[April-24-2026] Daily Cybersecurity Threat Report

Executive Summary

This comprehensive intelligence report details a highly active period of global cyber threat activity spanning April 23 to April 24, 2026. Based strictly on intercepted threat intelligence data, underground forum communications, and dark web marketplace listings, this report aggregates, categorizes, and analyzes a vast array of cybersecurity incidents. The observed events demonstrate a volatile threat landscape characterized by massive credential aggregation, targeted state-sponsored data exfiltration, disruptive hacktivism, and the active trading of corporate initial access.

During this brief window, threat actors executed highly coordinated campaigns affecting dozens of countries and multiple critical industries. We observed a staggering volume of credential combolists being distributed freely—numbering in the hundreds of millions of lines—fueling the broader credential stuffing and account takeover ecosystem. Simultaneously, Initial Access Brokers (IABs) successfully auctioned high-level administrative access to multi-million-dollar corporations, bridging the gap between opportunistic exploitation and targeted ransomware deployments.

Perhaps most alarming is the documented escalation of hacktivist operations targeting Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks. Threat actors actively claimed to have disabled critical infrastructure systems, including a Polish compressor station and an Israeli water management facility. Furthermore, government databases across Iraq, France, Indonesia, and the Philippines suffered severe compromises, exposing the sensitive personal identifiable information (PII) of tens of millions of citizens.

This report will systematically break down these incidents into distinct categories: Data Breaches and Leaks, Credential Combolists, Initial Access and Malware Services, Hacktivism and Defacements, and ICS/SCADA Disruptions. Through detailed analysis of threat actor methodologies, targeted sectors, and geopolitical motivations, this document aims to provide security professionals, policymakers, and organizations with a factual, grounded understanding of the immediate cyber threat landscape.


1. Threat Landscape Overview

The data analyzed in this report reflects a decentralized but highly efficient cybercrime ecosystem. Threat actors operate across multiple networks, primarily utilizing the open web (clearnet forums like DemonForums, CrackingX, and Altenens), the dark web (onion-routed marketplaces), and encrypted messaging platforms (predominantly Telegram) to communicate, trade, and distribute compromised assets.

  • The Commericalization of Access: Initial Access Brokers (IABs) such as “TunaFish” and “BigTuna” are actively selling verified, highly privileged access (Domain Admin, Enterprise Admin, Server Admin) to large-scale enterprises with revenues exceeding $250 million.
  • Massive Aggregation of Credentials: The sheer volume of credential leaks is unprecedented. Threat actors like “CODER” and “StarLinkClub” are distributing files containing upwards of 480 million credential lines, indicating that automated stealer logs and historical breaches are being continuously recycled and weaponized.
  • Vulnerability-Specific Defacement Campaigns: The mass defacement landscape is dominated by a few highly active entities. For example, the actor “DimasHxR” executed dozens of surgical defacements targeting specific media upload directories, highly indicative of an automated exploitation campaign targeting a specific Content Management System (CMS) vulnerability.
  • Geopolitically Motivated ICS Attacks: Hacktivist groups are moving beyond simple website defacements and actively seeking to manipulate physical infrastructure, specifically targeting water management and energy systems in regions experiencing geopolitical tension.

2. Comprehensive Analysis of Data Breaches and Leaks

The period of April 23–24, 2026, saw a massive hemorrhage of sensitive data across both public and private sectors. The nature of these breaches ranges from politically motivated leaks to purely financial data extortion.

2.1 Government and Defense Sector Compromises

Government infrastructure remains a primary target for threat actors seeking sensitive citizen data, intelligence, or political leverage.

  • Russian Defense and Scientific Data (VNIIFTRI): In one of the most critical incidents, a threat actor known as “Rhodes” advertised the sale of 110GB of classified data allegedly stolen from VNIIFTRI, Russia’s premier precision measurement and defense metrology institute. This highly sensitive dataset reportedly contains classified documentation regarding GLONASS navigation systems, advanced quantum programs (including gravimeters, magnetometers, and atomic clocks), military communications, and personnel identification documents. The data was offered exclusively for $100.
  • French Government ANTS Platform: The threat actor “breach3d” claimed a massive exfiltration of 600 million lines of data from the French Agence Nationale des Titres Sécurisés (ANTS), the national agency responsible for secure identity documents like passports and driver’s licenses. The leaked data purportedly includes plaintext passwords, API keys, encryption keys, source code, and XML links to citizen identity documents. The actor stated this leak was politically motivated and not for sale.
  • French Ministry of Health: In another French government incident, the actor “breach3d” allegedly leaked a database belonging to sante.gouv.fr, containing the full names, emails, and certificate IDs of registered users, which was subsequently distributed for free by user “aggravage”.
  • Iraqi Citizenship and Intelligence Data: A threat actor operating under the alias “xorcat” leaked a massive SQL database obtained from Iraq’s Agency of Intelligence & Federal Investigation. The dataset, dated August 2022, contains over 22.3 million records, exposing the full names, physical addresses, National IDs, employment data, and case records of Iraqi citizens and foreigners.
  • Indonesian Civil Registration (Dukcapil): The actor “Xyph0rix” published a database originating from Indonesia’s Directorate General of Civil Registration (Dukcapil). This leak exposed highly sensitive PII, including National Identity Numbers (NIK), addresses, occupations, and blood types. Furthermore, the actor “MrAnomali” claimed a leak from the Indonesian National Nutrition Body (Badan Gizi Nasional) , and “RuiixH4xor_” leaked data from the Halmahera Barat regional government legal portal.
  • Philippine Drug Enforcement Agency (PDEA): Threat actor “Sh1nnySp1der” offered to sell data allegedly breached from the PDEA, providing proof images and soliciting buyers via encrypted email.
  • Arkansas State Crime Lab: In the United States, the “kittykatkrew” claimed to have compromised the Arkansas State Crime Lab’s web portal. The exfiltrated data reportedly includes comprehensive court calendars, defendant details, and a full personnel directory with direct contact information and agency affiliations.
  • Bangladesh RDCD: The actor “kingdataseller” distributed an archive belonging to the Bangladesh Rural Development and Co-operatives Division, exposing employee HR data, project details, and authentication files.
  • Indian Ministry of Home Affairs: Contact information, including names, emails, and phone numbers of personnel from the Indian Ministry of Home Affairs, was leaked by the actor “anon 23” on an underground forum.

2.2 Financial Services and Investment Sector

Financial databases are highly lucrative for threat actors, enabling identity theft, targeted phishing, and direct financial fraud.

  • UAE Investor System: The threat actor group “MD-Ghost” (also identifying as “The BlackH4t”) claimed a highly impactful breach of a United Arab Emirates investor system, exfiltrating 30GB of data. This stolen cache allegedly contains foreign investor registration details, financial records, and copies of high-value visas, including the Dubai Golden Visa.
  • Citibanamex (Mexico): The actor “Jansz,” associated with “GERSONFDP,” leaked a comprehensive database of Citibanamex customers. The highly granular data includes full names, blood types, geolocation details, salary information, payment records, and family member details, posing a severe risk of targeted extortion or physical security threats to the victims.
  • Bank Syariah Indonesia: The prolific actor “Xyph0rix” leaked an employee and customer database belonging to Bank Syariah Indonesia, exposing internal organizational structures, regional office details, and personal contact information.
  • Card24h.com: A database belonging to Card24h.com, a Thai peer-to-peer payment and carding-related platform, was leaked by the actor “enumerate”. The data, allegedly discovered on an exposed endpoint, contains usernames, bcrypt-hashed passwords, and wallet transaction histories.

2.3 Healthcare and Medical Sector

The healthcare sector continues to suffer breaches, resulting in the exposure of highly sensitive Protected Health Information (PHI).

  • LNM6 National Laboratory (Morocco): Threat actors “kingdataseller” and “anisanas2” claimed to have exfiltrated 100GB of medical data from the Laboratoire National Mohammed VI d’Analyses Médicales. The stolen records purportedly contain highly sensitive patient scan results and medical histories, which the actors offered for sale via Telegram.
  • Haamor.com (Thailand): A 350MB SQL database dump from the Thai health education platform Haamor was listed for sale by “DarkMafiaX”. The dataset contains registered user accounts dating back to 2011, including Thai script names and hashed passwords.
  • Ein Shemer Kibbutz (Israel): The CarLog vehicle management system for the Ein Shemer Kibbutz was breached by “imaloser,” exposing 771 resident records including driver’s license numbers and billing IDs.
  • Atraf LGBTQ+ Platform (Israel): A massive database from the Israeli LGBTQ+ dating platform Atraf, originally breached in 2021 by the Black Shadow group, was actively redistributed by the actor “imaloser”. The 700,000-record database contains incredibly sensitive data, including sexual preferences, gender identities, and HIV status, creating severe risks for extortion and physical harm to the victims.

2.4 E-Commerce, Retail, and Corporate Data

Corporate data breaches provide threat actors with the raw materials required for business email compromise (BEC), corporate espionage, and consumer fraud.

  • Claro El Salvador: Threat actor “MDGhost666” claimed a massive 500GB breach of Claro El Salvador, the nation’s largest telecommunications provider. The exfiltrated data reportedly contains contracts, internal company documentation, and user data.
  • CarGurus (United States): The actor “TheFallen” leaked a 7.1GB database dump from the automotive marketplace CarGurus, exposing over 12.4 million records containing PII and internal corporate data.
  • 7-Eleven (United States): The same actor, “TheFallen,” distributed a 10.4GB compressed database containing over 600,000 Salesforce PII records allegedly belonging to 7-Eleven.
  • Bol.com (Belgium): A database of 400,000 Belgian customer records from Bol.com was offered for sale by “TrueNigger”. The extensive dataset includes identity numbers, tracking data, and payment methods.
  • Ayurveda-best.com (Ukraine): The actor “Keymous” leaked a database containing 27,000 comprehensive customer orders from the Ukrainian e-commerce site, including shipping addresses, IP addresses, and payment details.
  • 8891.com.tw (Taiwan): A database dump from Taiwan’s largest automotive marketplace, 8891.com.tw, was distributed by the actor “ijpys”.
  • BulkApparel USA: The actor “ijpys” also sold a database of 298,480 wholesale customer records from BulkApparel for $300.
  • Protemps (Singapore): A recruitment database dump from Protemps Singapore, originally breached in 2021, was redistributed by “infintyx07,” exposing 49,591 records with hashed passwords and passport numbers.
  • FranceVerif.fr: The trust and coupon verification platform FranceVerif suffered a database leak by “ChimeraZ,” exposing user feedback, geolocation data, and merchant SIRET numbers.
  • Bodyhit Club (France): A database of 218,542 fitness club customers, including IBAN numbers and BIC codes, was offered for sale.
  • WooWup AWS Bucket: A threat actor shared 9,675 direct download links to exposed CSV files hosted on a misconfigured AWS S3 bucket belonging to the marketing automation platform WooWup.
  • Trucking Logistics Database: A massive 1.5 million-record database of trucking companies across the US, Canada, and Mexico (including DOT numbers and legal names) was leaked freely by “OriginalCrazyOldFart”.

3. The Proliferation of Credential Combolists

A significant portion of the cyber activity analyzed revolves around the distribution of “Combolists”—text files containing millions of compromised username/email and password combinations. These lists are the lifeblood of credential stuffing attacks, where automated tools rapidly test these combinations against banking, retail, and corporate portals.

The data from April 23–24 highlights a highly organized supply chain for these credentials, driven by prominent aggregators.

3.1 The Dominance of Key Aggregators

  • Threat Actor “CODER”: The actor known as “CODER” is undeniably the most prolific distributor of credential combolists in the observed dataset. Operating primarily through Telegram channels and the CrackingX forum, CODER employs a strategy of massive, free distribution to build a following. Their distributions are highly categorized by geography and platform. Observed leaks from CODER include:
    • A 6 million-line list spanning multiple countries including Switzerland and Sweden.
    • A 7.4 million-line global list (India, US, UK, Brazil, etc.).
    • A 5 million-line list targeting casino platforms across .com, .fr, and .es domains.
    • An 11 million-line “Asian mix” list.
    • A 7 million-line list targeting France.
    • An 11 million-line list targeting Cyprus.
    • A 6 million-line list targeting Yahoo and Outlook accounts.
    • A 6 million-line list targeting social media domains.
    • An 11 million-line streaming service credential list.
    • An 8 million-line Asia-Pacific targeted list.
    • An 11 million-line e-commerce list targeting specific retailers like Allegro, Kaufland, Bol.com, and Decathlon.
    • A 5 million-line fashion retail list targeting ASOS, Farfetch, and GOAT.
    • A 9.4 million-line list targeting Hotmail and Office 365.
    • A 3 million-line corporate SMTP service combolist.
  • Threat Actor “Ebbicloud”: Operating on the AlteNens (AE) forum and Telegram, Ebbicloud specializes in geographic and sector-specific credential drops. Their activity included:
    • 27,300 school and government domain credentials.
    • 16,000 corporate business email credentials, highly valuable for Business Email Compromise (BEC) attacks.
    • Multiple European-targeted lists ranging from 15,800 to 21,900 lines.
    • Multiple United States-targeted lists ranging from 9,200 to 23,800 lines.
  • Threat Actor “HQcomboSpace”: This actor utilizes Mega.nz to distribute massive files on CrackingX. Their focus heavily targets consumer platforms and webmail.
    • 172,158 credentials targeting German gaming and casinos.
    • 1.28 million lines of Yahoo credentials.
    • 970,434 credentials for German shopping platforms.
    • 192,342 corporate SMTP credentials designed for spam operations.
    • Over 1.77 million and 1.57 million lines in multiple Yahoo-specific drops.
  • Threat Actor “thejackal101”: Operating on DemonForums, this actor distributes geo-targeted lists, largely promoting their “Elite_Cloud1” Telegram channel. Their leaks included credentials targeting Poland (485k) , Philippines (172k) , Peru (126k) , Portugal (75k) , Pakistan (46k) , Norway (21k) , and Nigeria (16k). This exact dataset was later mirrored by the actor “CobraEgy”.

3.2 Massive Uncategorized “URL:Log:Pass” Drops

The dataset reveals an alarming trend of ultra-massive credential aggregations formatted as URL:Login:Password (ULP). These are typically the direct output of Info-Stealer malware (like Vidar Stealer, as noted by the actor “BigTuna” ).

  • StarLinkClub: Distributed a monolithic 482.794 million-line ULP combolist, sized at 27GB, alongside a smaller 11.8 million-line list. The exact same 482 million-line database was also cross-posted by the actor “ebankastore”.
  • Mustukaral: Advertised a staggering 1.3 Terabyte ULP database. Instead of merely offering a download, Mustukaral provides a localized search interface, allowing other criminals to query specific targets or filter by country, essentially operating a credential search engine as a service.
  • Daxus: Shared a 5.97 million-line ULP combolist distributed via a dedicated website.

3.3 Platform-Specific Account Targeting

While massive lists are common, highly targeted access remains valuable.

  • Threat Actor “mu”: Actively solicits buyers on Telegram for access to compromised accounts on high-value platforms including eBay, OfferUp, PSN, Uber, Booking, Amazon, and Walmart.
  • Larry_Uchiha: Shared combolists specifically containing verified access to Netflix, OnlyFans, ChatGPT, Xbox, and Discord.
  • Microsoft/Hotmail Ecosystem: Hotmail and Outlook remain highly targeted. Dozens of incidents involved the distribution of “valid” or “UHQ” (Ultra High Quality) Hotmail credentials by actors like “MailAccesss,” “MegaCloudshop,” “alphacloud,” and “ValidMail”.

4. Initial Access Brokers (IABs) and Malware Services

The bridge between credential theft and devastating corporate ransomware attacks is facilitated by Initial Access Brokers. These actors specialize in breaching corporate perimeters and auctioning that access.

4.1 High-Value Corporate Access Sales

  • The “TunaFish” Operations: This highly sophisticated actor successfully auctioned critical access to major enterprises.
    • Turkish Technology/SaaS Company: TunaFish sold AWS Console access with Domain Admin privileges to a Turkish company generating $250M–$500M in revenue. The network reportedly consisted of 5,000 hosts protected by Malwarebytes EDR.
    • Colombian Construction Company: TunaFish also sold Palo Alto GlobalProtect VPN access to a Colombian construction firm of similar revenue size. This access carried Enterprise Admin privileges across a massive network of 10,000+ hosts, despite the presence of CrowdStrike Falcon EDR.
  • The “BigTuna” Operations: Likely related to TunaFish, this actor sold webshell and remote desktop access.
    • Canadian Logistics Company: Sold ASPX webshell access with Server Admin privileges to a Canadian shipping company with 1,000 hosts.
    • Japanese Aerospace/Defense Organization: Sold RDWeb access to a highly sensitive Japanese defense contractor, carrying Database Administrator (SA) privileges.
  • Cloud Infrastructure and RDP Rentals: Actors like “PORTAL” and “QQHB99” are operating rental services, offering cybercriminals temporary Remote Desktop Protocol (RDP) access to compromised Azure, AWS, and DigitalOcean cloud infrastructure for $200.

4.2 Malware, Vulnerability Scanners, and DDoS Services

To facilitate these breaches, an ecosystem of supporting tools is actively traded.

  • DynAmite 4.0 Malware Toolkit: The actor “CINCH19922” distributed the “DynAmite 4.0” modular malware creation toolkit, which features automated payload generation and customizable malware deployment. The same actor also distributed the “Gr3eNoX Exploit Scanner V4.2” for automated web vulnerability discovery.
  • DDoS-as-a-Service (DaaS): The platforms “Goofystress.st” and “Deep Stresser” aggressively marketed their DDoS capabilities on Telegram. They offer Layer 4 and Layer 7 attacks, claiming massive volumetric capabilities (up to 10 million packets per second) and specific bypasses for Cloudflare CAPTCHAs and gaming servers (Fortnite, Roblox, Call of Duty). Another service, “KillByte Solutions,” advertised IoT botnet infrastructure capable of 1.2 Tbps attacks.
  • Cryptocurrency Fraud Scripts: The actor “antelope” sold a “Flash USDT Sender Script” designed to manipulate the Ethereum network. By exploiting transaction replacement mechanisms with artificially low gas fees, criminals can create the illusion of a completed cryptocurrency payment before canceling it, defrauding merchants.

5. Hacktivism, Defacements, and Industrial Disruption

Website defacements—once viewed as minor digital vandalism—have evolved. In the observed data, defacements are utilized both as automated, mass-scale disruptions and as vectors for geopolitical messaging. Furthermore, hacktivist groups have worryingly crossed the threshold into attacking physical Industrial Control Systems (ICS).

5.1 The DimasHxR Automated Campaign

The threat actor “DimasHxR” executed an extraordinarily prolific defacement campaign. A critical technical analysis of their targets reveals a distinct pattern: virtually all defacements were not on the homepage, but rather within specific subdirectories, typically /pub/media/customer_ad or similar media paths.

This highly specific targeting strongly indicates that DimasHxR was not manually hacking sites, but rather utilizing an automated script to exploit an unpatched file upload or directory traversal vulnerability within a specific Content Management System (CMS), highly likely to be Magento based on the path naming conventions.

DimasHxR’s campaign indiscriminately targeted global retail and e-commerce platforms, demonstrating the widespread nature of the underlying vulnerability. Targets included:

  • Cartouches Arabais (Printing)
  • ClickNPay (Financial Services)
  • Stokrat (Ukraine)
  • MixMarket
  • PLC Product (Manufacturing)
  • Clever Möbel (German Furniture)
  • Tronictoy
  • Pawfect Foods (India)
  • Wagadootoo (South Africa)
  • Swebike (Sweden)
  • Manhattan Portage (US)
  • Mokca (Slovenia)
  • Zaafoo
  • Spa Galaxy (Moldova)
  • KTSPS (Malaysia)
  • Illuminus Brands
  • Isles of Scilly Flowers (UK)
  • Ignyte Active (US)
  • La Tintoreria Vinoteca (Spain)
  • Homegrown Cannabis (Germany)
  • LOH Motorsport (Ireland)
  • First Aid Zone
  • Iris Made With Love
  • Arpo Software
  • Enola Gaye (Norway)
  • MD Materiaux (France)
  • SportFoods (Netherlands)
  • PCMR (Hungary)
  • VDH Products
  • Firmbay
  • Design Ameublement (France)
  • Wolka Online (EU)
  • Karly Floats (Australia)
  • Bierl Antiquariat (Germany)
  • The Merch NZ (New Zealand)
  • Samdam Shop
  • CHS Pharmacy (UAE)
  • Silhouette Europe
  • Divenly (France)
  • The Garden (UK)
  • Neottia (Greece)
  • EWM (UK)
  • Bielizna For You (Poland)
  • Maggarack
  • Skin Collagen (Finland)
  • Larpsi (Brazil)
  • Lukime
  • Kids Luxury (UK)
  • Tribag (Romania)
  • Poleringspads (Norway)

5.2 The LegioN_LeakeR Mass Defacement Campaign

A distinctively different methodology was employed by the threat actor “EbRaHiM-VaKeR,” operating under the banner of the Telegram group “LegioN_LeakeR”. Unlike DimasHxR’s surgical path exploitations, EbRaHiM-VaKeR conducted “Mass Defacement” operations targeting Linux-hosted servers. This indicates the exploitation of server-level vulnerabilities (such as outdated Apache/Nginx instances or unpatched cPanel/WHM software) allowing the actor to simultaneously compromise multiple domains hosted on the same infrastructure.

Their targets primarily consisted of generic “.click” and “.website” domains, suggesting the compromise of cheap, shared-hosting environments. Targets included:

  • Vakalat Vidya (India)
  • Krishna Physiotherapy Rehab
  • Costlay
  • Ocean Mist
  • Aetherial Peak
  • Novatrax
  • Northgate Horizon
  • Maple Stone Ridge
  • Stratos Nova
  • Skyforge Horizon
  • Zymera Edge
  • Nebula Crest
  • Lunaris Edge
  • Silverwood Harbor
  • Orvaneh Harbor
  • Oak Haven Summit
  • Ironwood Harbor
  • Zynera Creek
  • Trivora Edge
  • Pinecrest Harbor
  • Blue Rock Holdings
  • Celestial Harbor
  • Aurora Summit
  • Averoncrest
  • Cloud Spire Ventures
  • Eclipsera
  • Blue Peak Ventures

Other notable defacements included the actor “Zod” targeting Brazilian VBA and Excel educational platforms , “MR.N43TXPLOIT” (BekasiRootSec) targeting Akoma Online infrastructure , and “Mr.PIMZZZXploit” conducting mass defacements affecting 16 sites including North Macedonian IT firms.

5.3 Escalation: Industrial Control System (ICS) Hacktivism

The most alarming development during this reporting period is the successful compromise of physical infrastructure systems by hacktivist groups. This represents a severe escalation from data theft to kinetic disruption.

  • Polish Compressor Station Attack: The “DDoSia Project” claimed unauthorized access to an industrial automation system controlling a compressor station in Poland. The group provided highly specific technical details, claiming to have compromised operator panels and actuator control circuits. They reported a complete loss of communication with multiple drive units (B2, B4, B5, B6, D7), forced all actuators into manual mode, and disabled the heat recovery systems. This represents a sophisticated understanding of ICS operations.
  • Polish Hospital BMS Attack: A group identifying as “The Z-Pentest Alliance” claimed to have compromised a Geo-Eko Building Management System (BMS) in a Polish hospital. The actor claimed full control over ventilation, temperature, and humidity systems in critical areas like surgical units and intensive care. The attack was politically motivated, using hashtags like #OpPoland.
  • Israeli Water Management Attack: The actors “TheSweetNight” and “OpsShadowStrike” claimed to have hijacked systems belonging to BERMAD CS Ltd, an Israeli water flow management company. The actors explicitly stated they utilized Modbus protocol attacks to target HMI (Human-Machine Interface) and SCADA systems. This attack involved collaboration across multiple international hacktivist crews (TengkorakCyberCrew, MalaysiaHacktivist) and carried explicit pro-Palestine/Iran messaging.
  • Turkish Telecommunications Disruption: The group “Armenian code” claimed cyber attacks against Turkey’s critical telecommunications infrastructure, targeting the operator systems of both Turkcell and Turk Telekom, claiming the ability to cause system power disconnections.

6. Detailed Threat Actor Profiles

To adequately defend against these threats, security teams must understand the specific behaviors and technical capabilities of the most active adversaries observed in this dataset.

  • CODER: The preeminent credential distributor. CODER operates primarily to drive traffic to Telegram channels. By giving away billions of credential pairs for free, CODER builds a massive audience, which can later be monetized through the sale of premium tools, zero-day exploits, or targeted corporate access.
  • TunaFish / BigTuna: Operating at the highest tier of the cybercrime ecosystem. These Initial Access Brokers possess the capability to bypass enterprise EDR solutions (CrowdStrike, Malwarebytes, Kaspersky) and secure persistent access (VPNs, Webshells) to networks belonging to multi-hundred-million-dollar corporations.
  • breach3d: A politically motivated actor specializing in French government infrastructure. By targeting the ANTS identity platform and the Ministry of Health , breach3d demonstrates advanced persistent threat (APT) capabilities, extracting database source code, API keys, and cryptographic material.
  • Xyph0rix: A specialized data broker focusing intensely on Indonesian corporate and government targets. Their portfolio includes the national civil registry (Dukcapil), the state-owned oil giant Pertamina, and Bank Syariah Indonesia.
  • DimasHxR: A lone-wolf script kiddie or automated bot operator. DimasHxR relies entirely on finding exposed media upload directories (like /pub/media/) on poorly secured e-commerce sites. While the volume of their attacks is high, the technical sophistication is low, relying on unpatched vulnerabilities in common CMS frameworks.

7. Conclusion & Strategic Recommendations

The cybersecurity events of April 23–24, 2026, illustrate a threat environment that is highly automated, deeply interconnected, and increasingly willing to target physical infrastructure.

The rampant distribution of over a billion credential pairs by actors like CODER and StarLinkClub guarantees that credential stuffing and brute-force attacks will remain a persistent, high-volume threat to all internet-facing authentication portals. Organizations that do not enforce robust, phishing-resistant Multi-Factor Authentication (MFA) across all external access points are highly likely to suffer account takeovers.

Furthermore, the activities of Initial Access Brokers like TunaFish demonstrate that perimeter security alone is insufficient. When threat actors can sell Enterprise Admin VPN access to networks supposedly protected by leading EDR solutions, organizations must assume breach and implement strict zero-trust network architectures, network segmentation, and continuous internal behavioral monitoring.

