[April-13-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a comprehensive analysis of a massive surge in cybercriminal activity, data breaches, and website defacements recorded primarily on April 13 and April 14, 2026. Based strictly on the provided incident logs, the threat landscape is currently dominated by a high volume of credential stuffing lists, large-scale mass website defacements, industrial control system (ICS) compromises, and high-profile corporate data extortion.

The data reveals a highly active cybercrime ecosystem operating across both the open web (forums like CrackingX, BreachForums, DemonForums, and PwnForums) and encrypted Telegram channels. The most significant threat actor identified during this period is the “ShinyHunters” group, which is currently executing a massive extortion campaign against major global corporations, including Rockstar Games, Salesforce, and Santander Bank. Simultaneously, a distinct wave of mass website defacements was carried out by an actor known as “maw3six,” targeting dozens of international domains. Furthermore, the underground economy is heavily saturated with the free distribution and sale of “combolists” (email and password combinations), signaling a robust infrastructure supporting credential stuffing and account takeover attacks.


2. Threat Actor Profiles and Major Campaigns

2.1. ShinyHunters: Corporate Extortion and Data Breaches

The threat group known as ShinyHunters is the most prominent actor in the documented incidents, executing a sophisticated extortion and data leak campaign across multiple sectors. The group operates using a “pay or leak” ransomware model, although their recent attacks appear focused on data exfiltration and extortion rather than traditional file encryption. ShinyHunters utilizes Telegram channels (handles including @shinyc0rpsss) to communicate, advertise stolen data, and issue threats, while using Tox, Session, and PGP keys to verify their identity and ward off impersonators (such as “Mattys Savoie & James”) who allegedly misused their PGP keys for independent ransom demands.

Targeted Organizations and Extortion Details:

  • Rockstar Games: ShinyHunters claims to have compromised Rockstar Games through a third-party analytics vendor, Anodot. The threat actor allegedly exfiltrated over 78.6 million records from Snowflake instances.
  • The Rockstar Ransom: The group demanded a $200,000 USD ransom, which Rockstar reportedly refused to pay, stating the stolen data contained anonymized financial and sales records rather than customer personally identifiable information (PII).
  • The Rockstar Leak: Following the refusal, ShinyHunters published the data, which included a decade of internal sales transactions (2014-2024), total earnings exceeding $5 billion, regional sales figures, and in-game currency (Shark Card) purchase data. The group also posted threatening messages directed at the company following the dispute.
  • Salesforce: The group claims to possess full access to the complete Salesforce ecosystem, including Sales Cloud, Service Cloud, Marketing Cloud, AI automation systems, VPNs, and backend source code.
  • Salesforce Offerings: They are offering this complete access for $25 million. Additionally, they are selling tiered data packages, including a “Files Cloud” with 9.1 million Salesforce files (2024-2026) for $10,000, and a ransom database of 1 million files for $5,000.
  • Santander Bank: ShinyHunters is offering a dataset allegedly affecting Santander Bank customers in Spain, Chile, and Uruguay for $1 million USD. The data purportedly contains 30 million customer records, 28 million credit card numbers, and 6 million account numbers with balances.
  • Live Nation / Ticketmaster: The group is selling a 1.3TB dataset on BreachForums containing information on 560 million Live Nation/Ticketmaster users, including credit card details. They previously valued this data at $75,000 USD.
  • Government Credentials: The group offered for sale approximately 73,000 government email login credentials from Brazil and Zambia, affecting police, military, and prison administration sectors, claiming an 80% validity rate.
  • Other Corporate Targets: ShinyHunters claims to possess data from AT&T (valued at $100,000), Kemper Corporation (13 million Salesforce records containing PII), ZenBusiness (802GB of Snowflake/Mixpanel data), Hallmark Cards (7.9 million records), Neiman Marcus, Cisco (3 million source code files), Microsoft, Google, Victoria’s Secret, CrowdStrike, and NATO’s Jira instance.

2.2. The ‘maw3six’ Mass Defacement Campaign

A threat actor utilizing the handle “maw3six” executed a widespread and indiscriminate mass website defacement campaign primarily on April 13 and April 14, 2026. The attacks predominantly targeted websites hosted on Linux and Cloud infrastructure. The defacements generally involved altering specific pages (often naming the file maw.html) rather than the main homepages, and the campaign affected organizations across multiple continents without a clear ideological or sector-specific focus.

Notable ‘maw3six’ Defacement Targets:

  • Nepal: Extensive targeting of Nepalese infrastructure, including Nepal Brokers (financial services), Sawari Sewa (transportation), educational examination systems, Wonjala E-mart, and various .com.np domains.
  • Indonesia: Compromise of Batavia (business) and Pandu Warta (news media).
  • Africa: Defacement of Senegalese government infrastructure (ggis.sn) and SnapTech, a South African technology company.
  • Europe & Americas: Defacements affecting UK environmental firm EECO Solutions, Argentine e-commerce site Glow Store, Ecuadorian financial services firm Factoring Ecuador, and French site fournisseurs-astucieux.fr.
  • Other Sectors: Aviation (Prestige Air Parts), Defense (Vigor Defense), and Creative Services (Upturn Studio in Australia).

2.3. Z-Pentest Alliance and DDoSia Project: ICS/OT Attacks

The landscape features highly critical claims of Industrial Control Systems (ICS) and Operational Technology (OT) compromises by politically motivated hacktivist groups.

  • Z-Pentest Alliance: This pro-Russian hacktivist group claimed full takeover of the ICS and Building Management Systems (BMS) of the Albert Most Velebudická hypermarket in the Czech Republic.
  • Attack Vector and Impact: They claimed the intrusion exploited weak network segmentation and unprotected management interfaces to control boiler rooms, Trane industrial chillers, VZT ventilation, and cold storage rooms. The group threatened to disable refrigeration systems to destroy thousands of tons of food as retaliation for European support for Ukraine.
  • DDoSia Project: Affiliated with the pro-Russian group NoName057(16), this actor claimed to have breached the ICS/SCADA systems of Nova-Tech Poultry in South Korea. The group claimed control over modules managing infrared chicken beak processing, injection rates, and production lines as part of an anti-South Korean campaign named #OpSouthKorea.

2.4. Handala Hack (حنظله): Middle Eastern Infrastructure Threats

The Iranian cyber group Handala (or Hanzala) claimed responsibility for large-scale cyber operations targeting the Persian Gulf steel industry.

  • Targets: The group claims to have completely compromised and taken offline Fulat in Bahrain and SULB in Saudi Arabia. These companies reportedly possess an annual revenue exceeding $5 billion.
  • Motivation: Handala framed the attacks as revenge for fallen hackers during the “Ramadan War” and in retaliation for actions against the “Axis of Resistance” and southern Lebanon. The group also issued broad threats against Saudi Arabian leadership and industrial infrastructure.

2.5. Additional Defacement Actors (T-XpLoiT, DimasHxR, Zod, CYKOMNEPAL)

Alongside maw3six, several other actors executed defacement campaigns:

  • T-XpLoiT: Targeted government and educational institutions, defacing the Tanzania ICT Commission events portal, the internal intranet of Guatemala’s National Institute of Public Administration (INAP), and multiple Indonesian Islamic schools (MTs Nurussyafa’ah, STKIP PGRI Sidoarjo).
  • DimasHxR: Conducted single-page defacements across varied international targets, including a Chinese acrylic sheet manufacturer, an Iranian website, a Ukrainian domain, and a Japanese site.
  • CYKOMNEPAL: Defaced the Wonjala E-mart in Nepal and a specific product page of Brazilian IT company Informatica CPU.
  • Zod: Executed mass defacements targeting vendorinfra.com and the aviation company Wonder Air.
  • CyberOprationCulture / Nullsec Philippines: CyberOprationCulture defaced a Dreams Marketplace subdomain, while Nullsec Philippines claimed politically motivated defacements of the Uruguayan Ministry of Environment and Electronic Sworn Statement System.

3. Detailed Threat Landscape Analysis by Category

3.1. Data Breaches and Corporate Data Leaks

Beyond the ShinyHunters extortion campaigns, numerous independent data breaches were advertised or leaked on underground forums.

  • VUMI Group: Threat actor “bytetobreach” leaked an insurance database containing PII, social security numbers, passport documents, and W-9 forms for approximately 300,000 insured individuals and 25,000 staff members. The data was allegedly exfiltrated over six days and distributed via cloud storage.
  • Talabat Saudi Arabia: Threat actor “Jeffrey Epstein” offered a database containing between 536,000 and 563,000 user records from the food delivery platform, including names, emails, phone numbers, and addresses.
  • National Credit Information Center of Vietnam (CIC): Actor “Dedale Office” claimed to sell a database of over 160 million records containing full names, national ID numbers, loan data, and tax IDs.
  • Emaar Properties: Actor “ksa901” offered a database of 400,000 records of property owners and renters in the UAE, including high-profile Burj Khalifa residents, for $10,000.
  • Government Data Leaks: Breaches targeted the Bila Tserkva City Council in Ukraine (by “Perun Svaroga”), the Municipality of São Mateus in Brazil, the Ukrainian Information Resource Center (600,000 educational/family records), and Iraq’s 2025-2026 census data (47.7 million records for $1200). Furthermore, an actor named “Tendi” leaked passport documents for 200 Moscow citizens and a database containing details of 70,000 alleged Russian military casualties.
  • Other Notable Leaks: Breaches affected American Express (200,000 card records by INNG), NurtureLife (27.5k customer records including children’s birthdates), Farmacias del Ahorro in Mexico (18,530 records), FoodPapa.pk in Pakistan (239,109 records), OfferteCartucce in Italy (229,000 records), and an alleged database of FBI agents containing bcrypt-hashed passwords and vehicle plates. Furthermore, technical data from SEKISUI Aerospace Corporation, including export-controlled Boeing part information, was listed for $200,000.

3.2. Combo Lists, Credential Stuffing, and Log Distribution

The cybercriminal open web forums (such as CrackingX and DemonForums) are experiencing a massive influx of “combolists” (lists of compromised email and password combinations) and stealer logs. These lists are primarily used for automated credential stuffing attacks.

  • High-Volume Distributors: Actors like “CODER” are distributing massive datasets for free via Telegram, including an 11 million record mixed combo list, a 7 million record corporate SMTP list, and an 8 million record list targeting diverse social media platforms (Myspace, Bebo, Netlog). Another actor, “StarLinkClub,” posted a 21.4 million URL:login:password combolist.
  • Targeted Platform Combolists: Specific platforms are heavily targeted. “HQcomboSpace” leaked 1.69 million Yahoo credentials. Multiple actors (including “UniqueCombo,” “alphaxdd,” and “D4rkNetHub”) flooded forums with highly specific Hotmail credential lists ranging from a few hundred to over 500,000 verified hits. Streaming and gaming services were also targeted, with actor “Ra-Zi” distributing 120,000 credentials for Netflix, Minecraft, Steam, and Hulu.
  • Geo-Targeted Data: Distributors like “thejackal101” (under the “Elite_Cloud1” brand) and “CobraEgy” released massive country-specific combolists. These included datasets targeting France (1.4 million), Germany (1.15 million), India (246k), Indonesia (246k), Hungary (135k), Greece (63k), Finland (12k), Colombia (183k), Ecuador (183k), Denmark (47k), Croatia (23k), and the Czech Republic (272k).
  • Stealer Logs and Cookies: Actors are selling fresh infostealer logs containing credentials and session cookies. Actor “BBB” offered logs for Amazon, eBay, Booking.com, and Uber across multiple global regions. Another actor, “tuzelity,” sold combos and cookies for Facebook, PayPal, Airbnb, Roblox, and dating sites. Authentication cookies for eBay and Google Pay were also shared by actor “bluestarcrack” for potential session hijacking.

3.3. Initial Access Brokering and Cybercrime Services

The underground economy heavily features the sale of initial access to compromised systems and the provision of malicious services to facilitate further attacks.

  • Mail Account Access: Actor “D4RCK MAGICIAN” advertised the sale of direct mail account access across ten countries (including France, UK, US, and Japan), accompanied by scripts and credential hits. Actor “mu” sold fresh, keyword-searchable credential databases and access to valid webmails on private cloud infrastructure.
  • Infrastructure Access: The “Infrastructure Destruction Squad” advertised access to compromised servers and systems. Another actor sold access to verified FTX exchange accounts via the Kroll portal, claiming account balances up to $9.5 million, for an asking price of $50,000.
  • Spam and Phishing Infrastructure: Threat actor “Skybat” offered premium SMTP inbox services capable of sending 25,000 emails per day from dedicated IPs, alongside worldwide SMS sender packages. Actor “NullPointerPanic” advertised a “Sendgrid.com Phishing Suite” for advanced email service theft.
  • Domain Abuse Services: An actor named “clean_search” advertised comprehensive cybercrime services, including anti-phishing evasion, domain abuse operations, and DMCA manipulation, claiming to process 15,000 abuse cases daily for cryptocurrency payments ranging from $100 to $1000.

3.4. Malware Tooling and Vulnerability Exploitation

The proliferation of offensive tooling and zero-day exploits remains a persistent threat vector.

  • Offensive Tool Suites: Threat actor “Yoshi Data” actively advertised a comprehensive suite of offensive security and cybercrime tools. These included credential stuffing tools like SilverBullet and OpenBullet, Python automation scripts, CC+ tools, and custom executable development focused on stealth and precision for Kali Linux and Windows environments. Tools specific to validating stolen credentials, such as the “Discord Nitro Checker” and “Weeber Crunchyroll Checker,” were also widely distributed for high-speed automated workflows.
  • Zero-Day Exploits: Actor “phanes” (or “phanesthegreat”) attempted to sell two critical zero-day exploits. The first was a Windows RDP Denial-of-Service (DoS) exploit priced at $850, allegedly utilizing an integer overflow to crash Windows Server 2012/2016 and Windows 8.1/10 systems, claiming to affect over 1 million devices. The second was a FreeBSD FTP Remote Code Execution (RCE) exploit priced at $900, allegedly affecting over 11,000 devices. Furthermore, actor “SysInvaders” sold reflected XSS vulnerabilities affecting corporate entities in Sweden, Norway, and Poland.
  • Software Piracy and Cracking: The actor “GoRainCC” actively distributed cracked versions of commercial and professional software, including FlyPaper Sherlock investigation software, Site Modeller Pro, Domain Hunter Gatherer Pro, and various Digi-Ants CAD tools.
  • Automated Scanning Activity: The “Rakyat Digital Crew” shared automated vulnerability scan results indicating active exploitation attempts against Indonesian government portals (Ministry of Education, Ministry of Finance) and commercial sites using Open Redirect, Directory Traversal, RFI, and Command Injection techniques.

3.5. Specialized Cyber Threats and Alerts

  • AI Model Security Risks: US senior officials reportedly held an emergency meeting with banking executives and the Treasury Department regarding cybersecurity risks posed by a new Anthropic AI model known as “Glasswing” (Project Mythos). The technology is perceived as a threat to the US banking system due to potential cyber intrusion capabilities.
  • State-Sponsored Spyware: Reports surfaced alleging that the CIA utilized NSO Group’s Pegasus spyware in a deception operation targeting Iranian officials. The spyware was reportedly used to send spoofed messages to IRGC members to falsely claim a downed American pilot had been recovered, demonstrating the use of commercial spyware in complex geopolitical intelligence operations.
  • Financial Fraud: The sale of stolen payment card data remains active, with actors like “petac” and “Coleman” advertising fresh CC/CVV information, high balances, and financial transfer services via Cash App and PayPal on Telegram carding marketplaces. In addition, 40,000 Belgian IBANs were offered for sale via cryptocurrency by actor “jza1337”.

4. Comprehensive Incident Log (Selected Detailed Events)

To provide a granular view of the incident data, the following highlights specific tactical events executed over the reporting period.

  • Incident 151-153: Tanzanian and Indonesian Government/Education Defacements. Threat actor T-XpLoiT compromised the Tanzania ICT Commission (events.ictc.go.tz) on a government subdomain. Concurrently, the actor executed mass defacements against the online examination systems (admujian.mtsnurussyafaah.sch.id and rdm.mtsnurussyafaah.sch.id) of MTs Nurussyafa’ah, an Indonesian Islamic school, indicating automated exploitation of shared vulnerabilities across varied geographic regions.
  • Incident 161: City of Anthony, New Mexico Incident. The local government reported a cybersecurity incident involving inaccessible systems and missing public records. The anomalies, which included erased police devices, coincided with a mayoral transition. While an external hack is not confirmed, state authorities are investigating data integrity and access controls.
  • Incident 162: Straumann Legacy System Exposure. Swiss dental company Straumann reported a cyberattack targeting a legacy internal control system used between 2021 and 2024, resulting in exposed internal documents. The company isolated the incident with cybersecurity experts and confirmed that core business operations and client systems were unaffected.
  • Incident 261: Healthdaq Cyber Security Incident. Healthcare recruitment company Healthdaq suffered a cyber incident that was subsequently reported to regulatory authorities and the Garda National Cyber Crime Bureau in Ireland. Due to the ongoing criminal investigation, specifics regarding the attack vector were withheld.
  • Incident 263: Spring Lake Park Schools Ransomware Suspicions. The Spring Lake Park school district in Minnesota preemptively closed all facilities following a suspected ransomware attack. Local authorities and cybersecurity experts initiated an investigation to secure networks and assess the potential compromise of IT systems.
  • Incident 296: WRG College SQL Injection. A threat actor named Mr.SonicX, part of the TEGAL CYBER TEAM, reported performing a targeted SQL injection attack against an Indian educational institution (wrgcollege.edu.in) by exploiting an injectable id parameter on the gallery_img.php endpoint.
  • Incident 336: #OpsShadowStrike Defacement. A coalition of hacktivist groups (including TengkorakCyberCrew, MalaysiaHacktivist, and EagleCyberCrew) defaced the Indian website myseba.in. The attack utilized the #AllMuslimHackers banner and carried pro-Palestine and anti-Israel political messaging.

5. Conclusion

The cybersecurity landscape analyzed in this dataset indicates a highly volatile period characterized by massive data extortion, automated exploitation, and the weaponization of compromised credentials.

The activities of ShinyHunters represent the most severe financial and reputational threat. By compromising third-party vendors (like Anodot) and critical cloud infrastructure (like Snowflake and Salesforce), they have successfully exfiltrated millions of sensitive records from top-tier global corporations. Their aggressive “pay or leak” strategy and multi-million dollar ransom demands highlight the critical risk posed by supply chain vulnerabilities and improperly secured cloud environments.

Concurrently, the underground economy is thriving on the mass distribution of combolists and stealer logs. The sheer volume of credentials being distributed for free or sold cheaply—numbering in the tens of millions—provides low-skill threat actors with the necessary ammunition to conduct endless credential stuffing and account takeover attacks against platforms ranging from Hotmail and Yahoo to highly sensitive corporate VPNs and financial services.

Politically motivated hacktivism also poses a severe physical and operational threat. The claims by groups like the Z-Pentest Alliance and Handala regarding the full takeover of Industrial Control Systems (ICS) in European hypermarkets and Middle Eastern steel manufacturing facilities demonstrate a dangerous escalation from digital defacement to physical disruption. Threatening to destroy physical inventory by manipulating refrigeration controls or halting steel production emphasizes the urgent need for robust network segmentation and the securing of OT environments against external intrusion.

Finally, the relentless mass defacement campaigns executed by actors like maw3six and T-XpLoiT across vulnerable Linux servers and WordPress installations highlight the continuous, automated scanning and exploitation of unpatched web infrastructure globally.

In summary, organizations must urgently prioritize the securing of third-party SaaS integrations, implement robust multi-factor authentication to combat credential stuffing, and rigidly segment industrial control systems to defend against an increasingly bold and diversified threat actor ecosystem.

