[April-15-2026] Daily Cybersecurity Threat Report

1. Executive Summary

During the period of April 15–16, 2026, the global threat landscape was dominated by several high-impact events. Notably, the alleged breach of Serasa Experian, exposing the personal records of over 223 million Brazilian citizens, stands as a primary concern due to its sheer scale and depth of sensitive information. Concurrently, financial institutions in South Africa (Standard Bank and Liberty Holdings) faced significant data exfiltration, while governmental portals in Pakistan and Russia suffered leaks of sensitive personnel and border crossing records.

The proliferation of “combolists”—massive aggregations of stolen credentials—reached extreme volumes, with single datasets containing up to 27.8 million records being distributed freely or sold for profit. This suggests a robust underground economy fueled by automated credential stuffing and information-stealing malware.


2. Major Data Breaches and Critical Leaks

The most severe category of incidents involved the unauthorized access and sale of institutional and national databases.

2.1 National and Citizens’ Data Exposure

  • Brazil (Serasa Experian): Threat actor ShinyHunters advertised a 1.8TB restored database dump containing the records of 223 million Brazilian citizens. The data included highly sensitive fields such as CPF (tax ID), names, email, phone, income, marital status, and national ID (RG). The asking price was set at $10,000 USD.
  • Russia (Federal Border Service): An alleged leak of the “Kordon” border monitoring system exposed approximately 1.098 billion records covering border crossings between 2014 and 2023. This dataset included personal details of 79.5 million unique individuals, including foreign nationals.
  • Vietnam (National Credit Information Center): ShinyHunters also claimed to be selling 160 million records from the CIC for $75,000 USD, including loan data, national ID numbers, and audit logs.
  • Iraq (National Census): An alleged leak of Iraq’s 2025–2026 national census database, impacting 47.7 million records, was offered for sale at $1,200.

2.2 Financial and Corporate Sectors

  • South Africa (Standard Bank & Liberty Holdings): Actor ROOTBOY claimed to have compromised these systems for over three weeks, exfiltrating 1.2 TB of data including 154 million rows of customer PII.
  • Canada (Gestion Kronos): A SQL database containing 1.6 million records with comprehensive personal and employment details was leaked.
  • Mexico (BePrime Cybersecurity): Over 10GB of data was leaked from this cybersecurity firm, including Meraki API keys for over 1,800 devices and financial data from clients like Alsea and Bafar.

3. The Credential Trafficking Ecosystem

A significant portion of the reported activity involved “combolists”—collections of email:password or username:password pairs used for account takeover (ATO) attacks.

3.1 Massive-Scale Credential Dumps

ActorContent/TargetRecord CountSource/Notes
DaxusUHQ+ Credential Pairs27.86 MillionDistributed via Telegram
VitVitURL:Login:Password21.4 Million1.2GB dataset
straduMixed Email/Pass15.2 MillionAggregated series (#352-367)
CODERLatin America/Africa11 MillionRegional targeting
CODEROffice 365 & Apple8 MillionTargeted cloud services

3.2 Targeted Domain and Regional Leaks

German users were heavily targeted, with multiple leaks including 1.1 million shopping credentials and over 1.09 million domain-specific pairs shared by actor HQcomboSpace. Additionally, actor CobraEgy released high-quality regional lists for Italy (947k), Latvia (49k), Israel (25k), and Ireland (19k).


4. Malware and Offensive Tooling Distribution

Threat actors are actively sharing and selling capabilities to facilitate further compromises.

  • Ransomware-as-a-Service (RaaS) Trends: The Infrastructure Destruction Squad announced the completion of a deal for a ransomware-building tool. Concurrently, Autovista reported an active ransomware attack disrupting its systems in Europe and Australia.
  • Information Stealers: Fresh distributions of Trap Stealer 2025 and Armageddon Stealer 1.0 were identified. These tools are specifically designed to harvest session cookies, payment info, and credentials from infected browsers.
  • Vulnerability Exploitation:
    • Google Chrome: A critical RCE vulnerability in older versions was reported to be exploited in the wild.
    • Juniper Networks: A critical flaw stemming from default credentials was identified, potentially allowing full device takeovers.
    • TerraMaster: A zero-day exploit for pre-authentication Remote Code Execution (RCE) on NAS devices was offered for sale.

5. Website Defacements and Hacktivism

The actor chinafans (affiliated with 0xteam) and Nicotine (affiliated with Umbra Community) were responsible for hundreds of defacements targeting a wide range of industries including construction, healthcare, and retail.

  • Geographic Spread: Victims were located in the US, UAE, Australia, Chile, India, and Taiwan.
  • Target Diversity: From local flooring companies like Epoxy San Francisco to specialized firms like Luca Bio Analytics.

6. Industry-Specific Impact Summary

IndustryKey IncidentsPotential Impact
Financial ServicesSerasa Experian, Standard Bank, Banco DaviviendaMassive identity theft, financial fraud, loss of consumer trust.
GovernmentRussian Border Service, Pakistan Government Portal, Iraq CensusIntelligence gathering, exposure of government personnel, national security risks.
TechnologyBePrime Cybersecurity, Juniper Networks, Google ChromeCascading supply chain risks, exposure of client network infrastructure.
HealthcareHospital Angeles Mexico, Dr. RP Singh OrthoSensitive patient data exposure, medical history leaks.
EducationUniversitas Indonesia (Doxxing), Insei.fr, Centro Regional NormalExposure of minor/student PII, harassment of individuals.

7. Recommendations

Based on the incidents analyzed, the following mitigation strategies are recommended:

  1. Credential Protection: Organizations must enforce Multi-Factor Authentication (MFA) and monitor for compromised credentials found in underground combolists.
  2. Patch Management: Immediate updates are required for Google Chrome and Juniper Networks equipment to prevent RCE and device takeovers.
  3. Data Minimization: Financial and government agencies should review data retention policies to minimize the impact of massive exfiltrations like the Serasa Experian event.
  4. Credential Integrity: Change all default credentials on network and IoT infrastructure to prevent easy initial access.
  5. Supply Chain Audits: Companies using third-party services (e.g., Snowflake, Anodot) must conduct rigorous security audits of these providers’ access controls.

8. Conclusion

The cybersecurity landscape in mid-April 2026 was marked by extreme volatility. The transition from individual breaches to the mass-monetization of national databases represents a significant escalation in threat actor ambition. ShinyHunters and various “combolist” distributors have commodified personal identity on a global scale. As offensive tools like RCE exploits and sophisticated stealers become more accessible via Telegram and criminal forums, the window for response narrows. Proactive defense through MFA, rapid patching, and comprehensive threat intelligence monitoring is now the only viable path to resilience.

