[April-6-2026] Daily Cybersecurity Threat Report

1. Executive Summary This comprehensive report provides an exhaustive, in-depth analysis of a vast array of global cybersecurity incidents, drawing exclusively from recent threat intelligence data. The analyzed dataset captures a highly volatile cyber threat landscape, documenting hundreds of discrete events that occurred over a condensed timeframe in early April 2026. These incidents encompass a wide spectrum of malicious activities, including catastrophic data breaches, rampant distribution of credential combo lists, widespread website defacements, sophisticated supply chain compromises, and targeted cyber-kinetic attacks against critical national infrastructure.

The intelligence reveals that threat actors are operating with unprecedented scale and audacity. For instance, financially motivated groups like ShinyHunters have claimed responsibility for exfiltrating hundreds of millions of highly sensitive records from government and corporate entities, including the National Credit Information Center of Vietnam and Cisco systems. Simultaneously, the proliferation of “Cybercrime-as-a-Service” is evident through the massive distribution of credential lists—some containing upwards of 133 million records—by actors such as “Leak Realm” and “CODER,” fueling global credential stuffing campaigns.

Furthermore, the report highlights a disturbing trend of geopolitically motivated cyber attacks. Hacktivist groups and state-aligned actors, such as Homeland Justice, Handala, and the Z-PENTEST Alliance, are increasingly targeting critical infrastructure, ranging from Albanian government networks to South Korean water treatment facilities and Middle Eastern satellite communications. Meanwhile, opportunistic actors like DimasHxR, maw3six, and Nicotine (Umbra Community) continue to exploit fundamental web vulnerabilities, executing mass defacement campaigns that disrupt business operations across Europe, Asia, and the Americas. This report synthesizes these complex events, categorizing them by threat vector, profiling the responsible adversaries, analyzing victimology, and providing a strategic conclusion on the current state of global cyber risk.

2. Introduction and Threat Landscape Overview In the contemporary digital era, the frequency, sophistication, and impact of cyber attacks have reached critical levels. The threat intelligence data analyzed herein serves as a stark testament to the relentless nature of modern cyber adversaries. The dataset, encompassing events primarily logged between April 5 and April 7, 2026, provides a granular view of the tactics, techniques, and procedures (TTPs) employed across the cybercriminal ecosystem.

The current threat landscape is multifaceted. At one end of the spectrum, highly organized cybercriminal syndicates operate as sophisticated enterprises, focusing on high-yield data extortion, initial access brokering, and intellectual property theft. At the other end, ideologically driven hacktivists and state-sponsored advanced persistent threats (APTs) utilize cyber operations to achieve geopolitical objectives, often targeting critical infrastructure where disruption can have physical and societal consequences. Bridging the gap are opportunists and script kiddies who leverage automated tools to exploit low-hanging fruit, such as unpatched content management systems (CMS), resulting in widespread website defacements.

This report aims to systematically dissect this intelligence. By categorizing the incidents into distinct taxonomies—Data Breaches, Combo Lists, Website Defacements, Critical Infrastructure Attacks, and Malware/Vulnerabilities—we can identify macro-level trends. A detailed examination of these categories will reveal the extent of the vulnerabilities plaguing global networks and the urgent necessity for proactive, intelligence-driven cybersecurity postures.

3. Categorized Analysis of Cybersecurity Events

3.1. High-Impact Data Breaches and Information Leaks Data breaches represent a profound threat to privacy, corporate security, and national stability. The dataset highlights several monumental breaches involving the theft and attempted sale of massive datasets.

  • National Credit Information Center of Vietnam (CIC): In a highly severe incident, the notorious threat actor ShinyHunters claimed to be selling the complete database of Vietnam’s National Credit Information Center (cic.gov.vn). The dataset allegedly contains over 160 million records in CSV format. The compromised data is exceptionally sensitive, encompassing full names, dates of birth, national ID numbers (CCCD/CMND), passport numbers, detailed loan data, account balances, debt information, tax IDs, and addresses for both individuals and corporate entities. The asking price for this massive trove of financial intelligence was set at $75,000 USD, distributed via BreachForums and dark web communication channels.
  • Cisco Systems: ShinyHunters also claimed responsibility for a significant breach of the multinational technology conglomerate Cisco. The actors alleged the exfiltration of over 3 million Salesforce records containing Personally Identifiable Information (PII), alongside internal corporate data, AWS storage contents, and GitHub repositories. Crucially, the threat actors claimed to possess proprietary Cisco source code for various Artificial Intelligence products, including AI Assistants, AI Defense, and AI Cisco Cloud Control. The group demanded $50,000 for the data and publicly taunted Cisco security executives, attempting to extort the company by threatening public release.
  • Vantage Media AI: A catastrophic breach impacted Vantage Media AI, resulting in the alleged theft of a 381 GB MongoDB database dump. The threat actor “Sorb” offered this dataset for $15,000, claiming it contained 628 million email addresses along with extensive personal information, including physical addresses, phone numbers, employment data, and LinkedIn profiles.
  • Lockheed Martin: In an incident with severe national security implications, a threat actor named “Brona Blanco” leaked highly sensitive data belonging to defense contractor Lockheed Martin. The leaked materials were described as “Proof of Concept” parts 2 and 3, comprising avionics subsystem firmware, calibration data, and telemetry systems. Specifically, the data related to Helmet-Mounted Displays (HMD), landing gear systems, and Block 4 configurations, indicating a deep compromise of military aerospace technology.
  • Edmunds Automotive Platform: Threat actor “Blastoize” advertised a full dump of the Edmunds automotive research platform, allegedly breached in early 2026. The database reportedly contains 30 million user records, including emails, passwords (some in plaintext, others base64 hashed), and vehicle reports spanning from 2018 to 2022.
  • Kbank Vietnam: A threat actor identified as “hackboy” claimed to sell a database containing over 10 million customer records from Kbank Vietnam. This highly sensitive financial dataset allegedly included national IDs, salary information, credit scores, and risk classifications.
  • AlumnForce: Targeting the French education sector, actor “HexDex” offered the personal data of 2.7 million individuals from AlumnForce, a platform managing alumni networks. The breach reportedly affected 49 French educational institutions, exposing contact details, education records, and employment histories.
  • Additional Notable Breaches: The intelligence details numerous other significant breaches, including ProCamps (623,000 records of sports marketing data), Success.com (267,000 user records including billing details), SongTrivia2.io (291,000 records including password hashes and API keys), Cuties.AI (153,000 records from an NSFW AI platform), Space Coast Area Transit (30,000 user records and 14,600 transit pass records with credit card data), the Huila Government in Colombia (extranet employee data), the Government of Liberia Ministry of Mines & Energy, and the Mexican tax administration (SAT) involving 13 million taxpayer records.

3.2. The Credential Stuffing Epidemic: Combo Lists and Stealer Logs The dataset reveals an industrial-scale operation centered on the aggregation and distribution of credential “combo lists” (username/email and password pairs) and malware stealer logs. These lists are the primary fuel for automated credential stuffing attacks, leading to widespread account takeovers.

  • Massive Aggregations: Several threat actors demonstrated the capability to distribute incomprehensibly large datasets. “Leak Realm” claimed to have leaked lists containing 133 million and 61 million credentials on cybercrime forums. Actor “CODER” was observed distributing multiple massive lists through Telegram, including compilations of 14 million, 12 million, 11 million, and 9 million records. These lists explicitly targeted high-value platforms such as Facebook, LinkedIn, Twitter, TikTok, Netflix, Instagram, and various cryptocurrency and Web3 platforms (Ethereum, Polygon, Mastodon).
  • Targeting Email Providers (Hotmail Focus): Microsoft’s Hotmail service appears to be disproportionately targeted or favored by credential brokers. The dataset contains dozens of discrete events involving the leak or sale of Hotmail credentials. Actors like “MailAccesss,” “NUllSHop0X,” “el_capitan,” and “Kotowka” distributed Hotmail-specific lists ranging in size from a few hundred “premium” verified hits to massive dumps containing 1 million, 664,000, 480,000, and 360,000 records. Furthermore, specialized “checking tools” designed to rapidly validate Hotmail credentials and search inboxes for keywords were distributed freely.
  • Geographically Targeted Credentials: Threat actors, notably “thejackal101” (often associated with “Elite Cloud” or “Elite_Cloud1” data), demonstrated a strategic approach by curating and releasing combo lists based on the victims’ country of origin. Observed leaks included specific targeting of Poland (600,000 records), Australia (350,000 records), Brazil (321,000 records), Austria (290,000 records), Spain (264,000 records), Mexico (250,000 records), Japan (160,000 records), as well as targeted lists for Taiwan, Sweden, Turkey, Switzerland, Thailand, Argentina, Bangladesh, and Belgium.
  • Stealer Logs: Beyond traditional database breaches, threat actors actively distributed “stealer logs” harvested by information-stealing malware (such as ULP). Actors like “UP_DAISYCLOUD,” “watercloud,” and “fatetraffic” shared thousands of fresh logs daily. One massive dump by “thejackal101” included 27.1 GB of compressed stealer logs, indicating a vast and ongoing malware infection campaign compromising individual end-users globally.

3.3. Cyber Vandalism and Hacktivism: Website Defacements Website defacement remains a prevalent tactic, serving variously as a form of digital graffiti, a proof of capability, or a method of ideological messaging. The intelligence indicates that a small number of prolific actors are responsible for the vast majority of these incidents, often utilizing automated exploitation of vulnerabilities in Content Management Systems (CMS) like WordPress.

  • The DimasHxR Campaigns: Operating as an independent threat actor, DimasHxR conducted a relentless campaign of website defacements across Europe, Australia, and Asia. Their targets were incredibly diverse, primarily focusing on retail, manufacturing, healthcare, and service businesses. Documented victims included Conforama (Italian retail), MW Dental (Austria), Lewis Leathers (UK fashion), Agri-Expert (French agriculture), Mobiliufficio (Italian office furniture), and numerous others across Sweden, Switzerland, Poland, Ireland, Taiwan, and Singapore. The sheer volume of DimasHxR’s activity suggests the use of automated scanning and exploitation tools targeting common web server misconfigurations.
  • The maw3six Mass Defacements: The actor known as “maw3six” specializes in “mass defacement” operations, where multiple websites sharing the same vulnerable infrastructure or hosting provider are compromised simultaneously. This actor heavily targeted Southeast Asian domains, with a specific focus on Vietnamese online gambling, sports streaming, and e-commerce platforms (e.g., lucky88.buzz, bongda.space, i9bet.today, 8kbet.click, alo789.shop). They also compromised Polish domains and Caribbean web hosting providers, indicating a wide net cast for vulnerable cloud infrastructure.
  • Nicotine and the Umbra Community: The threat actor “Nicotine,” operating under the banner of the “Umbra Community,” demonstrated a highly focused methodology targeting WordPress installations. Their defacements frequently manipulated the wp-content directories of victim sites. Nicotine’s targeting was heavily concentrated on South Asian (Pakistan, Bangladesh, India) and Canadian businesses. Notably, this actor frequently engaged in “redefacements,” returning to compromise sites that had previously been attacked, such as Farmaceutica FL and various Latin American domains. Other victims included Farooq Kitabghar (Pakistani publisher), Lamora Furnishings (Canada), and Progressive LCD (India).
  • Other Defacement Groups: * Zod: Conducted mass defacements against Mexican real estate sites (Properties Bay MX) and various international targets hosted on platforms like WP Engine.
    • Alpha wolf team (XYZ): Focused mass defacement efforts primarily on Dutch organizations, including construction firms and design agencies (JCR Design, Golden Eagle Klusbedrijf).
    • CYKOMNEPAL: Targeted specific pages within the websites of Argentine pharmaceutical companies (PuntoFarma), Indian tech firms (TerminalDev), and international travel agencies.

3.4. Cyber-Kinetic Threats and Attacks on Critical Infrastructure The most alarming data points in the intelligence report detail cyber attacks directed at critical national infrastructure, government entities, and high-level communications. These incidents highlight the intersection of cyber warfare and geopolitics.

  • South Korean Industrial Water Treatment Compromise: The threat group “Z-PENTEST Alliance” issued a chilling claim of having compromised a “Smart Pure Water System” (MSTEC PureWater 100) at an industrial ultrapure water treatment plant in South Korea. The attackers alleged they possessed full, real-time control over critical operational technology (OT) parameters, including conductivity, pH, chlorine levels, temperature, and flow rate. Furthermore, they claimed the ability to manipulate sensor calibrations and control physical solenoid and drain valves. The group explicitly noted that this infrastructure was vital for semiconductor chip manufacturing and pharmaceutical production, threatening to cause system failures and distort sensor readings. This represents a severe cyber-kinetic threat with the potential for physical and economic devastation.
  • Hacktivism Against the Albanian Government: The geopolitically motivated group “Homeland Justice” executed a series of cyber attacks against Albanian state infrastructure. They claimed to have compromised the Albanian Post (postashqiptare.al), the Prime Minister’s office (pp.gov.al), and the Albanian Parliament (parlament.al), extracting internal documents. The group issued severe, escalating threats against the Albanian leadership, citing the government’s alleged support for the MEK (Mujahideen-e-Khalq) opposition group as justification.
  • Attacks on Iranian Artificial Intelligence Infrastructure: According to regional news sources, the data center of Sharif University of Technology in Iran suffered a highly destructive attack. This facility houses the core infrastructure for Iran’s National AI Platform, a critical state project serving thousands of national services. The attack, described as a “missile strike” attributed to foreign adversaries, highlights the physical targeting of critical cyber infrastructure.
  • ArABSAT Satellite Network Disruption: The Arab Satellite Communications Organization (ArABSAT) was targeted by a hacker group named “Mabir,” resulting in service disruptions. The attackers explicitly stated their motivation was ArABSAT’s alleged cooperation with the United States and Israel, demonstrating how telecommunications infrastructure is targeted in regional proxy conflicts.
  • Israeli Intelligence Leaks and Coordinated Campaigns: The hacker group “Hanzala” leaked the unredacted private communications (WhatsApp and Twitter chats) of Raz Zimmt, the head of the Iran division at Israel’s National Security Institute. Concurrently, the “Handala” hacktivist group issued a global call to arms, actively recruiting hackers worldwide to conduct coordinated, strategic cyber attacks against Israeli and US critical infrastructure, providing secure communication channels for operational coordination. Furthermore, the “Cyber Islamic Resistance” announced the initiation of a massive cyber offensive against Israeli institutions.

3.5. Malware Operations, Vulnerability Exploitation, and Initial Access Brokers The dataset illustrates the sophisticated mechanisms by which threat actors gain footholds in networks and distribute malicious payloads.

  • Supply Chain Attack on Axios (npm): In a highly sophisticated software supply chain attack, threat actors compromised a developer account associated with the widely used “Axios” npm library. The attackers successfully published malicious versions (1.14.1 and 0.30.4) that contained a hidden dependency. Upon installation by developers, this dependency executed a Remote Access Trojan (RAT) and subsequently attempted to erase its traces to evade detection. This incident underscores the profound vulnerabilities within open-source ecosystems.
  • React2Shell Vulnerability Exploitation: Attackers conducted widespread, automated exploitation campaigns targeting the “React2Shell” vulnerability in Next.js applications. Utilizing a custom tool dubbed “NEXUS Listener,” the threat actors compromised hundreds of servers to exfiltrate highly sensitive cloud infrastructure credentials, including AWS keys, database passwords, and SSH keys, facilitating deep network intrusions and cloud account takeovers.
  • Targeting Node.js Developers (UNC1069): The North Korean state-sponsored hacking group UNC1069 engaged in targeted social engineering campaigns against high-profile Node.js developers. The attackers utilized fake software updates as a vector to deploy malware, attempting to compromise developers who maintain packages with billions of downloads, representing a massive supply chain threat.
  • Initial Access Brokers (IABs): The commercialization of network compromise is evident in the activities of Initial Access Brokers. Threat actor “KazeFreak” advertised active VPN and Active Directory access to corporate networks across diverse sectors (construction, telecommunications, mining) in Poland, Turkey, Italy, Canada, and Argentina. Similarly, “Nullsec Philippines” advertised access to government web shells, and actor “parsa” freely distributed compromised Linux and Windows server credentials (including administrator passwords) to promote their paid RDP access business.

3.6. The Cybercriminal Service Economy The intelligence highlights a robust underground economy supporting cyber attacks.

  • Threat actors like “Kenz” advertised fraudulent services to manipulate platform metrics, selling “Telegram Stars” and channel boosts.
  • Malware developers sold highly capable Distributed Denial of Service (DDoS) scripts, boasting Layer 4 and Layer 7 attack capabilities, including the ability to bypass modern Cloudflare protections and CAPTCHAs.
  • Other actors offered “DMCA abuse services,” weaponizing copyright law to manipulate search engine rankings and conduct SEO sabotage against competitors, specifically targeting the iGaming sector.

4. Threat Actor Profiling and Attribution Based on the intelligence, several distinct threat actor profiles emerge, each utilizing unique methodologies.

  • ShinyHunters: Operating as an apex-tier cybercriminal syndicate, ShinyHunters is characterized by its high technical proficiency and focus on massive data extortion. Their ability to compromise major entities like Cisco and national databases (CIC Vietnam), coupled with their aggressive public extortion tactics and demands for high-value cryptocurrency payouts, marks them as a primary global threat.
  • The “Mass Defacers” (DimasHxR & maw3six): These actors represent the automated, opportunistic tier of cybercrime. They do not appear to target specific data but rather seek to maximize the volume of compromised web properties. DimasHxR’s focus on European small businesses and maw3six’s focus on Asian gambling/e-commerce sites via cloud infrastructure suggest the use of specialized scanning arrays seeking out specific unpatched vulnerabilities in CMS platforms.
  • The “Combo List” Brokers (CODER, el_capitan, thejackal101): These actors function as the logistics arm of the cybercrime ecosystem. They possess vast infrastructure capable of aggregating, sorting (often by geography or platform), and validating millions of stolen credentials. Their activities directly enable the global epidemic of credential stuffing attacks.
  • Ideological Hacktivists (Homeland Justice, Handala, Z-PENTEST Alliance): These groups blur the line between cyber vandalism and cyber terrorism. They are highly motivated by geopolitical conflicts (e.g., Israel-Palestine, Albanian-Iranian tensions) and demonstrate a willingness to target critical infrastructure (water treatment, satellites, government communications) to inflict societal disruption and convey political messages.
  • State-Sponsored APTs (UNC1069): North Korean actors like UNC1069 demonstrate advanced, patient methodologies, utilizing highly targeted social engineering to compromise upstream developers in order to execute devastating software supply chain attacks.

5. Victimology Analysis The dataset reveals that no industry or geographic region is insulated from cyber threats.

  • Sectoral Impact:
    • Technology & Software: Highly targeted for source code theft (Cisco, Lockheed Martin) and supply chain positioning (Axios npm, Node.js developers).
    • Government & Public Sector: Frequently targeted for espionage, hacktivism, and data theft (Vietnam CIC, Albanian Government, Mexican SAT, Huila Government).
    • Critical Infrastructure & OT: Targeted for kinetic disruption and geopolitical messaging (South Korean water systems, Iranian AI data centers, ArABSAT).
    • Retail, E-commerce, & SMBs: The primary victims of automated defacement campaigns and point-of-sale data theft.
    • Education: Educational institutions (AlumnForce, NUST Pakistan, Sinaloa University) are frequently compromised, exposing vast amounts of student and alumni PII.
  • Geographic Impact: The data shows a truly global distribution of targets. While Western nations (US, UK, Canada, France, Germany) are heavily targeted for financial data and credential harvesting, there is a pronounced concentration of activity directed at the Asia-Pacific region (Vietnam, South Korea, Japan, Indonesia, India) and the Middle East (Israel, Iran, Saudi Arabia). This geographic spread correlates heavily with areas of rapid digital adoption and zones of geopolitical friction.

6. Strategic Implications and Risk Assessment The intelligence synthesized in this report dictates several critical strategic conclusions.

Firstly, the sheer volume of distributed credential combo lists renders traditional password-based authentication obsolete. The availability of hundreds of millions of validated credentials means that credential stuffing is an ever-present threat. Organizations must mandate robust Multi-Factor Authentication (MFA) across all perimeters to mitigate this risk.

Secondly, the success of supply chain attacks, such as the Axios npm compromise and the targeting of Node.js developers, highlights a systemic vulnerability in modern software engineering. The trust placed in open-source repositories is being actively weaponized by advanced persistent threats.

Thirdly, the convergence of cyber operations with physical infrastructure—evidenced by the targeting of water treatment facilities and satellite networks—elevates cyber attacks from a data privacy issue to a matter of public safety and national security. The barrier to entry for disrupting Operational Technology (OT) appears to be lowering, necessitating urgent hardening of critical infrastructure interfaces.

Finally, the rampant success of basic website defacements against SMBs underscores a global failure in fundamental cybersecurity hygiene, specifically regarding the patch management of Content Management Systems and web application firewalls.

7. Conclusion The cybersecurity landscape captured in this April 2026 intelligence dataset is characterized by extreme volatility, high operational tempo, and profound impact. Threat actors are simultaneously executing massive data exfiltrations, orchestrating global credential stuffing campaigns, conducting widespread cyber vandalism, and launching targeted, disruptive attacks against critical national infrastructure.

The commoditization of malicious capabilities—from Initial Access Brokers selling network footholds to the distribution of advanced DDoS tools and stealer logs—has empowered a vast ecosystem of cybercriminals. Concurrently, the increasing willingness of ideologically driven groups to target operational technology and government networks indicates that cyber operations are now a primary vector for geopolitical conflict.

To defend against this multifaceted threat landscape, organizations and governments must abandon reactive security postures. A transition to intelligence-driven defense is imperative. This requires continuous monitoring of the deep and dark web, the implementation of zero-trust architectures to combat credential compromise, rigorous supply chain vetting, and the immediate hardening of critical infrastructure against cyber-kinetic threats. The data unequivocally demonstrates that in the current environment, robust cybersecurity is not merely a technical requirement, but a fundamental necessity for operational continuity and national security.