Detected Incidents Draft Data

  1. Alleged offering of premium SMTP services for bulk email delivery
    Category: Initial Access
    Content: Threat actor allegedly offers premium SMTP inbox services capable of sending 25,000 emails per day across all domains with dedicated IP and instant setup, likely for spam or phishing campaigns.
    Date: 2026-04-13T23:56:51Z
    Network: openweb
    Published URL: https://breached.st/threads/high-voltage-premium-smtp-inbox-25k-day-all-domains-dedicated-ip-instant-setup.85989/unread
    Screenshots:
    None
    Threat Actors: Skybat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Alleged offering of email and SMS sending services
    Category: Initial Access
    Content: Threat actor Skybat advertises email sender services for all domains and worldwide SMS sender package through Telegram contact. The offering suggests potential spam/phishing infrastructure services.
    Date: 2026-04-13T23:56:18Z
    Network: openweb
    Published URL: https://breached.st/threads/high-voltage-email-sender-inbox-all-domains-sms-sender-worldwide-package.85990/unread
    Screenshots:
    None
    Threat Actors: Skybat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged sale of credential stuffing tools and custom offensive security tooling by Yoshi Data
    Category: Malware
    Content: A threat actor operating under the handle Yoshi Data is advertising a suite of offensive tools and services including SilverBullet, OpenBullet, Python scripts, WPower, CC+, executable files, and various config formats (.ice, .opk, .svb, .spk). The offering also includes custom software development, automation scripts, advanced security testing, API integration, and cloud infrastructure services. The emphasis on stealth, precision, performance and the breadth of credential stuffing tools suggests this is a cybercriminal marketplace offering.
    Date: 2026-04-13T23:53:05Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62111
    Screenshots:
    None
    Threat Actors: Yoshi Data
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged data leak of Tshirtmakers.it customer database
    Category: Data Leak
    Content: A database dump allegedly containing 13,000 customer records from tshirtmakers.it was shared on a cybercrime forum. The leaked data includes customer IDs, VAT numbers, client codes, email addresses, names, company information, and registration dates.
    Date: 2026-04-13T23:51:46Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-tshirtmakers-it-13k–188208
    Screenshots:
    None
    Threat Actors: nest0r
    Victim Country: Italy
    Victim Industry: E-commerce
    Victim Organization: Tshirtmakers
    Victim Site: tshirtmakers.it
  5. Alleged data breach of Building Detroit organization
    Category: Data Breach
    Content: A threat actor named nest0r has made available a database dump from buildingdetroit.org containing 185,000 records of USA-based users. The leaked data includes email addresses, registration dates, birth dates, names, genders, hashed passwords, and usernames.
    Date: 2026-04-13T23:51:26Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-buildingdetroit-org-185k-usa
    Screenshots:
    None
    Threat Actors: nest0r
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Building Detroit
    Victim Site: buildingdetroit.org
  6. Alleged sale of credential stuffing tools and hacking services by Yoshi Data
    Category: Malware
    Content: A threat actor operating as Yoshi Data is advertising a suite of offensive security and cybercrime tools including SilverBullet, OpenBullet, Python scripts, WPower, and other credential stuffing/automation tools. The actor also offers custom software development, advanced security testing, TLS/SSL systems, and cloud infrastructure services, likely as cover for illicit operations.
    Date: 2026-04-13T23:31:45Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62085
    Screenshots:
    None
    Threat Actors: Yoshi Data
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged sale of mail account access and credential combos across multiple countries by D4RCK MAGICIAN
    Category: Initial Access
    Content: A threat actor operating under the handle @D4RCKMAGICIAN is advertising mail account access for sale across 10 countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs/scripts, tools, credential hits/combos, and accepts custom requests. This appears to be an ongoing credential access and initial access brokering operation.
    Date: 2026-04-13T23:30:34Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62081
    Screenshots:
    None
    Threat Actors: D4RCK MAGICIAN
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data leak of Académie dAix-Marseille database
    Category: Data Leak
    Content: Threat actor ChimeraZ leaked a database containing 4,593 records from the French educational institution Académie dAix-Marseille. The leaked data includes employee information with email addresses, phone numbers, and office locations in JSONL format distributed via multiple file-sharing platforms.
    Date: 2026-04-13T23:26:38Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-4-5K-Ac-aix-marseille-fr
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Académie dAix-Marseille
    Victim Site: ac-aix-marseille.fr
  9. Website defacement of Wonjala E-mart by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Wonjala E-mart e-commerce website on April 14, 2026. The attack targeted a Nepalese retail companys online platform.
    Date: 2026-04-13T23:20:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832569
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Retail/E-commerce
    Victim Organization: Wonjala E-mart
    Victim Site: wonjalaemart.com.np
  10. Alleged sale of payment card data and financial transfer services
    Category: Data Breach
    Content: Threat actor claims to sell fresh payment card data including CC/CVV information and offers various financial transfer services through Cash App, PayPal, crypto, and Apple Pay with replacement guarantees for non-working cards.
    Date: 2026-04-13T23:06:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9C%85Hello-y%E2%80%99all-I-sell-fresh-cardsworking-100-Valid-working-on-any-Websites-or-Apps–200352
    Screenshots:
    None
    Threat Actors: petac
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 952,361 email and password combinations allegedly targeting German users with .de domain addresses. The data is being distributed for free via a file sharing service.
    Date: 2026-04-13T23:06:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72011/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged sale of cybercrime tools and credential stuffing services by Yoshi Data
    Category: Malware
    Content: A threat actor operating as Yoshi Data is advertising a suite of offensive cybercrime tools and services including SilverBullet, OpenBullet, Python scripts, WPower, CC+ tools, and custom executable development. Services include automation scripts, advanced security testing, and stealth-focused tooling for Kali Linux and Windows environments. Contact is via @Yoshi_Data on Telegram.
    Date: 2026-04-13T22:47:59Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62053
    Screenshots:
    None
    Threat Actors: Yoshi Data
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged distribution of Discord Nitro checking tool for credential validation
    Category: Initial Access
    Content: A threat actor shared a multi-threaded tool called Discord Nitro Checker by ManiacX0 designed for processing large code lists to validate Discord Nitro gift codes. The tool features real-time logging and high-speed bulk processing capabilities for automated validation workflows.
    Date: 2026-04-13T22:44:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Discord-Nitro-Checker-by-ManiacX0–200347
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Gaming/Communication
    Victim Organization: Discord
    Victim Site: discord.com
  14. Alleged distribution of Crunchyroll credential checking tool
    Category: Initial Access
    Content: A threat actor distributed a console-based tool called Weeber Crunchyroll Checker designed to process credential lists against Crunchyroll accounts. The tool features real-time output and is designed for fast processing of combo-style credential datasets to potentially gain unauthorized access to streaming accounts.
    Date: 2026-04-13T22:44:40Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Weeber-Crunchyroll-Checker-by-Soud–200348
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Crunchyroll
    Victim Site: crunchyroll.com
  15. Alleged leak of mixed email provider credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 120,000 email and password combinations from various providers including AOL, Yahoo, Hotmail, and Outlook across multiple countries. The actor also advertises selling additional credential lists via Telegram.
    Date: 2026-04-13T22:44:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72008/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Alleged leak of credentials combolist containing 5,502 records
    Category: Combo List
    Content: Threat actor NEW_DAISYCLOUD shared a password-protected archive containing 5,502 credential logs via file sharing service. The data is described as fresh logs dated April 13th and made available for free download on a cracking forum.
    Date: 2026-04-13T22:44:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72009/
    Screenshots:
    None
    Threat Actors: NEW_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged distribution of cracked Sherlock investigation software
    Category: Data Leak
    Content: Forum post advertising free download of cracked FlyPaper Sherlock 3.5.0 investigation software with detailed feature descriptions and capabilities.
    Date: 2026-04-13T22:43:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72007/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software/Technology
    Victim Organization: FlyPaper
    Victim Site: Unknown
  18. Alleged leak of stealer logs containing credentials
    Category: Logs
    Content: Threat actor UP_DAISYCLOUD distributed 5,502 fresh stealer logs dated April 13th via file sharing platform, advertising daily uploads of stolen credentials through Telegram channel.
    Date: 2026-04-13T22:43:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5502-LOGS-CLOUD-%E2%98%81-13-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged Data Breach and Extortion of RockStar Games by ShinyHunters via Third-Party Vendor Anodot
    Category: Data Breach
    Content: The ShinyHunters extortion group reportedly compromised RockStar Games through a third-party analytics vendor, Anodot, stealing business metrics and financial records. ShinyHunters demanded $200,000 or threatened to leak the data. RockStar Games declined to pay, as the stolen data was anonymized financial/sales records (no customer PII). The leaked data includes regional sales figures, pricing models, support ticket metrics, and in-game purchase data — all anonymized. The leak was subsequently published after RockStar refused to pay the ransom.
    Date: 2026-04-13T22:25:28Z
    Network: telegram
    Published URL: https://t.me/vxunderground/8708
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: RockStar Games
    Victim Site: Unknown
  20. Alleged sale of Binance credentials and government email access
    Category: Data Breach
    Content: Threat actor is selling 23 Binance account credentials (email and password) for $8, claiming each account contains minimum $11 in cryptocurrency. Also offering Google Voice accounts for $3 and government email access for $5-100.
    Date: 2026-04-13T22:23:06Z
    Network: openweb
    Published URL: https://breached.st/threads/selling-binance-data-google-voice-cheap.85988/unread
    Screenshots:
    None
    Threat Actors: superduper1
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Binance
    Victim Site: binance.com
  21. Alleged distribution of credential combolist targeting multiple streaming and gaming platforms
    Category: Combo List
    Content: Threat actor Ra-Zi distributed a combolist containing 120,000 email-password combinations allegedly targeting Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify accounts. The actor also advertises selling additional credential lists through Telegram contact.
    Date: 2026-04-13T22:21:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-120k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–200345
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Multiple platforms
    Victim Site: Unknown
  22. Alleged distribution of cracked Site Modeller Pro 2026 software
    Category: Initial Access
    Content: Forum post distributing cracked version of Site Modeller Pro 2026, a professional terrain design software developed by Digi-Ants for civil engineers and site designers.
    Date: 2026-04-13T22:21:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72002/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: Digi-Ants
    Victim Site: Unknown
  23. Alleged leak of Hotmail and Outlook credentials
    Category: Combo List
    Content: Forum user distributed a combolist containing 1,428 Hotmail and Outlook email credentials as a free download.
    Date: 2026-04-13T22:21:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72004/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  24. Alleged distribution of Domain Hunter Gatherer Pro cracking software
    Category: Initial Access
    Content: Forum post distributing cracked version of Domain Hunter Gatherer Pro 3.5, a commercial domain research and SEO software tool. The software is being made available for free download on a cracking forum.
    Date: 2026-04-13T22:21:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72003/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged Sale of 7373 Government Email Credentials from Brazil and Zambia (Police, Military, Prison Admin)
    Category: Initial Access
    Content: ShinyHunters is offering for sale 7,373 alleged government email login credentials from Brazil and Zambia, claiming 80% validity. The affected sectors include Police, Military, and Prison Administration. The seller states the price is negotiable via DM and accepts escrow. Contact handle: @wattacalller.
    Date: 2026-04-13T22:14:58Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1158
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged Sale of 73K Government Email Credentials from Brazil and Zambia by ShinyHunters
    Category: Initial Access
    Content: ShinyHunters is offering for sale a set of approximately 73,000 government email credentials claimed to be 80% valid logins. The data allegedly covers government entities in Brazil and Zambia, including police, military, and prison administration. The seller states the price is negotiable and accepts escrow. Contact via Telegram handle @wattacalller.
    Date: 2026-04-13T22:11:07Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1157
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Brazil, Zambia
    Victim Industry: Government
    Victim Organization: Government Entities (Police, Military, Prison Administration)
    Victim Site: Unknown
  27. Alleged distribution of cracked CAD software tools
    Category: Data Leak
    Content: Forum post distributing cracked versions of Digi-Ants Block Attribute Editor and PDF Publisher CAD software tools for free download.
    Date: 2026-04-13T21:58:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72000/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: Digi-Ants
    Victim Site: Unknown
  28. Alleged distribution of cracked Sheet Set Revision Manager 2.3.0 CAD software
    Category: Data Leak
    Content: Forum post offering free download of cracked Sheet Set Revision Manager 2.3.0 CAD management software with detailed feature descriptions and usage instructions.
    Date: 2026-04-13T21:57:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72001/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged data breach of Zmuth.com
    Category: Data Breach
    Content: Zmuth.com, a digital marketing and online business services website, allegedly suffered a data breach in April 2026. The leaked data reportedly includes emails, phone numbers, physical addresses, WhatsApp IDs, and WhatsApp message logs totaling approximately 40,000 records.
    Date: 2026-04-13T21:56:51Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-ro-%C2%A0-Zmuth-com
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Unknown
    Victim Industry: Digital Marketing
    Victim Organization: Zmuth
    Victim Site: zmuth.com
  30. Alleged leak of Hotmail credentials combolist
    Category: Logs
    Content: A threat actor shared a combolist containing 30,000 allegedly fresh Hotmail email and password combinations on an underground forum.
    Date: 2026-04-13T21:48:49Z
    Network: openweb
    Published URL: https://xforums.st/threads/30-000-hotmail-fresh-combolist.606885/
    Screenshots:
    None
    Threat Actors: VegaMoon
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  31. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a list containing 6,623 Hotmail email and password combinations on a cybercrime forum. The credentials are described as fresh, suggesting they may be recently obtained or validated.
    Date: 2026-04-13T21:35:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71999/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  32. Alleged data breach of 247falcon.ro Romanian database
    Category: Data Breach
    Content: Threat actor fent888 is allegedly selling a Romanian database from 247falcon.ro containing 23,782 records with personal information including names, phone numbers, addresses, and postal codes for $100.
    Date: 2026-04-13T21:34:20Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-247falcon-ro-23-7k
    Screenshots:
    None
    Threat Actors: fent888
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: 247falcon.ro
    Victim Site: 247falcon.ro
  33. Alleged leak of French credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.4 million email and password combinations allegedly from French sources, dated April 13, 2026. The credentials are being distributed through a hidden content section and promoted via Telegram channel.
    Date: 2026-04-13T21:15:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-1-482-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-France-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged sale of stolen credit cards via Telegram
    Category: Cyber Attack
    Content: User Coleman is advertising what appears to be stolen or fraudulent credit cards (CC), claiming 24/7 availability, 100% validity, and high balances. The seller is directing buyers to the Telegram channel t.me/genhaosan123.
    Date: 2026-04-13T21:13:50Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62002
    Screenshots:
    None
    Threat Actors: Coleman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: t.me/genhaosan123
  35. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 547,000 credential pairs allegedly from German sources. The credentials are branded as Elite_Cloud1 and dated April 13, 2026.
    Date: 2026-04-13T21:13:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-NUM-PASS-%E2%9C%AA-547-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Germany-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged leak of Indian credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 246,000 email and password combinations allegedly from Indian sources. The credentials are claimed to be fresh and high quality, distributed through a hidden content section requiring forum registration.
    Date: 2026-04-13T21:12:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-246-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-India-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Alleged leak of Indonesian credential combolist
    Category: Combo List
    Content: Threat actor shared a credential combolist containing over 246,000 email and password combinations allegedly from Indonesian sources. The data is described as fresh and high quality, with additional resources available through a Telegram channel.
    Date: 2026-04-13T21:11:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-246-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Indonesia-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged sale of mail access, combolists, and cracking tools across multiple countries
    Category: Initial Access
    Content: A threat actor operating as D4RCK MAGICIAN is advertising mail access for sale across multiple countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs/scripts, tools, credential hits/combos, and custom requests. Contact is via Telegram handle @D4RCKMAGICIAN.
    Date: 2026-04-13T21:10:37Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62025
    Screenshots:
    None
    Threat Actors: D4RCK MAGICIAN
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Alleged leak of Hungarian credentials combolist
    Category: Combo List
    Content: Threat actor shared a credential list containing over 135,000 email and password combinations allegedly from Hungary. The combolist is described as fresh and high quality.
    Date: 2026-04-13T21:10:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-135-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Hungary-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Hungary
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged leak of Greek credentials combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing over 63,000 email:password combinations allegedly from Greek users. The credential list is described as fresh and high quality, with access provided through hidden content requiring forum registration.
    Date: 2026-04-13T21:10:01Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-63-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Greece-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Greece
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged leak of Finnish credentials combolist
    Category: Combo List
    Content: A threat actor shared a credential list containing over 12,000 email and password combinations allegedly from Finland. The combolist is described as fresh and high quality and was made available for free download.
    Date: 2026-04-13T21:09:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-12-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Finland-%E2%9C%AA-13-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Finland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged sale of compromised email accounts and web hosting access
    Category: Initial Access
    Content: Threat actor advertises various compromised email accounts including Office 365, webmail services, and hacked web hosting access including cPanel shells and SMTP servers through Telegram channel.
    Date: 2026-04-13T21:08:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71998/
    Screenshots:
    None
    Threat Actors: asfshe224
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alleged data leak of Adobe database
    Category: Data Leak
    Content: A threat actor shared a 2.93 GB Adobe database file for free download, claiming it is a repost from old breach forums. The file is being distributed through AnonFiles without any specified cost.
    Date: 2026-04-13T20:47:40Z
    Network: openweb
    Published URL: https://breached.st/threads/database-adobe-2025.85985/unread
    Screenshots:
    None
    Threat Actors: Niwa62
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Adobe
    Victim Site: adobe.com
  44. Alleged sale of mail access, combolists, and cracking tools across multiple countries
    Category: Initial Access
    Content: A threat actor operating as D4RCK (@D4RCKMAGICIAN) is advertising mail access for accounts across France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs/scripts, cracking tools, credential hits/combos, with custom requests available. Contact is via Telegram handle @D4RCKMAGICIAN.
    Date: 2026-04-13T20:46:04Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62005
    Screenshots:
    None
    Threat Actors: D4RCK
    Victim Country: Unknown
    Victim Industry: Multiple / Email Providers
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Alleged leak of German credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.15 million credential pairs targeting German users through a file sharing platform.
    Date: 2026-04-13T20:45:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71997/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Alleged data breach claims by ShinyHunters threat actor targeting multiple major corporations
    Category: Data Breach
    Content: The threat actor known as ShinyHunters posted contact verification details including a new PGP key, Telegram handle (@shinyc0rpsss), email, Tox ID, and Session ID. They claim to possess data from numerous high-profile organizations including Salesforce, Cisco, AT&T, Ticketmaster, Microsoft, Google, Victorias Secret, CrowdStrike, and Santander. The actor also warns against impersonators (Mattys Savoie & James) who allegedly misused their PGP key for ransom purposes.
    Date: 2026-04-13T20:39:49Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6773
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Multiple – Technology, Telecommunications, Retail, Financial Services, Cybersecurity
    Victim Organization: Salesforce, Cisco, AT&T, Ticketmaster, Microsoft, Google, Victorias Secret, CrowdStrike, Santander
    Victim Site: Unknown