Detected Incidents Draft Data

  1. Alleged data breach of Standard Bank and Liberty Holdings
    Category: Data Breach
    Content: Threat actor ROOTBOY claims to have gained access to Standard Bank and Liberty Holdings systems for over 3 weeks in late February, compromising multiple platforms including SharePoint, databases, and native applications. The actor is releasing 1.2 TB of data including 154 million rows of SQL data containing customer personal information such as names, addresses, phone numbers, email addresses, and account details.
    Date: 2026-04-15T23:41:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Standard-Bank-Liberty-Holdings-Databreach
    Screenshots:
    None
    Threat Actors: ROOTBOY
    Victim Country: South Africa
    Victim Industry: Financial Services
    Victim Organization: Standard Bank and Liberty Holdings
    Victim Site: Unknown
  2. Alleged leak of mixed email and user credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 160,000 email:password and username:password combinations from various email providers including AOL, Yahoo, Hotmail, and Outlook across multiple countries. The actor also advertises selling additional credential lists via Telegram.
    Date: 2026-04-15T23:34:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72239/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,340 Hotmail email and password combinations from mixed countries for free download on an underground forum.
    Date: 2026-04-15T23:34:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72241/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  4. Alleged data leak of Wattpad user database
    Category: Data Leak
    Content: A threat actor shared a cleaned CSV version of what they claim is the full Wattpad MySQL database dump, containing comprehensive user information including credentials, personal details, and account data. The compressed file is reported to be 22.2GB and includes fields such as usernames, passwords, emails, creation dates, and various profile information.
    Date: 2026-04-15T23:34:13Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Wattpad-Database-Cleaned-into-CSV
    Screenshots:
    None
    Threat Actors: StrawberryJam
    Victim Country: Canada
    Victim Industry: Technology
    Victim Organization: Wattpad
    Victim Site: wattpad.com
  5. Alleged Sale of Serasa Experian Full Database Containing 223 Million Brazilian Citizens Records
    Category: Data Breach
    Content: Threat actor ShinyHunters (handle @shinyc0rpsss) is selling a claimed full MSSQL database dump from Serasa Experian containing records on over 223 million Brazilian citizens. The dataset is 400GB compressed (1.8TB restored) and includes highly sensitive PII fields: CPF (Brazilian tax ID), full name, email, phone, address, date of birth, income, gender, marital status, RG (national ID), voter registration, Mosaic scoring segments, and more. Price is $10,000 USD. Contact via Telegram, Tutamail, Tox, and Session IDs provided.
    Date: 2026-04-15T23:10:16Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6815
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Brazil
    Victim Industry: Financial Services / Credit Bureau
    Victim Organization: Serasa Experian
    Victim Site: Unknown
  6. Alleged data breach of Serasa Experian — 223 Million Brazilian Citizens PII for Sale
    Category: Data Breach
    Content: Threat actor ShinyHunters is selling an alleged full MSSQL database backup (.bak) of Serasa Experian containing records on over 223 million Brazilian citizens. The dataset is 400GB compressed (1.8TB restored) and includes highly sensitive PII fields: CPF (Brazilian tax ID), full name, email, phone, address, date of birth, income, gender, RG (national ID), voter registration, marital status, parental names, Mosaic segmentation scores, and more. The asking price is $10,000 USD. Contact methods include Telegram (@shinyc0rpsss), email ([email protected]), Tox, and Session IDs.
    Date: 2026-04-15T23:09:55Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1190
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Brazil
    Victim Industry: Financial Services / Credit Bureau
    Victim Organization: Serasa Experian
    Victim Site: Unknown
  7. Alleged leak of Netflix, Steam, and other gaming/streaming service credentials
    Category: Combo List
    Content: Threat actor Ra-Zi shared a combolist containing 160,000 email and password combinations allegedly valid for multiple streaming and gaming platforms including Netflix, Steam, Hulu, and Spotify. The actor also advertises selling additional credential lists through Telegram contact.
    Date: 2026-04-15T22:53:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-160k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–200581
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Entertainment and Gaming
    Victim Organization: Netflix, Minecraft, Uplay, Steam, Hulu, Spotify
    Victim Site: Unknown
  8. Alleged data breach of Hospital Angeles Mexico
    Category: Data Breach
    Content: Threat actor claims to be selling approximately 11GB of Hospital Angeles patient data including names, laboratory studies, and medical results. Hospital Angeles is a private hospital network in Mexico serving middle to high socioeconomic populations.
    Date: 2026-04-15T22:52:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-M%C3%A9xico-Hospital-Angeles
    Screenshots:
    None
    Threat Actors: cuatlicue
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: Hospital Angeles
    Victim Site: Unknown
  9. Alleged sale of non-VBV credit card data for fraudulent transactions
    Category: Data Breach
    Content: Threat actor offers non-VBV credit card data compatible with Apple Pay and various payment platforms, claiming cards work for multiple merchants and offering guarantees with refund/replacement policies.
    Date: 2026-04-15T22:29:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Live-non-vbv-cc-%E2%9C%85%E2%9C%85%E2%9C%85-Non-vbv-cc-Apple-Pay-CC–200574
    Screenshots:
    None
    Threat Actors: yidat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 allegedly valid Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-15T22:28:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-Just-Valid-Hotmail-Mail-Access-16-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  11. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 allegedly valid Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-15T22:28:06Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-Just-Valid-Hotmail-Mail-Access-16-04–200571
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  12. Alleged leak of Canadian email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing email and password credentials allegedly belonging to Canadian users. The post indicates high quality credentials but no specific record count or victim organization details were provided.
    Date: 2026-04-15T22:27:53Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-CANADA-EMAILPASS-COMBOLIST-txt–188314
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged leak of German email credentials combolist
    Category: Combo List
    Content: A threat actor is allegedly distributing a combolist containing email and password credentials targeting German users. The post lacks detailed content but the thread title indicates high-quality German credential data is being shared.
    Date: 2026-04-15T22:27:37Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-GERMANY-EMAILPASS-COMBOLIST-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged sale of non-VBV credit card data for payment fraud
    Category: Combo List
    Content: Threat actor allegedly selling non-VBV (Verified by Visa) credit card data for use with various payment platforms including Apple Pay, PayPal, Amazon, and eBay. Actor claims cards work for multiple online services and offers guarantees with refund or replacement policies.
    Date: 2026-04-15T22:27:28Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Live-non-vbv-cc-%E2%9C%85%E2%9C%85%E2%9C%85-Non-vbv-cc-Apple-Pay-CC-l
    Screenshots:
    None
    Threat Actors: yidat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged sale of non-VBV credit card data for fraudulent transactions
    Category: Combo List
    Content: Threat actor advertising non-VBV (non-Verified by Visa) credit card data for use in fraudulent transactions across multiple platforms including Apple Pay, PayPal, Amazon, and eBay. The actor claims to provide cards that work globally without OTP verification and offers guarantees with refund or replacement policies.
    Date: 2026-04-15T22:26:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Live-non-vbv-cc-%E2%9C%85%E2%9C%85%E2%9C%85-Non-vbv-cc-Apple-Pay-CC-l–200577
    Screenshots:
    None
    Threat Actors: yidat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Alleged leak of Italian email credentials combolist
    Category: Combo List
    Content: A threat actor shared a high-quality Italian email and password combolist on a cybercrime forum. The post contains no additional details about the source or scope of the credential list.
    Date: 2026-04-15T22:25:58Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-ITALY-EMAILPASS-COMBOLIST-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged sale of non-VBV credit card data for fraudulent transactions
    Category: Data Breach
    Content: Threat actor advertising sale of non-VBV (Verified by Visa) credit card data for use in fraudulent transactions across multiple payment platforms including Apple Pay, PayPal, Amazon, and eBay. The actor claims to offer country-specific cards and guarantees refunds for non-working cards.
    Date: 2026-04-15T22:25:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Live-non-vbv-cc-%E2%9C%85%E2%9C%85%E2%9C%85-Non-vbv-cc-Apple-Pay-CC–200572
    Screenshots:
    None
    Threat Actors: yidat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged sale of non-VBV credit card data for fraudulent transactions
    Category: Data Breach
    Content: Threat actor advertising sale of non-VBV (Verified by Visa) credit card data claiming compatibility with various payment platforms including Apple Pay, PayPal, Cash App, and major e-commerce sites. The actor offers guarantees of refund or replacement for non-functional cards and provides contact via Telegram.
    Date: 2026-04-15T22:24:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Live-non-vbv-cc-%E2%9C%85%E2%9C%85%E2%9C%85-Non-vbv-cc-Apple-Pay-CC–200573
    Screenshots:
    None
    Threat Actors: yidat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged leak of mixed email and password combolist
    Category: Combo List
    Content: A threat actor shared a mixed email and password combolist on an underground forum. No specific details about the source, size, or victims are provided in the available content.
    Date: 2026-04-15T22:24:20Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-MIXED-EMAILPASS-COMBOLIST-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor shared a combolist containing 1,000 allegedly valid Hotmail email account credentials dated April 16th on an underground forum.
    Date: 2026-04-15T22:23:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72237/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  21. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 470,860 Hotmail credentials via file sharing platform. The actor claims these are fresh leaks targeting streaming services.
    Date: 2026-04-15T22:23:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72238/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  22. Alleged leak of UK credential combolist
    Category: Combo List
    Content: Actor ShroudX shared a UK email:password combolist on cybercriminal forum. The actor also promotes various illegal services including credential lists, leads, phone numbers, and cracking tools via Telegram channels.
    Date: 2026-04-15T22:22:43Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-UK-EMAILPASS-COMBOLIST-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged leak of MySpace credentials combolist
    Category: Combo List
    Content: A threat actor shared a CSV file containing 300 million MySpace records with usernames, emails, and cracked passwords from the original MySpace breach. The data is provided as a free download compressed with zstd format.
    Date: 2026-04-15T22:22:25Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-MySpace-Username-Email-Password-300kk–188321
    Screenshots:
    None
    Threat Actors: StrawberryJam
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: MySpace
    Victim Site: myspace.com
  24. Alleged leak of credential logs via cloud storage
    Category: Combo List
    Content: Threat actor NEW_DAISYCLOUD shared 5,539 credential logs via cloud storage platform, distributed for free download with password protection.
    Date: 2026-04-15T21:56:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72236/
    Screenshots:
    None
    Threat Actors: NEW_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged leak of Philippines travel clearance database
    Category: Data Leak
    Content: User shared what appears to be a database containing Philippines travel clearance records with personal information including full names, addresses, contact numbers, email addresses, and application details.
    Date: 2026-04-15T21:56:18Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-TRAVEL-CLEARANCE-PHILIPPINES-3M-ROW
    Screenshots:
    None
    Threat Actors: sh1nnysp1d3r0x
    Victim Country: Philippines
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor named VegaMoon shared a combolist containing 22,692 Hotmail email and password combinations on an underground forum. The credentials are described as fresh, suggesting they may be recently obtained or validated.
    Date: 2026-04-15T21:52:43Z
    Network: openweb
    Published URL: https://xforums.st/threads/22-692-hotmail-fresh-combolist.608445/
    Screenshots:
    None
    Threat Actors: VegaMoon
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  27. Alleged distribution of stealer logs containing credentials
    Category: Logs
    Content: Actor UP_DAISYCLOUD distributed a collection of 5,539 stealer logs dated April 16 via cloud storage platform. The logs likely contain stolen credentials and browser data harvested by information stealing malware.
    Date: 2026-04-15T21:35:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5539-LOGS-CLOUD-%E2%98%81-16-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged purchase request for Gmail credential lists
    Category: Initial Access
    Content: Threat actor requesting to purchase Gmail credential lists for alleged email deliverability testing purposes. The actor claims they only need temporary access without changing passwords or accessing account contents.
    Date: 2026-04-15T21:33:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-BUYING-Gmail-combos-that-actually-work
    Screenshots:
    None
    Threat Actors: JazzWizardry
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  29. Alleged request to purchase Gmail and Outlook credential lists
    Category: Data Breach
    Content: Threat actor seeks to purchase working email credential combinations for Gmail and Outlook accounts for alleged deliverability testing purposes. The actor claims they will not compromise the accounts but requires verified working credentials.
    Date: 2026-04-15T21:32:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-BUYING-email-combos-that-actually-work
    Screenshots:
    None
    Threat Actors: JazzWizardry
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Gmail and Outlook
    Victim Site: gmail.com
  30. Alleged Sale of Ransomware-Building Tool by Infrastructure Destruction Squad
    Category: Malware
    Content: A threat actor operating under the Infrastructure Destruction Squad channel announced the completion of a deal involving a ransomware-building tool, which has been delivered to an unnamed client. This indicates active distribution of ransomware development capabilities.
    Date: 2026-04-15T21:27:19Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4001
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged acquisition of hacking tool by blacknet-00
    Category: Malware
    Content: A member of the Infrastructure Destruction Squad channel, identified as blacknet-00, claims to have purchased a tool from a contact. The nature of the tool is unspecified but the channel context and phrasing suggest it is a malicious or offensive cyber tool. A photo was included with the post.
    Date: 2026-04-15T21:26:53Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4000
    Screenshots:
    None
    Threat Actors: blacknet-00
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged leak of mixed email credentials from UK, Italy, Poland and other countries
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,646 email credentials sourced from multiple countries including the United Kingdom, Italy, and Poland. The credentials are described as verified for mail access.
    Date: 2026-04-15T21:25:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72234/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged leak of Russian military casualty data
    Category: Data Leak
    Content: Forum post claims to contain personal information of 70,000 Russian military personnel who died in war, including names, birth dates, death dates, geographic origins, ages, military units, branches, and ranks.
    Date: 2026-04-15T20:53:35Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Russian-death-in-the-war-70k
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Russian Armed Forces
    Victim Site: Unknown
  34. Alleged cybercriminal marketplace offering illegal digital tools and services
    Category: Initial Access
    Content: Threat actor advertising various cybercriminal tools and services including bank logs, credit card data, SSN databases, SMTP scanners, and access tools with prices ranging from $30 to $300. The actor offers services targeting financial institutions and email systems.
    Date: 2026-04-15T20:52:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72229/
    Screenshots:
    None
    Threat Actors: jimebj
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged recruitment for privilege escalation activities
    Category: Initial Access
    Content: Threat actor Infector is recruiting experienced penetration testers to join a private team for privilege escalation activities within their networks. The post indicates an actively developing cybercriminal operation seeking skilled personnel for unauthorized network access.
    Date: 2026-04-15T20:50:07Z
    Network: openweb
    Published URL: https://tier1.life/thread/145
    Screenshots:
    None
    Threat Actors: Infector
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Website Defacement of AstroGyani by CYKOMNEPAL
    Category: Defacement
    Content: On April 16, 2026, the attacker known as CYKOMNEPAL defaced the Indian astrology and spiritual services website AstroGyani (astrogyani.in). The defacement targeted a subdirectory path within the sites blog image folder rather than the homepage. No specific motive or additional technical details were disclosed in association with this incident.
    Date: 2026-04-15T20:45:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834378
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: India
    Victim Industry: Astrology / Spiritual Services
    Victim Organization: AstroGyani
    Victim Site: astrogyani.in
  37. Alleged data leak of FTIMERBET.COM database
    Category: Data Leak
    Content: A threat actor claims to have leaked a database from FTIMERBET.COM containing user credentials, phone numbers, and email addresses. The post indicates this is being shared as a leak rather than sold.
    Date: 2026-04-15T20:17:59Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FTIMERBET-COM-DATABASE-LEAK-USER-PASS-PHONE-EMAIL
    Screenshots:
    None
    Threat Actors: uz3er
    Victim Country: Unknown
    Victim Industry: Gaming/Gambling
    Victim Organization: FTIMERBET
    Victim Site: ftimerbet.com
  38. Website Defacement of ECAN Nepal by CYKOMNEPAL
    Category: Defacement
    Content: A threat actor or group operating under the handle CYKOMNEPAL defaced a member detail page on the ECAN (Education Consultancy Association of Nepal) website on April 16, 2026. The incident was a targeted single-page defacement rather than a mass or home page defacement. No specific motive or server details were disclosed in connection with the attack.
    Date: 2026-04-15T20:17:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834377
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Education / Professional Association
    Victim Organization: ECAN (Education Consultancy Association of Nepal)
    Victim Site: ecan.org.np
  39. Alleged leak of German credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 728,678 credential pairs targeting German entities. The data was made available as a free download via a file sharing service.
    Date: 2026-04-15T20:17:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72228/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged leak of Minecraft server databases
    Category: Data Leak
    Content: A threat actor shared approximately 1,000 Minecraft server databases on a cybercrime forum. The databases were described as random collections and made available for free download to forum members.
    Date: 2026-04-15T20:16:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-1k-Minecraft-dbs
    Screenshots:
    None
    Threat Actors: australia
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged leak of German intelligence coordinates and infrastructure data
    Category: Data Leak
    Content: Actor SiberSLX claims to have leaked sensitive coordinates and information about German intelligence agencies (BND, BfV, MAD) and critical infrastructure locations. The data is being distributed as a password-protected ZIP file through a free download link.
    Date: 2026-04-15T20:01:07Z
    Network: openweb
    Published URL: https://breached.st/threads/germany-important-coordinates-about-germany-leaked-download.86017/unread
    Screenshots:
    None
    Threat Actors: SiberSLX
    Victim Country: Germany
    Victim Industry: Government
    Victim Organization: German Intelligence Services
    Victim Site: Unknown
  42. Alleged data leak of Archetyp Market vendor data
    Category: Data Leak
    Content: Actor TheFallen shared vendor data allegedly scraped from Archetyp darknet market from April 2026. The data is being distributed for free download via Telegram contact.
    Date: 2026-04-15T19:58:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DarkWeb-Archetyp-Market-Vendor-Data-04-2026
    Screenshots:
    None
    Threat Actors: TheFallen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Archetyp Market
    Victim Site: Unknown
  43. Alleged data breach of the United States Holocaust Memorial Museum by Nasir
    Category: Data Breach
    Content: A threat actor identified as Nasir, affiliated with HANDALA HACK, claims to have breached the United States Holocaust Memorial Museum (Yad Vashem-referenced). The actor alleges possession of personal information belonging to visitors, donors, secret delegations, and purported Mossad agents operating under aliases. A proof-of-claim URL is referenced at nasir.cc/pages/Holocaust-Museum.html.
    Date: 2026-04-15T19:55:47Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/314
    Screenshots:
    None
    Threat Actors: Nasir
    Victim Country: United States
    Victim Industry: Cultural Institution / Museum
    Victim Organization: United States Holocaust Memorial Museum
    Victim Site: Unknown
  44. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 47,000 email and password combinations through a paste service. The credentials are described as having good access rates for mail accounts.
    Date: 2026-04-15T19:35:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-47k-Mail-Access-Good-Combolist
    Screenshots:
    None
    Threat Actors: Razly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 47,000 email credentials described as having good access rates. The credentials are being distributed for free via a paste service.
    Date: 2026-04-15T19:32:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72227/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Alleged sale of multiple databases containing personal information and identity documents
    Category: Data Breach
    Content: Threat actor jannatmirza11 claims to be selling access to multiple databases containing driver licenses, SSNs, passports, company registration documents, consumer information, phone numbers, email lists, and credentials from various sources.
    Date: 2026-04-15T19:31:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72226/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Alleged leak of 47,000 email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 47,000 email credentials through a paste service. The credentials are described as having good mail access validity.
    Date: 2026-04-15T19:31:37Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-47k-Mail-Access-Good-Combolist
    Screenshots:
    None
    Threat Actors: Cidaxxx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Alleged sale of multiple identity document databases and personal information
    Category: Data Breach
    Content: Threat actor claims to have access to various databases containing driver licenses, SSN, passports, company registration documents, consumer information, phone lists, email lists, and credential combinations. The actor provides a Telegram contact for interested parties.
    Date: 2026-04-15T19:28:34Z
    Network: openweb
    Published URL: https://xforums.st/threads/i-have-driver-license-ssn-passports-llc-ein-ltd.608431/
    Screenshots:
    None
    Threat Actors: jannat123
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged sale of Hotmail credential combolists
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling credential combolists containing 1,200 Hotmail email and password combinations, with pricing structures for larger volumes including gaming and shopping site credentials.
    Date: 2026-04-15T19:06:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-2k-HOTMAILS-COMBO-ACCESS-MAILS-COMBO
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Hotmail
    Victim Site: hotmail.com
  50. Alleged sale of mixed email credential lists
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling access to credential lists containing 21.3k mixed email accounts, with additional offerings for bulk credentials including gaming and shopping combos ranging from 100k to 10 million records.
    Date: 2026-04-15T19:05:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-21-3k-MIXED-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Alleged sale of USA credential combolist for account access
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling an 8,500-record USA credential combolist described as good for access along with various other credential packages and access to private combo groups for fees ranging from $30-500.
    Date: 2026-04-15T19:04:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-8-5k-USA-GOOD-FOR-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Alleged sale of corporate credential lists on cybercriminal forum
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling corporate credential lists containing 2,000 valid entries on DemonForums. The actor offers various pricing tiers for access to larger credential collections ranging from 100,000 to 10 million records, with specialized gaming and shopping combolists also available.
    Date: 2026-04-15T19:03:59Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2k-VALID-CORPS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Alleged sale of mixed email credential combolist
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling a credential combolist containing 1,600 mixed email:password combinations. The actor operates premium Telegram channels offering various credential packages ranging from $50/week to $500/lifetime access, with bulk credential lists priced from $30 for 100k records to $300 for 10 million records.
    Date: 2026-04-15T19:02:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-6k-GOOD-MIXED-MAILS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged sale of mixed email credential lists by cybercriminal actor
    Category: Combo List
    Content: Cybercriminal actor MrCOMBOROBOA is selling access to 8.9k valid mixed email credential lists on DemonForums, with pricing tiers ranging from $30 for 100k records to $500 for lifetime access to private combo groups. The actor also operates a Telegram channel for distribution of credential lists.
    Date: 2026-04-15T19:02:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-8-9k-VALID-MIXED-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged sale of corporate email credential lists
    Category: Combo List
    Content: Cybercriminal actor MrCOMBOROBOA is allegedly selling access to corporate email credential lists containing 181,500 records. The threat actor offers various pricing tiers for different volumes of credential lists ranging from 100,000 to 10 million records.
    Date: 2026-04-15T19:00:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-181-5k-CORPS-MAILS-COMBO-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged leak of USA credential combinations
    Category: Combo List
    Content: A threat actor shared a combolist containing 10,000 credential combinations allegedly from United States users on a cybercrime forum.
    Date: 2026-04-15T18:59:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72219/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor leaked a collection of 15,000 valid email credentials from mixed sources. The data is being distributed as a combolist on an underground forum.
    Date: 2026-04-15T18:59:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72220/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged leak of USA email credentials
    Category: Combo List
    Content: A threat actor leaked 2,700 fresh checked USA email credentials on a cybercrime forum. The credentials were described as recently verified and dated April 15th.
    Date: 2026-04-15T18:59:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72221/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged distribution of SilverBullet configuration for credential attacks
    Category: Combo List
    Content: Threat actor allegedly sharing a free SilverBullet configuration file optimized for mobile devices and described as fast-working for online credential attacks.
    Date: 2026-04-15T18:59:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72222/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Forum user webvvork shared a combolist containing 9,000 valid email credentials. The post requires registration to view the full content and includes a Telegram contact for further communication.
    Date: 2026-04-15T18:58:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72224/
    Screenshots:
    None
    Threat Actors: webvvork
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged leak of T-Online credentials
    Category: Combo List
    Content: A threat actor allegedly leaked 50,000 T-Online credentials on a cybercrime forum. The data appears to be distributed as a combolist containing email and password combinations.
    Date: 2026-04-15T18:58:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72225/
    Screenshots:
    None
    Threat Actors: webvvork
    Victim Country: Germany
    Victim Industry: Telecommunications
    Victim Organization: T-Online
    Victim Site: t-online.de
  62. Alleged leak of mixed email access credentials
    Category: Logs
    Content: A threat actor has allegedly made available a collection of 15,000 valid email access credentials from mixed sources. The credentials appear to be distributed through a forum specializing in mail access and credential lists.
    Date: 2026-04-15T18:54:04Z
    Network: openweb
    Published URL: https://xforums.st/threads/15k-full-valid-mail-access-mix-15-04.608426/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Alleged data leak of Pakistani government portal iams.kp.gov.pk
    Category: Data Leak
    Content: A threat actor claims to have leaked data from a Pakistani government website belonging to Khyber Pakhtunkhwa province (iams.kp.gov.pk). The data, reportedly available as a free compressed file download on the dark web, allegedly contains usernames, passwords, user access levels, and internal organizational information. The authenticity of the leak has not been verified. If genuine, the exposed credentials could enable unauthorized access to government systems or facilitate further attacks.
    Date: 2026-04-15T18:43:50Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21213
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Pakistan
    Victim Industry: Government
    Victim Organization: Khyber Pakhtunkhwa Government (IAMS)
    Victim Site: iams.kp.gov.pk
  64. Alleged data leak of Gestion Kronos Canada database
    Category: Data Leak
    Content: A threat actor has allegedly leaked a SQL database from gestionkronos.ca containing 1.6 million records. The leaked data includes comprehensive personal information such as names, addresses, phone numbers, email addresses, passwords, employment details, financial information, and government identification numbers.
    Date: 2026-04-15T18:42:36Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-gestionkronos-ca
    Screenshots:
    None
    Threat Actors: [Mod] Tanaka
    Victim Country: Canada
    Victim Industry: Financial Services
    Victim Organization: Gestion Kronos
    Victim Site: gestionkronos.ca
  65. Alleged data breach of Talabat Saudi Arabia user database
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 563,000 user records from Talabat Saudi Arabia, including personal information, contact details, account data, and demographic information. The actor is accepting escrow and trusted middlemen for transactions.
    Date: 2026-04-15T18:38:19Z
    Network: openweb
    Published URL: https://breached.st/threads/https-www-talabat-com-563k-saudi-arabia-dataset.86016/unread
    Screenshots:
    None
    Threat Actors: Jeffrey Epstein
    Victim Country: Saudi Arabia
    Victim Industry: Food Delivery
    Victim Organization: Talabat
    Victim Site: talabat.com
  66. Alleged distribution of Trap Stealer 2025 infostealer malware
    Category: Logs
    Content: Cybercriminal shares Trap Stealer 2025 malware designed to extract login credentials, session cookies, payment information, and system metadata from infected systems. The malware is distributed through download links and appears to target browser-stored sensitive data.
    Date: 2026-04-15T18:37:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Trap-Stealer-Session-cookies-and-tokens-%F0%9F%92%B3-Saved-payment-information
    Screenshots:
    None
    Threat Actors: 1_s3p
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged distribution of Armageddon Stealer 1.0 malware
    Category: Logs
    Content: Threat actor distributes Armageddon Stealer 1.0 malware designed to extract sensitive data including login credentials, browser data, and financial information. The stealer operates stealthily across multiple platforms and is being made available through file hosting services.
    Date: 2026-04-15T18:36:26Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Source-Code-Armageddon-Stealer-1-0
    Screenshots:
    None
    Threat Actors: 1_s3p
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged rental service for IntelX OSINT platform access
    Category: Logs
    Content: Threat actor Chamane99 is offering rental access to IntelX intelligence platform for $15 per search, providing screen-shared searches and delivering results as zip files. This service facilitates unauthorized access to OSINT data.