Finally, the pivot of hacktivist groups toward SCADA and ICS environments in Poland and Israel is a critical escalation. The lack of authentication and logging mechanisms in legacy OT (Operational Technology) systems makes them highly vulnerable to Modbus protocol manipulation. Critical infrastructure operators must physically or logically isolate these systems from the public internet immediately.

The velocity and scale of these incidents require organizations to adopt a proactive, intelligence-driven security posture, continuously monitoring the dark web and underground forums to preemptively identify when their data, credentials, or network access are being actively traded.

Detected Incidents Draft Data

  1. Alleged defacement of ivsoftdesign.mk by Mr.PIMZZZXploit
    Category: Defacement
    Content: Website defacement of ivsoftdesign.mk claimed by threat actor Mr.PIMZZZXploit. Defacement message posted to Babayo Eror System channel with photo evidence.
    Date: 2026-04-23T23:58:40Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/557
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: North Macedonia
    Victim Industry: Unknown
    Victim Organization: ivsoftdesign
    Victim Site: ivsoftdesign.mk
  2. Alleged leak of gaming and casino credentials targeting Germany
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 172,158 credential pairs targeting gaming and casino platforms in Germany. The data was shared freely via a Mega.nz file link on the cracking forum CrackingX. The leak appears to consist of email and password combinations sourced from German gaming and casino-related services.
    Date: 2026-04-23T23:54:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73062/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Gaming and Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged sale of fresh compromised account database across multiple countries
    Category: Combo List
    Content: Threat actor mu is offering fresh database access containing compromised accounts from UK, DE, JP, NL, BR, PL, ES, US, IT and other countries. The seller specifically mentions targeting accounts on eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Claims to own a private cloud with valid ntlworld webmail credentials available. Accepting custom keyword searches and requests via DM.
    Date: 2026-04-23T23:51:47Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68436
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy
    Victim Industry: Multiple (e-commerce, gaming, travel, payment services)
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged leak of multi-platform credential combolist including Netflix, Steam, Spotify and others
    Category: Combo List
    Content: A threat actor operating under the alias Ra-Zi has made available a claimed 140,000-entry combolist containing email:password credentials targeting multiple platforms including Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. The post includes a hidden download link requiring forum registration, and also advertises the sale of higher-quality credential lists via Telegram. The actor promotes associated channels at t.me and cracking-club.com for further distribution and sales.
    Date: 2026-04-23T23:30:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-140k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–201536
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Entertainment and Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Alleged leak of 140,000 mixed email credentials combolist
    Category: Data Leak
    Content: A threat actor known as carlos080 shared a combolist of approximately 140,000 email and password combinations on the AE forum. The combolist is described as fresh and high quality, containing mixed email credentials. No specific victim organization or country has been identified.
    Date: 2026-04-23T23:26:44Z
    Network: openweb
    Published URL: https://altenens.is/threads/140k-fresh-hq-combolist-email-pass-mixed.2928893/unread
    Screenshots:
    None
    Threat Actors: carlos080
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Website Defacement of Domino BZ by Anonsecita
    Category: Defacement
    Content: The threat actor Anonsecita defaced the website www.domino.bz.it, an Italian domain, on April 24, 2026. The defacement was a targeted single-site attack, with the attacker leaving a text file as proof of compromise. No specific motive or additional technical details were disclosed in the available data.
    Date: 2026-04-23T23:23:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248670
    Screenshots:
    None
    Threat Actors: Anonsecita, Anonsecita
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Domino BZ
    Victim Site: www.domino.bz.it
  7. Alleged Gmail Spam Campaign Targeting Cryptocurrency Exchange Users
    Category: Initial Access
    Content: A threat actor is seeking individuals or services capable of delivering bulk spam emails to Gmail inboxes, specifically targeting cryptocurrency exchange users. The actor claims the campaign has yielded results in the eight-figure range, suggesting significant financial fraud or phishing activity. This indicates an active effort to bypass email filters and reach victims with fraudulent crypto-related content.
    Date: 2026-04-23T23:14:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Email-spam
    Screenshots:
    None
    Threat Actors: Haaland89
    Victim Country: Unknown
    Victim Industry: Cryptocurrency
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data breach of Kurdistan Region Citizenship Database
    Category: Data Breach
    Content: A threat actor on BreachForums has made available an alleged database containing 2.8 million records belonging to citizens of the Kurdistan Region of Northern Iraq. The dataset reportedly includes national ID numbers, full names, job titles, phone numbers, dates of birth, and resident type classifications. Access to the data requires registration or login on the forum, suggesting it may be gated behind a paywall or credit system.
    Date: 2026-04-23T22:57:53Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Kurdistan-Region-Citizenship-Database
    Screenshots:
    None
    Threat Actors: squadleader
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Kurdistan Region Government
    Victim Site: Unknown
  9. Alleged leak of session cookies for YouTube, TikTok, Steam, and other platforms
    Category: Data Leak
    Content: A threat actor operating under the alias bluestarcrack has shared session cookies allegedly belonging to users of multiple platforms including YouTube, TikTok, and Steam via the file hosting service Uploadery. The leaked data appears to consist of browser session cookies, which could be used to hijack authenticated user sessions without requiring passwords. No pricing was mentioned, suggesting the data was made available for free.
    Date: 2026-04-23T22:56:47Z
    Network: openweb
    Published URL: https://breached.st/threads/cookies-youtube-tiktok-steam-more.86221/unread
    Screenshots:
    None
    Threat Actors: bluestarcrack
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (YouTube, TikTok, Steam)
    Victim Site: Unknown
  10. Alleged Sale of AWS Console Initial Access to Turkish Technology/SaaS Company
    Category: Initial Access
    Content: A threat actor operating under the alias TunaFish is selling alleged AWS Console access to an unnamed Turkish Technology/SaaS company with an estimated revenue of $250M-$500M. The access is claimed to include Domain Admin privileges on a network of approximately 5,000 hosts, with Malwarebytes EDR present in the environment. Proof and additional details are offered via a Tor-hosted onion link.
    Date: 2026-04-23T22:30:33Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-AWS-Console-Technology-SaaS-Turkey-250M-500M-revenue
    Screenshots:
    None
    Threat Actors: TunaFish
    Victim Country: Turkey
    Victim Industry: Technology / SaaS
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged sale of Initial Access to construction company in Colombia via GlobalProtect VPN
    Category: Initial Access
    Content: A threat actor operating under the alias TunaFish is selling enterprise-level VPN access (Palo Alto GlobalProtect) to a Colombian construction company with an estimated revenue of $250M–$500M. The access is claimed to carry Enterprise Admin privileges on a network of approximately 10,000 or more hosts, protected by CrowdStrike Falcon EDR. The seller claims the access was verified within the last 48 hours and has not been shared with other buyers.
    Date: 2026-04-23T22:29:53Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-VPN-GlobalProtect-Construction-Colombia-250M-500M-revenue
    Screenshots:
    None
    Threat Actors: TunaFish
    Victim Country: Colombia
    Victim Industry: Construction
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged Database Leak Posted on Underground Forum
    Category: Data Leak
    Content: A forum post titled BBDD was shared by user juan303 on the AE Leaked Databases forum. No content was available in the post, making it impossible to determine the victim, data type, or scope of the alleged leak. Further investigation is required to assess the nature and validity of this threat.
    Date: 2026-04-23T22:11:44Z
    Network: openweb
    Published URL: https://altenens.is/threads/bbdd.2928884/unread
    Screenshots:
    None
    Threat Actors: juan303
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged leak of Italian credential combolist
    Category: Data Leak
    Content: A threat actor operating under the alias aliladz213 has made available a combolist purportedly containing 1 million Italian email and password combinations on the forum AE – Combo List. The post claims the credential list is suitable for a wide range of credential stuffing or account takeover activities. No specific victim organization or source has been identified.
    Date: 2026-04-23T22:10:55Z
    Network: openweb
    Published URL: https://altenens.is/threads/starcheck-mark-button1m-italy-combolist-good-for-everythingcheck-mark-buttonstar.2928874/unread
    Screenshots:
    None
    Threat Actors: aliladz213
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged sale of compromised database access and webmail credentials across multiple countries
    Category: Data Breach
    Content: Threat actor mu is advertising fresh database access spanning UK, Germany, Japan, Netherlands, Brazil, Poland, Spain, US, Italy and other countries. Claims to have valid inbox access to ntlworld webmails and a private cloud infrastructure. Specifically targeting e-commerce platforms (eBay, Amazon, Walmart, Mercari, Kleinanzeigen), payment services (Neosurf), booking platforms (Booking.com), ride-sharing (Uber), and gaming services (PSN). Offering to search for specific keywords and check availability upon request.
    Date: 2026-04-23T21:44:14Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68392
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy
    Victim Industry: E-commerce, Payment Services, Ride-sharing, Gaming, Webmail
    Victim Organization: Unknown
    Victim Site: ntlworld.com, ebay.com, amazon.com, walmart.com, uber.com, booking.com, psn.playstation.com, mercari.com, kleinanzeigen.de, alibaba.com, poshmark.com, offerup.com, neosurf.com
  15. Alleged leak of Polish email and password credentials
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 485,000 email and password credential pairs associated with Polish users. The post is dated April 23, 2026, and is described as fresh and high quality. The content is distributed via a hidden download link and promoted through a Telegram channel (@elite_cloud1).
    Date: 2026-04-23T21:36:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-485-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Poland-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Alleged leak of Philippine email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 172,000 email and password credential pairs allegedly sourced from Philippines-based accounts. The list is described as fresh and high quality, and is shared via a hidden download link on the forum. The actor also promotes a Telegram channel (t.me/elite_cloud1) for additional credential logs.
    Date: 2026-04-23T21:36:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-172-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Philippines-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Philippines
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged leak of Peruvian email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 126,000 email and password pairs allegedly sourced from Peru. The credential list is described as fresh and high quality and is shared as hidden content on the forum. The actor also promotes additional credential logs via a Telegram channel linked to Elite_Cloud1.
    Date: 2026-04-23T21:36:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-126-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Peru-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Peru
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged leak of Portugal credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has shared a combolist of approximately 75,000 email and password credential pairs associated with Portugal. The list is described as fresh and high quality and is made available via a hidden download link on DemonForums, with additional content promoted through a Telegram channel (@elite_cloud1).
    Date: 2026-04-23T21:35:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-75-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Portugal-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged leak of Pakistani email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Elite_Cloud1 has shared a combolist of approximately 46,000 email address and password combinations associated with Pakistani users. The credential list is described as fresh and high quality, and has been made available via a hidden content gate on the forum. The actor also promotes additional credential logs through a Telegram channel.
    Date: 2026-04-23T21:35:40Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-46-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Pakistan-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias D4rkNetHub has shared what is claimed to be a combolist containing 1,172 Hotmail credentials on the cracking forum CrackingX. The content is gated behind registration or sign-in, suggesting it is available to forum members as a free release. The post is dated April 26, 2023.
    Date: 2026-04-23T21:35:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73055/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  21. Alleged leak of Norwegian credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 21,000 email and password pairs associated with Norwegian users. The list is described as fresh and high quality, suggesting recently obtained or validated credentials. The post directs users to a Telegram channel (@elite_cloud1) for additional credential logs.
    Date: 2026-04-23T21:35:19Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-21-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Norway-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Norway
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Alleged leak of Yahoo credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 1.28 million lines of alleged Yahoo credentials on the cracking forum CrackingX. The data, labeled as valid leaks for 2026, was shared via a Mega.nz link as a free download. The post suggests the combolist contains email and password combinations associated with Yahoo accounts.
    Date: 2026-04-23T21:35:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73056/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  23. Alleged leak of Nigerian email credential combolist
    Category: Combo List
    Content: A threat actor known as thejackal101 has made available a combolist of approximately 16,000+ email and password credential pairs allegedly sourced from Nigeria. The list is described as fresh and high quality and is being distributed via a hidden content link on the forum. The actor promotes additional credential content through a Telegram channel at t.me/elite_cloud1.
    Date: 2026-04-23T21:34:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-16-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Nigeria-%E2%9C%AA-23-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Nigeria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged leak of Outlook and Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias karaokecloud has made available a combolist containing 1,852 credential pairs targeting Outlook and Hotmail email accounts. The list was shared for free download on a cracking forum. The credentials may be used for account takeover or further exploitation.
    Date: 2026-04-23T21:34:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73057/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: outlook.com
  25. Alleged leak of full logs shared on underground forum
    Category: Data Leak
    Content: A threat actor operating under the alias WhiteMelly shared a post on the AE – Leaked Databases forum titled 1.2GB FULL LOGS, suggesting the availability of approximately 1.2GB of log data. No further details regarding the victim, data type, or content were available in the post. The nature and origin of the logs remain unknown.
    Date: 2026-04-23T21:32:38Z
    Network: openweb
    Published URL: https://altenens.is/threads/1-2gb-full-logs.2928836/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged leak of Hotmail credential combolist
    Category: Data Leak
    Content: A threat actor operating under the alias WhiteMelly has made available a combolist containing approximately 20,000 Hotmail email credential pairs on the AE forum. The post is categorized as Mail Access, suggesting the credentials provide direct email account access. No pricing information was provided, indicating the combolist was shared freely.
    Date: 2026-04-23T21:31:45Z
    Network: openweb
    Published URL: https://altenens.is/threads/20k-hotmail-lines-mail-access.2928833/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  27. Alleged leak of mixed email access credentials (25,000 lines)
    Category: Data Leak
    Content: A threat actor known as WhiteMelly shared a mixed combolist containing approximately 25,000 lines of email credentials with mail access on the AE forum. The post is described as a free leak of mixed email account credentials. No specific victim organization or country has been identified.
    Date: 2026-04-23T21:31:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/25k-mix-lines-mail-access.2928830/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged leak of school and government email credentials
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has made available a combolist containing approximately 27,300 email credentials associated with school and government domains. The list is described as premium quality, suggesting verified or high-value entries. No specific organizations or countries have been identified from the available information.
    Date: 2026-04-23T21:31:22Z
    Network: openweb
    Published URL: https://altenens.is/threads/fire-27-3k-school-and-govt-mails-premium-rocket-ebbi_cloud.2928835/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Government and Education
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged leak of 16,000 corporate business email credentials
    Category: Data Leak
    Content: A threat actor operating under the handle Ebbicloud has made available a combolist containing approximately 16,000 corporate and business email credentials on the cybercrime forum AlteNens. The post targets company business email accounts, which could be leveraged for business email compromise (BEC), phishing, or unauthorized access to corporate systems. No specific victim organizations or countries were identified in the post.
    Date: 2026-04-23T21:31:11Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-16k-company-business-mails-top-money-bag-ebbi_cloud.2928839/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Multiple Industries
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Alleged leak of gaming account credentials combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has shared a combolist containing approximately 1,900 gaming-related email credentials on the forum AE – Combo List. The post, titled with references to gaming emails, suggests the credentials were made available for free distribution. No specific victim organization or platform has been identified.
    Date: 2026-04-23T21:30:57Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-1-9k-gaming-mails-new-rocket-ebbi_cloud.2928842/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged leak of European email combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud shared a combolist purportedly containing approximately 21,900 email credentials belonging to European users on the forum AE – Combo List. The post is labeled as VIP content, suggesting it may be restricted to privileged forum members. No specific targeted organization or victim site has been identified.
    Date: 2026-04-23T21:30:43Z
    Network: openweb
    Published URL: https://altenens.is/threads/money-bag-21-9k-europe-country-mails-vip-fire-ebbi_cloud.2928847/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Europe
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged leak of European email combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud shared a combolist on the forum AE containing approximately 15,800 email credentials allegedly belonging to European users. The post is titled as premium Europe country mails, suggesting the credentials may be of higher quality or validity. No specific targeted organization or sector has been identified.
    Date: 2026-04-23T21:30:32Z
    Network: openweb
    Published URL: https://altenens.is/threads/rocket-15-8k-europe-country-mails-premium-rocket-ebbi_cloud.2928849/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Europe
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged leak of European email combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud shared a combolist containing approximately 18,900 European email credentials on the forum Altenens. The post, promoted via the Telegram channel @ebbi_cloud, made the credential list freely available. No specific victim organization or source of the data was identified.
    Date: 2026-04-23T21:30:20Z
    Network: openweb
    Published URL: https://altenens.is/threads/gem-stone-18-9k-europe-country-mails-super-fire-ebbi_cloud.2928846/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Europe
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged leak of 19,700 United States email credentials
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has made available a combolist containing approximately 19,700 United States email credentials on the forum AE – Combo List. The post claims the list is 100% valid. No specific targeted organization or service has been identified.
    Date: 2026-04-23T21:30:08Z
    Network: openweb
    Published URL: https://altenens.is/threads/high-voltage-19-7k-usa-america-mails-100-valid-high-voltage-ebbi_cloud.2928853/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged leak of 18,200 USA email combolist
    Category: Data Leak
    Content: A threat actor operating under the handle Ebbicloud shared a combolist containing approximately 18,200 email addresses allegedly belonging to United States-based users on the AE forum. The post was made available for free download or distribution. No specific victim organization or industry was identified.
    Date: 2026-04-23T21:29:57Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-18-2k-usa-america-mails-new-rocket-ebbi_cloud.2928854/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged leak of 16,000 United States email credentials combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has shared what is alleged to be a combolist containing approximately 16,000 email credentials belonging to United States-based users. The post was made on the AE (AlteNens) cybercrime forum and appears to be a free distribution of the credential list. No specific victim organization or source platform has been identified.
    Date: 2026-04-23T21:29:37Z
    Network: openweb
    Published URL: https://altenens.is/threads/money-bag-16k-usa-america-mails-mega-high-voltage-ebbi_cloud.2928857/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Alleged leak of 14,800 USA email combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has shared a combolist containing approximately 14,800 email credentials associated with United States users on the forum AE – Combo List. The post was made available via the actors channel @ebbi_cloud. No specific victim organization or targeted service has been identified.
    Date: 2026-04-23T21:29:25Z
    Network: openweb
    Published URL: https://altenens.is/threads/fire-14-8k-usa-america-mails-new-star-ebbi_cloud.2928860/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged leak of 23,800 United States email credentials
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has made available a combolist containing approximately 23,800 email credentials associated with United States-based users. The post was shared on the AE (AlteNens) forum and promoted via the Telegram channel @ebbi_cloud. No specific victim organization or platform has been identified.
    Date: 2026-04-23T21:29:13Z
    Network: openweb
    Published URL: https://altenens.is/threads/fire-23-8k-usa-america-mails-fresh-gem-stone-ebbi_cloud.2928862/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Alleged leak of 9,200 United States email credentials combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Ebbicloud has made available a combolist containing approximately 9,200 email credentials belonging to United States users. The post was shared on the AE (AlteNens) forum and appears to be a free distribution of the credential list. No specific victim organization or targeted service has been identified.
    Date: 2026-04-23T21:29:01Z
    Network: openweb
    Published URL: https://altenens.is/threads/rocket-9-2k-usa-america-mails-super-rocket-ebbi_cloud.2928863/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged Data Leak of Protemps Singapore Recruitment Database
    Category: Data Leak
    Content: A threat actor has redistributed a database dump allegedly originating from Protemps Singapore, a recruitment firm, originally breached in October 2021. The leaked data includes approximately 49,591 unique records containing names, email addresses, physical addresses, phone numbers, passport numbers, and MD5 hashed passwords. The actor states the repost was made because previous distribution links had expired, and the data was restored from a local backup.
    Date: 2026-04-23T21:12:45Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-REPOST-Protemps-com-sg-Database-Leak-50k-Unique-Emails
    Screenshots:
    None
    Threat Actors: infintyx07
    Victim Country: Singapore
    Victim Industry: Human Resources & Recruitment
    Victim Organization: Protemps Singapore
    Victim Site: protemps.com.sg
  41. Alleged leak of 6 million multi-country credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist containing approximately 6 million credential pairs, allegedly spanning multiple countries including Slovenia, Sweden, Switzerland, and others. The actor promotes free combo distribution via Telegram channels and invites users to contact them directly for additional content. No specific victim organization or targeted service has been identified.
    Date: 2026-04-23T21:04:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73053/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged Sale of Private Database Collection Including SSN, ID Documents, and Financial Records
    Category: Data Breach
    Content: A threat actor operating under the alias jannatmirza11 is advertising a collection of private databases via Telegram, claiming to offer company databases, government-issued document scans (ID cards, drivers licenses, passports), SSN/SIN records, consumer and citizen information, phone and email lists, and credential lists. The actor is directing buyers to contact them via Telegram at @jannat646500. No specific victim organizations or record counts are disclosed in the post.
    Date: 2026-04-23T21:03:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73051/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alleged data breach of ayurveda-best.com.ua – 27k customer orders
    Category: Data Breach
    Content: A database dump from ayurveda-best.com.ua (Ukrainian e-commerce site) containing approximately 27,000 customer orders has been leaked. The dump includes comprehensive customer personal information: names, emails, phone numbers, fax numbers, payment details (cardholder names, addresses, payment methods), shipping addresses, order information, IP addresses, user agents, and timestamps. The data appears to be from an e-commerce platform database.
    Date: 2026-04-23T20:46:06Z
    Network: telegram
    Published URL: https://t.me/KeymousTG/1169
    Screenshots:
    None
    Threat Actors: Keymous
    Victim Country: Ukraine
    Victim Industry: E-commerce/Retail
    Victim Organization: ayurveda-best.com.ua
    Victim Site: ayurveda-best.com.ua
  44. Alleged data breach of ayurveda-best.com – 27k customer orders database dump
    Category: Data Breach
    Content: A database dump allegedly from ayurveda-best.com (Ukrainian e-commerce site) containing approximately 27,000 customer orders has been shared. The dump includes comprehensive PII such as first/last names, emails, telephone numbers, fax, payment information (names, company, addresses, payment methods), shipping addresses, order details, IP addresses, user agents, and timestamps. The data appears to be from an e-commerce platform database.
    Date: 2026-04-23T20:45:32Z
    Network: telegram
    Published URL: https://t.me/c/2588114907/1169
    Screenshots:
    None
    Threat Actors: Keymous
    Victim Country: Ukraine
    Victim Industry: E-commerce/Retail
    Victim Organization: ayurveda-best.com
    Victim Site: ayurveda-best.com
  45. Website Defacement of Tsalka.gr by Dkid03
    Category: Defacement
    Content: On April 24, 2026, the website tsalka.gr was defaced by a threat actor identified as Dkid03, operating without a team affiliation. The attack targeted the wp-content directory, suggesting the victim was running a WordPress-based web presence. The defacement was a singular, non-mass, and non-repeated incident with no disclosed motive or exploit details.
    Date: 2026-04-23T20:43:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912445
    Screenshots:
    None
    Threat Actors: Dkid03
    Victim Country: Greece
    Victim Industry: Unknown
    Victim Organization: Tsalka
    Victim Site: tsalka.gr
  46. Website Defacement of Vakalat Vidya by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: The website vakalatvidya.com was defaced by threat actor EbRaHiM-VaKeR, operating under the group LegioN_LeakeR, on April 24, 2026. The defacement targeted a text file on the domain, suggesting a targeted intrusion rather than a full homepage takeover. The incident has been archived via zone-xsec.com mirror for further analysis.
    Date: 2026-04-23T20:31:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912444
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, LegioN_LeakeR
    Victim Country: India
    Victim Industry: Legal Education
    Victim Organization: Vakalat Vidya
    Victim Site: vakalatvidya.com
  47. Alleged leak of multi-country email and password combolist containing 7.4 million credentials
    Category: Combo List
    Content: A threat actor known as CODER has made available a combolist of approximately 7.4 million email and password combinations spanning multiple countries including India, China, Canada, the United States, Mexico, Brazil, Argentina, the United Kingdom, Germany, France, Italy, Spain, and Portugal. The credentials are being freely distributed via two Telegram channels and can also be requested directly through the actors Telegram handle CODER5544. No specific victim organization or source has been i
    Date: 2026-04-23T20:31:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73049/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Multiple
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Alleged Sale of Fullz, SSN, SIN, NIN, and Financial Leads Across Multiple Countries
    Category: Carding
    Content: A threat actor operating under the Telegram handle @Adamspeek is offering a wide range of stolen personal and financial data for sale, including US Social Security Numbers, Canadian Social Insurance Numbers, UK National Insurance Numbers, credit card dumps, and various demographic lead lists. The offerings span multiple countries and industries including banking, insurance, crypto, and healthcare sectors. Bulk discounts are advertised, suggesting an established data brokering operation targeting
    Date: 2026-04-23T20:29:03Z
    Network: openweb
    Published URL: https://altenens.is/threads/fire-fullz-leads-usa-ssn-canada-sin-uk-nin-data-fire-telegram-bell-_-adamspeek.2928814/unread
    Screenshots:
    None
    Threat Actors: parkeradam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Website Defacement of Krishna Physiotherapy Rehab by EbRaHiM-VaKeR (LegioN_LeakeR)
    Category: Defacement
    Content: The website of Krishna Physiotherapy Rehab was defaced by threat actor EbRaHiM-VaKeR, operating under the group LegioN_LeakeR, on April 24, 2026. The incident was a targeted single-page defacement, not classified as a mass or home page defacement. The attackers motivation and server details remain unknown at this time.
    Date: 2026-04-23T20:25:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912434
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Krishna Physiotherapy Rehab
    Victim Site: krishnaphysiotherapyrehab.com
  50. Website Defacement of Costlay by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: The website costlay.com was defaced by threat actor EbRaHiM-VaKeR, operating under the group LegioN_LeakeR, on April 24, 2026. The incident targeted a specific file path (costlay.com/v.txt) rather than the site homepage, indicating a targeted file-level defacement. No motive, server details, or additional technical indicators were disclosed in connection with this incident.
    Date: 2026-04-23T20:22:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912432
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Costlay
    Victim Site: costlay.com
  51. Alleged leak of IRGC Basij member personal data by pro-Yemeni hacktivist
    Category: Data Leak