  47. Alleged data breach of Rockstar Games exposing internal sales transaction records
    Category: Data Breach
    Content: Threat actor ShinyHunters has posted what appears to be internal Rockstar Games sales transaction data, including first and last documented sales records, total earnings of over $5 billion across a decade (2014-2024), platform details (Xbox One, Xbox Series X), regional breakdowns (Asia, EMEA, North America), and individual purchase amounts including a single transaction of over $1 million. The data appears to reference GTA V / GTA Online in-game currency (Shark Card) purchases such as Megalodon packages.
    Date: 2026-04-13T20:39:34Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1151
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: Unknown
  48. Alleged leak of German email credentials
    Category: Logs
    Content: A threat actor allegedly leaked 54,000 German email credentials with full access. The credentials are described as valid and specifically target German users.
    Date: 2026-04-13T20:36:42Z
    Network: openweb
    Published URL: https://xforums.st/threads/54k-germany-full-valid-mail-access-13-04.606880/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged leak of US email credentials
    Category: Logs
    Content: A threat actor shared a combolist containing 2,600 allegedly valid US email credentials on an underground forum. The credentials are claimed to be of top quality and dated April 13th.
    Date: 2026-04-13T20:36:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/2-6k-usa-full-valid-mail-access-top-quality-13-04.606881/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged mass data breach claims by ShinyHunters targeting multiple major corporations
    Category: Data Breach
    Content: The ShinyHunters threat actor group is claiming to possess data from numerous high-profile organizations including Salesforce, Cisco, AT&T, Ticketmaster, Microsoft, Google, Victorias Secret, CrowdStrike, and Santander. No specific details, samples, or pricing were provided. The post includes a photo attachment and a humorous disclaimer distancing the group from government affiliation.
    Date: 2026-04-13T20:31:57Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1145
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology, Telecommunications, Financial Services, Retail
    Victim Organization: Salesforce, Cisco, AT&T, Ticketmaster, Microsoft, Google, Victorias Secret, CrowdStrike, Santander
    Victim Site: Unknown
  51. Alleged Sale of Salesforce Complete Ecosystem Access and Stolen Data by ShinyHunters
    Category: Data Breach
    Content: ShinyHunters is advertising multiple tiers of stolen data and system access for sale. Offerings include: a Files Cloud with 9.1M files from Salesforce databases (2024-2026) priced at $10,000 lifetime; a ransom database with 1M files at $5,000 lifetime; a Whale Private collection of 3.39 billion files from CDN/RF/BF sources at $3,000 lifetime; and a claimed full Salesforce ecosystem access including VPN, server, backend, and source code priced at $25M. The actor also claims possession of 3M+ Cisco source code files. The post includes a PGP key for verification, onion DLS link, and contact details via Telegram, email, Tox, and Session. The actor warns against impersonators misusing their PGP key.
    Date: 2026-04-13T20:23:32Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1137
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology / Cloud Services
    Victim Organization: Salesforce
    Victim Site: salesforce.com
  52. Alleged Sale of Full Access to Salesforce Complete Ecosystem by ShinyHunters
    Category: Initial Access
    Content: Threat actor ShinyHunters is claiming to have full access to the entire Salesforce ecosystem, including all major cloud products (Sales Cloud, Service Cloud, Marketing Cloud, Commerce Cloud, etc.), platform tools, AI/automation systems, integrations, and source code. The actor claims VPN/server access, backend access, and source code, offering everything for $25 million. Contact is provided via Session, Telegram (@shinyc0rpsss), email ([email protected]), and Tox. A PGP key is referenced via Pastebin for identity verification.
    Date: 2026-04-13T20:23:14Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6783
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology / SaaS / CRM
    Victim Organization: Salesforce
    Victim Site: salesforce.com
  53. Alleged Sale of Stolen Data Collections by ShinyHunters Including Salesforce Databases and Ransom Files
    Category: Data Breach
    Content: The threat actor ShinyHunters is advertising multiple data collections for sale via Telegram: (1) ShinyHunters Files Cloud containing 9,133,199 files described as Salesforce databases from 2024-2026 for $10,000 lifetime access; (2) a Pay or leaks ransom database with 1,029,903 files for $5,000 lifetime access; (3) a Whale private collection of 3,390,419,199 files from various CDN/RF/BF sources for $3,000 lifetime access. The post also references a scattered LAPSUS$ hunters part 9 channel containing 3M+ Cisco source code. The actor provides a PGP key, Telegram handle (@shinyc0rpsss), email, Tox ID, Session ID, and a dark web DLS onion link.
    Date: 2026-04-13T20:07:43Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6776
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology, Multiple Sectors
    Victim Organization: Salesforce, Cisco (among others)
    Victim Site: Unknown
  54. Alleged Sale of Stolen Data Collections by ShinyHunters Including Salesforce Databases and Cisco Source Code
    Category: Data Breach
    Content: The ShinyHunters threat actor is advertising multiple paid Telegram-based data repositories: (1) ShinyHunters Files Cloud containing 9.1M+ files of Salesforce databases from 2024-2026 for $10,000 lifetime access; (2) Pay or leaks ransom database with 1M+ files for $5,000 lifetime access; (3) Whale private collection of 3.39 billion files from various countries and companies (CDN/RF/BF) for $3,000 lifetime access. Additionally references a scattered LAPSUS$ hunters part 9 channel containing 3M+ Cisco source code files. An onion DLS link is also provided.
    Date: 2026-04-13T20:04:30Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1130
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Salesforce, Cisco
    Victim Site: Unknown
  55. Alleged data breach of OfferteCartucce
    Category: Data Breach
    Content: Italian e-commerce company OfferteCartucce allegedly suffered a data breach in January 2026 exposing 229,000 users personal information including billing details, names, phone numbers, and email addresses. The breach was allegedly conducted by threat actor @888.
    Date: 2026-04-13T20:03:41Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-offertecartucce-com
    Screenshots:
    None
    Threat Actors: [Mod] Tanaka
    Victim Country: Italy
    Victim Industry: E-commerce
    Victim Organization: OfferteCartucce
    Victim Site: offertecartucce.com
  56. Alleged leak of mixed email credential data
    Category: Combo List
    Content: A threat actor shared a combolist containing 81,000 mixed email credentials through a free download link on a cybercrime forum.
    Date: 2026-04-13T19:59:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71991/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 81,000 mixed email credentials via a file sharing service. The credentials appear to be from various sources and are being distributed for free download.
    Date: 2026-04-13T19:59:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71992/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged leak of email credential combolists via PandaCloud service
    Category: Combo List
    Content: Threat actor Kokos2846q is distributing free email credential combolists through a Telegram channel called PandaCloud, claiming to add fresh databases daily with only relevant and latest data.
    Date: 2026-04-13T19:59:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71993/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged ShinyHunters Threat Actor Contact and PGP Key Verification Post
    Category: Cyber Attack
    Content: The threat actor known as ShinyHunters has posted their official contact details including a new PGP key (hosted on Pastebin), Telegram handle (@shinyc0rpsss), email ([email protected]), Tox ID, and Session ID. The post warns followers not to be deceived by individuals named Mattys Savoie & James who allegedly misused their PGP key for ransom purposes. This appears to be an identity verification and continuity post amid concerns of account/channel blocking.
    Date: 2026-04-13T19:58:29Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1129
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged leak of Minecraft game databases
    Category: Data Leak
    Content: Threat actor australia shared 1,000 Minecraft-related database dumps for free download on cybercrime forum. The databases appear to contain game-related data from various Minecraft servers or services.
    Date: 2026-04-13T19:57:40Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-1k-Minecraft-dbs
    Screenshots:
    None
    Threat Actors: australia
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged Ransomware Extortion and Data Leak of Rockstar Games by ShinyHunters
    Category: Data Leak
    Content: The ShinyHunters threat group claims to have compromised Rockstar Games Snowflake instances via SaaS integrator Anodot.com, exfiltrating 78.6M+ records. The group issued a final warning demanding $200,000 USD by April 14, 2026. After Rockstar allegedly refused to pay, ShinyHunters published the stolen data via a direct download link (http://91.215.85.22/pay_or_leak/shouldve_paid_the_ransom_rockstar_shinyhunters.7z). The group also claims to hold data from AT&T ($100k), TicketMaster ($75k), and multiple Salesforce datasets valued at $500k–$1M. The attack has been confirmed by Rockstar Games per Heise reporting. ShinyHunters provided PGP key, Telegram, email, Tox, and Session IDs for contact.
    Date: 2026-04-13T19:51:39Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6766
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: rockstargames.com
  62. Alleged Data Breach and Leak of Rockstar Games Snowflake Data by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have compromised Rockstar Games Snowflake instances, allegedly obtaining 78.6M+ total records. The actor issued a pay or leak ultimatum with a deadline of April 14, 2026. Following apparent non-payment, ShinyHunters published a download link (http://91.215.85.22/pay_or_leak/shouldve_paid_the_ransom_rockstar_shinyhunters.7z) containing the alleged stolen data. The actor references Anodot.com as the SaaS integrator breach vector and expresses anger at Rockstar Games for dismissing the datas significance.
    Date: 2026-04-13T19:51:31Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1123
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: Unknown
  63. Alleged data breach of Bila Tserkva City Council (Ukraine)
    Category: Data Breach
    Content: A threat actor operating under the handle Перун Сварога (Perun Svaroga) claims to have obtained a database from the Bila Tserkva City Council of Kyiv Oblast, Ukraine (bc-rada.gov.ua). The post describes it as a small database with data current as of April 2026. The content is being shared/distributed via the Telegram channel.
    Date: 2026-04-13T19:47:26Z
    Network: telegram
    Published URL: https://t.me/c/2453363811/1336
    Screenshots:
    None
    Threat Actors: Перун Сварога
    Victim Country: Ukraine
    Victim Industry: Government
    Victim Organization: Bila Tserkva City Council
    Victim Site: bc-rada.gov.ua
  64. Alleged sale of multi-platform combolists, cookies, and logs
    Category: Logs
    Content: A threat actor is offering to sell (WTS) a wide range of credential combos, cookies, and stealer logs covering email providers (Hotmail, Comcast, Gmail, Yahoo, AOL), social media (Facebook, Instagram, Badoo, LinkedIn, TikTok), streaming services (Netflix, Disney), e-commerce platforms (Amazon, eBay, Shein, Vinted, Poshmark), financial services (PayPal), gaming (PSN, Xbox, Steam, Roblox), and travel/booking platforms (Airbnb, Booking, Aircanada, Marriott).
    Date: 2026-04-13T19:35:37Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61974
    Screenshots:
    None
    Threat Actors: tuzelity
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a file containing 12.4k Hotmail email credentials through a free download link on a cybercrime forum.
    Date: 2026-04-13T19:33:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71990/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  66. Alleged sharing of credential databases and remote access collaboration
    Category: Initial Access
    Content: Threat actor offers access to desktop containing databases with over 90GB of email and password credentials through remote access software, seeking collaboration for profit sharing rather than direct sale.
    Date: 2026-04-13T19:33:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71989/
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged leak of 117,000 email credentials
    Category: Logs
    Content: A threat actor shared a credential list containing 117,000 email access credentials on an underground forum. The post was made in a section dedicated to mail access and combolists, indicating the leaked data consists of email login credentials.
    Date: 2026-04-13T19:23:16Z
    Network: openweb
    Published URL: https://xforums.st/threads/117k-mail-access-good-list.606872/
    Screenshots:
    None
    Threat Actors: Cir4Dk
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged Sale of Multiple High-Profile Data Breaches by ShinyHunters (Rockstar, AT&T, TicketMaster, Salesforce)
    Category: Data Breach
    Content: The threat actor group ShinyHunters is advertising the sale of multiple stolen datasets including Rockstar Games data ($200,000 USD), AT&T data ($100,000 USD), TicketMaster data ($75,000 USD), and multiple Salesforce datasets priced between $500,000–$1,000,000 USD. The actor claims the data has not been previously posted on any channel or dark web blog. Contact details including a PGP key, Telegram handle (@shinyc0rpsss), email ([email protected]), Tox ID, and Session ID are provided. The post also warns against impersonators Mattys Savoie & James who allegedly misused their PGP key.
    Date: 2026-04-13T19:21:15Z
    Network: telegram
    Published URL: https://t.me/shinyhuntersoff/67
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Entertainment, Telecommunications, Ticketing, Technology
    Victim Organization: Rockstar Games, AT&T, TicketMaster, Salesforce
    Victim Site: Unknown
  69. Alleged Cyber Threat Against Rockstar Games by ShinyHunters
    Category: Cyber Attack
    Content: Threat actor ShinyHunters posted a threatening message directed at Rockstar Games, stating GOODBYEE ROCKSTAR SHITT, implying a retaliatory cyber attack or data leak is imminent following an apparent dispute.
    Date: 2026-04-13T19:20:50Z
    Network: telegram
    Published URL: https://t.me/shinyhuntersoff/68
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: Unknown
  70. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 117,000 email and password combinations on a cybercriminal forum. The credentials are described as a good list for mail access.
    Date: 2026-04-13T19:07:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-117k-Mail-Access-Good-List
    Screenshots:
    None
    Threat Actors: Razly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. 117k Mail Access Good List
    Category: Combo List
    Content: New thread posted by Cir4d: 117k Mail Access Good List
    Date: 2026-04-13T19:06:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71988/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Mass defacement campaign targeting Glow Store Argentina by maw3six
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting the Glow Store e-commerce website in Argentina. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-13T18:57:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248467
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Argentina
    Victim Industry: Retail/E-commerce
    Victim Organization: Glow Store
    Victim Site: glow-store.com.ar
  73. Website defacement of thinglo.com by maw3six
    Category: Defacement
    Content: Individual attacker maw3six defaced the website thinglo.com on April 13, 2026. The incident was archived as a single-page defacement with no identified team affiliation.
    Date: 2026-04-13T18:57:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248468
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thinglo.com
  74. Mass defacement campaign against panduwarta.com by Irene (XmrAnonye.id team)
    Category: Defacement
    Content: Indonesian news website panduwarta.com was defaced by attacker Irene from the XmrAnonye.id team as part of a mass defacement campaign. This incident represents a redefacement of a previously compromised target running on Linux infrastructure.
    Date: 2026-04-13T18:57:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248469
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Indonesia
    Victim Industry: Media/News
    Victim Organization: Pandu Warta
    Victim Site: panduwarta.com
  75. Mass defacement campaign by maw3six targeting batavia.biz.id
    Category: Defacement
    Content: Indonesian business website batavia.biz.id was defaced by attacker maw3six as part of a mass defacement campaign on April 13, 2026. The attack targeted a specific page rather than the homepage and appears to be part of a broader coordinated defacement operation.
    Date: 2026-04-13T18:57:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248470
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Indonesia
    Victim Industry: Business/Commercial
    Victim Organization: Batavia
    Victim Site: batavia.biz.id
  76. Mass defacement campaign by maw3six targeting Senegalese government infrastructure
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the ggis.sn domain on April 13, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single website.
    Date: 2026-04-13T18:56:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248471
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Senegal
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: ggis.sn
  77. Mass website defacement campaign by maw3six targeting South African technology company
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement attack against SnapTech, a South African technology company, on April 14, 2026. The attack was part of a broader mass defacement campaign rather than a targeted single-site attack.
    Date: 2026-04-13T18:56:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248473
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: South Africa
    Victim Industry: Technology
    Victim Organization: SnapTech
    Victim Site: snaptech.co.za
  78. Website defacement of Upturn Studio by maw3six
    Category: Defacement
    Content: The attacker maw3six defaced a specific page on the Upturn Studio website on April 13, 2026. The defacement targeted a single page rather than the homepage and was hosted on cloud infrastructure.
    Date: 2026-04-13T18:56:43Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248472
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Australia
    Victim Industry: Creative Services
    Victim Organization: Upturn Studio
    Victim Site: upturnstudio.com.au
  79. Website defacement of mywidecareers.com by maw3six
    Category: Defacement
    Content: The career services website mywidecareers.com was defaced by the attacker maw3six on April 14, 2026. The defacement targeted a specific page (maw.html) on the Linux-hosted website.
    Date: 2026-04-13T18:56:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248474
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Career Services
    Victim Organization: My Wide Careers
    Victim Site: mywidecareers.com
  80. Mass website defacement by maw3six targeting nepalbrokers.com
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting nepalbrokers.com on April 14, 2026. The attack was part of a broader mass defacement operation affecting multiple websites running on Linux systems.
    Date: 2026-04-13T18:56:34Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248482
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Financial Services
    Victim Organization: Nepal Brokers
    Victim Site: nepalbrokers.com
  81. Mass defacement targeting educational institutions by maw3six
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting educational examination systems. The attack compromised multiple sites rather than a single target, indicating a broader campaign against educational infrastructure.
    Date: 2026-04-13T18:56:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248477
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: ubtexam.nepalaza.com
  82. Mass website defacement by maw3six targeting Nepalese domain
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting the Nepalese website ankhwari.com.np on April 14, 2026. The attack was part of a broader mass defacement campaign rather than targeting a single site.
    Date: 2026-04-13T18:56:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248486
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ankhwari.com.np
  83. Mass website defacement by maw3six targeting windowshopping.nepalaza.com
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting the windowshopping.nepalaza.com e-commerce platform. The incident occurred on April 14, 2026 and was part of a broader mass defacement campaign rather than a targeted attack.
    Date: 2026-04-13T18:56:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248476
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: E-commerce
    Victim Organization: Nepalaza
    Victim Site: windowshopping.nepalaza.com
  84. Mass website defacement by maw3six targeting shabdas.com.np
    Category: Defacement
    Content: The attacker maw3six conducted a mass defacement campaign targeting the website shabdas.com.np on April 14, 2026. This was part of a broader mass defacement operation rather than targeting the specific organization.
    Date: 2026-04-13T18:56:09Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248478
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: shabdas.com.np
  85. Mass website defacement campaign by maw3six targeting Nepalese transportation service
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the Sawari Sewa transportation service website in Nepal. The defacement was part of a broader mass defacement operation rather than a targeted individual attack.
    Date: 2026-04-13T18:56:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248479
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Transportation
    Victim Organization: Sawari Sewa
    Victim Site: sawarisewa.nepalaza.com
  86. Mass website defacement by maw3six targeting financial services
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the prototype website of Nepal Brokers, a financial services organization. The incident was part of a broader mass defacement operation rather than a targeted attack on the specific organization.
    Date: 2026-04-13T18:55:59Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248480
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Financial Services
    Victim Organization: Nepal Brokers
    Victim Site: prototype.nepalbrokers.com
  87. Mass defacement campaign by maw3six targeting sports organizations
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting the IndSports organization website on April 14, 2026. This was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-13T18:55:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248484
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: India
    Victim Industry: Sports
    Victim Organization: IndSports
    Victim Site: indisports.org
  88. Mass website defacement by maw3six targeting eecosolutions.co.uk
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting eecosolutions.co.uk on April 14, 2026. The attack was part of a broader mass defacement operation rather than a targeted assault on the environmental solutions company.
    Date: 2026-04-13T18:55:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248489
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: United Kingdom
    Victim Industry: Environmental Services
    Victim Organization: EECO Solutions
    Victim Site: eecosolutions.co.uk
  89. Mass website defacement by maw3six targeting telarcove.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting telarcove.com on April 14, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-13T18:55:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248488
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: telarcove.com
  90. Website defacement of telarapi.telarcove.com by maw3six
    Category: Defacement
    Content: Threat actor maw3six defaced the telarapi.telarcove.com website on April 14, 2026. The attack targeted a Linux-based server and was documented with a mirror archive for preservation.
    Date: 2026-04-13T18:55:39Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248487
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Telarcove
    Victim Site: telarapi.telarcove.com
  91. Mass defacement campaign by maw3six targeting multiple websites
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting multiple websites including jccr.sccdr.org on April 14, 2026. The attack affected a Linux-based server and was part of a broader mass defacement operation rather than a targeted attack on a specific organization.