    Date: 2026-04-15T18:35:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-RENT-INTELX-ACCOUNT
    Screenshots:
    None
    Threat Actors: Chamane99
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Alleged leak of credential combolist containing 22.52 million records
    Category: Logs
    Content: A threat actor shared a credential combolist containing 22.52 million URL:LOG:PASS records via file sharing platform. The data is distributed for free download through a Pixeldrain link.
    Date: 2026-04-15T18:35:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-22-52-M-%E2%9C%85-ULP-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Alleged leak of credential logs from Mexico
    Category: Logs
    Content: Forum post advertising credential logs from Mexico in URL:LOGIN:PASS format, though no specific content details are provided in the visible post.
    Date: 2026-04-15T18:33:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-URL-LOGIN-PASS-MX-LOGS
    Screenshots:
    None
    Threat Actors: KazeFreak
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged data breach of Assuréa insurance broker
    Category: Data Breach
    Content: Actor DumpsecV2 is selling a database dump from Assuréa insurance broker containing 139,000 car insurance records with detailed personal information including names, emails, addresses, and vehicle data. The data spans 2018-2026 and is being offered for €20,000.
    Date: 2026-04-15T18:29:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-FR-Assurea-AXA-%E2%80%93-Allianz-%E2%80%93-Generali-%E2%80%93-Swiss-Life-%E2%80%93-AIG
    Screenshots:
    None
    Threat Actors: DumpsecV2
    Victim Country: France
    Victim Industry: Insurance
    Victim Organization: Assuréa
    Victim Site: Unknown
  72. Alleged sale of supply chain data from multiple fashion and retail companies
    Category: Data Breach
    Content: Threat actor CoinBase_Cartel is selling supply chain data from multiple major fashion and retail brands including Lacoste, Ralph Lauren, Canada Goose, and others. Prices start from $50,000 per company dataset.
    Date: 2026-04-15T18:28:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Supply-chain-data-Lacoste-Ralph-Lauren-Canada-Goose-and-more
    Screenshots:
    None
    Threat Actors: CoinBase_Cartel
    Victim Country: Unknown
    Victim Industry: Retail and Fashion
    Victim Organization: Multiple (Lacoste, Ralph Lauren, Canada Goose, Carters, New Era, Converse, Foot Locker, Spanx)
    Victim Site: Unknown
  73. Alleged data breach of Brit Hotel loyalty program
    Category: Data Breach
    Content: Threat actor HexDex is selling personal data of 682,662 Brit Hotel loyalty program members covering booking periods from 2016 to 2026. The data includes names, emails, phone numbers, addresses, and detailed reservation information.
    Date: 2026-04-15T18:28:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FR-682K-BritHotel–73188
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Hospitality
    Victim Organization: Brit Hotel
    Victim Site: Unknown
  74. Alleged data breach involving Indonesia taxpayer identification numbers
    Category: Data Breach
    Content: Threat actor OnarDev allegedly offering 6 million Indonesian taxpayer identification numbers (NPWP) on underground forum.
    Date: 2026-04-15T18:27:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-6-MILION-INDONESIA-TAXPAYER-IDENTIFICATION-NUMBER-NPWP–73558
    Screenshots:
    None
    Threat Actors: OnarDev
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Alleged leak of Iranian nuclear energy database
    Category: Data Leak
    Content: Actor TheFallen posted about an Iranian nuclear energy database in a dark web forum, providing only a Telegram contact for further information.
    Date: 2026-04-15T18:23:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-IRAN-Nuclear-Energy-DB
    Screenshots:
    None
    Threat Actors: TheFallen
    Victim Country: Iran
    Victim Industry: Energy/Nuclear
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Alleged data leak of UNSS French sports organization database
    Category: Data Leak
    Content: A threat actor leaked a database containing over 7 million records from UNSS, a French organization managing sports in middle and high schools. The leaked data includes first names, last names, phone numbers, birth dates, service names, and sport names.
    Date: 2026-04-15T18:22:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FR-UNSS-7M–73443
    Screenshots:
    None
    Threat Actors: jza1337
    Victim Country: France
    Victim Industry: Education
    Victim Organization: UNSS
    Victim Site: Unknown
  77. Alleged leak of Morocco Royal Palace staff database
    Category: Data Leak
    Content: A threat actor shared a database containing personal information of Royal Palace staff in Morocco, including names, birth dates, addresses, national ID numbers, and recruitment dates. The data is being distributed for free download on a cybercriminal forum.
    Date: 2026-04-15T18:22:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-MOROCCO-Royal-Palace-Staff-Database
    Screenshots:
    None
    Threat Actors: Rihana
    Victim Country: Morocco
    Victim Industry: Government
    Victim Organization: Royal Palace of Morocco
    Victim Site: Unknown
  78. Alleged data leak of Universidad Latina de México database
    Category: Data Leak
    Content: Threat actor Lvn4t1k0 claims to have leaked the complete database of Universidad Latina de México containing user credentials, emails, and personal information. The actor also shared administrator login credentials for the universitys website.
    Date: 2026-04-15T18:21:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-UNIVERSIDAD-LATINA-DE-MEXICO-LEAKED
    Screenshots:
    None
    Threat Actors: Lvn4t1k0
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Universidad Latina de México
    Victim Site: ulm.edu.mx
  79. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: Threat actor snowstormxd shared fresh Hotmail credentials through external download links on the CrackingX forum. The credentials are being distributed for free via Pasteview and Telegram channels.
    Date: 2026-04-15T17:59:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72217/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  80. Alleged leak of Hotmail credentials targeting crypto users
    Category: Combo List
    Content: A threat actor shared a combolist containing 594,557 Hotmail credentials specifically targeting cryptocurrency users. The credential list was made available for free download via a file hosting service.
    Date: 2026-04-15T17:59:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72218/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  81. Alleged data leak of BePrime Mexican cybersecurity company
    Category: Data Leak
    Content: Threat actor leaked over 10 GB of data from Mexican cybersecurity company BePrime, including financial data, customer information, credentials, and data from their clients including Bafar, Alsea, and CTU. The leak includes PostgreSQL databases, Meraki API keys controlling 1,858 devices, Salesforce CRM data, and 2.58 million WiFi tracking records.
    Date: 2026-04-15T17:57:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-LEAK-BEPRIME-MEXICAN-CYBERSECURITY-PRIVATE-COMPANY
    Screenshots:
    None
    Threat Actors: dylanmarly
    Victim Country: Mexico
    Victim Industry: Cybersecurity
    Victim Organization: BePrime
    Victim Site: Unknown
  82. Alleged data breach of SENIAT Venezuela tax authority database
    Category: Data Breach
    Content: Threat actor claims to have breached the Venezuelan SENIAT tax authority system and extracted 13.8 million records containing personal and business information including tax IDs, addresses, phone numbers, and business registration details. The data includes 12.3 million natural person records and 1.5 million legal entity records with comprehensive personal and financial information.
    Date: 2026-04-15T17:56:31Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-SENIAT-2026-VENEZUELA-13-8M-DATA-RECORDS-EMAILS-ADDRESSES-AND-PHONE-NUMBERS
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Venezuela
    Victim Industry: Government
    Victim Organization: SENIAT
    Victim Site: Unknown
  83. Alleged data leak of Treasurenet database
    Category: Data Leak
    Content: Threat actor Asha claims to have leaked a database from Treasurenet and is offering it as a free download on a dark web forum.
    Date: 2026-04-15T17:53:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Treasurenet-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: Asha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Treasurenet
    Victim Site: Unknown
  84. Website Defacement of Atomic Wallet Impersonation Site by xNight (JBR Team)
    Category: Defacement
    Content: On April 16, 2026, a threat actor operating under the alias xNight, affiliated with the group JBR, performed a homepage defacement of atomicwallet-pro.info, a domain impersonating the legitimate Atomic Wallet cryptocurrency service. The defacement targeted the homepage directly and was not part of a mass defacement campaign. The site appears to be a fraudulent or phishing domain mimicking the Atomic Wallet brand, adding a layer of complexity to the incident as both the impersonation site and its defacement may indicate competing malicious actor activity.
    Date: 2026-04-15T17:53:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834370
    Screenshots:
    None
    Threat Actors: xNight, JBR
    Victim Country: Unknown
    Victim Industry: Cryptocurrency / Financial Technology
    Victim Organization: Atomic Wallet Pro (Impersonation/Fraudulent Site)
    Victim Site: atomicwallet-pro.info
  85. Alleged data leak from IVOO organization
    Category: Data Leak
    Content: A threat actor allegedly leaked data from IVOO organization and made it available for download on underground forums.
    Date: 2026-04-15T17:49:05Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-IVOO-Leaked-Download
    Screenshots:
    None
    Threat Actors: anonmoose
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: IVOO
    Victim Site: Unknown
  86. AlpesCloud Status
    Category: Cyber Attack
    Content: LESN Dialogue Logique a subi une cyberattaque denvergure le 13 avril 2026, entraînant lisolement immédiat de ses infrastructures datacenter pour protéger les données. Les équipes techniques et des experts en cybersécurité collaborent avec les autorités fédérales et la police cantonale pour analyser lintrusion et neutraliser la menace. Le rétablissement progressif des services est ralenti par des contrôles de sécurité rigoureux visant à garantir un environnement sain après lattaque.
    Date: 2026-04-15T17:48:33Z
    Network: openweb
    Published URL: https://status.dlnet.ch
    Screenshots:
    None
    Threat Actors:
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Dialogue Logique
    Victim Site: dlnet.ch
  87. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to contain valid, untouched Hotmail credential hits. The actual content is hidden behind registration requirements, making verification of claims impossible.
    Date: 2026-04-15T17:47:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72215/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  88. Alleged leak of Spotify credentials
    Category: Combo List
    Content: Threat actor CODER is distributing a Spotify credential list containing 7 million records through Telegram channels. The combolist is being shared for free through dedicated Telegram groups.
    Date: 2026-04-15T17:47:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72216/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Entertainment/Media
    Victim Organization: Spotify
    Victim Site: spotify.com
  89. Alleged data breach of Abrigo, Inc.
    Category: Data Breach
    Content: ShinyHunters group allegedly breached Abrigo, Inc. through Salesforce access in April 2026, compromising over 1.75 million records containing usernames, full names, email addresses, phone numbers, and employee details. When ransom demands were refused, the group released the stolen data.
    Date: 2026-04-15T17:47:00Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Abrigo-Inc-abrigo-com-2026-04-12-1-75M-Users
    Screenshots:
    None
    Threat Actors: thelastwhitehat
    Victim Country: United States
    Victim Industry: Financial Technology
    Victim Organization: Abrigo, Inc.
    Victim Site: abrigo.com
  90. Alleged SCADA System Compromise of Bohemia Controls by Hider_Nex
    Category: Cyber Attack
    Content: Threat actor Hider_Nex claims to have fully compromised and destroyed the SCADA system of Bohemia Controls s.r.o., a Czech industrial automation and control systems company. The actor claims control over machine operation/shutdown, temperature and pressure control, liquid and gas flow (valves and pumps), alarm management, data collection, and interconnected plant systems. The post is tagged with #OpCzech suggesting a politically motivated campaign targeting Czech Republic infrastructure. The actor is identified as Tunisian (🇹🇳) and references Palestinian solidarity (🇵🇸). They warn of further SCADA attacks.
    Date: 2026-04-15T17:39:34Z
    Network: telegram
    Published URL: https://t.me/c/3103513353/431
    Screenshots:
    None
    Threat Actors: Hider_Nex
    Victim Country: Czech Republic
    Victim Industry: Industrial Automation / Critical Infrastructure
    Victim Organization: Bohemia Controls s.r.o.
    Victim Site: bohemiacontrols.cz
  91. Alleged leak of mixed email service credentials
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 4,229 mixed email credentials including Hotmail accounts. The credentials are described as premium quality hits and are being distributed through hidden content on the forum.
    Date: 2026-04-15T17:32:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-4229x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 61,000 German email credentials with full access claims on an underground forum.
    Date: 2026-04-15T17:32:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-61K-Germany-Full-Valid-Mail-Acceess-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Forum post sharing a combolist containing 44,000 Hotmail email and password combinations. The credentials are being distributed through hidden content on the forum, with the author also promoting their shop for additional credential lists.
    Date: 2026-04-15T17:31:54Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-6-44000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  94. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,229 mixed email credentials, described as premium quality hits including Hotmail accounts, distributed via Telegram contact.
    Date: 2026-04-15T17:31:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72209/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 61,000 German email credentials with full access claims on an underground forum.
    Date: 2026-04-15T17:31:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72210/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Alleged leak of German credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 54,000 German email and password combinations through a free download link on a cybercrime forum.
    Date: 2026-04-15T17:31:26Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-54K-GERMANY-FULL-VALID
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 44,000 unique Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-15T17:31:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72212/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  98. Alleged Cyber Threat by Golden Falcon Against US Critical Infrastructure
    Category: Cyber Attack
    Content: Threat actor group Golden Falcon posted a message claiming to have intelligence-level access and control over United States critical infrastructure, specifically referencing airports, subway systems, and electrical facilities. The message is framed as a geopolitical warning in the context of US-Iran tensions, suggesting the group may be Iran-aligned or Iran-affiliated.
    Date: 2026-04-15T17:21:47Z
    Network: telegram
    Published URL: https://t.me/c/2245031785/643
    Screenshots:
    None
    Threat Actors: Golden Falcon
    Victim Country: United States
    Victim Industry: Critical Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged leak of Japanese email credentials
    Category: Logs
    Content: A threat actor shared a collection of 3,800 valid Japanese email credentials on an underground forum. The credentials are described as full valid mail access suggesting they provide complete access to the compromised email accounts.
    Date: 2026-04-15T17:20:48Z
    Network: openweb
    Published URL: https://xforums.st/threads/3-8k-japan-full-valid-mail-access-15-04.608416/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,800 Japanese email credentials with full access claims on a cybercrime forum.
    Date: 2026-04-15T17:09:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-3-8K-JAPAN-Full-Valid-Mail-Access-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged leak of credential combolist containing 27.86 million records
    Category: Combo List
    Content: Threat actor Daxus leaked a credential combolist containing 27.86 million URL:username:password combinations in UHQ+ format. The combolist is being distributed through the actors website and Telegram channel.
    Date: 2026-04-15T17:07:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72204/
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Alleged leak of IPTV Xtream credentials
    Category: Combo List
    Content: Threat actor shared 30 IPTV Xtream account credentials for free download on cybercriminal forum. The credentials appear to have an expiration date of April 12, 2026.
    Date: 2026-04-15T17:07:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72205/
    Screenshots:
    None
    Threat Actors: ouaaka_06
    Victim Country: Unknown
    Victim Industry: Media and Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Alleged leak of Russian email credentials
    Category: Combo List
    Content: Threat actor shares fresh Russian email credential lists through Telegram channel and file sharing platform. Claims to add new credential databases daily with only current and valid entries.
    Date: 2026-04-15T17:07:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72206/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged leak of Japan email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,800 Japanese email credentials with full access on an underground forum.
    Date: 2026-04-15T17:07:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72207/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged distribution of email credential combolists via Telegram
    Category: Combo List
    Content: Threat actor CODER is distributing email credential combolists through Telegram channels, offering free access to credential lists and programs for cybercriminal activities.
    Date: 2026-04-15T17:06:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72208/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Alleged leak of Russian email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,300 Russian email credentials on an underground forum. The credentials appear to be email access combinations targeting Russian users.
    Date: 2026-04-15T17:00:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-3-3K-Russian-Mail-Access-By-MegaCloud-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Alleged leak of Russian email credentials
    Category: Combo List
    Content: A threat actor leaked 3,300 Russian email access credentials on a cybercriminal forum. The credentials are allegedly sourced from MegaCloud and dated April 15th.
    Date: 2026-04-15T16:59:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72203/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Alleged leak of email credential combolist with 2FA bypass claims
    Category: Combo List
    Content: A threat actor shared a credential combolist containing email and password combinations, claiming the credentials can bypass 2FA authentication. The post contains hidden content requiring forum registration to access the actual data.
    Date: 2026-04-15T16:59:12Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Combo-Mail-pass-2fa-Hit-1X
    Screenshots:
    None
    Threat Actors: sxxone
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged defacement of multiple websites by TEGAL CYBER TEAM (Mr.SonicX)
    Category: Defacement
    Content: Threat actor Mr.SonicX affiliated with TEGAL CYBER TEAM claims to have defaced four websites: aliah.ac.in (India – educational institution), aemovers.com.hk (Hong Kong – moving/logistics company), sci.ruh.ac.lk (Sri Lanka – university science faculty), and journalofhospitalpharmacy.in (India – pharmaceutical journal). The post includes photos as proof of defacement.
    Date: 2026-04-15T16:56:52Z
    Network: telegram
    Published URL: https://t.me/c/3528849141/289
    Screenshots:
    None
    Threat Actors: Mr.SonicX
    Victim Country: India, Hong Kong, Sri Lanka
    Victim Industry: Education, Logistics, Healthcare/Publishing
    Victim Organization: Aliah University, AE Movers, University of Ruhuna Faculty of Science, Journal of Hospital Pharmacy
    Victim Site: aliah.ac.in, aemovers.com.hk, sci.ruh.ac.lk, journalofhospitalpharmacy.in
  110. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor known as HollowKnight07 has made available a sample combolist of 555 Hotmail credentials on the cracking forum CrackingX. The post offers a free download link described as a sample, suggesting it may be a preview of a larger credential list. The data likely consists of email and password combinations associated with Hotmail accounts.
    Date: 2026-04-15T16:34:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72193/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  111. Alleged leak of 1,700 French email access credentials
    Category: Combo List
    Content: A threat actor operating under the alias MailAccesss has shared a combolist of approximately 1,700 checked French email access credentials on the cracking forum CrackingX. The list is dated April 15 and is described as fresh and verified. The content is accessible to registered forum members at no stated cost.
    Date: 2026-04-15T16:33:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72194/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor known as ValidMail has made available a combolist of approximately 45,000 Hotmail domain credentials on the cracking forum CrackingX. The list is claimed to be valid as of April 15, 2026. The content is restricted to registered or signed-in forum members.
    Date: 2026-04-15T16:33:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72195/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  113. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as HollowKnight shared a sample combolist containing 555 Hotmail email and password combinations on the DemonForums combolist section. The content is gated behind registration or login, suggesting it is offered as a free sample, potentially to promote a larger credential list. No price or payment mechanism was explicitly mentioned in the post.
    Date: 2026-04-15T16:32:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-555x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1–200520
    Screenshots:
    None
    Threat Actors: HollowKnight
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  114. Alleged leak of mixed credential combolist with 46,075 lines
    Category: Combo List
    Content: A threat actor known as Browzchel has shared a mixed combolist containing 46,075 lines of credentials on the cracking forum CrackingX. The content appears to be freely distributed and is also promoted via a Telegram channel (@BossBrowz). No specific victim organization or country has been identified, suggesting this is an aggregated mix from multiple sources.
    Date: 2026-04-15T16:32:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72196/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Alleged Sale of 165K USA-Targeted Credential Combolist
    Category: Combo List
    Content: A threat actor operating under the alias Ra-Zi is selling a combolist of approximately 165,000 credentials targeted at USA-based users, with additional offerings covering multiple countries and email providers including AOL, Yahoo, Hotmail, and Outlook. The combolist contains email:password and username:password combinations. The actor promotes their services via a Telegram channel and a dedicated cracking website, with purchase inquiries directed to the Telegram handle @KOCsupport.
    Date: 2026-04-15T16:32:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-165K-USA-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged leak of Chinese mail access credentials
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available a credential list containing approximately 3,100 Chinese mail access credentials, claimed to be valid as of April 15. The post offers access to the content for registered forum users at no stated price. The specific mail providers or organizations affected are not identified in the post.
    Date: 2026-04-15T16:32:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72197/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has made available a combolist of approximately 45,000 Hotmail email:password credential pairs, claimed to be valid as of April 15, 2026. The content is gated behind forum registration or login, and the actor promotes associated Telegram and shop channels, suggesting a broader credential distribution operation.
    Date: 2026-04-15T16:31:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%99%8B-45k-HOTMAIL-DOMAIN-WITH-VALID-15-04-26-%E2%99%8B
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  118. Alleged leak of 1,700 French email credentials
    Category: Combo List
    Content: A threat actor operating under the alias MegaCloudshop has made available a combolist containing approximately 1,700 checked email credentials targeting French users, dated April 15. The credential list is described as fresh and verified, suggesting the accounts were recently validated for access. The post directs users to a storefront at megacloudshop.top, indicating a commercially motivated threat actor.
    Date: 2026-04-15T16:31:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-7K-France-Fresh-Checked-Mail-Access-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Alleged sale of 165,000 USA-targeted credential combolist
    Category: Combo List
    Content: A threat actor known as steeve75 is selling a combolist of approximately 165,000 USA-targeted credentials on the CrackingX forum. The offering includes email:password and username:password combinations sourced from multiple email providers including AOL, Yahoo, Hotmail, and Outlook, spanning several countries. Interested buyers are directed to contact the seller via Telegram at @KOCsupport.
    Date: 2026-04-15T16:31:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72199/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  120. Alleged Sale of Bulk Fake X (Twitter) Followers and Engagement Manipulation Service
    Category: Combo List
    Content: A threat actor operating under the alias Bulkorders0007 is selling bulk fake followers for X (Twitter), offering packages ranging from 2,000 to 100,000 followers for prices between $70 and $999. The service claims to use aged, active accounts with complete profiles and offers a non-drop guarantee with refill policy. Additionally, the actor is selling verified X followers purportedly to help buyers meet minimum requirements for Xs revenue sharing and subscription monetization features, accepti
    Date: 2026-04-15T16:31:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Selling-bulk-X-Twitter-followers-Non-drop
    Screenshots:
    None
    Threat Actors: Bulkorders0007
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: X (Twitter)
    Victim Site: x.com
  121. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as alphaxdd has made available a combolist containing 1,155 alleged valid Hotmail credentials on the cracking forum CrackingX. The post describes the credentials as premium hits associated with private cloud access and mixed mail accounts. The actor can be contacted via Telegram handle alphaaxd and offers the content as a free download.
    Date: 2026-04-15T16:31:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72200/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  122. Alleged leak of mixed email and password combolist with 46,075 credentials
    Category: Combo List
    Content: A threat actor operating under the alias stormtrooper has made available a mixed combolist containing 46,075 email and password combinations on DemonForums. The content is hidden behind a registration or login requirement on the forum. The actor also promotes a Telegram channel (@BossBrowz) likely used for further distribution of similar credential lists.
    Date: 2026-04-15T16:30:59Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-46-075-Lines-Fresh-Mix-Combolist
    Screenshots:
    None
    Threat Actors: stormtrooper
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  123. Alleged leak of 3,100 Chinese email credentials
    Category: Combo List
    Content: A threat actor known as MegaCloudshop has made available a combolist containing approximately 3,100 Chinese email account credentials, reportedly validated on April 15. The content is hidden behind a registration or login requirement on the forum. The actor also promotes a storefront at megacloudshop.top, suggesting a pattern of credential trafficking activity.
    Date: 2026-04-15T16:30:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-3-1K-China-Mail-Access-Valid-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as alphaxdd shared a combolist of 1,155 alleged valid Hotmail credentials on the DemonForums combolist section. The post describes the content as premium hits from a private cloud source with mixed mail types. Access to the hidden content requires registration or login on the forum.
    Date: 2026-04-15T16:30:21Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1155x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  125. Alleged Data Leak of Centro Regional de Educación Normal Guerrero Student Database
    Category: Data Leak
    Content: A threat actor identified as Z3r00 has publicly shared a database dump allegedly belonging to the Centro Regional de Educación Normal in Guerrero, Mexico. The leaked database contains detailed student academic and personal records including names, enrollment data, academic program details, geographic identifiers, scholarship information, economic support amounts, and disability indicators. The data has been made available via a free download link and promoted through Telegram channels.
    Date: 2026-04-15T16:29:05Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-GUERRERO-CENTRO-REGIONAL-DE-EDUCACION-NORMAL-5280
    Screenshots:
    None
    Threat Actors: Z3r00
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Centro Regional de Educación Normal Guerrero
    Victim Site: Unknown
  126. Alleged leak of mixed-domain email credential combolist
    Category: Logs
    Content: A threat actor operating under the alias ValidMail has made available a mixed-domain combolist containing approximately 170,000 email credential pairs, claimed to have been validated on April 15, 2026. The list spans multiple email domains and is being distributed on the XF criminal forum. No specific victim organization or industry has been identified, as the credentials appear to be aggregated from various sources.
    Date: 2026-04-15T16:20:48Z
    Network: openweb
    Published URL: https://xforums.st/threads/170k-mix-domain-with-valid-15-04-26.608408/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  127. Autovista Applications – JD Power Autovista
    Category: Cyber Attack
    Content: Autovista is currently experiencing a ransomware cyberattack affecting some of its systems in Europe and Australia. External experts have been mobilized to conduct a thorough investigation and contain the incident, which is notably disrupting email access for some employees. Priority is being given to the secure restoration of impacted applications, although no precise timeline has yet been established.
    Date: 2026-04-15T16:18:29Z
    Network: openweb
    Published URL: https://autovista.com/service-update-1/
    Screenshots:
    None
    Threat Actors:
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Autovista
    Victim Site: autovista.com
  128. Alleged leak of mixed-domain email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has made available a combolist of approximately 170,000 email:password credential pairs spanning multiple domains, claimed to be valid as of April 15, 2026. The content is hidden behind a registration or login wall on the forum. The actor also promotes a Telegram channel and an external shop at validmail.store, suggesting a broader credential distribution operation.
    Date: 2026-04-15T16:06:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%99%8B-170k-MIX-DOMAIN-WITH-VALID-15-04-26-%E2%99%8B
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged leak of mixed-domain credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has made available a mixed-domain combolist containing approximately 170,000 credential pairs on the cracking forum CrackingX. The post, dated April 26, 2025, claims the credentials are valid. No specific victim organization or country has been identified, as the list spans multiple domains.
    Date: 2026-04-15T16:06:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72192/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged sale of fresh multi-country combolists with keyword filtering and inbox validation
    Category: Combo List
    Content: A threat actor operating as mu is selling fresh combolists covering multiple countries including UK, DE, JP, NL, BR, PL, ES, US, and IT. The actor claims to offer keyword-filtered credentials for major platforms including eBay, OfferUp, PSN, Booking.com, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. The actor also claims access to a private cloud and valid ntlworld webmails with inbox verification capability.
    Date: 2026-04-15T16:06:06Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/63163
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Alleged Data Leak of Russian Federal Border Service Kordon System Border Crossing Records
    Category: Data Leak
    Content: A threat actor has made available an alleged database dump of the Russian Federal Border Services Kordon border monitoring system, purportedly compromised in September 2023. The dataset contains approximately 1.098 billion records covering border crossings from 2014 to 2023, with data on roughly 79.5 million unique individuals including foreign nationals. Leaked fields include full names, dates of birth, passport and travel document details, citizenship, border checkpoint data, transport mode
    Date: 2026-04-15T16:06:00Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Data-Leak-%D0%9A%D0%BE%D1%80%D0%B4%D0%BE%D0%BD-Russian-Federal-Border-Service-2023-FULL
    Screenshots:
    None
    Threat Actors: gosee
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Russian Federal Border Service (Kordon System)
    Victim Site: Unknown
  132. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias klyne05 has made available a mixed email combolist on the cracking forum CrackingX, described as private and freshly verified. The post offers a free download of the credential list, which has reportedly been checked by the same user. No specific victim organization or record count was disclosed.