    Content: A threat actor operating under the alias ansaralyemen has claimed to leak personal information of IRGC Basij members, citing Iranian oppression of Iranian and Yemeni people as motivation. The actor states they will release data on 47 members daily, including birthdates, birth certificate numbers, national IDs, and names. The data is being made available via a JustPaste.it link and a Telegram channel, with updates promised on a daily basis.
    Date: 2026-04-23T20:11:11Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-IRGC-BASIJ-MEMBERS-DOX–188502
    Screenshots:
    None
    Threat Actors: ansaralyemen
    Victim Country: Iran
    Victim Industry: Government / Military
    Victim Organization: Islamic Revolutionary Guard Corps (IRGC) Basij
    Victim Site: Unknown
  52. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared an alleged combolist of approximately 2,170 fresh Hotmail credential hits dated April 23rd. The post offers access to verified email:password combinations for Hotmail accounts. The content is restricted to registered forum users.
    Date: 2026-04-23T20:02:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73042/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  53. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias MegaCloudShop has shared a combolist of approximately 217 fresh Hotmail email credentials dated April 23rd. The content is hidden behind a registration/login requirement on the forum, suggesting it is available to registered members. The actor promotes an associated store at megacloudshop.top.
    Date: 2026-04-23T20:02:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-217X-Fresh-Hotmail-Hits-23-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  54. Alleged distribution of casino-targeted combolist affecting .com, .fr, and .es domains
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a 5 million entry combolist via Telegram, targeting casino platforms across .com, .fr, and .es domains. The credential lists are being made available for free through Telegram groups and on request. The actor promotes additional free tools and combos through dedicated Telegram channels.
    Date: 2026-04-23T20:02:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73043/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Gambling & Casinos
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged sale of root shell access
    Category: Initial Access
    Content: User claims to have root access and has uploaded a shell, indicating potential sale or distribution of initial access to a compromised system.
    Date: 2026-04-23T19:57:18Z
    Network: telegram
    Published URL: https://t.me/c/3008049195/303
    Screenshots:
    None
    Threat Actors: Mecrobyte
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged data breach of tawjih.tn with threatened database leak
    Category: Data Breach
    Content: Threat actor claims to have hacked https://tawjih.tn/ and threatens to leak the database. No specific details about victim organization, data type, or timeline provided.
    Date: 2026-04-23T19:57:08Z
    Network: telegram
    Published URL: https://t.me/c/3008049195/302
    Screenshots:
    None
    Threat Actors: Mecrobyte
    Victim Country: Tunisia
    Victim Industry: Unknown
    Victim Organization: tawjih.tn
    Victim Site: tawjih.tn
  57. Alleged leak of URL-login-password credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias RandomUpload has made available a combolist containing approximately 314,000 URL-login-password credential pairs on a cracking forum. The post, dated April 26, 2024, requires forum registration to access the hidden download content. No specific victim organization or country has been identified, suggesting the credentials may span multiple sources.
    Date: 2026-04-23T19:38:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73040/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged leak of Asian mix combolist with 11 million credentials
    Category: Combo List
    Content: A threat actor known as CODER has made available an alleged combolist containing 11 million credential pairs described as an Asian mix on the crackingx.com forum. The actor promotes free combo distribution via Telegram channels and groups. No specific victim organization or targeted service has been identified.
    Date: 2026-04-23T19:37:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73041/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged leak of 1,200 Hotmail email credentials
    Category: Logs
    Content: A threat actor operating under the alias MegaCloud has made available a combolist containing approximately 1,200 Hotmail email credentials, described as fresh and high quality, dated April 23. The post requires forum registration to access the download link, suggesting the content is shared within a restricted cybercriminal community. No price is mentioned, indicating the credential list is being distributed for free.
    Date: 2026-04-23T19:33:11Z
    Network: openweb
    Published URL: https://xforums.st/threads/1-2k-hotmail-fresh-mail-access-top-quality-23-04.609386/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  60. Alleged leak of mixed email access credentials (9,060 records)
    Category: Combo List
    Content: A threat actor operating under the alias RandomUpload has made available a mixed combolist containing 9,060 email access credentials on the cracking forum CrackingX. The post is gated behind registration, limiting full visibility into the affected services or regions. The credentials appear to span multiple mail providers, as indicated by the mixed designation in the thread title.
    Date: 2026-04-23T19:12:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73036/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged leak of German shopping-targeted combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 970,434 credential entries via a Mega.nz link. The dataset is described as targeting European, specifically German, shopping platforms. No specific organization or domain has been identified as the source of the credentials.
    Date: 2026-04-23T19:12:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73037/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail & E-Commerce
    Victim Organization: Unknown
    Victim Site: Unknown
  62. Alleged data leak of mixed Polish and international database dump
    Category: Combo List
    Content: A threat actor operating under the alias karaokecloud has made available a mixed database dump on a cybercrime forum, claiming to contain approximately 4,990 records primarily associated with Poland and other unspecified countries. The data is offered as a free download. The nature of the organizations or individuals affected has not been disclosed.
    Date: 2026-04-23T19:12:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73038/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Mass and Repeated Website Defacement of Jernih Creatif by Irene of XmrAnonye.id
    Category: Defacement
    Content: On April 24, 2026, a threat actor known as Irene, affiliated with the group XmrAnonye.id, defaced the website of Jernih Creatif, an Indonesian creative services organization. This incident is classified as both a mass defacement and a redefacement, indicating the target had been previously compromised and was targeted again as part of a broader campaign. The defacement was carried out on a Linux-based server, with a mirror archived at haxor.id.
    Date: 2026-04-23T19:08:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248669
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Indonesia
    Victim Industry: Creative Services / Design
    Victim Organization: Jernih Creatif
    Victim Site: www.jernihcreatif.com
  64. Alleged Data Breach of MM Mega Market Vietnam (mmvietnam.com)
    Category: Data Breach
    Content: A threat actor operating under the alias ijpys has claimed a data breach of mmvietnam.com, the online ordering platform for MM Mega Market Vietnam. The exposed database allegedly contains 98,642 records including customer login names, email addresses, full names, and phone numbers. The data is being made available via a hidden download link on the forum, requiring account upgrade or reply to access.
    Date: 2026-04-23T18:56:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-mmvietnam-com-98-6K
    Screenshots:
    None
    Threat Actors: ijpys
    Victim Country: Vietnam
    Victim Industry: Retail & E-Commerce
    Victim Organization: MM Mega Market Vietnam
    Victim Site: mmvietnam.com
  65. Alleged data breach of 7-Eleven exposing Salesforce PII records
    Category: Data Leak
    Content: A threat actor known as TheFallen has made available an alleged database dump from 7-Eleven, Inc., containing over 600,000 Salesforce records with PII and internal corporate data. The leaked dataset is reported to be over 10.4GB in compressed size. The data is being distributed via Telegram.
    Date: 2026-04-23T18:56:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-2026-7-Eleven-Database
    Screenshots:
    None
    Threat Actors: TheFallen
    Victim Country: United States
    Victim Industry: Retail
    Victim Organization: 7-Eleven
    Victim Site: 7-eleven.com
  66. Alleged Data Breach of CarGurus with 12.4 Million Records Exposed
    Category: Data Leak
    Content: A threat actor known as TheFallen has made available an alleged database dump from CarGurus (cargurus.com) containing over 12.4 million records with personally identifiable information and internal corporate data. The compressed dataset is reported to be over 7.1GB in size. The actor is distributing the data via Telegram.
    Date: 2026-04-23T18:55:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-2026-CARGURUS-database
    Screenshots:
    None
    Threat Actors: TheFallen
    Victim Country: United States
    Victim Industry: Automotive Marketplace
    Victim Organization: CarGurus
    Victim Site: cargurus.com
  67. Alleged leak of mixed email access combolist
    Category: Combo List
    Content: A threat actor operating under the alias StrawHatBase has made available a combolist containing approximately 32,000 email address and password combinations on DemonForums. The post is categorized as a mixed mail access list, suggesting credentials spanning multiple email providers. The content is hidden behind a registration or login requirement, indicating it is restricted to forum members.
    Date: 2026-04-23T18:47:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-32K-GOOD-MAIL-ACCESS-MIX
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged leak of credential combolist targeting multiple countries including Greece
    Category: Combo List
    Content: A threat actor known as CODER is distributing a combolist of approximately 7 million credential pairs, allegedly targeting users from multiple countries including Greece, Guatemala, Hungary, Iran, Ireland, and others. The combolist is being made available for free via Telegram channels and groups. The actor is also promoting additional free combo and tool resources through dedicated Telegram groups.
    Date: 2026-04-23T18:47:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73031/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Alleged leak of Hotmail credentials combolist with 110 hits
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared a combolist allegedly containing 110 verified credential hits for Hotmail accounts. The content is restricted to registered users of the forum. The post is categorized under combolists and dumps, suggesting the credentials are email and password pairs.
    Date: 2026-04-23T18:47:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73032/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  70. Alleged leak of premium mixed credential combolist with inbox targets
    Category: Combo List
    Content: A threat actor on the CX cracking forum has made available a collection of 2,970 alleged premium mixed UHQ (ultra-high quality) credential hits along with a separate list of inboxed email targets. The content was shared as free downloads and appears to consist of combolists and targeted inbox data. No specific victim organization or country has been identified.
    Date: 2026-04-23T18:46:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73034/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged leak of French combolist credentials
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist allegedly containing 7 million credential pairs targeting French users. The combolist is being distributed freely via Telegram channels linked to the actor. No specific victim organization or domain has been identified.
    Date: 2026-04-23T18:46:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73035/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Alleged leak of mixed email credential combolist with inbox targets
    Category: Combo List
    Content: A threat actor operating under the alias He_Cloud on DemonForums has made available a combolist containing approximately 4,259 allegedly fresh and validated email:password credential pairs. The post includes a secondary download for inboxed targets, suggesting the credentials have been verified for inbox access. The credentials appear to be a mixed-source collection with no specific victim organization or country identified.
    Date: 2026-04-23T18:46:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-4259x-HQ-MIX-FRESH-VALIDS-%E2%9A%A1%E2%9A%A1-INBOXES-TARGETS
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Alleged distribution of DynAmite 4.0 modular malware creation toolkit
    Category: Data Leak
    Content: A threat actor operating under the alias CINCH19922 has made available a modular malware creation toolkit called DynAmite 4.0 on the AE cybercrime forum. The toolkit is described as offering pre-configured modules, automated payload generation, and rapid deployment capabilities for creating customizable malware payloads. A Telegram contact is provided for premium tools, and a download link is shared, suggesting free distribution of the toolkit.
    Date: 2026-04-23T18:43:56Z
    Network: openweb
    Published URL: https://altenens.is/threads/dynamite-4-0-malware-creation-toolskithigh-voltage-rapid-deployment-capabilities.2928750/unread
    Screenshots:
    None
    Threat Actors: CINCH19922
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Website Defacement of zxgktl.com by QATAR911
    Category: Defacement
    Content: The threat actor QATAR911 defaced a specific page on zxgktl.com, targeting the URL zxgktl.com/qa123.html on April 24, 2026. The incident was a targeted single-page defacement rather than a mass or home page defacement. Limited technical details are available regarding the server infrastructure or the attackers stated motivation.
    Date: 2026-04-23T18:40:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912431
    Screenshots:
    None
    Threat Actors: QATAR911, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: zxgktl.com
  75. Mass Website Defacement of shop.emjepe.com by Irene of XmrAnonye.id
    Category: Defacement
    Content: On April 24, 2026, a threat actor known as Irene, operating under the group XmrAnonye.id, defaced the e-commerce website shop.emjepe.com. This incident is classified as both a mass defacement and a redefacement, indicating the site had been previously compromised and was targeted again as part of a broader campaign. The defacement was carried out on a Linux-based server, with the compromised page archived at haxor.id.
    Date: 2026-04-23T18:34:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248668
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Unknown
    Victim Industry: E-Commerce / Retail
    Victim Organization: Emjepe Shop
    Victim Site: shop.emjepe.com
  76. Alleged leak of 482 million URL:Login:Password credential lines
    Category: Logs
    Content: A threat actor operating under the alias StarLinkClub has made available a large combolist containing approximately 482.794 million lines in URL:Login:Password format, totaling approximately 27GB in size. The content is gated behind a reply requirement on the forum, suggesting it is being freely distributed rather than sold. The dataset appears to aggregate credentials from multiple sources and is not attributed to any single organization or country.
    Date: 2026-04-23T18:29:31Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-Url-Log-Pass-482-794-044-M%C4%B1ll%C4%B1on-L%C4%B1nes-27gb
    Screenshots:
    None
    Threat Actors: StarLinkClub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  77. Alleged leak of 11.8 million URL:Login:Password credential lines
    Category: Logs
    Content: A threat actor operating under the alias StarLinkClub has shared a combolist containing approximately 11.8 million lines of URL:login:password credentials on a cybercrime forum. The archive is approximately 600MB in size and is made available to forum members who reply to the thread. No specific victim organization or country is identified, suggesting the data is aggregated from multiple sources.
    Date: 2026-04-23T18:29:05Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-Url-Log-Pass-11-887-391-M%C4%B1ll%C4%B1on-L%C4%B1nes-600mb
    Screenshots:
    None
    Threat Actors: StarLinkClub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged leak of 300,000 German credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias IMROG has made available a combolist containing approximately 300,000 credential pairs allegedly associated with German users. The post is hosted on a cybercrime forum and describes the list as fully capped, indicating the credentials have been verified as valid. Access to the content requires forum engagement, suggesting it is being distributed freely to forum members.
    Date: 2026-04-23T18:27:22Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-300k-GERMANY-Good-Fully-Capped-Combolist-ROG-s-KINGDOM
    Screenshots:
    None
    Threat Actors: IMROG
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged leak of 250,000 USA credentials combolist
    Category: Combo List
    Content: A threat actor known as IMROG has shared a combolist containing approximately 250,000 credential pairs purportedly belonging to United States users. The post is hosted on a known cybercrime forum and claims the list is untouched and fresh. The content is gated behind a reply requirement, suggesting it is being distributed freely to forum members.
    Date: 2026-04-23T18:26:59Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-250k-USA-Untouched-Fresh-Valid-Combolist-ROG-s-KINGDOM
    Screenshots:
    None
    Threat Actors: IMROG
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged leak of 130,000 Polish credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias IMROG has shared a combolist containing approximately 130,000 credential pairs allegedly associated with Polish users. The content is made available for free to forum members who reply to the thread. No specific organization or service is identified as the source of the leaked credentials.
    Date: 2026-04-23T18:26:36Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-130k-POLAND-Powerfull-Fresh-Combolist-ROG-s-KINGDOM
    Screenshots:
    None
    Threat Actors: IMROG
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Alleged leak of Microsoft credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias IMROG has made available a combolist purportedly containing approximately 900,000 Microsoft account credentials on a cybercrime forum. The content is hidden behind a reply gate, requiring forum members to reply to the thread in order to access the download. The combolist is described as meaningful and high-quality by the poster.
    Date: 2026-04-23T18:25:58Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-900k-MICROSOFT-Meaningfull-Simply-Best-Combolist-ROG-s-KINGDOM
    Screenshots:
    None
    Threat Actors: IMROG
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: microsoft.com
  82. Alleged leak of French email and password credential list
    Category: Combo List
    Content: A threat actor known as ShroudX has shared an alleged high-quality French email and password combolist on a cybercrime forum. The credentials are made available as hidden content requiring forum engagement to access. The specific origin, affected organization, and record count of the combolist are unknown.
    Date: 2026-04-23T18:25:34Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-FRANCE-EMAILPASS-COMBOLIST-txt–188461
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. Alleged leak of Vietnamese email credentials combolist
    Category: Combo List
    Content: A threat actor known as sxxone shared a combolist containing 57 email:password credential pairs allegedly belonging to Vietnamese users on a cybercrime forum. The content is gated behind a reply requirement, suggesting it is being freely distributed to forum members. The post is titled HQ FRESH 57X MAILPASS VN, indicating the credentials are purportedly high-quality and recently obtained.
    Date: 2026-04-23T18:24:59Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-FRESSH-57X-MAILPASS-VN
    Screenshots:
    None
    Threat Actors: sxxone
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Alleged Sale of Japanese Citizen Database with 80 Million Records
    Category: Data Breach
    Content: A threat actor known as Kim1000P is selling an alleged database containing 80 million Japanese citizen records for $3,000. The dataset includes full names, addresses, phone numbers, email addresses, dates of birth, and Japanese national identification (My Number) card numbers. Escrow is accepted, and sample data provided suggests the records are structured and contain authentic-looking Japanese personal information.
    Date: 2026-04-23T18:23:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Japan-citizen-80m-records
    Screenshots:
    None
    Threat Actors: Kim1000P
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Alleged Data Breach of Bureau of Transportation Statistics (BTS.GOV)
    Category: Data Breach
    Content: A threat actor identified as TheAshborn is selling an alleged database containing approximately 20 million rows of personally identifiable information (PII) purportedly belonging to users of bts.gov, the official website of the U.S. Bureau of Transportation Statistics. The data is being offered for $5,000 worth of cryptocurrency via the Session messaging platform. Proof of the alleged breach has been shared via a Gofile link.
    Date: 2026-04-23T18:22:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-USA-20-000-000-rows-PII-Data-of-BTS-GOV
    Screenshots:
    None
    Threat Actors: TheAshborn
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Bureau of Transportation Statistics
    Victim Site: bts.gov
  86. Alleged Data Breach of Bol.com Exposing 400,000 Belgian Customer Records
    Category: Data Breach
    Content: A threat actor operating under the alias TrueNigger is selling an alleged database dump of 400,000 Bol.com customer records. The dataset reportedly includes extensive personally identifiable information such as customer IDs, full names, email addresses, phone numbers, dates of birth, nationality, and identity numbers, as well as detailed shipping and order data including payment methods, tracking numbers, and delivery statuses. The seller is accepting negotiable pricing and transactions via es
    Date: 2026-04-23T18:21:49Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-400k-Belgium-Bol-com-PII-DataSet-that-includes-username-email-phone
    Screenshots:
    None
    Threat Actors: TrueNigger
    Victim Country: Belgium
    Victim Industry: E-Commerce
    Victim Organization: Bol.com
    Victim Site: bol.com
  87. Alleged Data Breach of Bodyhit Club with Customer and Banking Information
    Category: Data Breach
    Content: A threat actor is selling a database allegedly obtained from Bodyhit Club (bodyhit.fr), a French fitness club operator. The breach reportedly affects 218,542 customers and includes sensitive personal data such as full names, birthdates, email addresses, phone numbers, physical addresses, IBAN numbers, and BIC codes. The data is offered in JSONL format and is attributed to a actor identified as underus.
    Date: 2026-04-23T18:21:23Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-FRENCH-Bodyhit-Club-Database-Leak-218K-Customers-Bank-Info
    Screenshots:
    None
    Threat Actors: undef
    Victim Country: France
    Victim Industry: Fitness & Sports Clubs
    Victim Organization: Bodyhit Club
    Victim Site: bodyhit.fr
  88. Alleged Source Code Leak of Importaciones a México (importacionesamexico.com.mx)
    Category: Data Leak
    Content: A threat actor using the handle ijpys has made available an alleged Git repository source code leak belonging to Importaciones a México, a Mexican import/export company. The leaked data is approximately 730.9MB in size and was posted on April 21, 2026, as a free download requiring forum reply. The actor also promotes the content via a Telegram channel.
    Date: 2026-04-23T18:20:34Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SOURCE-CODE-Importaciones-a-M%C3%A9xico-importacionesamexico-com-mx-Git-Source-Leak
    Screenshots:
    None
    Threat Actors: ijpys
    Victim Country: Mexico
    Victim Industry: Retail / Import & Export
    Victim Organization: Importaciones a México
    Victim Site: importacionesamexico.com.mx
  89. Alleged Data Leak of 1.5 Million US, Canadian, and Mexican Trucking Company Records
    Category: Data Leak
    Content: A threat actor has freely distributed a structured database containing over 1.5 million trucking company records covering the United States, Canada, and Mexico. The dataset includes DOT numbers, legal and DBA names, physical and mailing addresses, telephone numbers, fax numbers, and email addresses. The data appears to originate from regulatory or commercial carrier records and was made available as a 145.4 MB archive via a public file-sharing service.
    Date: 2026-04-23T18:20:07Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-over-one-a-half-million-trucking-companies-US-CA-MX
    Screenshots:
    None
    Threat Actors: OriginalCrazyOldFart
    Victim Country: United States
    Victim Industry: Transportation & Logistics
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged sharing of darknet resource links collection
    Category: Data Leak
    Content: A forum user on PwnForums shared a collection of darknet resource links described as active for 2026. The content is hidden behind a reply gate, requiring users to respond to the thread to access the links. No specific victim, data type, or record count can be determined from the available information.
    Date: 2026-04-23T18:19:44Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DARKNET-RESOURCES-LINKS-2026-alive
    Screenshots:
    None
    Threat Actors: pidoras
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Alleged Data Breach of Laboratoire National Mohammed VI dAnalyses Médicales (LNM6)
    Category: Data Breach
    Content: A threat actor known as kingdataseller claims to have exfiltrated approximately 100 GB of data from LNM6, a national medical analysis laboratory in Morocco backed by the Mohammed VI Foundation for Health and Sciences. The stolen data allegedly includes patient scan results and medical records. A sample of three zipped files has been made available for free, while the remainder of the dataset is being offered for sale.
    Date: 2026-04-23T18:19:20Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-LNM6-%E2%80%94-Laboratoire-National-Mohammed-VI-d-Analyses-M%C3%A9dicales
    Screenshots:
    None
    Threat Actors: kingdataseller
    Victim Country: Morocco
    Victim Industry: Healthcare
    Victim Organization: Laboratoire National Mohammed VI dAnalyses Médicales
    Victim Site: Unknown
  92. Alleged Data Leak of WooWup Customer CSV Files via Public S3 Bucket
    Category: Data Leak
    Content: A threat actor shared a text file containing 9,675 direct download links pointing to CSV files stored in an exposed WooWup AWS S3 bucket (woowup-storage.s3.amazonaws.com). The files, which vary in size, were made freely available via a GoFile link. WooWup is a marketing automation and customer loyalty platform, and the exposed CSVs likely contain customer or campaign data belonging to WooWups business clients.
    Date: 2026-04-23T18:18:56Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-WOO-files-don-t-remember-where-I-got-them-9-675-of-them
    Screenshots:
    None
    Threat Actors: OriginalCrazyOldFart
    Victim Country: Unknown
    Victim Industry: Marketing Technology
    Victim Organization: WooWup
    Victim Site: woowup.com
  93. Alleged Data Leak of Bangladesh Rural Development and Co-operatives Division (RDCD)
    Category: Data Leak
    Content: A threat actor known as kingdataseller has leaked data allegedly belonging to the Bangladesh Rural Development and Co-operatives Division (RDCD). The leaked archive purportedly contains personal information, employee and HR data, organizational roles, project and application details, authentication files, and metadata. The data has been made available as a free download via an external file-sharing link.
    Date: 2026-04-23T18:18:02Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Bangladesh-Rural-Development-and-Co-operatives-Divisionor
    Screenshots:
    None
    Threat Actors: kingdataseller
    Victim Country: Bangladesh
    Victim Industry: Government
    Victim Organization: Bangladesh Rural Development and Co-operatives Division
    Victim Site: rdcd.gov.bd
  94. Alleged Data Breach of Ein Shemer Kibbutz CarLog Vehicle Management System
    Category: Data Breach
    Content: A threat actor known as imaloser claims to have hacked the CarLog vehicle management system used by Ein Shemer Kibbutz in Israel, exfiltrating a database of approximately 771 resident records. The leaked data includes user IDs, full names, budget numbers, mobile phone numbers, CarLog identifiers, billing system IDs, drivers license numbers and types, and license validity dates. Multiple supporting files including car data exports, maintenance reports, and order reports are made available to f
    Date: 2026-04-23T18:17:36Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-IL-Ein-shemer-kibbutz-Seder-Rehev-771
    Screenshots:
    None
    Threat Actors: imaloser
    Victim Country: Israel
    Victim Industry: Agriculture / Residential Community
    Victim Organization: Ein Shemer Kibbutz
    Victim Site: Unknown
  95. Alleged Data Leak of FranceVerif.fr Database
    Category: Data Leak
    Content: A threat actor known as ChimeraZ has leaked a database allegedly belonging to FranceVerif.fr, a French e-commerce trust and coupon verification platform. The leaked data, approximately 25 MB in size and distributed in JSON, JSONL, and CSV formats, contains user feedback records including names, email addresses, IP addresses, browser and OS details, geolocation data, as well as merchant shop records containing business names, addresses, SIRET numbers, phone numbers, emails, and coupon/gift card d
    Date: 2026-04-23T18:17:12Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-35K-FranceVerif-fr
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: E-Commerce / Consumer Services
    Victim Organization: FranceVerif
    Victim Site: franceverif.fr
  96. Alleged Data Leak of French Ministry of Health (sante.gouv.fr) Database
    Category: Data Leak
    Content: A threat actor known as breach3d has allegedly leaked a database belonging to the French Ministry of Health (sante.gouv.fr). The leaked data reportedly includes full names, valid email addresses, and certificate IDs of registered users. The database is being made available for free download on a cybercrime forum by user aggravage.
    Date: 2026-04-23T18:16:38Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FR-sante-gouv-fr-Database
    Screenshots:
    None
    Threat Actors: aggravage
    Victim Country: France
    Victim Industry: Government – Healthcare
    Victim Organization: French Ministry of Health
    Victim Site: sante.gouv.fr
  97. Alleged Data Leak of Atraf Israeli LGBTQ+ Dating Platform Database
    Category: Data Leak
    Content: A database from Atraf, a popular Israeli LGBTQ+ dating and nightlife platform, has been leaked on a hacking forum. The data was originally exfiltrated during a breach of hosting provider CyberServe by the threat actor group Black Shadow in October 2021. The leaked SQLite database contains approximately 700,000 unique user profiles with highly sensitive personal information including usernames, passwords, email addresses, phone numbers, sexual preferences, gender identity, physical attributes, an
    Date: 2026-04-23T18:16:13Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-IL-Atraf-LGBTQ-dating-platform-2021-700k
    Screenshots:
    None
    Threat Actors: imaloser
    Victim Country: Israel
    Victim Industry: Social Networking / Dating
    Victim Organization: Atraf
    Victim Site: atraf.co.il
  98. Alleged Data Leak of card24h.com Database
    Category: Data Leak
    Content: A threat actor claims to have leaked a database from card24h.com, a Thai peer-to-peer payment website. The database was allegedly discovered in April 2026 on a publicly exposed endpoint and contains names, email addresses, bcrypt-hashed passwords, usernames, IP addresses, and wallet history. The data is being made available for free download to forum members.
    Date: 2026-04-23T18:15:48Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Card24h-com-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: enumerate
    Victim Country: Thailand
    Victim Industry: Financial Services
    Victim Organization: Card24h
    Victim Site: card24h.com
  99. Alleged Data Breach of Atraf LGBTQ+ Dating Platform
    Category: Data Breach
    Content: A threat actor operating under the alias imaloser has allegedly made available a database dump from Atraf, an Israeli LGBTQ+ dating platform, containing approximately 700,000 records from 2021. The exposed data is claimed to include personal information of platform users. Given the sensitive nature of the platforms user base, this breach poses significant privacy and safety risks to the individuals affected.
    Date: 2026-04-23T18:13:10Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-IL-Atraf-LGBTQ-dating-platform-2021-700k
    Screenshots:
    None
    Threat Actors: imaloser
    Victim Country: Israel
    Victim Industry: Social Networking / Dating
    Victim Organization: Atraf
    Victim Site: atraf.com
  100. Alleged Data Leak of Card24h.com Database
    Category: Carding
    Content: A threat actor operating under the alias enumerate has allegedly leaked a database belonging to Card24h.com, a carding-related platform, and made it available for free download on a cybercrime forum. The post was shared in the Databases section of the forum, suggesting the leak contains structured data. No further details regarding record count or specific data fields are available.