    Date: 2026-04-13T18:55:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248493
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jccr.sccdr.org
  92. Mass website defacement campaign by maw3six targeting chimeemmanuel.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting chimeemmanuel.com on April 14, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a specific page.
    Date: 2026-04-13T18:55:26Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248491
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: chimeemmanuel.com
  93. 173.380 Lines ➡️ Shopping Target HQ Germany De Combolist
    Category: Combo List
    Content: New thread posted by HQcomboSpace: 173.380 Lines ➡️ Shopping Target HQ Germany De Combolist
    Date: 2026-04-13T18:47:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71984/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  94. 6K GOOD MIX COMBO MAIL ACCESS USA&POLAND
    Category: Combo List
    Content: New thread posted by karaokecloud: 6K GOOD MIX COMBO MAIL ACCESS USA&POLAND
    Date: 2026-04-13T18:46:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71987/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. PROXIESFOOD | UNLIMITED RESIDENTIAL PROXIES | 20$/DAY
    Category: Alert
    Content: New thread posted by ProxiesFood: PROXIESFOOD | UNLIMITED RESIDENTIAL PROXIES | 20$/DAY
    Date: 2026-04-13T18:46:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71985/
    Screenshots:
    None
    Threat Actors: ProxiesFood
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. SELLING VIDAECOR.COM.BR FULL SOURCE & DATABASE
    Category: Alert
    Content: New thread posted by shootinghouse: SELLING VIDAECOR.COM.BR FULL SOURCE & DATABASE
    Date: 2026-04-13T18:27:59Z
    Network: openweb
    Published URL: https://breached.st/threads/selling-vidaecor-com-br-full-source-database.85984/unread
    Screenshots:
    None
    Threat Actors: shootinghouse
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Mass website defacement by CyberOprationCulture targeting dreamsmarketplace.com subdomain
    Category: Defacement
    Content: The threat actor CAC./Ohang from the CyberOprationCulture team conducted a mass defacement attack targeting a WordPress subdomain of Dreams Marketplace. This appears to be part of a broader mass defacement campaign rather than a targeted attack on a specific organization.
    Date: 2026-04-13T18:21:42Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248494
    Screenshots:
    None
    Threat Actors: CAC./Ohang, CyberOprationCulture
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Dreams Marketplace
    Victim Site: listee-wp.dreamsmarketplace.com
  98. CAC./Ohang defaced listee-wp.dreamsmarketplace.com
    Category: Defacement
    Content: Target: https://listee-wp.dreamsmarketplace.com/Attacker: CAC./OhangTeam: CyberOprationCultureDate: 2026-04-14 01:10:46OS: CloudFlags: Mass Defacement (IP: 188.114.96.3)
    Date: 2026-04-13T18:16:05Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248494
    Screenshots:
    None
    Threat Actors: CAC./Ohang, CyberOprationCulture
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: listee-wp.dreamsmarketplace.com
  99. [x2563] HOTMAIL PRIVATE
    Category: Combo List
    Content: New thread posted by FlashCloud2: [x2563] HOTMAIL PRIVATE
    Date: 2026-04-13T18:05:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71982/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. ⭐️URL:LOG:PASS | 23.16 M | ✅ ULP.DAXUS.PRO | UHQ+⭐️
    Category: Logs
    Content: New thread posted by Daxus: ⭐️URL:LOG:PASS | 23.16 M | ✅ ULP.DAXUS.PRO | UHQ+⭐️
    Date: 2026-04-13T18:03:43Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-%E2%AD%90%EF%B8%8FURL-LOG-PASS-23-16-M-%E2%9C%85-ULP-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged sale of stolen credit cards via Telegram
    Category: Initial Access
    Content: A threat actor operating as Coleman is advertising stolen or fraudulent credit cards described as 100% alive with high balances, available 24/7. The seller is directing buyers to the Telegram channel t.me/genhaosan123.
    Date: 2026-04-13T17:50:18Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61899
    Screenshots:
    None
    Threat Actors: Coleman
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Ginlong (Solis)
    Category: Alert
    Content: New thread posted by s1ethx7z: Ginlong (Solis)
    Date: 2026-04-13T17:47:52Z
    Network: openweb
    Published URL: https://breached.st/threads/ginlong-solis.85982/unread
    Screenshots:
    None
    Threat Actors: s1ethx7z
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. 496 Mix valid
    Category: Combo List
    Content: New thread posted by satoshik1337: 496 Mix valid
    Date: 2026-04-13T17:46:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71979/
    Screenshots:
    None
    Threat Actors: satoshik1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. 496 Mix valid
    Category: Combo List
    Content: New thread posted by satoshik1337: 496 Mix valid
    Date: 2026-04-13T17:46:06Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-496-Mix-valid
    Screenshots:
    None
    Threat Actors: satoshik1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. ⚡⚡ 4719x PREMIUM MIX MAIL HITS⚡⚡
    Category: Combo List
    Content: New thread posted by alphaxdd: ⚡⚡ 4719x PREMIUM MIX MAIL HITS⚡⚡
    Date: 2026-04-13T17:45:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71980/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. ⚡⚡ 4719x PREMIUM MIX MAIL HITS⚡⚡
    Category: Combo List
    Content: New thread posted by alphaxdd: ⚡⚡ 4719x PREMIUM MIX MAIL HITS⚡⚡
    Date: 2026-04-13T17:45:40Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-4719x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. maw3six defaced chimeemmanuel.com
    Category: Defacement
    Content: Target: https://chimeemmanuel.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:32:27OS: LinuxFlags: Mass Defacement (IP: 198.187.31.225)
    Date: 2026-04-13T17:42:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248491
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: chimeemmanuel.com
  108. maw3six defaced jccr.sccdr.org
    Category: Defacement
    Content: Target: https://jccr.sccdr.org/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:32:30OS: LinuxFlags: Mass Defacement (IP: 198.187.31.225)
    Date: 2026-04-13T17:41:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248493
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jccr.sccdr.org
  109. Mass defacement of ecrschools.com by maw3six
    Category: Defacement
    Content: On April 14, 2026, threat actor maw3six conducted a mass defacement attack targeting ecrschools.com, an educational organizations website. The attack was not a home page defacement but affected multiple pages across the site.
    Date: 2026-04-13T17:40:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248490
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: ECR Schools
    Victim Site: ecrschools.com
  110. maw3six defaced telarapi.telarcove.com
    Category: Defacement
    Content: Target: https://telarapi.telarcove.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:32:16OS: Linux
    Date: 2026-04-13T17:39:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248487
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: telarapi.telarcove.com
  111. maw3six defaced telarcove.com
    Category: Defacement
    Content: Target: https://telarcove.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:32:21OS: LinuxFlags: Mass Defacement (IP: 198.187.31.225)
    Date: 2026-04-13T17:38:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248488
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: telarcove.com
  112. Mass website defacement by maw3six targeting sccdr.org
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting sccdr.org on April 14, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-13T17:38:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248492
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sccdr.org
  113. maw3six defaced eecosolutions.co.uk
    Category: Defacement
    Content: Target: https://eecosolutions.co.uk/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:32:24OS: LinuxFlags: Mass Defacement (IP: 198.187.31.225)
    Date: 2026-04-13T17:36:59Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248489
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: eecosolutions.co.uk
  114. maw3six defaced indisports.org
    Category: Defacement
    Content: Target: https://indisports.org/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:12OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:31:05Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248484
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: indisports.org
  115. maw3six defaced prototype.nepalbrokers.com
    Category: Defacement
    Content: Target: https://prototype.nepalbrokers.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:06OS: LinuxFlags: Mass Defacement (IP: 188.114.96.3)
    Date: 2026-04-13T17:30:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248480
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: prototype.nepalbrokers.com
  116. maw3six defaced sawarisewa.nepalaza.com
    Category: Defacement
    Content: Target: https://sawarisewa.nepalaza.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:04OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:29:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248479
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sawarisewa.nepalaza.com
  117. maw3six defaced shabdas.com.np
    Category: Defacement
    Content: Target: https://shabdas.com.np/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:03OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:28:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248478
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: shabdas.com.np
  118. maw3six defaced windowshopping.nepalaza.com
    Category: Defacement
    Content: Target: https://windowshopping.nepalaza.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:19:59OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:27:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248476
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: windowshopping.nepalaza.com
  119. maw3six defaced ankhwari.com.np
    Category: Defacement
    Content: Target: https://ankhwari.com.np/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:15OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:26:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248486
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ankhwari.com.np
  120. maw3six defaced ubtexam.nepalaza.com
    Category: Defacement
    Content: Target: https://ubtexam.nepalaza.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:02OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:25:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248477
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ubtexam.nepalaza.com
  121. [705x] ⭐⭐ FRESH HQ HOTMAIL ⭐⭐
    Category: Combo List
    Content: New thread posted by KiwiShio: [705x] ⭐⭐ FRESH HQ HOTMAIL ⭐⭐
    Date: 2026-04-13T17:25:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-705x-%E2%AD%90%E2%AD%90-FRESH-HQ-HOTMAIL-%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  122. maw3six defaced nepalbrokers.com
    Category: Defacement
    Content: Target: https://nepalbrokers.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:20:09OS: LinuxFlags: Mass Defacement (IP: 188.114.97.3)
    Date: 2026-04-13T17:25:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248482
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: nepalbrokers.com
  123. Fresh Hotmail Only Full Valid PandaCloud
    Category: Combo List
    Content: New thread posted by Kokos2846q: Fresh Hotmail Only Full Valid PandaCloud
    Date: 2026-04-13T17:20:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71977/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Mass defacement targeting Nepalese vehicle service website by maw3six
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting a Nepalese vehicle service companys website. The incident was part of a broader mass defacement operation rather than a targeted attack on this specific organization.
    Date: 2026-04-13T17:19:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248475
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Nepal
    Victim Industry: Automotive Services
    Victim Organization: Raktakali Kavi Vehicle Service
    Victim Site: raktakalikavehicleservice.com.np
  125. maw3six defaced raktakalikavehicleservice.com.np
    Category: Defacement
    Content: Target: http://raktakalikavehicleservice.com.np/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:06:35OS: LinuxFlags: Mass Defacement (IP: 190.92.174.24)
    Date: 2026-04-13T17:13:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248475
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: raktakalikavehicleservice.com.np
  126. maw3six defaced mywidecareers.com
    Category: Defacement
    Content: Target: http://mywidecareers.com/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:02:05OS: Linux
    Date: 2026-04-13T17:11:47Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248474
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mywidecareers.com
  127. 135K HOTMAIL TARGETED COMBOLIST
    Category: Combo List
    Content: New thread posted by steeve75: 135K HOTMAIL TARGETED COMBOLIST
    Date: 2026-04-13T17:07:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71975/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. maw3six defaced upturnstudio.com.au
    Category: Defacement
    Content: Target: https://upturnstudio.com.au/maw.htmlAttacker: maw3sixDate: 2026-04-13 23:56:12OS: Cloud
    Date: 2026-04-13T17:04:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248472
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: upturnstudio.com.au
  129. maw3six defaced snaptech.co.za
    Category: Defacement
    Content: Target: https://snaptech.co.za/maw.htmlAttacker: maw3sixDate: 2026-04-14 00:00:09OS: CloudFlags: Mass Defacement (IP: 104.21.53.194)
    Date: 2026-04-13T17:02:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248473
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: snaptech.co.za
  130. maw3six defaced ggis.sn
    Category: Defacement
    Content: Target: http://ggis.sn/maw.htmlAttacker: maw3sixDate: 2026-04-13 23:54:46Flags: Mass Defacement (IP: 54.36.31.145)
    Date: 2026-04-13T16:56:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248471
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ggis.sn
  131. Alleged sale of fresh infostealer logs with credentials and cookies across multiple countries
    Category: Logs
    Content: A threat actor identified as BBB is selling fresh infostealer logs containing email:password combinations and cookies for accounts across multiple countries including UK, DE, JP, NL, BR, PL, ES, US, and IT. The logs include access to major platforms such as Amazon, eBay, OfferUp, PSN, Booking.com, Uber, Poshmark, Alibaba, Walmart, Mercari, Neosurf, and Kleinanzeigen. The seller claims to operate a private cloud with valid webmails and offers inbox keyword searching.
    Date: 2026-04-13T16:51:06Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61877
    Screenshots:
    None
    Threat Actors: BBB
    Victim Country: Unknown
    Victim Industry: E-Commerce / Consumer Services
    Victim Organization: Unknown
    Victim Site: Unknown
  132. maw3six defaced batavia.biz.id
    Category: Defacement
    Content: Target: https://batavia.biz.id/maw.htmlAttacker: maw3sixDate: 2026-04-13 23:39:36Flags: Mass Defacement (IP: 178.83.188.200)
    Date: 2026-04-13T16:45:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248470
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: batavia.biz.id
  133. ❄️❄️ 1433x PREMIUM HOTMAIL HITS ❄️❄️
    Category: Combo List
    Content: New thread posted by alphaxdd: ❄️❄️ 1433x PREMIUM HOTMAIL HITS ❄️❄️
    Date: 2026-04-13T16:42:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1433x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  134. Hotmail Unique Combo_4_6000
    Category: Combo List
    Content: New thread posted by UniqueCombo: Hotmail Unique Combo_4_6000
    Date: 2026-04-13T16:41:46Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-4-6000–200314
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. 1.132.304 Lines ➡️ DE Germany Mixed Target Combolist
    Category: Combo List
    Content: New thread posted by HQcomboSpace: 1.132.304 Lines ➡️ DE Germany Mixed Target Combolist
    Date: 2026-04-13T16:40:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71964/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  136. 3997 FULL VALID MIX MAIL ACCESS 13.04
    Category: Combo List
    Content: New thread posted by bigdatacombos: 3997 FULL VALID MIX MAIL ACCESS 13.04
    Date: 2026-04-13T16:40:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71966/
    Screenshots:
    None
    Threat Actors: bigdatacombos
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  137. ❄️❄️ 1433x PREMIUM HOTMAIL HITS ❄️❄️
    Category: Combo List
    Content: New thread posted by alphaxdd: ❄️❄️ 1433x PREMIUM HOTMAIL HITS ❄️❄️
    Date: 2026-04-13T16:39:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71972/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Eon Checker BETA – Multithreaded Mail Checker | IMAP + Outlook + GMX
    Category: Alert
    Content: New thread posted by satoshik1337: Eon Checker BETA – Multithreaded Mail Checker | IMAP + Outlook + GMX
    Date: 2026-04-13T16:39:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71969/
    Screenshots:
    None
    Threat Actors: satoshik1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  139. Irene defaced panduwarta.com
    Category: Defacement
    Content: Target: http://panduwarta.com/ireneAttacker: IreneTeam: XmrAnonye.idDate: 2026-04-13 23:35:43OS: LinuxFlags: Mass Defacement (IP: 202.10.43.78), Redefacement
    Date: 2026-04-13T16:39:06Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248469
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: panduwarta.com
  140. maw3six defaced thinglo.com
    Category: Defacement
    Content: Target: https://thinglo.com/maw.htmlAttacker: maw3sixDate: 2026-04-13 23:35:22
    Date: 2026-04-13T16:37:17Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248468
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thinglo.com
  141. [FR] – Lesburgersdepapa.fr
    Category: Alert
    Content: New thread posted by Lure2810: [FR] – Lesburgersdepapa.fr
    Date: 2026-04-13T16:37:09Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FR-Lesburgersdepapa-fr
    Screenshots:
    None
    Threat Actors: Lure2810
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Alleged ShinyHunters Threat Actor Group Official Channel and Infrastructure Disclosure
    Category: Data Breach
    Content: ShinyHunters threat actor group has posted a channel introduction revealing their official web URL (shinyhunte.rs), a Tor onion blog address, and a new PGP key via Pastebin. The post includes a warning about impersonators (Mattys Savoie & James) who allegedly misused their PGP key for ransom. Contact handle listed as @shinyc0rpsss. The group operates under a pay or leak model indicating ransomware/data extortion activity.
    Date: 2026-04-13T16:33:51Z
    Network: telegram
    Published URL: https://t.me/shinyhuntersoff/4
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. maw3six defaced glow-store.com.ar
    Category: Defacement
    Content: Target: https://glow-store.com.ar/maw.htmlAttacker: maw3sixDate: 2026-04-13 23:29:49OS: CloudFlags: Mass Defacement (IP: 172.67.222.26)
    Date: 2026-04-13T16:31:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248467
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: glow-store.com.ar
  144. Selling google voice and government emails for cheap.
    Category: Alert
    Content: New thread posted by superduper1: Selling google voice and government emails for cheap.
    Date: 2026-04-13T16:19:25Z
    Network: openweb
    Published URL: https://breached.st/threads/selling-google-voice-and-government-emails-for-cheap.85980/unread
    Screenshots:
    None
    Threat Actors: superduper1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  145. Website defacement of informaticacpu.com.br by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL threat actor defaced the Brazilian IT company Informatica CPUs website on April 13, 2026. The attack targeted a specific product page rather than the main homepage.
    Date: 2026-04-13T15:57:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832566
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Brazil
    Victim Industry: Information Technology
    Victim Organization: Informatica CPU
    Victim Site: informaticacpu.com.br
  146. CYKOMNEPAL defaced informaticacpu.com.br/produto….
    Category: Defacement
    Content: Target: informaticacpu.com.br/produto….Attacker: CYKOMNEPALTeam: CYKOMNEPALDate: 2026-04-13 22:55:05
    Date: 2026-04-13T15:56:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832566
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: informaticacpu.com.br/produto….
  147. Alleged leak of Hotmail credentials and mixed account data
    Category: Combo List
    Content: Threat actor noir is distributing what they claim to be valid Hotmail credentials and mixed account data through their Telegram channel. The post advertises high-quality credential lists but does not specify pricing, suggesting free distribution.
    Date: 2026-04-13T15:54:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71962/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  148. ⚡⚡ X2936 Valid UHQ Mix ⚡⚡
    Category: Combo List
    Content: New thread posted by Roronoa044: ⚡⚡ X2936 Valid UHQ Mix ⚡⚡
    Date: 2026-04-13T15:54:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2936-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  149. [ ⚡⚡ 980x SAMPLE HOTMAIL ⚡⚡ ]
    Category: Combo List
    Content: New thread posted by HollowKnight07: [ ⚡⚡ 980x SAMPLE HOTMAIL ⚡⚡ ]
    Date: 2026-04-13T15:53:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71963/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Alleged Cyber Threat Against Saudi Arabian Infrastructure by Handala Hack
    Category: Cyber Attack
    Content: Handala Hack issued a warning to Saudi Arabian leadership, threatening to devastate Saudi infrastructure if they make a wrong move. The message is framed as revenge for political/religious grievances and serves as a renewed warning. This constitutes a credible threat against critical infrastructure from a known hacktivist threat actor.
    Date: 2026-04-13T15:45:50Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/297
    Screenshots:
    None
    Threat Actors: HANDALA HACK
    Victim Country: Saudi Arabia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  151. Website defacement of Tanzania ICT Commission events portal by T-XpLoiT
    Category: Defacement
    Content: Threat actor T-XpLoiT successfully defaced the events portal of Tanzanias ICT Commission on April 13, 2026. The attack targeted a government subdomain responsible for hosting event-related information and services.
    Date: 2026-04-13T15:38:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248464
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Tanzania
    Victim Industry: Government
    Victim Organization: Tanzania Information and Communication Technologies Commission
    Victim Site: events.ictc.go.tz
  152. Mass defacement targeting Indonesian educational institution by T-XpLoiT
    Category: Defacement
    Content: T-XpLoiT conducted a mass defacement attack against an Indonesian Islamic schools examination portal. The attack targeted MTs Nurussyafaahs online examination system on April 13, 2026.
    Date: 2026-04-13T15:38:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248465
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTs Nurussyafaah
    Victim Site: admujian.mtsnurussyafaah.sch.id
  153. Mass defacement targeting Indonesian educational institutions by T-XpLoiT
    Category: Defacement
    Content: T-XpLoiT conducted a mass defacement campaign targeting Indonesian educational websites, including MTs Nurussyafaah Islamic School. The attack occurred on April 13, 2026, affecting the schools RDM subdomain as part of a broader campaign against multiple sites.
    Date: 2026-04-13T15:38:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248466
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTs Nurussyafaah Islamic School
    Victim Site: rdm.mtsnurussyafaah.sch.id
  154. Sendgrid.com Phishing Suite – Advanced Email Service Theft Solution
    Category: Phishing
    Content: New thread posted by NullPointerPanic: Sendgrid.com Phishing Suite – Advanced Email Service Theft Solution
    Date: 2026-04-13T15:30:08Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Sendgrid-com-Phishing-Suite-Advanced-Email-Service-Theft-Solution
    Screenshots:
    None
    Threat Actors: NullPointerPanic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. T-XpLoiT defaced rdm.mtsnurussyafaah.sch.id
    Category: Defacement
    Content: Target: https://rdm.mtsnurussyafaah.sch.id/Attacker: T-XpLoiTDate: 2026-04-13 22:21:04OS: LinuxFlags: Mass Defacement (IP: 103.102.153.36)
    Date: 2026-04-13T15:26:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248466
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: rdm.mtsnurussyafaah.sch.id