    Date: 2026-04-15T15:40:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72188/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Alleged leak of mixed email credential combolist by threat actor klyne05
    Category: Combo List
    Content: A threat actor operating under the alias klyne05 has shared a mixed email:password combolist on Demonforums, described as private and freshly checked. The content is hidden behind a registration or login wall with a like-to-unlock mechanism, limiting visibility into the exact scope and origin of the credentials. No specific victim organization, record count, or targeted service has been identified.
    Date: 2026-04-15T15:39:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1MIX-MAIL%E2%9A%A1%E2%9A%A1PRIVATE%E2%9A%A1%E2%9A%A1FRESH%E2%9A%A1%E2%9A%A1CHEKED-BY-klyne05-%E2%9A%A1%E2%9A%A1–200516
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  134. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist allegedly containing 44,000 unique Hotmail credentials on the cracking forum CrackingX. The post is gated behind registration or sign-in, limiting full visibility into the data. The combolist likely contains email and password pairs associated with Hotmail accounts.
    Date: 2026-04-15T15:39:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72189/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  135. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist containing approximately 44,000 Hotmail email and password combinations on Demon Forums. The content is hidden behind a registration or login requirement. The actor also promotes a shop (unique-combo.shop) offering combolists from various countries upon request.
    Date: 2026-04-15T15:39:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-5-44000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  136. Alleged leak of Office 365 and Apple credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available an alleged combolist of approximately 8 million credentials targeting Office 365 and Apple accounts via a Telegram channel. The post promotes free combo and program distribution through two Telegram groups. No price was mentioned, indicating the content is being freely distributed.
    Date: 2026-04-15T15:39:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72190/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft, Apple
    Victim Site: office.com, apple.com
  137. Alleged leak of Hotmail and mixed credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Roronoa044 on DemonForums has made available a combolist containing approximately 2,761 alleged valid credentials, including Hotmail accounts and a mixed credential set described as UHQ (ultra-high quality). The content is hidden behind a registration wall and the actor directs users to a Telegram account (@noiraccesss) for further access. No price is mentioned, suggesting this is a free distribution.
    Date: 2026-04-15T15:39:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2761-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hotmail.com
  138. Alleged leak of Hotmail and mixed credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias noir has made available a combolist of approximately 2,761 allegedly valid credentials on the cracking forum CX. The post claims the list includes valid Hotmail accounts and a mixed credential set described as UHQ (ultra-high quality). The actor promotes a Telegram channel (@NoirAccesss) for further contact, and the content is gated behind forum registration.
    Date: 2026-04-15T15:39:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72191/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Microsoft (Hotmail)
    Victim Site: hotmail.com
  139. Alleged Data Leak of replicascamisetasnba.com Customer Database
    Category: Data Leak
    Content: A threat actor using the alias Bambi has freely shared a database dump allegedly belonging to replicascamisetasnba.com, a Spanish e-commerce site selling replica NBA jerseys. The leaked data contains approximately 25,000 customer records including personally identifiable information such as full names, email addresses, phone numbers, physical addresses, hashed passwords with salts, and linked social account identifiers. The database appears to originate from an osCommerce-based platform and is
    Date: 2026-04-15T15:38:10Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-replicascamisetasnba-com-Free-Database-Spain-25K-customer-address-order
    Screenshots:
    None
    Threat Actors: Bambi
    Victim Country: Spain
    Victim Industry: E-Commerce / Retail
    Victim Organization: replicascamisetasnba.com
    Victim Site: replicascamisetasnba.com
  140. Alleged Data Leak of boston.academy Database
    Category: Data Leak
    Content: A threat actor known as Bambi has allegedly made available a database associated with boston.academy on a cybercrime forum. The post offers the data for free, though no further details regarding the content, size, or nature of the data are available due to absent post content.
    Date: 2026-04-15T15:20:16Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Database-FREE-boston-academy
    Screenshots:
    None
    Threat Actors: Bambi
    Victim Country: United States
    Victim Industry: Education
    Victim Organization: Boston Academy
    Victim Site: boston.academy
  141. Alleged Data Leak of vibrantsecurities.com Database from India
    Category: Data Leak
    Content: A threat actor known as Bambi has allegedly made available a free database dump associated with vibrantsecurities.com, an Indian financial services entity. The post was shared on a cybercrime forum under the databases section. No further details regarding the volume or specific contents of the data are available from the post.
    Date: 2026-04-15T15:18:15Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-vibrantsecurities-com-Free-database-from-India
    Screenshots:
    None
    Threat Actors: Bambi
    Victim Country: India
    Victim Industry: Financial Services
    Victim Organization: Vibrant Securities
    Victim Site: vibrantsecurities.com
  142. Alleged leak of WordPress credentials or data shared via Telegram
    Category: Combo List
    Content: A threat actor operating under the alias zod has shared what is described as a WordPress-related combolist or data dump on the CrackingX forum. The content is gated and requires forum registration to access, with the password distributed via a Telegram channel. No specific victim organization, record count, or geographic scope has been identified from the available information.
    Date: 2026-04-15T15:17:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72187/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Alleged Data Leak of MayMovil Customer Database from Spain
    Category: Data Leak
    Content: A threat actor operating under the alias Bambi has allegedly leaked a database associated with MayMovil, a Spanish telecommunications provider. The leaked data reportedly includes customer information, addresses, and order records. The database was made available for free on a cybercrime forum.
    Date: 2026-04-15T15:16:13Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-maymovil-com-Free-Database-from-Spain-customer-address-order
    Screenshots:
    None
    Threat Actors: Bambi
    Victim Country: Spain
    Victim Industry: Telecommunications
    Victim Organization: MayMovil
    Victim Site: maymovil.com
  144. Alleged Data Leak of PicBackMan User Database with Credentials
    Category: Data Leak
    Content: A threat actor operating under the alias Bambi has freely distributed an alleged database dump from picbackman.com, a photo and video backup service. The leaked data contains approximately 160,000 records including user login IDs, email addresses, plaintext passwords, MD5-hashed passwords, salted hashes, confirmation codes, payment status, and application usage metadata. The database appears to contain structured user account data with multiple sensitive fields, including some records associat
    Date: 2026-04-15T15:14:09Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-picbackman-com-Database160K-Email-password-MD5
    Screenshots:
    None
    Threat Actors: Bambi
    Victim Country: Unknown
    Victim Industry: Technology / Cloud Storage
    Victim Organization: PicBackMan
    Victim Site: picbackman.com
  145. Alleged PoC Exploit Targeting Lockheed Martin & DroneArm Servers
    Category: Vulnerability
    Content: A threat actor is sharing or advertising a Proof of Concept (PoC) exploit (labeled as version 5) targeting Lockheed Martin and DroneArm server infrastructure via a private Telegram channel link.
    Date: 2026-04-15T15:06:51Z
    Network: telegram
    Published URL: https://t.me/c/3575098403/122
    Screenshots:
    None
    Threat Actors: Brona Blanco
    Victim Country: United States
    Victim Industry: Defense & Aerospace
    Victim Organization: Lockheed Martin
    Victim Site: Unknown
  146. Alleged leak of mixed domain credential combolist
    Category: Logs
    Content: A threat actor known as VegaMoon has made available a combolist containing 21,304 allegedly valid credentials spanning mixed domains. The post was shared on XF, a forum focused on mail access and combolists. The specific organizations or countries affected are unknown due to the mixed-domain nature of the list.
    Date: 2026-04-15T15:06:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/21-304-valid-mixed-domains.608403/
    Screenshots:
    None
    Threat Actors: VegaMoon
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  147. Alleged Sale of Premium SMTP Service with Dedicated IP for Spam Operations
    Category: Initial Access
    Content: A threat actor operating under the alias Skybat is allegedly selling access to a premium SMTP service capable of sending up to 25,000 emails per day across all domains, with a dedicated IP address. The service appears designed to facilitate bulk email or spam campaigns. No specific victim organization or country has been identified.
    Date: 2026-04-15T14:55:20Z
    Network: openweb
    Published URL: https://breached.st/threads/premium-smtp-inbox-all-domains-25k-day-dedicated-ip.86012/unread
    Screenshots:
    None
    Threat Actors: Skybat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  148. Alleged Sale of Global SMS Sending Service with Custom Sender ID Spoofing
    Category: Initial Access
    Content: A threat actor operating under the alias Skybat is advertising a global SMS sending service on a cybercrime forum, offering capabilities including custom sender ID spoofing, smart sender rotation, and API integration. The service claims to support up to 20,000 SMS per day with worldwide reach, enabling phishing, smishing, or spam campaigns at scale. Interested parties are directed to contact @serv9 via Telegram.
    Date: 2026-04-15T14:54:50Z
    Network: openweb
    Published URL: https://breached.st/threads/global-sms-sender-custom-id.86014/unread
    Screenshots:
    None
    Threat Actors: Skybat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  149. Alleged Distribution of AIO Gift Card Code Generator Tool by Threat Actor Acquire
    Category: Data Leak
    Content: A threat actor operating under the alias Acquire has made available a console-based tool dubbed AIO Giftcard Generator on a cracking forum. The tool claims to generate code-pattern strings mimicking gift card formats for multiple platforms including Amazon, Steam, Xbox, PlayStation, Roblox, Netflix, and others. The tool is shared as a free download and is flagged on VirusTotal, with the post itself warning users to disable antivirus software to run it, suggesting potential malicious function
    Date: 2026-04-15T14:53:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-AIO-Giftcard-Generator-by-Acquire–200513
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: E-Commerce, Gaming, Entertainment
    Victim Organization: Amazon, Steam, Xbox, PlayStation, Roblox, Fortnite, eBay, Netflix, iTunes, PayPal, Minecraft
    Victim Site: Unknown
  150. Alleged Distribution of Cracked Premium Trading Tools and Crypto Bot Pack
    Category: Data Leak
    Content: A threat actor on DemonForums has made available a cracked bundle of premium trading platforms and crypto automation bots, including tools associated with TradingView, Thinkorswim, MetaStock, and exchange bots for Binance, BitMex, and Poloniex. The pack is distributed as a free download and includes mixed cracked builds with scene-style releases. The post explicitly warns that the tools may be flagged as malware by antivirus software, indicating a significant risk of embedded malicious code targ
    Date: 2026-04-15T14:53:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Premium-Trading-Tools-Pack-Cracked
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Financial Services / Trading Software
    Victim Organization: TradingView, Thinkorswim, MetaStock, and others
    Victim Site: Unknown
  151. Alleged leak of mixed-domain email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias VegaM has made available a combolist containing 21,304 alleged valid email and password credential pairs spanning multiple domains. The credentials were shared for free via an external paste service. No specific victim organization or country has been identified, as the list appears to aggregate credentials from various sources.
    Date: 2026-04-15T14:52:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-21-304-Valid-Mixed-Domains
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Alleged sale of payment card dumps with PINs targeting multiple countries
    Category: Combo List
    Content: A threat actor operating under the alias 6xprocrd and contactable via Telegram handle ColdApollo is selling payment card dumps including Track 1 and Track 2 data with PINs. The offerings cover cards from multiple countries including the United States, United Kingdom, Canada, Australia, and EU nations, priced between $60 and $80 per card. The seller claims the dumps are fresh and valid, suggesting recently compromised payment card data likely obtained via skimming or point-of-sale intrusions.
    Date: 2026-04-15T14:52:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72181/
    Screenshots:
    None
    Threat Actors: 6xprocrd
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Alleged leak of mixed credential combolist (X2172 HQ Mix)
    Category: Combo List
    Content: A threat actor operating under the alias @Steveee36 has made available a mixed combolist containing approximately 2,172 credential entries on the cracking forum CrackingX. The post offers a free download of the file, described as HQ Mix, suggesting high-quality credential pairs. No specific victim organization, industry, or country has been identified.
    Date: 2026-04-15T14:52:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72182/
    Screenshots:
    None
    Threat Actors: stevee36
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  154. Alleged leak of mixed credential combolist (X2172 HQ Mix)
    Category: Combo List
    Content: A threat actor operating under the alias Steveee36 has shared a combolist titled X2172 HQ Mix on the DemonForums cybercrime forum. The post offers hidden content accessible to registered members, suggesting a free distribution of credential data. The specific origins, targets, or volume of the credentials included in the combolist are not disclosed in the post.
    Date: 2026-04-15T14:52:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X2172-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. 11ML Bussines Corp COMBO
    Category: Combo List
    Content: New thread posted by CODER: 11ML Bussines Corp COMBO
    Date: 2026-04-15T14:52:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72183/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Alleged leak of 36,000 email credentials shared on underground forum
    Category: Combo List
    Content: A threat actor operating under the alias TeraCloud1 has made available a combolist of approximately 36,000 allegedly valid email credentials on DemonForums. The content is hidden behind a registration or login requirement, with the actor also advertising a private cloud service via Telegram. No specific victim organization or targeted service has been identified.
    Date: 2026-04-15T14:51:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-36K-VALID-MAIL-ACCESS–200514
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Alleged Data Breach of DarkForums via myBB Vulnerability Exposing 427K Records by ShinyHunters
    Category: Data Breach
    Content: The threat actor group ShinyHunters claims to have exploited a myBB vulnerability on DarkForums to extract approximately 427,000 records covering post IDs 0–442,200. The exposed data includes usernames, IP addresses, hostnames, and post metadata for 44,300 unique users, with 78,000 unique IPs identified. The dataset includes 19,300 Tor node connections, 15,200 VPN/hosting provider connections, and 97,400 entries with residential hostnames. The data has been published on BreachForums (breachforums.ai). A sample was included deanonymizing specific users operating under aliases Lucifer and AnonOne tied to IP 49.37.44.99.
    Date: 2026-04-15T14:50:32Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1175
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Cybercrime Forum
    Victim Organization: DarkForums
    Victim Site: darkforums.st
  158. Alleged Sale of Phishing Packages Including Email Sender and SMS Global Messaging Tools
    Category: Initial Access
    Content: A threat actor operating under the alias Skybat is allegedly selling phishing packages on the cybercriminal forum Breached, including email sender tools and SMS global messaging capabilities. These tools are typically used to conduct large-scale phishing campaigns targeting individuals or organizations. No specific victim, pricing details, or technical specifications were provided in the available post content.
    Date: 2026-04-15T14:24:11Z
    Network: openweb
    Published URL: https://breached.st/threads/phishing-packages-email-sender-sms-global-messages.86011/unread
    Screenshots:
    None
    Threat Actors: Skybat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Alleged sale of compromised Office 365 and GoDaddy accounts for spam campaigns
    Category: Combo List
    Content: A threat actor operating as SPAMMERS STORE is advertising compromised Office 365 business and education admin accounts alongside GoDaddy professional accounts via a Telegram channel. The accounts are marketed for spam campaign use, with claims of high inbox delivery rates and freshly obtained credentials. Contact is facilitated through Telegram handles @MichealOFFICE365 and @MR_CRACK1.
    Date: 2026-04-15T14:22:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72178/
    Screenshots:
    None
    Threat Actors: asfshe224
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft, GoDaddy
    Victim Site: office.com, godaddy.com
  160. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias FlashCloud2 has made available an alleged private combolist containing 1,010 Hotmail credentials on the cracking forum CX. The post is gated behind registration or sign-in, limiting full visibility into the content and its validity. The data likely consists of email and password pairs targeting Microsoft Hotmail accounts.
    Date: 2026-04-15T14:21:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72179/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  161. Alleged data breach and admin access exposure of Muslim Funeral Services Toulouse
    Category: Initial Access
    Content: A threat actor operating under the alias ntmpd has allegedly shared a database dump along with administrative access credentials belonging to Pompes Funèbre Musulmanes Toulouse, a Muslim funeral services provider in Toulouse, France. The post was made on a known cybercrime forum in the databases section. No further details regarding the scope or content of the data are available due to the absence of post content.
    Date: 2026-04-15T14:20:37Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FR-Pompes-Fun%C3%A8bre-Musulmanes-Toulouse-Acc%C3%A8s-Admin
    Screenshots:
    None
    Threat Actors: ntmpd
    Victim Country: France
    Victim Industry: Funeral Services
    Victim Organization: Pompes Funèbre Musulmanes Toulouse
    Victim Site: Unknown
  162. Alleged Data Leak of Pakistan KP Government Information & Advertising Management System (iams.kp.gov.pk)
    Category: Data Leak
    Content: A threat actor operating under the alias Bambi has freely distributed a database dump allegedly sourced from iams.kp.gov.pk, a Pakistani government portal associated with the Khyber Pakhtunkhwa Information and Public Relations Department. The leaked data includes user credentials with MD5-hashed passwords, usernames, designations, department IDs, office IDs, and user privilege levels. The database appears to contain records for government officials, newspaper bureau chiefs, and administrative
    Date: 2026-04-15T14:18:34Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-iams-kp-gov-pk-Free-database-from%C2%A0Pakistan
    Screenshots:
    None
    Threat Actors: Bambi
    Victim Country: Pakistan
    Victim Industry: Government
    Victim Organization: Khyber Pakhtunkhwa Information & Public Relations Department
    Victim Site: iams.kp.gov.pk
  163. Alleged leak of 90,000 valid email access credentials
    Category: Logs
    Content: A threat actor known as Vekkoo has made available a combolist containing approximately 90,000 allegedly valid email access credentials on the XF forum. The post appears to offer a free download of the credential list, though specific victim organizations or countries are not identified. The data is described as valid mail access, suggesting active or recently verified email account credentials.
    Date: 2026-04-15T14:10:21Z
    Network: openweb
    Published URL: https://xforums.st/threads/90k-valid-mail-access-txt.608394/
    Screenshots:
    None
    Threat Actors: Vekkoo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Alleged Sale of Spanish Database with IBAN Financial Data
    Category: Data Breach
    Content: A threat actor operating under the handle @itsurjoker is claiming to possess multiple recent Spanish databases containing IBAN (International Bank Account Number) information and additional data. The actor is soliciting interested buyers and offering samples via direct message.
    Date: 2026-04-15T14:00:37Z
    Network: telegram
    Published URL: https://t.me/c/1887244124/1624
    Screenshots:
    None
    Threat Actors: Joker
    Victim Country: Spain
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Website Defacement of Agalma by Threat Actor Zod
    Category: Defacement
    Content: On April 15, 2026, a threat actor operating under the alias Zod defaced a page on the Polish website agalma.pl, targeting the URL https://www.agalma.pl/zod.html. The attack was conducted on a Linux-based server and represents a single targeted defacement rather than a mass or home page compromise. No specific motivation or proof of concept was publicly disclosed.
    Date: 2026-04-15T13:57:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248555
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Agalma
    Victim Site: www.agalma.pl
  166. Alleged Sale of ЭВМ-2000 C2 Framework with Zero-Click Exploits for Multiple Platforms
    Category: Initial Access
    Content: A threat actor known as OnarDev is allegedly selling a Command and Control (C2) framework called ЭВМ-2000, which purportedly leverages zero-click exploits targeting iOS, Windows Server, Linux, and macOS systems. The post was published on a dark web forum under the Sellers Place section. No further technical details or pricing information are available from the post content.
    Date: 2026-04-15T13:55:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-%F0%9F%94%B4-%D0%AD%D0%92%D0%9C-2000-C2-Zero-Click-IOS-Windows-Server-Linux-MacOS
    Screenshots:
    None
    Threat Actors: OnarDev
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Alleged Sale of Pre-Authentication Remote Code Execution 0-Day Exploit for TerraMaster
    Category: Initial Access
    Content: A threat actor operating under the alias berz0k is allegedly selling a zero-day exploit for TerraMaster devices that enables unauthenticated remote code execution (Preauth RCE). The exploit targets TerraMaster NAS systems and could allow attackers to compromise affected devices without requiring prior authentication. No further technical details or pricing information were provided in the post.
    Date: 2026-04-15T13:53:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-0day-TerraMaster-Preauth-RCE
    Screenshots:
    None
    Threat Actors: berz0k
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: TerraMaster
    Victim Site: terra-master.com
  168. Alleged Data Breach of Ukrainian Government Entity in Kupyansk
    Category: Data Breach
    Content: A threat actor known as BigGrep is allegedly offering data associated with a Ukrainian government entity related to Kupyansk on a dark web forum marketplace. The post appears in the sellers section, suggesting the data may be for sale. No further details regarding the content, volume, or nature of the data are available from the post.
    Date: 2026-04-15T13:51:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Government-of-Ukraine-Kupyanskaya-a
    Screenshots:
    None
    Threat Actors: BigGrep
    Victim Country: Ukraine
    Victim Industry: Government
    Victim Organization: Government of Ukraine – Kupyansk Administration
    Victim Site: Unknown
  169. Alleged Data Breach of Banco Davivienda and EmergiaCC Colombia
    Category: Data Breach
    Content: A threat actor operating under the alias Petro_Escobar is allegedly selling data associated with Banco Davivienda and EmergiaCC, both entities based in Colombia. No further details regarding the nature of the data, record count, or pricing are available from the post content. The claim remains unverified.
    Date: 2026-04-15T13:49:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Banco-Davivienda-EmergiaCC-Colombia
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Financial Services
    Victim Organization: Banco Davivienda / EmergiaCC
    Victim Site: Unknown
  170. Alleged Data Breach and Extortion of D-Troy Logistics by NightSpire
    Category: Data Breach
    Content: The threat actor group NightSpire claims to have exfiltrated 360 GB of data from D-Troy Logistics LLC, a North American logistics company with revenue under $5M. The stolen data allegedly includes internal documents and employee records. The data is being offered for sale at $350 via a Tor-based link. The post includes a ZoomInfo reference for the victim company.
    Date: 2026-04-15T13:48:25Z
    Network: telegram
    Published URL: https://t.me/c/3619924522/32
    Screenshots:
    None
    Threat Actors: NightSpire
    Victim Country: United States
    Victim Industry: Logistics / Transportation
    Victim Organization: D-Troy Logistics LLC
    Victim Site: dtroylogistics.com
  171. Alleged Data Breach of Jeeny Saudi Arabia App
    Category: Data Breach
    Content: A threat actor on a dark web forum has made a post referencing the Jeeny ride-hailing application operating in Saudi Arabia. No further details regarding the nature of the threat, data types, or record counts are available due to absent post content.
    Date: 2026-04-15T13:47:35Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Jeeny-Saudi-Arabia-App
    Screenshots:
    None
    Threat Actors: Anonymous2090
    Victim Country: Saudi Arabia
    Victim Industry: Transportation & Ride-Hailing
    Victim Organization: Jeeny
    Victim Site: jeeny.com
  172. Alleged Data Breach of ANDE (Administración Nacional de Electricidad) Paraguay
    Category: Data Breach
    Content: A threat actor operating under the alias GordonFreeman is allegedly selling a full database dump from ANDE (Administración Nacional de Electricidad), Paraguays national electricity administration, containing approximately 1.65 million records. The post was identified on a dark web forum in the Sellers Place section. No further details regarding the data fields, price, or sample data are available from the post content.
    Date: 2026-04-15T13:45:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Full-DB-ANDE-GOV-PY-1-65-Million-Records-PARAGUAY
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Paraguay
    Victim Industry: Energy & Utilities
    Victim Organization: Administración Nacional de Electricidad (ANDE)
    Victim Site: ande.gov.py
  173. Alleged Data Breach of Pakistan Army Young Officers Personnel Records
    Category: Data Breach
    Content: A threat actor operating under the alias Mipor is allegedly selling personal data pertaining to young officers of the Pakistan Army on a dark web forum. The post was identified in the Sellers Place section of the forum, indicating a commercial intent. No further details regarding record count, specific data fields, or pricing were available in the post content.
    Date: 2026-04-15T13:43:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-PAKISTAN-ARMY-YOUNG-OFFICERS-DATA
    Screenshots:
    None
    Threat Actors: Mipor
    Victim Country: Pakistan
    Victim Industry: Government & Defense
    Victim Organization: Pakistan Army
    Victim Site: Unknown
  174. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias He_Cloud has made available a combolist containing 793 alleged valid Hotmail email and password combinations on DemonForums. The post offers a free download of the credential list, described as high quality (HQ) validated entries. No information regarding the origin or method of collection of the credentials has been provided.
    Date: 2026-04-15T13:43:14Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-793x-HQ-HOTMAIL-VALIDS
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  175. Alleged leak of Hotmail credential combolist with 640 hits
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared a combolist containing 640 verified Hotmail credentials, referred to as hits. The post is behind a registration wall, suggesting the content is available to registered forum members. The combolist likely contains email and password pairs for Hotmail accounts.
    Date: 2026-04-15T13:42:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72175/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  176. Alleged Data Breach of Nakamura Co Indonesian Company Database
    Category: Data Breach
    Content: A threat actor known as Kyyzo is selling a 63GB+ database allegedly stolen from Nakamura Co, an Indonesian company. The database purportedly contains over 2.6 million records including personal details such as names, email addresses, phone numbers, physical addresses, bank account numbers, and social media accounts belonging to job applicants, members, employees, and partners. The seller also claims to include bonus materials such as WhatsApp conversation screenshots, transaction proofs, and e
    Date: 2026-04-15T13:41:23Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-63GB-DATABASE-NAKAMURA-CO-ID
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Nakamura Co
    Victim Site: nakamura.co.id
  177. Website Defacement of Retirosparaelalma by MR~TNT of QATAR911
    Category: Defacement
    Content: On April 15, 2026, threat actor MR~TNT operating under the team QATAR911 defaced the website retirosparaelalma.co, a Spanish-language spiritual retreats organization. The attack targeted the sites index page and was recorded as a single targeted defacement hosted on a cloud-based server.
    Date: 2026-04-15T13:40:50Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248554
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Colombia
    Victim Industry: Religious / Spiritual Services
    Victim Organization: Retiros Para El Alma
    Victim Site: retirosparaelalma.co
  178. Alleged Sale of Iraq 2025-2026 National Census Data Affecting 47 Million Records
    Category: Data Breach
    Content: A threat actor on the Breached forum is selling what they claim to be Iraqs 2025-2026 national census database, allegedly containing approximately 47.7 million records. The data is being offered for $1,200. The legitimacy and origin of the data have not been independently verified.
    Date: 2026-04-15T13:21:41Z
    Network: openweb
    Published URL: https://breached.st/threads/iraqs-2025-2026-census-data-has-been-leaked-47-766-792-selling.86010/unread
    Screenshots:
    None
    Threat Actors: ahmadxalil
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Iraq Census Authority
    Victim Site: Unknown
  179. Alleged leak of Japanese email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has shared a combolist of approximately 181,000+ email:password credential pairs allegedly associated with Japanese users on the DemonForums cybercrime forum. The content is described as fresh and high quality, and is made available as a free download via hidden content. The post promotes additional combolists through a Telegram channel linked to Maxi_Leaks.
    Date: 2026-04-15T13:20:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-181-K-%E2%9C%A6-Japan-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  180. Alleged leak of Latvian email and password credentials
    Category: Combo List
    Content: A threat actor known as CobraEgy has made available a combolist of approximately 49,000+ email and password credentials associated with Latvia on the DemonForums cybercrime forum. The credential list is described as fresh and high quality, and is shared via a hidden content link requiring forum registration. The post also promotes a Telegram channel (Maxi_links) for additional combolists.
    Date: 2026-04-15T13:20:10Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-49-K-%E2%9C%A6-Latvia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Latvia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged leak of Israeli email and password credentials
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has shared a combolist of over 25,000 email and password credential pairs purportedly belonging to Israeli users on DemonForums. The credentials are described as fresh and high quality. The post directs users to a Telegram channel (Maxi_links) for additional combolists, suggesting an ongoing credential distribution operation.
    Date: 2026-04-15T13:19:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-25-K-%E2%9C%A6-Israel-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  182. Alleged leak of Irish email and password credentials
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has shared a combolist of approximately 19,000 email and password credential pairs associated with Irish users on the DemonForums cybercrime forum. The post claims the credentials are fresh and high quality, and directs users to a Telegram channel (Maxi_links) for additional combolists. No specific organization or source has been identified.
    Date: 2026-04-15T13:18:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-19-K-%E2%9C%A6-Ireland-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Ireland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  183. Alleged leak of Kenyan email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has made available a combolist of approximately 15,000+ email and password credential pairs allegedly associated with Kenyan users. The list is described as fresh and high quality, and is being distributed for free via the DemonForums platform. A Telegram channel (Maxi_links) is referenced as a source for additional combolists.
    Date: 2026-04-15T13:17:21Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-15-K-%E2%9C%A6-Kenya-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Kenya