Detected Incidents Draft Data

  1. Alleged data breach of National Credit Information Center of Vietnam (CIC) — 160M Records for Sale
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to be selling the full database of Vietnams National Credit Information Center (cic.gov.vn). The alleged dataset contains 160,000,000+ records in CSV format, including full names, dates of birth, national ID numbers (CCCD/CMND), passport numbers, loan data, balances, debt information, tax IDs, company information, audit logs, and addresses. The data reportedly covers both individuals and companies. Asking price is $75,000 USD. The post links to BreachForums and provides Telegram, TOX, and Session contact details.
    Date: 2026-04-06T23:53:06Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/847
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Vietnam
    Victim Industry: Financial Services / Government
    Victim Organization: National Credit Information Center of Vietnam
    Victim Site: cic.gov.vn
  2. Alleged leak of multi-service credential combolist targeting Netflix, Minecraft, Steam and other platforms
    Category: Combo List
    Content: Forum user Ra-Zi shared a combolist containing 160,000 email and password combinations claimed to be valid for Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify accounts. The post also advertises selling additional credential lists through Telegram contact.
    Date: 2026-04-06T23:51:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-160k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–199580
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a collection of 200 Hotmail credential combinations on a cybercriminal forum, claiming them to be high-quality hits available for free download.
    Date: 2026-04-06T23:49:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71353/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  4. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,200 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-06T23:15:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71351/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  5. Alleged Identification of BreachForums Administrator N/A Linked to Bulgarian Cybersecurity Researcher Angel Tsvetkov
    Category: Cyber Attack
    Content: A BreachForums administrator operating under the alias N/A (later Caine) has allegedly been identified as Angel Tsvetkov, a Bulgarian penetration tester and bug bounty researcher. The individual is accused of conducting an exit scam on BreachForums around March 15, taking the forum dark before relaunching it on March 25 using a February backup under the alias Caine. The moderation team confirmed Caine = N/A and subsequently resigned en masse. N/A allegedly attempted to sell the forum again. The deanonymization reportedly stemmed from IP address reuse and password reuse across criminal and legitimate business accounts. Tsvetkov has legitimate security credentials including HackerOne recognition and responsible disclosure credits from Ford, Bosch, and the BBC. He has since been published on PwnForums Wall of Fame.
    Date: 2026-04-06T23:06:46Z
    Network: telegram
    Published URL: https://t.me/IntCyberDigest/326
    Screenshots:
    None
    Threat Actors: N/A
    Victim Country: Bulgaria
    Victim Industry: Cybercrime Forum
    Victim Organization: BreachForums
    Victim Site: Unknown
  6. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 520 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-06T22:55:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-520x-HQ-Valid-Hotmails
    Screenshots:
    None
    Threat Actors: Sellerxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  7. Alleged sale of UHQ Hotmail and multi-service combolists across multiple countries
    Category: Combo List
    Content: A threat actor is selling claimed fresh, valid, and private UHQ (Ultra High Quality) Hotmail and cloud credential combolists covering multiple countries (FR, IT, BR, UK, US, AU, JP, NL, PL, ES, MX, CA, SG, and others). The offer also includes service-specific combos for Amazon, eBay, Klei, Walmart, Poshmark, Marriott, and others. The seller claims exclusivity and keyword search capability.
    Date: 2026-04-06T22:25:46Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59705
    Screenshots:
    None
    Threat Actors: Yìchén
    Victim Country: United States, United Kingdom, France, Italy, Brazil, Australia, Japan, Netherlands, Poland, Spain, Mexico, Canada, Singapore
    Victim Industry: E-commerce, Hospitality, Technology
    Victim Organization: Hotmail, Amazon, eBay, Walmart, Poshmark, Marriott, Klei
    Victim Site: Unknown
  8. Alleged sale of mail access, combolists, and hacking tools targeting multiple countries
    Category: Initial Access
    Content: A threat actor operating via @Dataxlogs is advertising mail access for sale across multiple countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs, scripts, tools, hits, and combo lists, with custom requests available.
    Date: 2026-04-06T21:51:46Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59683
    Screenshots:
    None
    Threat Actors: .py
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Alleged threat actor seeking staff position on cybercriminal forum
    Category: Alert
    Content: Threat actor Angel_Batista applying for staff position on BreachForums, claiming experience in breaching systems to obtain databases for sale or distribution. Individual expresses interest in moderating database leak and seller sections of the forum.
    Date: 2026-04-06T21:44:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Angel-Batista-s-Staff-Application–187891
    Screenshots:
    None
    Threat Actors: Angel_Batista
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: Threat actor distributing free Japanese email credential lists through Telegram channel PandaCloud04, claiming fresh and valid email databases are added daily.
    Date: 2026-04-06T21:34:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71350/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged data leak of Remote3.co crypto job platform database
    Category: Data Leak
    Content: A threat actor claims to have leaked a database from Remote3.co, a crypto job finder website, containing personal information of over 46,000 users including usernames, emails, social media profiles, and professional details. The alleged breach reportedly occurred in March 2026 and the data is being distributed for free download.
    Date: 2026-04-06T21:32:38Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Remote3-co-Crypto-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Remote3.co
    Victim Site: remote3.co
  12. Alleged leak of Belgian credentials via Elite_Cloud1 combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 40,000 credentials allegedly targeting Belgian users. The credentials appear to be associated with Elite_Cloud1 and were posted on a cybercriminal forum.
    Date: 2026-04-06T21:23:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-40-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Belgium-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged leak of Elite_Cloud1 credentials targeting Bangladesh users
    Category: Combo List
    Content: A threat actor shared a combolist containing over 10,000 email and password combinations allegedly from Elite_Cloud1, specifically targeting users in Bangladesh. The post was dated April 6, 2026.
    Date: 2026-04-06T21:23:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-10-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Bangladesh-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Elite_Cloud1
    Victim Site: Unknown
  14. Alleged leak of British and Indian credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 11,000 email and password combinations allegedly targeting British and Indian users. The credentials are dated April 6, 2026 and appear to be distributed freely on cybercriminal forums.
    Date: 2026-04-06T21:21:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-11-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-British-Indian-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged data leak of SongTrivia2.io database
    Category: Data Leak
    Content: A threat actor shared a database dump from SongTrivia2.io containing over 291,000 user records including personal information, authentication data, and platform content. The alleged breach occurred in April 2026 and includes user IDs, emails, password hashes, session data, and API keys.
    Date: 2026-04-06T21:19:02Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-SongTrivia2-io-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: SongTrivia2.io
    Victim Site: songtrivia2.io
  16. Alleged data leak of Cuties.AI database
    Category: Data Leak
    Content: A threat actor claims to have leaked a database from Cuties.AI, an NSFW AI generation website, containing over 153,000 user records including emails, nicknames, subscription details, and user preferences. The alleged breach reportedly occurred in March 2026 and the data is being distributed for free download.
    Date: 2026-04-06T21:18:39Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Cuties-AI-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Cuties.AI
    Victim Site: Unknown
  17. Alleged data leak of Success.Events database
    Category: Data Leak
    Content: A threat actor leaked a database from Success.Events containing over 53,000 user records including email addresses, IP addresses, user agents, and email campaign metadata. The breach allegedly occurred in April 2026 and affects a personal development and event newsletter platform.
    Date: 2026-04-06T21:18:18Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Success-Events-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Media and Publishing
    Victim Organization: Success.Events
    Victim Site: success.events
  18. Alleged data leak of Success.com database
    Category: Data Leak
    Content: A threat actor claims to have leaked a Success.com database containing over 267k user records including personal information, billing details, order data, and customer information. The post indicates this is the second breach of the platform, with 60k new email addresses added since the previous incident.
    Date: 2026-04-06T21:17:57Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Success-com-V2-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Media and Publishing
    Victim Organization: Success.com
    Victim Site: success.com
  19. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a mixed credential combolist containing 5,200 entries on a cybercrime forum, describing it as quality data.
    Date: 2026-04-06T21:09:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71348/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged distribution of SMTP corporate credential lists
    Category: Combo List
    Content: Threat actor distributes SMTP corporate credential combolists containing 7 million entries through Telegram channels. The actor offers free access to credential lists and associated programs through multiple Telegram groups.
    Date: 2026-04-06T21:09:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71349/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged sale of US police tipline database containing anonymous crime tips
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 8.3 million records from US/Canada police tiplines, including anonymous crime tips, personal information, and contact details for $10,000 in cryptocurrency. The data allegedly originates from P3Global/CrimeStoppers and is being marketed as BlueLeaks 2.0 containing 93GB of confidential police data.
    Date: 2026-04-06T21:07:31Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-USA-Police-Tipline-Database-8mil–187882
    Screenshots:
    None
    Threat Actors: iym
    Victim Country: United States
    Victim Industry: Law Enforcement
    Victim Organization: P3Global / CrimeStoppers
    Victim Site: Unknown
  22. Alleged data breach of Welfare.org.ng with source code and database for sale
    Category: Data Breach
    Content: Threat actor NormalLeVrai is selling source code, email access, and database containing 12,825 records from welfare.org.ng for $300. The actor claims to have taken down associated subdomains and is offering the complete website infrastructure and backups.
    Date: 2026-04-06T20:59:25Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Welfare-org-ng
    Screenshots:
    None
    Threat Actors: NormalLeVrai
    Victim Country: Nigeria
    Victim Industry: Government/Social Services
    Victim Organization: Welfare
    Victim Site: welfare.org.ng
  23. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 295 high-quality Hotmail credentials for free download on a cybercriminal forum.
    Date: 2026-04-06T20:55:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71347/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  24. Alleged leak of Yahoo credentials database
    Category: Data Leak
    Content: Threat actor claims to have leaked a Yahoo credentials database containing approximately 64.9 million email addresses. The actor is distributing the data through Telegram channels and appears to be involved in selling various databases.
    Date: 2026-04-06T20:54:35Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Yahoo-Leads-Global-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: injectioninferno2
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  25. Alleged sale of Cisco data or access by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters is allegedly selling data or access related to Cisco for $10,000. Contact handle provided is @shinyc0rpsss. No further details on the nature of the offering (data breach, initial access, etc.) were specified.
    Date: 2026-04-06T20:51:22Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/840
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco
    Victim Site: cisco.com
  26. Alleged leak of mixed access credentials
    Category: Combo List
    Content: Threat actor NUllSHop0X shared a free download of 5,000 mixed access credentials described as valid/hit and fresh. The credentials are being distributed through a cybercriminal forum specializing in combolists and data dumps.
    Date: 2026-04-06T20:33:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71345/
    Screenshots:
    None
    Threat Actors: NUllSHop0X
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Alleged distribution of Elite Cloud credential combolist targeting Brazil
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 321,000 email and password combinations allegedly from Elite Cloud, targeting Brazilian users. The combolist was dated April 6, 2026 and distributed on an underground forum.
    Date: 2026-04-06T20:20:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-321-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Brazil-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Elite Cloud
    Victim Site: Unknown
  28. Alleged leak of Australian credential combolist
    Category: Combo List
    Content: Threat actor distributed a combolist containing over 46,000 email and password combinations allegedly from Australian sources. The credentials are claimed to be fresh and high quality, and are being distributed through a Telegram channel.
    Date: 2026-04-06T20:20:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-46-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Australia-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged leak of Austrian email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 54,000 email and password credentials allegedly from Austria. The data is described as fresh and high quality, and is being distributed through a Telegram channel.
    Date: 2026-04-06T20:18:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-54-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Austria-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Austria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Alleged leak of Argentine credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 43,000 email and password combinations allegedly targeting Argentine users. The credentials are being distributed through a Telegram channel and are described as fresh and high quality.
    Date: 2026-04-06T20:17:21Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-43-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Argentina-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 337,000 Hotmail email and password combinations dated April 6th, 2024.
    Date: 2026-04-06T20:16:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71343/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  32. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor NUllSHop0X shared a combolist containing 400,000 alleged valid Hotmail credentials for free download on a cybercriminal forum.
    Date: 2026-04-06T20:15:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71344/
    Screenshots:
    None
    Threat Actors: NUllSHop0X
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  33. Alleged Data Breach of Lockheed Martin — Avionics Source Code and Firmware Exposed
    Category: Data Breach
    Content: A threat actor operating under the handle Brona Blanco is claiming to possess and distribute Lockheed Martin source code described as Proof of Concept (PoC) parts 2 and 3, including avionics subsystem firmware, calibration data, and telemetry data related to HMD (Helmet-Mounted Display), landing gear systems, and Block 4 configurations. The actor also teases an upcoming Part 4 involving Lockheed simulators, suggesting an ongoing series of leaks targeting the defense contractor.
    Date: 2026-04-06T20:10:21Z
    Network: telegram
    Published URL: https://t.me/c/3575098403/100
    Screenshots:
    None
    Threat Actors: Brona Blanco
    Victim Country: United States
    Victim Industry: Defense & Aerospace
    Victim Organization: Lockheed Martin
    Victim Site: lockheedmartin.com
  34. Alleged leak of Lockheed Martin Avionics Source Code and Firmware
    Category: Data Leak
    Content: A threat actor is claiming to possess and sharing proof-of-concept material related to Lockheed Martin source code, specifically targeting avionics subsystem firmware, calibration data, and telemetry systems including Head-Mounted Display (HMD), landing gear systems, and Block 4 configurations. This represents a critical national security concern involving sensitive defense contractor intellectual property.
    Date: 2026-04-06T20:08:46Z
    Network: telegram
    Published URL: https://t.me/c/3575098403/94
    Screenshots:
    None
    Threat Actors: Brona Blanco
    Victim Country: United States
    Victim Industry: Defense & Aerospace
    Victim Organization: Lockheed Martin
    Victim Site: lockheedmartin.com
  35. Alleged cyber attack on Czech Technical University by LunarisSec
    Category: Cyber Attack
    Content: Threat actor group LunarisSec, apparently affiliated with Algeria, claims to have attacked Czech Technical University. The post includes a photo (likely defacement or DDoS proof) and a link to their X (Twitter) account as evidence. The group uses signature messaging typical of hacktivist operations.
    Date: 2026-04-06T20:04:31Z
    Network: telegram
    Published URL: https://t.me/c/3733257070/41
    Screenshots:
    None
    Threat Actors: LunarisSec
    Victim Country: Czech Republic
    Victim Industry: Education
    Victim Organization: Czech Technical University
    Victim Site: Unknown
  36. Alleged leak of Elite Cloud credentials
    Category: Data Leak
    Content: User thejackal101 shared a 1.1GB compressed file containing credential logs allegedly from Elite Cloud, dated April 6, 2026. The data is described as fresh and high quality, with additional content available through a Telegram channel.
    Date: 2026-04-06T20:04:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Request-%E2%9C%AA-1-1-GB-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-ULP-LOG-S-Date-%E2%9C%AA-6-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Elite Cloud
    Victim Site: Unknown
  37. Alleged distribution of multi-platform credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a 14 million email:password combolist targeting multiple platforms including Clyx, Monnett, RedNote, Noplace, Threads, Lemon8, Jagat, Polygon, Ethereum, Audius, and Mastodon through Telegram channels. The credentials are being shared for free through dedicated Telegram groups for combos and programs.
    Date: 2026-04-06T20:03:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71342/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Website defacement of PuntoFarma by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the PuntoFarma pharmaceutical website on April 7, 2026. The attack targeted a specific product page rather than the homepage of the Argentine pharmacy/pharmaceutical company.
    Date: 2026-04-06T19:48:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831182
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Argentina
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: PuntoFarma
    Victim Site: www.puntofarma.com.ar
  39. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 82,000 mixed valid forum credentials. The credentials are described as validated and appear to be sourced from various forum platforms.
    Date: 2026-04-06T19:39:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71341/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged distribution of stealer logs containing credentials
    Category: Logs
    Content: Threat actor UP_DAISYCLOUD distributed 6,262 fresh stealer logs via file sharing platform, claiming to upload new credential data daily through Telegram channel.
    Date: 2026-04-06T19:38:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-6262-LOGS-CLOUD-%E2%98%81-06-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged data breach of ProCamps database for sale
    Category: Data Breach
    Content: Threat actor Sorb is allegedly selling a database containing 623,000 personal records from ProCamps, a sports marketing company. The data includes full names, addresses, dates of birth, phone numbers, emails, IP addresses, password hashes, and partial billing information for $600.
    Date: 2026-04-06T19:26:08Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-USA-procamps-com-623-000
    Screenshots:
    None
    Threat Actors: Sorb
    Victim Country: United States
    Victim Industry: Sports and Entertainment
    Victim Organization: ProCamps
    Victim Site: procamps.com
  42. Alleged data breach of Vantage Media AI database for sale
    Category: Data Breach
    Content: Threat actor claims to be selling a 381 GB MongoDB database dump containing 628 million email addresses and extensive personal information including names, addresses, phone numbers, LinkedIn profiles, and employment data from Vantage Media AI for $15,000. The alleged breach occurred on March 27, 2026.
    Date: 2026-04-06T19:25:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-USA-Vantage-Media-AI-628kk
    Screenshots:
    None
    Threat Actors: Sorb
    Victim Country: United States
    Victim Industry: Marketing Technology
    Victim Organization: Vantage Media AI
    Victim Site: vantagemediacorp.com
  43. Website defacement of JCR Design by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the JCR Design website on April 7, 2026. The incident targeted a Netherlands-based design services company and was archived as a single site defacement.
    Date: 2026-04-06T19:19:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248334
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Netherlands
    Victim Industry: Design Services
    Victim Organization: JCR Design
    Victim Site: jcrdesign.nl
  44. Mass defacement campaign by Alpha wolf team member XYZ targeting radioyaniv.com
    Category: Defacement
    Content: Alpha wolf team member XYZ conducted a mass defacement campaign targeting radioyaniv.com on April 7, 2026. The attack affected a radio broadcasting website as part of a broader mass defacement operation rather than an isolated incident.
    Date: 2026-04-06T19:19:25Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248335
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Israel
    Victim Industry: Media/Broadcasting
    Victim Organization: Radio Yaniv
    Victim Site: radioyaniv.com
  45. Mass website defacement campaign by Alpha wolf team member XYZ
    Category: Defacement
    Content: Alpha wolf team member XYZ conducted a mass defacement campaign targeting multiple websites including unamuestradesugloria.com on April 7, 2026. The attack was part of a coordinated mass defacement operation rather than targeting a single site.
    Date: 2026-04-06T19:19:06Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248336
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: unamuestradesugloria.com
  46. Mass website defacement by Alpha wolf team targeting itamar.nl
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement campaign targeting multiple websites including itamar.nl on April 7, 2026. The attack was executed by an attacker identified as XYZ against a Linux-based server.
    Date: 2026-04-06T19:18:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248337
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: itamar.nl
  47. Mass defacement of goldeneagle-klusbedrijf.com by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker working with Alpha wolf team conducted a mass defacement attack targeting goldeneagle-klusbedrijf.com on April 7, 2026. The victim appears to be a Dutch construction/maintenance services company running on a Linux server.
    Date: 2026-04-06T19:18:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248338
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Netherlands
    Victim Industry: Construction/Maintenance Services
    Victim Organization: Golden Eagle Klusbedrijf
    Victim Site: goldeneagle-klusbedrijf.com
  48. Mass defacement campaign by Alpha wolf team member XYZ
    Category: Defacement
    Content: Alpha wolf team member XYZ conducted a mass defacement campaign targeting multiple websites including goddienen.nl on April 7, 2026. The attack targeted a Linux-based server as part of a broader defacement operation.
    Date: 2026-04-06T19:18:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248339
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: goddienen.nl
  49. Alleged cyber attack targeting DepEd Ilocos Norte and EFI Philippines domains
    Category: Cyber Attack
    Content: A threat actor associated with Nullsec Philippines posted a list of domains belonging to the Department of Education (DepEd) Ilocos Norte (depedilocosnorte.com and subdomains) and EFI Philippines (efi.net.ph and subdomains), including QMS, DTS, KPAP, VMS, IMS, cooperative, manpower, and purchasing portals. The post appears to indicate targeting or compromise of these Philippine educational and organizational web assets.
    Date: 2026-04-06T19:16:01Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/898
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Philippines
    Victim Industry: Government / Education
    Victim Organization: DepEd Ilocos Norte / EFI Philippines
    Victim Site: depedilocosnorte.com, efi.net.ph
  50. Alleged data breach of Alyna Kuwait cleaning service platform
    Category: Data Breach
    Content: Threat actor claims to be selling a database dump from Alyna, a Kuwait-based cleaning and laundry service platform, containing 18,000 user records including personal information, credentials, phone numbers, and location data for $300.
    Date: 2026-04-06T19:12:46Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Kuwait-alyna-co-18-000
    Screenshots:
    None
    Threat Actors: Sorb
    Victim Country: Kuwait
    Victim Industry: Consumer Services
    Victim Organization: Alyna
    Victim Site: alyna.co
  51. Website defacement of JCR Design by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the JCR Design website on April 7, 2026. This was a single-target home page defacement rather than a mass defacement campaign.
    Date: 2026-04-06T19:12:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831176
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Netherlands
    Victim Industry: Design/Creative Services
    Victim Organization: JCR Design
    Victim Site: jcrdesign.nl
  52. Alleged data leak of Cisco by ShinyHunters
    Category: Data Leak
    Content: Threat actor ShinyHunters claims to have leaked all Cisco data, sharing what appears to be a photo as evidence of the breach. The post states We have provided all Cisco here, suggesting the data has been made available.
    Date: 2026-04-06T19:10:38Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/839
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco
    Victim Site: cisco.com
  53. Alleged sale of webshells including government targets by Nullsec Philippines
    Category: Initial Access
    Content: A threat actor operating under the handle @Rici144 in the Nullsec Philippines channel is advertising webshells, including shells on government systems. This constitutes initial access offerings with potential for further compromise of government infrastructure.
    Date: 2026-04-06T19:09:49Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/897
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged leak of email credential combolist
    Category: Combo List
    Content: Threat actor snowstormxd shared a fresh mix of email credentials via Pasteview and Telegram channel for free download. The post was made on CX forum in the Combolists & Dumps section.
    Date: 2026-04-06T19:02:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71335/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged leak of USA credentials combolist
    Category: Combo List
    Content: A combolist containing 23,000 USA-based credentials was shared on a cybercriminal forum. The post appears to offer the credential list as hidden content for registered forum users.
    Date: 2026-04-06T19:02:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71336/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 480,000 Hotmail email credentials with full mail access, dated April 6th.
    Date: 2026-04-06T19:00:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71337/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  57. Alleged data leak of MyLovely.AI platform
    Category: Data Leak
    Content: Threat actor claims to have leaked a database from MyLovely.AI, an NSFW AI art platform, containing 254,580 total records including 106,362 user profiles with email addresses, user IDs, generated content, and report details from an alleged April 2026 breach.
    Date: 2026-04-06T18:49:18Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-MyLovely-AI-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: [Trial Mod]xtc
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: MyLovely.AI
    Victim Site: mylovely.ai
  58. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 144,000 Hotmail email and password combinations on a cybercrime forum. The credentials are being distributed for free to registered forum users.
    Date: 2026-04-06T18:47:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71331/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  59. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor Ra-Zi shared a combolist containing 144,000 Hotmail email and password combinations on cybercriminal forum. The actor also advertises sales of additional credential lists for various email providers and countries.
    Date: 2026-04-06T18:47:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-144K-HOTMAIL-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  60. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,925 email and password combinations from mixed sources, made available as a free download on a cybercrime forum.