  156. Alleged Cyber Attack on Two Major Gulf Steel Companies by Hanzala Group
    Category: Cyber Attack
    Content: The Iranian cyber group Hanzala (حنظله) claims to have conducted a large-scale cyber operation targeting two major steel industry companies in the Persian Gulf region: Fulat and SULB, based in Bahrain and Saudi Arabia respectively. The group claims both companies were fully compromised and taken offline. The targeted companies reportedly have a combined annual revenue exceeding $5 billion, annual steel production capacity of 2 million tons, and over 2,000 employees. Hanzala framed the attack as retaliation for actions against the Axis of Resistance and as revenge for fallen Hanzala hackers during the Ramadan War, as well as recent operations against people in southern Lebanon. The group issued further threats against regional leaders, warning this is only the beginning of a wave of retaliatory operations.
    Date: 2026-04-13T15:21:13Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21187
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Bahrain, Saudi Arabia
    Victim Industry: Steel / Manufacturing
    Victim Organization: Fulat and SULB
    Victim Site: Unknown
  157. T-XpLoiT defaced admujian.mtsnurussyafaah.sch.id
    Category: Defacement
    Content: Target: https://admujian.mtsnurussyafaah.sch.id/Attacker: T-XpLoiTDate: 2026-04-13 22:19:04OS: LinuxFlags: Mass Defacement (IP: 103.102.153.36)
    Date: 2026-04-13T15:20:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248465
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: admujian.mtsnurussyafaah.sch.id
  158. T-XpLoiT defaced events.ictc.go.tz
    Category: Defacement
    Content: Target: https://events.ictc.go.tz/deface.htmlAttacker: T-XpLoiTDate: 2026-04-13 22:13:44
    Date: 2026-04-13T15:15:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248464
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: events.ictc.go.tz
  159. APPEL COMBO Mixed
    Category: Combo List
    Content: New thread posted by CODER: APPEL COMBO Mixed
    Date: 2026-04-13T15:10:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71961/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. EMPIREGPT
    Category: Services
    Content: New thread posted by JINKUSU: EMPIREGPT
    Date: 2026-04-13T15:09:07Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-EMPIREGPT
    Screenshots:
    None
    Threat Actors: JINKUSU
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Anthony, New Mexico, investigates cybersecurity incident
    Category: Cyber Attack
    Content: La ville dAnthony, au Nouveau-Mexique, mène une enquête suite à un incident de cybersécurité impliquant des dossiers publics manquants et des systèmes inaccessibles. Ces anomalies sont apparues lors de la transition vers la nouvelle administration du maire Gabriel Holguin, incluant leffacement de dispositifs de la police et des irrégularités dans les communications. Bien quun piratage externe ne soit pas confirmé, les autorités étatiques examinent actuellement la gestion de lintégrité des données et le contrôle des accès.
    Date: 2026-04-13T15:06:18Z
    Network: openweb
    Published URL: https://dysruptionhub.com/anthony-nm-cybersecurity-incident/
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: City of Anthony
    Victim Site: cityofanthonynm.gov
  162. Straumann meldet Cyberangriff auf Altsystem – Geschäftsbetrieb nicht betroffen
    Category: Cyber Attack
    Content: Lentreprise Straumann a déclaré quun ancien système utilisé pour des processus de contrôle interne entre 2021 et 2024 a subi une exposition de documents internes. Des experts en cybersécurité ont été mobilisés pour isoler lincident et les autorités compétentes ont été informées de la situation. Lorganisation précise que ses activités commerciales ainsi que les systèmes clients nont subi aucun impact.
    Date: 2026-04-13T15:06:15Z
    Network: openweb
    Published URL: https://www.cash.ch/news/top-news/straumann-meldet-cyberangriff-auf-altsystem-geschaftsbetrieb-nicht-betroffen-927241
    Screenshots:
    None
    Threat Actors:
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Straumann
    Victim Site: straumann.com
  163. Hotmail Unique Combo_3_6000
    Category: Logs
    Content: New thread posted by UniqueCombo: Hotmail Unique Combo_3_6000
    Date: 2026-04-13T15:02:02Z
    Network: openweb
    Published URL: https://xforums.st/threads/hotmail-unique-combo_3_6000.606851/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. ✦✦ [ 183 K++ ]✦{ Colombia }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Category: Combo List
    Content: New thread posted by CobraEgy: ✦✦ [ 183 K++ ]✦{ Colombia }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Date: 2026-04-13T14:54:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-183-K-%E2%9C%A6-Colombia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. ✦✦ [ 183 K++ ]✦{ Ecuador }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Category: Combo List
    Content: New thread posted by CobraEgy: ✦✦ [ 183 K++ ]✦{ Ecuador }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Date: 2026-04-13T14:53:27Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-183-K-%E2%9C%A6-Ecuador-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Hotmail Unique Combo_3_6000
    Category: Combo List
    Content: New thread posted by UniqueCombo: Hotmail Unique Combo_3_6000
    Date: 2026-04-13T14:52:32Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-3-6000–200289
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. ✦✦ [ 47 K++ ]✦{ Denmark }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Category: Combo List
    Content: New thread posted by CobraEgy: ✦✦ [ 47 K++ ]✦{ Denmark }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Date: 2026-04-13T14:51:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-47-K-%E2%9C%A6-Denmark-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  168. ✦✦ [ 23 K++ ]✦{ Croatia }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Category: Combo List
    Content: New thread posted by CobraEgy: ✦✦ [ 23 K++ ]✦{ Croatia }✦Email:Pass✦FRESH✦Maxi_Leaks✦[ 13-4-2026 ]✦✦
    Date: 2026-04-13T14:50:40Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-23-K-%E2%9C%A6-Croatia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  169. Alleged leak of Cuban credentials combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a credential combolist containing over 23,000 email and password combinations allegedly targeting Cuban users. The data is described as fresh and high quality, distributed through the Maxi_Leaks channel.
    Date: 2026-04-13T14:49:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-19-K-%E2%9C%A6-Cuba-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Cuba
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Alleged leak of Estonian credentials combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a combolist containing over 13,000 email and password combinations allegedly from Estonia. The credentials are described as fresh and high quality, distributed through the Maxi_Leaks channel.
    Date: 2026-04-13T14:48:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-13-K-%E2%9C%A6-Estonia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Estonia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a mixed credential combolist containing login credentials from various sources. The content is hidden behind registration requirements on the forum.
    Date: 2026-04-13T14:47:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1951-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  172. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 3.7 million mixed email credentials through a paste sharing service. The credentials are described as fresh and high quality mixed email combinations.
    Date: 2026-04-13T14:45:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71959/
    Screenshots:
    None
    Threat Actors: NightFall
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Alleged vulnerability exploitation attempts against Indonesian government and commercial websites
    Category: Vulnerability
    Content: A threat actor associated with Rakyat Digital Crew has shared what appears to be automated vulnerability scan results targeting multiple Indonesian organizations including the Ministry of Education (kemdikbud.go.id), Ministry of Finance (kemenkeu.go.id), BUMN recruitment portal (fhcibumn.id), Shopee Indonesia, and others. The post lists multiple vulnerability types including Open Redirect, Directory Traversal, Remote File Inclusion (RFI), and Command Injection, along with associated credentials (email/password pairs) for several government portals.
    Date: 2026-04-13T14:45:39Z
    Network: telegram
    Published URL: https://t.me/c/3755871403/223
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Indonesia
    Victim Industry: Government, E-Commerce, Education
    Victim Organization: Kementerian Pendidikan dan Kebudayaan, Kementerian Keuangan, FHCI BUMN, Shopee Indonesia, Universitas Nusa Cendana
    Victim Site: kemdikbud.go.id, kemenkeu.go.id, fhcibumn.id, shopee.co.id, undana.ac.id, instagram.com
  174. Hotmail Unique Combo_3_6000
    Category: Combo List
    Content: New thread posted by UniqueCombo: Hotmail Unique Combo_3_6000
    Date: 2026-04-13T14:45:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71960/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Website defacement of INAP Guatemala government intranet by T-XpLoiT
    Category: Defacement
    Content: The attacker T-XpLoiT successfully defaced the internal intranet portal of Guatemalas National Institute of Public Administration (INAP) on April 13, 2026. The compromised system was running on a Linux operating system.
    Date: 2026-04-13T14:39:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248463
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Guatemala
    Victim Industry: Government
    Victim Organization: Instituto Nacional de Administración Pública (INAP)
    Victim Site: intranet.inap.gob.gt
  176. Mass website defacement targeting Indonesian educational institution by T-XpLoiT
    Category: Defacement
    Content: T-XpLoiT conducted a mass defacement attack targeting the Indonesian teacher training college STKIP PGRI Sidoarjo on April 13, 2026. The attack was part of a broader mass defacement campaign rather than a targeted assault on the specific institution.
    Date: 2026-04-13T14:28:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248462
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: STKIP PGRI Sidoarjo
    Victim Site: www.stkippgri-sidoarjo.ac.id
  177. Alleged leak of Czech Republic credential list
    Category: Combo List
    Content: A threat actor shared a credential list containing over 272,000 email and password combinations targeting Czech Republic users. The combolist is described as fresh and high quality.
    Date: 2026-04-13T14:25:05Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-272-K-%E2%9C%A6-Czech-Republic-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-13-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Czech Republic
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  178. ?? 2965x MIX MAIL ??
    Category: Combo List
    Content: New thread posted by NotSellerXd: ?? 2965x MIX MAIL ??
    Date: 2026-04-13T14:24:14Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2965x-MIX-MAIL
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  179. Alleged leak of dating application credentials
    Category: Combo List
    Content: Threat actor distributes a 9 million credential combolist targeting multiple dating applications including Badoo, MeetMe, and others through Telegram channels. The credentials are being shared for free through dedicated Telegram groups.
    Date: 2026-04-13T14:22:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71955/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Dating/Social Media
    Victim Organization: Multiple dating platforms
    Victim Site: Unknown
  180. Alleged leak of corporate email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 61,397 SMTP credentials allegedly sourced from corporate email password leaks. The credentials are distributed as a free download via file sharing service.
    Date: 2026-04-13T14:22:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71956/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,965 mixed email credentials for free download on a cybercriminal forum.
    Date: 2026-04-13T14:22:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71958/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  182. Mass defacement campaign by Zod targeting vendorinfra.com
    Category: Defacement
    Content: Zod conducted a mass defacement campaign targeting vendorinfra.com on April 13, 2026. The attack was part of a broader mass defacement operation rather than a targeted attack on a single page.
    Date: 2026-04-13T14:05:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248460
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Vendor Infrastructure
    Victim Site: vendorinfra.com
  183. Website defacement of Wonder Air by Zod
    Category: Defacement
    Content: The attacker Zod defaced the wonder-air.com website on April 13, 2026. The defacement targeted a specific page (zod.html) on the aviation companys domain.
    Date: 2026-04-13T14:05:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248459
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Aviation
    Victim Organization: Wonder Air
    Victim Site: wonder-air.com
  184. Government of Brazil | Public Prosecutors Office of the State of Pará
    Category: Alert
    Content: New thread posted by wh6ami: Government of Brazil | Public Prosecutors Office of the State of Pará
    Date: 2026-04-13T14:03:28Z
    Network: openweb
    Published URL: https://breached.st/threads/government-of-brazil-public-prosecutors-office-of-the-state-of-para.85979/unread
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Alleged cyber attack on NATO Jira by ShinyHunters
    Category: Cyber Attack
    Content: Threat actor identifying as ShinyHunters (@shinyc0rpsss) claims to have compromised NATOs Jira instance, sharing a photo as proof of access. The actor appears to be responding to skepticism from another user.
    Date: 2026-04-13T14:03:04Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1113
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Government / Defense
    Victim Organization: NATO
    Victim Site: Unknown
  186. Zod defaced vendorinfra.com
    Category: Defacement
    Content: Target: https://vendorinfra.com/zod.htmlAttacker: ZodTeam: ZodDate: 2026-04-13 20:59:16Flags: Mass Defacement (IP: 193.58.105.248)
    Date: 2026-04-13T14:02:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248460
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: vendorinfra.com
  187. Alleged ICS/OT Compromise of Albert Most Velebudická Hypermarket by Z-Pentest Alliance
    Category: Cyber Attack
    Content: The Z-Pentest Alliance, a pro-Russian hacktivist group, claims to have gained full control over the industrial control systems (ICS/OT) of the Albert Most Velebudická hypermarket in the Czech Republic. The group states they have access to and control over the boiler room, central heating, Trane industrial chillers, VZT ventilation systems, building-wide lighting, cold storage rooms, the Sahara specialized warehouse, climate control zones (including produce and server room), and entrance air curtains. They threaten to destroy thousands of tons of food by disabling refrigeration systems, citing weak network segmentation, outdated protocols, and unprotected management interfaces as attack vectors. The group frames the attack as retaliation against European support for Ukraine and threatens further attacks on European food supply chain infrastructure.
    Date: 2026-04-13T14:01:44Z
    Network: telegram
    Published URL: https://t.me/z_pentest_fucknato/864
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: Czech Republic
    Victim Industry: Retail / Food Supply Chain
    Victim Organization: Albert Most Velebudická
    Victim Site: albert.cz
  188. 11ML CC Mixed CoMBO
    Category: Combo List
    Content: New thread posted by CODER: 11ML CC Mixed CoMBO
    Date: 2026-04-13T14:01:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71953/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. WordPress by @hello_zod_bot
    Category: Combo List
    Content: New thread posted by zod: WordPress by @hello_zod_bot
    Date: 2026-04-13T14:00:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71954/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Alleged Cyberattack on Bahraini and Saudi Steel Giants Foulath and SULB by Handala
    Category: Cyber Attack
    Content: The hacktivist group Handala claims to have conducted a wide-scale cyber operation targeting Foulath (Bahrain) and SULB (Saudi Arabia), two major steel manufacturers with a combined annual turnover exceeding $5 billion and production capacity of 2 million tons. Handala claims both companies were completely compromised and forced out of operational status. The attack is framed as retaliation for alleged attacks on Resistance Axis steel factories and the deaths of Handala-affiliated hackers during the Ramadan War, as well as actions against South Lebanon. The group warns of further retaliatory operations against regional leaders.
    Date: 2026-04-13T13:33:30Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/277
    Screenshots:
    None
    Threat Actors: Handala
    Victim Country: Bahrain, Saudi Arabia
    Victim Industry: Manufacturing / Steel Production
    Victim Organization: Foulath, SULB
    Victim Site: Unknown
  191. Alleged data breach of VUMI Group insurance database
    Category: Data Breach
    Content: Threat actor claims to have exfiltrated a VUMI Group insurance database containing complete PII including social security numbers, passport documents, and W-9 forms for approximately 300,000 insured individuals and 25,000 staff/partners/agents. The actor provides screenshots of the alleged vulnerability exploitation and data exfiltration process, along with download links to the stolen data.
    Date: 2026-04-13T13:20:22Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-VUMI-Group-Insurance-Database
    Screenshots:
    None
    Threat Actors: bytetobreach
    Victim Country: United States
    Victim Industry: Insurance
    Victim Organization: VUMI Group
    Victim Site: Unknown
  192. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 72,000 mixed email and password credentials on a cybercrime forum. The credentials appear to be from various email providers and are being distributed for free to registered forum members.
    Date: 2026-04-13T13:15:49Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-72K-Mix-Mail-Access-Combo
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: Threat actor MarkVesto shared a combolist containing 72,000 mixed email credentials on CrackingX forum. The actor also promoted their Telegram channel for additional content distribution.
    Date: 2026-04-13T13:14:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71952/
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  194. Alleged data breach of VUMI Group insurance database
    Category: Data Leak
    Content: Threat actor ByteToBreach leaked a VUMI Group insurance database containing complete PII including social security numbers, passport documents, and W-9 forms for approximately 300,000 insured individuals and 25,000 staff members. The actor claims to have exfiltrated the data over 6 days and is distributing it for free through multiple cloud storage platforms.
    Date: 2026-04-13T13:13:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-USA-VUMI-Group-Insurance-Database
    Screenshots:
    None
    Threat Actors: ByteToBreach
    Victim Country: United States
    Victim Industry: Insurance
    Victim Organization: VUMI Group
    Victim Site: Unknown
  195. Alleged data breach of VUMI Group Insurance
    Category: Data Leak
    Content: Threat actor claims to have leaked a database containing complete PII including social security numbers, passport documents, and W-9 forms of approximately 300,000 insured individuals and 25,000 staff/partners/agents from VUMI Group insurance company. The data is being distributed through multiple cloud storage platforms.
    Date: 2026-04-13T13:12:51Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-NG-USA-VUMI-Group-Insurance-Database
    Screenshots:
    None
    Threat Actors: bytetobreach
    Victim Country: United States
    Victim Industry: Insurance
    Victim Organization: VUMI Group
    Victim Site: Unknown
  196. Alleged contact advertising for cybercriminal services
    Category: Initial Access
    Content: Forum post containing multiple contact methods including Telegram, Discord, Gmail, and WhatsApp for alleged cybercriminal services. No specific content details are available to determine the exact nature of services offered.
    Date: 2026-04-13T13:07:14Z
    Network: openweb
    Published URL: https://xforums.st/threads/tele-terrellwhitte-discord-activealphagod24hrs-gmail-sosaboy959-gmail-com-whatsapp-1-425-531-1773.606837/
    Screenshots:
    None
    Threat Actors: nansnsmna
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Alleged data leak of Municipality of São Mateus government portal
    Category: Data Leak
    Content: A threat actor allegedly leaked data from the official government portal of the Municipality of São Mateus in Espírito Santo, Brazil, providing a download link to the compromised information.
    Date: 2026-04-13T12:53:16Z
    Network: openweb
    Published URL: https://breached.st/threads/government-of-brazil-municipality-of-sao-mateus.85978/unread
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: Municipality of São Mateus
    Victim Site: saomateus.es.gov.br
  198. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,000 Hotmail email and password combinations on a cybercrime forum. The actor also advertises a shop for country-specific credential combinations.
    Date: 2026-04-13T12:51:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-2-6000–200280
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  199. Alleged request for bulk SMS gateway services on cybercriminal forum
    Category: Combo List
    Content: Forum user seeks reliable bulk SMS gateway services, citing difficulties with SMTP and SIM card procurement for potential malicious messaging campaigns.
    Date: 2026-04-13T12:51:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71946/
    Screenshots:
    None
    Threat Actors: Bowen980
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Alleged data leak of user credentials via ULP by zod
    Category: Combo List
    Content: User zod shared a ULP credential list on CrackingX forum with password-protected content and Telegram contact for further details.
    Date: 2026-04-13T12:50:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71948/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  201. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 35,242 mixed valid email credentials on a cybercrime forum. The credentials are reportedly valid through April 2026.
    Date: 2026-04-13T12:50:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71949/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Alleged distribution of mixed corporate credential lists
    Category: Combo List
    Content: Threat actor CODER is distributing a 5 million mixed corporate credential combolist for free via Telegram channels. The actor also operates channels for free programs and appears to be building a distribution network for credential lists.
    Date: 2026-04-13T12:50:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71950/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Alleged sale of FTX exchange account access with KYC data
    Category: Initial Access
    Content: Threat actor is selling access to verified FTX exchange accounts through the Kroll portal, claiming total balances over $13 million with individual accounts worth up to $9.5 million. The offering includes email credentials, session cookies, and access to account owners emails for $50,000.
    Date: 2026-04-13T12:49:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-High-Value-FTX-Claims-Accounts-Balances-up-to-9-5M-Verified-KYC-FULL-ACCESS
    Screenshots:
    None
    Threat Actors: Yakohomot
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: FTX
    Victim Site: Unknown
  204. Alleged sale of Windows RDP DoS exploit
    Category: DDoS
    Content: Threat actor phanes is selling a Windows RDP DoS exploit for $850 that allegedly uses integer overflow to crash Windows Server 2012 R2, Server 2016, Windows 8.1, and Windows 10 systems via RDP port. The actor claims the exploit affects over 1 million devices.
    Date: 2026-04-13T12:49:31Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Windows-RDP-DoS-Exploit
    Screenshots:
    None
    Threat Actors: phanes
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  205. Alleged sale of FBI agent credentials and personal data
    Category: Data Breach
    Content: Threat actor clara283 claims to be selling a database containing FBI agent details including account credentials, phone numbers, emails, and vehicle plate numbers. The actor provides sample data showing bcrypt-hashed passwords and contact information for FBI personnel.
    Date: 2026-04-13T12:49:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-FBI-DB
    Screenshots:
    None
    Threat Actors: clara283
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Federal Bureau of Investigation