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Alleged leak of Lithuanian credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has made available a combolist of approximately 13,000+ email and password credential pairs associated with Lithuanian users on the DemonForums cybercrime forum. The post describes the content as fresh and high quality, suggesting recently harvested credentials. The list is offered as a free hidden download, with the actor promoting additional combolists via a Telegram channel.
    Date: 2026-04-15T13:16:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-13-K-%E2%9C%A6-Lithuania-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Lithuania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Alleged leak of credential combolist (VIP ULP 5) distributed via Telegram
    Category: Combo List
    Content: A threat actor operating under the alias zod has shared a credential combolist labeled VIP ULP 5 on the CrackingX forum. The content is gated behind registration or sign-in, with access to the actual data distributed via a Telegram channel (t.me/zoooddddd). No specific victim organization, record count, or targeted region has been identified from the available post content.
    Date: 2026-04-15T13:16:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72173/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Alleged distribution of Office-themed credential combolist
    Category: Combo List
    Content: A threat actor known as CODER is distributing a combolist themed around Office credentials via Telegram channels and a cracking forum. The content is offered for free through two Telegram groups (t.me/Combo445544 and t.me/Coder554455), with additional combos available upon request via direct Telegram message. No specific victim organization or record count has been disclosed.
    Date: 2026-04-15T13:16:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72174/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  187. Alleged Critical Vulnerability in Google Chrome Enabling Remote Code Execution
    Category: Vulnerability
    Content: A security vulnerability has been identified in older versions of Google Chrome that allows attackers to execute code and potentially gain access to a users system simply by visiting a malicious webpage, without requiring any file download. The flaw was reportedly exploited in the wild before Google released a security update. Users are advised to update Chrome to the latest version and avoid clicking on unknown or suspicious links.
    Date: 2026-04-15T13:13:18Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21209
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google Chrome
    Victim Site: google.com
  188. Alleged Sale of Discounted ChatGPT Plus Accounts
    Category: Initial Access
    Content: A threat actor on Breached.st is selling allegedly private ChatGPT Plus accounts at $6 per month, claiming they are non-shared and can be activated on the buyers own email address. The legitimacy and origin of these accounts is unverified, but the offer suggests the accounts may be obtained through unauthorized means such as stolen credentials or fraudulent purchases. This activity poses a risk to OpenAIs platform integrity and potentially to the original account holders.
    Date: 2026-04-15T12:55:02Z
    Network: openweb
    Published URL: https://breached.st/threads/chatgpt-plus-6-month-private-account.86009/unread
    Screenshots:
    None
    Threat Actors: jasonm
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: OpenAI
    Victim Site: openai.com
  189. Alleged leak of 38,000 email credentials combolist
    Category: Combo List
    Content: A threat actor known as TeraCloud1 has made available a combolist of approximately 38,000 validated email credentials on a cybercrime forum. The content is hidden behind a registration or login requirement. The actor also advertises a private cloud service accessible via Telegram for additional content or services.
    Date: 2026-04-15T12:53:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-38K-VALID-MAIL-ACCESS–200497
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor known as StrawHatBase has shared a combolist containing approximately 10,000 email address and password combinations on DemonForums. The content is hidden behind a registration or login requirement, limiting visibility into the specific targets or sources. The post is categorized under combolists, suggesting the credentials are aggregated from multiple sources.
    Date: 2026-04-15T12:53:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-10K-Mail-Access-Mix–200498
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  191. Alleged leak of Italian email credentials combolist
    Category: Combo List
    Content: A threat actor known as CobraEgy has shared a combolist containing approximately 947,000+ email and password credential pairs targeting Italian users on the DemonForums cybercrime forum. The content is described as fresh and high quality, and is made available for free behind a registration wall. The post also references a Telegram channel (Maxi_links) associated with additional combolist distributions.
    Date: 2026-04-15T12:52:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-947-K-%E2%9C%A6-Italy-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-15-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias NotSellerxd has made available a mixed email combolist containing approximately 3,915 credential pairs on the cracking forum CrackingX. The post offers a free download link with no further details provided regarding the origin, targeted services, or composition of the combolist. The data appears to be a compilation of mixed-source email credentials.
    Date: 2026-04-15T12:52:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72170/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared an alleged combolist of 3,000 valid Hotmail credentials described as private hits. The post requires forum registration or sign-in to access the content, suggesting it may be restricted to verified members. The credential list appears to contain validated email and password combinations for Hotmail accounts.
    Date: 2026-04-15T12:52:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72171/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  194. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias FlashCloud2 has made available an alleged combolist of 2,570 Hotmail credentials on a cracking forum. The post is labeled UHQ (Ultra High Quality), suggesting the credentials may be fresh or previously unverified. The content is restricted to registered or signed-in forum members.
    Date: 2026-04-15T12:52:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72172/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  195. Alleged promotion of CVV card checking service 9Check.me
    Category: Phishing
    Content: A forwarded message advertises 9Check.me, a service that checks CVV card validity and credit limits. This type of service is commonly used by threat actors to validate stolen payment card data before use or resale.
    Date: 2026-04-15T12:49:08Z
    Network: telegram
    Published URL: https://t.me/checkMEcvv/2
    Screenshots:
    None
    Threat Actors: 9Check.me
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: 9check.me
  196. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist of approximately 44,000 Hotmail credentials on an underground forum. The post is categorized under Mail Access & Combolists, suggesting the data consists of email and password combinations. The origin of the credentials and whether they are valid or unique aggregations from prior breaches is unverified.
    Date: 2026-04-15T12:43:14Z
    Network: openweb
    Published URL: https://xforums.st/threads/hotmail-unique-combo_4_44000.608390/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  197. Alleged leak of 21.4 million URL:Login:Password credential combolist
    Category: Combo List
    Content: A threat actor known as VitVit has shared a large combolist containing approximately 21.4 million lines in URL:login:password format, totaling 1.2GB in size, on the cracking forum CrackingX. The content is available to registered users of the forum. No specific victim organization or targeted service has been identified, suggesting this is a compiled multi-source credential list.
    Date: 2026-04-15T12:31:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72166/
    Screenshots:
    None
    Threat Actors: VitVit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor using the alias UniqueCombo has made available a combolist allegedly containing 44,000 unique Hotmail credentials on the cracking forum CrackingX. The post is gated behind registration or sign-in, limiting full visibility into the content. The combolist likely contains email and password pairs associated with Hotmail accounts.
    Date: 2026-04-15T12:30:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72167/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  199. Alleged leak of educational sector credential combolists
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing free educational sector combolists via Telegram channels and a cracking forum. The actor promotes two Telegram groups offering free credential lists and tools. No specific victim organization or record count has been identified.
    Date: 2026-04-15T12:29:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72168/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Alleged Data Breach of Ariomex Iranian Cryptocurrency Exchange
    Category: Data Breach
    Content: A threat actor operating under the handle Kotowka is selling an alleged database dump from Ariomex.com, a major Iranian cryptocurrency exchange. The dataset purportedly contains 50,000 verified user records including full names, usernames, email addresses, phone numbers, national IDs, Bitcoin wallet addresses, USDT balances, KYC status, last known IP addresses, and registration dates. The data is being offered for sale at $35,000 via a Telegram contact.
    Date: 2026-04-15T12:28:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72169/
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Iran
    Victim Industry: Cryptocurrency / Financial Services
    Victim Organization: Ariomex
    Victim Site: ariomex.com
  201. Website Defacement of Dr. RP Singh Ortho by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Dr. RP Singh Orthopaedics, a medical/healthcare website likely based in India. The defacement was a targeted, non-mass incident with a mirror archived at zone-xsec.com.
    Date: 2026-04-15T12:23:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834326
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Dr. RP Singh Orthopaedics
    Victim Site: drrpsinghortho.com
  202. Website Defacement of ASAP Events by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of ASAP Events, an events company based in the United Arab Emirates. The defacement targeted a specific file path (0x.txt) on the domain asapevents.ae. The incident was recorded as a single targeted defacement, not part of a mass or redefacement campaign.
    Date: 2026-04-15T12:22:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834322
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United Arab Emirates
    Victim Industry: Events and Entertainment
    Victim Organization: ASAP Events
    Victim Site: asapevents.ae
  203. Website Defacement of jmdnetmart.com by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website jmdnetmart.com, replacing content with a defacement page hosted at the path /0x.txt. The incident was a targeted single-site defacement, with a mirror of the defacement archived at zone-xsec.com. No specific motive or server details were disclosed.
    Date: 2026-04-15T12:21:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834332
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: E-commerce / Retail
    Victim Organization: JMD Net Mart
    Victim Site: jmdnetmart.com
  204. Website Defacement of Epoxy San Francisco by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website epoxysanfrancisco.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a local epoxy flooring services company based in San Francisco, United States. The incident was a single-target, non-mass defacement with a mirror archived at zone-xsec.com.
    Date: 2026-04-15T12:21:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834338
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Construction / Home Improvement
    Victim Organization: Epoxy San Francisco
    Victim Site: epoxysanfrancisco.com
  205. Website Defacement of Sonido Tech by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website sonido-tech.com was defaced by threat actor chinafans operating under the group 0xteam. The attacker left a defacement file at the path /0x.txt. No specific motivation, server details, or IP address were disclosed in connection with this incident.
    Date: 2026-04-15T12:20:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834331
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Sonido Tech
    Victim Site: sonido-tech.com
  206. Website Defacement of Pool Deck Los Angeles by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website pooldecklosangeles.com was defaced by a threat actor operating under the handle chinafans, affiliated with the group 0xteam. The defacement targeted a Los Angeles-based pool deck construction and services company. The incident was a single, targeted defacement rather than a mass or repeat defacement campaign.
    Date: 2026-04-15T12:19:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834337
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Construction / Home Services
    Victim Organization: Pool Deck Los Angeles
    Victim Site: pooldecklosangeles.com
  207. Website Defacement of Epoxy Floors Scottsdale by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Epoxy Floors Scottsdale, a flooring services company based in Scottsdale, Arizona. The incident was a targeted single-site defacement, not a mass or home page defacement. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-04-15T12:18:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834333
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Construction / Home Improvement Services
    Victim Organization: Epoxy Floors Scottsdale
    Victim Site: epoxyfloorsscottsdale.com
  208. Alleged Sale of Fresh Multi-Country Credential Databases with Platform-Specific Keyword Filtering
    Category: Logs
    Content: A threat actor is selling fresh databases/logs from multiple countries including UK, DE, JP, NL, BR, PL, ES, US, and IT. The seller claims to offer keyword-filtered results targeting major e-commerce and service platforms such as Amazon, eBay, Walmart, Uber, PayPal, Alibaba, Poshmark, Mercari, PSN, Booking.com, and others. The actor claims to operate a private cloud and offers valid webmails including ntlworld. Buyers are directed to DM for custom requests.
    Date: 2026-04-15T12:18:41Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/63073
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: Unknown
    Victim Industry: E-Commerce / Consumer Services
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Website Defacement of 30at30.in by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced the Indian website 30at30.in by uploading a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated compromise. The motivation and server details remain unknown.
    Date: 2026-04-15T12:18:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834343
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: 30at30
    Victim Site: 30at30.in
  210. Website Defacement of CBR Physio by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website cbrphysio.com, belonging to CBR Physio, a physiotherapy provider likely based in Canberra, Australia, was defaced by a threat actor operating under the handle chinafans affiliated with 0xteam. The defacement was a targeted, non-mass incident with the defaced content archived at zone-xsec.com. No specific motive or exploitation method was disclosed in the available data.
    Date: 2026-04-15T12:17:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834335
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Australia
    Victim Industry: Healthcare / Physical Therapy
    Victim Organization: CBR Physio
    Victim Site: cbrphysio.com
  211. Website Defacement of Epoxy Flooring Richmond by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as chinafans, affiliated with the group 0xteam, defaced the website of Epoxy Flooring Richmond, a flooring services company based in Richmond, United States. The incident was a targeted single-site defacement, with a mirror of the defaced page archived at zone-xsec.com. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T12:16:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834328
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Construction / Home Improvement Services
    Victim Organization: Epoxy Flooring Richmond
    Victim Site: epoxyflooringrichmond.com
  212. Website Defacement of Salice Law by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website salicelaw.com was defaced by threat actor chinafans operating under the group 0xteam. The attacker placed a defacement file at salicelaw.com/0x.txt, targeting what appears to be a law firms web presence. The incident was recorded as a single targeted defacement rather than a mass or home page defacement.
    Date: 2026-04-15T12:15:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834324
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Legal Services
    Victim Organization: Salice Law
    Victim Site: salicelaw.com
  213. Website Defacement of Austin Air Conditioner by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Austin Air Conditioner, an HVAC services provider based in Austin, Texas. The incident was a targeted single-site defacement, with a mirror of the defaced page archived at zone-xsec.com. No specific motive or server details were disclosed.
    Date: 2026-04-15T12:14:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834340
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: HVAC / Home Services
    Victim Organization: Austin Air Conditioner
    Victim Site: austinairconditioner.org
  214. Website Defacement of trinoxmeta.com by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website trinoxmeta.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was a targeted single-site attack, with the defaced content accessible via a text file at trinoxmeta.com/0x.txt. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-04-15T12:14:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834336
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Trinox Meta
    Victim Site: trinoxmeta.com
  215. Website Defacement of Clockwork Custom Tattoo by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Clockwork Custom Tattoo, a tattoo studio. The attack was a targeted single-site defacement, with a mirror of the defaced page archived at zone-xsec.com. No specific motivation or server details were disclosed in connection with the incident.
    Date: 2026-04-15T12:13:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834348
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Personal Care & Beauty Services
    Victim Organization: Clockwork Custom Tattoo
    Victim Site: clockworkcustomtattoo.com
  216. Website Defacement of SouthAsian.com by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website southasian.com was defaced by a threat actor identified as chinafans, operating under the group 0xteam. The attacker placed a defacement file at southasian.com/0x.txt. The incident was a targeted single-site defacement with no additional technical details such as server software or exploitation method disclosed.
    Date: 2026-04-15T12:12:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834347
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Media/News
    Victim Organization: South Asian
    Victim Site: southasian.com
  217. Website Defacement of White Light Books by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website whitelightbooks.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was a targeted, single-site incident and does not appear to be part of a mass defacement campaign. The attack was documented and mirrored via zone-xsec.com.
    Date: 2026-04-15T12:11:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834327
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Retail / Books & Publishing
    Victim Organization: White Light Books
    Victim Site: whitelightbooks.com
  218. Alleged leak of Discord, Fortnite, and FunPay cookies and credentials
    Category: Data Leak
    Content: A threat actor operating under the alias bluestarcrack has made available a collection of cookies and credentials allegedly associated with Discord, Fortnite, FunPay, and other platforms. The data was shared via Uploadery, a file hosting service. The post does not specify a price, suggesting the content is being distributed freely.
    Date: 2026-04-15T12:11:13Z
    Network: openweb
    Published URL: https://breached.st/threads/cookies-discord-fortnite-funpay-more.86008/unread
    Screenshots:
    None
    Threat Actors: bluestarcrack
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Discord, Fortnite, FunPay
    Victim Site: discord.com, fortnite.com, funpay.com
  219. Website Defacement of Epoxy Naperville by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website epoxynaperville.com, belonging to an epoxy flooring service provider based in Naperville, Illinois, was defaced by a threat actor operating under the alias chinafans and affiliated with the group 0xteam. The defacement was a targeted, single-site compromise with a mirror archived at zone-xsec.com.
    Date: 2026-04-15T12:10:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834339
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Construction / Home Improvement Services
    Victim Organization: Epoxy Naperville
    Victim Site: epoxynaperville.com
  220. Website Defacement of Luca Bio Analytics by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website lucabioanalytics.cl, belonging to Chilean bioanalytics firm Luca Bio Analytics, was defaced by threat actor chinafans operating under the group 0xteam. The defacement was a targeted single-site attack, with a mirror of the defaced page archived at zone-xsec.com.
    Date: 2026-04-15T12:10:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834357
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Chile
    Victim Industry: Biotechnology / Analytics
    Victim Organization: Luca Bio Analytics
    Victim Site: lucabioanalytics.cl
  221. Website Defacement of Greenhills Growth by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website greenhillsgrowth.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was a targeted single-site incident, with the defaced content accessible at the path /0x.txt. No additional technical details such as server software or exploited vulnerability were disclosed.
    Date: 2026-04-15T12:09:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834334
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Finance / Investment
    Victim Organization: Greenhills Growth
    Victim Site: greenhillsgrowth.com
  222. Alleged leak of Microsoft credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias zod has shared a combolist of 611 credential entries allegedly associated with Microsoft accounts on the cracking forum CrackingX. The content is gated behind a forum login, with the password distributed via a Telegram channel linked to the actor. The post references a Telegram bot (@hello_zod_bot) suggesting an automated credential distribution operation.
    Date: 2026-04-15T12:09:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72163/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: microsoft.com
  223. Alleged leak of USA combolist distributed via D4rkNetHub
    Category: Combo List
    Content: A threat actor operating under the alias D4rkNetHub has made available a combolist containing 677 alleged United States credentials on a cracking forum. The post is attributed to a collection labeled CLOUD_2026-04-15 and requires forum registration to access the content. The specific organizations or services affected are not identified in the available post data.
    Date: 2026-04-15T12:08:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72164/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  224. Website defacement of FWM (fwm.com.tw) by chinafans of 0xteam
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Taiwanese website fwm.com.tw. The defacement was a targeted single-site incident, with a mirror of the defaced page archived at zone-xsec.com. No specific motivation or server details were disclosed in the available intelligence.
    Date: 2026-04-15T12:08:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834321
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Taiwan
    Victim Industry: Unknown
    Victim Organization: FWM
    Victim Site: fwm.com.tw
  225. Website Defacement of parfortheculture.com by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website parfortheculture.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was a targeted single-site incident, with a mirror of the defaced page archived at zone-xsec.com. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T12:07:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834355
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Entertainment / Culture
    Victim Organization: Par For The Culture
    Victim Site: parfortheculture.com
  226. Website Defacement of datameiz.com by chinafans (0xteam)
    Category: Defacement
    Content: The website datameiz.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was recorded on April 15, 2026, with the attacker leaving a marker file at the path /0x.txt. The incident was a single-target, non-mass defacement with no prior redefacement history noted.
    Date: 2026-04-15T12:06:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834329
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Datameiz
    Victim Site: datameiz.com
  227. Website defacement of menotificaron.cl by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the Chilean website menotificaron.cl was defaced by a threat actor operating under the handle chinafans, affiliated with the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the sites homepage and was neither a mass nor repeat defacement. No specific motivation or server details were disclosed.
    Date: 2026-04-15T12:00:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834251
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: Menotificaron
    Victim Site: menotificaron.cl
  228. Website defacement of topfreshnews.info by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website topfreshnews.info. The defacement was a targeted single-site attack, with the defaced content accessible via a text file at the root path. The incident was archived and mirrored by zone-xsec.com for record-keeping purposes.
    Date: 2026-04-15T11:59:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834254
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: News/Media
    Victim Organization: Top Fresh News
    Victim Site: topfreshnews.info
  229. Website Defacement of Moshav Financial by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the Australian financial services website moshavfinancial.com.au was defaced by a threat actor known as chinafans, operating under the group 0xteam. The attacker placed a defacement file at the path /0x.txt on the target server. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity.
    Date: 2026-04-15T11:59:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834246
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Australia
    Victim Industry: Financial Services
    Victim Organization: Moshav Financial
    Victim Site: moshavfinancial.com.au
  230. Website Defacement of Côte dIvoire Civil Engineering Site by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, affiliated with 0xteam, defaced the website of Côte dIvoire Génie Civil, a civil engineering organization based in Ivory Coast. The incident was a targeted single-site defacement, with a mirror of the defaced page archived on zone-xsec.com. No specific motive or technical details regarding the server environment were disclosed.
    Date: 2026-04-15T11:58:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834255
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Ivory Coast
    Victim Industry: Construction / Civil Engineering
    Victim Organization: Côte dIvoire Génie Civil
    Victim Site: cotedivoiregeniecivil.com
  231. Website Defacement of Pic Coffee Laos by chinafans (0xteam)
    Category: Defacement
    Content: The website picoffeelaos.com was defaced by threat actor chinafans operating under the team 0xteam on April 15, 2026. The attacker placed a defacement file at the path /0x.txt on the target server. The incident was a targeted, non-mass defacement of what appears to be a coffee business based in Laos.
    Date: 2026-04-15T11:57:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834263
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Laos
    Victim Industry: Food & Beverage
    Victim Organization: Pic Coffee Laos
    Victim Site: picoffeelaos.com
  232. Website Defacement of Fastline Internet by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the threat actor chinafans, operating under the group 0xteam, defaced the website of Fastline Internet, a Mexican internet service provider. The defacement was a targeted, non-mass incident affecting a specific page on the domain fastlineinternet.com.mx. A mirror of the defacement was archived on zone-xsec.com.
    Date: 2026-04-15T11:56:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834259
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Mexico
    Victim Industry: Telecommunications / Internet Services
    Victim Organization: Fastline Internet
    Victim Site: fastlineinternet.com.mx
  233. Website Defacement of Ferienwohnungen Brockmann by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the German holiday accommodation website Ferienwohnungen Brockmann was defaced by threat actor chinafans, operating under the team 0xteam. The attack was a targeted single-site defacement, with a mirror of the defaced page archived at zone-xsec.com. No specific motivation or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T11:56:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834279
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Germany
    Victim Industry: Hospitality / Tourism
    Victim Organization: Ferienwohnungen Brockmann
    Victim Site: ferienwohnungen-brockmann.com
  234. Website Defacement of challamarsway.com by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website challamarsway.com was defaced by threat actor chinafans operating under the group 0xteam. The defacement was a targeted single-site incident, with a mirror of the defaced page archived at zone-xsec.com. No specific motive, server details, or victim country information were disclosed in connection with this attack.
    Date: 2026-04-15T11:55:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834278
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Challam Arsway
    Victim Site: challamarsway.com
  235. Website Defacement of ABS Construction by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xteam, defaced the website of ABS Construction on April 15, 2026. The defacement targeted a specific text file path on the domain. The incident was a single targeted defacement and not classified as a mass or redefacement event.
    Date: 2026-04-15T11:54:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834247
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Construction
    Victim Organization: ABS Construction
    Victim Site: absconstructionsb.com
  236. Website Defacement of Paternidade de Deus by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Brazilian religious website paternidadededeus.com.br. The incident was a targeted single-site defacement, not classified as a mass or home page defacement. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-04-15T11:54:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834245
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Religious Organization
    Victim Organization: Paternidade de Deus
    Victim Site: paternidadededeus.com.br
  237. Website Defacement of Axis Aero by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website axisaero.aero was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) on the aviation-related domain. The incident was neither a mass defacement nor a redefacement, suggesting a targeted single-site intrusion.
    Date: 2026-04-15T11:53:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834289
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Aviation / Aerospace
    Victim Organization: Axis Aero
    Victim Site: axisaero.aero
  238. Website Defacement of GetTradingCo by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, threat actor chinafans operating under the group 0xteam defaced the website getradingco.com, targeting what appears to be a trading or financial services company. The defacement was a single-page targeted attack rather than a mass or home page defacement. No specific motive or server details were disclosed in the available intelligence.
    Date: 2026-04-15T11:52:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834244
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Finance / Trading
    Victim Organization: Get Trading Co
    Victim Site: getradingco.com
  239. Website Defacement of Gelisim Makina by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website gelisimmakina.com was defaced by threat actor chinafans operating under the group 0xteam. The defacement targeted a Turkish machinery or industrial equipment company, with the attacker leaving a text-based defacement file at the path /0x.txt. The incident was a single-target, non-mass defacement with no specific motive publicly declared.
    Date: 2026-04-15T11:51:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834242
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Turkey
    Victim Industry: Manufacturing / Industrial Machinery
    Victim Organization: Gelisim Makina
    Victim Site: gelisimmakina.com
  240. Website Defacement of pvdubai.com by chinafans (0xteam)
    Category: Defacement
    Content: The website pvdubai.com was defaced by a threat actor operating under the handle chinafans, affiliated with the group 0xteam. The defacement was recorded on April 15, 2026, with the attacker leaving a marker file at pvdubai.com/0x.txt. The incident was a targeted, non-mass defacement with no additional technical indicators disclosed.
    Date: 2026-04-15T11:51:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834288
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United Arab Emirates
    Victim Industry: Unknown
    Victim Organization: PV Dubai
    Victim Site: pvdubai.com
  241. Website Defacement of AMGM LLC by chinafans (0xteam)
    Category: Defacement
    Content: The website amgmllc.com was defaced by threat actor chinafans operating under the group 0xteam on April 15, 2026. The defacement targeted a specific file path (/0x.txt) rather than the homepage, suggesting a targeted file-level intrusion. No specific motive or server details were disclosed, but the incident was mirrored and catalogued by zone-xsec.com.
    Date: 2026-04-15T11:50:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834269
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Business Services
    Victim Organization: AMGM LLC
    Victim Site: amgmllc.com