    Date: 2026-04-23T18:10:57Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Card24h-com-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: enumerate
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Card24h
    Victim Site: card24h.com
  101. Alleged doxing of Pakistan News individual by Farebi Kafir
    Category: Data Leak
    Content: Personal identifying information including name (Shahjahan Masood), Pakistani CNIC number, multiple phone numbers, addresses, email accounts, and social media handles (GitHub, Instagram, Twitter) allegedly disclosed by threat actor Farebi Kafir. Post claims victim is associated with Pakistan News organization.
    Date: 2026-04-23T18:10:07Z
    Network: telegram
    Published URL: https://t.me/c/3814026662/201
    Screenshots:
    None
    Threat Actors: Farebi Kafir
    Victim Country: Pakistan
    Victim Industry: Media/News
    Victim Organization: Pakistan News
    Victim Site: Unknown
  102. Alleged Data Leak of fw-wizard.com Full Database Dump
    Category: Data Leak
    Content: A threat actor operating under the alias ebankastore has shared what is claimed to be a full database dump of fw-wizard.com on the Breached forum. The post references an external link hosted on leaky.info, suggesting the data has been made publicly available for free download. The nature and volume of the leaked data remain unknown without further access to the linked content.
    Date: 2026-04-23T17:52:57Z
    Network: openweb
    Published URL: https://breached.st/threads/db-fw-wizard-com-full-dump.86219/unread
    Screenshots:
    None
    Threat Actors: ebankastore
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: FW Wizard
    Victim Site: fw-wizard.com
  103. Alleged DDoS Attack Service Offering by KillByte Solutions
    Category: Cyber Attack
    Content: KillByte Solutions advertises professional DDoS/CC attack services with claimed capabilities of 470 million requests per second (Layer 7) and 1.2 Tbps (Layer 4). The service offers IoT botnet infrastructure, 2.5 million proxy pool, and geo-targeted attacks. Established in 2024, offering free test attacks and service packages through Telegram contact.
    Date: 2026-04-23T17:50:59Z
    Network: telegram
    Published URL: https://t.me/killbyteiot/15
    Screenshots:
    None
    Threat Actors: KillByte Solutions
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged leak of Cyprus email combolist credentials
    Category: Combo List
    Content: A threat actor known as CODER is distributing a combolist of approximately 11 million email credentials allegedly associated with Cyprus. The actor is sharing the content freely via Telegram channels and groups. Contact details and Telegram links are provided for obtaining the combo and related tools.
    Date: 2026-04-23T17:38:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73010/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Cyprus
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor known as klyne05 shared a mixed email combolist described as private and freshly checked on the crackingx.com forum. The post claims the credentials have been verified and are available for free download. No specific victim organization or record count details were provided in the post.
    Date: 2026-04-23T17:38:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73011/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias KiwiShio has made available a combolist containing 875 Hotmail credentials on the cracking forum CrackingX. The post offers a free download of what is described as fresh, high-quality email credential pairs. The origin and method of collection for these credentials are unknown.
    Date: 2026-04-23T17:37:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73012/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  107. Alleged leak of mixed email access combolist with 79,000 credentials
    Category: Combo List
    Content: A threat actor known as MarkVesto has shared a mixed mail access combolist containing approximately 79,000 email credentials on the crackingx.com forum. The combolist appears to aggregate credentials from various email providers. The content is made available to registered forum users and also promoted via a Telegram channel.
    Date: 2026-04-23T17:37:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73014/
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Alleged leak of Polish credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias karaokecloud has made available a combolist of approximately 6,800 credential pairs allegedly associated with Polish users. The combolist is being offered as a free download on the cracking forum CrackingX. No specific victim organization or service has been identified.
    Date: 2026-04-23T17:37:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73015/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged distribution of large-scale URL-login-password credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias Mustukaral is making available a large-scale URL-login-password (ULP) combolist advertised as 1,300GB in size, with claims of private and fresh updates. The offering includes access to an online search interface to query credentials without downloading files, country-based filtering, and access to historical data. The combolist appears to aggregate credentials from multiple sources and is distributed via the crackingx.com forum.
    Date: 2026-04-23T17:36:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73016/
    Screenshots:
    None
    Threat Actors: Mustukaral
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Alleged leak of mixed email access credentials (combolist)
    Category: Combo List
    Content: A threat actor operating under the alias WashingtonDC has made available a mixed email access combolist on the cracking forum CrackingX. The file, hosted on MediaFire, purportedly contains approximately 35,000 email credentials spanning multiple mail providers. The content was shared freely with no mention of a price or payment.
    Date: 2026-04-23T17:36:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73017/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  111. Alleged Distribution of Cracked zzchecker Account Checking Tool
    Category: Combo List
    Content: A threat actor known as theshitter has shared a cracked version of zzchecker, a paid account checker tool originally cracked by user ttz54. The tool has been made available for free download via Mega.nz. Account checker tools are commonly used to automate credential stuffing attacks and validate stolen credentials at scale.
    Date: 2026-04-23T17:36:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73020/
    Screenshots:
    None
    Threat Actors: theshitter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged leak of Yahoo and Outlook mixed credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a mixed combolist of approximately 6 million email credentials targeting Yahoo and Outlook accounts. The combolist is being distributed freely via Telegram channels and a cracking forum. The actor also promotes additional free combolists and tools through dedicated Telegram groups.
    Date: 2026-04-23T17:35:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73023/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo, Microsoft Outlook
    Victim Site: yahoo.com, outlook.com
  113. Alleged leak of corporate SMTP credentials combolist targeting business users
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 192,342 credential pairs on a cracking forum. The list is described as suitable for SMTP spam operations targeting corporate business accounts. The file is hosted on Mega.nz and distributed freely without any indicated price.
    Date: 2026-04-23T17:35:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73025/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  114. Alleged leak of 6 million social-targeted email combolists (COM/FR/ES)
    Category: Combo List
    Content: A threat actor known as CODER is distributing a combolist of approximately 6 million email credentials targeting social media users across COM, FR, and ES domains. The combolist is being made available via Telegram channels and groups. The actor promotes free combo and program distribution through dedicated Telegram groups.
    Date: 2026-04-23T17:35:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73027/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Alleged Distribution of Gr3eNoX Exploit Scanner V4.2 with Exploit Database Integration
    Category: Initial Access
    Content: A threat actor using the handle CINCH19922 shared a download link for Gr3eNoX Exploit Scanner V4.2, a web vulnerability scanning tool with integrated exploit database capabilities, on the AE – Leaked Databases forum. The tool is advertised as capable of detecting outdated software, misconfigurations, and known vulnerabilities across web applications and servers, supporting automated and multi-target scanning. The post also promotes a Telegram contact for additional premium offensive tools.
    Date: 2026-04-23T17:32:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/gr3enox-exploit-scanner-v4-2-exploit-database-integration.2928748/unread
    Screenshots:
    None
    Threat Actors: CINCH19922
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged leak of mixed credential combolist with 119,000 records
    Category: Logs
    Content: A threat actor known as UniqueCombo has shared a mixed combolist containing approximately 119,000 unique credential pairs on a cybercrime forum focused on mail access and combolists. The list appears to be a compilation of email and password combinations from various sources. No specific victim organization or country has been identified.
    Date: 2026-04-23T17:30:15Z
    Network: openweb
    Published URL: https://xforums.st/threads/mix-unique-combo_5_119000.609373/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of 482 million URL:login:password credential lines
    Category: Data Leak
    Content: A threat actor operating under the alias ebankastore has made available a large combolist containing approximately 482.794 million lines in URL:login:password format, totaling approximately 27GB in size. The dataset appears to be an aggregated credential list compiled from multiple sources, likely harvested via info-stealer malware or credential stuffing operations. The content is being shared via an external link on leaky.info and does not appear to target a single organization or country.
    Date: 2026-04-23T17:25:34Z
    Network: openweb
    Published URL: https://breached.st/threads/url-log-pass-482-794-044-million-lines-27gb.86218/unread
    Screenshots:
    None
    Threat Actors: ebankastore
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Alleged Carding Post on AE Forum
    Category: Carding
    Content: A forum post titled Hello world was made by user bouaicha80 in the Carding – BINs & Other section of the AE forum. The post contains only the Arabic phrase مرحبا بالعالم (meaning Hello World) with no additional threat-relevant content or data disclosed. No specific victim, data type, or carding material could be identified from the post.
    Date: 2026-04-23T17:15:40Z
    Network: openweb
    Published URL: https://altenens.is/threads/hello-world.2928607/unread
    Screenshots:
    None
    Threat Actors: bouaicha80
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Alleged Carding Post Sharing Working BIN for HBO Max
    Category: Carding
    Content: A threat actor on the carding forum Altenens shared an alleged working Bank Identification Number (BIN) for obtaining free or fraudulent access to HBO Max subscriptions. The post is gated behind a reply requirement, concealing the actual BIN details. This activity is consistent with carding operations targeting streaming service subscriptions using stolen or synthetic payment card data.
    Date: 2026-04-23T17:15:13Z
    Network: openweb
    Published URL: https://altenens.is/threads/hbo-max-working-bin.2928632/unread
    Screenshots:
    None
    Threat Actors: L0calh0st
    Victim Country: Unknown
    Victim Industry: Media & Entertainment
    Victim Organization: HBO Max
    Victim Site: hbomax.com
  120. Alleged sharing of darknet forum and resource links for 2026
    Category: Data Leak
    Content: A threat actor on AE forums shared a curated list of darknet and clearnet forum links purportedly active in 2026, including onion sites, resource directories, and social network platforms. The list includes both surface web forums and Tor-based resources such as Dread, link directories, and resource browsers. No specific data breach, victim organization, or sensitive data type is associated with this post.
    Date: 2026-04-23T17:13:43Z
    Network: openweb
    Published URL: https://altenens.is/threads/darknet-forums-2026.2928731/unread
    Screenshots:
    None
    Threat Actors: toomuuch
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Alleged leak of Hotmail credential combolist
    Category: Data Leak
    Content: A threat actor known as alphacloud has made available a combolist of 1,380 alleged Hotmail credentials described as premium hits on a cybercrime forum. The post labels the content as valid and sourced from a private cloud, with mixed email formats. The actor is contactable via Telegram handle alphaaxd, and access to the hidden content requires forum engagement.
    Date: 2026-04-23T17:12:24Z
    Network: openweb
    Published URL: https://altenens.is/threads/snowflakesnowflake-1380x-premium-hotmail-hits-snowflakesnowflake.2928726/unread
    Screenshots:
    None
    Threat Actors: alphacloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  122. Alleged leak of mixed email credentials including Hotmail accounts
    Category: Data Leak
    Content: A threat actor operating under the alias alphacloud has made available a combolist containing 3,788 alleged premium mixed email credential hits, including validated Hotmail accounts. The post is shared via the AE combo list forum and references a Telegram contact alphaaxd for further access. The content is gated behind a reply requirement, suggesting community engagement or distribution control.
    Date: 2026-04-23T17:11:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/high-voltagehigh-voltage-3788x-premium-mix-mail-hitshigh-voltagehigh-voltage.2928727/unread
    Screenshots:
    None
    Threat Actors: alphacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hotmail.com
  123. Alleged leak of Hotmail credential combolist
    Category: Data Leak
    Content: A threat actor using the alias Angiecrax has shared a combolist containing approximately 10,000 Hotmail credentials on the AE forum. The post advertises the list as fresh and UHQ (ultra-high quality), suggesting recently validated email and password combinations. The content is gated behind a reply requirement, a common forum tactic to boost engagement before granting access.
    Date: 2026-04-23T17:11:08Z
    Network: openweb
    Published URL: https://altenens.is/threads/high-voltagehigh-voltage-10k-fresh-uhq-hotmail-combohigh-voltagehigh-voltage.2928730/unread
    Screenshots:
    None
    Threat Actors: Angiecrax
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  124. Alleged leak of Cox.net targeted combolist with 139,000 credentials
    Category: Data Leak
    Content: A threat actor operating under the alias carlos080 has made available a targeted combolist of approximately 139,000 Cox.net email credentials on the AE forum. The post offers a free download of email:password pairs and also advertises the sale of high-quality combolists for multiple email providers and countries via Telegram handle @KOCsupport.
    Date: 2026-04-23T17:10:44Z
    Network: openweb
    Published URL: https://altenens.is/threads/139k-cox-net-targeted-combolist.2928732/unread
    Screenshots:
    None
    Threat Actors: carlos080
    Victim Country: United States
    Victim Industry: Telecommunications
    Victim Organization: Cox Communications
    Victim Site: cox.net
  125. Alleged leak of 39,000 email account credentials (Mail Access Combolist)
    Category: Logs
    Content: A threat actor operating under the alias Cir4Dk has made available a combolist containing approximately 39,000 alleged valid email account credentials on an underground forum. The post is categorized as UHQ (Ultra High Quality), suggesting the credentials have been verified as active. No specific target organization or country has been identified.
    Date: 2026-04-23T17:08:46Z
    Network: openweb
    Published URL: https://xforums.st/threads/39k-uhq-mail-access-valids.609369/
    Screenshots:
    None
    Threat Actors: Cir4Dk
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  126. Alleged Data Leak of Arkansas State Crime Lab Personnel and Court Records
    Category: Data Leak
    Content: A threat actor operating under the alias kittykatkrew claims to have compromised the Arkansas State Crime Lab via its web portal (lasso.crimelab.arkansas.gov) and has publicly leaked exfiltrated data. The leaked data allegedly includes a complete court calendar with case details, defendant information, analyst assignments, and contact information, as well as a full personnel directory containing names, emails, phone numbers, job titles, agency affiliations, and account statuses. Sample records
    Date: 2026-04-23T17:02:51Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-Arkansas-State-Crime-Lab
    Screenshots:
    None
    Threat Actors: kittykatkrew
    Victim Country: United States
    Victim Industry: Government / Law Enforcement
    Victim Organization: Arkansas State Crime Lab
    Victim Site: crimelab.arkansas.gov
  127. Alleged leak of Vidar Stealer logs containing credentials and autofill data from Sweden
    Category: Logs
    Content: A threat actor known as BigTuna has made available approximately 2,500 stealer logs collected via Vidar Stealer, sourced from victims in Sweden running Windows 10 Home (22H2) using Microsoft Edge 120.x. The logs include harvested credentials and autofill data. A free sample was shared via a Tor-hosted link, attributed to SiberianShelves, with full content gated behind account replies or upgrades.
    Date: 2026-04-23T16:59:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-ULP-Vidar-Stealer-2500-logs
    Screenshots:
    None
    Threat Actors: BigTuna
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged sale of initial access to Canadian logistics/shipping company via ASPX webshell
    Category: Initial Access
    Content: A threat actor identified as BigTuna is selling webshell (ASPX) access to an unnamed Canadian logistics and shipping company with an estimated revenue of $250M–$500M and a network of approximately 1,000 hosts. The access is advertised with Server Admin privileges on a system running Kaspersky Endpoint security. The listing was posted on a dark web access market forum.
    Date: 2026-04-23T16:58:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Canada-Logistics-Shipping-sector-Webshell-ASPX
    Screenshots:
    None
    Threat Actors: BigTuna
    Victim Country: Canada
    Victim Industry: Logistics / Shipping
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged Sale of Initial Access to Japanese Aerospace/Defense Organization via RDWeb
    Category: Initial Access
    Content: A threat actor known as BigTuna is selling RDWeb access to an unnamed Japanese aerospace and defense organization with an estimated revenue of $250M–$500M. The access carries Database Administrator (SA) privileges on a network of approximately 50 hosts, with only Windows Defender as endpoint protection. The seller claims the access was verified within the last 48 hours.
    Date: 2026-04-23T16:57:41Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-RDWeb-Aerospace-Defense-Japan-250M-500M-revenue
    Screenshots:
    None
    Threat Actors: BigTuna
    Victim Country: Japan
    Victim Industry: Aerospace / Defense
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged Data Breach of VNIIFTRI: Russian Classified Defense and Scientific Data Offered for Sale
    Category: Data Breach
    Content: A threat actor known as Rhodes is selling approximately 110GB of allegedly stolen data from VNIIFTRI, Russias top precision measurement and defense metrology institute. The dataset reportedly includes classified documents related to GLONASS navigation systems, quantum programs (gravimeters, magnetometers, atomic clocks), military contracts and communications, shell company financial records, and employee personal data including passports and IDs. The data is being offered exclusively for $100
    Date: 2026-04-23T16:56:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Russian-classified-quantum-GLONASS-metrology-submarine-programs-110GB
    Screenshots:
    None
    Threat Actors: Rhodes
    Victim Country: Russia
    Victim Industry: Defense & Scientific Research
    Victim Organization: All-Russian Scientific Research Institute for Physical-Engineering and Radiotechnical Metrology (VNIIFTRI)
    Victim Site: vniiftri.ru
  131. Alleged Data Breach of Haamor.com Thai Medical Education Platform
    Category: Data Breach
    Content: A threat actor known as DarkMafiaX is selling a 350MB SQL database dump allegedly sourced from haamor.com, a Thai health education website. The exposed data includes user records containing usernames, full names in Thai script, email addresses, and hashed passwords using SHA1 and PBKDF2 algorithms. The dataset appears to contain registered user account information dating back to at least 2011-2012.
    Date: 2026-04-23T16:56:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-350-MB-Of-Medical-And-Hospital-Information-For-Haamor-com-Thailand
    Screenshots:
    None
    Threat Actors: DarkMafiaX
    Victim Country: Thailand
    Victim Industry: Healthcare / Medical Education
    Victim Organization: Haamor
    Victim Site: haamor.com
  132. Alleged sale of French personal records database (258,000 records)
    Category: Data Breach
    Content: A threat actor operating under the alias maniac666 is selling a database purportedly containing 258,000 records of French individuals for $100. The dataset includes personally identifiable information such as full name, email, physical address, phone number, gender, and date of birth. The actor is directing interested buyers to contact them via Telegram handles @maniacc666 and @maniacsvault.
    Date: 2026-04-23T16:55:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-France-258k
    Screenshots:
    None
    Threat Actors: maniac666
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Alleged Data Breach of BulkApparel USA (bulkapparel.com)
    Category: Data Breach
    Content: A threat actor operating under the alias ijpys is selling an alleged database dump from BulkApparel, a US-based wholesale blank apparel retailer. The dataset purportedly contains 298,480 records including full names, email addresses, and phone numbers of customers. The seller is offering the data for $300 and can be contacted via Telegram at @ijpys.
    Date: 2026-04-23T16:54:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-bulkapparel-com-BulkApparel-USA
    Screenshots:
    None
    Threat Actors: ijpys
    Victim Country: United States
    Victim Industry: Retail & Wholesale Apparel
    Victim Organization: BulkApparel
    Victim Site: bulkapparel.com
  134. Alleged Sale of WordPress Shell Access for Ransomware Deployment
    Category: Initial Access
    Content: A threat actor operating under the alias antelope is offering shell access to multiple compromised WordPress sites for sale on a dark web forum. The actor explicitly states the access is suitable for ransomware deployment. Interested buyers are directed to contact the seller via the handle @propanolcipher.
    Date: 2026-04-23T16:53:59Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Shell-Access
    Screenshots:
    None
    Threat Actors: antelope
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Alleged data leak of Claro El Salvador with 500GB of sensitive corporate data
    Category: Data Leak
    Content: A threat actor identified as MDGhost666 claims to have breached Claro El Salvador, the countrys largest telecommunications provider, and exfiltrated over 500GB of sensitive data. The leaked data allegedly includes PDF, DOC, XLSX, and DOCX files containing contracts, user data, and internal company information. The actor has made a sample available for download, framing the operation as part of a politically motivated campaign targeting countries with ties to the United States and Israel.
    Date: 2026-04-23T16:53:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Claro-company-500GB
    Screenshots:
    None
    Threat Actors: MDGhost666
    Victim Country: El Salvador
    Victim Industry: Telecommunications
    Victim Organization: Claro El Salvador
    Victim Site: Unknown
  136. Alleged Data Leak of Indonesian Government Legal Documentation Website jdih.halbar.go.id
    Category: Data Leak
    Content: A threat actor operating under the alias RuiixH4xor_ has shared an alleged database dump from jdih.halbar.go.id, the legal documentation website of the Halmahera Barat regional government in Indonesia. The data has been made available for free download on DarkForums and includes files in ZIP format containing CSV, SQLite, and binary file types. The origin and full contents of the database have not been independently verified.
    Date: 2026-04-23T16:52:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Database–74332
    Screenshots:
    None
    Threat Actors: RuiixH4xor_
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: JDIH Halmahera Barat (Halbar Regional Government Legal Documentation Network)
    Victim Site: jdih.halbar.go.id
  137. Alleged Data Leak of jdih.halbar.go.id Indonesian Government Database
    Category: Data Leak
    Content: A threat actor known as RuiixH4xor_ claims to have leaked a database from jdih.halbar.go.id, an Indonesian government legal information portal associated with Halmahera Barat. The data has been made available as a free download in ZIP format containing CSV and BIN files. The post was shared on the dark web forum DarkForums.
    Date: 2026-04-23T16:51:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Ruiixh4x0r
    Screenshots:
    None
    Threat Actors: RuiixH4xor_
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: JDIH Halbar (Halmahera Barat Regional Legal Documentation and Information Network)
    Victim Site: jdih.halbar.go.id
  138. Alleged data leak of Citibanamex customer records by threat actor Jansz
    Category: Data Leak
    Content: A threat actor operating under the alias Jansz and associated with GERSONFDP has freely distributed an alleged database dump containing sensitive personal and financial data belonging to Citibanamex customers in Mexico. The leaked data reportedly includes full names, blood types, ages, phone numbers, family member information, email addresses, geographic location details, payment records, and salary information. The actor cited inaction by Mexican government authorities, including the SEP (S
    Date: 2026-04-23T16:51:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DATA-LEAK-CITIBANAMEX
    Screenshots:
    None
    Threat Actors: Jansz
    Victim Country: Mexico
    Victim Industry: Banking & Financial Services
    Victim Organization: Citibanamex
    Victim Site: citibanamex.com
  139. Alleged Data Breach of LNM6 National Laboratory Mohammed VI with Patient Medical Data for Sale
    Category: Data Breach
    Content: A threat actor operating under the alias anisanas2 claims to have exfiltrated approximately 100 GB of data from LNM6, a national medical analysis laboratory in Morocco backed by the Mohammed VI Foundation for Health and Sciences. The stolen data allegedly includes patient scan results, with three sample zipped files shared freely and the remainder being offered for sale. The actor can be contacted via a Telegram channel (@pka291back) and a designated sales bot (@pka291contact_off_bot).
    Date: 2026-04-23T16:50:30Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-LNM6-National-Laboratory-MOHAMMED-VI-DATA-FILES
    Screenshots:
    None
    Threat Actors: anisanas2
    Victim Country: Morocco
    Victim Industry: Healthcare
    Victim Organization: Laboratoire National Mohammed VI dAnalyses Médicales (LNM6)
    Victim Site: Unknown
  140. Alleged Data Breach of 8891.com.tw Taiwanese Automotive Platform
    Category: Data Breach
    Content: A threat actor operating under the alias ijpys has allegedly made available a database dump from 8891.com.tw, Taiwans largest automotive marketplace platform. The data appears to be shared via a hidden download link on a dark web forum, requiring users to reply or upgrade their account to access the content. The actor also maintains a Telegram channel (t.me/ijpyss), likely used to distribute stolen data or communicate with interested parties.
    Date: 2026-04-23T16:49:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-8891-com-tw-Taiwan
    Screenshots:
    None
    Threat Actors: ijpys
    Victim Country: Taiwan
    Victim Industry: Automotive
    Victim Organization: 8891
    Victim Site: 8891.com.tw
  141. Alleged Data Breach of Chinese Casino/Gambling Website fe36q.shqrhh.vip
    Category: Data Breach
    Content: A threat actor known as alwaysdata is selling a database allegedly obtained from a Chinese online casino and gambling website operating at fe36q.shqrhh.vip. The database reportedly contains 183,000 unique registered user records. The seller is withholding specific data details and requiring private communication via Telegram handle @Caosho to prevent information disclosure prior to sale.
    Date: 2026-04-23T16:49:20Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-fe36q-shqrhh-vip-CHINA-CHINESE-CASINI-GAMBLING-WEBSITE-DATABASE-PREMIUM
    Screenshots:
    None
    Threat Actors: alwaysdata
    Victim Country: China
    Victim Industry: Gambling
    Victim Organization: Unknown
    Victim Site: fe36q.shqrhh.vip
  142. Alleged Data Leak of La Mie Câline Biscarrosse with Admin Panel Access
    Category: Data Leak
    Content: A threat actor operating under the alias SherKhan, affiliated with PoudlardSec, WumpusSec, GoonMarket, and others, has publicly leaked a database dump and admin panel credentials belonging to La Mie Câline Biscarrosse, a French bakery chain location. The leaked data includes cash register records, invoices, quotes, and personal customer information such as names, addresses, phone numbers, and emails, along with admin login credentials. The data was made available as a free download via an exte
    Date: 2026-04-23T16:48:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FR-La-Mie-C%C3%A2line-Biscarrosse-Acces-Admin
    Screenshots:
    None
    Threat Actors: SherKhan
    Victim Country: France
    Victim Industry: Food & Beverage / Bakery
    Victim Organization: La Mie Câline Biscarrosse
    Victim Site: lamiecaline.com
  143. Alleged cyber attack on Turkcell Internet infrastructure by Armenian code group
    Category: Cyber Attack
    Content: A threat actor claiming to represent Armenian code group claims to have hacked the navigation screen of Turkcell Internet touch network and caused a complete system power disconnection. The post indicates this is part of an ongoing campaign against Turkish targets.
    Date: 2026-04-23T16:48:41Z
    Network: telegram
    Published URL: https://t.me/c/3628793212/156
    Screenshots:
    None
    Threat Actors: Armenian code
    Victim Country: Turkey
    Victim Industry: Telecommunications
    Victim Organization: Turkcell
    Victim Site: turkcell.com.tr
  144. Alleged sale of Chinese passport data
    Category: Carding
    Content: A threat actor operating under the alias Mipor is offering a collection of over 1,000 alleged valid Chinese passport records for sale on a dark web forum. The actor is conducting transactions exclusively via the Session encrypted messaging application, refusing contact through Telegram or Tox. Samples are reportedly available upon request through Session.
    Date: 2026-04-23T16:48:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-CHINESE-PASSPORT-1K-PLUS
    Screenshots:
    None
    Threat Actors: Mipor
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  145. Alleged compromise of Turk Telekom management system affecting five divisions
    Category: Cyber Attack
    Content: Threat actor claims to have compromised the operator/management system controlling five independent divisions of Turk Telekom, Turkeys largest telecommunications company. Actor claims operational access and ability to manipulate system controls.
    Date: 2026-04-23T16:47:43Z
    Network: telegram
    Published URL: https://t.me/c/3628793212/155
    Screenshots:
    None
    Threat Actors: Armenian code
    Victim Country: Turkey
    Victim Industry: Telecommunications
    Victim Organization: Turk Telekom
    Victim Site: turktelecom.com.tr
  146. Alleged Data Leak of French Government ANTS Platform by Threat Actor breach3d
    Category: Data Leak
    Content: Threat actor breach3d claims to have obtained 600 million lines of data from the French governments ANTS (Agence Nationale des Titres Sécurisés) platform, which handles secure identity documents including drivers licenses and passports. The leaked data allegedly includes plaintext passwords, API keys, encryption keys, source code, metadata, database contents, and links to identity documents (ID cards and passports) in XML format. The actor states the data is being made available freely, citi
    Date: 2026-04-23T16:47:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FR-ANTS-Part-2
    Screenshots:
    None
    Threat Actors: breach3d
    Victim Country: France
    Victim Industry: Government
    Victim Organization: Agence Nationale des Titres Sécurisés (ANTS)
    Victim Site: ants.gouv.fr
  147. Alleged Data Leak of Iraq Citizenship & Foreigners Database from Agency of Intelligence & Federal Investigation
    Category: Data Leak
    Content: A threat actor operating under the alias xorcat has leaked an alleged SQL database purportedly obtained from Iraqs Agency of Intelligence & Federal Investigation, dated August 2022. The database contains approximately 22.3 million records including full names, family details, physical addresses, national IDs, salary information, employment records, and case data for Iraqi citizens and foreigners. The data has been made available for free download via a Telegram channel, contingent on forum ac
    Date: 2026-04-23T16:47:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-IRAQ-LEAKED-22-356-634-RECORDS-%E2%80%93-NATIONAL-ID-SALARY-FAMILY
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Agency of Intelligence & Federal Investigation
    Victim Site: Unknown
  148. Alleged Data Leak of Iraq Citizenship and Foreigners Database from Agency of Intelligence and Federal Investigation
    Category: Data Leak