    Date: 2026-04-06T18:47:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71332/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged distribution of credential combolist targeting multiple platforms
    Category: Combo List
    Content: Threat actor distributes a 12 million credential combolist targeting multiple platforms including Tumblr, BeReal, OnlyFans, Yik Yak, Bluesky, RedNote, Noplace, Wedium, and Substack through Telegram channels.
    Date: 2026-04-06T18:46:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71334/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple
    Victim Site: Multiple
  62. Alleged Sale of Hotmail Email Account Access with Multi-Country Coverage
    Category: Initial Access
    Content: A threat actor is offering access to Hotmail email accounts across multiple countries including UK, DE, JP, NL, BR, PL, ES, US, and IT. The seller claims to own a private cloud and offers inbox searching by keyword, targeting major platforms such as eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Valid webmails including ntlworld are also advertised. Requests are handled via direct message.
    Date: 2026-04-06T18:36:31Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59655
    Screenshots:
    None
    Threat Actors: Admu
    Victim Country: Unknown
    Victim Industry: Email Services
    Victim Organization: Hotmail
    Victim Site: hotmail.com
  63. Alleged leak of mixed email credential lists via PandaCloud service
    Category: Combo List
    Content: Threat actor promotes PandaCloud service offering free access to fresh email credential lists updated daily. Links provided to Telegram channel and file sharing platform for downloading mixed email combolists.
    Date: 2026-04-06T18:35:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71329/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Alleged distribution of Hotmail credential checking tool
    Category: Combo List
    Content: Threat actor distributes a tool designed to check Hotmail credentials with high checking speed and inbox searching capabilities. The tool appears to be made available for free download.
    Date: 2026-04-06T18:23:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71326/
    Screenshots:
    None
    Threat Actors: strelok639
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  65. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,700 email credentials allegedly validated on April 6th. The credentials appear to be from mixed email providers and are being distributed on a cybercrime forum.
    Date: 2026-04-06T18:22:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71327/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Website defacement of TerminalDev by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the TerminalDev blog website on April 7, 2026. The attack targeted a specific blog page discussing AWS services on the Indian technology companys website.
    Date: 2026-04-06T18:15:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831174
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: India
    Victim Industry: Technology
    Victim Organization: TerminalDev
    Victim Site: terminaldev.in
  67. Alleged sale of personal identification data including ID cards, SSN, and financial records
    Category: Data Breach
    Content: Threat actor jannat123 claims to have fresh private database containing ID cards, Social Security Numbers, drivers licenses, passports, and bank cards. No specific victim organization, data volume, or pricing information is provided in the available content.
    Date: 2026-04-06T18:03:16Z
    Network: openweb
    Published URL: https://xforums.st/threads/fresh-private-base-data-id-cards-ssn-drivers-license-passports-bank-cards.605050/
    Screenshots:
    None
    Threat Actors: jannat123
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Website defacement of skydays.travel by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the admin section of skydays.travel, a travel industry website, on April 7, 2026. The attack targeted the blog administration panel of the travel companys website.
    Date: 2026-04-06T17:58:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831173
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Travel and Tourism
    Victim Organization: Skydays Travel
    Victim Site: skydays.travel
  69. Alleged leak of multi-platform credentials including Twitter, TikTok, Instagram and other social media platforms
    Category: Combo List
    Content: Threat actor CODER is distributing a 9 million record combolist containing email and password combinations allegedly from multiple social media platforms including Twitter, TikTok, Tinder, Twitch, Pinterest, Instagram, Discord and Reddit through Telegram channels.
    Date: 2026-04-06T17:58:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71323/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Multiple platforms
    Victim Site: Unknown
  70. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a high-quality mixed credential combolist containing 4.9 million entries for free download on a cybercriminal forum.
    Date: 2026-04-06T17:58:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71324/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged leak of mixed credential targets and keyword-based combolists
    Category: Combo List
    Content: Threat actor shared mixed credential combolists and keyword-targeted credential lists for free download on cybercrime forum. The post offers general credential compilation without specifying victims or data volume.
    Date: 2026-04-06T17:57:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71325/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Alleged data leak of Space Coast Area Transit database
    Category: Data Leak
    Content: SQL database dump from 321transit.com containing 30,000 user records with usernames, emails, names and password hashes, plus 14,600 transit pass records with credit card information, phone numbers and addresses. The data was allegedly found on an unsecured open directory and is being distributed for free download.
    Date: 2026-04-06T17:55:48Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-321transit-com-Leaked-Download
    Screenshots:
    None
    Threat Actors: anonmoose
    Victim Country: United States
    Victim Industry: Transportation
    Victim Organization: Space Coast Area Transit
    Victim Site: 321transit.com
  73. Website defacement of jazz-tech.net by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL group defaced the jazz-tech.net website, specifically targeting the admin panel at jazz-tech.net/aadmin on April 7, 2026. The incident was documented and archived on zone-xsec.com mirror service.
    Date: 2026-04-06T17:52:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831172
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Jazz Tech
    Victim Site: jazz-tech.net
  74. Alleged distribution of Logo Generator cracking tool by Kidux
    Category: Initial Access
    Content: A forum post distributes a logo generation tool called Logo Generator by Kidux designed for creating custom tags, banners, and styled text for tools, packs, and releases. The tool is shared on a cracking forum with warnings about potential antivirus detection.
    Date: 2026-04-06T17:46:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Logo-Generator-by-Kidux
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Alleged distribution of Valorant credential checking tool
    Category: Initial Access
    Content: A threat actor shared a console-based tool called Valorant Checker by HixerX designed for processing account credentials against Valorant gaming platform accounts. The tool features multiple execution modes for brute-force style processing of credential datasets.
    Date: 2026-04-06T17:45:30Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Valorant-Checker-by-HixerX
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Riot Games
    Victim Site: valorant.com
  76. Website defacement of Luxuriate Casa by MR~TNT
    Category: Defacement
    Content: The website luxuriatecasa.com was defaced by attacker MR~TNT on April 7, 2026. The incident appears to be an individual defacement targeting a real estate or home furnishing business.
    Date: 2026-04-06T17:40:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248332
    Screenshots:
    None
    Threat Actors: MR~TNT, No team
    Victim Country: Unknown
    Victim Industry: Real Estate/Home Furnishing
    Victim Organization: Luxuriate Casa
    Victim Site: luxuriatecasa.com
  77. Alleged distribution of Facebook, LinkedIn, and Etsy credential combolists
    Category: Combo List
    Content: Threat actor CODER is distributing an 11 million record credential combolist allegedly containing Facebook, LinkedIn, Etsy and other platform credentials through Telegram channels. The combolist appears to be shared freely through dedicated Telegram groups.
    Date: 2026-04-06T17:33:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71320/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Facebook, LinkedIn, Etsy)
    Victim Site: facebook.com, linkedin.com, etsy.com
  78. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor is distributing a free combolist containing 4,354 premium mixed email credentials, including Hotmail accounts, through Telegram contact.
    Date: 2026-04-06T17:33:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71321/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  79. Alleged data breach of Huila Government database
    Category: Data Breach
    Content: NyxarGroup and collaborators are allegedly selling government employee information from the Huila governments extranet system. The data includes names, positions, contact information, and organizational details of government contractors and employees.
    Date: 2026-04-06T17:32:00Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-CO-HUILA-GOV-CO
    Screenshots:
    None
    Threat Actors: NyxarGroup
    Victim Country: Colombia
    Victim Industry: Government
    Victim Organization: Huila Government
    Victim Site: extranet.huila.gov.co
  80. Alleged sale of multiple personal data databases including SSN and identity documents
    Category: Data Breach
    Content: Threat actor offers various personal data databases for sale including SSNs, drivers licenses, passports, consumer information, email lists, and company databases through Telegram contact.
    Date: 2026-04-06T17:21:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71318/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Website defacement of MW Dental by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the MW Dental website, targeting a healthcare organization in Austria. The incident occurred on April 6, 2026, affecting a subdirectory of the dental practices website.
    Date: 2026-04-06T17:01:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831136
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Austria
    Victim Industry: Healthcare
    Victim Organization: MW Dental
    Victim Site: mwdental.at
  82. Website defacement of loisircreatif.net by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the French creative leisure/crafts website loisircreatif.net on April 6, 2026. The attack targeted a specific media subdirectory rather than the main homepage.
    Date: 2026-04-06T17:00:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831137
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Retail/E-commerce
    Victim Organization: Loisir Creatif
    Victim Site: loisircreatif.net
  83. Website defacement of MelohStyle by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the MelohStyle website on April 6, 2026. The defacement targeted a specific media/customer section of the site rather than the homepage.
    Date: 2026-04-06T17:00:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831138
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Fashion/Retail
    Victim Organization: MelohStyle
    Victim Site: www.melohstyle.com
  84. Website defacement of Conforama by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a media subdirectory of Conforama Italys website on April 6, 2026. The attack targeted the Italian furniture and home goods retailers online presence.
    Date: 2026-04-06T16:59:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831139
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Retail
    Victim Organization: Conforama
    Victim Site: www.conforama.it
  85. Website defacement of RPTech Singapore by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the RPTech Singapore website on April 6, 2026. The attack targeted a specific subdirectory rather than the main homepage of the technology companys website.
    Date: 2026-04-06T16:59:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831140
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Singapore
    Victim Industry: Technology
    Victim Organization: RPTech Singapore
    Victim Site: rptechsg.com
  86. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a link to what is claimed to be a high-quality Hotmail credential list (combolist) containing email and password combinations for free download on a cybercrime forum.
    Date: 2026-04-06T16:59:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-HQ-HOTMAIL–199543
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  87. Website defacement of Quincaillerie Angles hardware store by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the website of French hardware store Quincaillerie Angles on April 6, 2026. The defacement targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-06T16:58:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831142
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Retail/Hardware
    Victim Organization: Quincaillerie Angles
    Victim Site: www.quincaillerie-angles.fr
  88. Website defacement of Lewis Leathers by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced a media subdirectory of Lewis Leathers website on April 6, 2026. The incident targeted the UK-based leather fashion retailers web presence.
    Date: 2026-04-06T16:57:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831143
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Fashion/Retail
    Victim Organization: Lewis Leathers
    Victim Site: www.lewisleathers.com
  89. Website defacement of Cort Party Rental by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the Cort Party Rental website on April 6, 2026. This appears to be an isolated defacement targeting a single party rental service company.
    Date: 2026-04-06T16:57:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831144
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Event Services
    Victim Organization: Cort Party Rental
    Victim Site: www.cortpartyrental.com
  90. Website defacement of FHR by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the FHR website on April 6, 2026, targeting a customer address media directory. This was an individual defacement incident rather than a mass or coordinated attack.
    Date: 2026-04-06T16:56:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831145
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: FHR
    Victim Site: fhr.se
  91. Website defacement of Agri-Expert by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the French agricultural consulting website Agri-Expert on April 6, 2026. This was a single-target defacement affecting the organizations media content section.
    Date: 2026-04-06T16:56:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831149
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Agriculture
    Victim Organization: Agri-Expert
    Victim Site: www.agri-expert.fr
  92. Website defacement of Hogetex by DimasHxR
    Category: Defacement
    Content: Belgian website hogetex.be was defaced by attacker DimasHxR on April 6, 2026. The defacement targeted a customer address page on the site.
    Date: 2026-04-06T16:55:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831150
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Hogetex
    Victim Site: hogetex.be
  93. Alleged Cyber Attacks on Albanian Government Infrastructure by Homeland Justice
    Category: Cyber Attack
    Content: The hacktivist group Homeland Justice claims to have attacked postashqiptare.al (Albanian Post), pp.gov.al (Prime Ministers office), and extracted corruption documents from dpbsh.gov.al. The group issues escalating threats against Albanian government entities, warning of harsher future operations and referencing prior data extraction as leverage. The post contains threatening language directed at Albanian leadership and signals intent for continued and intensified cyber operations.
    Date: 2026-04-06T16:55:17Z
    Network: telegram
    Published URL: https://t.me/c/1569522807/687
    Screenshots:
    None
    Threat Actors: Homeland Justice
    Victim Country: Albania
    Victim Industry: Government
    Victim Organization: Albanian Government (postashqiptare.al, pp.gov.al, dpbsh.gov.al)
    Victim Site: postashqiptare.al, pp.gov.al, dpbsh.gov.al
  94. Website defacement of LCA Distribution by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the LCA Distribution website on April 6, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-06T16:55:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831155
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Distribution/Logistics
    Victim Organization: LCA Distribution
    Victim Site: lca-distribution.com
  95. Website defacement of Japal by DimasHxR
    Category: Defacement
    Content: On April 6, 2026, threat actor DimasHxR successfully defaced the Japal website, compromising the media/customer section of the Italian organizations web presence.
    Date: 2026-04-06T16:54:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831156
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Japal
    Victim Site: www.japal.it
  96. Website defacement of HESA by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a subdirectory of the HESA website on April 6, 2026. The attack targeted a specific media/customer page rather than the main homepage.
    Date: 2026-04-06T16:54:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831160
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: HESA
    Victim Site: www.hesa.com
  97. Alleged cyber attack on Albanian Parliament (parlament.al) by Homeland Justice
    Category: Cyber Attack
    Content: The threat actor group Homeland Justice claims to have previously hacked the Albanian Parliament website (parlament.al) and is threatening escalated attacks. The group states the institution has not changed its behavior regarding alleged support of MEK (Mujahideen-e-Khalq) terrorists, and warns of harsher punishments to come. This appears to be a politically motivated cyber operation targeting Albanian government infrastructure.
    Date: 2026-04-06T16:53:52Z
    Network: telegram
    Published URL: https://t.me/c/1569522807/686
    Screenshots:
    None
    Threat Actors: Homeland Justice
    Victim Country: Albania
    Victim Industry: Government
    Victim Organization: Albanian Parliament
    Victim Site: parlament.al
  98. Website defacement of sagapo.it by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdirectory of sagapo.it on April 6, 2026. The attack targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-06T16:53:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831161
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sagapo.it
  99. Website defacement of The Plastic Man by DimasHxR
    Category: Defacement
    Content: Solo attacker DimasHxR defaced the UK-based plastic manufacturing company The Plastic Mans website on April 6, 2026. The defacement targeted a media subdirectory rather than the main homepage.
    Date: 2026-04-06T16:53:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831162
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Manufacturing
    Victim Organization: The Plastic Man
    Victim Site: www.theplasticman.co.uk
  100. Alleged Cyber Attack on South Korea Industrial Ultrapure Water Treatment System by Z-PENTEST Alliance
    Category: Cyber Attack
    Content: Threat group Z-PENTEST Alliance claims to have compromised a Smart Pure Water System (MSTEC PureWater 100) industrial ultrapure water treatment plant in South Korea. The group alleges full control including real-time monitoring of INLET/OUTLET parameters (conductivity, TDS, pH, turbidity, chlorine, temperature, flow rate), access to EC and pH sensors with ability to alter calibration and compensation factors, control over solenoid valves and drain valves (Drain 1 & 2), and bypass of the settings password. The group states they can distort sensor readings, manipulate calibration, or cause system failures. They identify the target as critical infrastructure serving chip manufacturing and pharmaceutical industries. Post includes video evidence of access and hashtags referencing #OpSouthKorea.
    Date: 2026-04-06T16:52:32Z
    Network: telegram
    Published URL: https://t.me/Z_Pentest_Alliance_ru/925
    Screenshots:
    None
    Threat Actors: Z-PENTEST Alliance
    Victim Country: South Korea
    Victim Industry: Critical Infrastructure / Water Treatment (Semiconductor & Pharmaceutical Supply)
    Victim Organization: MSTEC PureWater 100 (Smart Pure Water System)
    Victim Site: Unknown
  101. Website defacement of Gillies by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Gillies website on April 6, 2026. This was an individual defacement targeting the UK-based organizations web presence.
    Date: 2026-04-06T16:52:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831168
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Gillies
    Victim Site: www.gillies.co.uk
  102. Website defacement of GoFish by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of the GoFish website on April 6, 2026. The incident targeted the media/customer section of the UK-based organizations website.
    Date: 2026-04-06T16:46:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831016
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: GoFish
    Victim Site: gofish.co.uk
  103. Website defacement of Grão Café by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a page on the Grão Café website on April 6, 2026. This was an isolated defacement targeting the Brazilian coffee companys customer media section.
    Date: 2026-04-06T16:45:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831017
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Food and Beverage
    Victim Organization: Grão Café
    Victim Site: graocafe.com.br
  104. Website defacement of Helikon-Tex by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against Helikon-Tex, a tactical equipment manufacturer, targeting their media/customer section on April 6, 2026.
    Date: 2026-04-06T16:45:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831019
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Helikon-Tex
    Victim Site: helikon-tex.com
  105. Website defacement of hornval.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer management page on hornval.com on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T16:44:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831020
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Hornval
    Victim Site: hornval.com
  106. Alleged sale of personal identity data including SSNs and drivers licenses
    Category: Data Breach
    Content: Threat actor Target777 is selling comprehensive personal identity information including full names, addresses, Social Security Numbers, and drivers license numbers with pricing tiers based on credit scores ranging from $9 to $25 per record. The actor advertises through Telegram channels and claims the data is fresh.
    Date: 2026-04-06T16:43:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71317/
    Screenshots:
    None
    Threat Actors: Target777
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Website defacement of HyperBar USA by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the HyperBar USA website on April 6, 2026. The defacement targeted a specific media/customer page rather than the main homepage.
    Date: 2026-04-06T16:43:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831021
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United States
    Victim Industry: Food and Beverage
    Victim Organization: HyperBar USA
    Victim Site: hyperbarusa.com
  108. Website defacement of Irwin Tiles by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Irwin Tiles website on April 6, 2026. The defacement targeted a specific page within the companys media directory rather than the homepage.
    Date: 2026-04-06T16:42:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831024
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ireland
    Victim Industry: Construction/Building Materials
    Victim Organization: Irwin Tiles
    Victim Site: irwintiles.ie
  109. Website defacement of mein-atmos.de by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the German website mein-atmos.de on April 6, 2026. The incident was not part of a mass defacement campaign or redefacement operation.
    Date: 2026-04-06T16:42:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831058
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mein-atmos.de
  110. Website defacement of NW Horseshoes by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the NW Horseshoes website on April 6, 2026. The incident targeted a UK-based horseshoe retailer and appears to be an isolated attack rather than part of a mass defacement campaign.
    Date: 2026-04-06T16:41:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831064
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: NW Horseshoes
    Victim Site: nwthorseshoes.co.uk
  111. Website defacement of Packout by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Packout website on April 6, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-06T16:41:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831067
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Taiwan
    Victim Industry: Unknown
    Victim Organization: Packout
    Victim Site: packout.com.tw
  112. Website defacement of Pacvac by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer data page on pacvac.com on April 6, 2026. This was an individual defacement targeting a specific subdirectory of the Pacvac website.
    Date: 2026-04-06T16:40:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831068
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Pacvac
    Victim Site: pacvac.com
  113. Website defacement of Rabenbunt-Stoffe by DimasHxR
    Category: Defacement
    Content: German textile retailer Rabenbunt-Stoffe suffered a website defacement attack by threat actor DimasHxR on April 6, 2026. The attacker targeted a specific media directory rather than the main homepage.
    Date: 2026-04-06T16:39:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831073
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Retail/Textiles
    Victim Organization: Rabenbunt-Stoffe
    Victim Site: rabenbunt-stoffe.de
  114. Website defacement of scorpena.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced scorpena.com on April 6, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-06T16:39:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831078
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Scorpena
    Victim Site: scorpena.com
  115. Website defacement of Sports Branding International by DimasHxR
    Category: Defacement
    Content: Website defacement incident targeting Sports Branding International conducted by threat actor DimasHxR on April 6, 2026. The attack was a single-site defacement rather than a mass defacement campaign.
    Date: 2026-04-06T16:38:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831090
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Sports/Marketing
    Victim Organization: Sports Branding International
    Victim Site: sportsbrandinginternational.co
  116. Website defacement of spreewald-gurke.de by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the German food company Spreewald Gurkes website on April 6, 2026. The defacement targeted a specific media directory rather than the homepage.
    Date: 2026-04-06T16:38:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831091
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Food/Agriculture
    Victim Organization: Spreewald Gurke
    Victim Site: spreewald-gurke.de
  117. Website defacement of storvatt.at by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against storvatt.at on April 6, 2026. The attack targeted a specific subdirectory on the Austrian website.
    Date: 2026-04-06T16:37:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831112
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Austria
    Victim Industry: Unknown
    Victim Organization: Storvatt
    Victim Site: storvatt.at
  118. Website defacement of thehoomanlife.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced thehoomanlife.com on April 6, 2026. The attack targeted a specific subdirectory rather than the main page and was not part of a mass defacement campaign.
    Date: 2026-04-06T16:37:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831117
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: The Hooman Life
    Victim Site: thehoomanlife.com
  119. Website defacement of TipTop Shop by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Australian retail website tiptopshop.com.au on April 6, 2026. The defacement targeted a specific media directory rather than the homepage.
    Date: 2026-04-06T16:36:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831119
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Retail/E-commerce
    Victim Organization: TipTop Shop
    Victim Site: tiptopshop.com.au
  120. Website defacement of usamake.com by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the usamake.com website on April 6, 2026. The attacker operated as a lone actor without team affiliation and targeted the sites media customer directory.
    Date: 2026-04-06T16:35:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831123
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: USAMake
    Victim Site: usamake.com
  121. Website defacement of Vaudoise webshop by DimasHxR
    Category: Defacement
    Content: The threat actor DimasHxR successfully defaced the Vaudoise insurance companys webshop domain on April 6, 2026. This appears to be an isolated defacement incident targeting the Swiss insurance providers e-commerce platform.
    Date: 2026-04-06T16:35:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831124
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Switzerland
    Victim Industry: Insurance
    Victim Organization: Vaudoise
    Victim Site: vaudoise-webshop.ch
  122. Website defacement of Vuurwerk Oostvoorne by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the website of Vuurwerk Oostvoorne, a Dutch fireworks company, on April 6, 2026. This appears to be an isolated single-site defacement targeting the companys publication media directory.
    Date: 2026-04-06T16:34:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831126
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Retail/Entertainment
    Victim Organization: Vuurwerk Oostvoorne
    Victim Site: vuurwerkoostvoorne.nl
  123. Website defacement of World of Vape by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the World of Vape website, a Swiss e-commerce platform specializing in vaping products. The defacement targeted a specific media customer directory on the site on April 6, 2026.
    Date: 2026-04-06T16:34:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831127
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Switzerland
    Victim Industry: Retail/E-commerce
    Victim Organization: World of Vape
    Victim Site: worldofvape.ch
  124. Website defacement of Xpress Sportswear by DimasHxR
    Category: Defacement
    Content: On April 6, 2026, the Australian sportswear retailer Xpress Sportswears website was defaced by an individual attacker identified as DimasHxR. The defacement targeted a specific page rather than the main homepage.
    Date: 2026-04-06T16:33:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831130
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Retail/Apparel
    Victim Organization: Xpress Sportswear
    Victim Site: xpresssportswear.com.au
  125. Website defacement of zabawkaiwyprawka.pl by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the Polish retail website zabawkaiwyprawka.pl on April 6, 2026. The attack targeted a subdirectory of the domain rather than the main homepage.
    Date: 2026-04-06T16:32:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831133
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Retail/E-commerce
    Victim Organization: Unknown
    Victim Site: zabawkaiwyprawka.pl
  126. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a credential list containing 1,058 Hotmail email and password combinations through free download, claiming the credentials are valid and premium quality.
    Date: 2026-04-06T16:32:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71316/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  127. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Threat actor klyne05 is distributing a free combolist containing mixed email credentials that are claimed to be private, fresh, and verified. The specific source and volume of credentials are not disclosed in the forum post.
    Date: 2026-04-06T16:21:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71315/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged Global Recruitment Call by Handala Hack for Coordinated Cyber Attacks Against Israeli and US Infrastructure
    Category: Cyber Attack
    Content: The Handala hacking group has issued a public call to recruit hackers worldwide to conduct cyber attacks against Israeli (Zionist), US, and allied state infrastructure. The group offers technical and strategic backing for offensive cyber operations and provides a Session (encrypted messenger) contact ID for coordination: 0540251cdd0d3f013456f186723cd47aaf2c8cf23c5df599661d68fd6fef7dc929. This represents an active threat actor recruitment and coordination effort targeting critical infrastructure of multiple nations.
    Date: 2026-04-06T16:19:52Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/88
    Screenshots:
    None
    Threat Actors: Handala
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Website defacement of avurefa.org by MR~TNT
    Category: Defacement
    Content: The website avurefa.org was defaced by attacker MR~TNT on April 6, 2026. The incident was a single-page defacement targeting a Linux-hosted website.
    Date: 2026-04-06T16:04:09Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248331
    Screenshots:
    None
    Threat Actors: MR~TNT, No team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: avurefa.org
  130. Website defacement of 1line.ae by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer address page on the 1line.ae website on April 6, 2026. This was an isolated defacement incident targeting a specific page rather than a mass or home page attack.
    Date: 2026-04-06T15:58:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830952
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Arab Emirates
    Victim Industry: Unknown
    Victim Organization: 1line
    Victim Site: 1line.ae
  131. Website defacement of Accuvoertuig by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the Belgian automotive company Accuvoertuigs website on April 6, 2026. This was a single-target defacement incident with no identified team affiliation or stated motivation.
    Date: 2026-04-06T15:57:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830962
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Belgium
    Victim Industry: Automotive
    Victim Organization: Accuvoertuig
    Victim Site: www.accuvoertuig.be
  132. Website defacement of ProShop by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the ProShop e-commerce website on April 6, 2026. The attack targeted a media/customer directory on the UAE-based retail platform.
    Date: 2026-04-06T15:57:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830965
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Arab Emirates
    Victim Industry: Retail/E-commerce
    Victim Organization: ProShop
    Victim Site: www.proshop.ae
  133. Website defacement of Venum by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced a subdirectory of the Venum sports apparel companys Chinese website on April 6, 2026. The attack targeted a specific media/customer section rather than the main homepage.
    Date: 2026-04-06T15:56:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830966
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: China
    Victim Industry: Sports/Apparel
    Victim Organization: Venum
    Victim Site: venum.com.cn
  134. Website defacement of WASM by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the WASM website on April 6, 2026. The attack targeted a specific page within the organizations media/customer section.
    Date: 2026-04-06T15:56:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830967
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Qatar
    Victim Industry: Unknown
    Victim Organization: WASM
    Victim Site: www.wasm.qa
  135. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 260,000 Hotmail credentials on a cybercriminal forum. The credentials appear to be made available for free download to forum members.
    Date: 2026-04-06T15:55:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71313/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  136. Alleged leak of mixed international credential lists
    Category: Combo List
    Content: Threat actor MegaCloudshop shared a combolist containing 6.7K email:password combinations from multiple regions including USA, EU, Asia, and Russia. The credentials are claimed to be fully valid and from mixed sources.
    Date: 2026-04-06T15:45:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-6-7K-USA-EU-ASIA-RU-Full-Valid-Mix-06-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  137. Alleged leak of international credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 6.7K credentials from users across USA, EU, Asia, and Russia regions dated April 6th. The credentials are described as a valid mix suggesting they may be tested or verified working accounts.
    Date: 2026-04-06T15:44:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71307/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Website defacement of Aline Cabinetry by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a page on the Aline Cabinetry website on April 6, 2026. This was a single-site defacement targeting a Canadian cabinetry manufacturers media directory.
    Date: 2026-04-06T15:44:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830931
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Canada
    Victim Industry: Manufacturing
    Victim Organization: Aline Cabinetry
    Victim Site: www.alinecabinetry.ca
  139. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor noir is distributing a credential combolist containing alleged valid Hotmail accounts along with mixed credentials from other services via Telegram channel.
    Date: 2026-04-06T15:44:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71308/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  140. Alleged distribution of mixed cloud credential combolist containing 12 million records
    Category: Combo List
    Content: Threat actor CODER is distributing a mixed cloud credential combolist containing 12 million records through Telegram channels. The actor operates multiple Telegram groups for sharing free combos and programs.
    Date: 2026-04-06T15:44:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71309/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  141. Website defacement of Scarban by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against scarban.co.uk on April 6, 2026. The attack targeted a specific media subdirectory rather than the main homepage.
    Date: 2026-04-06T15:43:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830932
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Scarban
    Victim Site: scarban.co.uk
  142. Alleged leak of 61 million credentials
    Category: Combo List
    Content: Actor Leak Realm allegedly leaked 61 million username:login:password credentials on a cracking forum. The post content is hidden behind registration requirements, limiting visibility of additional details.
    Date: 2026-04-06T15:43:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71310/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Alleged distribution of stealer logs and credential lists
    Category: Logs
    Content: Threat actor watercloud is distributing stealer logs and credential lists (U.L.P) through file hosting service Pixeldrain. The actor promotes daily access to fresh logs through a Telegram channel for ongoing distribution.
    Date: 2026-04-06T15:43:21Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90%E2%AD%90%E2%AD%90-STEALER-LOGS-AND-U-L-P-06-04-2026
    Screenshots:
    None
    Threat Actors: watercloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Website defacement of Kingfisher Direct by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Kingfisher Direct e-commerce website on April 6, 2026. This was a single-target defacement incident affecting the UK-based retail companys online presence.
    Date: 2026-04-06T15:43:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830933
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: Kingfisher Direct
    Victim Site: www.kingfisherdirect.co.uk
  145. Website defacement of e-lte.com.mx by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against e-lte.com.mx on April 6, 2026. The attack targeted a specific page within the media/customer section of the website.
    Date: 2026-04-06T15:42:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830936
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Mexico
    Victim Industry: Technology
    Victim Organization: E-LTE
    Victim Site: e-lte.com.mx
  146. Website defacement of Caterfair by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Caterfair catering company website on April 6, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-06T15:42:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830938
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Food Services
    Victim Organization: Caterfair
    Victim Site: caterfair.co.uk
  147. Website defacement of Oasis Floral by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the UK-based Oasis Floral company website on April 6, 2026. The defacement targeted a specific page within the media directory rather than the homepage.
    Date: 2026-04-06T15:41:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830940
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/Floral Services
    Victim Organization: Oasis Floral
    Victim Site: www.oasisfloral.co.uk
  148. Website defacement of Howe Tools by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the Howe Tools website on April 6, 2026. The attack targeted the companys media directory and was documented on zone-xsec mirror service.
    Date: 2026-04-06T15:40:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830944
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/Tools
    Victim Organization: Howe Tools
    Victim Site: www.howetools.co.uk
  149. Website defacement of Luxnote by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdirectory of the French website luxnote.fr on April 6, 2026. The attack targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-06T15:40:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830945
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Luxnote
    Victim Site: www.luxnote.fr
  150. Website defacement of Direct Water Tanks by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the website of Direct Water Tanks, a UK-based water storage tank company, on April 6, 2026.
    Date: 2026-04-06T15:39:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830950
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Manufacturing
    Victim Organization: Direct Water Tanks
    Victim Site: www.directwatertanks.co.uk
  151. Alleged leak of credential combolist containing 43 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 43 million URL:LOGIN:PASS combinations on a cybercrime forum. The post content is restricted and requires registration to view full details.
    Date: 2026-04-06T15:32:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71303/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: User D4rkNetHub shared a collection of 819 Hotmail credentials on a cracking forum. The data appears to be offered as a free download requiring forum registration to access.
    Date: 2026-04-06T15:31:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71304/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  153. Alleged leak of corporate email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 15,900 corporate email credentials with full mail access. The credentials appear to be from mixed corporate organizations and were made available for free download to registered forum users.
    Date: 2026-04-06T15:20:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71302/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  154. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 664,000 alleged Hotmail email and password combinations via a file sharing service. The credentials are claimed to be fresh and were made available for free download.
    Date: 2026-04-06T15:09:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-664X-FRESH-HOTMAIL-Vyrixcl-txt
    Screenshots:
    None
    Threat Actors: Akari21
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  155. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 31,000 allegedly fresh and valid German email credentials on an underground forum.
    Date: 2026-04-06T15:07:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71301/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Alleged Mass Defacement by Mr.PIMZZZXploit Targeting Multiple Websites
    Category: Defacement
    Content: Threat actor Mr.PIMZZZXploit, affiliated with Babayo Eror System, claims to have defaced over 20 websites spanning multiple domains and countries including India, Nepal, Chile, Croatia, and others. Targeted domains include solar.deed.up.in, bhaktilyrics.xyz.lyricsagni.in, arbeittechnology.com subdomains, prodigygroupindia.com, agenciamesamarcial.cl, and others.
    Date: 2026-04-06T15:05:18Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/458
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Unknown
    Victim Site: solar.deed.up.in, bhaktilyrics.xyz.lyricsagni.in, machin-test9.clientsdevsite.com, backup.nepal-vanjava.com, arbeittechnology.com, omcdemosite.com, fixxamarketing.com, prodigygroupindia.com, botiflay.art, agenciamesamarcial.cl, agenciasobremesa.cl, omcdemosites.com, knezovic-digital.hr
  157. Website defacement of Luvmart by DimasHxR
    Category: Defacement
    Content: Indonesian e-commerce website Luvmart was defaced by threat actor DimasHxR on April 6, 2026. The attack targeted a specific page within the customer address section of the website.
    Date: 2026-04-06T15:05:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830921
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Indonesia
    Victim Industry: E-commerce
    Victim Organization: Luvmart
    Victim Site: luvmart.id
  158. Alleged data leak of Center for Administrative Services in Ternopil, Ukraine
    Category: Data Leak
    Content: The threat actor Перун Сварога (Perun Svaroga), forwarded via the OverFlame channel, claims to have leaked data from the Center for Administrative Services (CNAP) in Ternopil, Ukraine (cnap.rada.te.ua). The post describes the leak as fresh/current as of April 2026 and appears motivated by pro-Russian sentiment, using derogatory language toward Ukrainians. The leak is shared freely with no price mentioned.
    Date: 2026-04-06T14:53:45Z
    Network: telegram
    Published URL: https://t.me/perunswaroga/1328
    Screenshots:
    None
    Threat Actors: Перун Сварога
    Victim Country: Ukraine
    Victim Industry: Government
    Victim Organization: Center for Administrative Services in Ternopil (ЦНАП)
    Victim Site: cnap.rada.te.ua
  159. Alleged cybercriminal seeking staff position on BreachForums
    Category: Alert
    Content: Individual identifying as OSINT enthusiast applies for staff position on BreachForums cybercriminal marketplace, claiming experience with databases and previous moderation roles. The application indicates ongoing criminal forum operations following RF seizure.
    Date: 2026-04-06T14:52:58Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Sythe-s-Staff-Application–187868
    Screenshots:
    None
    Threat Actors: Sythe
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. Alleged distribution of credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist titled X1334 HQ Mix on a cybercriminal forum. No additional details about the content or scope are available.
    Date: 2026-04-06T14:44:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1334-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged distribution of mixed-country email credential combolist
    Category: Combo List
    Content: Threat actor distributing a combolist containing 10 million email and password combinations from multiple countries through Telegram channels. The credentials are being shared for free through dedicated Telegram groups.
    Date: 2026-04-06T14:41:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71299/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,600 mixed email credentials described as fresh and high quality on a cybercrime forum.
    Date: 2026-04-06T14:41:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71300/
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged sale of T1erOne malware forum account access
    Category: Initial Access
    Content: Threat actor Akiro is selling full access to a premium account on the T1erOne malware forum for $70. The account provides complete forum access and is described as well-established and active with no warnings.
    Date: 2026-04-06T14:22:45Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Malware-Forum-Account-%E2%80%93-Instant-Access
    Screenshots:
    None
    Threat Actors: Akiro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: T1erOne
    Victim Site: Unknown
  164. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample of 718 Hotmail credentials as a free download on a cybercriminal forum. This appears to be a combolist containing email and password combinations.
    Date: 2026-04-06T14:14:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71298/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  165. Alleged leak of USA credential combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 19,000 valid email and password combinations from USA users through a free download link on a paste site.
    Date: 2026-04-06T14:06:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-19K-USA-VALID
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a free download link to a combolist containing 2,000 mixed email and password combinations on a cybercrime forum.
    Date: 2026-04-06T14:05:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2K-MIXED-ACCESS–199531
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Alleged leak of IPTV service credentials
    Category: Combo List
    Content: Forum post claims to contain MAC addresses and Stalker portal credentials for IPTV services, with 21 records allegedly made available for download.
    Date: 2026-04-06T13:54:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71297/
    Screenshots:
    None
    Threat Actors: ouaaka_06
    Victim Country: Unknown
    Victim Industry: Media and Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  168. Alleged Exposure of Threat Actor Kurmaev Ramil Rinatovich Linked to ReHubcom Forum Hosting and DDoS Operations
    Category: Cyber Attack
    Content: A Telegram post by channel Tor Zireael alleges that Kurmaev Ramil Rinatovich, owner of vmwall.com and flare.su/flare-host.ru, is knowingly hosting the cybercrime forum ReHubcom. The post claims the forums public IP 198.251.89.127 belongs to vmwall.com, and the non-public IP 5.175.247.131 belongs to flare.su — both owned by Kurmaev. Additionally, Kurmaev is alleged to personally conduct DDoS attacks (including against Russian targets and the Pentagon), purchase spammed IP blocks for brute-force and scanning, and operate a dark Telegram channel Blog about IT where he shares DDoS activity. The author warns of potential US legal exposure if ReHubcom affiliates attack US hospitals.
    Date: 2026-04-06T13:53:52Z
    Network: telegram
    Published URL: https://t.me/c/2138027628/934
    Screenshots:
    None
    Threat Actors: Kurmaev Ramil Rinatovich
    Victim Country: Russia
    Victim Industry: Hosting / Cybercrime Forum
    Victim Organization: ReHubcom Forum / vmwall.com / flare.su
    Victim Site: rehub.com, vmwall.com, flare.su, flare-host.ru, sayto1k.ru
  169. Alleged leak of Australian credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 350,000 Australian email and password combinations on a cybercrime forum. The actor also advertises additional services including cracking tools and lessons through Telegram channels.
    Date: 2026-04-06T13:46:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-350K-AUSTRALIA-Good-Quality-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Alleged leak of Austrian email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 290,000 email and password combinations allegedly from Austrian users on a cybercrime forum.
    Date: 2026-04-06T13:44:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-290K-AUSTRIA-EmailPass-HQ-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Austria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged leak of Polish credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 600,000 Polish email and password combinations, described as fresh and high quality credentials.
    Date: 2026-04-06T13:43:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-600K-POLAND-FRESH-HQ-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  172. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 360,000 Hotmail email and password combinations on a cybercrime forum. The credentials are claimed to be fresh and high quality.
    Date: 2026-04-06T13:42:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-360K-HOTMAIL-Good-Quality-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  173. Alleged leak of Mexican credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 250,000 email and password combinations targeting Mexican users. The credentials are described as high quality and semi-private, suggesting they may be from recent breaches or credential stuffing operations.
    Date: 2026-04-06T13:41:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-250K-MEXICO-Semi-Private-HQ-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Alleged distribution of German credential combolist
    Category: Combo List
    Content: A threat actor distributed a combolist containing 280,000 German email and password combinations through a cybercriminal forum. The actor promotes additional services including cracking tools and lessons via Telegram channels.
    Date: 2026-04-06T13:40:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-280K-GERMANY-High-Quality-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Alleged leak of Japanese credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 160,000 email and password combinations targeting Japanese users on a cybercriminal forum.
    Date: 2026-04-06T13:39:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-160K-JAPAN-Semi-Private-Good-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Alleged leak of mixed gaming and social media credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 1 million mixed credentials allegedly suitable for gaming and social media platforms. The actor also advertises various cybercriminal services and tools through Telegram channels.
    Date: 2026-04-06T13:30:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1M-Mixed-Combolist-Good-For-Gaming-Social-Media
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Alleged Sale of Access to pipersofdistinction.com and genesislawpa.com
    Category: Initial Access
    Content: Threat actor from Pharaohs Team market channel posted two domains — pipersofdistinction.com and genesislawpa.com — marked as #sold, indicating these assets (likely initial access, credentials, or similar) were sold to a buyer.
    Date: 2026-04-06T13:21:40Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/461
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pipersofdistinction.com
  178. Alleged sale of compromised premium streaming and software service accounts
    Category: Data Breach
    Content: Threat actor BV12 is selling compromised premium accounts for multiple streaming and software services including Netflix, Disney+, Spotify, YouTube Premium, Adobe Creative Cloud, ChatGPT, and HBO Max with 12-month warranties at significantly reduced prices.
    Date: 2026-04-06T13:18:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71296/
    Screenshots:
    None
    Threat Actors: BV12
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Netflix, Disney+, Spotify, YouTube, Adobe, ChatGPT, HBO Max)
    Victim Site: Unknown
  179. Alleged sale of mail access, combolists, and stealer logs across multiple countries
    Category: Logs
    Content: A threat actor operating via @Dataxlogs is advertising mail access for accounts across 10+ countries (FR, BE, AU, CA, UK, US, NL, PL, DE, JP), along with configs, scripts, tools, hits, and combo lists. Requests are accepted, indicating a made-to-order credential access service.
    Date: 2026-04-06T12:45:41Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59612
    Screenshots:
    None
    Threat Actors: .py
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  180. Alleged Cyber Attack on South Korea Industrial Ultrapure Water Treatment System by Z-Pentest Alliance
    Category: Cyber Attack
    Content: Threat group Z-Pentest Alliance claims to have compromised a Smart Pure Water System (MSTEC PureWater 100) industrial ultrapure water treatment plant in South Korea. The group alleges full real-time control over INLET/OUTLET monitoring parameters including conductivity, TDS, pH, turbidity, chlorine, temperature, and flow rate. They claim the ability to manipulate EC and pH sensor calibration, offsets, and compensation factors, control solenoid valves and drain valves (Drain 1 & 2), and bypass the settings password. The group states the system serves critical infrastructure for chip manufacturing and pharmaceutical production, and threatens to distort sensor readings, alter calibration, or cause system failure. Video evidence of access is claimed.
    Date: 2026-04-06T12:33:43Z
    Network: telegram
    Published URL: https://t.me/c/2729466495/925
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: South Korea
    Victim Industry: Critical Infrastructure / Water Treatment / Semiconductor / Pharmaceuticals
    Victim Organization: MSTEC PureWater 100 (Smart Pure Water System)
    Victim Site: Unknown
  181. Alleged leak of mixed credential combolist on underground forum
    Category: Combo List
    Content: A threat actor shared an 82,000 record mixed credential combolist containing forum-related credentials on an underground forum. The post content is restricted to registered users only.
    Date: 2026-04-06T12:28:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71294/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  182. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,200 Hotmail email credentials, allegedly validated as of April 6th. The credentials are being distributed for free to registered forum users.
    Date: 2026-04-06T12:28:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71295/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  183. Alleged Data Leak of Chinese Cybersecurity Firm Integrity Technology Group (永信至诚)
    Category: Data Leak
    Content: A threat actor operating under the alias Dedale Office claims to have leaked sensitive data belonging to Integrity Technology Group (永信至诚), a Chinese network security company. The leaked data allegedly includes a staff list (471 entries), customer information (7,250 entries), transaction revenue/expense records (2,797 entries), scan data (53 files), attack and defense target lists, VPS credentials, overseas proxy IPs, important customer lists, stolen data archives, and other contracts. A sample was shared. Contact provided via @DedaleSupport and @DedaleOfficials.
    Date: 2026-04-06T12:27:13Z
    Network: telegram
    Published URL: https://t.me/DedaleOfficials/126
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: China
    Victim Industry: Cybersecurity
    Victim Organization: Integrity Technology Group (永信至诚)
    Victim Site: Unknown
  184. Alleged sale of domain list with DA/PA metrics for SEO or phishing infrastructure
    Category: Initial Access
    Content: A threat actor operating under Pharaohs Team market is offering a list of 22 domains with their Domain Authority (DA) and Page Authority (PA) scores. The domains span multiple countries and hosting providers including Hostinger, WPEngine, and myftpupload subdomains. Such lists are typically used for SEO spam injection, link farming, phishing infrastructure, or compromised site access. A contact handle (@phteam_s) is provided, indicating a commercial offering.
    Date: 2026-04-06T12:23:51Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/460
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Alleged sale of Telegram channel boost services
    Category: Services
    Content: Threat actor Kenz is selling Telegram channel boost services with pricing ranging from $0.3 to $1.4 per boost depending on duration. The service claims instant delivery and legal guarantees, with payment accepted in cryptocurrency.
    Date: 2026-04-06T12:18:53Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-1-UHQ-%E2%9A%A1-Telegram-Channel-Boosts-%E2%9A%A1-100-UHQ-Boosts-%E2%AD%90-Cheapest-Prices-%E2%AD%90–187860
    Screenshots:
    None
    Threat Actors: Kenz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Alleged fraudulent Telegram Stars service offering
    Category: Services
    Content: Threat actor Kenz advertises fraudulent Telegram Stars service with pricing from $1.99 to $28.99, claiming legal procurement while operating on cybercriminal forum. Service likely involves unauthorized manipulation of Telegrams virtual currency system.
    Date: 2026-04-06T12:18:14Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-1-UHQ-%E2%9A%A1-Telegram-Stars-Gifts-%E2%9A%A1-100-Legal-Safe-%E2%AD%90-Cheapest-Prices-%E2%AD%90–187861
    Screenshots:
    None
    Threat Actors: Kenz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Telegram
    Victim Site: telegram.org
  187. Alleged cryptocurrency exchange service with low fees
    Category: Services
    Content: User advertising a cryptocurrency exchange service offering crypto-to-crypto conversion with 2-3% fees and claiming fast processing times. Contact provided via Telegram handle @KenzX.
    Date: 2026-04-06T12:17:53Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-%E2%9A%9C%EF%B8%8F-CRYPTO-TO-CRYPTO-%E2%9A%9C%EF%B8%8F-WITH-ONLY-2-3-FEE-FAST-EXCHANGE-%E2%9A%A1–187862
    Screenshots:
    None
    Threat Actors: Kenz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. Website defacement of Palmetto Hall Street by Zod
    Category: Defacement
    Content: The attacker known as Zod defaced the Palmetto Hall Street website hosted on WP Engine on April 6, 2026. The defacement targeted a specific page (zod.html) on the Linux-based server.