  242. Website Defacement of Dataplux by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced a file on the Japanese website dataplux.jp. The defacement targeted a specific text file (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. No mass or repeated defacement activity was reported in connection with this incident.
    Date: 2026-04-15T11:49:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834277
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Japan
    Victim Industry: Technology
    Victim Organization: Dataplux
    Victim Site: dataplux.jp
  243. Website Defacement of Mahveen by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the Indonesian website mahveen.co.id was defaced by threat actor chinafans operating under the group 0xteam. The defacement was a targeted single-site attack, with the defaced content accessible via a text file at the path /0x.txt. A mirror of the defacement was archived by zone-xsec.com.
    Date: 2026-04-15T11:49:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834268
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Mahveen
    Victim Site: mahveen.co.id
  244. Website Defacement of Parkers Law by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website parkerslaw.net was defaced by threat actor chinafans, operating under the group 0xteam. The attacker uploaded a defacement file (0x.txt) to the target server. The incident was a targeted, single-site defacement with no indication of mass or repeated defacement activity.
    Date: 2026-04-15T11:48:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834266
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Legal Services
    Victim Organization: Parkers Law
    Victim Site: parkerslaw.net
  245. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has made available an alleged combolist containing approximately 460,000 Hotmail email and password combinations on a cybercrime forum. The content is hidden behind a registration or login requirement. The actor also advertises services including spamming, credential cracking, and combolist sales via Telegram channels.
    Date: 2026-04-15T11:47:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-460K-HOTMAIL-Fresh-HQ-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  246. Website Defacement of Mosaic Medical Writing by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, affiliated with 0xteam, defaced a page on mosaicmedicalwriting.com, a medical writing services website. The incident was a targeted single-page defacement, not classified as a mass or home page defacement. The attack was documented and mirrored by zone-xsec.com under mirror ID 834276.
    Date: 2026-04-15T11:47:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834276
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Healthcare / Medical Writing
    Victim Organization: Mosaic Medical Writing
    Victim Site: mosaicmedicalwriting.com
  247. Alleged leak of 730,000 Gmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has made available a combolist containing approximately 730,000 Gmail email and password combinations on a cybercrime forum. The content is hidden behind a registration or login requirement, suggesting it may be distributed to forum members. The actor also advertises services including spamming, dumping, and cracking tools via Telegram channels.
    Date: 2026-04-15T11:47:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-730K-GMAIL-Fresh-HQ-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Google
    Victim Site: gmail.com
  248. Alleged leak of 260,000 Mexican email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has made available a combolist of approximately 260,000 email and password combinations purportedly associated with Mexican users. The content is hidden behind a registration or login requirement on the forum. The actor promotes additional services including HQ combos, spamming, dumping, and cracking tools via Telegram channels.
    Date: 2026-04-15T11:46:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-260K-MEXICO-Semi-Private-Good-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  249. Website defacement of bbvip24.com by chinafans of 0xteam
    Category: Defacement
    Content: On April 15, 2026, the website bbvip24.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was a targeted single-site attack, with the defaced content accessible at the path /0x.txt. A mirror of the defacement has been archived at zone-xsec.com.
    Date: 2026-04-15T11:46:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834250
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bbvip24.com
  250. Alleged leak of 220,000 Argentine email credentials
    Category: Combo List
    Content: A threat actor known as el_capitan has shared a combolist containing approximately 220,000 email and password combinations associated with Argentine users on a cybercrime forum. The content is hidden behind registration or login, suggesting it is being offered to forum members. The actor promotes additional services including spamming, combolist sales, dumping, and cracking tools via Telegram.
    Date: 2026-04-15T11:46:27Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-220K-ARGENTINA-UHQ-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Website Defacement of Oraya Skincare by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Oraya Skincare at orayaskincare.com. The defacement targeted a specific file path (/0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was recorded as a single, non-mass defacement event with no prior redefacement history.
    Date: 2026-04-15T11:46:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834274
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Beauty and Personal Care
    Victim Organization: Oraya Skincare
    Victim Site: orayaskincare.com
  252. Website Defacement of Eco Aventura Tours by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website ecoaventuratours.net was defaced by threat actor chinafans, operating under the group 0xteam. The defacement targeted a travel and tourism company, with a text file (0x.txt) uploaded as proof of compromise. The incident was a singular, non-mass defacement with no prior redefacement history recorded.
    Date: 2026-04-15T11:45:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834240
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Travel and Tourism
    Victim Organization: Eco Aventura Tours
    Victim Site: ecoaventuratours.net
  253. Alleged leak of European Education sector mixed combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a mixed combolist containing approximately 106,312 credential entries targeting the European education sector. The combolist was shared via a Mega.nz file hosting link on the cracking forum CrackingX. No specific organizations or institutions have been identified as the source of the leaked credentials.
    Date: 2026-04-15T11:45:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72162/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Europe
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  254. Website Defacement of Narcoossee Life by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website narcoosseelife.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a community-focused website, likely serving the Narcoossee area of Florida, United States. The incident was a single targeted defacement, with a mirror of the defaced page archived at zone-xsec.com.
    Date: 2026-04-15T11:44:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834243
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Media/Community News
    Victim Organization: Narcoossee Life
    Victim Site: narcoosseelife.com
  255. Website Defacement of h2kevent.com by chinafans (0xteam)
    Category: Defacement
    Content: The website h2kevent.com was defaced by threat actor chinafans, operating under the group 0xteam, on April 15, 2026. The defacement targeted a specific file path (0x.txt) rather than the homepage, suggesting a targeted file-level intrusion. A mirror of the defacement was archived on zone-xsec.com.
    Date: 2026-04-15T11:43:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834283
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Events/Entertainment
    Victim Organization: H2K Event
    Victim Site: h2kevent.com
  256. Website Defacement of ONG Coeur Ouvert by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website ongcoeurouvert.org was defaced by a threat actor identified as chinafans, operating under the group 0xteam. The defacement targeted a non-profit organization, with the defaced content hosted at the path /0x.txt. This was a single targeted defacement, not part of a mass or repeated campaign.
    Date: 2026-04-15T11:43:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834252
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Non-Profit / NGO
    Victim Organization: ONG Coeur Ouvert
    Victim Site: ongcoeurouvert.org
  257. Website Defacement of zolacalm.com by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website zolacalm.com was defaced by a threat actor operating under the alias chinafans, affiliated with the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. No specific motivation or technical details regarding the attack vector were disclosed.
    Date: 2026-04-15T11:42:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834284
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zola Calm
    Victim Site: zolacalm.com
  258. Website defacement of Furnyshop by chinafans (0xteam)
    Category: Defacement
    Content: On April 15, 2026, the website furnyshop.com was defaced by threat actor chinafans, operating under the group 0xteam. The attacker placed a defacement file at furnyshop.com/0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity.
    Date: 2026-04-15T11:41:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834253
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail / Furniture
    Victim Organization: Furnyshop
    Victim Site: furnyshop.com
  259. Alleged leak of 9,000 valid email access credentials as combolist
    Category: Logs
    Content: A threat actor known as Cir4Dk has shared a combolist containing approximately 9,000 allegedly valid email access credentials on an underground forum. The post is behind a registration wall, limiting visibility into the specific email providers or regions targeted. The credentials are described as high-quality (HQ) and valid mail access pairs.
    Date: 2026-04-15T11:35:57Z
    Network: openweb
    Published URL: https://xforums.st/threads/9k-valid-mailaccess-hq-combolist.608381/
    Screenshots:
    None
    Threat Actors: Cir4Dk
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Alleged sale of stolen data by Dedale threat actor
    Category: Data Breach
    Content: A message forwarded from Dedale Office channel advertises the sale of full stolen data, directing interested buyers to contact @DedaleSupport for pricing. Associated media-only posts (photos) likely contain samples or proof of the stolen data.
    Date: 2026-04-15T11:34:29Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6800
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Alleged Data Breach of turbo.cr / saint2.su Anonymous Video Hosting Service
    Category: Data Breach
    Content: A threat actor known as p4pr1k4 is selling a dataset allegedly obtained from turbo.cr (formerly saint2.su / saint.to), an anonymous video hosting service catering to adult and leaked content forums. The dataset includes approximately 110,000 user records containing usernames, email addresses, password hashes, session cookies, API keys, IP addresses, and access levels, along with a separate 1 GB database of video and album metadata. The data is being offered at $1,200 for shared access or $6,000
    Date: 2026-04-15T11:24:25Z
    Network: openweb
    Published URL: https://breached.st/threads/turbo-cr-saint2-su-anonymous-leaked-adult-content-video-host-110k-user-dataset-emails-password-hashes.86007/unread
    Screenshots:
    None
    Threat Actors: p4pr1k4
    Victim Country: Unknown
    Victim Industry: Media & Hosting
    Victim Organization: turbo.cr / saint2.su
    Victim Site: turbo.cr
  262. Alleged leak of mail access credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias Cir4d has shared a combolist containing approximately 9,000 alleged valid email account credentials on a cracking forum. The combolist, described as HQ (high quality), is being made available via an external paste site. No specific email provider or victim organization has been identified.
    Date: 2026-04-15T11:23:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72160/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  263. Alleged leak of 9,000 email credentials shared on cybercrime forum
    Category: Combo List
    Content: A threat actor known as COYTO has shared a combolist containing approximately 9,000 allegedly valid email and password credential pairs on a cybercrime forum. The credentials are made available for free download via an external paste service. No specific victim organization, industry, or country has been identified.
    Date: 2026-04-15T11:22:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-9K-VALID-ACCESS
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  264. Alleged leak of 9,000 valid email access credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Cidaxxx has shared a combolist containing approximately 9,000 allegedly valid email access credentials on a cybercrime forum. The combolist was made available via an external paste link and is described as high quality. No specific victim organization or targeted email provider was identified in the post.
    Date: 2026-04-15T11:22:09Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-9k-Valid-MailAccess-HQ-Combolist
    Screenshots:
    None
    Threat Actors: Cidaxxx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Alleged data breach and sale of 500k+ DuXiaoman Pay (dxmpay) ChinaLoan user and financial records
    Category: Data Breach
    Content: Threat actor ShinyHunters is selling a dataset of 500,000+ records allegedly stolen from DuXiaoman Pay (formerly Baidu Wallet), a Chinese digital payment and financial management platform. The stolen data reportedly includes user financial data (transaction history, payment amounts, wallet/merchant accounts), PII (full names, mobile numbers, emails, ID card details, loan amounts), login credentials (usernames, passwords, session tokens/cookies), business/merchant data (API keys, financial reports), internal system data (database server configs, API endpoints), and technical data (IP addresses, device info, activity logs). The seller is asking $100,000 USD and can be contacted via Telegram (@shinyc0rpsss), email, Tox, or Session. The listing is posted on BreachForums.
    Date: 2026-04-15T11:20:24Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1171
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: China
    Victim Industry: Financial Services / Digital Payments
    Victim Organization: Du Xiaoman Pay (dxmpay / Du Xiaoman Financial)
    Victim Site: dxmpay.com
  266. Alleged Data Breach of DarkForums Exposing 427K User Records via myBB Vulnerability
    Category: Data Breach
    Content: A threat actor claims to have exploited a myBB vulnerability on DarkForums to extract 427,000 records linking post IDs to usernames, IP addresses, and hostnames. The breach exposed 44,300 unique users and 78,000 unique IP addresses, including 19,300 Tor node connections, 15,200 VPN/hosting provider connections, and 97,400 residential ISP connections. The data has been made available on BreachForums. The post also calls out specific users AnonOne and Lucifer sharing their IP addresses as examples of exposed data.
    Date: 2026-04-15T11:20:12Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6803
    Screenshots:
    None
    Threat Actors: Breach
    Victim Country: Unknown
    Victim Industry: Online Forum / Cybercrime Community
    Victim Organization: DarkForums
    Victim Site: darkforums.st
  267. Alleged Data Breach of Vietnam National Credit Information Center (CIC) — 160M Records for Sale
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to be selling the full database of the National Credit Information Center of Vietnam (cic.gov.vn), a national credit registry. The alleged dataset contains 160,000,000+ records in CSV format, including full names, dates of birth, national ID numbers (CCCD/CMND), passport data, loan data, balances, debt information, tax IDs, company information, audit logs, and addresses. The data is listed for sale at $75,000 USD on BreachForums.
    Date: 2026-04-15T11:18:13Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1173
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Vietnam
    Victim Industry: Financial Services / Government
    Victim Organization: National Credit Information Center of Vietnam (CIC)
    Victim Site: cic.gov.vn
  268. Alleged Data Leak of DarkForums User Database Including IPs and Hostnames
    Category: Data Breach
    Content: A threat actor operating under the PwnForums community claims to have exploited a myBB vulnerability on DarkForums to extract approximately 427,000 records linking post IDs to usernames, IP addresses, and hostnames. The leaked database exposes around 44,300 unique users, including roughly 97,400 entries tied to residential ISP connections, and has been made available via a free download link. The disclosure appears motivated by retaliation against the forum administrator, identified as Knox, w
    Date: 2026-04-15T10:59:35Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-IMPORTANT-READ-DarkForums-%C2%B7-420k-rows-%C2%B7-Posts-Users-IPs
    Screenshots:
    None
    Threat Actors: John
    Victim Country: Unknown
    Victim Industry: Online Forums / Dark Web Communities
    Victim Organization: DarkForums
    Victim Site: Unknown
  269. Alleged free distribution of Reddit credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a free Reddit credential combolist via Telegram channels. The post directs users to Telegram groups (t.me/Combo445544 and t.me/Coder554455) where combolists and cracking tools are shared at no cost. No further details regarding the size or origin of the combolist are provided.
    Date: 2026-04-15T10:40:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72157/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: United States
    Victim Industry: Social Media
    Victim Organization: Reddit
    Victim Site: reddit.com
  270. Alleged leak of combolist targeting Latin American and African regions
    Category: Combo List
    Content: A threat actor known as CODER has made available a combolist containing approximately 11 million credential pairs targeting users across Latin American countries (including Argentina, Chile, Colombia, Peru, Venezuela, and others) and African countries (including Nigeria, Kenya, South Africa, Ghana, and others). The combolist is being distributed for free via Telegram channels and the crackingx.com forum. The actor also promotes additional free combo resources through their Telegram groups.
    Date: 2026-04-15T10:40:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72158/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Alleged leak of 175,000 email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias SYCOSUNNY has shared a combolist containing approximately 175,000 email credentials on a cybercrime forum. The content is made available for free to registered forum members via hidden content. The actor also promotes a Telegram channel for distribution of additional free content.
    Date: 2026-04-15T10:40:03Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-175K-MailAccess-Good-Combolist
    Screenshots:
    None
    Threat Actors: SYCOSUNNY
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  272. Alleged leak of mixed-domain credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias karaokecloud has made available a combolist containing 3,912 credential pairs across mixed domains on the cracking forum CrackingX. The list is being offered as a free download. No specific victim organization or country has been identified, as the credentials span multiple domains.
    Date: 2026-04-15T10:39:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72159/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  273. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as SYCOSUNNY has shared a combolist purportedly containing 260,000 Hotmail credentials on a cybercrime forum. The content is hidden behind a registration or login requirement, suggesting it is available to forum members at no direct cost. A Telegram group link is also provided for additional free content distribution.
    Date: 2026-04-15T10:39:46Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-260K-Hotmail-HQ-Combolist
    Screenshots:
    None
    Threat Actors: SYCOSUNNY
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  274. Alleged leak of 300,000 Gmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias SYCOSUNNY has made available a combolist allegedly containing 300,000 Gmail credentials on a cybercrime forum. The content is hidden behind a registration or login requirement, suggesting it is shared freely among forum members. A Telegram group link is also provided, likely used to distribute additional free content.
    Date: 2026-04-15T10:39:31Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-300K-Gmail-Good-Combolist
    Screenshots:
    None
    Threat Actors: SYCOSUNNY
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  275. Alleged leak of 22.5 million URL:Login:Password credential lines
    Category: Logs
    Content: A threat actor operating under the alias StarLinkClub has made available a large combolist containing approximately 22.5 million lines of URL:Login:Password credentials (1.2 GB) on a cybercrime forum. The content is hidden behind a registration or login requirement, suggesting it is being shared freely with forum members. No specific victim organization or country has been identified, indicating this is likely an aggregated credential collection.
    Date: 2026-04-15T10:39:20Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-Url-Log-Pass-22-528-702-M%C4%B1ll%C4%B1on-L%C4%B1nes-1-2gb
    Screenshots:
    None
    Threat Actors: StarLinkClub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Alleged leak of 340,000 USA credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias SYCOSUNNY has shared a combolist containing approximately 340,000 credential pairs purportedly associated with United States users on a cybercrime forum. The content is made available for free to registered forum members. A Telegram group link is also provided, likely used to distribute additional free content or stolen data.
    Date: 2026-04-15T10:39:16Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-340K-USA-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: SYCOSUNNY
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  277. Alleged leak of streaming service credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias SYCOSUNNY has made available a combolist containing approximately 350,000 credential pairs allegedly associated with streaming service accounts. The content is gated behind registration or login on the forum, with the actor also promoting a Telegram group for free content distribution. No specific streaming platform or victim organization has been identified.
    Date: 2026-04-15T10:39:01Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-350K-Streaming-HQ-Combolist
    Screenshots:
    None
    Threat Actors: SYCOSUNNY
    Victim Country: Unknown
    Victim Industry: Media & Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  278. Alleged data breach of DXMPay (Du Xiaoman Pay) ChinaLoan – 500k+ Records for Sale
    Category: Data Breach
    Content: A threat actor is selling a dataset of 500,000+ records allegedly stolen from DXMPay (Du Xiaoman Pay, formerly Baidu Wallet), a Chinese digital payment and financial management platform. The data reportedly includes user financial data (transaction history, payment amounts, wallet/merchant accounts), PII (full names, mobile numbers, emails, ID card details, loan and payment amounts), login credentials (username/password pairs and session tokens), business/merchant data (API keys, financial reports), internal system data (database server configs, API endpoints), and technical data (IP addresses, device info, activity logs). The seller is asking $100,000 USD and can be contacted via Telegram (@shinyc0rpsss), email ([email protected]), Tox, or Session. The listing is also posted on BreachForums.
    Date: 2026-04-15T10:38:42Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6801
    Screenshots:
    None
    Threat Actors: shinyc0rpsss
    Victim Country: China
    Victim Industry: Financial Services / Digital Payments
    Victim Organization: Du Xiaoman Pay (DXMPay)
    Victim Site: dxmpay.com
  279. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor operating under the alias UniqueCombo has shared a combolist allegedly containing 44,000 unique Hotmail credentials on an underground forum. The post was made in the Mail Access & Combolists section, suggesting the list contains email and password pairs. The origin of the credentials and whether they have been verified as valid is unknown.
    Date: 2026-04-15T10:29:56Z
    Network: openweb
    Published URL: https://xforums.st/threads/hotmail-unique-combo_3_44000.608377/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  280. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared an alleged Hotmail credential combolist on the cracking forum CrackingX, containing approximately 44,000 entries. The post is categorized under Combolists & Dumps, suggesting the content consists of email and password combinations. Full content requires forum registration or sign-in to access.
    Date: 2026-04-15T10:20:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72156/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  281. Alleged leak of multi-regional email credential combolist targeting CIS, European, and special-use domains
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist of approximately 4 million email:password credential pairs targeting multiple regional domains including CIS countries (.ua, .kz, .uz, .by, .ge, .am, .md), European nations (.ee, .lv, .lt, .is, .lu, .mt, .cy, .al, .mk, .rs, .hr, .si, .ba), and special-use TLDs (.gov, .edu, .mil, .io, .ai, .int, .eu, .africa, .asia). The credentials are being made available for free via Telegram channels and groups managed by the actor.
    Date: 2026-04-15T09:59:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72155/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Alleged Sale of NetBot – Mass Host Enumeration and Reconnaissance Platform
    Category: Malware
    Content: A threat actor operating under LulzSec Black is advertising NetBot, a network reconnaissance platform claiming to surpass Shodan and FoFa in scope. The tool allegedly allows users to download and export all indexed hosts globally with full platform access and no limits. Two pricing tiers are advertised: $50/month and $65/month. Contact is facilitated via a Telegram bot (@CyberShop_contact_bot).
    Date: 2026-04-15T09:45:11Z
    Network: telegram
    Published URL: https://t.me/c/2727439812/5734
    Screenshots:
    None
    Threat Actors: LulzSec Black
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  283. Alleged Data Leak of Iran MOIS/VEVAK Intelligence, Nuclear, Military, and Leadership Facilities
    Category: Data Leak
    Content: A threat actor operating under the alias SiberSLX has publicly leaked a ZIP archive purportedly containing sensitive data related to Irans Ministry of Intelligence (MOIS/VEVAK), including information allegedly connected to intelligence, nuclear, military, and leadership facilities. The files have been made available for free download via an external file-sharing platform. The password for the archive was shared publicly in the post.
    Date: 2026-04-15T09:40:13Z
    Network: openweb
    Published URL: https://breached.st/threads/iran-mois-vevak-and-related-intelligence-nuclear-military-and-leadership-facilities-leaked-download.86006/unread
    Screenshots:
    None
    Threat Actors: SiberSLX
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: Ministry of Intelligence (MOIS/VEVAK)
    Victim Site: Unknown
  284. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Sellerxd has made available a combolist of approximately 1,100 alleged valid Hotmail email and password combinations on DemonForums. The credentials are claimed to be high-quality and valid. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-04-15T09:39:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1100x-HQ-Valid-Hotmails
    Screenshots:
    None
    Threat Actors: Sellerxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  285. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor on DemonForums has shared a combolist containing approximately 600 alleged Hotmail email and password credential pairs. The content is gated behind registration or login on the forum, suggesting it is being made available for free to forum members. The credentials are described as private hits, implying they have been verified as valid.
    Date: 2026-04-15T09:38:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-600X-FULL-HOTMAIL-HITS-PRIVATE-HITS
    Screenshots:
    None
    Threat Actors: mellos1213
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  286. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor known as Jelooos has shared an alleged combolist of 600 fully validated Hotmail credentials on the cracking forum CrackingX. The post claims the credentials are full hits and private full valid, suggesting they have been tested and confirmed as active. The actual post content is gated behind registration, limiting full verification of the claim.
    Date: 2026-04-15T09:37:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72151/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  287. Alleged leak of Germany Mixed Combolist with 1.1 Million Credentials
    Category: Combo List
    Content: A threat actor known as HQcomboSpace has made available a combolist containing approximately 1.13 million lines of mixed credentials allegedly associated with European, primarily German, accounts. The combolist was shared for free via a Mega.nz link on the cracking forum CrackingX. The data appears to be an aggregated credential list rather than a dump from a single organization.
    Date: 2026-04-15T09:37:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72154/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  288. Alleged Sale of Carded E-Gift Card Codes via Underground Marketplace
    Category: Services
    Content: A threat actor operating under the name Card Code Heist is selling carded e-gift card codes for multiple major retailers and platforms including Google Play, iTunes, Amazon, eBay, Razer, Delta, and Hotels.com at 50% of face value. The actor claims codes are obtained via carding from third-party vendors and are pre-activated, with a minimum purchase of $100 face value. Payments are accepted exclusively in cryptocurrency including Bitcoin, Litecoin, Ethereum, and USDT, with contact facilitated v
    Date: 2026-04-15T09:36:35Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-E-Gift-Cards-Google-Play-iTunes-Amazon-eBay-Razer-Delta-Hotels-com-Et
    Screenshots:
    None
    Threat Actors: Kexone
    Victim Country: Unknown
    Victim Industry: Retail & E-Commerce
    Victim Organization: Google, Apple, Amazon, eBay, Razer, Delta, Hotels.com
    Victim Site: Unknown
  289. Alleged Data Breach of Pakistan Civil Aviation Authority
    Category: Data Breach
    Content: A threat actor identified as Jester01 is advertising an alleged data dump belonging to Pakistan Civil Aviation on a dark web forum. Sample data is offered behind a registration wall, with the full data dump available upon contact. A hash string (058c6efb43200323904b330215038a6cc2d58477bfa706595a8fc3a3ce02b7843c) is provided, likely as a file identifier or proof of authenticity.
    Date: 2026-04-15T09:36:08Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Pakistan-Civil-Aviation
    Screenshots:
    None
    Threat Actors: Jester01
    Victim Country: Pakistan
    Victim Industry: Aviation / Transportation
    Victim Organization: Pakistan Civil Aviation Authority
    Victim Site: Unknown
  290. Alleged Sale of NetBot OSINT Platform with Global IP Enumeration and Port Scanning Capabilities
    Category: Malware
    Content: A threat actor operating under LulzSec Black is selling access to NetBot, an OSINT platform advertised as more powerful than Shodan and FoFa. The platform claims to provide daily-updated global host enumeration, country-level IP filtering, open port detection (ports 22, 23, and others), and bulk export of results with no limits. Full access is priced at $50/month, with contact via Telegram bot @CyberShop_contact_bot. The tool has clear offensive reconnaissance utility for threat actors targeting internet-exposed infrastructure.
    Date: 2026-04-15T09:35:19Z
    Network: telegram
    Published URL: https://t.me/c/2727439812/5731
    Screenshots:
    None
    Threat Actors: LulzSec Black
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  291. Alleged sale of 32,000 German email credentials
    Category: Logs
    Content: A threat actor operating under the alias MegaCloud is allegedly offering a combolist of 32,000 validated German email credentials on an underground forum. The post claims the data is of high quality and fully valid as of April 15. No specific targeted organization or service has been identified.
    Date: 2026-04-15T09:27:31Z
    Network: openweb
    Published URL: https://xforums.st/threads/32k-germany-full-valid-mail-access-top-quality-15-04.608369/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  292. Alleged leak of mixed email access combolist
    Category: Logs
    Content: A threat actor operating under the alias MegaCloud has made available a mixed combolist of approximately 20,000 validated email credentials on a cybercrime forum. The post, dated April 15, includes a hidden download link requiring forum registration to access. No specific targeted organization or country is identified, suggesting the credentials are aggregated from multiple sources.
    Date: 2026-04-15T09:27:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/20k-full-vcalid-mail-access-mix-15-04.608373/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  293. Alleged sale of NetBot full-access host enumeration platform
    Category: Initial Access
    Content: A threat actor operating under LulzSec Black is advertising NetBot, a host enumeration and scanning platform claiming to index every host in the world. The tool offers full platform access with daily updated hosts globally, and is marketed as more powerful than Shodan and FoFa. Access is sold at $30/month via a Telegram bot contact.
    Date: 2026-04-15T09:18:52Z
    Network: telegram
    Published URL: https://t.me/c/2727439812/5732
    Screenshots:
    None
    Threat Actors: LulzSec Black
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  294. Alleged leak of 1.8 million ULP credential lines
    Category: Data Leak
    Content: A threat actor operating under the alias SiberSLX has freely shared a ULP (Username-Login-Password) combolist containing 1.8 million unique credential entries on the Breached forum. Each entry includes a username, email address, and plaintext password, making the list usable for credential stuffing across a wide variety of platforms. The list is available as a password-protected ZIP file via a file-sharing link.
    Date: 2026-04-15T09:14:01Z
    Network: openweb
    Published URL: https://breached.st/threads/ulp-fresh-1-8m-lines-march-2026.86005/unread
    Screenshots:
    None
    Threat Actors: SiberSLX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  295. Alleged leak of 32,000 German email credentials
    Category: Combo List