    Victim Site: fbi.gov
  206. Alleged cybercrime service offering domain abuse and phishing protection services
    Category: Initial Access
    Content: Threat actor advertising comprehensive cybercrime services including domain abuse operations, DMCA manipulation, anti-phishing evasion, and registrar exploitation with claims of processing 15,000+ abuse cases daily. Services range from $100-1000 with payment in cryptocurrency.
    Date: 2026-04-13T12:48:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-BAN-HOLD-DELEGATION-OF-DOMAINS-DMCA-Phishing-combine-15-000-abuses-per-day
    Screenshots:
    None
    Threat Actors: clean_search
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  207. Alleged sale of Belgium banking credentials
    Category: Data Breach
    Content: Threat actor jza1337 is allegedly selling over 40,000 Belgian IBANs (International Bank Account Numbers) for $1.75 per 1,000 records or $70.19 for the complete dataset. Payment is accepted in cryptocurrency including LTC and Solana.
    Date: 2026-04-13T12:48:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-BE-IBANS-40K–73259
    Screenshots:
    None
    Threat Actors: jza1337
    Victim Country: Belgium
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged data breach of Talabat Saudi Arabia database
    Category: Data Breach
    Content: Threat actor is selling a dataset containing 536,000 records from Talabat Saudi Arabia, including personal information such as usernames, emails, phone numbers, addresses, and other user account details. Contact information provided for interested buyers with escrow options mentioned.
    Date: 2026-04-13T12:48:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-536k-Saudi-Arabia-https-www-talabat-com-DataSet
    Screenshots:
    None
    Threat Actors: Jeffery_Epstein
    Victim Country: Saudi Arabia
    Victim Industry: Food Delivery
    Victim Organization: Talabat
    Victim Site: talabat.com
  209. Alleged leak of mixed domain credentials
    Category: Logs
    Content: A threat actor shared a combolist containing 203,000 mixed domain email and password combinations claimed to be valid as of April 26, 2013.
    Date: 2026-04-13T12:41:11Z
    Network: openweb
    Published URL: https://xforums.st/threads/203k-mix-domain-with-valid-13-04-26.606827/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  210. Alleged data leak of NurtureLife
    Category: Data Leak
    Content: A forum post claims to involve leaked data from nurturelife.com, though no specific details about the nature or scope of the alleged leak are available.
    Date: 2026-04-13T12:29:45Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-nurturelife-com-leak
    Screenshots:
    None
    Threat Actors: [Mod] Tanaka
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: NurtureLife
    Victim Site: nurturelife.com
  211. Alleged data breach of Talabat Saudi Arabia user database
    Category: Data Breach
    Content: Threat actor claims to be selling a dataset containing 563,000 user records from Talabat Saudi Arabia, including personal information such as names, emails, phone numbers, addresses, and account details. The actor is offering the data for sale via Telegram or Session with escrow options accepted.
    Date: 2026-04-13T12:22:20Z
    Network: openweb
    Published URL: https://breached.st/threads/https-www-talabat-com-563k-saudi-arabia-dataset.85977/unread
    Screenshots:
    None
    Threat Actors: Jeffrey Epstein
    Victim Country: Saudi Arabia
    Victim Industry: Food Delivery
    Victim Organization: Talabat
    Victim Site: talabat.com
  212. Alleged leak of IPTV service credentials
    Category: Combo List
    Content: Forum post shares a link to what appears to be fresh IPTV credential combinations. The post provides access to credential lists for IPTV services through an external paste service.
    Date: 2026-04-13T12:20:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71944/
    Screenshots:
    None
    Threat Actors: alvianparker10
    Victim Country: Unknown
    Victim Industry: Media and Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  213. Alleged leak of German mixed domain credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 949,824 credential pairs allegedly from various German domains. The data is being distributed for free via a cloud storage link.
    Date: 2026-04-13T12:19:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71945/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  214. Alleged data leak of NurtureLife customer database
    Category: Data Leak
    Content: A user on a cybercrime forum leaked a JSON database dump from NurtureLife containing 27.5k user records from 2022. The leaked data includes personal information such as names, email addresses, account status, subscription details, and childrens information including names and birthdates.
    Date: 2026-04-13T12:18:29Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-nurturelife-com-leak
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Unknown
    Victim Industry: Food Services
    Victim Organization: NurtureLife
    Victim Site: nurturelife.com
  215. Alleged leak of 3,000 credential combinations
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,000 valid email and password combinations through a free download link on a cybercrime forum.
    Date: 2026-04-13T11:59:10Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3K-VALID-GOODS
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  216. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 alleged valid Hotmail email credentials on a cybercrime forum.
    Date: 2026-04-13T11:58:29Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-1k-Hotmail-Valid-Mail-Access-13-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  217. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 5,000 verified Hotmail email and password combinations on a cybercrime forum. The credentials are described as checked and fresh, indicating they have been validated and are recently obtained.
    Date: 2026-04-13T11:57:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-5K-CHECKED-HOTMAIL-FRESH
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  218. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor claims to have leaked a combolist containing 67,000 fresh valid email credentials from mixed sources. No post content was available for further analysis.
    Date: 2026-04-13T11:57:06Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-67K-Fresh-Valid-Mail-Access-Mix-13-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  219. Alleged leak of educational institution credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing 75,536 educational email and password combinations. The data is distributed through a Telegram channel and appears to target educational institutions.
    Date: 2026-04-13T11:55:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71938/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  220. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 valid Hotmail email credentials dated April 13th. The credentials are made available for registered users of the forum.
    Date: 2026-04-13T11:55:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71939/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  221. Alleged leak of AOV gaming platform credentials
    Category: Combo List
    Content: Threat actor shared credentials allegedly obtained from Arena of Valor (AOV) gaming platform through a Pasteview link. The post appears to offer free access to credential combinations rather than selling them.
    Date: 2026-04-13T11:55:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71940/
    Screenshots:
    None
    Threat Actors: alvianparker10
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Arena of Valor
    Victim Site: Unknown
  222. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a link to what appears to be Hotmail credentials on a cybercrime forum. The post contains minimal details and links to an external paste service for the alleged credential list.
    Date: 2026-04-13T11:55:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71941/
    Screenshots:
    None
    Threat Actors: alvianparker10
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  223. Alleged distribution of credential combos targeting multiple social media platforms
    Category: Combo List
    Content: Threat actor CODER is distributing a 7 million record combolist containing email and password combinations allegedly from multiple social media platforms including Myspace, Friendster, Orkut, Google+, Vine, Bebo, Netlog, Hi5, Tagged, Skyrock, LunarStorm, Bolt, and Faceparty. The credentials are being shared through Telegram channels for free access.
    Date: 2026-04-13T11:54:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71942/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Multiple platforms
    Victim Site: myspace.com, friendster.com, orkut.com, plus.google.com, vine.co, bebo.com, netlog.com, hi5.com, tagged.com, skyrock.com, lunarstorm.se, bolt.com, faceparty.com
  224. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 67,000 fresh valid email access credentials from mixed sources dated April 13th. The credentials are being distributed as hidden content to registered forum users.
    Date: 2026-04-13T11:54:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71943/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  225. Alleged cyber attack on minhhanhh1234.id.vn by Pharaohs Team
    Category: Defacement
    Content: Pharaohs Team is claiming an attack or defacement against the Vietnamese domain minhhanhh1234.id.vn, sharing domain metrics (DA68, PA32) as proof. Contact provided via Telegram handle @phteam_s.
    Date: 2026-04-13T11:47:02Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/483
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: minhhanhh1234.id.vn
  226. Alleged leak of Hotmail credentials
    Category: Logs
    Content: A threat actor shared a combolist containing 64,000 Hotmail domain credentials allegedly validated on April 26, 2013.
    Date: 2026-04-13T11:46:03Z
    Network: openweb
    Published URL: https://xforums.st/threads/64k-hotmail-domain-with-valid-13-04-26.606823/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  227. Alleged sale of initial access to systems and servers by Infrastructure Destruction Squad
    Category: Initial Access
    Content: A threat actor operating under the Infrastructure Destruction Squad handle is advertising the sale of access to compromised systems, data, and servers. No specific targets, pricing, or technical details are provided. Contact is directed via @Destructionsqua.
    Date: 2026-04-13T11:43:58Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/3985
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  228. Alleged leak of mixed domain email credentials
    Category: Combo List
    Content: Threat actor leaked a combolist containing 7,337 email credentials from mixed domains with alleged mail access capability.
    Date: 2026-04-13T11:32:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71936/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  229. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor claims to have leaked 64,000 Hotmail domain credentials dated April 26, 2013. The credentials are being shared on a cybercrime forum specializing in combolists and data dumps.
    Date: 2026-04-13T11:32:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71937/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  230. Alleged data breach of Emaar Properties database for sale
    Category: Data Breach
    Content: Threat actor claims to be selling Emaar Properties database containing over 400,000 records of property owners and renters, including personal information, vehicle details, addresses, phone numbers, and emails, allegedly breached one week prior. The dataset is being offered for $10,000 and reportedly includes information on high-profile individuals residing in Burj Khalifa.
    Date: 2026-04-13T11:29:49Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Emaar-Properties-owners-rentals-information
    Screenshots:
    None
    Threat Actors: ksa901
    Victim Country: United Arab Emirates
    Victim Industry: Real Estate
    Victim Organization: Emaar Properties
    Victim Site: Unknown
  231. Mass website defacement by maw3six targeting vigordefense.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting vigordefense.com on April 13, 2026. The incident was part of a broader mass defacement operation affecting multiple websites simultaneously.
    Date: 2026-04-13T11:27:05Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248458
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Defense/Security
    Victim Organization: Vigor Defense
    Victim Site: vigordefense.com
  232. Mass website defacement by maw3six targeting inair-int.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting inair-int.com on April 13, 2026. The incident was part of a broader mass defacement operation affecting multiple websites.
    Date: 2026-04-13T11:26:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248453
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: inair-int.com
  233. Mass defacement targeting sentinelspares.com by maw3six
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting the Sentinel Spares website. The attack occurred on April 13, 2026 and affected multiple pages rather than just the homepage.
    Date: 2026-04-13T11:25:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248456
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Automotive/Spare Parts
    Victim Organization: Sentinel Spares
    Victim Site: sentinelspares.com
  234. Mass website defacement by maw3six targeting prestigeairparts.com
    Category: Defacement
    Content: Actor maw3six conducted a mass defacement campaign targeting prestigeairparts.com on April 13, 2026. The attack affected a Linux-based server hosting the aviation parts companys website as part of a broader mass defacement operation.
    Date: 2026-04-13T11:23:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248455
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Aerospace/Aviation
    Victim Organization: Prestige Air Parts
    Victim Site: prestigeairparts.com
  235. Mass website defacement by maw3six targeting sunshineandpromises.com
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting sunshineandpromises.com on April 13, 2026. The attack was part of a broader mass defacement campaign rather than targeting the specific victim organization.
    Date: 2026-04-13T11:22:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248457
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sunshineandpromises.com
  236. Mass website defacement by maw3six targeting klupklub.com
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting klupklub.com on April 13, 2026. The attack was part of a broader mass defacement campaign rather than a targeted single-site attack.
    Date: 2026-04-13T11:21:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248454
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: klupklub.com
  237. Website defacement of fournisseurs-astucieux.fr by maw3six
    Category: Defacement
    Content: Attacker maw3six defaced the French website fournisseurs-astucieux.fr on April 13, 2026. The incident appears to be a single-site defacement targeting a specific page rather than a mass attack.
    Date: 2026-04-13T11:15:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248451
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: fournisseurs-astucieux.fr
  238. Website defacement of daily2kart.com by maw3six
    Category: Defacement
    Content: The attacker maw3six successfully defaced the daily2kart.com e-commerce website on April 13, 2026. The incident targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-13T11:15:16Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248446
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Daily2Kart
    Victim Site: daily2kart.com
  239. Website defacement of checkengine.website by maw3six
    Category: Defacement
    Content: Individual attacker maw3six successfully defaced checkengine.website on April 13, 2026. The incident targeted a Linux-hosted website and appears to be an isolated defacement rather than part of a mass campaign.
    Date: 2026-04-13T11:14:34Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248450
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: checkengine.website
  240. Website defacement of Factoring Ecuador by maw3six
    Category: Defacement
    Content: The attacker maw3six successfully defaced the Factoring Ecuador website on April 13, 2026. This appears to be a single-target defacement incident targeting a financial services company in Ecuador.
    Date: 2026-04-13T11:13:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248448
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Ecuador
    Victim Industry: Financial Services
    Victim Organization: Factoring Ecuador
    Victim Site: factoringecuador.ec
  241. Website defacement of epinto.co.uk by maw3six
    Category: Defacement
    Content: The attacker maw3six successfully defaced the epinto.co.uk website on April 13, 2026. The compromised site was running on a Linux operating system and the defacement was archived for reference.
    Date: 2026-04-13T11:12:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248449
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: epinto.co.uk
  242. Website defacement of qpay.my.id by maw3six
    Category: Defacement
    Content: Individual attacker maw3six defaced the QPay payment service website qpay.my.id on April 13, 2026. The defacement targeted a single page on the Indonesian financial services platform.
    Date: 2026-04-13T11:12:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248452
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Indonesia
    Victim Industry: Financial Services
    Victim Organization: QPay
    Victim Site: qpay.my.id
  243. Website defacement of merdc.org by maw3six
    Category: Defacement
    Content: Individual attacker maw3six successfully defaced the merdc.org website on April 13, 2026. The incident targeted a specific page rather than constituting a mass defacement campaign.
    Date: 2026-04-13T11:11:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248447
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: merdc.org
  244. Alleged sale of combolists, cookies, and logs for multiple major platforms
    Category: Logs
    Content: A threat actor operating as tuzelity is selling credential combolists, cookies, and stealer logs for numerous platforms including Hotmail, Gmail, Yahoo, AOL, Comcast, Windstream, Spectrum, AT&T, Facebook, Instagram, LinkedIn, Google Ads, Netflix, Disney, Airbnb, Booking, Steam, TikTok, iCloud, PayPal, Amazon, eBay, Roblox, PSN, Xbox, and various dating and e-commerce sites.
    Date: 2026-04-13T11:09:47Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61753
    Screenshots:
    None
    Threat Actors: tuzelity
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  245. Website defacement of sporting industry website by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a sports industry-related website on April 13, 2026. The attack targeted a specific subdirectory rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-13T11:05:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832483
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Sports/Recreation
    Victim Organization: Unknown
    Victim Site: sportindustries.store
  246. Website defacement of Alden Interactive by maw3six
    Category: Defacement
    Content: The attacker maw3six successfully defaced a page on the Alden Interactive website on April 13, 2026. This appears to be an isolated defacement incident targeting the companys web presence.
    Date: 2026-04-13T11:05:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248444
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Alden Interactive
    Victim Site: aldeninteractive.com
  247. DimasHxR defaced sportindustries.store/pub/medi…
    Category: Defacement
    Content: Target: sportindustries.store/pub/medi…Attacker: DimasHxRDate: 2026-04-13 17:58:46
    Date: 2026-04-13T11:03:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832483
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sportindustries.store/pub/medi…
  248. Website defacement of renderify.io by maw3six
    Category: Defacement
    Content: Threat actor maw3six defaced the renderify.io website on April 13, 2026. The attack targeted a cloud-hosted technology service platform.
    Date: 2026-04-13T11:02:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248445
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Renderify
    Victim Site: renderify.io
  249. Alleged leak of Hotmail credentials on underground forum
    Category: Combo List
    Content: A threat actor named ValidMail allegedly shared a combolist containing 43,000 Hotmail credentials described as valid forum accounts on an underground forum. The actual post content is restricted behind user registration.
    Date: 2026-04-13T11:01:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71934/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  250. [PRIVATE RESEARCH] today Exploit on FF.IO
    Category: Alert
    Content: New thread posted by pidoras: [PRIVATE RESEARCH] today Exploit on FF.IO
    Date: 2026-04-13T11:00:19Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SOURCE-CODE-PRIVATE-RESEARCH-today-Exploit-on-FF-IO
    Screenshots:
    None
    Threat Actors: pidoras
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Alleged sale of access or domain to thinkanddoafrica.org by Pharaohs Team
    Category: Initial Access
    Content: Pharaohs Team market is advertising thinkanddoafrica.org with DA 17 and PA 28 metrics, directing interested parties to a private Telegram handle. This is consistent with the sale of compromised website access, spam link insertion, or domain resale for malicious purposes.
    Date: 2026-04-13T10:54:49Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/482
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Africa (region unspecified)
    Victim Industry: Non-profit / NGO
    Victim Organization: Think and Do Africa
    Victim Site: thinkanddoafrica.org
  252. Alleged leak of Hotmail credential combolist containing 1,808 accounts
    Category: Combo List
    Content: Threat actor D4rkNetHub shared a combolist containing 1,808 Hotmail email and password combinations on underground forum. The actor also advertises premium cloud access services through their Telegram channel and website.
    Date: 2026-04-13T10:41:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-808-Good-HOTMAIL-GOODS-D4RKNETHUB-CLOUD-13-04-26
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  253. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,000 Hotmail email and password combinations on a cybercrime forum. The actor also promotes a shop offering credential lists from various countries.
    Date: 2026-04-13T10:40:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-1-6000–200265
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  254. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,808 Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-13T10:40:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71932/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  255. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,000 Hotmail email and password combinations on a cybercrime forum. The post content is hidden behind a registration wall, suggesting free distribution to forum members.
    Date: 2026-04-13T10:39:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71933/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  256. Alleged data breach of American Express customer data
    Category: Data Leak
    Content: Indonesian Neo Nazi Group (INNG) allegedly leaked 200,000 records containing credit card data from multiple networks including American Express, Visa, Mastercard, and others. The leaked data includes card numbers, CVV codes, PINs, balances, expiration dates, and customer personal information in JSON and PDF formats totaling 258.42 MB.
    Date: 2026-04-13T10:36:21Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-COLLECTION-200-thousand-American-Express-user-data-breached
    Screenshots:
    None
    Threat Actors: INNG
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: American Express
    Victim Site: Unknown
  257. Alleged sharing of cookies from eBay and Google Pay
    Category: Data Leak
    Content: A threat actor allegedly shared authentication cookies from eBay and Google Pay services via a file hosting platform. The cookies could potentially be used for session hijacking and unauthorized account access.
    Date: 2026-04-13T10:20:29Z
    Network: openweb
    Published URL: https://breached.st/threads/cookies-ebay-googlepay-more.85975/unread
    Screenshots:
    None
    Threat Actors: bluestarcrack
    Victim Country: Unknown
    Victim Industry: E-commerce and Financial Services
    Victim Organization: eBay and Google Pay
    Victim Site: ebay.com and pay.google.com
  258. Alleged sale of fresh multi-country credential combolists targeting major e-commerce and service platforms
    Category: Combo List
    Content: A threat actor operating as mu is selling fresh credential databases/combolists covering multiple countries including UK, Germany, Japan, Netherlands, Brazil, Poland, Spain, US, and Italy. The actor claims to offer keyword-searchable credentials for major platforms including eBay, OfferUp, PSN, Booking.com, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. The actor also claims access to valid ntlworld webmails hosted on a private cloud infrastructure, available on request via DM.