    Date: 2026-04-06T12:17:22Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248330
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Palmetto Hall Street
    Victim Site: palmettohallst.wpengine.com
  189. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared 1,646 fresh Hotmail credential combinations on a cybercrime forum. The credentials are made available for registered users to download.
    Date: 2026-04-06T12:09:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71293/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  190. Alleged data breach of Kbank Vietnam customer database
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing over 10 million customer records from Kbank Vietnam, including personal information, employment details, credit scores, and risk classifications. The data allegedly includes customer IDs, names, national IDs, addresses, phone numbers, salary information, and credit scores.
    Date: 2026-04-06T12:08:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-VIETNAM-Kbank-credit-info-10-MM-registrations
    Screenshots:
    None
    Threat Actors: hackboy
    Victim Country: Vietnam
    Victim Industry: Financial Services
    Victim Organization: Kbank Vietnam
    Victim Site: Unknown
  191. Alleged data breach of AlumnForce affecting French educational institutions
    Category: Data Breach
    Content: Threat actor HexDex claims to be selling personal data of 2.7 million individuals from AlumnForce, a platform for managing alumni and professional communities. The data allegedly includes personal information, contact details, education records, and employment history from 49 French educational institutions dating back to 1987.
    Date: 2026-04-06T12:08:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FR-2-6M-AlumnForce
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Education
    Victim Organization: AlumnForce
    Victim Site: Unknown
  192. Alleged sale of BreachForums database and source code
    Category: Data Breach
    Content: Threat actor Knox claims to be selling a complete database backup and source code from BreachForums dating from March 28, 2026. The offering includes the full database and MyBB scripts/plugins, with contact available via forum PM and Telegram.
    Date: 2026-04-06T12:07:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-BreachForums-Database-Source-code-is-up-for-sale
    Screenshots:
    None
    Threat Actors: Knox
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: BreachForums
    Victim Site: BreachForums.as
  193. Alleged Free Leak of Linux/RDP Server Credentials with Administrator Access
    Category: Initial Access
    Content: A threat actor sharing under the handle parsa has publicly distributed a list of approximately 20 Linux/Windows server credentials including IP addresses, ports, hostnames, and administrator passwords. The post is framed as free Linux servers and includes a contact for purchasing additional RDP access (@parsardp). Credentials appear to target systems across multiple IP ranges with common weak passwords.
    Date: 2026-04-06T12:01:29Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59627
    Screenshots:
    None
    Threat Actors: parsa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  194. Alleged data leak of Asian company credentials by threat actor zod
    Category: Combo List
    Content: Threat actor zod posted content related to an Asian company on a credential trading forum, with access details provided through a Telegram channel. The specific nature and scope of the data remains unclear due to restricted access to the full post content.
    Date: 2026-04-06T11:50:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71291/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  195. Alleged sale of Due.com credentials
    Category: Data Breach
    Content: Threat actor fent888 is allegedly selling 1,723 Due.com accounts in bulk quantities for $0.30 each with a minimum purchase of 50 accounts.
    Date: 2026-04-06T11:46:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Due-com-Accounts
    Screenshots:
    None
    Threat Actors: fent888
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Due
    Victim Site: due.com
  196. Alleged distribution of stealer logs by FateTraffic
    Category: Logs
    Content: Threat actor fatetraffic distributed a collection of 2,094 mixed stealer logs through a file sharing service. The logs appear to contain stolen credentials and browser data harvested by information stealing malware.
    Date: 2026-04-06T11:46:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%93%97-FATETRAFFIC-2094-MIX-06-04-2026-STEALER-LOGS
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Alleged sale of Glovo account credentials
    Category: Data Breach
    Content: Threat actor fent888 is allegedly selling 862 Glovo account credentials for $0.40 each with a minimum purchase of 50 accounts. The actor is conducting sales through Telegram channels.
    Date: 2026-04-06T11:46:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Glovo-Accounts
    Screenshots:
    None
    Threat Actors: fent888
    Victim Country: Unknown
    Victim Industry: Food Delivery Services
    Victim Organization: Glovo
    Victim Site: glovo.com
  198. Alleged imminent cyber attack announced by Cyber Islamic Resistance against Israeli targets
    Category: Cyber Attack
    Content: The group Cyber Islamic Resistance announced via the Fynix channel that today will witness the strongest cyber attack against Israeli occupation institutions and websites since the beginning of what they call the great epic battle (معركة الملحمة الكبرى), framed within their ongoing Promise of the Hereafter (وعد الاخرة) campaign. The post urges followers to watch for upcoming activity.
    Date: 2026-04-06T11:40:36Z
    Network: telegram
    Published URL: https://t.me/CIR48/1852
    Screenshots:
    None
    Threat Actors: Cyber Islamic Resistance
    Victim Country: Israel
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 5,200 mixed high-quality credentials for free download on a cybercriminal forum.
    Date: 2026-04-06T11:37:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71290/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Alleged leak of fenixlogin.dyndns.tv database
    Category: Data Leak
    Content: A threat actor claimed to have leaked a SQL database from fenixlogin.dyndns.tv containing 11,803 records dated March 24, 2026. The database appears to contain user account information including usernames, passwords, display names, phone numbers, IP addresses, and subscription details.
    Date: 2026-04-06T11:36:35Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-fenixlogin-dyndns-tv
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: fenixlogin.dyndns.tv
  201. Alleged malware campaign by North Korean group UNC1069 targeting Node.js developers
    Category: Malware
    Content: The North Korean hacking group UNC1069 is reportedly targeting well-known Node.js developers through social engineering tactics. Attackers are deceiving victims into installing malware via fake software updates. Developers of widely-used NPM packages with billions of downloads are said to be at risk. Security experts are urging reporting of any suspicious activity.
    Date: 2026-04-06T11:33:21Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21018
    Screenshots:
    None
    Threat Actors: UNC1069
    Victim Country: Unknown
    Victim Industry: Technology / Software Development
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor claims to have private Hotmail valid credentials available on a cybercrime forum. The post content is restricted and requires registration to view details.
    Date: 2026-04-06T11:09:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71288/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  203. Alleged sale of fraudulent streaming service and software upgrades
    Category: Initial Access
    Content: Threat actor ChepStore is allegedly selling unauthorized upgrades to premium streaming services and software subscriptions at significantly reduced prices, likely through compromised accounts or fraudulent payment methods. Services include Netflix, Disney+, Spotify, Adobe Creative Cloud, and ChatGPT with contact via Discord and Telegram.
    Date: 2026-04-06T11:08:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71289/
    Screenshots:
    None
    Threat Actors: ChepStore
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple streaming and software providers
    Victim Site: Unknown
  204. Website defacement of Digital Marketing Community by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The attacker tirz4sec from the jatengblekhet team defaced the Digital Marketing Community website on April 6, 2026. This appears to be a single-target defacement attack against a marketing industry website.
    Date: 2026-04-06T10:54:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830852
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Marketing/Advertising
    Victim Organization: Digital Marketing Community
    Victim Site: www.digitalmarketingcommunity….
  205. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 600 Hotmail email and password combinations through Telegram. The credentials are claimed to be valid and high quality.
    Date: 2026-04-06T10:47:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71285/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  206. Alleged data leak of Universidad Autonoma Intercultural de Sinaloa database
    Category: Data Leak
    Content: Database containing comprehensive personal information of university students including full names, contact details, addresses, birth dates, CURP numbers, academic programs, disability status, indigenous language information, household data, and financial information was made available for free download on a dark web forum.
    Date: 2026-04-06T10:28:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-M%C3%89XICO-UNIVERSIDAD-AUTONOMA-INTERCULTURAL-DE-SINALOA
    Screenshots:
    None
    Threat Actors: SpeakTeam
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Universidad Autonoma Intercultural de Sinaloa
    Victim Site: Unknown
  207. Alleged sale of initial access to multiple organizations across various industries
    Category: Initial Access
    Content: Threat actor KazeFreak advertised multiple initial access offerings including VPN and Active Directory access to organizations across construction, telecommunications, mining, education, and food & beverage sectors in Poland, Turkey, Italy, Canada, and Argentina with varying privilege levels.
    Date: 2026-04-06T10:28:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-IAB-Listings-SiberianShelves-listings
    Screenshots:
    None
    Threat Actors: KazeFreak
    Victim Country: Multiple
    Victim Industry: Multiple
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged data leak of Indonesian political party Gerindra candidate information
    Category: Data Leak
    Content: Actor XyphOrix leaked personal information of Indonesian political party Gerindra candidates including names, national ID numbers, birthdates, addresses, spouse names, education, and occupation details. The leaked data appears to contain candidate information from electoral districts in Jepara.
    Date: 2026-04-06T10:28:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DATA-PARTAI-GERINDRA-GO-ID–72491
    Screenshots:
    None
    Threat Actors: XyphOrix
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Partai Gerindra
    Victim Site: gerindra.go.id
  209. Alleged data breach of TLN Trip travel agency database
    Category: Data Breach
    Content: A threat actor is allegedly selling a database from TLN Trip travel agency containing 690,000 records with personal information including passport numbers, expiry dates, names, addresses, phone numbers, and email addresses.
    Date: 2026-04-06T10:28:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Travel-agency-website-database-tlntrip-com-690K-passport-no-passport-expiry
    Screenshots:
    None
    Threat Actors: RainbowDF
    Victim Country: Unknown
    Victim Industry: Travel and Tourism
    Victim Organization: TLN Trip
    Victim Site: tlntrip.com
  210. Alleged sports content post – not a cyber threat
    Category: Alert
    Content: This appears to be a legitimate sports discussion post about baseball player Jos Ureas 2025 season with multiple teams including the Los Angeles Dodgers, not a cyber threat or security incident.
    Date: 2026-04-06T10:27:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-2025-Dodgers-year-evaluate-Jos-Urea
    Screenshots:
    None
    Threat Actors: Witherspoon
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  211. Alleged data leak of NUST Pakistan Defence
    Category: Data Leak
    Content: Threat actor ModernStealer claims to have leaked breach data from NUST Pakistan, a premier Pakistani university with strong military ties and defence connections. Sample data and contact information provided for additional details.
    Date: 2026-04-06T10:27:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-DATA-LEAK-OF-NUST-PAKISTAN-DEFENCE
    Screenshots:
    None
    Threat Actors: ModernStealer
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: National University of Sciences and Technology
    Victim Site: Unknown
  212. Alleged data leak of Sistema para el Desarrollo Integral de la Familia del Estado de Chiapas
    Category: Data Leak
    Content: Threat actor leaked personal data of 490,000+ beneficiaries from a Mexican family development system in Chiapas state, including names, identification numbers, birth dates, and addresses.
    Date: 2026-04-06T10:27:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-MX-SISTEMA-PARA-EL-DESARROLLO-INTEGRAL-DE-LA-FAMILIA-DEL-ESTADO-DE-CHIAPAS-MX
    Screenshots:
    None
    Threat Actors: Thelizard001
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Sistema para el Desarrollo Integral de la Familia del Estado de Chiapas
    Victim Site: Unknown
  213. Alleged widespread exploitation of React2Shell vulnerability in Next.js applications stealing AWS keys and SSH credentials
    Category: Vulnerability
    Content: Threat actors are actively exploiting the React2Shell vulnerability in Next.js applications in an automated campaign that has compromised hundreds of servers. The attackers are using a tool called NEXUS Listener to collect and exfiltrate sensitive data including database credentials, AWS keys, and SSH keys to attacker-controlled servers. This activity could lead to cloud account takeovers and broader network intrusions.
    Date: 2026-04-06T10:23:37Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21015
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  214. Alleged Phishing Campaign Targeting Bank Melli Iran Customers via Fake BAM App Installation SMS
    Category: Phishing
    Content: Bank Melli Iran (بانک ملی) has issued a warning about fraudulent SMS messages being sent to customers under the guise of an official announcement regarding installation of the BAM banking application. The messages contain malicious links infected with malware. Customers are advised to avoid clicking any links in such messages and to use only official bank channels for services.
    Date: 2026-04-06T10:14:49Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21014
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Iran
    Victim Industry: Banking & Finance
    Victim Organization: Bank Melli Iran
    Victim Site: Unknown
  215. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample of 405 Hotmail credentials on a cybercrime forum as a free download.
    Date: 2026-04-06T10:09:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71283/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  216. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,545 mixed email credentials for free download on a cracking forum.
    Date: 2026-04-06T10:08:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71284/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  217. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is sharing a combolist containing Hotmail email and password combinations on a cybercrime forum. The credentials are claimed to be private, fresh, and verified by the poster.
    Date: 2026-04-06T09:58:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1HOTMAIL%E2%9A%A1%E2%9A%A1PRIVATE%E2%9A%A1%E2%9A%A1FRESH%E2%9A%A1%E2%9A%A1CHEKED-BY-klyne05-%E2%9A%A1%E2%9A%A1–199516
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  218. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor klyne05 allegedly shared fresh checked Hotmail credential lists on a cybercriminal forum as a free download.
    Date: 2026-04-06T09:58:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71282/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  219. Alleged data breach of Coinbase
    Category: Data Breach
    Content: Threat actor Kotowka is allegedly selling a database containing 50,000 records of Coinbase user data for $600. The data includes personal information, account balances, cryptocurrency holdings, and account status details of US-based users.
    Date: 2026-04-06T09:48:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71281/
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  220. Mass website defacement targeting thekarurtraders.com by maw3six
    Category: Defacement
    Content: The attacker maw3six conducted a mass defacement campaign targeting thekarurtraders.com, which appears to be a redefacement of a previously compromised site. The attack was part of a broader mass defacement operation rather than targeting this specific organization.
    Date: 2026-04-06T09:47:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248329
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Trading/Commerce
    Victim Organization: Karur Traders
    Victim Site: thekarurtraders.com
  221. Alleged data breach of Ledger via Global-e payment gateway
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing over 105,000 Ledger customer records allegedly obtained through a breach of the Global-e payment gateway on January 5, 2026. The data includes customer names, addresses, phone numbers, email addresses, and order information from late 2025 to early 2026.
    Date: 2026-04-06T09:39:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71279/
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Unknown
    Victim Industry: Financial Technology
    Victim Organization: Ledger
    Victim Site: Unknown
  222. Alleged sale of Hotmail credential lists
    Category: Data Breach
    Content: Threat actor Kotowka is allegedly selling Hotmail email and password credential lists containing 1 million records for $300. The actor provides contact via Telegram and offers samples through a Telegram channel.
    Date: 2026-04-06T09:38:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71280/
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  223. Alleged Supply Chain Attack on Axios npm Library via Malicious Versions 1.14.1 and 0.30.4
    Category: Malware
    Content: The popular Axios npm library was targeted in a supply chain attack. Threat actors compromised a developer account and published malicious versions (1.14.1 and 0.30.4) containing a hidden dependency that executed a Remote Access Trojan (RAT) upon installation. The malware also removed its traces to evade detection. The malicious versions were quickly identified and removed, but the incident highlights security weaknesses in the npm ecosystem.
    Date: 2026-04-06T09:35:21Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21009
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Software / Open Source
    Victim Organization: Axios (npm)
    Victim Site: npmjs.com
  224. Website defacement of hoststlucia.com by maw3six
    Category: Defacement
    Content: Threat actor maw3six successfully defaced the Host St Lucia website on April 6, 2026. The defacement targeted a web hosting provider based in Saint Lucia, compromising their online presence.
    Date: 2026-04-06T09:29:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248328
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Saint Lucia
    Victim Industry: Web Hosting
    Victim Organization: Host St Lucia
    Victim Site: hoststlucia.com
  225. Alleged sale of Coinbase customer data
    Category: Data Breach
    Content: Threat actor Kotowka is allegedly selling a dataset containing 50,000 Coinbase customer records including names, email addresses, phone numbers, bank information, and account balances for $8,000. The data includes various authentication methods and associated financial institutions.
    Date: 2026-04-06T09:27:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71278/
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  226. Mass website defacement campaign by maw3six targeting multiple sites
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting multiple websites including lovang247.online. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-06T09:23:50Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248321
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lovang247.online
  227. Mass website defacement by maw3six targeting lucky88.buzz
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the lucky88.buzz gambling website on April 6, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-06T09:23:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248322
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Gaming/Gambling
    Victim Organization: Unknown
    Victim Site: lucky88.buzz
  228. Mass defacement campaign by maw3six targeting luongson.cfd
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting luongson.cfd on April 6, 2026. The incident involved defacing a subpage rather than the main homepage and was part of a broader mass defacement operation.
    Date: 2026-04-06T09:23:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248323
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: luongson.cfd
  229. Mass website defacement campaign by maw3six targeting moto88.today
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting moto88.today on April 6, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-06T09:22:43Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248324
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: moto88.today
  230. Mass defacement campaign by maw3six targeting nuoilo247.store
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the e-commerce website nuoilo247.store on April 6, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-06T09:22:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248325
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Unknown
    Victim Site: nuoilo247.store
  231. Mass website defacement campaign by maw3six targeting nuoilokhung247.online
    Category: Defacement
    Content: Mass defacement attack conducted by attacker maw3six targeting the Vietnamese domain nuoilokhung247.online. The incident was part of a broader mass defacement campaign rather than a targeted attack on a single organization.
    Date: 2026-04-06T09:21:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248326
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: nuoilokhung247.online
  232. Website defacement of phuongtrinhhoahoc.store by maw3six
    Category: Defacement
    Content: The attacker maw3six defaced the website phuongtrinhhoahoc.store on April 6, 2026. The targeted site appears to be related to chemical equations or chemistry education based on the domain name.
    Date: 2026-04-06T09:21:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248327
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: phuongtrinhhoahoc.store
  233. Website defacement of gocmod.life by maw3six
    Category: Defacement
    Content: Threat actor maw3six defaced the website gocmod.life on April 6, 2026. The attack targeted a cloud-hosted server and was documented in the haxor.id mirror archive.
    Date: 2026-04-06T09:15:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248315
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: gocmod.life
  234. Website defacement of hi88.lol by maw3six
    Category: Defacement
    Content: Website defacement attack targeting hi88.lol domain executed by threat actor maw3six on April 6, 2026. The attack targeted a cloud-hosted infrastructure and resulted in compromise of the /maw.html page.
    Date: 2026-04-06T09:15:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248316
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hi88.lol
  235. Mass website defacement by maw3six targeting gambling platform
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement attack against the I9bet gambling platform website. The attack targeted a specific page rather than the homepage and appears to be part of a broader mass defacement campaign.
    Date: 2026-04-06T09:14:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248317
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Gambling/Gaming
    Victim Organization: I9bet
    Victim Site: i9bet.today
  236. Website defacement of jun88.lol by maw3six
    Category: Defacement
    Content: The website jun88.lol was defaced by attacker maw3six on April 6, 2026. The incident involved a single page defacement hosted on cloud infrastructure.
    Date: 2026-04-06T09:14:22Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248318
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jun88.lol
  237. Website defacement of king888.website by maw3six
    Category: Defacement
    Content: Individual attacker maw3six defaced the king888.website domain on April 6, 2026. The incident involved a single page defacement targeting the /maw.html path on a cloud-hosted server.
    Date: 2026-04-06T09:13:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248319
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: king888.website
  238. Website defacement of linkneverdie.shop by maw3six
    Category: Defacement
    Content: Individual attacker maw3six defaced the e-commerce website linkneverdie.shop on April 6, 2026. The defaced page was hosted on cloud infrastructure and archived on haxor.id mirror.
    Date: 2026-04-06T09:13:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248320
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Unknown
    Victim Site: linkneverdie.shop
  239. Mass defacement campaign by maw3six targeting anonyviet.shop
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six against anonyviet.shop on April 6, 2026. The incident was part of a broader mass defacement campaign rather than a targeted attack on the specific organization.
    Date: 2026-04-06T09:07:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248306
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: anonyviet.shop
  240. Mass defacement targeting gambling sites by maw3six
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting gambling website bong888.pro. The attack was part of a larger mass defacement campaign affecting multiple sites on April 6, 2026.
    Date: 2026-04-06T09:07:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248307
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Gambling
    Victim Organization: Unknown
    Victim Site: bong888.pro
  241. Mass defacement targeting bongda.space by maw3six
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting the sports-related website bongda.space. The attack was executed on April 6, 2026, affecting multiple pages rather than just the homepage.
    Date: 2026-04-06T09:06:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248308
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Sports/Entertainment
    Victim Organization: Unknown
    Victim Site: bongda.space
  242. Mass website defacement campaign by maw3six targeting bongdaplus.online
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting bongdaplus.online, a sports-related website. The incident was part of a broader mass defacement operation affecting multiple sites.
    Date: 2026-04-06T09:06:25Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248309
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Sports/Entertainment
    Victim Organization: BongDaPlus
    Victim Site: bongdaplus.online
  243. Website defacement of caulodep247.site by maw3six
    Category: Defacement
    Content: Threat actor maw3six successfully defaced the website caulodep247.site on April 6, 2026. The defacement targeted a single page and was hosted on cloud infrastructure.
    Date: 2026-04-06T09:06:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248310
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: caulodep247.site
  244. Mass website defacement campaign by maw3six targeting chotlo3s.shop
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the e-commerce site chotlo3s.shop on April 6, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-06T09:05:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248311
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Unknown
    Victim Site: chotlo3s.shop
  245. Mass website defacement by maw3six targeting congthucvatly.xyz
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting congthucvatly.xyz, a Vietnamese physics education website. The incident occurred on April 6, 2026, affecting a cloud-hosted server.
    Date: 2026-04-06T09:05:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248312
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Vietnam
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: congthucvatly.xyz
  246. Website defacement of dudoan.store by maw3six
    Category: Defacement
    Content: Single website defacement incident targeting dudoan.store conducted by threat actor maw3six on April 6, 2026. The attack targeted a specific page rather than the homepage and appears to be an isolated incident rather than part of a mass defacement campaign.
    Date: 2026-04-06T09:04:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248313
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dudoan.store
  247. Mass website defacement by maw3six targeting fabett.live
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting fabett.live on April 6, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-06T09:04:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248314
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: fabett.live
  248. Website defacement of vpocket.online by Komodoxploit (BadakSec Team)
    Category: Defacement
    Content: BadakSec Team member Komodoxploit successfully defaced vpocket.online on April 6, 2026. The attack targeted a specific page on the domain, creating unauthorized content accessible via fuck.txt.
    Date: 2026-04-06T08:58:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830849
    Screenshots:
    None
    Threat Actors: Komodoxploit, BadakSec Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: vpocket.online
  249. Mass defacement campaign by maw3six targeting multiple websites
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting multiple websites including 66vn.xyz. The attack was executed on April 6, 2026, affecting cloud-hosted infrastructure as part of a broader mass defacement operation.
    Date: 2026-04-06T08:57:34Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248300
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 66vn.xyz
  250. Mass website defacement by maw3six targeting 77win.buzz
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six on April 6, 2026, targeting the 77win gambling platform. The attack was part of a broader mass defacement campaign affecting multiple targets hosted on cloud infrastructure.
    Date: 2026-04-06T08:57:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248301
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Gaming/Gambling
    Victim Organization: 77win
    Victim Site: 77win.buzz
  251. Mass defacement campaign by maw3six targeting multiple websites
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting multiple websites including 888b.lol. The attack was executed on April 6, 2026 against cloud-hosted infrastructure.