    Content: A threat actor known as MegaCloudshop has made available a combolist allegedly containing 32,000 valid German email credentials, described as full valid mail access and top quality. The content is hidden behind a registration or login requirement on the forum, and the actor promotes an associated store at megacloudshop.top. No specific victim organization or targeted platform has been identified.
    Date: 2026-04-15T09:12:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-32K-Germany-Full-Valid-Mail-Access-Top-Quality-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  296. Alleged leak of mixed email credentials combolist (20,000 records)
    Category: Combo List
    Content: A threat actor operating under the alias MegaCloudshop has made available a combolist of approximately 20,000 email address and password combinations, described as fully valid mail access credentials from mixed sources. The content is hidden behind a registration or login requirement on the forum, and the actor promotes an external store at megacloudshop.top. No specific victim organization or country of origin has been identified.
    Date: 2026-04-15T09:11:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-20K-Full-VCalid-Mail-Access-Mix-15-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  297. Alleged leak of 32,000 German email account credentials
    Category: Combo List
    Content: A threat actor operating under the alias MailAccesss has made available a combolist of approximately 32,000 German email account credentials on the cracking forum CrackingX. The post claims the credentials are fully valid and of top quality, dated April 15. Access to the content is restricted to registered forum users.
    Date: 2026-04-15T09:10:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72147/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  298. Alleged leak of mixed email access credentials (20,000 records)
    Category: Combo List
    Content: A threat actor operating under the alias MailAccesss has made available a mixed combolist of approximately 20,000 allegedly valid email access credentials on the cracking forum CrackingX. The post, dated April 15, is categorized under Combolists & Dumps and targets multiple email providers of unknown origin. The content is restricted to registered forum members.
    Date: 2026-04-15T09:09:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72148/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  299. Alleged leak of multi-country combolists across global domains
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing free combolists targeting multiple country-specific and generic top-level domains including .ca, .au, .in, .br, .mx, and many others across Europe, Asia, and beyond. The actor directs interested parties to Telegram channels and a personal Telegram handle (CODER5544) to obtain the credential lists. The combolists appear to be shared freely via two Telegram groups dedicated to free combos and tools.
    Date: 2026-04-15T09:09:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72149/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  300. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias alphaxdd has made available a combolist of 1,059 alleged valid Hotmail credentials on Demonforums. The post describes the content as premium hits with mixed mail formats stored in a private cloud. Access to the credential list is gated behind forum registration or login, and the actor provides a Telegram handle for further contact.
    Date: 2026-04-15T08:48:07Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1059x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  301. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias alphaxdd has made available a combolist of 1,059 alleged valid Hotmail credentials on the cracking forum CX. The post describes the credentials as premium hits from a mix of mail accounts with private cloud access. The actor can be contacted via Telegram handle alphaaxd for download access.
    Date: 2026-04-15T08:46:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72145/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  302. Alleged leak of Europe and USA combolists
    Category: Combo List
    Content: A threat actor on CrackingX forum has made available combolists claimed to be of high quality and full validity, targeting users from Europe and the United States. The post does not specify a particular organization or service as the source. The shared content appears to consist of credential lists in email:password format.
    Date: 2026-04-15T08:45:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72146/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  303. Alleged Doxxing of 16 Individuals Accused of Student Harassment at Universitas Indonesia
    Category: Data Leak
    Content: A post shared in the BABAYO EROR SYSTEM channel exposes the personal information of 16 individuals allegedly involved in student harassment at Universitas Indonesia (UI). The leaked data includes full names and WhatsApp phone numbers for each of the 16 named individuals. This constitutes a doxxing action targeting private persons under the guise of public shaming.
    Date: 2026-04-15T08:29:46Z
    Network: telegram
    Published URL: https://t.me/privtachive/1446
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Universitas Indonesia
    Victim Site: Unknown
  304. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist containing approximately 44,000 Hotmail email and password combinations on DemonForums. The content is hidden behind a registration or login requirement. The actor also promotes a shop (unique-combo.shop) offering credential combolists from various countries upon request.
    Date: 2026-04-15T08:26:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-2-44000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  305. Alleged distribution of multi-domain credential combolists across multiple country TLDs
    Category: Combo List
    Content: A threat actor operating under the alias CODER is offering free combolists targeting multiple country-code and generic top-level domains including .de, .fr, .it, .es, .uk, .us, .ru, .az, .tr, .jp, .cn, .com, .org, .net, .info, .biz, .online, and .site. The actor directs interested parties to Telegram channels (@Combo445544 and @Coder554455) for access to free credential lists and hacking tools. No specific victim organization or record count has been disclosed.
    Date: 2026-04-15T08:26:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72140/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  306. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias RandomUpload has made available a combolist containing approximately 30,000 Hotmail credentials on the cracking forum CrackingX. The post offers the credential list as a free download, though the actual content is restricted to registered users. The origin and validity of the credentials remain unverified.
    Date: 2026-04-15T08:25:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72141/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  307. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist allegedly containing 44,000 unique Hotmail credentials on the cracking forum CrackingX. The post is gated behind registration or sign-in, limiting full visibility into the content. The combolist likely consists of email and password pairs associated with Hotmail accounts.
    Date: 2026-04-15T08:25:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72142/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  308. Alleged leak of URL:Login:Password credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias gsmfix on the cracking forum CrackingX has shared a combolist in URL:Login:Password (ULP) format, described as high-quality and private. The post offers credential pairs alongside their associated URLs, suggesting the data may be suitable for credential stuffing or account takeover attacks. No specific target organization, country, or record count has been identified.
    Date: 2026-04-15T08:25:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72143/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  309. Alleged leak of mixed USA and Europe credential combolists
    Category: Combo List
    Content: A threat actor on the CrackingX forum has shared a mixed combolist containing credentials associated with users from the United States and Europe. The post is titled as an exclusive release of credential hits spanning multiple regions. No specific organization, victim count, or pricing information was provided.
    Date: 2026-04-15T08:25:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72144/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  310. Alleged data breach of Rockstar Games by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters has posted what they claim to be a database from Rockstar Games, shared via BreachForums. The post includes a direct link to the forum thread where the data is made available.
    Date: 2026-04-15T08:16:14Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1169
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: Unknown
  311. Alleged data breach of Rockstar Games
    Category: Data Breach
    Content: A threat actor has claimed to have breached Rockstar Games and uploaded an alleged database to BreachForums (breachforums.ai). The post includes a direct link to the forum thread where the data is reportedly available.
    Date: 2026-04-15T08:16:11Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6799
    Screenshots:
    None
    Threat Actors: Breach
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: rockstargames.com
  312. Alleged promotion of NetBot OSINT platform for global IP reconnaissance by LulzSec Black
    Category: Cyber Attack
    Content: LulzSec Black is promoting a tool called NetBot, described as an OSINT platform powered by CyberShop that claims to index every IP on the internet. It offers daily-updated host data, open port detection (ports 22, 23, and others), country-level IP filtering, and bulk result downloads with no usage limits. The platform is positioned as superior to Shodan and FoFa, and is accessible via a Telegram bot (@CyberShop_contact_bot). This type of tool has significant threat actor utility for reconnaissance and initial access operations.
    Date: 2026-04-15T08:14:48Z
    Network: telegram
    Published URL: https://t.me/c/2727439812/5730
    Screenshots:
    None
    Threat Actors: LulzSec Black
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  313. Alleged leak of mixed email and password combolist (15.2 million records)
    Category: Combo List
    Content: A threat actor known as stradu has shared a mixed email and password combolist containing approximately 15.2 million credential pairs on the cracking forum CrackingX. This is part of an ongoing series of combolist releases by the same actor (entries #352 through #367). The credentials appear to be aggregated from multiple sources and are being made available to forum members.
    Date: 2026-04-15T08:02:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72138/
    Screenshots:
    None
    Threat Actors: stradu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Alleged leak of Etsy, Netflix, and SMTP credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available an 11 million record combolist targeting Etsy, Netflix, and SMTP accounts via Telegram channels. The actor promotes free combo distribution through two Telegram groups and a personal Telegram handle. The post does not indicate a specific price, suggesting the credentials are being freely shared.
    Date: 2026-04-15T08:02:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72139/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Etsy, Netflix
    Victim Site: etsy.com, netflix.com
  315. Alleged leak of German shopping credential combolist with over 1 million lines
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing over 1.1 million credential lines targeting German shopping platforms. The data was shared freely via a Mega.nz link on the cracking forum CrackingX. No specific victim organization or website was identified, suggesting the combolist may aggregate credentials from multiple European e-commerce targets.
    Date: 2026-04-15T07:37:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72136/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail & E-Commerce
    Victim Organization: Unknown
    Victim Site: Unknown
  316. Alleged Unauthorized Access to Industrial Plant CCTV System in Central Europe
    Category: Cyber Attack
    Content: Threat actor group Shadow Clawz 404 claims to have gained full control over a CCTV surveillance system at a large industrial plant in Central Europe, accessing all 120 cameras. The group states the security posture was weak and hints at further actions to come.
    Date: 2026-04-15T07:32:53Z
    Network: telegram
    Published URL: https://t.me/c/3251820623/65
    Screenshots:
    None
    Threat Actors: Shadow Clawz 404
    Victim Country: Unknown
    Victim Industry: Industrial/Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  317. Alleged acquisition request for Chinese database pack on cybercrime forum
    Category: Data Breach
    Content: A threat actor on the Breached forum is seeking to acquire a pack of Chinese databases, requesting information from anyone selling the data or able to verify its authenticity. The specific organizations, industries, or data types involved in the alleged database pack remain unknown. No seller has been identified and no further details about the contents or origin of the data have been disclosed.
    Date: 2026-04-15T07:15:52Z
    Network: openweb
    Published URL: https://breached.st/threads/need-chinese-databases-pack.86004/unread
    Screenshots:
    None
    Threat Actors: enolajames851
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  318. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias Steveee36 has shared a combolist containing approximately 1,284 Hotmail credentials on DemonForums. The content is hidden behind a registration or login requirement, suggesting it is being distributed to forum members. The post was made in the Combolists section, indicating the data consists of email and password pairs.
    Date: 2026-04-15T07:14:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1284-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  319. Alleged leak of WEB.DE credentials
    Category: Combo List
    Content: A threat actor operating under the alias wingoooW has made available a combolist of approximately 2,000 WEB.DE email and password combinations via a free download link on a paste site. WEB.DE is a German email and internet services provider. The credentials were shared freely on the DemonForums combolist section with no payment required.
    Date: 2026-04-15T07:14:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2K-WEB-DE
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Germany
    Victim Industry: Technology
    Victim Organization: WEB.DE
    Victim Site: web.de
  320. Alleged leak of mixed-access credential combolist
    Category: Combo List
    Content: A threat actor known as COYTO has made available a combolist of approximately 1,000 email:password credential pairs described as high-quality and valid across mixed access types. The combolist was shared freely via a paste hosting service with no payment required. No specific victim organization or industry has been identified.
    Date: 2026-04-15T07:13:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-HQ-VALID-MIXED-ACCESS
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  321. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the handle @Steveee36 has made available a combolist containing 1,284 alleged Hotmail credentials on the cracking forum CrackingX. The post offers a free download of the credential list, described as HQ (high quality), suggesting the credentials may be recently verified or active. No price or payment method was mentioned, indicating this is a free leak.
    Date: 2026-04-15T07:12:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72134/
    Screenshots:
    None
    Threat Actors: stevee36
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  322. Alleged leak of PSN and Spotify credential combolists
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist purportedly containing 10 million credential pairs for PlayStation Network (PSN) and Spotify accounts. The content is being made available for free via Telegram channels and groups operated by the actor. The post references two Telegram groups offering free combolists and cracking tools.
    Date: 2026-04-15T07:12:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72135/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Entertainment & Streaming
    Victim Organization: PlayStation Network, Spotify
    Victim Site: psn.com, spotify.com
  323. Alleged Data Leak of Insei.fr Student and Civil Status Records
    Category: Data Leak
    Content: A threat actor known as ChimeraZ has freely leaked a database belonging to Insei.fr, a French educational institution, on PwnForums. The leak includes 448 MB of data comprising 1,328 files with civil status records containing personally identifiable information such as full names, dates of birth, addresses, phone numbers, and email addresses, as well as a Gifts folder containing 71 files reported to include national identity cards, passports, and health cards. The data appears to originate fro
    Date: 2026-04-15T07:11:44Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-2-7K-Insei-fr
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Insei
    Victim Site: insei.fr
  324. Alleged Data Leak of Rockstar Games Analytics Data by ShinyHunters Group
    Category: Data Leak
    Content: The ShinyHunters group allegedly leaked over 78.6 million records of Rockstar Games analytics data sourced from Snowflake cloud instances, reportedly compromised via third-party provider Anodot.com. The leaked data includes structured game item metadata such as in-game items, vehicle data, pricing, and regional analytics metrics spanning multiple GTA Online DLC releases. The data was publicly shared on a cybercrime forum with a sample posted as proof.
    Date: 2026-04-15T07:11:28Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Rockstar-Games-analytics-data-leaked-by-Shinyhunters-Group
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: United States
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: rockstargames.com
  325. Alleged sale of stolen CVV payment card data via Pepecard store
    Category: Initial Access
    Content: A CVV card store called Pepecard is advertising stolen payment card data for sale. The store claims to offer over 100,000 card renewals daily covering US, Canada, UK, and global cards. US CVV cards start at $1, international cards at $1.50. The store claims 75-95% card validity and offers free card verification. The service operates via a clearnet website (pepecard.mobi) and a Tor hidden service, with an automated bot for purchases.
    Date: 2026-04-15T07:08:51Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/62957
    Screenshots:
    None
    Threat Actors: Pepecard
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: pepecard.mobi
  326. Alleged leak of mixed credential combolist by threat actor fatetraffic
    Category: Combo List
    Content: A threat actor operating under the alias fatetraffic has made available a mixed combolist containing approximately 1,250 credential entries, dated April 15, 2026, derived from stealer logs. The data is hosted on Pixeldrain and shared freely on the CrackingX forum. No specific victim organization or country has been identified, suggesting the credentials span multiple sources.
    Date: 2026-04-15T06:47:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72133/
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  327. Alleged ShinyHunters Threat Actor Service Advertisement for $10,000 USD
    Category: Initial Access
    Content: The ShinyHunters threat actor group is advertising an unspecified service for $10,000 USD via their Telegram channel. The post includes PGP key verification details, multiple contact methods (Telegram, email, Tox, Session), and warns against impersonators (Mattys Savoie & James). The nature of the service is not explicitly stated but is consistent with ShinyHunters known activities involving data breaches and initial access sales.
    Date: 2026-04-15T06:43:43Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1163
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  328. Alleged ShinyHunters Threat Actor Advertising Services and Publishing New PGP Identity
    Category: Cyber Attack
    Content: An individual claiming to be ShinyHunters (handle @shinyc0rpsss) is publishing a new PGP key via Pastebin, alleging that prior associates (Mattys Savoie & James) misused their previous PGP key for ransom purposes. The actor is advertising unspecified services for $10,000 USD and providing multiple contact channels including Telegram, email ([email protected]), Tox ID, and Session ID. The post appears to be an identity verification and service advertisement from a self-proclaimed member of the ShinyHunters group.
    Date: 2026-04-15T06:42:51Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6795
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  329. Alleged Data Leak of Instituto Tecnológico de Cintalapa Student Database
    Category: Data Leak
    Content: A threat actor known as Z3r00 has leaked a database allegedly belonging to Instituto Tecnológico de Cintalapa, a higher education institution in Chiapas, Mexico. The leaked data contains student academic records including institution name, program codes, career details, academic level, GPA, credit load, semester information, student type, academic status, and scholarship associations. The database has been made available via a free download link and promoted through Telegram channels.
    Date: 2026-04-15T06:27:47Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-CHIAPAS-INSTITUTO-TECNOLOGICO-DE-CINTALAPA
    Screenshots:
    None
    Threat Actors: Z3r00
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Instituto Tecnológico de Cintalapa
    Victim Site: Unknown
  330. Alleged launch of covert XMPP chat server by DarkForums for hackers and cybercriminals
    Category: Cyber Attack
    Content: Reports indicate that DarkForums has launched a new XMPP-based chat server specifically designed for hackers and cybercriminals. The platform features full end-to-end encryption, a strict no-logging policy, and is architected to resist access by law enforcement and regulatory bodies. The service is intended to facilitate covert communications among threat actors.
    Date: 2026-04-15T06:20:08Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21199
    Screenshots:
    None
    Threat Actors: DarkForums
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  331. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor using the alias UniqueCombo has shared an alleged combolist containing approximately 44,000 Hotmail credentials on an underground forum. The post was made in the Mail Access & Combolists section, suggesting the list contains email and password combinations. The origin and validity of the credentials have not been verified.
    Date: 2026-04-15T06:19:52Z
    Network: openweb
    Published URL: https://xforums.st/threads/hotmail-unique-combo_1_44000.608355/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  332. Alleged Critical Vulnerability in Juniper Networks Equipment Enabling Full Network Device Takeover
    Category: Vulnerability
    Content: A critical vulnerability has been identified in Juniper Networks products stemming from the use of default login credentials on certain devices. If exploited, the flaw allows attackers to gain full access and administrative control over affected network equipment. Given the critical role of these devices in network infrastructure, successful exploitation could compromise entire networks. Recommendations include applying security updates immediately, changing default credentials, and restricting administrative access.
    Date: 2026-04-15T06:14:01Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21200
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Technology / Networking
    Victim Organization: Juniper Networks
    Victim Site: juniper.net
  333. Alleged Cyber Attack on US Gas Station Refueling Systems by Golden Falcon
    Category: Cyber Attack
    Content: Threat actor Golden Falcon claims to have maintained control over refueling systems at US gas stations, issuing a warning message implying ongoing access to critical infrastructure. No specific targets or technical details provided.
    Date: 2026-04-15T06:11:14Z
    Network: telegram
    Published URL: https://t.me/Golden_falcon_team/630
    Screenshots:
    None
    Threat Actors: Golden Falcon
    Victim Country: United States
    Victim Industry: Energy / Fuel Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Website Defacement of Yeskar by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website yeskar.com. The defacement targeted a specific page (index.txt) rather than the homepage, indicating a targeted intrusion. No specific motivation or technical details regarding the attack vector were disclosed.
    Date: 2026-04-15T06:09:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834212
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Yeskar
    Victim Site: yeskar.com
  335. Website Defacement of Zenquro by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website zenquro.com. The defacement targeted a specific text file (index.txt) rather than the main homepage, indicating a targeted intrusion rather than a mass or home page defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-04-15T06:08:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834225
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zenquro
    Victim Site: zenquro.com
  336. Website Defacement of Zeronyxa by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website zeronyxa.com. The defacement targeted a specific index file (index.txt) rather than the homepage, indicating a targeted file-level intrusion. The attack was neither a mass defacement nor a redefacement, and technical details such as server software and exploited vulnerabilities remain unknown.
    Date: 2026-04-15T06:07:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834226
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zeronyxa
    Victim Site: zeronyxa.com
  337. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist allegedly containing 44,000 unique Hotmail credential pairs on the cracking forum CrackingX. The post is restricted to registered or signed-in members of the forum. The origin and validity of the credentials have not been verified.
    Date: 2026-04-15T06:05:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72131/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  338. Website Defacement of zolupo.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website zolupo.com. The attack targeted a specific page (index.txt) rather than the homepage, indicating a targeted single-page defacement. The incident was archived and mirrored via zone-xsec.com for documentation purposes.
    Date: 2026-04-15T06:05:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834229
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zolupo
    Victim Site: zolupo.com
  339. Website Defacement of zovirexa.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website zovirexa.com. The defacement targeted a specific page (index.txt) and was not classified as a mass or home page defacement. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T06:04:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834232
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: zovirexa.com
  340. Website Redefacement of zymerya.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, conducted a redefacement of zymerya.com. This incident marks a repeated compromise of the target, indicating persistent access or recurring targeting by the attacker. The defacement was not categorized as a mass defacement, suggesting it was a targeted attack against this specific domain.
    Date: 2026-04-15T06:03:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834234
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zymerya
    Victim Site: zymerya.com
  341. Website Redefacement of TipTopACP by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, conducted a redefacement of the website tiptopacp.com. This incident marks a repeated targeting of the same domain, indicating prior successful compromise. The defacement was catalogued via zone-xsec.com with mirror ID 834097.
    Date: 2026-04-15T05:56:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834097
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: TipTop ACP
    Victim Site: tiptopacp.com
  342. Alleged data leak of individuals linked to Russian government entities on dark web
    Category: Data Leak
    Content: A threat actor claims to have published a dataset on the dark web containing contact and professional information of individuals associated with Russian government institutions. The leaked data reportedly targets managers and high-ranking officials connected to state entities.
    Date: 2026-04-15T05:56:03Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21198
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  343. Website Defacement of The Views Express by Nicotine of Umbra Community
    Category: Defacement
    Content: The website theviewsexpress.in, an Indian news or media outlet, was defaced by a threat actor known as Nicotine, operating under the group Umbra Community. The defacement was recorded on April 15, 2026, targeting the sites index page. The incident was a singular, non-mass defacement with no prior redefacement history noted.
    Date: 2026-04-15T05:55:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834091
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Media and News
    Victim Organization: The Views Express
    Victim Site: theviewsexpress.in
  344. Website Defacement of Touch Plus Trading by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website touchplustrading.com. The attack targeted the index page of what appears to be a trading or commerce organization. No specific motivation or technical details were disclosed for this incident.
    Date: 2026-04-15T05:54:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834108
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Trading / Commerce
    Victim Organization: Touch Plus Trading
    Victim Site: touchplustrading.com
  345. Website Defacement of Tileonix by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website tileonix.com. The defacement targeted a specific page (index.txt) rather than the homepage, indicating a targeted but limited-scope intrusion. No specific motivation or technical details regarding the attack vector were disclosed.
    Date: 2026-04-15T05:53:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834096
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Tileonix
    Victim Site: tileonix.com
  346. Website Defacement of French Roofing Company toiture22-renov.fr by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Toiture 22 Renov, a French roofing and renovation company. The defacement targeted the index page of the site and was recorded as a standalone, non-mass defacement incident. The attack was mirrored and archived via zone-xsec.com.
    Date: 2026-04-15T05:51:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/834100
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: France
    Victim Industry: Construction / Home Renovation
    Victim Organization: Toiture 22 Renov
    Victim Site: toiture22-renov.fr
  347. Alleged leak of 20,000 WordPress admin credentials
    Category: Logs
    Content: A threat actor operating under the alias borntodie has made available a list of approximately 20,000 WordPress admin credentials in URL:LOGIN:PASS format on a cybercrime forum. The credential list targets wp-admin login panels across multiple websites and organizations spanning various industries and countries. The data appears to have been harvested via stealer logs and is being distributed as a free download.
    Date: 2026-04-15T05:48:39Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-%E2%AD%9020k-WORDPRESS-URL-LOGIN-PASS-wp-admin-%E2%AD%90
    Screenshots:
    None
    Threat Actors: borntodie
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Multiple
    Victim Site: Multiple
  348. Alleged data leak of La Poste Mobile customer database with 1.5 million records
    Category: Data Leak
    Content: A threat actor operating under the alias jza1337 has made available a database allegedly belonging to La Poste Mobile, a French mobile telecommunications provider. The leak comprises over 1.5 million records split across four text files, categorized by client type, and contains personally identifiable information including full names, addresses, zip codes, cities, email addresses, and phone numbers. The data is offered as a free download via Gofile, with the actor also soliciting contact via T
    Date: 2026-04-15T05:47:55Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FR-LAPOSTEMOBILE-1-5M
    Screenshots:
    None
    Threat Actors: jza1337
    Victim Country: France
    Victim Industry: Telecommunications
    Victim Organization: La Poste Mobile
    Victim Site: lapostemobile.fr
  349. Alleged data breach of Clin-doeil.fr
    Category: Data Breach
    Content: A threat actor operating under the handle uhqboyz has posted what is claimed to be a database from Clin-doeil, a French optical/eyewear company. The compromised data reportedly includes full names, email addresses, physical addresses, dates of birth, phone numbers, and NIR (French national social security identification numbers). The content is hidden behind a registration or login requirement, suggesting it may be offered for sale or restricted access.
    Date: 2026-04-15T05:47:40Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Clin-doeil-fr-RE-POST
    Screenshots:
    None
    Threat Actors: uhqboyz
    Victim Country: France
    Victim Industry: Healthcare / Optical Retail
    Victim Organization: Clin-doeil
    Victim Site: clin-doeil.fr
  350. Website Defacement of Sabitha Systems by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Sabitha Systems, a likely technology or IT services organization. The defacement targeted a specific page (index.txt) rather than the homepage, indicating a targeted but non-mass defacement incident. The attack was recorded and mirrored by zone-xsec.com under mirror ID 833955.
    Date: 2026-04-15T05:45:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833955
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology / IT Services
    Victim Organization: Sabitha Systems
    Victim Site: sabithasystems.com
  351. Website Defacement of sanmec.in by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website sanmec.in by altering the index.txt file. The attack was a targeted single-site defacement with no stated motive recorded. The incident was mirrored and documented via zone-xsec.com.
    Date: 2026-04-15T05:44:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833973
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Sanmec
    Victim Site: sanmec.in
  352. Website Defacement of Royal Depository Limited by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of Royal Depository Limited at royaldepositorylmtd.com. The incident was a targeted single-site defacement, not categorized as mass or redefacement. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T05:43:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833946
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Royal Depository Limited
    Victim Site: royaldepositorylmtd.com
  353. Website Defacement of Royal Mithila by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website royalmithila.com. The attacker replaced the index page with a defacement message, as evidenced by the mirrored content archived at zone-xsec.com. This was a targeted, single-site defacement with no indication of mass or repeated compromise.
    Date: 2026-04-15T05:42:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833947
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Royal Mithila
    Victim Site: royalmithila.com
  354. Website Defacement of Sanghani Associate by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of Sanghani Associate at sanghaniassociate.com. The incident was a targeted single-site defacement, not part of a mass defacement campaign. The attackers motivation and the server details remain unknown at this time.
    Date: 2026-04-15T05:41:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833969
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Professional Services
    Victim Organization: Sanghani Associate
    Victim Site: sanghaniassociate.com
  355. Website Defacement of sajol.co.za by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website sajol.co.za, a South African domain. The defacement was a targeted, single-site incident and was not classified as a mass or re-defacement. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-04-15T05:39:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833959
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: South Africa
    Victim Industry: Unknown
    Victim Organization: Sajol
    Victim Site: sajol.co.za
  356. Website Defacement of Nutriefit Distribuidora by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Nutriefit Distribuidora, a Brazilian health and nutrition distributor. The attack was a targeted single-site defacement and does not appear to be part of a mass defacement campaign. No specific motive or proof of concept was disclosed alongside the incident.
    Date: 2026-04-15T05:33:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833813
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Health & Nutrition / Food Distribution
    Victim Organization: Nutriefit Distribuidora
    Victim Site: nutriefitdistribuidora.com.br
  357. Website Defacement of nexuvira.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, operating under the group Umbra Community, defaced the website nexuvira.com. The defacement targeted a specific index text file and was neither a mass defacement nor a redefacement. Limited technical details are available regarding the server environment or attacker motivation.
    Date: 2026-04-15T05:32:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833800
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Nexuvira
    Victim Site: nexuvira.com
  358. Website Defacement of Olyvexa by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website olyvexa.com. The attack resulted in the replacement of the sites index page with defacement content. No specific motivation or technical details regarding the server infrastructure were disclosed in connection with this incident.
    Date: 2026-04-15T05:31:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833820
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Olyvexa
    Victim Site: olyvexa.com
  359. Website defacement of NewsTv99 by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website newstv99.com, a media or news-oriented platform. The defacement was a targeted single-site attack, with the altered content archived at zone-xsec.com. No specific motivation or exploit details were disclosed.
    Date: 2026-04-15T05:30:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833797
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Media & News
    Victim Organization: NewsTv99
    Victim Site: newstv99.com
  360. Website Defacement of OH Group LLC by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of OH Group LLC by altering the index.txt file. The attack was a targeted single-site defacement with no indication of mass or repeated compromise. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-04-15T05:29:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833818
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Business Services
    Victim Organization: OH Group LLC
    Victim Site: ohgroup-llc.com
  361. Website Defacement of nmguae.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website nmguae.com, targeting an organization based in the United Arab Emirates as inferred from the domain suffix uae. The defacement was recorded as a singular, non-mass incident affecting a specific page (index.txt) rather than the sites homepage. No specific motivation or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T05:28:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833807
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Unknown
    Victim Organization: NMG UAE
    Victim Site: nmguae.com
  362. Alleged leak of German shopping credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has shared a combolist containing approximately 432,040 lines of credentials allegedly targeting German shopping/e-commerce users. The file has been made available for free download via a Mega.nz link. No specific victim organization or website has been identified.
    Date: 2026-04-15T05:26:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72128/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail & E-Commerce
    Victim Organization: Unknown
    Victim Site: Unknown
  363. Alleged leak of mixed corporate credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a mixed corporate combolist containing approximately 7 million credential pairs via Telegram channels. The combolist is being distributed for free through two Telegram groups and a cracking forum. The actor also solicits direct contact via Telegram handle CODER5544 for additional combo requests.
    Date: 2026-04-15T05:26:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72129/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple Sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  364. Website Defacement of liva.pk by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the Pakistani website liva.pk. The defacement was recorded as a single targeted incident rather than a mass or redefacement event. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-04-15T05:21:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833648
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Liva
    Victim Site: liva.pk
  365. Website Defacement of lipomah.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor operating under the alias Nicotine, affiliated with the group Umbra Community, defaced the website lipomah.com. The defacement targeted a specific page (index.txt) rather than the homepage, suggesting a targeted intrusion. No specific motive or technical details regarding the attack vector were disclosed.
    Date: 2026-04-15T05:20:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833647
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lipomah.com
  366. Website Defacement of LatestGovtJobsPK by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor operating under the alias Nicotine, affiliated with the group Umbra Community, defaced the website latestgovtjobspk.com, a Pakistani government jobs listing portal. The defacement targeted the index.txt file and was neither a mass nor redefacement incident. Technical details regarding the server infrastructure remain unknown.
    Date: 2026-04-15T05:18:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833626
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Media / Job Listings
    Victim Organization: Latest Govt Jobs PK
    Victim Site: latestgovtjobspk.com
  367. Website Defacement of LeatherStep by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website leatherstep.pk, a Pakistani leather goods or footwear retail domain. The defacement was a single targeted incident, not part of a mass or repeated defacement campaign. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-04-15T05:16:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833629
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Retail / E-Commerce
    Victim Organization: LeatherStep
    Victim Site: leatherstep.pk
  368. Website Redefacement of Greg on the Hair Co by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, conducted a redefacement of gregonthehairco.com, a hair care related website. This incident marks a repeated targeting of the same domain, indicating a deliberate and persistent attack against the organization. The defacement was recorded and mirrored by zone-xsec.com under mirror ID 833476.
    Date: 2026-04-15T05:10:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833476
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Beauty and Personal Care
    Victim Organization: Greg on the Hair Co
    Victim Site: gregonthehairco.com
  369. Website Defacement of H7X Holding by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of H7X Holding, a holding company based in the United Arab Emirates. The defacement targeted the index page of the domain h7xholding.ae and was recorded as a single, targeted incident rather than a mass or redefacement event. The mirror of the defaced page was archived via zone-xsec.com.
    Date: 2026-04-15T05:09:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833489
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Finance / Holding Company
    Victim Organization: H7X Holding
    Victim Site: h7xholding.ae
  370. Website Defacement of GRS News India by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website grsnewsindia.in, an Indian news outlet. The defacement targeted the sites index page and was recorded as a singular, non-mass incident. The attack was catalogued with a mirror preserved at zone-xsec.com.
    Date: 2026-04-15T05:08:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833479
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Media and News
    Victim Organization: GRS News India
    Victim Site: grsnewsindia.in
  371. Website Defacement of Guia Publicacion Cientifica by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website guiapublicacioncientifica.com, a platform associated with scientific publication guidance. The incident was a targeted, single-site defacement with no stated motive recorded. Server and infrastructure details were not disclosed at the time of reporting.
    Date: 2026-04-15T05:07:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833485
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Publishing / Academic
    Victim Organization: Guia Publicacion Cientifica
    Victim Site: guiapublicacioncientifica.com
  372. Website Defacement of Gulmera by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website gulmera.com by altering the index.txt file. The incident was a targeted defacement, not classified as mass or home page defacement. No motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T05:06:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833487
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Gulmera
    Victim Site: gulmera.com
  373. Website Defacement of greenpurero.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, operating under the group Umbra Community, defaced the website greenpurero.com. The attack targeted a specific page (index.txt) rather than the homepage, indicating a selective defacement. No specific motive, server details, or proof of concept were disclosed alongside the incident.
    Date: 2026-04-15T05:04:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833474
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Green Purero
    Victim Site: greenpurero.com
  374. Website Defacement of Branding Studio LLC by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Branding Studio LLC. The attack targeted the index page of the domain brandingstudiollc.com. No specific motivation or technical details were disclosed in relation to this incident.
    Date: 2026-04-15T04:58:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833205
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Marketing and Branding Services
    Victim Organization: Branding Studio LLC
    Victim Site: brandingstudiollc.com
  375. Website Defacement of BestIVF Noida by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Best IVF Noida, a healthcare organization based in Noida, India. The defacement targeted the index page of the site and was recorded in the Zone-xSec defacement mirror database. The incident was a single targeted defacement rather than a mass or redefacement event.
    Date: 2026-04-15T04:57:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833179
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Best IVF Noida
    Victim Site: bestivfinnoida.com
  376. Website Defacement of Brayzio by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, operating under the group Umbra Community, defaced the website brayzio.com. The attack targeted a specific page (index.txt) and was neither a mass defacement nor a redefacement. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-04-15T04:56:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833207
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Brayzio
    Victim Site: brayzio.com
  377. Website Defacement of Bike Rental Mangalore by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of Bike Rental Mangalore, an Indian vehicle rental service. The attack targeted the sites index page and was recorded as a single, non-mass defacement incident. The defacement was archived and mirrored via zone-xsec.com.
    Date: 2026-04-15T04:55:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833183
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Transportation & Rental Services
    Victim Organization: Bike Rental Mangalore
    Victim Site: bikerentalmangalore.com
  378. Website Defacement of Biplob Bangladesh by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website biplobibangladesh.com. The incident was a targeted single-site defacement with no mass defacement or redefacement indicators. The attackers motive and server details remain unknown at this time.
    Date: 2026-04-15T04:55:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833187
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Biplob Bangladesh
    Victim Site: biplobibangladesh.com
  379. Website Defacement of birdik.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website birdik.com. The attack targeted the index page of the domain, resulting in a single-site defacement. No specific motive, server details, or proof of concept were disclosed in connection with the incident.
    Date: 2026-04-15T04:54:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833188
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Birdik
    Victim Site: birdik.com
  380. Website Defacement of Best Video Editing Institute by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Best Video Editing Institute. The incident was a targeted single-site defacement with no mass or repeated defacement indicators. Technical details regarding the server environment and attack vector were not disclosed.
    Date: 2026-04-15T04:53:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833180
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Best Video Editing Institute
    Victim Site: bestvideoeditinginstitute.com
  381. Website Defacement of Bracesnmore.in by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website bracesnmore.in, an apparent dental or orthodontic services provider based in India. The defacement targeted a specific index file (index.txt) rather than the homepage, suggesting a targeted file-level intrusion. No specific motive or proof-of-concept was disclosed for this incident.
    Date: 2026-04-15T04:52:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833203
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Healthcare / Dental
    Victim Organization: Braces N More
    Victim Site: bracesnmore.in
  382. Website Defacement of Bonny Auto by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website bonnyauto.com, targeting an automotive-related organization. The defacement was a single targeted attack, not classified as a mass or home page defacement. A mirror of the defaced page was archived at zone-xsec.com for reference.
    Date: 2026-04-15T04:51:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833197
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Automotive
    Victim Organization: Bonny Auto
    Victim Site: bonnyauto.com
  383. Website Defacement of Bhaskare Service by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website bhaskareservice.com. The defacement targeted a specific page (index.txt) rather than the homepage, indicating a selective intrusion. The incident was recorded as a single targeted defacement with no indication of mass or repeated defacement activity.
    Date: 2026-04-15T04:51:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833182
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Bhaskare Service
    Victim Site: bhaskareservice.com
  384. Website Defacement of Bluestream by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website bluestream.ae, targeting a UAE-based organization. The defacement affected a specific page (index.txt) rather than the homepage, indicating a targeted intrusion. The incident was recorded and mirrored by zone-xsec.com with reference ID 833192.
    Date: 2026-04-15T04:50:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833192
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Unknown
    Victim Organization: Bluestream
    Victim Site: bluestream.ae
  385. Website Defacement of Booba Software by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, operating under the group Umbra Community, defaced the website of Booba Software at boobasoftware.com. The attack targeted a specific index page and does not appear to be part of a mass or redefacement campaign. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-04-15T04:49:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833198
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology / Software
    Victim Organization: Booba Software
    Victim Site: boobasoftware.com
  386. Website Defacement of Bril Museum by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Bril Museum at brilmuseum.org. The attacker replaced the index page with a defacement message, as evidenced by the mirror archived at zone-xsec.com. The attack was a targeted, non-mass defacement with no stated motive recorded.
    Date: 2026-04-15T04:48:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833210
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Arts & Culture / Museum
    Victim Organization: Bril Museum
    Victim Site: brilmuseum.org
  387. Website Defacement of blurredego.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website blurredego.com. The defacement was a targeted single-site attack, with the compromised page mirrored at zone-xsec.com. No specific motivation or server details were disclosed in association with this incident.
    Date: 2026-04-15T04:48:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833193
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Blurred Ego
    Victim Site: blurredego.com
  388. Website Defacement of brobertstastales.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website brobertstastales.com. The defacement targeted what appears to be a food or lifestyle blog. The incident was a single targeted defacement, not classified as mass or redefacement activity.
    Date: 2026-04-15T04:47:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833211
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Food and Beverage / Lifestyle
    Victim Organization: B Roberts Taste Tales
    Victim Site: brobertstastales.com
  389. Website Defacement of BrandStory by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website brandstory.llc. The defacement targeted a single page and was not classified as a mass or home page defacement. No specific motive or technical details regarding the attack vector were disclosed.
    Date: 2026-04-15T04:46:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833206
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Marketing/Branding
    Victim Organization: BrandStory
    Victim Site: brandstory.llc
  390. Website Defacement of Boulevard Batel by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Boulevard Batel, a shopping destination based in Brazil. The attack was a targeted single-site defacement, with the compromised page mirrored and documented on zone-xsec.com. No specific motive or technical vulnerability details were disclosed in connection with the incident.
    Date: 2026-04-15T04:45:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833202
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Retail / Shopping
    Victim Organization: Boulevard Batel
    Victim Site: boulevardbatel.com.br
  391. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias D4rkNetHub has shared a combolist containing approximately 3,125 Hotmail credentials on the cracking forum CrackingX. The post appears to offer free access to the credential list, hosted via an image preview link. The origin of the credentials and whether they were obtained through phishing, credential stuffing, or a third-party breach is unknown.
    Date: 2026-04-15T04:42:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72127/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  392. Website defacement of 24x7newsnation.com by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website 24x7newsnation.com, a news media outlet. The defacement targeted the index page of the site and was recorded as a singular, non-mass defacement incident. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-15T04:39:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832995
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: News & Media
    Victim Organization: 24×7 News Nation
    Victim Site: 24x7newsnation.com
  393. Website defacement of Aaj Bangla by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website aajbangla.com, a likely Bangladeshi news or media outlet. The defacement was a targeted single-site attack with no mass or re-defacement indicators. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-04-15T04:38:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833000
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Bangladesh
    Victim Industry: Media and News
    Victim Organization: Aaj Bangla
    Victim Site: aajbangla.com
  394. Website Defacement of ABC Ceramica by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website abceramica.com. The attack targeted the index page of the ceramics companys website. No specific motive or reason was disclosed for the defacement.
    Date: 2026-04-15T04:37:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833005
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Manufacturing / Ceramics
    Victim Organization: ABC Ceramica
    Victim Site: abceramica.com
  395. Website Defacement of Aadarsh Vastu by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, the website aadarshvastu.com was defaced by a threat actor known as Nicotine, operating under the group Umbra Community. The defacement targeted the index page of the site, which appears to be associated with a Vastu or architectural consultancy service, likely based in India. The incident was catalogued as a single-target, non-mass defacement with a mirror archived on zone-xsec.com.
    Date: 2026-04-15T04:36:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832997
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Architecture / Interior Design / Vastu Consultancy
    Victim Organization: Aadarsh Vastu
    Victim Site: aadarshvastu.com
  396. Website Defacement of AA Power Solution by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of AA Power Solution, a Canadian power solutions company. The defacement targeted the index page of the domain aapowersolution.ca. No specific motivation or technical details were disclosed in connection with this incident.
    Date: 2026-04-15T04:35:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833002
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Energy / Power Solutions
    Victim Organization: AA Power Solution
    Victim Site: aapowersolution.ca
  397. Website Defacement of 10xsport.in by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website 10xsport.in, a sports-related platform based in India. The defacement targeted the sites index page, with a mirror of the attack archived at zone-xsec.com. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-15T04:34:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832992
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Sports
    Victim Organization: 10X Sport
    Victim Site: 10xsport.in
  398. Website Defacement of abdallazein.online by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website abdallazein.online. The defacement targeted a specific page (index.txt) rather than the home page, suggesting a targeted content modification. No specific motive or technical details regarding the server environment were disclosed.
    Date: 2026-04-15T04:33:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/833007
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Abdalla Zein
    Victim Site: abdallazein.online
  399. Website Defacement of 786halal.ovh by Nicotine of Umbra Community
    Category: Defacement
    Content: On April 15, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website 786halal.ovh. The defacement targeted what appears to be a halal food or products-related website, with the attack recorded and mirrored via zone-xsec.com. The incident was a single targeted defacement, not part of a mass or repeated defacement campaign.
    Date: 2026-04-15T04:32:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832996
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Food & Beverage / Halal Products
    Victim Organization: 786 Halal
    Victim Site: 786halal.ovh
  400. Alleged leak of mixed credential combolist containing 63,754 lines
    Category: Combo List
    Content: A threat actor known as Browzchel has shared a mixed combolist containing 63,754 lines on the cracking forum CrackingX. The content appears to be a compilation of credentials (email:password or user:password format) made available to registered forum users. The actor also promotes a Telegram channel (@BossBrowz) likely used for further distribution of similar content.
    Date: 2026-04-15T03:38:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72126/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  401. Alleged leak of multi-country combolist distributed via Telegram
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist of approximately 3 million credential pairs claimed to include accounts from France, Germany, the United States, Italy, Spain, Japan, South Korea, and other countries. The combolist is being made available for free via Telegram channels and direct contact. No specific victim organization or service has been identified.
    Date: 2026-04-15T03:13:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72124/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  402. Alleged leak of German mixed-target credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has freely shared a combolist containing approximately 421,474 credential entries targeting German users across mixed services. The combolist was made available via a Mega.nz file sharing link on the cracking forum CrackingX. The exact sources of the credentials are unspecified, as the listing describes it as a mixed-target collection.
    Date: 2026-04-15T03:13:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72125/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  403. Alleged leak of mixed valid email credentials combolist
    Category: Combo List
    Content: A threat actor known as RedCloud has made available a combolist containing approximately 5,800 allegedly valid email credentials, described as UHQ (ultra-high quality) and private. The list was shared on April 15, 2026, via a hidden download link on a cybercrime forum, with the actor also promoting a Telegram channel for further distribution. The credentials appear to be a mixed set from various sources with no specific victim organization identified.
    Date: 2026-04-15T02:08:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-5-8K-%E2%9C%A8-Mix-%E2%9C%A8-Valid-Mail-Access-15-04
    Screenshots:
    None
    Threat Actors: RedCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  404. Alleged leak of mixed email access credentials (combolist)
    Category: Combo List
    Content: A threat actor operating under the alias redcloud has shared a combolist containing approximately 5,800 allegedly valid email access credentials on the crackingx.com forum. The dataset is described as UHQ (ultra high quality) and private, and is made available for free download via MediaFire. The actor also provides a Telegram contact handle (@tutuba5m) for further communication.
    Date: 2026-04-15T02:06:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72120/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  405. Alleged leak of mixed corporate combolist credentials
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a mixed corporate combolist via Telegram channels at no cost. The post directs users to two Telegram groups for free access to credential lists and associated tools. No specific victim organization, record count, or targeted country has been identified.
    Date: 2026-04-15T02:06:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72121/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple Sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  406. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias RedCloud has made available a combolist of approximately 1,400 alleged valid Hotmail credentials, dated April 15, 2026. The post describes the credentials as UHQ (ultra high quality) and private, suggesting the accounts have been verified as active. The content is accessible via a hidden download link requiring forum registration, with the actor also advertising via Telegram at @tutuba5m.
    Date: 2026-04-15T01:44:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-1-4K-%E2%9A%A1Hotmail%E2%9A%A1Valid-Mail-Access-15-04
    Screenshots:
    None
    Threat Actors: RedCloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  407. Alleged leak of Hotmail valid credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias redcloud has made available a combolist of approximately 1,400 allegedly valid Hotmail email credentials on the cracking forum CX. The post, dated April 15, 2026, claims the credentials are private and of ultra-high quality (UHQ), and provides a free download link via MediaFire along with a Telegram contact handle.
    Date: 2026-04-15T01:43:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72119/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  408. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias Roronoa044 has made available a combolist purportedly containing 594 valid Hotmail email and password combinations on DemonForums. The post references a private cloud storage link for distribution and directs interested parties to a Telegram handle (@noiraccesss). The credentials are described as UHQ (ultra-high quality), suggesting they may be verified as active accounts.
    Date: 2026-04-15T01:01:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X594-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  409. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias noir has made available a combolist of 594 alleged valid Hotmail credentials on the cracking forum CX. The post claims the credentials are UHQ (ultra-high quality) and valid, stored on a private cloud. The actor promotes a Telegram channel (@NoirAccesss) likely for further distribution or contact.
    Date: 2026-04-15T01:01:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72117/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  410. Alleged leak of German domain credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 1.09 million lines of credentials associated with German domains. The combolist was shared freely via a Mega.nz file link on the cracking forum CrackingX. No specific victim organization or website has been identified, as the combolist appears to aggregate credentials from multiple German-domain sources.
    Date: 2026-04-15T01:01:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72118/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  411. Website Defacement of Vigno SaaS by QATAR911
    Category: Defacement
    Content: On April 15, 2026, the threat actor QATAR911 defaced a page on vignosaas.in, a SaaS platform based in India as inferred from the .in domain TLD. The attack targeted a specific subpage (qa123.html) rather than the sites homepage and was carried out as a singular, non-mass defacement. A mirror of the defaced content was archived at zone-xsec.com.
    Date: 2026-04-15T00:55:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832989
    Screenshots:
    None
    Threat Actors: QATAR911, QATAR911
    Victim Country: India
    Victim Industry: Technology / Software as a Service (SaaS)
    Victim Organization: Vigno SaaS
    Victim Site: vignosaas.in
  412. Alleged Data Leak of Avatar: Aang, The Last Airbender Unreleased Content
    Category: Data Leak
    Content: A threat actor operating under the alias HasanBroker has made available what they claim to be leaked content related to the production Avatar: Aang, The Last Airbender via a public file-sharing link on wormhole.app. The actor cites racially motivated grievances regarding casting decisions as the reason for the leak. The nature and authenticity of the leaked content have not been verified.
    Date: 2026-04-15T00:37:52Z
    Network: openweb
    Published URL: https://breached.st/threads/avatar-aang-the-last-airbender-leak.86002/unread
    Screenshots:
    None
    Threat Actors: HasanBroker
    Victim Country: Unknown
    Victim Industry: Entertainment / Media
    Victim Organization: Avatar: Aang, The Last Airbender (Production)
    Victim Site: Unknown
  413. Alleged Data Leak of UMKM (Small Business) Registry Database from Pekanbaru, Indonesia
    Category: Data Leak
    Content: A threat actor operating under the alias BabayoErorSystem has leaked a database allegedly containing 31,034 records from the UMKM (Usaha Mikro Kecil Menengah / Small and Medium Enterprises) registry of Pekanbaru, Riau Province, Indonesia. The leaked data includes full names, national identification numbers (NIK), phone numbers, and administrative location details such as district and sub-district. The data appears to originate from a government-managed small business registration system.
    Date: 2026-04-15T00:37:11Z
    Network: openweb
    Published URL: https://breached.st/threads/mata-umkm-prov-kab-pekan-baru-31-034-thousand.86003/unread
    Screenshots:
    None
    Threat Actors: BabayoErorSystem
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Dinas UMKM Provinsi/Kabupaten Pekanbaru
    Victim Site: Unknown
  414. Alleged leak of 18 million URL:Log:Pass credentials by threat actor vultapower
    Category: Logs
    Content: A threat actor known as vultapower has made available a combolist containing approximately 18 million URL:login:password credential pairs, claimed to have been extracted on 15 April 2026. The dump, referred to as a Vulta/ULP combolist, was shared for free on the XF forum. No specific victim organization or country has been identified, suggesting the credentials may span multiple services and regions.
    Date: 2026-04-15T00:25:51Z
    Network: openweb
    Published URL: https://xforums.st/threads/url-log-pass-18-m-vulta-power-private-cloud.608327/
    Screenshots:
    None
    Threat Actors: vultapower
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown