forum in the combolists and dumps section.
    Date: 2026-03-28T11:50:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70162/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged Data Leak of GST Registered Profiles in Australia
    Category: Data Leak
    Content: Threat actor claims to be selling Australian GST-registered business profiles, including ABN details, entity info, and registration data. The listing mentions 125 records, a sample link, and a starting price of $5,000.
    Date: 2026-03-28T11:46:49Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279376/
    Screenshots:
    None
    Threat Actors: Auking
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Website defacement of Residie Ons by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced the residieons.com website on March 28, 2026. The incident targeted a specific storage configuration path on the victims web infrastructure.
    Date: 2026-03-28T11:41:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820985
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Residie Ons
    Victim Site: residieons.com
  102. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 27,000 valid email credentials from mixed sources dated March 28th. The credentials are being distributed for free to registered forum users.
    Date: 2026-03-28T11:40:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70161/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Alleged Sale of Binance User Database
    Category: Data Leak
    Content: The threat actor claims to be selling Binance User Database. The compromised data reportedly contains 1.5 million user records including including full names, email addresses, phone numbers, registered country details, account creation dates, KYC status , login activity logs (IP addresses, timestamps, 2FA status.
    Date: 2026-03-28T11:33:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SELLING-1-5M-Fresh-Binance-User-Database-Full-PII-Login-Activity-2024-2025
    Screenshots:
    None
    Threat Actors: PexRat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: binance
    Victim Site: binance.com
  104. Alleged leak of Gmail credentials
    Category: Combo List
    Content: Threat actor D4rkNetHub allegedly made available over 100,000 Gmail credentials on a cybercrime forum. The post is restricted and requires registration to view full details.
    Date: 2026-03-28T11:02:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70159/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  105. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 314 Hotmail credential hits, sorted by countries and including inbox targets. The credentials are being made available for free download on a cybercrime forum.
    Date: 2026-03-28T11:02:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70160/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  106. Alleged Sale of Travel Software Database From Spain
    Category: Data Leak
    Content: The threat actor claims to be selling Travel Software Database From Spain. The The compromised data reportedly contains 170K users records, 310K Twitter Accounts records, 350K Geo Address records including including usernames, full names, email addresses, passwords, account metadata and more
    Date: 2026-03-28T10:53:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Spain-Travel-Software-170k
    Screenshots:
    None
    Threat Actors: DeltaForceUnit
    Victim Country: Spain
    Victim Industry: Software
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Alleged access to an unidentified CCTV camera in Poland
    Category: Initial Access
    Content: The group claims to have accessed the surveillance system of an unidentified laboratory in Poland.
    Date: 2026-03-28T10:43:52Z
    Network: telegram
    Published URL: https://t.me/Z_Pentest_Alliance_ru/912
    Screenshots:
    None
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Alleged leak of crypto-banking combolist containing 1.4 million credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,412,667 credentials allegedly targeting crypto-banking services. The credential list is being distributed for free via a file sharing platform.
    Date: 2026-03-28T10:35:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70157/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged distribution of mixed credential combolists targeting multiple countries and platforms
    Category: Combo List
    Content: Threat actor distributes mixed credential combolists containing login data from multiple countries (France, Germany, Italy, etc.) and platforms including gaming sites, e-commerce platforms (PayPal, Amazon, eBay), and streaming services (Twitch) through Telegram channels.
    Date: 2026-03-28T10:34:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70158/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Alleged sale of Paisplus database
    Category: Data Breach
    Content: The threat actor claims to be selling the database of Paisplus, the dataset contains Employee data, company data, customer data, and company investors.
    Date: 2026-03-28T10:33:05Z
    Network: telegram
    Published URL: https://t.me/DedaleOffice/1226
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Israel
    Victim Industry: Financial Services
    Victim Organization: paisplus
    Victim Site: paisplus.co.in
  111. Alleged sale of multiple identity document templates and personal databases
    Category: Data Breach
    Content: Threat actor claims to offer various identity documents including driver licenses, passports, SSNs, and multiple databases containing personal information, consumer data, phone numbers, and email addresses. Contact is provided via Telegram for potential transactions.