    Date: 2026-04-06T08:56:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248302
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 888b.lol
  252. Website defacement of 8kbet.click by maw3six
    Category: Defacement
    Content: The attacker maw3six successfully defaced the 8kbet.click gambling website on April 6, 2026. The defacement targeted a specific page rather than the homepage and appears to be an isolated incident rather than part of a mass campaign.
    Date: 2026-04-06T08:56:06Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248303
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Online Gambling
    Victim Organization: 8kbet
    Victim Site: 8kbet.click
  253. Mass website defacement by maw3six targeting 99ok.cfd
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement attack targeting the website 99ok.cfd on April 6, 2026. The attack was part of a broader mass defacement campaign rather than a targeted single-site attack.
    Date: 2026-04-06T08:55:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248304
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 99ok.cfd
  254. Mass website defacement by maw3six targeting alo789.shop
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement operation targeting the e-commerce website alo789.shop. The incident occurred on April 6, 2026, affecting a cloud-hosted server as part of a broader mass defacement campaign.
    Date: 2026-04-06T08:55:09Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248305
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Unknown
    Victim Site: alo789.shop
  255. Website defacement of uberebayshopdesign.com by Aptisme/Leviathan Perfect Hunter
    Category: Defacement
    Content: Website defacement attack conducted by threat actor Aptisme from the Leviathan Perfect Hunter team against uberebayshopdesign.com on April 6, 2026. The attack targeted a specific page (art.htm) rather than the main homepage.
    Date: 2026-04-06T08:49:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830848
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: E-commerce/Design Services
    Victim Organization: Uber eBay Shop Design
    Victim Site: uberebayshopdesign.com
  256. Mass website defacement by maw3six targeting jun88.help
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement attack targeting jun88.help on April 6, 2026. The attack was part of a broader mass defacement campaign rather than targeting a specific organization.
    Date: 2026-04-06T08:48:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248299
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jun88.help
  257. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor named FlashCloud2 posted about private high-quality Hotmail credentials on a cybercrime forum specializing in credential lists and dumps. The actual content requires forum registration to view.
    Date: 2026-04-06T08:19:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71276/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  258. Alleged Missile Strike on Irans National AI Platform Data Center at Sharif University of Technology
    Category: Cyber Attack
    Content: According to Cyberban News, the data center of Sharif University of Technology (Sharif Industrial University) was targeted in a missile attack attributed to American and Zionist adversaries. The data center serves as the primary infrastructure for Irans National AI Platform, which was unveiled in late 2024 and hosts thousands of critical national services. Irans Deputy for Science had previously announced that all national AI projects were connected to this platform.
    Date: 2026-04-06T08:08:57Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21008
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Iran
    Victim Industry: Education / Critical National Infrastructure / Artificial Intelligence
    Victim Organization: Sharif University of Technology / Iran National AI Platform
    Victim Site: Unknown
  259. Alleged leak of United Kingdom credential combolist
    Category: Combo List
    Content: Threat actor CobraEgy allegedly shared a credential combolist containing 356,000 email:password combinations targeting United Kingdom users. The data is described as fresh and dated 6-4-2026.
    Date: 2026-04-06T08:01:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-356-K-%E2%9C%A6-United-Kingdom-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-6-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Alleged leak of Hotmail.fr credentials
    Category: Combo List
    Content: Threat actor WINGO shared a combolist containing 1,000 Hotmail.fr email and password combinations on DemonForums. The credentials were made available as a free download via Pasteview.
    Date: 2026-04-06T07:59:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-HOTMAIL-FR
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: France
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.fr
  261. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 1,874 allegedly valid Hotmail email and password combinations on cybercriminal forums. The credentials are described as premium hits from private cloud sources.
    Date: 2026-04-06T07:58:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1874x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  262. Alleged data leak of Acikogretim database
    Category: Data Leak
    Content: A database dump containing 213,000 records from Acikogretim, a Turkish educational institution, has been leaked and made available for free download on a cybercriminal forum.
    Date: 2026-04-06T07:36:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Acikogretim-gen-tr
    Screenshots:
    None
    Threat Actors: coinspot
    Victim Country: Turkey
    Victim Industry: Education
    Victim Organization: Acikogretim
    Victim Site: acikogretim.gen.tr
  263. Alleged data breach of Edmunds automotive platform by ShinyHunters
    Category: Data Breach
    Content: ShinyHunters allegedly breached Edmunds automotive platform in January 2026, compromising 30 million user records including usernames, email addresses, passwords, and vehicle reports from 2018-2022. Some passwords were encrypted using base64 hashes while others were stored in plaintext.
    Date: 2026-04-06T07:35:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-edmunds-com-Automotive-Research-Platform-FullDump-30-Million-2026
    Screenshots:
    None
    Threat Actors: Blastoize
    Victim Country: United States
    Victim Industry: Automotive
    Victim Organization: Edmunds
    Victim Site: edmunds.com
  264. Alleged data leak by Maxi_Leaks threat actor
    Category: Data Leak
    Content: A threat actor named CobraEgy posted about logs allegedly leaked by Maxi_Leaks, totaling 3.3 GB in size and dated June 4, 2026. No additional details about the content or victims are available from the post.
    Date: 2026-04-06T07:25:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Request-%E2%9C%A6%E2%9C%A6-LOG-S-%E2%9C%A6%E2%9C%A6-Maxi-Leaks-%E2%9C%A6%E2%9C%A6-6-4-2026-%E2%9C%A6%E2%9C%A6-3-3-GB-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Alleged leak of private communications of Israeli National Security Institute Iran department head by Hanzala group
    Category: Data Leak
    Content: The hacker group Hanzala announced the full public release of all WhatsApp and X (Twitter) chats belonging to Raz Zimmt, head of the Iran division at Israels National Security Institute. The group claims the data includes private, confidential, and daily communications with no censorship. Hanzala stated this action was taken after prior warnings to Zimmt were ignored, framing it as a warning to anyone deemed hostile toward Iran. The group asserted: Nothing is hidden from us.
    Date: 2026-04-06T07:00:00Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21004
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Israel
    Victim Industry: Government / Intelligence
    Victim Organization: Israel National Security Institute
    Victim Site: Unknown
  266. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing Hotmail email and password combinations on a cybercrime forum. The post indicates the credentials are described as high quality but the exact number of records is not specified.
    Date: 2026-04-06T06:43:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X782-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  267. Alleged leak of phone number and password credentials
    Category: Combo List
    Content: A threat actor is sharing a credential list containing phone numbers and passwords, advertised as high quality and private content on a cybercriminal forum.
    Date: 2026-04-06T06:41:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71273/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Alleged new operation or data release by Handala hack group
    Category: Cyber Attack
    Content: Handala, a pro-Palestinian hacktivist group, announced a new post on their official site via a shortened URL. The post likely contains details of a cyber attack, data breach, or leak targeting Israeli organizations, consistent with Handalas historical activity pattern.
    Date: 2026-04-06T06:41:26Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/78
    Screenshots:
    None
    Threat Actors: HANDALA HACK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Alleged sale of updated DDoS attack script with Cloudflare bypass capabilities
    Category: Malware
    Content: A threat actor is selling a DDoS script updated to 2026, supporting both Layer 7 (L7) and Layer 4 (L4) attack vectors. L7 capabilities include Cloudflare bypass, UAM, CAPTCHA, and rate limit bypass. L4 capabilities include TCP, UDP, HOME, DNS, Discord, and Telegram flood attacks. Contact handle @kyless133 provided for purchase inquiries.
    Date: 2026-04-06T06:38:38Z
    Network: telegram
    Published URL: https://t.me/cashnetworkc2/351
    Screenshots:
    None
    Threat Actors: CASH NETWORK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Alleged distribution of European and US credential combolists
    Category: Combo List
    Content: Threat actor gsmfix is distributing credential combolists claimed to be high quality and fully valid, targeting users from Europe and the United States. The post advertises these credential lists but does not specify pricing or victim sources.
    Date: 2026-04-06T06:21:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71271/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting multiple websites including astronomos.studio. This attack was part of a broader mass defacement operation rather than a targeted attack on a specific organization.
    Date: 2026-04-06T06:12:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248294
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Astronomos Studio
    Victim Site: astronomos.studio
  272. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The threat actor known as Zod conducted a mass defacement campaign targeting multiple websites including cetlitulum.com. The attack was part of a broader coordinated defacement operation rather than targeting a specific organization.
    Date: 2026-04-06T06:12:05Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248295
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: cetlitulum.com
  273. Alleged leak of credential combolist containing URL-login-password data
    Category: Combo List
    Content: A threat actor has made available a 227GB combolist containing URL-login-password credential combinations. The data is being freely distributed on underground forums as a private collection labeled for 2026.
    Date: 2026-04-06T06:11:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71268/
    Screenshots:
    None
    Threat Actors: strelok639
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  274. Website defacement of propertiesbaymx.com by Zod
    Category: Defacement
    Content: The attacker Zod successfully defaced the Properties Bay MX real estate website on April 6, 2026. The defacement targeted a specific page (zod.html) on the Linux-hosted server.
    Date: 2026-04-06T06:11:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248296
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Mexico
    Victim Industry: Real Estate
    Victim Organization: Properties Bay MX
    Victim Site: propertiesbaymx.com
  275. Alleged leak of credential combolist in ULP format
    Category: Combo List
    Content: A threat actor shared a credential combolist in URL:LOGIN:PASS format, labeled as high quality and private. The post contains minimal information about the source or scope of the credentials.
    Date: 2026-04-06T06:11:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71269/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The Zod threat actor conducted a mass defacement campaign targeting multiple websites including laciudadquenohadejadodejugar.mx on April 6, 2026. This attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-06T06:11:26Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248298
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: laciudadquenohadejadodejugar.mx
  277. Alleged distribution of credential combolist targeting USA and Europe users
    Category: Combo List
    Content: Threat actor gsmfix allegedly distributed an exclusive credential combolist containing email:password combinations targeting users from USA and Europe regions on underground forum.
    Date: 2026-04-06T06:11:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71270/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  278. Alleged Cyber Attack and Extortion Threat Against Cisco by ShinyHunters
    Category: Cyber Attack
    Content: The ShinyHunters threat actor group is claiming prior access to Cisco systems and alleging that Cisco has been slow to resolve a breach. The group is publicly calling out Jason Lish (apparently a Cisco security executive) for allegedly misleading CISOs in a private Signal group about the incident. ShinyHunters is issuing an ultimatum to Cisco to engage in negotiations before the situation escalates, implying further data exposure or damage if Cisco does not respond. The hashtag #speedboat67 may reference a specific operation or dataset.
    Date: 2026-04-06T05:46:21Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/822
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology / Cybersecurity
    Victim Organization: Cisco
    Victim Site: cisco.com
  279. Alleged Exposure of GitHub Personal Access Token Linked to Cisco IT Environment by ShinyHunters
    Category: Initial Access
    Content: ShinyHunters posted a GitHub Personal Access Token (ghp_798fnSquvZ4IrZUiTPoin61nsbDL0x2cxpJ1) along with its base64-hashed equivalent. The post includes a Cisco IT Splunk query targeting the ds-github index, filtering GitHub audit log events by hashed token, IP, action, repository, and user agent — specifically excluding US-based actor locations. This suggests the token may provide access to Ciscos GitHub repositories and that the threat actor is actively querying audit logs to enumerate activity. Tagged with #SH#speedboat67, indicating a ShinyHunters operation.
    Date: 2026-04-06T05:44:46Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/820
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco
    Victim Site: github.com
  280. Alleged Data Breach of Cisco by ShinyHunters – 3M+ Salesforce Records and AI Source Code for Sale
    Category: Data Breach
    Content: The ShinyHunters threat group claims to have compromised Cisco, exfiltrating over 3 million Salesforce records containing PII, GitHub repositories, AWS storage, and internal corporate data. The group also claims possession of Cisco source code for multiple AI products including AI Assistants, AI Defense, AI Canvas, and AI Cisco Cloud Control. The post taunts Cisco security staff, references an employee named Jinzhao Feng allegedly storing secrets in public repositories, and threatens to publicly release all data. The data is being offered for sale at $50,000. Contact is provided via Tox and Session IDs, with an onion DLS site listed.
    Date: 2026-04-06T05:43:45Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/819
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco
    Victim Site: cisco.com
  281. Alleged leak of mixed forum credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 82,000 mixed credentials reportedly valid for various forums. The post is hosted on a credential trading forum and requires registration to view full details.
    Date: 2026-04-06T05:13:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71266/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Mass website defacement campaign by maw3six targeting pasjaogrody.pl
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the Polish website pasjaogrody.pl on April 6, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-06T05:10:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248292
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pasjaogrody.pl
  283. Mass website defacement by maw3six targeting deger.com.pl
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting deger.com.pl on April 6, 2026. This incident was identified as both a mass defacement and redefacement, indicating the site may have been previously compromised.
    Date: 2026-04-06T05:10:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248293
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Deger
    Victim Site: deger.com.pl
  284. Mass website defacement by maw3six targeting lazulitemarble.com
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting lazulitemarble.com on April 6, 2026. The attack was part of a broader mass defacement operation rather than a targeted attack on the marble company specifically.
    Date: 2026-04-06T05:04:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248290
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Construction/Building Materials
    Victim Organization: Lazulite Marble
    Victim Site: lazulitemarble.com
  285. Mass website defacement by maw3six targeting lazulitemarble.com
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting the Lazulite Marble company website on April 6, 2026. The attack affected a subdomain of the marble/construction materials companys web infrastructure.
    Date: 2026-04-06T05:03:35Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248291
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Construction/Materials
    Victim Organization: Lazulite Marble
    Victim Site: xms.lazulitemarble.com
  286. Mass defacement campaign by maw3six targeting reqiaindustries.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting reqiaindustries.com on April 6, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-06T04:51:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248289
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Reqia Industries
    Victim Site: reqiaindustries.com
  287. Website defacement of damienbonnefoux.com by maw3six
    Category: Defacement
    Content: The attacker maw3six defaced the website damienbonnefoux.com on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T04:29:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248288
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: damienbonnefoux.com
  288. Alleged DMCA abuse service targeting competitor SEO rankings
    Category: DDoS
    Content: Threat actor offers DMCA abuse services to manipulate search engine rankings by filing false DMCA claims against competitor websites and providing protection against such attacks. Services start at $150 per targeted site with focus on iGaming sector.
    Date: 2026-04-06T04:07:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71265/
    Screenshots:
    None
    Threat Actors: abuser_dmca
    Victim Country: Unknown
    Victim Industry: iGaming
    Victim Organization: Unknown
    Victim Site: Unknown
  289. Alleged cyber attack on ArABSAT satellite network by hacker group Mabir
    Category: Cyber Attack
    Content: The ArABSAT satellite network was reportedly targeted by a hacker group called Mabir (مبیر), causing service disruptions. The attackers cited ArABSATs alleged cooperation with Israel and the United States, and its provision of services to networks such as Iran International, as justification for the attack. Security experts are assessing the incident within the context of cyber attacks against media outlets aligned with Israel.
    Date: 2026-04-06T04:02:33Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21000
    Screenshots:
    None
    Threat Actors: مبیر
    Victim Country: Saudi Arabia
    Victim Industry: Telecommunications / Satellite
    Victim Organization: ArABSAT
    Victim Site: Unknown
  290. Alleged Cyber Attack on ArABSAT Satellite Network by Mabir Group
    Category: Cyber Attack
    Content: The ArABSAT (Arab Satellite Communications Organization) satellite network has reportedly been targeted by a cyber attack carried out by a group calling itself Mabir. The attackers cited ArABSATs alleged cooperation with Israel and the United States, as well as its provision of services to media outlets such as Iran International, as justification. The attack reportedly caused service disruptions. Analysts assess this incident within the context of cyber attacks targeting media organizations aligned with Israel.
    Date: 2026-04-06T03:58:33Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20999
    Screenshots:
    None
    Threat Actors: مبیر
    Victim Country: Saudi Arabia
    Victim Industry: Telecommunications / Satellite Services
    Victim Organization: ArABSAT (Arab Satellite Communications Organization)
    Victim Site: Unknown
  291. Website defacement of Mobiliufficio by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a redefacement attack against the Italian office furniture company Mobiliufficios website on April 6, 2026. This represents a secondary compromise of the same target by the individual attacker.
    Date: 2026-04-06T03:45:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830846
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Furniture/Office Equipment
    Victim Organization: Mobiliufficio
    Victim Site: www.mobiliufficio.com
  292. Alleged Sale of Hotmail Credential Lists Across Multiple Countries
    Category: Combo List
    Content: A threat actor operating under the handle Admu is selling Hotmail credential lists covering multiple countries including UK, DE, JP, NL, BR, PL, ES, US, and IT. The seller claims to own a private cloud and offers inbox searching by keyword, targeting major platforms such as eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Valid ntlworld webmails are also advertised.
    Date: 2026-04-06T03:30:52Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59547
    Screenshots:
    None
    Threat Actors: Admu
    Victim Country: Unknown
    Victim Industry: Technology / Email Services
    Victim Organization: Hotmail
    Victim Site: hotmail.com
  293. Alleged data breach of Government of Liberia Ministry of Mines & Energy
    Category: Data Breach
    Content: Threat actor is selling a database dump allegedly containing user login data, forum messages, and personally identifiable information of staff from the Government of Liberias Ministry of Mines & Energy for $30.
    Date: 2026-04-06T03:08:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Government-of-Liberia-Ministry-of-Mines-Energy-Liberia
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Liberia
    Victim Industry: Government
    Victim Organization: Government of Liberia Ministry of Mines & Energy
    Victim Site: Unknown
  294. Alleged sale of Mexican tax administration database
    Category: Data Breach
    Content: Threat actor claims to be selling a complete Mexican taxpayer database from SAT containing RFC numbers, names, addresses, and other fiscal information for $300 USD. The alleged database contains over 13 million records of companies and individuals with economic activity in Mexico.
    Date: 2026-04-06T03:08:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SAT-Mexico-13-000-000-lines
    Screenshots:
    None
    Threat Actors: gordo
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Servicio de Administración Tributaria
    Victim Site: Unknown
  295. Alleged data breach of BORSA ITALIANA securities database
    Category: Data Breach
    Content: Threat actor globalData1 is allegedly selling a database containing 1.2 million records of Italian securities traders from BORSA ITALIANA. The data includes names, mobile numbers, trading platform information, and stock price fluctuation data.
    Date: 2026-04-06T03:07:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Italy-securities-and-stocks-1200000
    Screenshots:
    None
    Threat Actors: globalData1
    Victim Country: Italy
    Victim Industry: Financial Services
    Victim Organization: BORSA ITALIANA
    Victim Site: Unknown
  296. Alleged sale of American financial investment database containing 1.9 million records
    Category: Data Breach
    Content: Threat actor globalData1 is allegedly selling a database containing 1.9 million records of American financial investment clients. The data includes personal information, financial details, credit ratings, and net worth information.
    Date: 2026-04-06T03:07:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-American-financial-investment-wealth-management-1900000
    Screenshots:
    None
    Threat Actors: globalData1
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  297. Alleged data leak of Secretaria de Salud
    Category: Data Leak
    Content: Threat actor grifo157 leaked data from Mexicos Ministry of Health containing RFC, CURP, work entities, full names, certificates, work centers, and federal/state plaza origins. The data is being distributed for free download.
    Date: 2026-04-06T03:07:27Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATA-LEAK-OF-SECRETARIA-DE-SALUD
    Screenshots:
    None
    Threat Actors: grifo157
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: Secretaria de Salud
    Victim Site: Unknown
  298. Alleged data leak of Colsubsidio and EmergiaCC Colombia databases
    Category: Data Leak
    Content: Internal and confidential databases from Emergiacc (Colsubsidio in-house) containing operational data including personal information, GPS coordinates, transaction records, and financial details were leaked for free download. The database includes detailed customer records with names, addresses, transaction histories, and financial data from various business units including hotels, credit services, and travel agencies.
    Date: 2026-04-06T03:07:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Colsubsidio-EmergiaCC-Colombia
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Financial Services
    Victim Organization: Colsubsidio / EmergiaCC
    Victim Site: emergiacc.com
  299. Website defacement of Kaari Planters by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Kaari Planters, an agricultural/horticulture company, was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-06T03:00:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830820
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Agriculture/Horticulture
    Victim Organization: Kaari Planters
    Victim Site: kaariplanters.com
  300. Website defacement of Verma Surgical by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team conducted a redefacement of vermasurgical.com on April 6, 2026. This appears to be a targeted attack against a surgical/medical equipment company.
    Date: 2026-04-06T02:59:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830835
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Verma Surgical
    Victim Site: vermasurgical.com
  301. Website defacement of MDS Consultores by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community conducted a redefacement of the Brazilian law firm MDS Consultores website on April 6, 2026. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-06T02:53:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830719
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Legal Services
    Victim Organization: MDS Consultores
    Victim Site: mdsconsultores.adv.br
  302. Website defacement of naoresponderemail.xyz by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team conducted a redefacement of the naoresponderemail.xyz website on April 6, 2026. This appears to be a repeat attack on the same target as indicated by the redefacement classification.
    Date: 2026-04-06T02:53:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830720
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: naoresponderemail.xyz
  303. Website defacement of Wild Trip Adventure by Nicotine (Umbra Community)
    Category: Defacement
    Content: The tourism website wildtripadventure.co.in was defaced on April 6, 2026 by an attacker named Nicotine affiliated with the Umbra Community team. This appears to be an isolated defacement targeting a single travel/adventure tourism company.
    Date: 2026-04-06T02:52:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830721
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Tourism/Travel
    Victim Organization: Wild Trip Adventure
    Victim Site: wildtripadventure.co.in
  304. Website defacement of yuvimall.com by Nicotine from Umbra Community
    Category: Defacement
    Content: The e-commerce website yuvimall.com was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. The attack targeted the sites index page, compromising the main landing page of the online retail platform.
    Date: 2026-04-06T02:51:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830722
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Yuvi Mall
    Victim Site: yuvimall.com
  305. Website defacement of learnez.net by Nicotine (Umbra Community)
    Category: Defacement
    Content: The educational website learnez.net was defaced by attacker Nicotine from the Umbra Community team on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T02:51:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830732
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: LearnEZ
    Victim Site: learnez.net
  306. Website defacement of piijabar.or.id by Nicotine (Umbra Community)
    Category: Defacement
    Content: Nicotine from Umbra Community conducted a redefacement attack against piijabar.or.id on April 6, 2026. This represents a repeat compromise of the Indonesian website.
    Date: 2026-04-06T02:50:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830752
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: piijabar.or.id
  307. Website defacement of bagyourseat.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website bagyourseat.com was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-06T02:50:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830760
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: E-commerce/Travel
    Victim Organization: BagYourSeat
    Victim Site: bagyourseat.com
  308. Website defacement of cine7.app by Nicotine (Umbra Community)
    Category: Defacement
    Content: The entertainment website cine7.app was defaced by attacker Nicotine affiliated with the Umbra Community team on April 6, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-06T02:49:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830761
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Unknown
    Victim Site: cine7.app
  309. Website defacement of kangan.app by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website kangan.app was defaced by the attacker Nicotine affiliated with Umbra Community on April 6, 2026. The defacement targeted the index.txt file of the domain.
    Date: 2026-04-06T02:49:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830762
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kangan.app
  310. Alleged leak of Hotmail credentials targeting Brazilian users
    Category: Combo List
    Content: A threat actor shared a combolist containing 270 Hotmail email and password combinations specifically targeting Brazilian users through a Telegram channel.