    Content: A threat actor known as xorcat has made available an alleged SQL database dump purportedly obtained from Iraqs Agency of Intelligence and Federal Investigation, dated August 2022. The leak contains approximately 22.3 million records including full names, family details, physical addresses, national IDs, salaries, spouse information, employment data, and case records. The database is being distributed via a Telegram channel with download access gated behind forum engagement or account upgrades
    Date: 2026-04-23T16:44:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-IRAQ-LEAKED-22-356-634-RECORDS-%E2%80%93-NATIONAL-ID-SALARY-FAMILY
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Agency of Intelligence & Federal Investigation
    Victim Site: Unknown
  149. Alleged Data Leak of Iraq Citizenship and Foreigners Database from Agency of Intelligence & Federal Investigation
    Category: Data Leak
    Content: A threat actor known as xorcat has made available an alleged SQL database dump purportedly obtained from Iraqs Agency of Intelligence & Federal Investigation, dated August 2022. The dataset contains approximately 22.3 million records exposing sensitive personal information including full names, family details, physical addresses, national IDs, salary information, employment data, and case records. The data is being distributed freely via Telegram, requiring only a forum reply or account upgra
    Date: 2026-04-23T16:41:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-IRAQ-LEAKED-22-356-634-RECORDS-%E2%80%93-NATIONAL-ID-SALARY-FAMILY
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Agency of Intelligence & Federal Investigation
    Victim Site: Unknown
  150. Alleged Data Leak of French Government ANTS Platform by Threat Actor breach3d
    Category: Data Leak
    Content: Threat actor breach3d claims to have obtained 600 million lines of data from the French governments ANTS (Agence Nationale des Titres Sécurisés) platform, which manages secure identity documents including drivers licenses and passports. The leaked data reportedly includes logs, plaintext passwords, API keys, encryption keys, source code, metadata, database contents, and links to identity documents in XML format. The actor states the data is not for sale and is motivated by political pressure
    Date: 2026-04-23T16:37:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FR-ANTS-Part-2
    Screenshots:
    None
    Threat Actors: breach3d
    Victim Country: France
    Victim Industry: Government
    Victim Organization: Agence Nationale des Titres Sécurisés (ANTS)
    Victim Site: ants.gouv.fr
  151. Alleged Data Leak of Iraq Citizenship and Foreigners Database from Agency of Intelligence and Federal Investigation
    Category: Data Leak
    Content: A threat actor operating under the alias xorcat has made available an alleged SQL database dump attributed to Iraqs Agency of Intelligence and Federal Investigation, dated August 2022. The leak reportedly contains over 22 million records including full names, family details, physical addresses, national IDs, salaries, employment information, and case records for Iraqi citizens and foreigners. The data is being distributed via a Telegram channel and the actors personal website.
    Date: 2026-04-23T16:34:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-IRAQ-LEAKED-22-356-634-RECORDS-%E2%80%93-NATIONAL-ID-SALARY-FAMILY
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Agency of Intelligence & Federal Investigation
    Victim Site: Unknown
  152. Alleged sale of fresh database credentials and webmail access across multiple countries
    Category: Combo List
    Content: Threat actor mu is offering fresh database credentials and valid webmail access across multiple countries (UK, DE, JP, NL, BR, PL, ES, US, IT) with inbox access. Specifically targeting e-commerce and service platforms including eBay, Offerup, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Seller claims to own a private cloud with ntlworld valid webmails and requests DMs for specific keyword searches.
    Date: 2026-04-23T16:30:01Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68257
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: Unknown
    Victim Industry: E-commerce, Financial Services, Gaming, Travel
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Alleged leak of Iraq Citizenship & Foreigners Database from Agency of Intelligence & Federal Investigation
    Category: Data Breach
    Content: A SQL database containing 22,356,634 records from Iraqs Agency of Intelligence & Federal Investigation (dated August 2022) has been leaked. The database includes citizenship and foreigner records and was shared in the xorcat~files channel.
    Date: 2026-04-23T16:18:05Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3065
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: Iraq
    Victim Industry: Government/Intelligence
    Victim Organization: Agency of Intelligence & Federal Investigation
    Victim Site: Unknown
  154. Website Defacement of Akoma Online Architecture Platform by MR.N43TXPLOIT of BekasiRootSec
    Category: Defacement
    Content: On April 23, 2026, threat actor MR.N43TXPLOIT operating under the group BekasiRootSec defaced the website hosted at architect.akoma.online, a platform associated with architectural services. The attack targeted a Linux-based web server and was recorded as a singular, non-mass defacement. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-04-23T16:15:05Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248648
    Screenshots:
    None
    Threat Actors: MR.N43TXPLOIT, BekasiRootSec
    Victim Country: Unknown
    Victim Industry: Architecture / Professional Services
    Victim Organization: Akoma Online
    Victim Site: architect.akoma.online
  155. Mass Website Defacement by MR.N43TXPLOIT of BekasiRootSec targeting backanartist.akoma.online
    Category: Defacement
    Content: On April 23, 2026, threat actor MR.N43TXPLOIT operating under the group BekasiRootSec conducted a mass defacement campaign targeting backanartist.akoma.online, a platform associated with artist support or promotion. The attack targeted a Linux-based web server and was confirmed as part of a broader mass defacement operation. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-04-23T16:12:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248649
    Screenshots:
    None
    Threat Actors: MR.N43TXPLOIT, BekasiRootSec
    Victim Country: Unknown
    Victim Industry: Arts and Entertainment
    Victim Organization: Back An Artist
    Victim Site: backanartist.akoma.online
  156. Mass defacement of backnart.akoma.online by MR.N43TXPLOIT of BekasiRootSec
    Category: Defacement
    Content: On April 23, 2026, the threat actor MR.N43TXPLOIT, operating under the Indonesian hacker group BekasiRootSec, conducted a mass defacement campaign targeting backnart.akoma.online, a Linux-based web server. The attack was part of a broader mass defacement operation, with a mirror of the defaced page archived at haxor.id. No specific motive or vulnerability details were disclosed.
    Date: 2026-04-23T16:10:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248650
    Screenshots:
    None
    Threat Actors: MR.N43TXPLOIT, BekasiRootSec
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: backnart.akoma.online
  157. Alleged leak of mixed email and password combolist
    Category: Combo List
    Content: A threat actor operating under the alias stormtrooper has shared a mixed combolist containing 61,060 email and password credential pairs on DemonForums. The content is gated behind registration or login, and the actor promotes an associated Telegram channel (@BossBrowz) for further distribution. No specific victim organization or targeted service has been identified, suggesting the list is an aggregation from multiple sources.
    Date: 2026-04-23T16:01:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-61-060-Lines-Fresh-Mix-Combolist
    Screenshots:
    None
    Threat Actors: stormtrooper
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Alleged leak of mixed combolist with 61,060 credential lines
    Category: Combo List
    Content: A threat actor operating under the alias Browzchel has shared a mixed combolist containing 61,060 lines of credentials on the CrackingX forum. The combolist is described as fresh and is being made available for free to registered users. The actor also promotes a Telegram channel (@BossBrowz) likely used for further distribution of similar content.
    Date: 2026-04-23T16:01:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73009/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Alleged Data Leak of Pertamina Indonesia Employee Database
    Category: Data Leak
    Content: A threat actor using the handle Xyph0rix has publicly shared what appears to be a structured database dump belonging to Pertamina, Indonesias state-owned oil and gas company. The leaked data includes sensitive personal information of members and employees such as full names, home addresses, phone numbers, dates of birth, employment history, job titles, and family member details including spouse names. The data appears to cover retired and active personnel across multiple Pertamina subsidiarie
    Date: 2026-04-23T15:56:23Z
    Network: openweb
    Published URL: https://breached.st/threads/database-pertamina-indonesia.86217/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Oil & Gas / Energy
    Victim Organization: Pertamina
    Victim Site: pertamina.com
  160. Alleged leak of streaming service combolist with 11 million credentials
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist containing approximately 11 million credential pairs purportedly associated with streaming services. The list is being made available for free via Telegram channels and groups managed by the actor. No specific victim organization or platform has been identified from the available post content.
    Date: 2026-04-23T15:32:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73005/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Streaming / Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged leak of multinational combolist spanning multiple countries
    Category: Combo List
    Content: A threat actor known as CODER is distributing a combolist of approximately 9 million credential pairs covering multiple countries including Afghanistan, Albania, Algeria, Angola, and others. The combolist is being made available for free via Telegram channels and groups operated by the actor. The actor also promotes additional free combo and tool resources through their Telegram presence.
    Date: 2026-04-23T15:31:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73008/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged leak of mixed Hotmail and email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Roronoa044 has made available a combolist containing 1,452 alleged valid email:password credentials described as a UHQ MIX, including Hotmail accounts and private cloud credentials. The content is hidden behind a registration or login requirement on the forum. The actor also references a Telegram contact (@noiraccesss) for further communication.
    Date: 2026-04-23T15:31:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1452-Valid-UHQ-MIX-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged sale of RDP access and compromised email accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to cloud infrastructure providers (Azure, AWS, DigitalOcean) at $200, along with compromised domain email accounts, Gmail, Yahoo accounts, and GitHub student accounts. Service advertised as available for daily/monthly rental with escrow payment option.
    Date: 2026-04-23T15:19:53Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68230
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Alleged leak of mixed credential combolist with 119,000 unique entries
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a mixed combolist containing approximately 119,000 unique credential entries on the cracking forum CrackingX. The post is gated behind registration or sign-in, limiting full visibility into the content. No specific victim organization, industry, or country of origin has been identified.
    Date: 2026-04-23T15:01:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73001/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged leak of Yahoo and Shopping-related credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 1.27 million email:password credential pairs on the cracking forum CrackingX. The list is described as targeting shopping platforms and Yahoo accounts. The combolist is distributed freely via a Mega.nz file-sharing link.
    Date: 2026-04-23T15:00:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73002/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: E-Commerce / Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  166. Alleged leak of email and password combolists targeting multiple Asia-Pacific countries
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available an 8 million record email and password combolist, reportedly containing credentials associated with users from South Korea, North Korea, Vietnam, Thailand, Indonesia, Australia, and New Zealand. The combolist is being distributed freely via Telegram channels and groups managed by the actor. The actor also promotes additional free combolists and tools through associated Telegram channels.
    Date: 2026-04-23T15:00:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73004/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HollowKnight has shared a sample combolist of 730 Hotmail email and password combinations on the DemonForums cybercrime forum. The content is gated behind registration or login, suggesting it is being made available to forum members as a free sample. This post likely serves as a teaser for a larger credential list.
    Date: 2026-04-23T14:59:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-730x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: HollowKnight
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  168. Alleged data leak of Badan Gizi Nasional (BGN) by MrAnomali
    Category: Data Leak
    Content: MrAnomali claims to have leaked data from Badan Gizi Nasional (BGN), an Indonesian national nutrition body. Details shared via provided link.
    Date: 2026-04-23T14:40:51Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/553
    Screenshots:
    None
    Threat Actors: MrAnomali
    Victim Country: Indonesia
    Victim Industry: Government/Health
    Victim Organization: Badan Gizi Nasional (BGN)
    Victim Site: Unknown
  169. Alleged Data Leak of viewbot.ai Order and Streamer Data
    Category: Data Leak
    Content: A threat actor operating under the handle heyocean claims to have accessed viewbot.ai, a view-botting service allegedly used by streamers to artificially inflate viewer counts. The actor has leaked order data from the platform, purportedly exposing the identities of streamers who purchased fake views, including one who was publicly identified after accidentally revealing the site during a live stream. The leaked data has been made available on the AE forum along with an external link containin
    Date: 2026-04-23T14:37:22Z
    Network: openweb
    Published URL: https://altenens.is/threads/viewbot-ai-order-data-leaks-streamer-view-botting-data-leaks.2928718/unread
    Screenshots:
    None
    Threat Actors: heyocean
    Victim Country: Unknown
    Victim Industry: Online Services / Streaming Fraud
    Victim Organization: viewbot.ai
    Victim Site: viewbot.ai
  170. Alleged Distribution of HQ Dorks Generator Tool by CRYP70 on Cracking Forum
    Category: Initial Access
    Content: A threat actor operating under the alias Starip has shared a tool called HQ Dorks Generator by CRYP70 on a cracking forum. The tool is designed to automate the generation of structured search dorks using keyword combinations, INURL filters, and predefined templates, facilitating bulk query generation for search scraping and reconnaissance workflows. The tool is made available as a free download behind a registration wall, with antivirus evasion guidance explicitly provided in the post.
    Date: 2026-04-23T14:30:30Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-HQ-Dorks-Generator-by-CRYP70–201458
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged leak of mixed access combolist with 7,000 credentials
    Category: Combo List
    Content: A threat actor operating under the alias COYTO has made available a mixed access combolist containing approximately 7,000 email and password combinations via a public paste site. The post was shared on DemonForums in the combolists section and offered as a free download. No specific victim organization, industry, or country has been identified.
    Date: 2026-04-23T14:30:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-7K-MIXED-ACCESS
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  172. Alleged leak of multi-country credential combolist (4 million records)
    Category: Combo List
    Content: A threat actor known as CODER is distributing a combolist allegedly containing 4 million credential pairs spanning multiple countries including Italy, Spain, Portugal, Netherlands, Poland, Turkey, Egypt, South Africa, Nigeria, Kenya, and Japan. The combolist is being made available for free via Telegram channels and groups operated by the actor. Users are directed to contact the actor via Telegram handle CODER5544 or join the associated Telegram groups for access.
    Date: 2026-04-23T14:29:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72998/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Multiple
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Alleged leak of WordPress credentials or data via Telegram
    Category: Combo List
    Content: A threat actor operating under the alias zod has shared what is described as WordPress-related content on the CrackingX forum. The post requires registration to view and directs users to a Telegram channel (t.me/zoooddddd) for the password, suggesting the material may contain WordPress credentials or combolists. No specific victim organization, country, or record count has been identified.
    Date: 2026-04-23T14:29:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72999/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Alleged leak of HQ mixed credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias @Steveee36 has shared a combolist described as X1515 HQ Mix on the cracking forum CrackingX. The post offers a free download of what appears to be a high-quality mixed credential list. The specific sources, record count, and targeted organizations associated with this combolist are unknown.
    Date: 2026-04-23T14:29:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73000/
    Screenshots:
    None
    Threat Actors: stevee36
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Alleged website defacement of elindispensable.opennemas.com by Mr.XycanKing
    Category: Defacement
    Content: Threat actor Mr.XycanKing claims to have defaced elindispensable.opennemas.com, providing a URL to the defaced page as proof.
    Date: 2026-04-23T14:27:03Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/550
    Screenshots:
    None
    Threat Actors: Mr.XycanKing
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: elindispensable
    Victim Site: elindispensable.opennemas.com
  176. Alleged cyber attack threats by TheGarudaEye against multiple countries and Israel infrastructure
    Category: Cyber Attack
    Content: TheGarudaEye threat actor publicly announced intentions to target infrastructure of countries listed in the Board of Peace, specifically naming Israel as current target. Group claims previous attacks on Indonesia and demands other countries withdraw from the Board of Peace or face cyber attacks. Threat framed as politically/religiously motivated.
    Date: 2026-04-23T14:26:56Z
    Network: telegram
    Published URL: https://t.me/JohnWickXploit/90
    Screenshots:
    None
    Threat Actors: TheGarudaEye
    Victim Country: Israel
    Victim Industry: Critical Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Website Defacement of PlanilhasVBA by Threat Actor Zod
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias Zod defaced a page on planilhasvba.com.br, a Brazilian website focused on VBA spreadsheet resources. The attack targeted a specific subpage (zod.html) on a Linux-hosted server and was not classified as a mass or home page defacement. The incident was archived via the Haxor.id mirror service.
    Date: 2026-04-23T14:13:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248645
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Brazil
    Victim Industry: Technology / Software
    Victim Organization: PlanilhasVBA
    Victim Site: planilhasvba.com.br
  178. Mass Defacement of Brazilian E-commerce Site by Threat Actor Zod
    Category: Defacement
    Content: Threat actor Zod conducted a mass defacement campaign targeting loja.planilhasvba.com.br, a Brazilian e-commerce platform associated with VBA spreadsheet products. The defacement was carried out on a Linux-based server and is classified as part of a mass defacement operation rather than a targeted single-site attack. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-04-23T14:11:42Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248647
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Brazil
    Victim Industry: E-commerce / Software
    Victim Organization: Planilhas VBA
    Victim Site: loja.planilhasvba.com.br
  179. Mass Defacement of Brazilian Excel/VBA Resources Site by Threat Actor Zod
    Category: Defacement
    Content: Threat actor Zod conducted a mass defacement campaign targeting excel.planilhasvba.com.br, a Brazilian website dedicated to Excel and VBA spreadsheet resources. The defacement was deployed on April 23, 2026, affecting the target hosted on a Linux server. This incident is part of a broader mass defacement operation attributed to the Zod team.
    Date: 2026-04-23T14:09:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248646
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Brazil
    Victim Industry: Technology / Education
    Victim Organization: Planilhas VBA
    Victim Site: excel.planilhasvba.com.br
  180. Alleged Pornhub Credential Cracking Tool Shared on Underground Forum
    Category: Carding
    Content: A threat actor known as Starip has shared a multi-threaded console-based cracking tool called Project Hub by EZ on an underground forum, designed to process and validate Pornhub credential lists at high speed. The tool features adjustable thread counts, real-time console output, and is optimized for bulk credential checking workflows. The post notes the tool may be flagged as malware by antivirus software, suggesting potentially malicious components.
    Date: 2026-04-23T14:03:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Project-Hub-by-EZ-Pornhub-Checker
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Adult Entertainment
    Victim Organization: Pornhub
    Victim Site: pornhub.com
  181. Alleged unauthorized access to Polish compressor station industrial automation system by DDoSia Project
    Category: Cyber Attack
    Content: The DDoSia Project claimed to have gained full unauthorized access to an industrial automation system controlling a compressor station in Poland. According to the post, attackers compromised operator panels, alarm/event logs, equipment settings, actuator control circuits, and heat recovery systems. A complete loss of communication between multiple drives (B2, B4, B5, B6, D7) and the control system was reported, with all actuators forced into manual mode and zero performance. Heat recovery system was disabled. The threat actor claims to maintain control over the system.
    Date: 2026-04-23T14:03:14Z
    Network: telegram
    Published URL: https://t.me/nnm05716english/1806
    Screenshots:
    None
    Threat Actors: DDoSia Project
    Victim Country: Poland
    Victim Industry: Industrial automation / Energy infrastructure
    Victim Organization: Compressor station
    Victim Site: Unknown
  182. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias NotSellerxd has made available a mixed email combolist containing approximately 4,375 credential pairs on the cracking forum CrackingX. The post offers a free download of the combolist, which appears to aggregate credentials from various sources. No specific victim organization or targeted service has been identified.
    Date: 2026-04-23T14:02:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72995/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  183. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias wingoooW has freely shared a combolist containing approximately 7,000 Hotmail email and password combinations on a cybercrime forum. The credential list was made available via an external paste site. The origin of the credentials and whether they have been verified as valid is unknown.
    Date: 2026-04-23T14:02:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-7K-HQ-HOTMAIL–201454
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  184. Alleged leak of German email and password credentials
    Category: Combo List
    Content: A threat actor operating under the alias COYTO has made available a combolist of German email and password credentials on DemonForums. The post, categorized under Combolists, provides a free download link via an external paste site. No specific victim organization or record count has been disclosed.
    Date: 2026-04-23T14:02:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-GERMANY-PRIVATE
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Alleged DDoS-as-a-Service Operation – Goofystress Stresser Platform
    Category: Malware
    Content: Goofystress.st is advertising a DDoS-as-a-Service platform offering Layer 4 (TCP/UDP flood) and Layer 7 (application-layer) attack capabilities. The service claims to deliver 1.5-2 million pps TCP flood and 6-10 million pps UDP flood per concurrent connection, with bypasses for CAPTCHA, cache, and UAM protections. They also advertise game-specific DDoS bypasses for Fortnite, Minecraft, Apex, COD, Roblox, and Battlefield. The platform operates with an auto-payment system and claims 1000-1500 customers with 190-200 monthly active users.
    Date: 2026-04-23T13:41:18Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/94888
    Screenshots:
    None
    Threat Actors: Goofystress
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Alleged unauthorized access to Polish compressor station industrial automation system by DDoSia Project volunteers
    Category: Cyber Attack
    Content: The DDoSia Project claimed to have gained full unauthorized access to an industrial automation system controlling a compressor station in Poland. According to the post, attackers compromised operator panels, alarm/event logs, equipment settings, actuator control circuits, and heat recovery systems. The post reports loss of communication between multiple drive units (B2, B4, B5, B6, D7) and the control system, with all actuators forced into manual mode and zero performance. Heat recovery system disabled. Attackers claim to maintain control over the command interface.
    Date: 2026-04-23T13:32:15Z
    Network: telegram
    Published URL: https://t.me/c/3087552512/1806
    Screenshots:
    None
    Threat Actors: DDoSia Project
    Victim Country: Poland
    Victim Industry: Industrial Automation / Energy Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  187. Alleged leak of mixed mail access credentials
    Category: Combo List
    Content: A threat actor operating under the alias RandomUpload on the cracking forum CrackingX has shared a combolist containing 7,785 mixed mail access credentials. The post is gated behind registration, limiting full visibility into the specific mail providers or regions affected. The data appears to be a collection of email account credentials from various providers.
    Date: 2026-04-23T13:19:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72990/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. Alleged leak of multi-country email and password combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a free combolist of approximately 5 million email and password combinations via Telegram channels. The credential list reportedly includes users from multiple countries including India, China, Canada, the United States, Mexico, Brazil, Argentina, the United Kingdom, Germany, and France. The actor is promoting two Telegram groups offering free combolists and tools.
    Date: 2026-04-23T13:19:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72991/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Multiple
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. Alleged leak of Yahoo email credentials combolist
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared an alleged combolist of Yahoo email credentials in email:password format, dated April 23, 2026. The credential list is described as fresh and suitable for multiple purposes. The content is restricted to registered forum users.
    Date: 2026-04-23T13:18:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72992/
    Screenshots:
    None
    Threat Actors: Kinglukeman
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  190. Alleged sale of domain name prinem.com on cybercrime forum
    Category: Initial Access
    Content: A threat actor operating under the alias Hades_elgh is advertising the sale of the domain name prinem.com on a cybercrime forum. The domain is registered with GoDaddy and expires on February 3, 2027. The seller claims the domain has a clean history and no trademark issues.
    Date: 2026-04-23T13:13:14Z
    Network: openweb
    Published URL: https://breached.st/threads/domain-name-for-sell.86215/unread
    Screenshots:
    None
    Threat Actors: Hades_elgh
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: prinem.com
  191. Alleged defacement of multiple websites by Mr.PIMZZZXploit
    Category: Defacement
    Content: Threat actor claiming responsibility for defacing approximately 16 websites across various domains including hr.ivsoftdesign.com, ristovskiprint.mk.ivsoftdesign.com, blood-donation.sukriya.top, renobtp.lahad.shop, web-order.sukriya.top, chatgptitalia.cc, and others. Post includes hacker signature Hacked By Mr.PIMZZZXploit and references to Babayo Eror System alliance.
    Date: 2026-04-23T13:06:28Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/545
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Alleged leak of mixed platform credential combolist including Netflix, OnlyFans, ChatGPT, Xbox, Sony, Discord, and Facebook
    Category: Data Leak
    Content: A threat actor operating under the alias Larry_Uchiha has shared a mixed-platform combolist on the forum AE – Combo List, containing credential pairs for multiple services including Netflix, OnlyFans, ChatGPT, Xbox, Sony, Discord, and Facebook. The content is gated behind a reply requirement and distributed via Telegram. No price was mentioned, indicating this is a free leak.
    Date: 2026-04-23T13:01:37Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-account-combo-netflix-onlyfans-chatgpt-xbox-sony-discord-facebook-2026-4-20.2928709/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Netflix, OnlyFans, OpenAI, Xbox, Sony, Discord, Facebook
    Victim Site: Unknown
  193. Alleged leak of Hotmail credential combolist targeting multiple regions
    Category: Data Leak
    Content: A threat actor operating under the alias Larry_Uchiha has shared a Hotmail credential combolist on the AE forum containing approximately 3,200 email:password pairs. The combolist reportedly includes accounts from users across the United States, Europe, Asia, and Russia. The content is gated behind a reply requirement and references a Telegram channel for distribution.
    Date: 2026-04-23T13:01:01Z
    Network: openweb
    Published URL: https://altenens.is/threads/3-200x-hotmail-access-combo-usa-europe-asia-russian.2928708/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  194. Alleged leak of mixed email service credentials combolist
    Category: Data Leak
    Content: A threat actor known as Larry_Uchiha shared a mixed email combolist on the AE forum, containing credentials for multiple email services including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live. The combolist was made available for free to forum members who reply to the thread. The actual content is hidden behind a reply gate and references a Telegram channel for distribution.
    Date: 2026-04-23T13:00:22Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-mail-combo-hotmail-outlook-aol-gmx-inbox-icloud-live-2026-4-20.2928711/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  195. Alleged leak of German mixed-target combolist with 276,291 credentials
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing 276,291 credential pairs targeting German users across mixed targets. The combolist was shared freely via a Mega.nz link on the cracking forum CrackingX. The exact services or organizations affected are not specified, as the list is described as mixed-target.
    Date: 2026-04-23T12:54:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72987/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HollowKnight07 has made available a sample combolist containing 1,180 Hotmail credentials on the cracking forum CrackingX. The post offers a free download link, suggesting this is a sample release likely intended to attract attention or establish reputation. The origin and validity of the credentials are unverified.
    Date: 2026-04-23T12:53:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72988/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  197. Alleged leak of mixed credential combolist containing 119,000 records
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a mixed email:password combolist containing approximately 119,000 unique credential pairs on DemonForums. The content is hidden behind a registration or login requirement. The post also advertises a separate shop (unique-combo.shop) offering combolists from various countries on request.
    Date: 2026-04-23T12:32:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-MIX-Unique-Combo-3-119000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a mixed combolist containing approximately 119,000 unique credential pairs on the cracking forum CrackingX. The post is gated behind registration or sign-in, limiting full visibility into the contents. No specific victim organization or industry has been identified, suggesting the list aggregates credentials from multiple sources.