    Date: 2026-03-28T10:24:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70156/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged access to unidentified CCTV cameras in Israel
    Category: Initial Access
    Content: The group claims to have accessed unidentified CCTV cameras in Israel.
    Date: 2026-03-28T10:19:05Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/158
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.4 million Hotmail email and password combinations through a file sharing service. The credentials are being distributed for free download.
    Date: 2026-03-28T10:15:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70155/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  114. Alleged Data Breach Of Isthmus Technological Institute
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Isthmus Technological Institute. The compromised data reportedly including full names, phone numbers, personal email addresses, dates of birth, age, domicile information, CURP (national ID), health/insurance indicators, disability status, indigenous language information, household composition, income related data.
    Date: 2026-03-28T10:12:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-M%C3%89XICO-INSTITUTO-TECNOL%C3%93GICO-DEL-ISTMO
    Screenshots:
    None
    Threat Actors: SpeakTeam
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: isthmus technological institute
    Victim Site: iti.com.pa
  115. Alleged Leak of Rowo Kandangan Village Population Database
    Category: Data Leak
    Content: The threat actor claims to be leaked Rowo Kandangan Village Population Database. The compromised data reportedly contains population records, including national ID numbers (NIK), family card numbers (KK), full names, gender, dates of birth, address details, marital status, education level, religion, occupation, and blood type.
    Date: 2026-03-28T10:01:05Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-LEAK-MASTER-BOOK-OF-ROWO-KANDANGAN-VILLAGE-TEMANGGUNG-REGENCY
    Screenshots:
    None
    Threat Actors: ANONB2H
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Website defacement of recepta2u.pl by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the recepta2u.pl website on March 28, 2026. The attack targeted a Polish healthcare-related service and was documented in zone-xsec mirror archives.
    Date: 2026-03-28T09:59:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820984
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Healthcare
    Victim Organization: Recepta2U
    Victim Site: recepta2u.pl
  117. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a list of 1,500 alleged Hotmail credentials on a cybercrime forum, promoting a Telegram channel for fresh email credential lists. The credentials are being distributed for free download.
    Date: 2026-03-28T09:46:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70154/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  118. Alleged leak of 41,000 email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 41,000 valid email credentials on a cybercriminal forum. The data is being distributed for free to registered forum users.
    Date: 2026-03-28T09:37:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70153/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Website defacement of Might International by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Might International website on March 28, 2026. The attack targeted a specific subdirectory of the companys domain.
    Date: 2026-03-28T09:20:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820983
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Might International
    Victim Site: mightinternational.com
  120. Alleged Sale of Unauthorized Access to electronics manufacturing industry in India
    Category: Initial Access
    Content: Threat actor claims to be selling domain users and many local admins access to electronics manufacturing industry in India
    Date: 2026-03-28T09:00:46Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279367/
    Screenshots:
    None
    Threat Actors: Ritsu08
    Victim Country: India
    Victim Industry: Electrical & Electronic Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Alleged Sale of VNC protocol pentesting
    Category: Initial Access
    Content: Threat actor claims to be selling VNC protocol pentesting project with $1,000 price.
    Date: 2026-03-28T08:50:13Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279365/
    Screenshots:
    None
    Threat Actors: budda12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  122. Website defacement of Fleurieu Peninsula Visitor Guide by Aptisme
    Category: Defacement
    Content: The attacker Aptisme successfully defaced the Fleurieu Peninsula Visitor Guide tourism website on March 28, 2026. This was a single home page defacement targeting the Australian tourism organizations main website.
    Date: 2026-03-28T08:35:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820978
    Screenshots:
    None
    Threat Actors: Aptisme
    Victim Country: Australia
    Victim Industry: Tourism
    Victim Organization: Fleurieu Peninsula Visitor Guide
    Victim Site: fleurieupeninsulavisitorguide….
  123. Website defacement of obomlugar.com by Aptisme
    Category: Defacement
    Content: The website obomlugar.com was defaced by the attacker Aptisme on March 28, 2026. This was a single home page defacement with no associated team or mass campaign.