    Date: 2026-04-06T02:49:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71264/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Brazil
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  311. Website defacement of Skoolcart by Nicotine (Umbra Community)
    Category: Defacement
    Content: The educational platform Skoolcart was defaced by attacker Nicotine from the Umbra Community team on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-06T02:48:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830763
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Skoolcart
    Victim Site: skoolcart.com
  312. Website defacement of Agencia Mesa Marcial by Nicotine from Umbra Community
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group defaced the website of Agencia Mesa Marcial on April 6, 2026. The incident was recorded as a single site defacement rather than a mass or repeat attack.
    Date: 2026-04-06T02:36:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830706
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: Agencia Mesa Marcial
    Victim Site: agenciamesamarcial.cl
  313. Website defacement of Kiran Batteries by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team successfully defaced the Kiran Batteries company website on April 6, 2026. The defacement targeted the main index page of the battery manufacturing companys website.
    Date: 2026-04-06T02:35:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830707
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Manufacturing/Battery Industry
    Victim Organization: Kiran Batteries
    Victim Site: kiranbatteries.com
  314. Website defacement of biregitim.com.tr by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Turkish educational website biregitim.com.tr was defaced by threat actor Nicotine from the Umbra Community group on April 6, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-06T02:34:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830711
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: biregitim.com.tr
  315. Website defacement of estsol.pk by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website estsol.pk was defaced by an attacker known as Nicotine, affiliated with the Umbra Community team. The defacement occurred on April 6, 2026, targeting the sites index page.
    Date: 2026-04-06T02:33:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830713
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: estsol.pk
  316. Alleged fraudulent service offering for hotel bookings and gift cards
    Category: Services
    Content: Threat actor Availor advertises fraudulent services for booking hotels, flights, car rentals and obtaining gift cards across multiple major brands including Fairmont Hotels, Marriott, Airbnb, and numerous retail chains. The actor provides contact via Telegram suggesting illicit credential or payment method abuse.
    Date: 2026-04-06T02:28:44Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-CONVENIENT-LAYOUT-MARKET-SERVICE-FAIRMONT-HOTELS-RESORT-BOOKING
    Screenshots:
    None
    Threat Actors: Availor
    Victim Country: Unknown
    Victim Industry: Hospitality and Retail
    Victim Organization: Multiple (Fairmont Hotels, Marriott, Airbnb, various retailers)
    Victim Site: Unknown
  317. Website defacement of 24ayarhasaltin.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Turkish gold trading website 24ayarhasaltin.com was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This was identified as a redefacement incident, indicating the site had been previously compromised.
    Date: 2026-04-06T02:27:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830678
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Precious Metals/Gold Trading
    Victim Organization: 24 Ayar Has Altın
    Victim Site: 24ayarhasaltin.com
  318. Website defacement of ahiosgb.com.tr by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website ahiosgb.com.tr was defaced by attacker Nicotine from the Umbra Community team on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T02:27:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830680
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ahiosgb.com.tr
  319. Website defacement of akaroz.com.tr by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website akaroz.com.tr was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-06T02:26:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830681
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: akaroz.com.tr
  320. Website defacement of Boğaziçi Özel Eğitim by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team conducted a redefacement of the Boğaziçi Özel Eğitim educational institution website on April 6, 2026. This represents a repeat attack against the same target.
    Date: 2026-04-06T02:26:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830682
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Education
    Victim Organization: Boğaziçi Özel Eğitim
    Victim Site: bogaziciozelegitim.com
  321. Website defacement of Liva Blinds by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group defaced the Liva Blinds website on April 6, 2026. This appears to be a redefacement of a previously targeted site.
    Date: 2026-04-06T02:25:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830688
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Manufacturing/Retail
    Victim Organization: Liva Blinds
    Victim Site: livablinds.com
  322. Website defacement of mans.com.tr by Nicotine (Umbra Community)
    Category: Defacement
    Content: Turkish website mans.com.tr was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-06T02:24:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830689
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mans.com.tr
  323. Website defacement of muratoto.com.tr by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team conducted a redefacement of muratoto.com.tr on April 6, 2026. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-06T02:24:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830691
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: muratoto.com.tr
  324. Website defacement of turtlecaravan.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website turtlecaravan.com was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-06T02:23:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830692
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: turtlecaravan.com
  325. Website defacement of waterrent.com.tr by Nicotine from Umbra Community
    Category: Defacement
    Content: The Turkish water rental service website waterrent.com.tr was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident is marked as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T02:23:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830694
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Water/Equipment Rental Services
    Victim Organization: Water Rent
    Victim Site: waterrent.com.tr
  326. Website defacement of yhmofis.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website yhmofis.com was defaced by attacker Nicotine affiliated with the Umbra Community team on April 6, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-06T02:22:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830695
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: yhmofis.com
  327. Website defacement of alokeng.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website alokeng.com was defaced by an attacker known as Nicotine, who is associated with the Umbra Community group. The incident occurred on April 6, 2026, targeting the sites index page.
    Date: 2026-04-06T02:22:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830697
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: alokeng.com
  328. Website defacement of Calyra Life Sciences by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Calyra Life Sciences was defaced by threat actor Nicotine associated with the Umbra Community group on April 6, 2026. This was a targeted single-site defacement of a life sciences companys web presence.
    Date: 2026-04-06T02:21:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830699
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare/Life Sciences
    Victim Organization: Calyra Life Sciences
    Victim Site: calyralifesciences.com
  329. Website defacement of getmydr.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the website getmydr.in on April 6, 2026. The incident targeted what appears to be a healthcare-related domain based in India.
    Date: 2026-04-06T02:21:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830700
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: getmydr.in
  330. Website defacement of Kail Associates by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website kailassociety.in was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T02:20:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830701
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Kail Associates
    Victim Site: kailassociety.in
  331. Website defacement of mydigitcard.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group successfully defaced the MyDigitCard website on April 6, 2026. The incident targeted a digital card service provider based in India.
    Date: 2026-04-06T02:19:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830704
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Technology
    Victim Organization: MyDigitCard
    Victim Site: mydigitcard.in
  332. Website defacement of Omkay Enterprises by Nicotine (Umbra Community)
    Category: Defacement
    Content: Omkay Enterprises website was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. The defacement targeted the main index page of the companys website.
    Date: 2026-04-06T02:19:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830705
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Omkay Enterprises
    Victim Site: omkayenterprises.com
  333. Website defacement of inkosova.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website inkosova.com was defaced by attacker Nicotine affiliated with the Umbra Community team on April 6, 2026. This appears to be a single-target defacement incident with no specified motivation or reason provided.
    Date: 2026-04-06T02:13:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830577
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Kosovo
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: inkosova.com
  334. Website defacement of lgc-ks.org by Nicotine from Umbra Community
    Category: Defacement
    Content: On April 6, 2026, the website lgc-ks.org was defaced by an attacker known as Nicotine affiliated with the Umbra Community team. The defacement targeted the index.txt file of the site.
    Date: 2026-04-06T02:12:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830578
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lgc-ks.org
  335. Website defacement of 35ahmetaydin.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website 35ahmetaydin.com was defaced by an attacker identified as Nicotine affiliated with the Umbra Community group on April 6, 2026. This appears to be a single-target defacement incident rather than part of a mass campaign.
    Date: 2026-04-06T02:12:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830579
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 35ahmetaydin.com
  336. Website defacement of ozelfiyat.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website ozelfiyat.com was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. The defacement targeted the index.txt file of the Turkish domain.
    Date: 2026-04-06T02:11:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830581
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ozelfiyat.com
  337. Website defacement of Torunoğlu Kerestecilik by Nicotine/Umbra Community
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community successfully defaced the website of Turkish lumber company Torunoğlu Kerestecilik on April 6, 2026. This was a single-target defacement incident rather than a mass or repeated attack.
    Date: 2026-04-06T02:11:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830584
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Turkey
    Victim Industry: Lumber/Wood Products
    Victim Organization: Torunoğlu Kerestecilik
    Victim Site: torunoglukerestecilik.com
  338. Website defacement of aabharna.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced aabharna.com on April 6, 2026. This was identified as a redefacement incident targeting a previously compromised website.
    Date: 2026-04-06T02:10:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830586
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Aabharna
    Victim Site: aabharna.com
  339. Website defacement of ABM Trader by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against ABM Traders website on April 6, 2026. This appears to be a repeat attack against the same target rather than an initial compromise.
    Date: 2026-04-06T02:10:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830587
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: ABM Trader
    Victim Site: abmtrader.com
  340. Website defacement of Air World Networks by Nicotine/Umbra Community
    Category: Defacement
    Content: The website airworldnetworks.in was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T02:09:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830588
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Aviation/Logistics
    Victim Organization: Air World Networks
    Victim Site: airworldnetworks.in
  341. Alleged sale of KYC identity documents from India and 160+ countries
    Category: Data Breach
    Content: Threat actor claims to sell verified KYC data including passports, ID cards, drivers licenses, and personal information from over 160 countries with focus on Indian passports. The data allegedly includes identity documents with selfies and full personal information packages.
    Date: 2026-04-06T02:09:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-passport-india
    Screenshots:
    None
    Threat Actors: Arnoldsudney
    Victim Country: India
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  342. Alleged sale of French identity documents and KYC data from 160+ countries
    Category: Data Breach
    Content: Threat actor advertises verified KYC data packages including passports, ID cards, drivers licenses, and personal information from over 160 countries. The post specifically features a French ID card sample and promotes instant access to identity documents with selfies and full personal data packages.
    Date: 2026-04-06T02:08:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-French-ID-card
    Screenshots:
    None
    Threat Actors: Arnoldsudney
    Victim Country: France
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  343. Website defacement of Meditex Workwear by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the Meditex Workwear website was defaced by an attacker using the handle Nicotine associated with the Umbra Community group. The defacement targeted a specific page within the WordPress content directory of the medical workwear companys website.
    Date: 2026-04-06T02:03:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830547
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Apparel/Textiles
    Victim Organization: Meditex Workwear
    Victim Site: meditexworkwear.com
  344. Website defacement of Paramount Entertainments by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the paramountents.com website on April 6, 2026. This appears to be a single-target defacement incident affecting an entertainment industry website.
    Date: 2026-04-06T02:02:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830548
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Paramount Entertainments
    Victim Site: paramountents.com
  345. Website defacement of Raza Brothers Trader by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community group successfully defaced the Raza Brothers Trader website on April 6, 2026. The incident targeted what appears to be a trading or commercial business website.
    Date: 2026-04-06T02:02:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830549
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Trading/Commerce
    Victim Organization: Raza Brothers Trader
    Victim Site: razabrotherstrader.com
  346. Website defacement of Sri Lanka Connect by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced the Sri Lanka Connect website on April 6, 2026. This appears to be a single-target defacement of a Sri Lankan community or cultural organization based in Canada.
    Date: 2026-04-06T02:01:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830550
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Sri Lanka Connect
    Victim Site: srilankaconnect.ca
  347. Website defacement of Sunshine Media by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team defaced the Sunshine Media website on April 6, 2026. The attack targeted a WordPress installation on the Canadian media companys domain.
    Date: 2026-04-06T02:01:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830551
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Media/Communications
    Victim Organization: Sunshine Media
    Victim Site: sunshinemedia.ca
  348. Website defacement of Teora Apparel by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community group defaced the Teora Apparel website on April 6, 2026. The defacement targeted the index.txt file of the apparel companys website.
    Date: 2026-04-06T02:00:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830552
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Retail/Apparel
    Victim Organization: Teora Apparel
    Victim Site: teoraapparel.com
  349. Website defacement of worivos.com by Nicotine from Umbra Community
    Category: Defacement
    Content: The website worivos.com was defaced on April 6, 2026 by an attacker named Nicotine associated with the Umbra Community group. This appears to be an isolated defacement targeting a single website.
    Date: 2026-04-06T02:00:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830554
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: worivos.com
  350. Website defacement of worldtradedeve.ca by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community group, through attacker Nicotine, successfully defaced the worldtradedeve.ca website on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T01:59:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830555
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Trade/Commerce
    Victim Organization: World Trade Development
    Victim Site: worldtradedeve.ca
  351. Website defacement of JPK Biotech by Nicotine/Umbra Community
    Category: Defacement
    Content: The biotechnology company JPK Biotechs website was defaced by attacker Nicotine associated with the Umbra Community team on April 6, 2026. The defacement targeted the sites index page, compromising the companys web presence.
    Date: 2026-04-06T01:58:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830556
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Biotechnology
    Victim Organization: JPK Biotech
    Victim Site: jpkbiotech.in
  352. Website defacement of currybox.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: Nicotine from Umbra Community conducted a redefacement attack against currybox.in on April 6, 2026. This appears to be a targeted attack against an Indian food service website.
    Date: 2026-04-06T01:58:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830558
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Food/Restaurant
    Victim Organization: Curry Box
    Victim Site: currybox.in
  353. Website defacement of cvshare.ai by Nicotine (Umbra Community)
    Category: Defacement
    Content: The cvshare.ai website was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This appears to be a redefacement of a previously compromised site, indicating persistent unauthorized access to the victims web infrastructure.
    Date: 2026-04-06T01:57:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830559
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: CVShare
    Victim Site: cvshare.ai
  354. Website defacement of Brilliant Elements USA by spl1nt3r (m0z1ll4s team)
    Category: Defacement
    Content: The attacker spl1nt3r, affiliated with the m0z1ll4s team, defaced the brilliantelementsusa.com website on April 6, 2026. This was an isolated defacement targeting a single organization rather than a mass or repeat attack.
    Date: 2026-04-06T01:56:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830562
    Screenshots:
    None
    Threat Actors: spl1nt3r, m0z1ll4s
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Brilliant Elements USA
    Victim Site: brilliantelementsusa.com
  355. Website defacement of kitup.co.uk by spl1nt3r (m0z1ll4s team)
    Category: Defacement
    Content: On April 6, 2026, attacker spl1nt3r from the m0z1ll4s team defaced the kitup.co.uk website, specifically targeting the customer addition functionality. The incident was documented and mirrored on zone-xsec.com.
    Date: 2026-04-06T01:56:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830564
    Screenshots:
    None
    Threat Actors: spl1nt3r, m0z1ll4s
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kitup.co.uk
  356. Website defacement of Instar by spl1nt3r (m0z1ll4s team)
    Category: Defacement
    Content: The attacker spl1nt3r from the m0z1ll4s team successfully defaced a customer media page on the Instar website on April 6, 2026. This appears to be a targeted single-site defacement rather than a mass attack.
    Date: 2026-04-06T01:55:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830565
    Screenshots:
    None
    Threat Actors: spl1nt3r, m0z1ll4s
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Instar
    Victim Site: www.instar.com
  357. Website defacement of indianstuffinusa.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website indianstuffinusa.com was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This represents a redefacement of a previously compromised retail website targeting an Indian goods retailer in the United States.
    Date: 2026-04-06T01:55:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830567
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Retail/E-commerce
    Victim Organization: Indian Stuff in USA
    Victim Site: indianstuffinusa.com
  358. Alleged CVV Carding Group Advertisement via Telegram
    Category: Data Leak
    Content: A forwarded message promotes a CVV benefits chat group, referencing carding-related activity. The post includes a Telegram handle (@nzccg001) associated with NeZha CVV Support, suggesting a carding or financial fraud operation offering stolen CVV data.
    Date: 2026-04-06T01:55:08Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59546
    Screenshots:
    None
    Threat Actors: NeZha CVV Support
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  359. Website defacement of Kamakshi Ambal Trust by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group defaced the Kamakshi Ambal Trust website on April 6, 2026. This was identified as a redefacement incident targeting the Indian religious organizations website.
    Date: 2026-04-06T01:54:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830569
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Religious/Non-profit
    Victim Organization: Kamakshi Ambal Trust
    Victim Site: kamakshiambaltrust.org
  360. Website defacement of Meenashi Group by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the Meenashi Group website on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T01:54:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830573
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Meenashi Group
    Victim Site: meenashigroup.com
  361. Website defacement of Riz Medical by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the healthcare website rizmedical.com was defaced by attacker Nicotine affiliated with the Umbra Community team. The defacement targeted a specific subdirectory of the medical organizations WordPress installation.
    Date: 2026-04-06T01:47:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830448
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Riz Medical
    Victim Site: rizmedical.com
  362. Website defacement of 360degree.ngo by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community, through attacker Nicotine, successfully defaced the 360degree.ngo website on April 6, 2026. The attack targeted a non-governmental organizations WordPress installation.
    Date: 2026-04-06T01:47:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830449
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Non-profit
    Victim Organization: 360 Degree
    Victim Site: 360degree.ngo
  363. Website defacement of sheetal-s.com by Nicotine from Umbra Community
    Category: Defacement
    Content: On April 6, 2026, the website sheetal-s.com was defaced by an attacker known as Nicotine associated with the Umbra Community group. This was a targeted single-site defacement affecting the WordPress theme directory of the victim domain.
    Date: 2026-04-06T01:46:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830453
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sheetal-s.com
  364. Website defacement of NM Legal Service by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine defaced the NM Legal Service website on April 6, 2026. The attack targeted a legal services firms WordPress installation.
    Date: 2026-04-06T01:46:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830459
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Legal Services
    Victim Organization: NM Legal Service
    Victim Site: nmlegalservice.com
  365. Website defacement of oxygenconcentrator.online by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced the oxygenconcentrator.online website on April 6, 2026. The target appears to be a healthcare-related site focused on oxygen concentrator equipment.
    Date: 2026-04-06T01:45:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830460
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: oxygenconcentrator.online
  366. Website defacement of allnextver.com.bd by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website allnextver.com.bd was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This appears to be a single-target defacement incident affecting a Bangladeshi website.
    Date: 2026-04-06T01:44:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830463
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: allnextver.com.bd
  367. Website defacement of allnextver.expert by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website allnextver.expert was defaced by threat actor Nicotine, associated with the Umbra Community group, on April 6, 2026. This appears to be a single-target defacement rather than part of a mass campaign.
    Date: 2026-04-06T01:44:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830464
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: allnextver.expert
  368. Website defacement of DraftAB Neuro Care by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the healthcare website draftabneurocare.com was defaced by threat actor Nicotine associated with the Umbra Community group. The attack targeted the WordPress content directory of the neurology care providers website.
    Date: 2026-04-06T01:43:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830467
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: DraftAB Neuro Care
    Victim Site: draftabneurocare.com
  369. Website defacement of junaidbinjaman.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team defaced the website junaidbinjaman.com on April 6, 2026. The defacement targeted a WordPress installation as evidenced by the wp-content directory path.
    Date: 2026-04-06T01:43:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830469
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: junaidbinjaman.com
  370. Website defacement of sheikhmdrabiulislam.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the website sheikhmdrabiulislam.com on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T01:42:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830471
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sheikhmdrabiulislam.com
  371. Website defacement of Uttam Associates by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the website of Uttam Associates, a Bangladeshi organization. The defacement occurred on April 6, 2026, targeting a WordPress installation on the victims domain.
    Date: 2026-04-06T01:42:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830472
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Bangladesh
    Victim Industry: Professional Services
    Victim Organization: Uttam Associates
    Victim Site: uttamassociates.com.bd
  372. Website defacement of Jannat Fabrics by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine successfully defaced the Jannat Fabrics website on April 6, 2026. The attack targeted the companys WordPress content directory, compromising their web presence.
    Date: 2026-04-06T01:41:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830473
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Textile/Manufacturing
    Victim Organization: Jannat Fabrics
    Victim Site: jannatfebrics.com
  373. Website defacement of Jannat Fabrics by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team defaced the Jannat Fabrics website on April 6, 2026. The defacement targeted a retail/textiles companys WordPress installation.
    Date: 2026-04-06T01:41:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830474
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Retail/Textiles
    Victim Organization: Jannat Fabrics
    Victim Site: jannatfebrics.shop
  374. Website defacement of Jannat Fabrics by Nicotine (Umbra Community)
    Category: Defacement
    Content: Nicotine from Umbra Community successfully defaced the Jannat Fabrics website on April 6, 2026. The attack targeted a WordPress installation on the textile companys website.
    Date: 2026-04-06T01:40:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830475
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Textile/Manufacturing
    Victim Organization: Jannat Fabrics
    Victim Site: jannatfebrics2.com
  375. Website defacement of progressivelcd.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the Progressive LCD website on April 6, 2026. The defacement targeted a specific directory within the WordPress content folder of the Indian technology companys website.
    Date: 2026-04-06T01:39:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830476
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Technology
    Victim Organization: Progressive LCD
    Victim Site: progressivelcd.in
  376. Website defacement of famiagency.com by Nicotine from Umbra Community
    Category: Defacement
    Content: The website famiagency.com was defaced on April 6, 2026 by an attacker known as Nicotine affiliated with the Umbra Community team. The defacement targeted a WordPress installation on the site.
    Date: 2026-04-06T01:39:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830478
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Fami Agency
    Victim Site: famiagency.com
  377. Website defacement of Farooq Kitabghar by Nicotine (Umbra Community)
    Category: Defacement
    Content: Threat actor Nicotine from the Umbra Community group successfully defaced the website of Farooq Kitabghar, a Pakistani book publisher, on April 6, 2026. The defacement targeted the WordPress content directory of the organizations website.
    Date: 2026-04-06T01:33:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830419
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Publishing/Books