    Date: 2026-04-23T12:32:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72985/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Alleged leak of URL:Login:Password credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias RandomUpload has made available a combolist containing approximately 698,000 records in URL:login:password format on a cracking forum. The post requires registration to access the hidden download content. No specific victim organization or country has been identified, suggesting this may be an aggregated credential list from multiple sources.
    Date: 2026-04-23T12:32:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72986/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Alleged Unauthorized Access to Hospital Ventilation Control System (Geo-Eko BMS) in Poland
    Category: Cyber Attack
    Content: Threat actor claims to have gained unauthorized access to a Geo-Eko BMS hospital building management system controlling ventilation, temperature, and humidity in critical medical areas including surgical units, operating rooms, intensive care units, and emergency departments in Poland. The actor claims full control over system parameters with ability to manipulate or disable ventilation in patient care areas. Post indicates absence of authentication and logging mechanisms. Threat actor identifies as The Z-Pentest Alliance and references hashtags #OpPoland, #FuckEastwood, #FuckRedCircus, and #FreeVictoriaDubranova.
    Date: 2026-04-23T12:19:18Z
    Network: telegram
    Published URL: https://t.me/c/3584758467/808
    Screenshots:
    None
    Threat Actors: The Z-Pentest Alliance
    Victim Country: Poland
    Victim Industry: Healthcare
    Victim Organization: Polish hospital (Geo-Eko BMS system)
    Victim Site: Unknown
  201. Alleged Leak of WordPress Admin Credentials
    Category: Data Leak
    Content: A threat actor operating under the alias popfizz has shared what are claimed to be WordPress administrator login credentials on the cybercrime forum Altenens. The post is gated behind a reply requirement, obscuring the full details of the leaked data. The scope, origin, and volume of the alleged credential list remain unknown.
    Date: 2026-04-23T12:16:51Z
    Network: openweb
    Published URL: https://altenens.is/threads/leak-wordpress-admin-logins.2928693/unread
    Screenshots:
    None
    Threat Actors: popfizz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias FlashCloud2 has shared an alleged Hotmail combolist on a cracking forum, described as UHQ (ultra-high quality) and all valid, suggesting the credentials are active and recently verified. The post is behind a login wall, limiting full visibility into the scope and nature of the data. The combolist likely contains email and password combinations associated with Hotmail accounts.
    Date: 2026-04-23T12:10:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72981/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  203. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor known as klyne05 has made available a combolist of Hotmail credentials on the cracking forum CrackingX. The post claims the credentials are fresh and have been checked, suggesting they are recently verified email and password combinations. No further details regarding record count or origin of the data are provided in the post.
    Date: 2026-04-23T12:09:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72983/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  204. Alleged leak of Gmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has shared an alleged combolist containing approximately 60,000 Gmail credentials on the cracking forum CrackingX. The post is categorized under Combolists & Dumps and is restricted to registered or signed-in forum members. The origin and validity of the credential list have not been verified.
    Date: 2026-04-23T12:09:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72984/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  205. Mass Website Defacement by EbRaHiM-VaKeR of LegioN_LeakeR Team
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting the website oceanmist.click hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement operation, with the incident archived and mirrored at haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:50:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248636
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ocean Mist
    Victim Site: oceanmist.click
  206. Website Defacement of aetherialpeak.click by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, the website aetherialpeak.click was defaced by threat actor EbRaHiM-VaKeR, operating under the group LegioN_LeakeR. The incident was a targeted single-site defacement with no mass or redefacement indicators. The attack was mirrored and archived via zone-xsec.com.
    Date: 2026-04-23T11:50:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912405
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: aetherialpeak.click
  207. Mass Website Defacement of novatrax.website by EbRaHiM-VaKeR (LegioN_LeakeR)
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram-based group LegioN_LeakeR, conducted a mass defacement campaign targeting novatrax.website hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement operation, with a mirror archived at haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:49:25Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248634
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Novatrax
    Victim Site: novatrax.website
  208. Mass defacement of northgatehorizon.website by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting northgatehorizon.website hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement operation, with the altered content archived at haxor.id. No specific motivation was publicly disclosed.
    Date: 2026-04-23T11:48:43Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248633
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Northgate Horizon
    Victim Site: northgatehorizon.website
  209. Mass Defacement Campaign by EbRaHiM-VaKeR (LegioN_LeakeR) Targeting maplestoneridge.click
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement attack against maplestoneridge.click, a Linux-hosted website. The defacement was confirmed as part of a broader mass defacement campaign, with the compromised page archived at haxor.id. No specific motivation or additional server details were disclosed.
    Date: 2026-04-23T11:48:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248631
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Maple Stone Ridge
    Victim Site: maplestoneridge.click
  210. Mass Website Defacement by EbRaHiM-VaKeR of LegioN_LeakeR Team
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting stratosnova.click hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement operation, with the incident archived and mirrored at haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:47:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248641
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Stratos Nova
    Victim Site: stratosnova.click
  211. Mass defacement of skyforgehorizon.click by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram-based group LegioN_LeakeR, conducted a mass defacement campaign targeting skyforgehorizon.click hosted on a Linux server. The defacement was confirmed as part of a mass operation and archived via haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:47:09Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248640
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Skyforge Horizon
    Victim Site: skyforgehorizon.click
  212. Alleged Sale of Compromised SMTP Services for Spam Campaigns
    Category: Initial Access
    Content: A threat actor operating under the handle office_365shop is selling compromised SMTP accounts across multiple reputable email service providers including AWS, Sendgrid, SMTP2GO, Mailjet, and others. The actor claims the accounts guarantee 100% inbox delivery, indicating they are sourced from legitimate, trusted sending infrastructure. Buyers are directed to contact the seller via Telegram at @office_365shop for purchases.
    Date: 2026-04-23T11:46:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Buy-Fresh-Well-Reputed-SMTPs-For-Spamming-100-Inbox
    Screenshots:
    None
    Threat Actors: office_365shop
    Victim Country: Unknown
    Victim Industry: Email and Cloud Services
    Victim Organization: AWS Amazon, Sendgrid, SMTP2GO, Mailjet, Elastic Email, SparkPost, Gmobb, Nifty, Plala, Rentalserver, Heteml, Commufa.jp
    Victim Site: Unknown
  213. Mass Website Defacement by EbRaHiM-VaKeR of LegioN_LeakeR Telegram Group
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting zymeraedge.website hosted on a Linux server. The defacement was part of a broader mass defacement operation, with the defaced content archived at haxor.id. No specific motivation or reason was disclosed for the attack.
    Date: 2026-04-23T11:46:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248643
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zymera Edge
    Victim Site: zymeraedge.website
  214. Alleged leak of mixed email access combolist containing 27,000 credentials
    Category: Combo List
    Content: A threat actor operating under the alias MegaCloudshop has shared a combolist of approximately 27,000 alleged valid email credentials on a cybercrime forum. The post, dated April 23rd, describes the content as a full valid mail access mix, suggesting active and verified email account access. The actor promotes their store at megacloudshop.top, indicating this may serve as a promotional sample for their shop.
    Date: 2026-04-23T11:46:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-27K-Full-Valid-Mail-Access-Mix-Just-valid-Data-23-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  215. Mass Website Defacement by EbRaHiM-VaKeR of LegioN_LeakeR targeting nebulacrest.click
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram-based group LegioN_LeakeR, conducted a mass defacement campaign that included the domain nebulacrest.click hosted on a Linux server. The defacement was archived and mirrored at haxor.id, confirming its occurrence. No specific motivation or reason was disclosed for the attack.
    Date: 2026-04-23T11:46:07Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248632
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Nebula Crest
    Victim Site: nebulacrest.click
  216. Alleged leak of 27,000 mixed email account credentials
    Category: Combo List
    Content: A threat actor on a cybercrime forum has made available a combolist of approximately 27,000 validated email account credentials described as a full valid mail access mix. The data is dated April 23rd and claimed to contain only verified, working credentials. The post requires forum registration to access the hidden content.
    Date: 2026-04-23T11:45:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72980/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  217. Mass Defacement Campaign by EbRaHiM-VaKeR of LegioN_LeakeR Targeting lunarisedge.click
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement attack against lunarisedge.click, a Linux-hosted website. The defacement was part of a broader mass defacement campaign, with a mirror of the attack archived at haxor.id. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:45:31Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248630
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Lunaris Edge
    Victim Site: lunarisedge.click
  218. Mass defacement campaign by EbRaHiM-VaKeR of LegioN_LeakeR targeting silverwoodharbor.click
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement attack against silverwoodharbor.click, hosted on a Linux server. The defacement was part of a broader mass defacement campaign rather than an isolated or targeted attack. A mirror of the defaced page has been archived at haxor.id.
    Date: 2026-04-23T11:44:57Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248639
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Silverwood Harbor
    Victim Site: silverwoodharbor.click
  219. Mass Defacement Campaign by EbRaHiM-VaKeR of LegioN_LeakeR Targeting orvaneharbor.website
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement attack against orvaneharbor.website, hosted on a Linux server. The defacement was part of a broader mass defacement campaign, with the compromised page archived at haxor.id. No specific motive or proof-of-concept was publicly disclosed.
    Date: 2026-04-23T11:44:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248637
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Orvaneh Harbor
    Victim Site: orvaneharbor.website
  220. Mass Website Defacement by EbRaHiM-VaKeR of LegioN_LeakeR Team
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting oakhavensummit.click hosted on a Linux server. The defacement was not a re-defacement and did not target the home page, suggesting a broader campaign involving multiple pages or sites. The incident was archived and mirrored on haxor.id.
    Date: 2026-04-23T11:43:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248635
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Oak Haven Summit
    Victim Site: oakhavensummit.click
  221. Mass Defacement Campaign by EbRaHiM-VaKeR of LegioN_LeakeR targeting ironwoodharbor.click
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement attack against ironwoodharbor.click, a Linux-hosted website. The defacement was part of a broader mass defacement campaign and was archived on haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:43:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248629
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ironwood Harbor
    Victim Site: ironwoodharbor.click
  222. Mass Defacement of zyneracreek.website by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting zyneracreek.website hosted on a Linux server. The defacement was not a re-defacement and did not affect the homepage directly. A mirror of the defacement was archived at haxor.id.
    Date: 2026-04-23T11:42:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248644
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zynera Creek
    Victim Site: zyneracreek.website
  223. Mass defacement by EbRaHiM-VaKeR of LegioN_LeakeR targeting trivoraedge.website
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign that included the website trivoraedge.website. The defacement targeted a Linux-based server and was archived via haxor.id. This incident is part of a broader mass defacement operation attributed to the same actor.
    Date: 2026-04-23T11:42:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248642
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Trivora Edge
    Victim Site: trivoraedge.website
  224. Mass defacement by EbRaHiM-VaKeR of LegioN_LeakeR targeting pinecrestharbor.click
    Category: Defacement
    Content: A mass defacement attack was carried out by threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, targeting the website pinecrestharbor.click hosted on a Linux server. The attack, recorded on April 23, 2026, was part of a broader mass defacement campaign rather than an isolated incident. A mirror of the defaced page has been archived at haxor.id.
    Date: 2026-04-23T11:41:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248638
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Real Estate / Hospitality
    Victim Organization: Pinecrest Harbor
    Victim Site: pinecrestharbor.click
  225. Mass Defacement of BlueRock Holdings by EbRaHiM-VaKeR / LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting bluerockholdings.click, a site associated with a holdings or investment entity. The attack was carried out on a Linux-based server and is classified as part of a mass defacement operation rather than a targeted single-site attack. The defacement was archived and mirrored on haxor.id.
    Date: 2026-04-23T11:35:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248625
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Finance / Investment
    Victim Organization: Blue Rock Holdings
    Victim Site: bluerockholdings.click
  226. Mass defacement by EbRaHiM-VaKeR and LegioN_LeakeR team targeting celestialharbor.click
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, operating under the Telegram group LegioN_LeakeR, conducted a mass defacement attack against the website celestialharbor.click hosted on a Linux server. The defacement was confirmed as part of a mass defacement campaign, with a mirror of the defaced content archived at haxor.id. No specific geopolitical motive or targeted industry was identified based on available data.
    Date: 2026-04-23T11:35:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248626
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Celestial Harbor
    Victim Site: celestialharbor.click
  227. Website defacement of aetherialpeak.click by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, defaced the website aetherialpeak.click. The attack targeted a Linux-based server and resulted in a single-page defacement rather than a mass or home page defacement. A mirror of the defaced content was archived at haxor.id.
    Date: 2026-04-23T11:33:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248621
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: aetherialpeak.click
  228. Mass defacement of aurorasummit.click by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: The website aurorasummit.click was defaced by threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, on April 23, 2026. The incident was classified as a mass defacement campaign targeting a Linux-based server. The defacement was mirrored and archived at haxor.id, indicating it was part of a broader coordinated attack campaign.
    Date: 2026-04-23T11:32:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248622
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Aurora Summit
    Victim Site: aurorasummit.click
  229. Mass Web Defacement by EbRaHiM-VaKeR of LegioN_LeakeR targeting averoncrest.website
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, carried out a mass web defacement campaign targeting averoncrest.website hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement operation, with a mirror archived at haxor.id. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:31:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248623
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Averoncrest
    Victim Site: averoncrest.website
  230. Mass Defacement of cloudspireventures.click by EbRaHiM-VaKeR of LegioN_LeakeR
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting cloudspireventures.click, a business ventures website hosted on a Linux server. The defacement was part of a broader mass defacement operation and is archived at haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-04-23T11:31:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248627
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Business Services
    Victim Organization: Cloud Spire Ventures
    Victim Site: cloudspireventures.click
  231. Mass Website Defacement by EbRaHiM-VaKeR of LegioN_LeakeR Team
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN_LeakeR, conducted a mass defacement campaign targeting eclipsera.click hosted on a Linux server. The defacement was part of a broader mass defacement operation, with the attack archived at haxor.id. The attackers motive and victims country of origin remain unconfirmed based on available data.
    Date: 2026-04-23T11:30:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248628
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Eclipsera
    Victim Site: eclipsera.click
  232. Mass Defacement of BluePeak Ventures by EbRaHiM-VaKeR (LegioN LeakeR)
    Category: Defacement
    Content: On April 23, 2026, threat actor EbRaHiM-VaKeR, affiliated with the Telegram group LegioN LeakeR, conducted a mass defacement campaign targeting bluepeakventures.click, a likely venture capital or investment-related website. The attack was carried out on a Linux-based server and is classified as a mass defacement, indicating multiple sites were compromised as part of the same operation. The defacement was archived and mirrored via haxor.id.
    Date: 2026-04-23T11:29:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248624
    Screenshots:
    None
    Threat Actors: EbRaHiM-VaKeR, T.me/LegioN_LeakeR
    Victim Country: Unknown
    Victim Industry: Finance / Venture Capital
    Victim Organization: Blue Peak Ventures
    Victim Site: bluepeakventures.click
  233. Alleged Distribution of Mixed Credential Combolist (8 Million Lines)
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing an alleged 8 million line mixed credential combolist described as UHQ (ultra-high quality) hits via Telegram channels and direct contact. The combolist is being made available for free through Telegram groups at t.me/Combo445544 and t.me/Coder554455. The origin or targeted services of the credentials are not specified in the post.
    Date: 2026-04-23T11:24:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72978/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  234. Alleged document forgery and identity document manipulation service offered by threat actor vasya_rogov
    Category: Carding
    Content: A threat actor operating under the alias vasya_rogov is advertising document forgery and rendering services on the crackingx forum. The service offers custom-made fraudulent document templates at up to 1200 dpi resolution, EXIF metadata removal to eliminate traces of editing, and utilizes computer forensic tools. Contact is facilitated via Telegram handles @vasya_rogov1 and a channel @vasya_rogov12, with a payment-upon-completion model and discounts for bulk clients.
    Date: 2026-04-23T11:24:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72979/
    Screenshots:
    None
    Threat Actors: vasya_rogov
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  235. Alleged solicitation for private United States email account credentials
    Category: Data Breach
    Content: A threat actor operating under the alias jesus13gar1 on the AE combo list forum is actively seeking a provider of highly private email accounts originating from the United States. The actor claims to be willing to pay well for the accounts and directs interested parties to contact them via a Telegram handle. No specific organization, volume, or source has been identified.
    Date: 2026-04-23T11:08:39Z
    Network: openweb
    Published URL: https://altenens.is/threads/need-proveedor-us.2928677/unread
    Screenshots:
    None
    Threat Actors: jesus13gar1
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  236. Alleged free distribution of 7 million corporate email combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist purportedly containing 7 million corporate email credentials via Telegram channels. The combolist is being made available for free through two Telegram groups focused on combo and program sharing. The actor also solicits direct contact via Telegram handle CODER5544 for additional combo requests.
    Date: 2026-04-23T11:02:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72974/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  237. Alleged solicitation for private United States email account credentials
    Category: Combo List
    Content: A threat actor operating under the alias jesus13gar is seeking a provider of highly private email accounts originating from the United States. The actor claims to be willing to pay and directs potential suppliers to contact them via Telegram. No specific organization, volume, or data source has been identified.
    Date: 2026-04-23T11:01:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72975/
    Screenshots:
    None
    Threat Actors: jesus13gar
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  238. Alleged leak of 4,300 Chinese email account credentials
    Category: Logs
    Content: A threat actor known as MegaCloud has shared a combolist of approximately 4,300 allegedly valid Chinese email account credentials on an underground forum. The post, dated April 23rd, offers access to verified mail account logins. No specific email provider or organization has been identified as the source of the credential list.
    Date: 2026-04-23T10:57:53Z
    Network: openweb
    Published URL: https://xforums.st/threads/4-3k-china-full-valid-mail-access-23-04.609350/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  239. Alleged sale of credential combolists and account access across multiple countries
    Category: Combo List
    Content: Threat actors advertising the sale of fresh credential combolists (email:password combinations) and compromised account access for multiple countries (UK, DE, JP, NL, BR, PL, ES, US, IT, etc.). Sellers claim to have access to Hotmail, eBay, Offerup, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, Neosurf, and Reddit accounts. Sellers mention private cloud infrastructure and offer keyword checking services for buyers.
    Date: 2026-04-23T10:39:52Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68117
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: Multiple (United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy, Mexico, Canada, Singapore)
    Victim Industry: Multiple (e-commerce, email, gaming, travel, payment services)
    Victim Organization: Unknown
    Victim Site: Unknown
  240. Alleged sale of 1,500 USA email access credentials
    Category: Combo List
    Content: A threat actor operating under the alias MegaCloudshop is selling a combolist of approximately 1,500 valid email credentials belonging to United States-based users, claimed to be tested and active as of April 23. The listing is posted on DemonForums and directs buyers to an external storefront at megacloudshop.top.
    Date: 2026-04-23T10:36:32Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-5K-USA-Just-Valid-Mail-Access-Top-Quality-23-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  241. Alleged leak of 1,500 valid USA email access credentials
    Category: Combo List
    Content: A threat actor operating under the alias MailAccesss has made available a list of approximately 1,500 valid email access credentials targeting United States-based accounts. The post, shared on the crackingx.com forum, claims the credential list is of top quality and dated April 23. The content is restricted to registered forum users, suggesting it is distributed as a member benefit rather than for explicit sale.
    Date: 2026-04-23T10:36:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72971/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  242. Alleged leak of Yahoo domain credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has freely distributed a combolist containing approximately 825,730 credential pairs targeting Yahoo domain accounts. The combolist was made available via a Mega.nz file sharing link on the crackingx.com forum. No purchase or payment is required to access the leaked credentials.
    Date: 2026-04-23T10:36:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72973/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  243. Alleged SCADA/HMI hijacking of BERMAD CS Ltd water management systems via Modbus protocol attacks
    Category: Cyber Attack
    Content: TheSweetNight and OpsShadowStrike claim to have hijacked BERMAD CS Ltd, an Israeli water flow management and control solutions company. The attack allegedly involved Modbus protocol attacks targeting HMI/SCADA systems. Multiple hacktivist groups and individuals claim collaboration including TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, and others. Post includes political/hacktivist messaging related to Palestine and Iran.
    Date: 2026-04-23T10:27:01Z
    Network: telegram
    Published URL: https://t.me/TheSweetNightPublic/70
    Screenshots:
    None
    Threat Actors: TheSweetNight
    Victim Country: Israel
    Victim Industry: Water Management / Critical Infrastructure
    Victim Organization: BERMAD CS Ltd
    Victim Site: bermad.com
  244. Alleged leak of mixed credential combolist containing 119,000 records
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a mixed combolist containing approximately 119,000 unique credential pairs on the cracking forum CrackingX. The post is behind a login wall, limiting full visibility into the content, origin, or targets of the leaked credentials. The combolist appears to aggregate credentials from multiple sources given its MIX designation.
    Date: 2026-04-23T10:13:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72967/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  245. Alleged leak of mixed email/password combolist with 119,000 credentials
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a mixed combolist containing approximately 119,000 unique email and password credential pairs on DemonForums. The content is hidden behind a registration or login wall, limiting immediate public access. The actor also promotes an external shop (unique-combo.shop) offering combolists targeting multiple countries.
    Date: 2026-04-23T10:13:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-MIX-Unique-Combo-2-119000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  246. Alleged leak of 58,000 German email account credentials
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available a combolist containing approximately 58,000 allegedly valid German email account credentials. The post, dated April 23, describes the content as Full Valid Mail Access, suggesting active and working email account logins. The content is restricted to registered forum users.
    Date: 2026-04-23T10:13:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72968/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  247. Alleged leak of 58,000 German email credentials
    Category: Combo List
    Content: A threat actor operating under the alias MegaCloudshop has made available a combolist containing approximately 58,000 email credentials allegedly belonging to German users. The post is dated April 23rd and claims the credentials are fully valid and provide mail access. The content is hidden behind a registration or login requirement on the forum, and the actor promotes an external store at megacloudshop.top.
    Date: 2026-04-23T10:13:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-58-K-GERMANY-Full-Valid-Mail-Access-23-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  248. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor known as Jelooos is sharing what they claim to be untouched, first-hand private Hotmail credential hits on the cracking forum CX. The post is gated behind registration or sign-in, limiting visibility into the full scope of the leak. The data appears to be a combolist of valid Hotmail account credentials.
    Date: 2026-04-23T10:13:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72969/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  249. Alleged database breach of Bank Syariah Indonesia
    Category: Data Breach
    Content: A user named Xyph0rix has posted on Breachforums regarding a database breach affecting Bank Syariah Indonesia. The breach details are shared via a dedicated thread on the breach forum platform.
    Date: 2026-04-23T10:08:25Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix/190
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Financial Services / Banking
    Victim Organization: Bank Syariah Indonesia
    Victim Site: Unknown
  250. Alleged data breach of Bank Syariah Indonesia
    Category: Data Leak
    Content: A threat actor operating under the alias Xyph0rix has made available an alleged database dump belonging to Bank Syariah Indonesia (BSI). The leaked data includes employee or customer records containing names, IDs, telephone numbers, email addresses, physical addresses, organizational positions, and regional office details. The data is being freely distributed via a download link on the Breached forum.
    Date: 2026-04-23T10:08:19Z
    Network: openweb
    Published URL: https://breached.st/threads/database-bank-syariah-indonesia.86214/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Banking and Financial Services
    Victim Organization: Bank Syariah Indonesia
    Victim Site: bankbsi.co.id
  251. Alleged sale of fresh database credentials across multiple countries
    Category: Combo List
    Content: Threat actor offering fresh database access and credentials across multiple countries (UK, DE, JP, NL, BR, PL, ES, US, IT) with inbox access. Claims to have private cloud infrastructure and valid webmail accounts. Targeting popular platforms including eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Soliciting direct messages for specific requests.
    Date: 2026-04-23T10:05:39Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68104
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy
    Victim Industry: Multiple (e-commerce, gaming, travel, financial services)
    Victim Organization: Unknown
    Victim Site: Unknown
  252. Alleged DDoS-as-a-Service Operation – Goofystress Platform
    Category: Cyber Attack
    Content: Goofystress.st is advertising a DDoS-as-a-Service platform offering Layer 4 (TCP/UDP flood up to 10M pps) and Layer 7 attack capabilities with protection bypasses (CAPTCHA, Cache, UAM). The service claims 3+ years of operation, 1000-1500 customers, and provides auto-payment system for subscription-based access to attack infrastructure targeting gaming platforms (Fortnite, Minecraft, Apex, COD, Roblox, Battlefield).
    Date: 2026-04-23T09:35:24Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/94842
    Screenshots:
    None
    Threat Actors: Goofystress
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: goofystresse.st
  253. Alleged leak of mixed stealer logs combolist by threat actor fatetraffic
    Category: Combo List
    Content: A threat actor operating under the alias fatetraffic has made available a mixed combolist of 2,000 entries sourced from stealer logs, dated April 22, 2026. The credential list was shared for free via a Pixeldrain link with a password provided in the post. No specific victim organization or country has been identified, suggesting the data spans multiple sources.
    Date: 2026-04-23T09:30:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72964/
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  254. Alleged Leak of Hotmail and Office 365 Credential Combolist
    Category: Combo List
    Content: A threat actor known as CODER is distributing a large combolist containing approximately 9.4 million email and password combinations targeting Hotmail (including hotmail.fr and hotmail.es) and Office 365 accounts. The combolist is being made available via Telegram channels and groups operated by the actor. No price is mentioned, suggesting the credentials are being freely shared.
    Date: 2026-04-23T09:30:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72965/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  255. Alleged sale of large-scale URL-login-password credential database with online search access
    Category: Combo List