    Date: 2026-03-28T08:34:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820979
    Screenshots:
    None
    Threat Actors: Aptisme
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: obomlugar.com
  124. Website defacement of morshidak.com by Aptisme
    Category: Defacement
    Content: Attacker Aptisme successfully defaced the morshidak.com website on March 28, 2026. The defacement targeted a specific page (art.html) rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-03-28T08:34:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820980
    Screenshots:
    None
    Threat Actors: Aptisme
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: morshidak.com
  125. Alleged leak of login access to Registro Nacional de Identificación y Estado Civil
    Category: Initial Access
    Content: The group claims to have leaked login access to Registro Nacional de Identificación y Estado Civil.
    Date: 2026-03-28T08:30:15Z
    Network: telegram
    Published URL: https://t.me/crakaizenchannel/572
    Screenshots:
    None
    Threat Actors: Crakaizen Channel
    Victim Country: Peru
    Victim Industry: Government Administration
    Victim Organization: registro nacional de identificación y estado civil
    Victim Site: reniec.gob.pe
  126. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: A threat actor posted a combolist containing 5,000 unique Hotmail credentials on the CrackingX forum. The content is hidden behind a registration requirement.
    Date: 2026-03-28T08:25:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70148/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  127. Alleged leak of Casino User Database From Usa
    Category: Data Leak
    Content: The threat actor claims to be leaked 400K Casino User Database From Usa
    Date: 2026-03-28T08:17:34Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-SELLING-USA-Casino-user-DB-400K
    Screenshots:
    None
    Threat Actors: Sabit
    Victim Country: USA
    Victim Industry: Gambling & Casinos
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged leak of mixed domain combolist
    Category: Combo List
    Content: A combolist containing 33,126 credential entries targeting mixed domains has been made available for free download via a file sharing service.
    Date: 2026-03-28T08:16:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70147/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged Sale of BNC Canada Crypto Leads Database
    Category: Data Leak
    Content: The threat actor claims to be selling 1M Records of BNC Canada Crypto Leads Database
    Date: 2026-03-28T08:14:11Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-COLLECTION-BNC-Canada-Crypto-1-Million-Leads
    Screenshots:
    None
    Threat Actors: Rodela
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged leak of German shopping site credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.1 million credential pairs allegedly targeting German shopping websites. The data is being distributed for free via a file-sharing service.
    Date: 2026-03-28T08:07:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70146/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Alleged distribution of credential combolists via Telegram channels
    Category: Combo List
    Content: Threat actor CODER is distributing free credential combolists and programs through multiple Telegram channels. The actor is soliciting direct contact via Telegram for additional combo materials.
    Date: 2026-03-28T07:58:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70144/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  132. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,443 allegedly valid Hotmail email and password combinations. The credentials are described as premium hits from a private cloud and mixed mail sources.
    Date: 2026-03-28T07:58:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70145/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  133. Website defacement of Nepmeds by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Nepmeds healthcare website on March 28, 2026. The attack targeted a specific page on the Nepalese medical services platform.
    Date: 2026-03-28T07:33:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820970
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Healthcare
    Victim Organization: Nepmeds
    Victim Site: www.nepmeds.com.np
  134. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample combolist containing 1,410 Hotmail email and password combinations on a cybercrime forum. The credentials are being distributed as a free download sample.
    Date: 2026-03-28T07:30:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70143/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  135. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum user allegedly shared a combolist containing 1,495 fresh Hotmail email and password combinations for free download.
    Date: 2026-03-28T07:20:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70141/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  136. Website defacement of Avaz by Aptisme
    Category: Defacement
    Content: The attacker Aptisme defaced a specific page on the Vietnamese website avaz.com.vn on March 28, 2026. This was an isolated defacement targeting a single page rather than a mass or home page attack.
    Date: 2026-03-28T07:10:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820969
    Screenshots:
    None
    Threat Actors: Aptisme
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: avaz.com.vn
  137. Alleged leak of stealer logs with mixed credentials
    Category: Combo List
    Content: Threat actor fatetraffic shared stealer logs containing 1,054 mixed credentials via file sharing platform with password protection.