    Victim Organization: Farooq Kitabghar
    Victim Site: farooqkitabghar.pk
  378. Website defacement of asecret.shop by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the asecret.shop website on April 6, 2026. The defacement targeted what appears to be an e-commerce platform, with the attack affecting the WordPress theme directory structure.
    Date: 2026-04-06T01:32:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830423
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Unknown
    Victim Site: asecret.shop
  379. Website defacement of Bornomala Academy by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the Bornomala Academy website on April 6, 2026. The educational institutions website was compromised and defaced as part of this cyber attack.
    Date: 2026-04-06T01:32:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830424
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Bornomala Academy
    Victim Site: bornomala.academy
  380. Website defacement of pocketsandfriends.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the website pocketsandfriends.com was defaced by an attacker known as Nicotine affiliated with the Umbra Community team. The defacement targeted a specific WordPress content page rather than the homepage.
    Date: 2026-04-06T01:31:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830426
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Pockets and Friends
    Victim Site: pocketsandfriends.com
  381. Website defacement of keylicense.store by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the keylicense.store website on April 6, 2026. The attack targeted what appears to be a software licensing service provider.
    Date: 2026-04-06T01:30:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830430
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology/Software Licensing
    Victim Organization: KeyLicense
    Victim Site: keylicense.store
  382. Website defacement of apkwings.site by Nicotine (Umbra Community)
    Category: Defacement
    Content: The threat actor Nicotine from Umbra Community successfully defaced the APK Wings website on April 6, 2026. The attack targeted the WordPress theme directory of the mobile application download platform.
    Date: 2026-04-06T01:30:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830431
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: APK Wings
    Victim Site: apkwings.site
  383. Website defacement of filmxstudio.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat group, specifically attacker Nicotine, successfully defaced the filmxstudio.com website on April 6, 2026. The attack targeted what appears to be an entertainment industry website, with the defacement occurring on the main index page.
    Date: 2026-04-06T01:29:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830437
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Film X Studio
    Victim Site: filmxstudio.com
  384. Website defacement of car accident attorney site by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced a car accident attorney website on April 6, 2026. This was a single site defacement targeting a legal services domain.
    Date: 2026-04-06T01:28:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830439
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Legal Services
    Victim Organization: Unknown
    Victim Site: caraccidentattorney.autos
  385. Website defacement of lawthey.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine successfully defaced the lawthey.com website on April 6, 2026. The attack targeted what appears to be a legal services website through compromise of the WordPress themes directory.
    Date: 2026-04-06T01:28:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830441
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Legal Services
    Victim Organization: Law They
    Victim Site: lawthey.com
  386. Website defacement of Harikrishna Nutrition Center by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat group, through attacker Nicotine, successfully defaced the Harikrishna Nutrition Center website on April 6, 2026. This appears to be an isolated defacement targeting a healthcare/nutrition organization.
    Date: 2026-04-06T01:27:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830445
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare/Nutrition
    Victim Organization: Harikrishna Nutrition Center
    Victim Site: harikrishnanutritioncenter.com
  387. Alleged sale of credit card data with 2FA bypass capabilities
    Category: Data Breach
    Content: Threat actor advertising live credit cards for online purchases with 2FA bypass capabilities and high balance linkables. The actor is soliciting customers through multiple communication channels including Telegram and Signal for ongoing business relationships.
    Date: 2026-04-06T01:23:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-LIVE-CC-CARDS-FOR-ONLINE-PURCHASE-2FA–199493
    Screenshots:
    None
    Threat Actors: Checkky
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  388. Alleged data breach of eZhire car rental service
    Category: Data Breach
    Content: Threat actor claims to have compromised eZhire car rental service, allegedly obtaining 2 million customer records including government IDs, signatures, personal information, source code, API keys, and 1.3TB of data spanning from 2016 to 2026. The compromised data reportedly includes customers from multiple countries including UAE, Saudi Arabia, Bahrain, Qatar, Egypt, India, USA, Germany, Ukraine, and Russia.
    Date: 2026-04-06T01:22:13Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-UAE-SA-Bahrain-Qatar-eZhire-Car-Rentals-IDS-SIGNATURES-PII-ORDERS
    Screenshots:
    None
    Threat Actors: w1kkid
    Victim Country: United Arab Emirates
    Victim Industry: Transportation
    Victim Organization: eZhire
    Victim Site: Unknown
  389. Website defacement of Become Marketing by Nicotine (Umbra Community)
    Category: Defacement
    Content: The marketing company Become Marketings website was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. The attack targeted a WordPress installation on the South African marketing firms domain.
    Date: 2026-04-06T01:20:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830380
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: South Africa
    Victim Industry: Marketing/Advertising
    Victim Organization: Become Marketing
    Victim Site: becomemarketing.co.za
  390. Website defacement of jsscpmevents.com by Nicotine/Umbra Community
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced jsscpmevents.com on April 6, 2026. The attack targeted what appears to be an events or conference services website through a WordPress content directory.
    Date: 2026-04-06T01:19:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830382
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Events/Conference Services
    Victim Organization: JSSCP Events
    Victim Site: jsscpmevents.com
  391. Website defacement of businessdhundo.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the attacker Nicotine from the Umbra Community team defaced the businessdhundo.com website. The defacement targeted a specific directory path within the WordPress content folder rather than the main homepage.
    Date: 2026-04-06T01:19:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830388
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Business/Commercial
    Victim Organization: Business Dhundo
    Victim Site: businessdhundo.com
  392. Website defacement of Polimarket by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community member Nicotine successfully defaced the Polimarket website on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T01:18:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830391
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Polimarket
    Victim Site: polimarket.in
  393. Website defacement of ansbyameen.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Threat actor Nicotine affiliated with Umbra Community successfully defaced the ansbyameen.com website on April 6, 2026. The attack targeted a specific subdirectory within the WordPress content structure.
    Date: 2026-04-06T01:17:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830392
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ansbyameen.com
  394. Website defacement of Global Trendz by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website globaltrendz.pk was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. The defacement targeted a WordPress installation on the Pakistani domain.
    Date: 2026-04-06T01:17:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830393
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Global Trendz
    Victim Site: globaltrendz.pk
  395. Website defacement of safa.pk by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website safa.pk was defaced by the attacker Nicotine associated with the Umbra Community team on April 6, 2026. The attack targeted the WordPress theme directory of the site.
    Date: 2026-04-06T01:16:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830395
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: safa.pk
  396. Alleged leak of South Korean credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing over 252,000 email:password credentials allegedly from South Korea. The credentials are claimed to be fresh and high quality, sourced from April 5, 2026.
    Date: 2026-04-06T01:14:59Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-25-2-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-South-Korea-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: South Korea
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  397. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor claims to have valid Hotmail credentials available through private cloud storage and promotes contact via Telegram channel for access to the credential list.
    Date: 2026-04-06T01:14:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71261/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  398. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor redcloud leaked a combolist containing 4,000 Hotmail email credentials through a MediaFire download link on CrackingX forum.
    Date: 2026-04-06T01:13:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71262/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  399. Alleged leak of Swiss credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing over 41,000 email and password combinations allegedly from Swiss sources. The data is being distributed for free and promoted as fresh and high quality.
    Date: 2026-04-06T01:05:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-41-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Switzerland-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  400. Alleged leak of Turkish credential combolist
    Category: Combo List
    Content: Threat actor shared a credential combolist containing over 37,000 email:password combinations allegedly from Turkey. The data is being distributed for free and promoted as fresh and high quality.
    Date: 2026-04-06T01:04:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-37-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Turkey-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  401. Alleged leak of Swedish email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing over 29,000 email and password combinations allegedly originating from Sweden. The credentials are being distributed through a hidden forum post with additional content available via Telegram.
    Date: 2026-04-06T01:03:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-29-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Sweden-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  402. Alleged leak of Taiwan credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 29,000 email and password combinations allegedly from Taiwan. The credentials are claimed to be fresh and high quality, distributed through a Telegram channel.
    Date: 2026-04-06T01:03:01Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-29-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Taiwan-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Taiwan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  403. Alleged sale of email account access including Hotmail, Yahoo, and ATT across multiple countries
    Category: Logs
    Content: A threat actor is selling access to email accounts across multiple countries including US, UK, CA, DE, JP, NL, BR, PL, ES, IT, FR, BE, and AU. The offering includes Hotmail, Yahoo, ATT, and other email providers with inbox keyword searching features targeting services such as eBay, Amazon, Walmart, Uber, PSN, Booking, Poshmark, Alibaba, Mercari, Kleinanzeigen, and Neosurf. The seller claims to operate a private cloud and offers valid webmails including ntlworld. Requests are handled via direct message.
    Date: 2026-04-06T01:02:40Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59529
    Screenshots:
    None
    Threat Actors: Admu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  404. Alleged leak of Spanish credentials combolist
    Category: Combo List
    Content: Threat actor shared a credential list containing over 264,000 email:password combinations allegedly from Spain, described as fresh and high quality. The combolist was distributed through a hidden content section requiring registration.
    Date: 2026-04-06T00:53:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-264-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Spain-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  405. Alleged leak of Thai credentials
    Category: Combo List
    Content: Threat actor shared a combolist containing over 44,000 email:password combinations allegedly from Thailand. The credentials are claimed to be fresh and high quality, distributed through a cybercriminal forum.
    Date: 2026-04-06T00:53:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-44-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Thailand-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Thailand
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  406. Alleged leak of 133 million credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 133 million URL:LOGIN:PASS credentials on a cybercrime forum. The post requires registration to access the full content and specific details about the data source.
    Date: 2026-04-06T00:51:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71259/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  407. Alleged leak of credential logs via ULP stealer malware
    Category: Logs
    Content: Threat actor thejackal101 shared 27.1 GB of compressed stealer logs containing credentials allegedly collected by ULP malware on April 5, 2026. The logs are being distributed for free through hidden content links and a Telegram channel.
    Date: 2026-04-06T00:51:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-%E2%9C%AA-27-1-GB-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-ULP-LOG-S-Date-%E2%9C%AA-5-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  408. Website defacement of XP Solutions by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of XP Solutions, a Pakistani technology company, was defaced by an attacker named Nicotine affiliated with the Umbra Community group on April 6, 2026.
    Date: 2026-04-06T00:42:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830375
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Technology
    Victim Organization: XP Solutions
    Victim Site: xpsolutions.pk
  409. Website defacement of farmaceuticafl.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against pharmaceutical company Farmaceutica FLs website on April 6, 2026. This appears to be a repeat attack against the same target rather than an initial compromise.
    Date: 2026-04-06T00:36:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830329
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: Farmaceutica FL
    Victim Site: farmaceuticafl.com
  410. Website defacement of dendroicaerp.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website dendroicaerp.com was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-06T00:36:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830331
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dendroicaerp.com
  411. Website defacement of dulceriaelaguila.site by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website dulceriaelaguila.site was defaced by attacker Nicotine from the Umbra Community team on April 6, 2026. This appears to be a redefacement of a previously compromised site belonging to what appears to be a confectionery or sweet shop business.
    Date: 2026-04-06T00:35:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830332
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Retail/Food Services
    Victim Organization: Dulceria El Aguila
    Victim Site: dulceriaelaguila.site
  412. Website defacement of Edredones Ariel by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against Edredones Ariels website on April 6, 2026. The targeted site appears to be a bedding/textile retail business.
    Date: 2026-04-06T00:34:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830333
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Retail/Commerce
    Victim Organization: Edredones Ariel
    Victim Site: edredonesariel.com
  413. Website defacement of Multiservicios Balmon by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community hacker group member Nicotine conducted a redefacement attack against Multiservicios Balmons website on April 6, 2026. This appears to be a targeted attack rather than part of a mass defacement campaign.
    Date: 2026-04-06T00:34:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830339
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Services
    Victim Organization: Multiservicios Balmon
    Victim Site: multiserviciosbalmon.com
  414. Website defacement of mundomayavolando.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Website defacement targeting mundomayavolando.com conducted by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T00:33:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830341
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mundomayavolando.com
  415. Website defacement of HT Kitchen Cabinets by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of HT Kitchen Cabinets was defaced by the attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. The defacement targeted a Canadian kitchen cabinet companys website.
    Date: 2026-04-06T00:27:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830294
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Home Improvement/Kitchen Design
    Victim Organization: HT Kitchen Cabinets
    Victim Site: htkitchencabinets.ca
  416. Website defacement of labsatbitquark.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat group, specifically attacker Nicotine, successfully defaced the BitQuark Labs website on April 6, 2026. The incident targeted a technology research organizations web presence.
    Date: 2026-04-06T00:26:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830295
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology/Research
    Victim Organization: BitQuark Labs
    Victim Site: labsatbitquark.com
  417. Website defacement of Lamora Furnishings by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine defaced the website of Canadian furniture retailer Lamora Furnishings on April 6, 2026. The attack targeted the companys index page and was archived on zone-xsec.com.
    Date: 2026-04-06T00:26:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830296
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Retail/Furniture
    Victim Organization: Lamora Furnishings
    Victim Site: lamorafurnishings.ca
  418. Website defacement of Marie Collection Store by Nicotine (Umbra Community)
    Category: Defacement
    Content: The retail website mariecollectionstore.ca was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. This appears to be a targeted single-site defacement of a Canadian e-commerce store.
    Date: 2026-04-06T00:25:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830297
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Retail/E-commerce
    Victim Organization: Marie Collection Store
    Victim Site: mariecollectionstore.ca
  419. Website defacement of Master Tech Mechanical by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Master Tech Mechanical was defaced by an attacker known as Nicotine affiliated with the Umbra Community group on April 6, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-06T00:25:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830298
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Mechanical Services
    Victim Organization: Master Tech Mechanical
    Victim Site: mastertechmechanical.com
  420. Website defacement of Shan Blinds Ltd Calgary by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Shan Blinds Ltd Calgary was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This appears to be a targeted single-site defacement of a Canadian window blinds company.
    Date: 2026-04-06T00:24:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830302
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Manufacturing/Retail
    Victim Organization: Shan Blinds Ltd Calgary
    Victim Site: shanblindsltdcalgary.ca
  421. Website defacement of Shinwari Karahi YYC by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Shinwari Karahi YYC, a restaurant in Calgary, Canada, was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026.
    Date: 2026-04-06T00:23:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830303
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Food Service
    Victim Organization: Shinwari Karahi YYC
    Victim Site: shinwarikarahiyyc.ca
  422. Website defacement of Style Finishing Carpentry by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Style Finishing Carpentry, a Canadian carpentry services company, was defaced by the attacker Nicotine associated with the Umbra Community group on April 6, 2026. This appears to be an isolated defacement targeting a single commercial website.
    Date: 2026-04-06T00:23:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830304
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Construction/Carpentry Services
    Victim Organization: Style Finishing Carpentry
    Victim Site: stylefinishingcarpentary.ca
  423. Website defacement of Sura Market by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the Sura Market website on April 6, 2026. The defacement targeted the index.txt file of the Canadian retail website.
    Date: 2026-04-06T00:22:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830305
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Retail/E-commerce
    Victim Organization: Sura Market
    Victim Site: suramarket.ca
  424. Website defacement of surapayment.ca by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine, associated with Umbra Community, defaced the surapayment.ca website on April 6, 2026. The incident targeted what appears to be a Canadian payment services company.
    Date: 2026-04-06T00:22:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830306
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Financial Services
    Victim Organization: Sura Payment
    Victim Site: surapayment.ca
  425. Website defacement of The Luxe Homes by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the website theluxehomes.ca was defaced by an attacker known as Nicotine associated with the Umbra Community team. The defacement targeted a Canadian real estate companys website.
    Date: 2026-04-06T00:21:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830307
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Real Estate
    Victim Organization: The Luxe Homes
    Victim Site: theluxehomes.ca
  426. Website defacement of Kancelaria Ropinski law firm by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community member Nicotine conducted a redefacement attack against the Polish law firm Kancelaria Ropinskis website on April 6, 2026. This marks a repeat compromise of the same target, indicating persistent vulnerabilities in the victims web infrastructure.
    Date: 2026-04-06T00:21:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830316
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Poland
    Victim Industry: Legal Services
    Victim Organization: Kancelaria Ropinski
    Victim Site: kancelariaropinski.pl
  427. Website defacement of opiekundlaseniora.pl by Nicotine from Umbra Community
    Category: Defacement
    Content: The website opiekundlaseniora.pl was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This appears to be a redefacement of a previously compromised senior care services website.
    Date: 2026-04-06T00:20:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830317
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Poland
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: opiekundlaseniora.pl
  428. Website defacement of webfarming.pl by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community group conducted a redefacement of the Polish web services company WebFarmings website on April 6, 2026. This represents a repeated attack on the same target rather than an initial compromise.
    Date: 2026-04-06T00:19:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830319
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Poland
    Victim Industry: Technology
    Victim Organization: WebFarming
    Victim Site: webfarming.pl
  429. Website defacement of themedekho.com by Nicotine from Umbra Community
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against themedekho.com on April 6, 2026. This appears to be a targeted single-site defacement rather than a mass attack campaign.
    Date: 2026-04-06T00:19:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830320
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology/Web Development
    Victim Organization: TheMeDekho
    Victim Site: themedekho.com
  430. Website defacement of Kerala Astrologers by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Kerala Astrologers website was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This appears to be a redefacement of a previously compromised site rather than an initial attack.
    Date: 2026-04-06T00:18:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830321
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Astrology Services
    Victim Organization: Kerala Astrologers
    Victim Site: keralaastrologers.org
  431. Website defacement of viacaopedranegra.com.br by Nicotine/Umbra Community
    Category: Defacement
    Content: Brazilian website viacaopedranegra.com.br was defaced by attacker Nicotine from the Umbra Community team on April 6, 2026. This was identified as a redefacement incident, indicating the site had been previously compromised.
    Date: 2026-04-06T00:18:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830326
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: viacaopedranegra.com.br
  432. Website defacement of AG Digital Marketing by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community conducted a redefacement of AG Digital Marketings website on April 6, 2026. This represents a repeated compromise of the same target rather than an initial breach.
    Date: 2026-04-06T00:12:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830251
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Digital Marketing
    Victim Organization: AG Digital Marketing
    Victim Site: agdigitalmarketing.in
  433. Website defacement of The Bliss International Spa by Nicotine (Umbra Community)
    Category: Defacement
    Content: Threat actor Nicotine from the Umbra Community group conducted a redefacement attack against The Bliss International Spas website on April 6, 2026. This incident represents a repeat targeting of the victims web infrastructure.
    Date: 2026-04-06T00:11:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830277
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare/Wellness
    Victim Organization: The Bliss International Spa
    Victim Site: theblissinternationalspa.com
  434. Website defacement of 6-Eight convenience store by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the website of 6-Eight Convenience Store was defaced by an attacker named Nicotine, affiliated with the Umbra Community group. The defacement targeted a Canadian retail business website.
    Date: 2026-04-06T00:10:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830279
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Retail
    Victim Organization: 6-Eight Convenience Store
    Victim Site: 6-eightconveniencestore.ca
  435. Website defacement of BitQuark Technologies by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of BitQuark Technologies was defaced on April 6, 2026 by an attacker named Nicotine associated with the Umbra Community group. The defacement targeted the companys main index page.
    Date: 2026-04-06T00:10:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830282
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: BitQuark Technologies
    Victim Site: bitquarktechnologies.com
  436. Website defacement of bloomingsteps.ca by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website bloomingsteps.ca was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. The defacement targeted the index.txt file of the victims website.
    Date: 2026-04-06T00:09:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830283
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Blooming Steps
    Victim Site: bloomingsteps.ca
  437. Website defacement of Dazzling Home Decor by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website dazzlinghomedecor.ca was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. The defacement targeted a Canadian home decor retail website.
    Date: 2026-04-06T00:09:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830285
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Retail/Home Decor
    Victim Organization: Dazzling Home Decor
    Victim Site: dazzlinghomedecor.ca
  438. Website defacement of Dhillon Medical Store by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the website of Dhillon Medical Store, an Indian healthcare/pharmaceutical business, on April 6, 2026.
    Date: 2026-04-06T00:08:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830287
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Dhillon Medical Store
    Victim Site: dhillonmedicalstore.in
  439. Website defacement of Fresh Cutz Hair Studio by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Fresh Cutz Hair Studio, a Canadian hair salon, was defaced by an attacker using the handle Nicotine associated with the Umbra Community group on April 6, 2026.
    Date: 2026-04-06T00:07:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830290
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Beauty and Personal Care
    Victim Organization: Fresh Cutz Hair Studio
    Victim Site: freshcutzhairstudio.ca
  440. Website defacement of Green Pizza by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Green Pizza, a Canadian food service business, was defaced by an attacker known as Nicotine, affiliated with the Umbra Community group on April 6, 2026.
    Date: 2026-04-06T00:07:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830292
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Food Service
    Victim Organization: Green Pizza
    Victim Site: greenpizza.ca
  441. Website defacement of Titan Global Trading by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team defaced the Titan Global Trading website on April 6, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-06T00:01:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830239
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Trading/Commerce
    Victim Organization: Titan Global Trading
    Victim Site: titanglobaltrading.com