    Content: A threat actor on CrackingX is offering access to a claimed 1.3TB collection of URL-login-password (ULP) credential logs, described as a private database with historical and continuously updated entries. The offering includes access to an online search tool allowing users to query targets without downloading the full dataset. Users can filter results by country, suggesting a broad multi-national scope of compromised credentials.
    Date: 2026-04-23T09:29:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72966/
    Screenshots:
    None
    Threat Actors: Mustukaral
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  256. Alleged Data Leak of Indonesian Civil Registration (Dukcapil) Database
    Category: Data Leak
    Content: A threat actor operating under the alias Xyph0rix has leaked what is claimed to be a database from Indonesias Directorate General of Civil Registration (Dukcapil). The leaked data includes sensitive personally identifiable information such as full names, National Identity Numbers (NIK), occupation, age, gender, province, residential address, email, and blood type. A download link for the full database has been made available on the forum.
    Date: 2026-04-23T09:24:20Z
    Network: openweb
    Published URL: https://breached.st/threads/database-dukcapil-go-id.86213/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Dukcapil (Direktorat Jenderal Kependudukan dan Pencatatan Sipil)
    Victim Site: dukcapil.go.id
  257. Alleged Threat Actor Group Takeover and Operation 0ktapus Launch
    Category: Cyber Attack
    Content: Threat actors claiming operational control of a breach channel and group, identifying themselves as associated with UNC3944, UNC6040, UNC6395, and UNC6240. They are announcing a new operation called Operation 0ktapus and recruiting members to join their Telegram group.
    Date: 2026-04-23T09:13:14Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7277
    Screenshots:
    None
    Threat Actors: UNC3944
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  258. Alleged data breach of Dukcapil (Indonesian Population Database)
    Category: Data Breach
    Content: A user named Xyph0rix has posted on Breachforums regarding a database breach of Dukcapil (dukcapil.go.id), Indonesias official population and civil registry database. The breach is being discussed in a dedicated thread on the Breachforums platform.
    Date: 2026-04-23T09:09:19Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix/189
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Dukcapil
    Victim Site: dukcapil.go.id
  259. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as alphaxdd has made available a combolist of 1,411 allegedly valid Hotmail credentials on the cracking forum CrackingX. The post describes the credentials as premium hits from a private cloud mix of email accounts. The actor can be contacted via Telegram handle alphaaxd and the content is offered as a free download.
    Date: 2026-04-23T09:06:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72963/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  260. Alleged sale of RDP access to cloud infrastructure and compromised accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to Azure, AWS, and DigitalOcean infrastructure for $200 daily/monthly rates. Also advertising domain email accounts (Gmail, Yahoo), GitHub student accounts, and domain access. Seller claims fresh IPs and limited stock availability, offering escrow services.
    Date: 2026-04-23T09:02:03Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68066
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Technology/Cloud Services
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist allegedly containing 1,773,327 email and password credential pairs associated with Yahoo accounts. The combolist was shared via a Mega.nz download link on the cracking forum CrackingX. The credentials are described as high-quality (HQ) leaks, suggesting they may have been verified or sourced from recent breaches.
    Date: 2026-04-23T08:44:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72961/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  262. Alleged $3.5 Million Theft from Volo DeFi Protocol
    Category: Cyber Attack
    Content: Representatives of the Volo DeFi protocol reported a security breach resulting in the theft of approximately $3.5 million. Project representatives stated they responded immediately to the hack and that user funds are not at risk.
    Date: 2026-04-23T08:39:46Z
    Network: telegram
    Published URL: https://t.me/c/1397463379/11171
    Screenshots:
    None
    Threat Actors: LZT
    Victim Country: Unknown
    Victim Industry: DeFi/Cryptocurrency
    Victim Organization: Volo
    Victim Site: Unknown
  263. Alleged Data Breach of Iraqi Police Personnel Database
    Category: Data Breach
    Content: A threat actor claims to have breached a database belonging to Iraqi police personnel and officials. The leaked database allegedly contains personal information including first name, last name, email, title, start year, and address. The actor also claims to have obtained adult video clips from the breach.
    Date: 2026-04-23T08:37:59Z
    Network: openweb
    Published URL: https://breached.st/threads/police-base-and-officials-in-iraq-2025-have-been-hacked.86212/unread
    Screenshots:
    None
    Threat Actors: karllllllllX
    Victim Country: Iraq
    Victim Industry: Government
    Victim Organization: Iraqi Police
    Victim Site: Unknown
  264. Alleged distribution of SMTP combolists via Telegram channels
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing free SMTP-targeted combolists via Telegram channels. The actor promotes two Telegram groups offering free credential lists and tools. No specific victim organization or record count has been identified.
    Date: 2026-04-23T08:10:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72960/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Alleged leak of multi-platform credential combolist affecting Allegro, Kaufland, Bol.com and others
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist of approximately 11 million email and password combinations targeting users of multiple e-commerce and retail platforms including Allegro, Kaufland, Bol.com, Fnac, ManoMano, Bricomarché, Decathlon, Zalora, The Iconic, and Culture Kings. The combolist is being distributed for free via Telegram channels and a cracking forum. The actor promotes additional free combos and tools through dedicated Telegram groups.
    Date: 2026-04-23T07:41:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72956/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: E-Commerce & Retail
    Victim Organization: Allegro, Kaufland, Bol.com, Fnac, ManoMano, Bricomarché, Decathlon, Zalora, The Iconic, Culture Kings
    Victim Site: allegro.pl, kaufland.de, bol.com, fnac.com, manomano.com, bricomarche.com, decathlon.com, zalora.com, theiconic.com.au, culturekings.com.au
  266. Alleged Carding and Payment Infrastructure Service Advertised on Underground Forum
    Category: Carding
    Content: A threat actor operating under the alias cyberbizbz is advertising Cyberbiz.bz, a payment processing platform on an underground forum catering to high-risk and gray-market online businesses. The service offers ECOM VISA and Mastercard payment acceptance, virtual card issuing, anti-fraud systems, and flexible API integration targeting verticals such as adult content, gaming, VPN services, SMS activation, and loot boxes. The platform appears designed to facilitate payment processing for business
    Date: 2026-04-23T07:40:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72959/
    Screenshots:
    None
    Threat Actors: cyberbizbz
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: cyberbiz.bz
  267. Alleged cyber attack on Polish industrial plant by Shadow ClawZ 404
    Category: Cyber Attack
    Content: Shadow ClawZ 404 claims to have compromised an industrial system in Poland, causing operational disruption with multiple alarms triggered. The group claims responsibility for stopping the industrial plant operations.
    Date: 2026-04-23T07:38:50Z
    Network: telegram
    Published URL: https://t.me/c/3251820623/66
    Screenshots:
    None
    Threat Actors: Shadow ClawZ 404
    Victim Country: Poland
    Victim Industry: Industrial/Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Alleged Data Leak of Indian Ministry of Home Affairs (MHA) Contact Information
    Category: Data Leak
    Content: A threat actor using the alias anon 23 on XF forums allegedly leaked contact information belonging to Indian Ministry of Home Affairs (MHA) personnel, including email addresses, phone numbers, and names. The post was made on the XF Index Database forum. No further details regarding the volume of records or method of acquisition are available.
    Date: 2026-04-23T07:38:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/indian-government-mha-email-phone-name-leak.609344/
    Screenshots:
    None
    Threat Actors: anon 23
    Victim Country: India
    Victim Industry: Government
    Victim Organization: Ministry of Home Affairs (MHA)
    Victim Site: Unknown
  269. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor operating under the alias ValidMail has made available a combolist of approximately 37,000 Hotmail domain credentials, claimed to be valid as of April 26, 2023. The post was shared on the XF forums under the Mail Access & Combolists section. Access to the content requires forum registration.
    Date: 2026-04-23T07:37:04Z
    Network: openweb
    Published URL: https://xforums.st/threads/37k-hotmail-domain-with-valid-23-04-26.609343/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  270. Alleged leak of mixed-domain email credentials combolist
    Category: Logs
    Content: A threat actor operating under the alias ValidMail has made available a combolist containing approximately 146,000 email credentials across mixed domains, dated April 26, 2023. The post is hosted on the XF Mail Access & Combolists forum and claims the entries are valid. No specific victim organization or country is identified, as the list spans multiple domains.
    Date: 2026-04-23T07:36:33Z
    Network: openweb
    Published URL: https://xforums.st/threads/146k-mix-domain-with-valid-23-04-26.609346/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Alleged breach of UAE investor system by MD-Ghost/The BlackH4t with 30GB data theft
    Category: Data Breach
    Content: Threat actor group MD-Ghost (also known as The BlackH4t) claims to have breached the United Arab Emirates investor system and exfiltrated approximately 30GB of sensitive data. The alleged stolen data includes identity documents, visa copies (including Dubai Golden Visa), foreign investor registration information, and financial records.
    Date: 2026-04-23T07:29:50Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21344
    Screenshots:
    None
    Threat Actors: MD-Ghost
    Victim Country: United Arab Emirates
    Victim Industry: Finance/Investment
    Victim Organization: UAE Investor System
    Victim Site: Unknown
  272. Website Defacement of Cartouches Arabais by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a subdirectory of cartouchesarabais.com, a website likely associated with a cartridge or printing supplies retailer. The incident was a targeted, non-mass defacement affecting a specific media path rather than the homepage. No team affiliation, stated motive, or server details were disclosed in relation to this attack.
    Date: 2026-04-23T07:23:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912362
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail / E-commerce
    Victim Organization: Cartouches Arabais
    Victim Site: cartouchesarabais.com
  273. Alleged leak of Norwegian email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has made available a combolist of approximately 21,000 email and password credential pairs allegedly associated with Norwegian users. The list is described as fresh and high quality, and is being distributed via a hidden content link on DemonForums and promoted through a Telegram channel (Maxi_links). No specific victim organization or domain has been identified.
    Date: 2026-04-23T07:13:29Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-21-K-%E2%9C%A6-Norway-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Norway
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  274. Alleged leak of Nigerian email credentials combolist
    Category: Combo List
    Content: A threat actor known as CobraEgy has made available a combolist containing over 16,000 email and password credential pairs allegedly associated with Nigerian users. The list is described as fresh and high quality, and is being distributed for free via the DemonForums platform. The post references a Telegram channel (Maxi_links) for additional combolists.
    Date: 2026-04-23T07:12:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-16-K-%E2%9C%A6-Nigeria-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Nigeria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  275. Alleged leak of mixed email and password combolist
    Category: Combo List
    Content: A threat actor operating under the alias wingoooW has made available a mixed combolist containing approximately 6,000 email and password credential pairs via a free download link on pasteview.com. The post was shared on DemonForums in the combolists section. No specific victim organization or country has been identified, suggesting the credentials may originate from multiple sources.
    Date: 2026-04-23T07:12:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-6K-MIXED-GOODS
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias @Steveee36 has made available a combolist of 722 alleged Hotmail credentials on the cracking forum CrackingX. The post offers a free download of the credential list, described as HQ (high quality), suggesting the credentials may be recently verified or active. No additional details about the datas origin or collection method are provided.
    Date: 2026-04-23T07:11:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72955/
    Screenshots:
    None
    Threat Actors: stevee36
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  277. Alleged phishing SMS kit with spoofed sender IDs for Australia
    Category: Phishing
    Content: Threat actor Youngjn123 advertising bulk SMS phishing service with updated sender IDs impersonating legitimate cryptocurrency and financial services (Crypto.com, Telegram, Coinspot, Binance, Latitude). Offering free test SMS and additional country/sender ID options via direct message.
    Date: 2026-04-23T07:09:47Z
    Network: telegram
    Published URL: https://t.me/YoungJNCrossBulksms0285/2
    Screenshots:
    None
    Threat Actors: Youngjn123
    Victim Country: Australia
    Victim Industry: Financial Services, Cryptocurrency
    Victim Organization: Unknown
    Victim Site: Unknown
  278. Website Defacement of ClickNPay by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the threat actor DimasHxR defaced a web page on clicknpay.com, a payment processing platform, targeting a subdirectory within the sites public media folder. The defacement was a targeted single-page attack, not a mass or home page defacement. No team affiliation, stated motive, or server details were disclosed.
    Date: 2026-04-23T07:00:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912343
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Financial Services / Payment Processing
    Victim Organization: ClickNPay
    Victim Site: clicknpay.com
  279. Alleged Discord Server DDoS/Ban Service Offering
    Category: Cyber Attack
    Content: User @Steiner935 is advertising a service to ban or disrupt Discord servers, including legacy servers. Claims to offer the cheapest and best service in the market for this malicious capability.
    Date: 2026-04-23T06:58:47Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68019
    Screenshots:
    None
    Threat Actors: Steiner935
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  280. Alleged leak of Polish email and password credentials
    Category: Combo List
    Content: A threat actor known as CobraEgy has made available a combolist of approximately 485,000 email and password credential pairs allegedly associated with Polish users. The list is described as fresh and high quality, and was shared freely on the DemonForums cybercrime forum. Additional combolists are promoted via the Telegram channel Maxi_links.
    Date: 2026-04-23T06:44:32Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-485-K-%E2%9C%A6-Poland-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  281. Alleged leak of Philippine email credential combolist
    Category: Combo List
    Content: A threat actor known as CobraEgy has shared a combolist containing approximately 172,000 email and password credential pairs allegedly belonging to Philippine users on the Demon Forums cybercrime forum. The list is described as fresh and high quality. The content is made available for free via hidden content and a Telegram channel linked to Maxi_links.
    Date: 2026-04-23T06:43:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-172-K-%E2%9C%A6-Philippines-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Philippines
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Website Defacement of Stokrat (Ukraine) by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor using the handle DimasHxR defaced a media/customer directory path on the Ukrainian website stokrat.com.ua. The attack was a targeted, non-mass defacement conducted by an individual actor with no affiliated team. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-04-23T06:43:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912288
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ukraine
    Victim Industry: E-commerce / Retail
    Victim Organization: Stokrat
    Victim Site: stokrat.com.ua
  283. Alleged leak of Peruvian email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias CobraEgy has made available a combolist of over 126,000 email and password credential pairs allegedly associated with Peruvian users. The content is described as fresh and high quality, and is being distributed for free on the DemonForums platform. The post references the Telegram channel Maxi_links as a source for additional combolists.
    Date: 2026-04-23T06:43:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-126-K-%E2%9C%A6-Peru-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Peru
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  284. Alleged leak of Portuguese email credential combolist
    Category: Combo List
    Content: A threat actor known as CobraEgy has made available a combolist containing over 75,000 email and password pairs purportedly belonging to Portuguese users. The content is described as fresh and high quality, and is being distributed freely via the DemonForums platform. Additional combolists are promoted through the Telegram channel Maxi_links.
    Date: 2026-04-23T06:42:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-75-K-%E2%9C%A6-Portugal-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  285. Website Defacement of MixMarket by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a media or custom page on mixmarket.market, an e-commerce or marketplace platform. The attacker acted independently without affiliation to a known group or team. The incident was a targeted single-page defacement, not a mass or home page defacement, with details archived at zone-xsec.com.
    Date: 2026-04-23T06:42:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912251
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-Commerce / Marketplace
    Victim Organization: MixMarket
    Victim Site: mixmarket.market
  286. Alleged leak of Pakistani email credentials combolist
    Category: Combo List
    Content: A threat actor known as CobraEgy has shared a combolist containing over 46,000 email and password combinations allegedly associated with Pakistani users on the DemonForums cybercrime forum. The credential list is described as fresh and high quality, and is made available as hidden content requiring forum registration. The post references a Telegram channel (Maxi_links) for additional combolists.
    Date: 2026-04-23T06:42:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-46-K-%E2%9C%A6-Pakistan-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-23-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  287. Alleged leak of credential combolists targeting fashion and e-commerce platforms
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist of approximately 5 million email and password combinations allegedly targeting multiple fashion and e-commerce platforms including ASOS, Grailed, GOAT, Stadium Goods, Vestiaire Collective, The RealReal, Farfetch, eMAG, Ozon, and Cdiscount. The credentials are being distributed for free via Telegram channels and groups associated with the actor. The post does not mention a price, suggesting the combolists are shared f
    Date: 2026-04-23T06:41:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72954/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: E-Commerce / Fashion Retail
    Victim Organization: ASOS, Grailed, GOAT, Stadium Goods, Vestiaire Collective, The RealReal, Farfetch, eMAG, Ozon, Cdiscount
    Victim Site: asos.com, grailed.com, goat.com, stadiumgoods.com, vestiairecollective.com, therealreal.com, farfetch.com, emag.ro, ozon.ru, cdiscount.com
  288. Website Defacement of PLCProduct by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, threat actor DimasHxR defaced a media/customer directory page on plcproduct.com, a website associated with programmable logic controller (PLC) products. The attack was a targeted single-page defacement, not classified as a mass or home page defacement. No specific motive, server details, or team affiliation were disclosed in connection with this incident.
    Date: 2026-04-23T06:41:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912265
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Industrial / Manufacturing (PLC Products)
    Victim Organization: PLC Product
    Victim Site: plcproduct.com
  289. Website Defacement of Clever Möbel by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a media/customer directory path on the German furniture retailer website clever-moebel.de. The incident was a targeted single-site defacement, not part of a mass defacement campaign. No specific motive or proof-of-concept details were disclosed, and server information remains unknown.
    Date: 2026-04-23T06:40:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912320
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Retail / Furniture
    Victim Organization: Clever Möbel
    Victim Site: www.clever-moebel.de
  290. Website Defacement of Tronictoy by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a media/customer directory page on tronictoy.com. The incident was a targeted, single-site defacement with no team affiliation reported. Technical details such as server software and IP address were not disclosed.
    Date: 2026-04-23T06:39:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912297
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail / Toys & Consumer Electronics
    Victim Organization: Tronic Toy
    Victim Site: tronictoy.com
  291. Website Defacement of Pawfect Foods by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a subdirectory of pawfectfoods.in, an Indian pet food company. The defacement targeted a specific media/customer path rather than the homepage, indicating a targeted partial site compromise. No team affiliation, stated motive, or technical details regarding the server environment were disclosed.
    Date: 2026-04-23T06:38:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912262
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: India
    Victim Industry: Pet Food / Retail
    Victim Organization: Pawfect Foods
    Victim Site: pawfectfoods.in
  292. Website Defacement of Wagadootoo by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the South African website wagadootoo.co.za was defaced by a threat actor operating under the alias DimasHxR. The defacement targeted a subdirectory of the site rather than the homepage and was carried out as a solo operation with no affiliated team. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T06:37:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912315
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: South Africa
    Victim Industry: Unknown
    Victim Organization: Wagadootoo
    Victim Site: wagadootoo.co.za
  293. Website Defacement of Swebike by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a page on swebike.se, a Swedish bicycle retail website. The defacement targeted a subdirectory path related to customer address media content. No team affiliation was claimed, and the incident was classified as a single, non-mass, non-home page defacement.
    Date: 2026-04-23T06:36:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912290
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Sweden
    Victim Industry: Retail / E-commerce
    Victim Organization: Swebike
    Victim Site: swebike.se
  294. Website Defacement of Manhattan Portage by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, threat actor DimasHxR defaced a page on manhattanportage.com, a US-based bag and accessories retailer. The attack targeted a subdirectory of the website rather than the homepage and was carried out as a single, non-mass defacement. No specific motive or team affiliation was reported for this incident.
    Date: 2026-04-23T06:35:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912247
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United States
    Victim Industry: Retail / E-Commerce
    Victim Organization: Manhattan Portage
    Victim Site: manhattanportage.com
  295. Website Defacement of Mokca.si by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a publicly accessible media directory on mokca.si, a Slovenian website likely running a Magento-based e-commerce platform, as indicated by the /pub/media/customer_ad path. The defacement was an individual, targeted attack affecting a specific subdirectory rather than the homepage. No team affiliation, stated motive, or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T06:35:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912252
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Slovenia
    Victim Industry: E-Commerce / Retail
    Victim Organization: Mokca
    Victim Site: mokca.si
  296. Website Defacement of Zaafoo by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, threat actor DimasHxR defaced a media/customer address page on zaafoo.com, an e-commerce platform. The attack was a targeted single-page defacement, not part of a mass or home page defacement campaign. No team affiliation, stated motive, or technical server details were disclosed in association with this incident.
    Date: 2026-04-23T06:34:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912321
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce / Retail
    Victim Organization: Zaafoo
    Victim Site: zaafoo.com
  297. Website Defacement of Spa Galaxy by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a subdirectory of spagalaxy.md, a spa and wellness business based in Moldova. The defacement targeted a media/customer upload path rather than the homepage, indicating a targeted file path intrusion. No team affiliation, stated motive, or server details were disclosed.
    Date: 2026-04-23T06:33:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912280
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Moldova
    Victim Industry: Health & Wellness / Beauty
    Victim Organization: Spa Galaxy
    Victim Site: spagalaxy.md
  298. Website Defacement of ktsps.com.my by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a subpath of the Malaysian website ktsps.com.my, targeting its media/customer directory. The attack was carried out as a single, targeted defacement with no team affiliation reported. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-04-23T06:27:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912234
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Malaysia
    Victim Industry: Unknown
    Victim Organization: KTSPS
    Victim Site: ktsps.com.my
  299. Website Defacement of Illuminus Brands by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the handle DimasHxR defaced a media/custom directory page on illumusbrands.com. The attack was not classified as a mass or home defacement, suggesting it targeted a specific sub-page of the site. No team affiliation, stated motive, or technical indicators were attributed to the attacker.
    Date: 2026-04-23T06:26:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912226
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Consumer Brands
    Victim Organization: Illuminus Brands
    Victim Site: illumusbrands.com
  300. Website Defacement of Isles of Scilly Flowers by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a subdirectory of islesofscillyflowers.com, a floral retailer based in the Isles of Scilly, United Kingdom. The incident was a targeted, non-mass defacement affecting a specific page rather than the sites homepage. No team affiliation, stated motive, or technical server details were disclosed.
    Date: 2026-04-23T06:25:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912231
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail / Floriculture
    Victim Organization: Isles of Scilly Flowers
    Victim Site: islesofscillyflowers.com
  301. Website Defacement of Ignyte Active by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a media/custom directory page on ignyteactive.com. The incident was a targeted single-page defacement, not a mass or home page defacement. No team affiliation, motive, or technical server details were disclosed in the available reporting.
    Date: 2026-04-23T06:24:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912225
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United States
    Victim Industry: Health & Fitness / Active Lifestyle
    Victim Organization: Ignyte Active
    Victim Site: ignyteactive.com
  302. Website Defacement of Latintoreriavinoteca by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced the website of La Tintoreria Vinoteca, a Spanish wine bar or restaurant. The attack was a targeted single-site defacement, with the attacker modifying a page within the sites public directory. No team affiliation, stated motive, or additional technical details were disclosed.
    Date: 2026-04-23T06:23:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912235
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Spain
    Victim Industry: Food & Beverage / Hospitality
    Victim Organization: La Tintoreria Vinoteca
    Victim Site: latintoreriavinoteca.es
  303. Website Defacement of Homegrown Cannabis by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker DimasHxR defaced the website homegrowncannabis.de, a German cannabis-related website. The incident was a singular, targeted defacement with no team affiliation reported. Technical details such as server software and attack vector remain unknown.
    Date: 2026-04-23T06:22:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912223
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Cannabis / Retail
    Victim Organization: Homegrown Cannabis
    Victim Site: homegrowncannabis.de
  304. Website Defacement of LOH Motorsport by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the website lohmotorsport.ie, belonging to Irish motorsport organization LOH Motorsport, was defaced by a threat actor operating under the alias DimasHxR. The attack targeted a subdirectory of the sites media path and was carried out as a single, targeted defacement with no team affiliation reported. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T06:21:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912236
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ireland
    Victim Industry: Automotive / Motorsport
    Victim Organization: LOH Motorsport
    Victim Site: lohmotorsport.ie
  305. Website Defacement of First Aid Zone by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the handle DimasHxR defaced a subdirectory of firstaidzone.com, a website associated with first aid services. The attack targeted a specific media/custom path rather than the homepage and was conducted without affiliation to a known hacking group. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-04-23T06:20:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912218
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Healthcare / First Aid Services
    Victim Organization: First Aid Zone
    Victim Site: firstaidzone.com
  306. Alleged sale of RDP access to cloud platforms and email accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to Azure, AWS, and DigitalOcean infrastructure on daily/monthly basis for $200. Also offering domain email accounts (Gmail, Yahoo), domain access, and GitHub student accounts. Advertises fresh RDP with good IP reputation, suitable for inbox operations. Escrow payment method available.
    Date: 2026-04-23T06:20:20Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/68000
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  307. Website Defacement of Iris Made With Love by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a subdirectory of irismadewithlove.com, a small retail or handmade goods website. The attack was a targeted single-page defacement, not classified as a mass or home page defacement. No specific motive, team affiliation, or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T06:19:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912230
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail / E-commerce
    Victim Organization: Iris Made With Love
    Victim Site: irismadewithlove.com
  308. Website Defacement of arpo.software by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a subdomain of arpo.software, targeting a specific media path on the host. The attack was a single targeted defacement, not part of a mass or home page defacement campaign. No team affiliation, motive, or server details were disclosed in connection with this incident.
    Date: 2026-04-23T06:18:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912221
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology/Software
    Victim Organization: Arpo Software
    Victim Site: give-us.arpo.software
  309. Alleged leak of Gmail credential combolist targeting forum users
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has shared an alleged combolist containing approximately 60,000 Gmail credentials on the cracking forum CrackingX. The post is categorized under Combolists & Dumps, suggesting the credentials are being made available to forum members. Full content is restricted to registered or signed-in users.
    Date: 2026-04-23T06:17:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72948/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  310. Alleged leak of Europe and USA combolists
    Category: Combo List
    Content: A threat actor on the CrackingX forum has shared combolists claimed to be of high validity, targeting users from Europe and the United States. The post advertises the credential lists as 100% full valid and high quality. No specific organization, victim count, or pricing information was provided in the post.
    Date: 2026-04-23T06:17:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72949/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Website Defacement of Enola Gaye by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker DimasHxR defaced a media/customer directory page on enolagaye.no, a Norwegian website associated with the Enola Gaye brand known for smoke grenades and pyrotechnic products. The incident was a targeted, single-site defacement with no team affiliation reported and limited technical metadata available.
    Date: 2026-04-23T06:17:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912216
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Norway
    Victim Industry: Retail / Entertainment
    Victim Organization: Enola Gaye
    Victim Site: enolagaye.no
  312. Alleged leak of German mixed domain credential combolist
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available a combolist containing over 1 million lines of credentials associated with mixed German domains. The data was shared as a free download via Mega.nz. The leak appears to aggregate credentials from multiple sources targeting German internet users across various domains.
    Date: 2026-04-23T06:17:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72951/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  313. Alleged leak of phone number and password credential list
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared what is described as a high-quality private combolist containing phone number and password credential pairs. The post does not specify a target organization, country, or record count. No price is mentioned, suggesting the credentials are being made available for free.
    Date: 2026-04-23T06:16:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72952/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Alleged leak of mixed USA and Europe credential combolist
    Category: Data Leak
    Content: A threat actor operating under the alias hangover934 has shared an alleged combolist on the AE forum, containing credential hits purportedly sourced from users in the United States and Europe. The post advertises the list as exclusive and organized by country. No specific organizations, record counts, or pricing details were provided.
    Date: 2026-04-23T05:59:23Z
    Network: openweb
    Published URL: https://altenens.is/threads/starby-countriesstarhits-mix-usastareuropestarexclusive-combolist-star.2928635/unread
    Screenshots:
    None
    Threat Actors: hangover934
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  315. Alleged leak of mixed email:password combolist with 119,000 records
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a mixed combolist containing approximately 119,000 unique email and password pairs on DemonForums. The content is hidden behind a registration or login requirement, suggesting it is available to forum members at no explicit cost. The actor also promotes an external shop (unique-combo.shop) offering combolists for various countries and on-request.
    Date: 2026-04-23T05:53:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-MIX-Unique-Combo-1-119000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  316. Alleged Distribution of Corporate SMTP Combolist (3 Million Records)
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist containing approximately 3 million credential pairs targeting corporate SMTP services via Telegram channels. The actor promotes free access to combo lists and cracking tools through two Telegram groups. The content appears to be gated behind forum registration, with distribution facilitated externally via Telegram.
    Date: 2026-04-23T05:53:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72947/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  317. Alleged cyber attack on German Parliament Speakers mobile device attributed to Russian hackers
    Category: Cyber Attack
    Content: Reports indicate that the mobile phone of Julia Klöckner, Speaker of the German Parliament, was targeted in a cyber attack. According to reports, Russian hackers allegedly gained access to the device through the Signal social network. Additionally, the German Chancellors mobile phone is under security review, suggesting the attack may have broader scope affecting other senior German officials.
    Date: 2026-04-23T05:48:16Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21340
    Screenshots:
    None
    Threat Actors: Russian hackers
    Victim Country: Germany
    Victim Industry: Government
    Victim Organization: German Parliament / German Government
    Victim Site: Unknown
  318. Alleged Data Breach of UAE Investors Platform Exposing 30GB of Investor Data
    Category: Data Breach
    Content: A threat actor identified as MDGhost claims to have compromised a UAE-based investor platform, exfiltrating approximately 30GB of sensitive data. The leaked data allegedly includes personal information of investor members, visa documents including Dubai Golden Visas, financial transaction records, and identity-related documents. The data purportedly covers investors from multiple countries and is being made available with a full sample provided.
    Date: 2026-04-23T05:47:32Z
    Network: openweb
    Published URL: https://breached.st/threads/uae-investors-30gb.86211/unread
    Screenshots:
    None
    Threat Actors: MDGhost
    Victim Country: United Arab Emirates
    Victim Industry: Finance / Investment
    Victim Organization: UAE Investors
    Victim Site: Unknown
  319. Alleged DDoS-as-a-Service (DaaS) Marketing Campaign – Deep Stresser and Goofystress Platforms
    Category: Malware
    Content: Multiple posts advertising two DDoS stresser services: Deep Stresser (deepstresser.su) and Goofystress (goofystresse.st). Both platforms offer Layer 4 and Layer 7 DDoS attack capabilities with advertised throughput of 1.5-2M pps TCP and 6-10M pps UDP. Services include protection bypasses (CAPTCHA, UAM, cache), game-specific bypasses (Fortnite, Minecraft, Apex, COD, Roblox), and auto-payment systems. Deep Stresser is running a promotional giveaway offering service packages and $50 USDT rewards.
    Date: 2026-04-23T05:38:29Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/94800
    Screenshots:
    None
    Threat Actors: Deep Stresser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  320. Website Defacement of MD Materiaux by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a page on the website of MD Materiaux, a French building materials company. The attack targeted a non-homepage media directory path and was carried out as a single, targeted defacement rather than a mass or repeated attack. No specific motive or technical details were disclosed.
    Date: 2026-04-23T04:30:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912148
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Construction / Building Materials
    Victim Organization: MD Materiaux
    Victim Site: www.mdmateriaux.com
  321. Website Defacement of SportFoods by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the threat actor DimasHxR defaced a subdirectory of the Dutch sports nutrition website sportfoods.nl. The attack targeted a media/custom path rather than the homepage and was conducted as a solo, non-mass defacement. No specific motivation or technical details regarding the server environment were disclosed.
    Date: 2026-04-23T04:29:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912157
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Retail / Sports Nutrition
    Victim Organization: SportFoods
    Victim Site: www.sportfoods.nl
  322. Website Defacement of PCMR.hu by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a page on the Hungarian website www.pcmr.hu, targeting a media/customer directory path. The attacker acted independently without an affiliated team. No specific motive, server details, or proof of concept were disclosed in relation to this incident.
    Date: 2026-04-23T04:28:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912153
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Hungary
    Victim Industry: Unknown
    Victim Organization: PCMR
    Victim Site: www.pcmr.hu
  323. Website Defacement of VDH Products by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a page on www.vdhproducts.com, targeting a subdirectory within the sites public media path. The incident was a targeted single-page defacement with no team affiliation reported and no stated motive. The attack was documented and mirrored by zone-xsec.com under mirror ID 912160.
    Date: 2026-04-23T04:28:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912160
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing / Products
    Victim Organization: VDH Products
    Victim Site: www.vdhproducts.com
  324. Website Defacement of Firmbay by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a media/customer directory page on the e-commerce platform Firmbay (firmbay.com). The attack was an isolated, non-mass defacement targeting a specific subpath of the website. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-04-23T04:27:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912142
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-Commerce / Retail
    Victim Organization: Firmbay
    Victim Site: www.firmbay.com
  325. Website Defacement of Design Ameublement by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the website of Design Ameublement, a French furniture and interior design company, was defaced by the threat actor DimasHxR operating without an affiliated team. The attacker targeted a subdirectory of the domain, performing a single-page defacement rather than a full homepage or mass defacement. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-04-23T04:26:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912140
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Retail / Furniture & Interior Design
    Victim Organization: Design Ameublement
    Victim Site: www.designameublement.com
  326. Website Defacement of Wolka Online by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a media/customer directory page on wolkaonline.eu, an e-commerce platform operating under the .eu top-level domain. The attack was a targeted single-site defacement with no team affiliation reported. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-04-23T04:25:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912135
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: European Union
    Victim Industry: E-Commerce / Retail
    Victim Organization: Wolka Online
    Victim Site: wolkaonline.eu
  327. Website Defacement of Karly Floats by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the Australian website karlyfloats.com.au was defaced by a threat actor known as DimasHxR acting without a team affiliation. The defacement targeted a subdirectory of the site rather than the homepage and was not part of a mass defacement campaign. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T04:24:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912144
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Retail / Event Services
    Victim Organization: Karly Floats
    Victim Site: www.karlyfloats.com.au
  328. Website Defacement of Bierl Antiquariat by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the threat actor DimasHxR defaced a subdirectory of the German antiquarian bookshop website Bierl Antiquariat. The attack was a targeted, non-mass defacement affecting a specific page rather than the homepage. No team affiliation, motive, or server details were disclosed in connection with this incident.
    Date: 2026-04-23T04:23:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912137
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Retail – Antiquarian Books and Collectibles
    Victim Organization: Bierl Antiquariat
    Victim Site: www.bierl-antiquariat.de
  329. Website Defacement of The Merch NZ by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor known as DimasHxR defaced a media/customer subdirectory of the New Zealand-based merchandise retailer website themerch.nz. The defacement was a targeted single-site attack, not part of a mass defacement campaign. No specific motive or additional technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T04:22:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912159
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: New Zealand
    Victim Industry: Retail / E-Commerce
    Victim Organization: The Merch NZ
    Victim Site: www.themerch.nz
  330. Website Defacement of samdam.shop by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a subdirectory of the e-commerce website samdam.shop, targeting a path under the Magento-style public media directory. The attack was a single targeted defacement with no team affiliation reported. No specific motive or server details were disclosed.
    Date: 2026-04-23T04:22:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912154
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-Commerce / Retail
    Victim Organization: Samdam Shop
    Victim Site: www.samdam.shop
  331. Website Defacement of CHS Pharmacy (UAE) by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a media or custom content directory on the CHS Pharmacy website hosted in the United Arab Emirates. The incident was a targeted, single-site defacement rather than a mass or home page compromise. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-04-23T04:21:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912139
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Arab Emirates
    Victim Industry: Healthcare / Pharmacy
    Victim Organization: CHS Pharmacy
    Victim Site: www.chspharmacy.ae
  332. Website Defacement of Silhouette Europe by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a media directory on the website of Silhouette Europe, a European eyewear or fashion-related organization. The attack was a targeted single-site defacement with no team affiliation reported and no specific motive disclosed. Technical details such as server software and IP address were not publicly available.
    Date: 2026-04-23T04:20:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912156
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: European Union
    Victim Industry: Retail / Fashion
    Victim Organization: Silhouette Europe
    Victim Site: www.silhouetteeurope.eu
  333. Website Defacement of Divenly by Threat Actor DimasHxR
    Category: Defacement
    Content: On April 23, 2026, threat actor DimasHxR defaced a media/customer directory page on the French website divenly.fr. The incident was a targeted single-site defacement with no team affiliation reported. The attackers motivation and server details remain unknown at this time.
    Date: 2026-04-23T04:19:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912141
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: E-commerce / Retail
    Victim Organization: Divenly
    Victim Site: www.divenly.fr
  334. Website Defacement of thegrdn.co.uk by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a web page hosted on the domain thegrdn.co.uk, targeting a subdirectory of the site. The attack was not classified as a mass or home page defacement, suggesting a targeted intrusion into a specific media or custom content directory. No team affiliation, stated motivation, or technical details regarding the server environment were disclosed.
    Date: 2026-04-23T04:17:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912158
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: The Garden
    Victim Site: www.thegrdn.co.uk
  335. Website Defacement of Neottia.gr by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the Greek website neottia.gr was defaced by a threat actor operating under the alias DimasHxR, acting independently without a known group affiliation. The defacement targeted a subdirectory of the site rather than the homepage, suggesting a targeted path-level compromise. No specific motive or technical details regarding the exploitation method were disclosed.
    Date: 2026-04-23T04:16:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912151
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Greece
    Victim Industry: Unknown
    Victim Organization: Neottia
    Victim Site: www.neottia.gr
  336. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 1.57 million credential pairs associated with Yahoo accounts. The combolist was shared via a Mega.nz file link on the cracking forum CrackingX. The leaked data is described as high-quality and likely contains email and password combinations.
    Date: 2026-04-23T04:06:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72943/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  337. Website Defacement of EWM by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the attacker known as DimasHxR defaced a media/customer asset path on ewm.co.uk, a UK-based e-commerce or retail website. The defacement targeted a specific subdirectory rather than the homepage, indicating a targeted file upload or directory traversal exploitation. No team affiliation, stated motive, or technical server details were disclosed.
    Date: 2026-04-23T04:05:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912102
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: E-Commerce / Retail
    Victim Organization: EWM
    Victim Site: ewm.co.uk
  338. Website Defacement of Bielizna For You by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor operating under the alias DimasHxR defaced a subdirectory of bieliznaforyou.pl, a Polish lingerie/underwear retail website. The attack was a targeted, non-mass defacement affecting a specific media path rather than the homepage. No team affiliation, stated motive, or technical details regarding the server environment were disclosed.
    Date: 2026-04-23T04:03:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912099
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Retail / E-commerce
    Victim Organization: Bielizna For You
    Victim Site: bieliznaforyou.pl
  339. Website Defacement of Maggarack by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced the website maggarack.com, targeting a subdirectory within the sites public media folder. The defacement was an individual, non-mass attack with no affiliated team or stated motive. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-04-23T04:00:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912108
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce / Retail
    Victim Organization: Maggarack
    Victim Site: maggarack.com
  340. Website Defacement of Skincollagen.fi by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, a threat actor identified as DimasHxR defaced a subdirectory of skincollagen.fi, a Finnish health and beauty e-commerce website. The attack targeted a media path within the sites public directory, consistent with exploitation of a content management system or file upload vulnerability. The incident was recorded as a single, non-mass defacement with no team affiliation attributed to the attacker.
    Date: 2026-04-23T03:45:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912096
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Finland
    Victim Industry: Health & Beauty / E-Commerce
    Victim Organization: Skin Collagen
    Victim Site: skincollagen.fi
  341. Website Defacement of Larpsi by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the threat actor DimasHxR defaced a page on the Brazilian website larpsi.com.br, targeting a file path within the sites public media directory. The attack was carried out by a lone actor with no affiliated team, and was a targeted single-page defacement rather than a mass or home page defacement. Technical details such as server software and IP address were not disclosed.
    Date: 2026-04-23T03:43:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912082
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Publishing / Media
    Victim Organization: Larpsi
    Victim Site: larpsi.com.br
  342. Website Defacement of Lukime by Threat Actor DimasHxR
    Category: Defacement
    Content: On April 23, 2026, threat actor DimasHxR defaced a specific media/customer address page on lukime.com. The attack was conducted individually without affiliation to a known group. The targeted subdirectory suggests a customer-facing e-commerce or service platform was compromised.
    Date: 2026-04-23T03:26:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912054
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce / Retail
    Victim Organization: Lukime
    Victim Site: lukime.com
  343. Website Defacement of Kids Luxury UK by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the website kidsluxury.uk was defaced by a threat actor operating under the handle DimasHxR, acting independently without a known group affiliation. The defacement targeted a subdirectory of the site rather than the homepage and does not appear to be part of a mass defacement campaign. No specific motivation or technical details regarding the attack vector were disclosed.
    Date: 2026-04-23T03:24:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912053
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail / E-Commerce
    Victim Organization: Kids Luxury
    Victim Site: kidsluxury.uk
  344. Website Defacement of Tribag.ro by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the Romanian website tribag.ro was defaced by a threat actor operating under the alias DimasHxR. The attacker targeted a media/customer directory path on the server. No team affiliation, stated motive, or technical details regarding the server infrastructure were disclosed in connection with this incident.
    Date: 2026-04-23T03:23:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912068
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Tribag
    Victim Site: www.tribag.ro
  345. Website Defacement of Poleringspads by DimasHxR
    Category: Defacement
    Content: On April 23, 2026, the Norwegian website poleringspads.no was defaced by the threat actor DimasHxR acting independently without a team affiliation. The attack targeted a media/custom directory path and was a single, non-mass defacement incident. No specific motive or technical server details were disclosed.
    Date: 2026-04-23T03:22:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/912062
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Norway
    Victim Industry: Retail / Automotive Services
    Victim Organization: Poleringspads
    Victim Site: poleringspads.no
  346. Alleged offering of black hat pentesting and database extraction services by threat actor Splashed
    Category: Services
    Content: A threat actor operating under the alias Splashed is advertising professional black hat pentesting services on the forum spear.cx, claiming over six years of experience in the security field. Services offered include source code auditing across multiple programming languages, web application vulnerability testing (XSS, SQLi, IDOR, LFI, RFI, SSTI), and unauthorized database extraction. Payments are accepted exclusively in cryptocurrency (XMR/BTC), with contact conducted via the anonymous Qtox m
    Date: 2026-04-23T03:16:44Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Com-Boss-SERVICE-Professional-Pentesting-Services-Source-Code-Web-application
    Screenshots:
    None
    Threat Actors: Splashed
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  347. Alleged sale of 170k Vercel employee credentials with password hashes
    Category: Combo List
    Content: Threat actor claiming to possess and selling a dataset of approximately 170,000 Vercel employee records including email addresses and password hashes. Seller requesting $10,000 USD and providing session ID as proof. Contact via Telegram handle @shinyc0rpsss.
    Date: 2026-04-23T02:52:53Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7275
    Screenshots:
    None
    Threat Actors: shinyc0rpsss
    Victim Country: Unknown
    Victim Industry: Cloud Platform / Web Infrastructure
    Victim Organization: Vercel
    Victim Site: vercel.com
  348. Alleged leak of URL:Log:Pass combolist containing 5.97 million credentials
    Category: Combo List
    Content: A threat actor operating under the alias Daxus has shared a URL:LOG:PASS combolist containing approximately 5.97 million credential pairs on the cracking forum CrackingX. The data is described as UHQ (Ultra High Quality) and is being distributed via the Daxus.pro website and an associated Telegram channel. No specific victim organization or targeted service has been identified.
    Date: 2026-04-23T02:43:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72940/
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  349. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor on DemonForums has made available a combolist of alleged valid Hotmail credentials, described as UHQ (ultra-high quality) and sourced from a private cloud. The post references a Telegram contact (@noiraccesss) and requires forum registration to access the hidden content. No explicit record count or price was mentioned in the post.
    Date: 2026-04-23T02:43:14Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X689-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  350. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias noir on CrackingX has made available an alleged combolist of valid Hotmail credentials, described as UHQ (ultra-high quality) and private. The post advertises valid mixed credentials with a download link and directs interested parties to a Telegram channel (@noiraccesss) for further access.
    Date: 2026-04-23T02:43:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72941/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  351. Alleged sale of Chinese Peoples Liberation Army (PLA) sensitive military data
    Category: Data Breach
    Content: A threat actor operating under the alias mosad is selling data allegedly obtained from multiple divisions of the Chinese Peoples Liberation Army, including the Cyberspace Force Technology Research Institute, the Rocket Force, the Joint Staff Intelligence Directorate, and several other military research institutes. The actor claims to be transitioning from private contracted work to a broader intelligence-selling operation and is targeting think tanks and well-funded organizations as potential
    Date: 2026-04-23T02:33:00Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-CHINA-BULK-PLA-Rocket-Force-Foreign-Affairs-Cyberforce-DATA-OPEN-FOR-SALE
    Screenshots:
    None
    Threat Actors: mosad
    Victim Country: China
    Victim Industry: Government & Military
    Victim Organization: Chinese Peoples Liberation Army (PLA)
    Victim Site: Unknown
  352. Alleged Sale of Flash USDT Sender Script for Ethereum Transaction Manipulation
    Category: Carding
    Content: A threat actor identified as antelope is selling a Flash USDT Sender Script for $500 via Telegram (@propanolcipher). The script exploits Ethereums transaction replacement mechanism by deliberately broadcasting ERC-20 USDT transfer transactions with an artificially low gas price (3 Gwei) to keep them in a pending state indefinitely, creating the illusion of a completed payment. The sender can then cancel the transaction by replacing it with a 0-value self-transfer at 50% higher gas price, effe
    Date: 2026-04-23T02:32:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Flash-USDT-Sender-Script–74294
    Screenshots:
    None
    Threat Actors: antelope
    Victim Country: Unknown
    Victim Industry: Cryptocurrency / Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  353. Website Defacement of Kwik Attorneys by MR~TNT of QATAR911
    Category: Defacement
    Content: The website kwikattorneys.com, belonging to a legal services firm, was defaced by threat actor MR~TNT operating under the group QATAR911 on April 23, 2026. The attack targeted a Linux-based web server hosting the attorney services platform. The defacement was a targeted single-site incident, with a mirror of the defaced page archived at haxor.id.
    Date: 2026-04-23T02:19:39Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248620
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: United States
    Victim Industry: Legal Services
    Victim Organization: Kwik Attorneys
    Victim Site: kwikattorneys.com
  354. Alleged leak of mixed corporate credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 183,795 lines of credentials via a Mega.nz link on the cracking forum CrackingX. The combolist is described as targeting mixed corporate entities and is labeled for 2026. No specific victim organizations or countries have been identified.
    Date: 2026-04-23T02:02:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72939/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Multiple Organizations
    Victim Site: Unknown
  355. Alleged sale of RDP access and compromised accounts (Azure, AWS, DigitalOcean, email, GitHub)
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to cloud infrastructure providers (Azure, AWS, DigitalOcean) at $200, along with compromised domain email accounts (Gmail, Yahoo), and GitHub student accounts. Services advertised as fresh with good IP reputation, available for daily/monthly rental with escrow payment option.
    Date: 2026-04-23T01:59:11Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/67899
    Screenshots:
    None
    Threat Actors: QQHB99
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  356. Alleged leak of mixed valid email access credentials (15,400 records)
    Category: Data Leak
    Content: A threat actor known as redcloud has made available a combolist of approximately 15,400 allegedly valid mixed email credentials, described as private and ultra-high quality (UHQ). The data was shared on the AE combo list forum with a free download gated behind a reply requirement, and the actor also provided a Telegram contact handle (@tutuba5m).
    Date: 2026-04-23T01:28:41Z
    Network: openweb
    Published URL: https://altenens.is/threads/15-4k-sparkles-mix-sparkles-valid-mail-access-23-04.2928619/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  357. Alleged data leak of Israeli CRM system by NoHeartz and OpsShadowStrike
    Category: Data Leak
    Content: NoHeartz threat actor claims to have leaked a customer relationship management (CRM) system belonging to an Israeli organization (crmlink.co.il). The leak is attributed to NoHeartz in collaboration with OpsShadowStrike and multiple other hacktivist groups including TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, and others. The post includes Telegram contact information for the threat actors.
    Date: 2026-04-23T01:18:33Z
    Network: telegram
    Published URL: https://t.me/Noheartz1337/195
    Screenshots:
    None
    Threat Actors: NoHeartz
    Victim Country: Israel
    Victim Industry: Software/SaaS – Customer Relationship Management
    Victim Organization: CRM Link (crmlink.co.il)
    Victim Site: crmlink.co.il
  358. Alleged Data Breach of Philippine Drug Enforcement Agency (PDEA)
    Category: Data Breach
    Content: A threat actor operating under the alias Sh1nnySp1der is allegedly selling data obtained from the Philippine Drug Enforcement Agency (PDEA). The post includes proof images and directs interested parties to contact the seller via a Proton Mail address, suggesting the data is being offered for sale. No specific record count or data types were disclosed in the post.
    Date: 2026-04-23T01:17:01Z
    Network: openweb
    Published URL: https://breached.st/threads/philippine-drug-enforcement-agency.86205/unread
    Screenshots:
    None
    Threat Actors: Sh1nnySp1der
    Victim Country: Philippines
    Victim Industry: Government
    Victim Organization: Philippine Drug Enforcement Agency
    Victim Site: Unknown
  359. Alleged ShinyHunters Identity Dispute – Threat Actor Claims Impersonation by Mattys Savoie
    Category: Cyber Attack
    Content: An individual claiming to be the original ShinyHunters threat actor alleges that Mattys Savoie (website owner of shinyhunte.rs) impersonated them, abused their PGP key, and used the ShinyHunters name to conduct ransomware attacks and blackmail operations against companies including Salesforce. The claimant provides official contact channels (Telegram, XMPP, email, Session) and PGP verification methods to distinguish themselves from the alleged impersonator. Includes threats of physical retaliation against Savoie.
    Date: 2026-04-23T01:16:11Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7261
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: shinyhunte.rs
  360. Alleged sale of spamming tools and credential harvesting tutorials
    Category: Malware
    Content: Threat actor Raysp0my is advertising availability of spamming tools and tutorials targeting multiple platforms and services including Facebook, banking systems, credit cards, and Office 365. This represents malicious tooling for credential theft and fraud.
    Date: 2026-04-23T00:46:27Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/67867
    Screenshots:
    None
    Threat Actors: Raysp0my
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  361. Alleged leak of Hotmail valid email credentials
    Category: Combo List
    Content: A threat actor operating under the alias redcloud has made available a credential list purportedly containing approximately 4,100 valid Hotmail email account credentials. The post, dated 23 April 2026, includes a free download link hosted on MediaFire and references a Telegram contact for further communication. The combolist is described as private and ultra-high quality (UHQ), suggesting the credentials have been verified for validity.
    Date: 2026-04-23T00:40:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72937/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  362. Alleged leak of Hotmail credential combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Bugmann6666 has shared an alleged UHQ (ultra-high quality) Hotmail credential combolist on the forum Altenens. The post requires users to reply before accessing the hidden download content, suggesting the credentials are being distributed for free. The combolist likely contains email and password combinations associated with Hotmail/Microsoft accounts.
    Date: 2026-04-23T00:26:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/hotmail-login-uhq.2928608/unread
    Screenshots:
    None
    Threat Actors: Bugmann6666
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com