    Date: 2026-03-28T06:48:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70140/
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Alleged leak of Yahoo Japan credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,541 credential entries specifically targeting Yahoo Japan (yahoo.co.jp) domain users via a file sharing platform.
    Date: 2026-03-28T06:07:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70138/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Japan
    Victim Industry: Technology
    Victim Organization: Yahoo Japan
    Victim Site: yahoo.co.jp
  139. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 161,822 credential pairs specifically targeting Yahoo domain users through a file sharing platform.
    Date: 2026-03-28T05:57:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70137/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  140. Alleged data breach of Chronopost
    Category: Data Breach
    Content: A threat actor claims to have leaked a database belonging to Chronopost, a French courier service. The dataset reportedly contains approximately 860,000 customer records, including personal details such as names, email addresses, and parcel-related information like tracking numbers, delivery details, locker locations, and shipment status.
    Date: 2026-03-28T05:47:16Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-FR-Chronopost-860k
    Screenshots:
    None
    Threat Actors: aeter
    Victim Country: France
    Victim Industry: Transportation & Logistics
    Victim Organization: chronopost
    Victim Site: chronopost.fr
  141. Alleged data breach of Fenie Energía S.A.
    Category: Data Breach
    Content: A threat actor claims to have breached the database of Fenie Energia. The leaked data reportedly includes a large dataset of 430GB, containing sensitive information such as ID card details, contracts, financial/card-related data, personal information, contact details, IBAN numbers, billing records, and corporate data.
    Date: 2026-03-28T05:37:27Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-ES-Spain-Electricity-Company-FENIE-Energia
    Screenshots:
    None
    Threat Actors: spain
    Victim Country: Spain
    Victim Industry: Energy & Utilities
    Victim Organization: fenie energía s.a.
    Victim Site: fenieenergia.es
  142. Alleged data breach of Alcaldía de Medellín
    Category: Data Breach
    Content: A threat actor claims to have leaked data from the Medellín government platform, exposing a wide range of administrative and operational records. The compromised dataset reportedly includes citizen and client information, official case records, financial and accounting data, inventory logs, internal and external documents, as well as active user and system-related information.
    Date: 2026-03-28T05:36:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-CO-MEDELLIN-GOV-CO-FREE-LEAK
    Screenshots:
    None
    Threat Actors: NyxarGroup
    Victim Country: Colombia
    Victim Industry: Government & Public Sector
    Victim Organization: alcaldía de medellín
    Victim Site: medellin.gov.co
  143. Alleged data breach of Imej Parking Sdn Bhd
    Category: Data Breach
    Content: A threat actor claims to have leaked the full infrastructure of Imej Parking Sdn Bhd.The data reportedly includes a large database containing over 138 tables and tens of thousands of customer records. the exposed data may include usernames, email addresses, phone numbers, physical addresses, and identification details.
    Date: 2026-03-28T05:21:35Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-MALAYSIA-Imej-Parking-Sdn-Bhd-%E2%80%93-Full-Infrastructure-Leak-Few-GOV-Data
    Screenshots:
    None
    Threat Actors: k4y0s3
    Victim Country: Malaysia
    Victim Industry: Transportation & Logistics
    Victim Organization: imej parking sdn bhd
    Victim Site: imej.com.my
  144. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor klyne05 shared a combolist containing Hotmail email credentials on a cybercriminal forum. The post claims the credentials are private, fresh, and verified.
    Date: 2026-03-28T05:19:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70136/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  145. Website defacement of ogledharma.xyz by MatrixMan (ikan julung julung team)
    Category: Defacement
    Content: The website ogledharma.xyz was defaced by the attacker MatrixMan, affiliated with the team ikan julung julung, on March 28, 2026. This was classified as a home page defacement rather than a mass defacement campaign.
    Date: 2026-03-28T05:13:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820963
    Screenshots:
    None
    Threat Actors: MatrixMan, ikan julung julung
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ogledharma.xyz
  146. Website defacement of mes-lucioles-fractales.ch by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: The website mes-lucioles-fractales.ch was defaced by attacker aexdy, affiliated with the Leviathan Perfect Hunter group, on March 28, 2026. This was identified as a home page defacement incident.
    Date: 2026-03-28T05:12:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820964
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mes-lucioles-fractales.ch
  147. Alleged leak of mixed forums credential combolist
    Category: Combo List
    Content: A threat actor shared an 81,000 record combolist containing mixed credentials from various forums. The post indicates the credentials are valid forum accounts.
    Date: 2026-03-28T04:45:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70135/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  148. Alleged data leak of Kash Patel Emails
    Category: Data Leak
    Content: The threat actor claims to have leaked personal data associated with Kash Patel. The exposed data including emails, photographs, work-related documents, and other personal records.
    Date: 2026-03-28T04:11:01Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Hacked-Kash-Patel-Emails-Handala
    Screenshots:
    None
    Threat Actors: cementine
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  149. Alleged data breach of Gauteng Provincial Government
    Category: Data Breach
    Content: A threat actor claims to have breached the systems of the Gauteng Provincial Government.The dataset reportedly contains approximately 3.6 million files related to government operations. which expose sensitive government data and internal records.
    Date: 2026-03-28T04:03:00Z
    Network: tor
    Published URL: http://37lfmtakhknzx5t6k57ieijkiqrc4c3kpimfvrmafva25ut2tknvw3yd.onion/
    Screenshots:
    None
    Threat Actors: XP95
    Victim Country: South Africa
    Victim Industry: Government & Public Sector
    Victim Organization: gauteng provincial government
    Victim Site: gauteng.gov.za
  150. Alleged data leak of UAE Passport
    Category: Data Leak
    Content: The group claims to have leaked data related to UAE Passports.
    Date: 2026-03-28T03:58:37Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1320
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  151. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 284,319 Hotmail email and password combinations from mixed countries via a file sharing service.
    Date: 2026-03-28T03:48:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70133/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  152. Alleged leak of mixed country credential combolist
    Category: Combo List
    Content: A credential combolist containing 1,768,548 records from mixed countries was shared for free download via Mega file hosting service.
    Date: 2026-03-28T03:47:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70134/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Alleged data leak of China Data
    Category: Data Leak
    Content: The threat actor claims to have leaked a large dataset associated with China organizations. The exposed dataset is claimed to be approximately 100GB and includes a mix of sensitive information such as personal data, enterprise documents, financial records, contracts, internal files, and event-related data.
    Date: 2026-03-28T03:37:49Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1273
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  154. Alleged sale of email service credentials including Hotmail and Office365
    Category: Data Breach
    Content: Threat actor richishim advertises credential services for multiple email providers including Hotmail, Skynet, Orange, and EDU Office365 accounts on cybercriminal forum.
    Date: 2026-03-28T03:37:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70132/
    Screenshots:
    None
    Threat Actors: richishim
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  155. Cyber Attack Hits Volkswagen associated with Subdomain Compromise
    Category: Defacement
    Content: News regarding a cyberattack targeting Volkswagen has emerged, with claims that Turkish hacktivists compromised a company subdomain.
    Date: 2026-03-28T03:33:27Z
    Network: openweb
    Published URL: https://x.com/nullsecurityx/status/2037632267737043222
    Screenshots:
    None
    Threat Actors:
    Victim Country: Germany
    Victim Industry: Automotive
    Victim Organization: volkswagen
    Victim Site: Unknown
  156. Alleged leak of Shomrim database
    Category: Data Leak
    Content: The group claims to have leaked Shomrim database
    Date: 2026-03-28T03:18:39Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1314
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: UK
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: shomrim database
    Victim Site: shomrimlondon.org.uk
  157. Alleged access to multiple CCTV surveillance systems in USA
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to multiple CCTV surveillance systems in USA
    Date: 2026-03-28T03:11:42Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/611
    Screenshots:
    None
    Threat Actors: MORNING STAR
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Alleged data breach of Ministry of National Defence Romania (MAPN)
    Category: Data Breach
    Content: The group claims to have leaked data from Ministry of National Defence Romania (MAPN)
    Date: 2026-03-28T03:04:03Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1306
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: Romania
    Victim Industry: Government Administration
    Victim Organization: ministry of national defence romania (mapn)
    Victim Site: mapn.ro
  159. Alleged breach of Israeli Air Force
    Category: Data Breach
    Content: the group claims to have leaked data from Israeli Air Force.
    Date: 2026-03-28T02:59:27Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1312
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: Israel
    Victim Industry: Government Administration
    Victim Organization: israeli air force
    Victim Site: iaf.org.il
  160. Alleged leak of Israeli WhatsApp Numbers Database
    Category: Data Leak
    Content: The group claims to have leaked Israeli WhatsApp Numbers Database.
    Date: 2026-03-28T02:50:27Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1318?single
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged leak of Israel Transport Infrastructure People’s Information
    Category: Data Leak
    Content: The group claims to have leaked Israel Transport Infrastructure People’s Information.
    Date: 2026-03-28T02:47:42Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1318
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: Israel
    Victim Industry: Transportation & Logistics
    Victim Organization: israel transport infrastructure
    Victim Site: iroads.co.il
  162. Alleged leak of Israeli Banks Card Data
    Category: Data Leak
    Content: The group claims to have leaked Israeli Banks Card Data
    Date: 2026-03-28T02:40:14Z
    Network: telegram
    Published URL: https://t.me/cybersecunity/1318?single
    Screenshots:
    None
    Threat Actors: CYBER U.N.I.T.Y
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged EBT fraud and money laundering service advertisement
    Category: Combo List
    Content: Threat actor advertises EBT (Electronic Benefits Transfer) cash-out services claiming to operate multiple stores and markets for fraudulent benefit conversion across any US state with same-day payment and no limits.
    Date: 2026-03-28T02:34:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70130/
    Screenshots:
    None
    Threat Actors: jzebi05450
    Victim Country: United States
    Victim Industry: Government Services
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Alleged data breach of CoinMarketCap user database
    Category: Data Breach
    Content: Forum user claims to have access to 3 million CoinMarketCap cryptocurrency user email addresses, allegedly targeting the data for marketing purposes. Multiple sample email addresses from various domains were provided as proof of the dataset.
    Date: 2026-03-28T02:33:09Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-DATABASE-3M-COINMARKETCAP-CRYPTO-USERS-EMAIL-DATA-FOR-MARKETING
    Screenshots:
    None
    Threat Actors: splet03
    Victim Country: Unknown
    Victim Industry: Cryptocurrency
    Victim Organization: CoinMarketCap
    Victim Site: coinmarketcap.com
  165. Alleged leak of phone number and password credentials
    Category: Combo List
    Content: A threat actor shared what appears to be a credential list containing phone numbers and passwords, described as high quality and private content.
    Date: 2026-03-28T02:15:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70127/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Alleged leak of WordPress credentials
    Category: Combo List
    Content: Forum post claims to contain WordPress login credentials in URL:LOGIN:PASS format. No post content was available to verify the claim or determine scope.
    Date: 2026-03-28T02:15:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70128/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Alleged leak of credential combolist in URL:LOGIN:PASS format
    Category: Combo List
    Content: A threat actor is sharing a credential combolist containing login credentials in URL:LOGIN:PASS format, advertised as high quality and private. The post appears to be offering free access to the credential list on a cracking forum.
    Date: 2026-03-28T02:05:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70124/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  168. Alleged distribution of credential combolist targeting USA and Europe
    Category: Combo List
    Content: A threat actor is distributing a combolist containing credential combinations targeting users from the United States and Europe. The post advertises this as an exclusive hits mix combolist.
    Date: 2026-03-28T02:05:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70125/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  169. Alleged distribution of credential lists targeting Europe and USA
    Category: Combo List
    Content: Threat actor claims to distribute high quality credential lists (combolists) targeting users in Europe and USA regions. The post advertises the credentials as fully valid but lacks specific details about sources or record counts.
    Date: 2026-03-28T02:04:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70126/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Alleged data breach with cracked accounts shared on CrackingX forum
    Category: Combo List
    Content: User Kinglukeman shared cracked accounts on CrackingX forum dated March 27, 2026, but specific details about the data are hidden behind registration requirements.
    Date: 2026-03-28T01:52:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70122/
    Screenshots:
    None
    Threat Actors: Kinglukeman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 3,700 alleged Hotmail email and password combinations dated March 28, 2026. The credentials are being distributed for free download via Mediafire and promoted through Telegram contact.
    Date: 2026-03-28T01:52:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70123/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  172. Alleged forum post with unclear content
    Category: Alert
    Content: Forum post contains only repeated w characters with no discernible threat intelligence value or actionable information.
    Date: 2026-03-28T01:51:16Z
    Network: openweb
    Published URL: https://breachforums.sb/Thread-wwwwwwwwwww
    Screenshots:
    None
    Threat Actors: wd1010
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Alleged leak of mixed corporate credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 183,795 credential pairs targeting mixed corporate entities, made available as a free download via file sharing service.
    Date: 2026-03-28T01:34:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70120/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Alleged leak of mixed domain credential list
    Category: Combo List
    Content: A credential list containing 8,577 lines targeting mixed domains has been made available for free download on a cybercriminal forum.
    Date: 2026-03-28T01:33:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70121/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Alleged data breach of Webull
    Category: Data Breach
    Content: A threat actor claims to be selling a large dataset allegedly sourced from the Webull app. The database reportedly contains approximately 2.6 million unique investor records.The Exposed data may include full names, phone numbers, email addresses, and dates of birth.
    Date: 2026-03-28T01:22:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-American-stock-market-investors-securities-2600K
    Screenshots:
    None
    Threat Actors: datasource
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: webull
    Victim Site: webull.com
  176. Alleged Sale of Unauthorized Access to an Unidentified Chinese Luxury Retail Company
    Category: Initial Access
    Content: A threat actor claims to be selling unauthorized firewall access to a luxury retail company based in China.The access reportedly provides administrator-level privileges on a Linux-based system.
    Date: 2026-03-28T01:20:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Access-3-access-China-Luxury-retail-company
    Screenshots:
    None
    Threat Actors: BCXIII
    Victim Country: China
    Victim Industry: Retail Industry
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to offer valid Hotmail credentials through a private cloud service. The threat actor promotes access to these credential lists via Telegram contact.
    Date: 2026-03-28T01:09:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70119/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  178. Alleged data leak of German Citizens Database
    Category: Data Leak
    Content: A threat actor claims to be selling a database allegedly containing records of German citizens.The dataset reportedly includes approximately 622,000 records in SQL/CSV format. The exposed data fields may include names, email addresses, phone numbers, and physical addresses.
    Date: 2026-03-28T00:58:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Germany-Citizens-Database-622k
    Screenshots:
    None
    Threat Actors: fent888
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  179. Alleged leak of private logs data
    Category: Combo List
    Content: User maicolpg19 shared a password-protected download link containing approximately 2GB of private logs data on a cybercrime forum. The specific nature and origin of the logs remains unclear from the limited post information.
    Date: 2026-03-28T00:48:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70118/
    Screenshots:
    None
    Threat Actors: maicolpg19
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  180. Alleged leak of Gmail credentials on CrackingX forum
    Category: Combo List
    Content: A threat actor claims to have leaked over 100,000 Gmail credentials on the CrackingX forum. The post content is hidden behind registration requirements, making verification of the claims difficult.
    Date: 2026-03-28T00:16:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70116/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  181. Website defacement of predatorhama.com by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The website predatorhama.com was defaced by attacker tirz4sec, affiliated with the jatengblekhet team, on March 28, 2026. This appears to be a single-target defacement incident with no specified motivation or reasoning provided.
    Date: 2026-03-28T00:12:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/820924
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: predatorhama.com
  182. BABAYO EROR SYSTEM targets the website of neriva.space
    Category: Defacement
    Content: The group claims to have defaced the website of neriva.space
    Date: 2026-03-28T00:02:49Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/404
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Information Services
    Victim Organization: neriva.space
    Victim Site: neriva.space