    Date: 2026-04-13T10:18:33Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61735
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: Unknown
    Victim Industry: E-Commerce, Gaming, Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  259. Alleged sale of Windows RDP DoS exploit and FreeBSD FTP RCE exploit
    Category: Initial Access
    Content: Threat actor is selling two zero-day exploits: a Windows RDP denial-of-service exploit for $850 affecting 1M+ devices, and a FreeBSD FTP remote code execution exploit for $900 affecting 11,689 devices. Both exploits claim to work against multiple versions of their respective target systems.
    Date: 2026-04-13T10:18:16Z
    Network: openweb
    Published URL: https://breached.st/threads/0day-exploit-selling.85974/unread
    Screenshots:
    None
    Threat Actors: phanesthegreat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Alleged leak of Moscow citizens passport documents and identification data
    Category: Data Leak
    Content: Forum user shared a 500MB collection containing 200 Moscow citizens passport documents, including all passport pages, SNILS (Russian social security numbers), and INN (taxpayer identification numbers).
    Date: 2026-04-13T10:13:51Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DOCUMENTS-Photos-docs-Moscow-citizens-of-all-passport-pages-including-SNILS-INN
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Healthcare recruitment company says gardai probing ‘cyber security incident’ | ITV News
    Category: Cyber Attack
    Content: La société de recrutement dans le secteur de la santé Healthdaq a déclaré avoir été victime dun incident de cybersécurité. Lentreprise a signalé lévénement aux autorités réglementaires ainsi quau bureau national de lutte contre la cybercriminalité de la Garda. En raison de lenquête criminelle en cours, la société na pas pu fournir de détails supplémentaires sur la nature de lincident.
    Date: 2026-04-13T09:55:47Z
    Network: openweb
    Published URL: https://www.itv.com/news/utv/2026-04-11/healthcare-recruitment-company-says-gardai-probing-cyber-security-incident
    Screenshots:
    None
    Threat Actors:
    Victim Country: IR
    Victim Industry: Unknown
    Victim Organization: Healthdaq
    Victim Site: healthdaq.com
  262. GTA 6 Developer Rockstar Reportedly Hacked, Data Being Ransomed
    Category: Cyber Attack
    Content: Le groupe de hackers ShinyHunters a revendiqué avoir compromis les serveurs cloud de Rockstar Games via une faille chez le prestataire Anodot. Lentreprise a confirmé quune quantité limitée dinformations non matérielles a été accédée, tout en affirmant que cet incident nimpacte ni ses joueurs ni son organisation. Les pirates exigent le paiement dune rançon numérique avant le 14 avril 2026 sous peine de divulguer des données dentreprise sensibles.
    Date: 2026-04-13T09:55:43Z
    Network: openweb
    Published URL: https://kotaku.com/rockstar-games-reportedly-hacked-massive-data-leak-ransom-gta-6-shinyhunters-2000686858
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Rockstar Games
    Victim Site: rockstargames.com
  263. Spring Lake Park Schools Closed After Suspected Ransomware Attack – Spring Lake Park Today
    Category: Cyber Attack
    Content: Le district scolaire de Spring Lake Park, dans le Minnesota, a dû fermer lensemble de ses établissements ce lundi en raison dune suspicion dattaque par rançongiciel. Les autorités locales et des experts en cybersécurité enquêtent actuellement sur lincident pour déterminer létendue de la compromission des systèmes informatiques. Cette mesure préventive vise à protéger les données et à sécuriser les réseaux du district pendant que les efforts de restauration sont en cours.
    Date: 2026-04-13T09:55:40Z
    Network: openweb
    Published URL: https://nationaltoday.com/us/mn/spring-lake-park/news/2026/04/13/spring-lake-park-schools-closed-after-suspected-ransomware-attack-1/
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Spring Lake Park Schools
    Victim Site: springlakeparkschools.org
  264. Alleged sale of multi-country identity documents and personal databases
    Category: Combo List
    Content: Threat actor claims to offer various databases containing driver licenses, passports, SSNs, consumer information, phone numbers, and email lists from multiple countries. The actor provides Telegram contact for interested parties.
    Date: 2026-04-13T09:53:59Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-ALL-COUNTRIES-DRIVER-LICENSE-AVAILABLE-PASS-SSN-SIN-EIN-LLC-KYC-BYPASS-TOOL
    Screenshots:
    None
    Threat Actors: Jannatkhan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: User HollowKnight07 shared a sample of 695 Hotmail credentials as a free download on the CrackingX forum.
    Date: 2026-04-13T09:53:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71928/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  266. Alleged leak of mixed social media platform credentials
    Category: Combo List
    Content: Threat actor is distributing a 9 million record combolist containing credentials from multiple social media platforms including Myspace, Friendster, Orkut, Google+, Vine, and Bebo through Telegram channels.
    Date: 2026-04-13T09:52:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71929/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Multiple social media platforms
    Victim Site: Unknown
  267. Alleged leak of Yahoo credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.69 million Yahoo credentials through a file sharing platform. The credentials appear to be distributed as a free download on a cybercriminal forum.
    Date: 2026-04-13T09:52:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71930/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  268. Alleged sale of multiple personal data databases including SSN and identity documents
    Category: Data Breach
    Content: Threat actor jannatmirza11 is allegedly selling various databases containing personal information including full company databases, scanned identity documents, consumer information, phone lists, email lists, credentials, SSN/SIN numbers, and data from large websites via Telegram.
    Date: 2026-04-13T09:51:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71927/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Alleged ICS/BMS Takeover of Albert Most Velebudická Hypermarket by Z-Pentest Alliance
    Category: Cyber Attack
    Content: The pro-Russian hacktivist group Z-Pentest Alliance claims to have gained full control over the building management and industrial control systems of the Albert Most Velebudická hypermarket in the Czech Republic. The group states they control the boiler room, central heating, Trane industrial chillers, VZT ventilation, building-wide lighting, cold storage rooms including the Sahara specialized warehouse, climate control zones (produce department and server room), and entrance air curtains. They claim the intrusion was facilitated by weak network segmentation, outdated protocols, and unprotected management interfaces. The group threatens to destroy thousands of tons of food by disabling refrigeration systems, causing millions in economic damage. The attack is framed as retaliation against European entities supporting anti-Russian policies and aid to Ukraine. The group signals intent to continue targeting European critical food supply chain infrastructure.
    Date: 2026-04-13T09:32:07Z
    Network: telegram
    Published URL: https://t.me/c/2729466495/936
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: Czech Republic
    Victim Industry: Retail / Food Supply Chain
    Victim Organization: Albert Most Velebudická
    Victim Site: albert.cz
  270. Mass website defacement of lutimchange.com by Irene (XmrAnonye.id team)
    Category: Defacement
    Content: The website lutimchange.com was defaced by attacker Irene affiliated with the XmrAnonye.id team on April 13, 2026. This appears to be part of a mass defacement campaign and represents a redefacement of the target site.
    Date: 2026-04-13T09:27:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248443
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lutimchange.com
  271. Alleged leak of credential combolist containing 21.4 million records
    Category: Logs
    Content: A threat actor shared a credential combolist containing 21.4 million URL:login:password combinations totaling 1.2GB in size on a cybercrime forum.
    Date: 2026-04-13T09:24:59Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-Url-Log-Pass-21-400-621-M%C4%B1ll%C4%B1on-L%C4%B1nes-1-2gb
    Screenshots:
    None
    Threat Actors: StarLinkClub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  272. Website defacement of nihonnichi.site by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the nihonnichi.site website on April 13, 2026. The defacement targeted a specific page (b.html) rather than the main homepage.
    Date: 2026-04-13T09:21:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832474
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: nihonnichi.site
  273. Website defacement of China Acrylic Sheet company by DimasHxR
    Category: Defacement
    Content: The website of China Acrylic Sheet, a manufacturing company, was defaced by attacker DimasHxR on April 13, 2026. The defacement targeted a specific page (b.html) rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-13T09:18:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832477
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: China
    Victim Industry: Manufacturing
    Victim Organization: China Acrylic Sheet
    Victim Site: chinaacrylicsheet.com
  274. Website defacement of jingolmangol.ir by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the Iranian website jingolmangol.ir on April 13, 2026. This was an individual defacement targeting a specific page rather than a mass or home page attack.
    Date: 2026-04-13T09:11:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832473
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jingolmangol.ir
  275. ❄️❄️ 1370x PREMIUM HOTMAIL HITS ❄️❄️
    Category: Combo List
    Content: New thread posted by alphaxdd: ❄️❄️ 1370x PREMIUM HOTMAIL HITS ❄️❄️
    Date: 2026-04-13T09:01:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71926/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Alleged Cyber Attack on Nova-Tech Poultry ICS/SCADA Systems by DDoSia Project
    Category: Cyber Attack
    Content: The DDoSia Project (affiliated with NoName057(16)) claims to have breached and taken full control of industrial control systems at Nova-Tech Poultry (nteglobal.com/poultry/) in South Korea. The group alleges control over four modules (501, 502, 503, 504) responsible for infrared processing of chicken beaks, including injection rates, pump runtimes, motor cycles, and production lines. The attack is framed as part of #OpSouthKorea, a pro-Russian hacktivist campaign targeting South Korean infrastructure.
    Date: 2026-04-13T09:01:05Z
    Network: telegram
    Published URL: https://t.me/c/3087552512/1738
    Screenshots:
    None
    Threat Actors: DDoSia Project
    Victim Country: South Korea
    Victim Industry: Agriculture / Agro-Industrial
    Victim Organization: Nova-Tech Poultry
    Victim Site: nteglobal.com
  277. Alleged Netflix phishing link with encoded token parameter
    Category: Phishing
    Content: A suspicious Netflix URL was shared containing a heavily encoded nftoken parameter. The URL mimics a legitimate Netflix account page (netflix.com/account) but includes a base64-encoded token string that is characteristic of phishing kits, credential harvesting pages, or session hijacking attempts targeting Netflix users.
    Date: 2026-04-13T08:56:15Z
    Network: telegram
    Published URL: https://t.me/c/3896868760/323
    Screenshots:
    None
    Threat Actors: Brona Blanco
    Victim Country: Unknown
    Victim Industry: Entertainment / Streaming
    Victim Organization: Netflix
    Victim Site: netflix.com
  278. Alleged sale of fresh Telegram accounts for bulk use
    Category: Cyber Attack
    Content: A threat actor is selling fresh Telegram accounts from various countries, advertised as high durability and not frozen, suitable for mass-collected account operations. Sales are conducted via @ThreatMarketBot.
    Date: 2026-04-13T08:48:10Z
    Network: telegram
    Published URL: https://t.me/c/3881618514/53
    Screenshots:
    None
    Threat Actors: Threat Market
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Unknown
    Victim Site: telegram.org
  279. Alleged Cyberattack by Handala on Saudi Arabias Industrial Infrastructure
    Category: Cyber Attack
    Content: Threat actor group Handala has announced heavy cyberattacks currently underway against Saudi Arabias industrial infrastructure, describing the operation as a preemptive and warning action. The group states further details will be released in coming hours. No specific targets or technical indicators have been disclosed yet.
    Date: 2026-04-13T08:42:39Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/276
    Screenshots:
    None
    Threat Actors: Handala
    Victim Country: Saudi Arabia
    Victim Industry: Industrial / Critical Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  280. Alleged distribution of mixed stealer logs containing credentials
    Category: Combo List
    Content: Threat actor fatetraffic shared a collection of 1,900 mixed stealer logs dated April 13, 2026, made available as a free download via file sharing service.
    Date: 2026-04-13T08:40:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71924/
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  281. Alleged leak of USA drivers licenses
    Category: Data Leak
    Content: Threat actor claims to have leaked 16 USA drivers licenses (front only) and provides a Telegram contact for purchases, suggesting additional data may be available for sale.
    Date: 2026-04-13T08:38:45Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-16-USA-DL-FRONT-ONLY
    Screenshots:
    None
    Threat Actors: Dumbledorre
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Alleged Data Breach of Neiman Marcus by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have leaked an improved/updated Neiman Marcus database, sharing a link to a BreachForums thread where the data is available for download. No price mentioned, suggesting the data is being freely distributed.
    Date: 2026-04-13T08:35:58Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1107
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Retail
    Victim Organization: Neiman Marcus
    Victim Site: neimanmarcus.com
  283. Website defacement of just-on.com.ua by DimasHxR
    Category: Defacement
    Content: Ukrainian website just-on.com.ua was defaced by threat actor DimasHxR on April 13, 2026. The attack targeted a specific file (d.txt) rather than the main homepage.
    Date: 2026-04-13T08:32:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832460
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: just-on.com.ua
  284. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a free download link to a high-quality mixed credential combolist containing 2,000 email and password combinations on a cybercriminal forum.
    Date: 2026-04-13T08:17:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2K-HQ-MIX
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  285. Alleged Data Breach of Hallmark Cards, Inc. & Hallmark Plus by ShinyHunters
    Category: Data Breach
    Content: The threat actor group ShinyHunters claims to have compromised over 7.9 million records containing personally identifiable information (PII) belonging to Hallmark Cards, Inc. and Hallmark Plus. The group states that Hallmark failed to reach a ransom agreement despite multiple offers, and has subsequently made the data available for free download via a direct link to a .7z archive. The data is described as updated as of April 11, 2026.
    Date: 2026-04-13T08:17:49Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1103
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Consumer Goods / Retail
    Victim Organization: Hallmark Cards, Inc. & Hallmark Plus
    Victim Site: Unknown
  286. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4.7K mixed email credentials via file hosting service. The credentials appear to be from various sources and are being distributed for free download.
    Date: 2026-04-13T08:16:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71923/
    Screenshots:
    None
    Threat Actors: Kommander0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  287. Alleged Ransomware/Extortion Attack on Kemper Corporation by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have compromised over 13 million Salesforce records containing PII and internal corporate data belonging to Kemper Corporation. The group is demanding payment by April 14, 2026, threatening to publicly leak the data and cause additional digital problems if the ransom is not paid. A proof/listing is available on their .onion site. This appears to be a data extortion campaign without traditional ransomware encryption.
    Date: 2026-04-13T08:16:12Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1100
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Insurance / Financial Services
    Victim Organization: Kemper Corporation
    Victim Site: Unknown
  288. Alleged leak of Russian military casualty database
    Category: Data Leak
    Content: A forum user shared a database containing personal information of approximately 70,000 alleged Russian military casualties from the ongoing war. The data includes names, birth dates, death dates, locations, ages, military units, branches, and ranks of deceased personnel.
    Date: 2026-04-13T08:15:19Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Russian-death-in-the-war-70k
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Russian Armed Forces
    Victim Site: Unknown
  289. Alleged Data Breach and Leak of ZenBusiness, Inc. by ShinyHunters
    Category: Data Breach
    Content: The ShinyHunters threat group claims to have compromised several terabytes of data from ZenBusiness, Inc., sourced from Snowflake, Mixpanel, Salesforce, and other systems containing sensitive PII, financial/KYC data, and business data. After the company allegedly failed to reach a ransom agreement, 802GB+ (compressed) of data has been made available for free download via a direct link. The archive filename explicitly references ShinyHunters and a ransom demand. Data was last updated April 5, 2026.
    Date: 2026-04-13T08:14:13Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1097
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Business Services / Financial Services
    Victim Organization: ZenBusiness, Inc.
    Victim Site: Unknown
  290. Alleged cyber attack or defacement of karamastarfurniture.com
    Category: Defacement
    Content: Pharaohs Team market posted a link to karamastarfurniture.com marked as #sold, suggesting the compromise, defacement, or sale of access to this furniture company website has been completed.
    Date: 2026-04-13T08:01:44Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/480
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Unknown
    Victim Industry: Retail/Furniture
    Victim Organization: Karama Star Furniture
    Victim Site: karamastarfurniture.com
  291. Alleged leak of Yahoo.com credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.5 million Yahoo.com email and password combinations from mixed countries. The credentials are being distributed for free via a file hosting service.
    Date: 2026-04-13T07:53:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71922/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  292. Alleged defacement of oncologyclub.org by Cyber Darknay
    Category: Defacement
    Content: A threat actor identified as CYBER DARKNAY claims to have defaced oncologyclub.org, uploading a deface page at the specified URL. The post credits multiple Indonesian hacking groups including DEFACER INDONESIAN TEAM, HMEI7, Z_JAWA, Z_BLACK_HAT, and others as collaborators or supporters.
    Date: 2026-04-13T07:51:11Z
    Network: telegram
    Published URL: https://t.me/c/3755871403/222
    Screenshots:
    None
    Threat Actors: CYBER DARKNAY
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Oncology Club
    Victim Site: oncologyclub.org
  293. Alleged US Official Warning on Anthropic AI Model Glasswing Cyber Threat to Banking Sector
    Category: Cyber Attack
    Content: US senior officials have reportedly warned about cybersecurity risks posed by a new Anthropic AI model named Glasswing (Project Mythos), describing it as a threat to the US banking system and cybersecurity. An emergency meeting was held with executives from major US banks, Treasury Department, and Federal Reserve officials to discuss the technologys potential cyber intrusion capabilities and security risks. The US government is reportedly reviewing and strengthening protective measures against AI-driven threats.
    Date: 2026-04-13T07:42:21Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21180
    Screenshots:
    None
    Threat Actors: Glasswing (Project Mythos)
    Victim Country: United States
    Victim Industry: Banking & Finance
    Victim Organization: US Banking Sector / Federal Reserve
    Victim Site: Unknown
  294. Website defacement of rafiul.website by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced rafiul.website/b.html on April 13, 2026. This appears to be a single-target defacement with no apparent team affiliation or stated motivation.
    Date: 2026-04-13T07:41:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832408
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: rafiul.website
  295. Alleged Cyber Threat Against Italian Infrastructure by Infrastructure Destruction Squad
    Category: Cyber Attack
    Content: A threat actor group calling themselves Infrastructure Destruction Squad has issued a threat against Italy, claiming they will launch attacks against Italian infrastructure, factories, and facilities.
    Date: 2026-04-13T07:37:58Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/3984
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Italy
    Victim Industry: Critical Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  296. Alleged SQL Injection Attack on WRG College (wrgcollege.edu.in)
    Category: Cyber Attack
    Content: A threat actor using the handle Mr.SonicX, affiliated with TEGAL CYBER TEAM, claims to have performed a SQL injection attack against WRG Colleges website at wrgcollege.edu.in, targeting the gallery_img.php endpoint with an injectable id parameter.
    Date: 2026-04-13T07:36:04Z
    Network: telegram
    Published URL: https://t.me/c/3528849141/288
    Screenshots:
    None
    Threat Actors: Mr.SonicX
    Victim Country: India
    Victim Industry: Education
    Victim Organization: WRG College
    Victim Site: wrgcollege.edu.in
  297. Alleged leak of mixed domain combolist containing 46,000 credentials
    Category: Combo List
    Content: User WINGO shared a free download link to a combolist containing 46,000 email and password combinations from mixed domains on DemonForums.
    Date: 2026-04-13T07:32:06Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-46K-MIXED-DOMAINS
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  298. Alleged data breach of Live Nation / Ticketmaster by ShinyHunters – 560M Users and Card Details
    Category: Data Breach
    Content: Threat actor ShinyHunters is allegedly selling a 1.3TB dataset containing data from 560 million Live Nation/Ticketmaster users, including card details. The offer is listed on BreachForums with supporting media attachments.
    Date: 2026-04-13T07:32:00Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1092
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Entertainment / Ticketing
    Victim Organization: Live Nation / Ticketmaster
    Victim Site: Unknown
  299. Alleged distribution of corporate SMTP credential combolist
    Category: Combo List
    Content: Threat actor distributes a 7 million record credential combolist targeting corporate SMTP accounts through Telegram channels. The actor offers free access to the combolist and provides links to Telegram groups for obtaining the data.
    Date: 2026-04-13T07:30:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71921/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  300. Alleged data breach of FoodPapa.pk Pakistani food delivery platform
    Category: Data Leak
    Content: Threat actor claims to have leaked a complete database dump from Pakistani food delivery platform FoodPapa.pk containing 239,109 records including user credentials, driver information, and admin accounts with personal data such as names, phone numbers, email addresses, password hashes, and national ID numbers from a January 2026 backup.
    Date: 2026-04-13T07:29:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FoodPapa-pk-PWNED-239K-Records-Users-Drivers-Admin-DB-Fresh-2026-Leak
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Pakistan
    Victim Industry: Food Delivery
    Victim Organization: FoodPapa
    Victim Site: foodpapa.pk
  301. Alleged CIA Use of Pegasus Spyware in Deception Operation Targeting Iranian Officials
    Category: Malware
    Content: The London Times reportedly claimed that the CIA used NSO Groups Pegasus spyware during a deception operation to locate and recover a downed American pilot. According to the report, Pegasus was used to send spoofed messages appearing to originate from hacked devices to Iranian officials and IRGC members, falsely claiming the pilot had been found. Pegasus is capable of intercepting communications and covertly collecting data from mobile devices. The channels editorial note questions the credibility of the claim, noting that WhatsApp is not typically used for sensitive operational communications inside Iran.
    Date: 2026-04-13T07:26:25Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21178
    Screenshots:
    None
    Threat Actors: NSO Group
    Victim Country: Iran
    Victim Industry: Government / Military
    Victim Organization: IRGC / Iranian Officials
    Victim Site: Unknown
  302. Alleged Data Breach of Santander Bank Affecting Spain, Chile, and Uruguay by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters is selling an alleged dataset stolen from Santander Bank affecting customers across Spain, Chile, and Uruguay. The data purportedly includes 30 million customer records, 6 million account numbers with balances, 28 million credit card numbers, HR employee lists, and consumer citizenship information. The actor is offering a one-time sale at $1 million USD and has invited Santander itself to purchase the data. The listing is posted on BreachForums.
    Date: 2026-04-13T07:25:58Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1091
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Spain
    Victim Industry: Banking & Financial Services
    Victim Organization: Santander Bank
    Victim Site: santander.com
  303. Alleged data breach of Live Nation / Ticketmaster by ShinyHunters – 560M Users and Card Details
    Category: Data Breach
    Content: Threat actor ShinyHunters is allegedly selling a 1.3TB dataset containing data on 560 million Live Nation/Ticketmaster users, including card details. The data is being offered for sale on BreachForums.
    Date: 2026-04-13T07:19:04Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1090
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Entertainment / Ticketing
    Victim Organization: Live Nation / Ticketmaster
    Victim Site: ticketmaster.com
  304. Alleged data breach of National Credit Information Center of Vietnam (CIC) — 160M+ Records for Sale
    Category: Data Breach
    Content: A threat actor operating under the name Dedale Office is claiming to sell the full database of Vietnams National Credit Information Center (cic.gov.vn). The alleged dataset contains over 160 million records in CSV format, including full names, dates of birth, national ID numbers (CCCD/CMND), passport numbers, loan data, balances, debt information, tax IDs, company information, audit logs, and addresses. The data purportedly covers both individuals and companies from the national credit registry. Contact is provided via Telegram handle @DedaleSupport and channel @DedaleOfficials.
    Date: 2026-04-13T07:12:15Z
    Network: telegram
    Published URL: https://t.me/DedaleOfficials/222
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Vietnam
    Victim Industry: Government / Financial Services
    Victim Organization: National Credit Information Center of Vietnam (CIC)
    Victim Site: cic.gov.vn
  305. Alleged data leak of vegehome.pl customer database
    Category: Data Leak
    Content: Threat actor lulzintel shared a database dump from vegehome.pl containing over 100,000 customer records including names, email addresses, and hashed passwords. The data breach allegedly occurred in April 2026 and includes personal information and account credentials of Polish customers.
    Date: 2026-04-13T07:11:37Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-vegehome-pl-Leaked-Download
    Screenshots:
    None
    Threat Actors: lulzintel
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Vegehome
    Victim Site: vegehome.pl
  306. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 705 Hotmail email and password combinations on a cybercrime forum. The credentials are described as high quality and appear to be distributed for free.
    Date: 2026-04-13T06:55:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X705-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  307. Alleged distribution of credential combolists targeting Europe and USA
    Category: Combo List
    Content: Threat actor gsmfix is allegedly distributing high-quality credential combolists containing email and password combinations targeting users in Europe and USA regions. The post emphasizes the validity and quality of the credential data being made available.
    Date: 2026-04-13T06:55:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71917/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  308. Alleged leak of phone number and password credentials
    Category: Combo List
    Content: Forum post advertising phone number and password credential combinations described as high quality and private. The post lacks specific details about the source, scope, or distribution method of the credentials.
    Date: 2026-04-13T06:55:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71918/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  309. Alleged leak of WordPress site credentials
    Category: Combo List
    Content: Forum post claims to offer valid WordPress site URLs with corresponding login credentials. The post appears to be sharing credential lists for WordPress installations but does not specify the number of sites affected or provide additional details about the compromised sites.
    Date: 2026-04-13T06:55:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71919/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  310. Alleged leak of credential combolist in URL:LOGIN:PASS format
    Category: Combo List
    Content: A threat actor shared a credential combolist containing login credentials in URL:LOGIN:PASS format, described as high quality and private. The post appears to offer free access to the credential list without mentioning any payment.
    Date: 2026-04-13T06:31:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71914/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 93,476 unique German email and password combinations from 2026 on a cybercriminal forum.
    Date: 2026-04-13T06:30:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71915/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  312. Alleged distribution of mixed USA and Europe credential combolist
    Category: Combo List
    Content: Threat actor gsmfix shared an exclusive combolist containing mixed credentials from USA and Europe regions on a cybercriminal forum.
    Date: 2026-04-13T06:30:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71916/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  313. Alleged leak of Farmacias del Ahorro customer credentials
    Category: Data Leak
    Content: Threat actor Z3r00 claims to have leaked a credential list containing 18,530 records from Mexican pharmacy chain Farmacias del Ahorro, including email addresses and passwords. Sample credentials were provided as proof, with the actor offering the full dataset through Telegram contact.
    Date: 2026-04-13T06:04:38Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FARMACIAS-DEL-AHORRO-MX-18-530
    Screenshots:
    None
    Threat Actors: Z3r00
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: Farmacias del Ahorro
    Victim Site: fahorro.com
  314. Alleged leak of corporate email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 119,120 corporate email and password combinations through a file sharing service. The credentials are described as corporate mail password leaks from 2026.
    Date: 2026-04-13T05:46:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71912/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  315. Alleged distribution of credential combolists targeting corporate email accounts
    Category: Combo List
    Content: Threat actor distributes corporate email credential combolists through Telegram channels, offering free access to credential lists and associated cracking tools.
    Date: 2026-04-13T05:45:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71913/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  316. Alleged data breach of Ukrainian Information Resource Center
    Category: Data Breach
    Content: Threat actor StuffedAnimals is allegedly selling a database from ircenter.gov.ua containing approximately 600,000 records of personal information including childrens educational records, birth certificates, and parent information. The data appears to be from Ukrainian educational institutions and contains sensitive personal details of families.
    Date: 2026-04-13T05:00:45Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-ircenter-gov-ua-database-600k-lines-json
    Screenshots:
    None
    Threat Actors: StuffedAnimals
    Victim Country: Ukraine
    Victim Industry: Government
    Victim Organization: Ukrainian Information Resource Center
    Victim Site: ircenter.gov.ua
  317. Alleged sale of XSS vulnerabilities targeting multiple companies
    Category: Initial Access
    Content: Threat actor SysInvaders is selling reflected XSS vulnerabilities affecting four companies across Sweden, Norway, and Poland in various industries including electric equipment, home improvement, consumer electronics, and price comparison services. Payment is accepted in XMR and BTC cryptocurrencies.
    Date: 2026-04-13T05:00:42Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Reflected-XSS-Vulnerabilities
    Screenshots:
    None
    Threat Actors: SysInvaders
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  318. Alleged leak of mixed credential combolist containing 44,478 records
    Category: Combo List
    Content: Threat actor stormtrooper shared a fresh mixed combolist containing 44,478 email and password combinations on DemonForums. The actor also provided Telegram contact information for further communication.
    Date: 2026-04-13T04:14:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-44-478-Lines-Fresh-Mix-Combolist
    Screenshots:
    None
    Threat Actors: stormtrooper
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  319. Alleged leak of mixed credential combolist containing 44,478 records
    Category: Combo List
    Content: A threat actor leaked a mixed combolist containing 44,478 credential pairs on a cybercriminal forum. The actor also promoted their Telegram channel for additional content.
    Date: 2026-04-13T04:12:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71911/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  320. Alleged leak of Hotmail credential combolist containing 43,000 records
    Category: Combo List
    Content: A threat actor shared a combolist containing 43,000 Hotmail email and password combinations on a cybercrime forum. The credentials are claimed to be valid and sourced from various forums.
    Date: 2026-04-13T03:32:05Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%99%8B-43k-HOTMAIL-Base-With-Valid-FORUMS-%E2%99%8B-2
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  321. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.1 million Hotmail credentials through a file sharing service. The actor claims these are fresh leaks targeting Hotmail streaming accounts.
    Date: 2026-04-13T03:31:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71908/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  322. Alleged leak of Hotmail credentials on cybercrime forum
    Category: Combo List
    Content: A threat actor shared a combolist containing 43,000 Hotmail email credentials on a cybercrime forum. The post indicates these are valid credentials specifically targeting forum accounts.
    Date: 2026-04-13T03:31:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71909/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  323. Alleged sale of stolen credit cards (CC/CVV) via Telegram
    Category: Data Leak
    Content: Multiple actors advertising stolen credit cards (CC) and CVV data in a marketplace channel. Coleman advertises worlds best CC, 24/7, 100% alive, high balance directing to t.me/genhaosan123. Hana6 promotes a CVV benefits chat group via @nzccg001. These are typical carding marketplace advertisements offering stolen payment card data.
    Date: 2026-04-13T03:15:15Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61511
    Screenshots:
    None
    Threat Actors: genhaosan123
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  324. Alleged data leak of Florida Department of State database
    Category: Data Leak
    Content: Forum post claims involvement of Florida Department of State database leak, but no specific details about the data type, record count, or nature of the incident are provided in the available content.
    Date: 2026-04-13T03:14:05Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-The-Florida-Department-of-State-Database-Leak
    Screenshots:
    None
    Threat Actors: Rabid
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Florida Department of State
    Victim Site: Unknown
  325. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a credential list containing Hotmail email and password combinations through Telegram. The actor claims the credentials are valid and from a private cloud source.
    Date: 2026-04-13T02:38:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X666-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  326. Alleged distribution of credential lists for multiple social media platforms
    Category: Combo List
    Content: Threat actor is distributing credential lists (combolists) for eight different social media platforms through Telegram channels. The actor claims to have 8 million credential combinations available for free distribution.
    Date: 2026-04-13T02:37:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71906/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Multiple (Bluesky, Lemon8, Kick, Spill, Artifact, Geneva, Hive Social, Post.news)
    Victim Site: Unknown
  327. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: Forum post advertising valid Hotmail credentials described as UHQ (Ultra High Quality) with contact via Telegram. The post appears to be offering access to Hotmail email credentials, though specific details about quantity and distribution method require forum registration to view.
    Date: 2026-04-13T02:37:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71907/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  328. Alleged data breach of Mihnati career platform exposing 627k Saudi Arabian PII records
    Category: Data Breach
    Content: Threat actor claims to have breached Mihnati career platform database containing 627k PII records including emails, names, dates of birth, phone numbers, addresses and other personal information of Saudi Arabian job seekers and candidates. The structured dataset appears to be from a CRM system with comprehensive contact and profile information.
    Date: 2026-04-13T02:36:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-627k-Saudi-Arabia-https-www-mihnati-com-FULL-CRM-PII-DATASET-Email-Name-dob-pho
    Screenshots:
    None
    Threat Actors: Databroker1
    Victim Country: Saudi Arabia
    Victim Industry: Human Resources
    Victim Organization: Mihnati
    Victim Site: mihnati.com
  329. Alleged data breach of Chinese football gambling platform
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 3.2 million records from a Chinese football match gambling platform. The data includes player IDs, phone numbers, carrier information, financial data, and IP addresses.
    Date: 2026-04-13T02:36:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Chinese-football-match-gambling-3200000
    Screenshots:
    None
    Threat Actors: dataPenetrationA
    Victim Country: China
    Victim Industry: Gaming/Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  330. Alleged sale of SEKISUI Aerospace Corporation technical data
    Category: Data Breach
    Content: Threat actor is selling alleged confidential military and aerospace technical data from SEKISUI Aerospace Corporation for $200,000. The data reportedly contains engineering drawings, technical specifications, and Boeing part information marked as export-controlled.
    Date: 2026-04-13T02:36:21Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-US-JP-Confidential-Military-SEKISUI-Aerospace-Corporation-Data
    Screenshots:
    None
    Threat Actors: nxe
    Victim Country: United States
    Victim Industry: Aerospace
    Victim Organization: SEKISUI Aerospace Corporation
    Victim Site: Unknown
  331. Alleged data leak of IFprofs.org database
    Category: Data Leak
    Content: Threat actor ChimeraZ leaked a 42.8 MB database dump of IFprofs.org containing 110,276 records including user profiles, publications, comments, discussions, and webinars in JSON format. The data includes personal information such as names, countries, email addresses, and educational content.
    Date: 2026-04-13T02:36:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-110-276-IFprofs-org
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Education
    Victim Organization: IFprofs.org
    Victim Site: ifprofs.org
  332. Alleged sale of live high-balance stolen credit cards via Telegram
    Category: Cyber Attack
    Content: Multiple posts in the channel advertise the sale of stolen credit cards (CC/CVV), claiming to offer 100% alive, high balance cards available 24/7. The seller directs buyers to the Telegram channel t.me/genhaosan123. Additional posts reference a CVV benefits chat group (@nzccg001), indicating an active carding marketplace operation.
    Date: 2026-04-13T02:17:14Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61473
    Screenshots:
    None
    Threat Actors: genhaosan123
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  333. Alleged leak of credential logs by threat actor BradMax
    Category: Data Leak
    Content: Threat actor BradMax leaked 1,000 credential logs from March 2026 as free samples on a dark web forum. The actor operates a Telegram channel for distributing free logs and offers additional logs through an automated bot service.
    Date: 2026-04-13T02:15:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-LEAK-FREE-TEST-LOGS-1000-logs-March-2026-samples
    Screenshots:
    None
    Threat Actors: BradMax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Alleged leak of Iranian IRGC and Basij personnel database
    Category: Data Leak
    Content: A threat actor leaked a database containing personnel information of Iranian Revolutionary Guard Corps (IRGC) and Basij members, including full names, national ID codes, addresses, ranks, and phone numbers. A sample of the data was made available for download.
    Date: 2026-04-13T02:14:16Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-IRGC-and-BASIJ-PERSONNEL-INFORMATION-DATABASE
    Screenshots:
    None
    Threat Actors: infinityteam
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: IRGC and Basij
    Victim Site: Unknown
  335. Alleged sale of private cloud Hotmail combolists and geo-specific credential datasets
    Category: Combo List
    Content: A threat actor is offering for sale private cloud combolists described as UHQ (ultra-high quality) Hotmail credentials along with geo-specific datasets covering multiple countries (DE, FR, IT, BR, UK, US, JP, PL, RU, ES, NL, MX, CA, SP, SG) and multiple platforms including Kleinanzeigen, eBay, Reddit, Poshmark, Depop, Walmart, Amazon, and Uber. The seller claims access to a private cloud database and is targeting serious buyers only.
    Date: 2026-04-13T02:02:48Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61481
    Screenshots:
    None
    Threat Actors: Wěilóng
    Victim Country: Unknown
    Victim Industry: E-commerce, Technology, Retail
    Victim Organization: Hotmail, Walmart, eBay, Amazon, Uber, Poshmark, Depop, Reddit, Kleinanzeigen
    Victim Site: Unknown
  336. Alleged defacement of Indian website myseba.in by #OpsShadowStrike
    Category: Defacement
    Content: The hacktivist group #OpsShadowStrike, in collaboration with multiple groups including TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, CyberActivistMalaysia, AskarBadai, TheSweetNight, and Noheartz, claims to have defaced an Indian website (myseba.in). The defacement page is hosted at https://myseba.in/ops.html. The attack appears politically motivated, referencing pro-Palestine and anti-Israel sentiments under the #AllMuslimHackers banner.
    Date: 2026-04-13T01:32:47Z
    Network: telegram
    Published URL: https://t.me/c/3844432135/309
    Screenshots:
    None
    Threat Actors: #OpsShadowStrike
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: myseba.in
    Victim Site: myseba.in
  337. Alleged leak of German email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 92,457 unique email and password combinations allegedly targeting German users. The credentials are described as being from 2026 and made available for download on a cybercrime forum.
    Date: 2026-04-13T01:13:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71904/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  338. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 523,233 credential pairs specifically targeting Hotmail email accounts. The data was made available as a free download via a file sharing service.
    Date: 2026-04-13T01:13:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71905/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  339. Alleged sale of PDF exploit kit targeting multiple email providers
    Category: Initial Access
    Content: Threat actor selling a PDF-based exploit kit for $60 that claims to bypass detection and work with various RATs, worms, and botnets. The exploit reportedly supports multiple email providers and browsers across Windows systems.
    Date: 2026-04-13T00:51:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71903/
    Screenshots:
    None
    Threat Actors: coreex
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  340. Alleged defacement of Uruguay Ministry of Environment and Electronic Sworn Statement System
    Category: Defacement
    Content: A threat actor claiming affiliation with Nullsec Philippines has allegedly defaced two Uruguayan government websites: the Ministry of Environment (ambiente.gub.uy) and the Electronic Sworn Statement System (jutep.gub.uy). Defacement proof files are hosted at the target URLs and confirmed via Zone-H mirrors (IDs 41686677 and 41686676). The defacement carries a #StopWAR political message.
    Date: 2026-04-13T00:36:58Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/908
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Uruguay
    Victim Industry: Government
    Victim Organization: Ministry of Environment of Uruguay / Electronic Sworn Statement System (JUTEP)
    Victim Site: ambiente.gub.uy, dje.jutep.gub.uy
  341. Alleged data breach of Iraq census database
    Category: Data Breach
    Content: Threat actor claims to be selling Iraqs 2025-2026 census data containing personal information of 47,766,792 individuals for $1200. The data allegedly covers Iraqs population of 46.1 million people.
    Date: 2026-04-13T00:32:33Z
    Network: openweb
    Published URL: https://breached.st/threads/iraqs-2025-2026-census-data-has-been-leaked-47-766-792.85972/unread
    Screenshots:
    None
    Threat Actors: ahmadxalil
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Iraq Government Census Department
    Victim Site: Unknown
  342. Alleged distribution of credential combolist containing 11 million records
    Category: Combo List
    Content: Threat actor CODER is distributing a credential combolist containing 11 million records through Telegram channels. The actor operates multiple Telegram groups offering free credential lists and programs to registered forum members.
    Date: 2026-04-13T00:30:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71902/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  343. Alleged sale of stolen credit cards via Telegram carding service
    Category: Cyber Attack
    Content: A user advertised what appears to be a carding service claiming to offer stolen credit cards described as 100% alive with high balances, available 24/7, directing users to a Telegram channel (t.me/genhaosan123).
    Date: 2026-04-13T00:12:45Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/61425
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  344. Alleged distribution of proxy scraping tool for cybercriminal activities
    Category: Initial Access
    Content: Cybercriminal distributes GhostLine Proxy Scraper v3.1 tool capable of harvesting 50,000+ daily proxies from 400+ sources with 85% live proxy rate. Tool enables anonymization infrastructure for potential cybercriminal operations.
    Date: 2026-04-13T00:10:01Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1-GHOSTLINE-PROXY-SCRAPER-v3-1-Fresh-Fast-300-Sources-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: haxerx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  345. Alleged leak of California identification documents with selfie verification
    Category: Data Leak
    Content: Threat actor DataIntel allegedly shared California identification documents paired with selfie photos on a cybercriminal forum. The post appears to offer free access to identity verification materials.
    Date: 2026-04-13T00:03:05Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Free-USA-California-ID-Selfie
    Screenshots:
    None
    Threat Actors: DataIntel
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown