[May-16-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report details a massive series of recent cyber incidents, providing key intelligence for each event based strictly on the provided dataset. The threat landscape captured in this data reflects a highly active, organized, and deeply commodified underground cybercrime ecosystem operating primarily across open-web cracking forums (e.g., breached.st, cracked.st, patched.to, demonforums.net) and anonymous networks such as Telegram and Tor. The incidents span a vast geographical footprint—affecting the United States, France, Japan, Australia, Indonesia, Morocco, Israel, and numerous other nations.

The primary categories of threat activity observed include the rampant distribution and monetization of “Combo Lists” (credential sets used for automated account takeover attacks), high-impact corporate and government data breaches, the sale of Initial Access to corporate and government networks, systemic website defacement campaigns driven by hacktivist groups, and the illicit trade of malware, exploits, and financial fraud services. This report systematically breaks down these threats, profiling the responsible threat actors, analyzing the targeted victimology, and detailing the specific operational methodologies utilized in these compromises.

2. In-Depth Analysis of Data Breaches and Leaks

The dataset reveals an alarming number of high-profile data breaches across multiple sectors, including government, healthcare, telecommunications, retail, and technology. Threat actors are actively monetizing these databases, often offering samples via Pastebin or Hastebin and concluding sales through encrypted Telegram channels.

2.1. Government and Defense Breaches

Government entities are prime targets for extortion, espionage, and data brokering.

  • Morocco Government Portals: A threat actor operating under the alias “OxO” is selling an alleged breach of multiple Moroccan government portals, specifically targeting education and tax authority domains. The dataset allegedly contains 827,000 lines of data across 16MB, sourced from at least nine distinct gov.ma subdomains. The data was published on darkforums.su on May 15, 2026, with the actor directing buyers to a Telegram contact. Another actor, “fexus,” also claimed to have leaked approximately 78,082 lines of data from these same Moroccan education and tax ministry domains, distributing it for free.
  • CCAS Dunkerque (France): A threat actor known as “arpanet7444” leaked data allegedly belonging to CCAS Dunkerque, a French municipal social action center. The actor utilized a Tor-based forum to share the anonymous file-sharing link and simultaneously offered to sell 220 additional records of French personal data for $500 via Telegram.
  • Perum Daerah Tirta Musi (Indonesia): A database allegedly sourced from the Indonesian regional water utility, perumdatirtamusi.co.id, was listed for sale by the threat actor “Sorb”. The dataset contains over 437,000 customer records, including 257,000 unique phone numbers, names, addresses, meter data, and tariff codes. The asking price is $300, with escrow accepted.
  • Bengkalis Regency DPMPTSP (Indonesia): Threat actor “vicmeow” published an alleged 13MB SQL database dump of the Integrated Electronic Licensing Service (epinter.bengkaliskab.go.id) via a file-sharing link on darkforums.su.

2.2. Healthcare and Pharmaceutical Breaches

The healthcare sector faces immense risk due to the highly sensitive nature of patient and clinical data.

  • Eli Lilly: In a massive corporate compromise, the threat actor “TeamPCP” alleges to be selling over 1,200 internal source code repositories (totaling 80GB compressed) stolen from the pharmaceutical giant Eli Lilly. The repositories purportedly cover drug research tools, AI agents, medical devices, manufacturing systems, and clinical platforms. Furthermore, an additional 40GB of documents allegedly exfiltrated from Eli Lilly’s Veeva vault are included. The actor is demanding $70,000 USD for exclusive rights, threatening to leak the data if the company does not pay.
  • Arrotex Pharmaceuticals (Australia): Threat actor “wower” is offering an astonishing 2.5 TB of data allegedly exfiltrated from Australian healthcare company Arrotex Pharmaceuticals. The compromised files reportedly include recruitment records, partner/distributor information, financial documents, sales data, and strategic business plans.
  • Nirvasa (India): A database dump from Indian digital healthcare platform Nirvasa is being sold by “Masterbyte” for $600. The dataset contains roughly 3.5 million user records (2.9 million unique phone numbers), exposing first names, last names, emails, pincodes, and addresses from 2024 to 2026.
  • Afrilims (South Africa): Threat actor “yra404” leaked the full database of afrilims.co.za across all subdomains. This highly sensitive dump includes tables for doctors, patients, and users, exposing medical data, ICD-10 codes, dates of birth, and hashed passwords.
  • Wateen (Saudi Arabia): A database allegedly obtained from wateenapp.org, the official Saudi Ministry of Health blood donation application, was leaked by “lulzintel”. It exposes 180,438 blood donors’ names, blood groups, genders, mobile numbers, ID numbers, and blood bag details.

2.3. Retail, E-Commerce, and Hospitality

Retailers hold vast repositories of consumer data, making them lucrative targets.

  • Auchan (France): Threat actor “Lagui” is selling a database dump from French retail chain Auchan, encompassing 1.29 million customer records. The fresh, unprocessed dataset includes names, emails, phone numbers, postal addresses, and loyalty card numbers.
  • Nike (USA): The threat actor “Saikaa” listed an alleged database belonging to Nike (nike.com) on a Tor-based forum, though specific record counts or data types were withheld.
  • Maeva Group (France): Threat actor “ChimeraZ” leaked an immense database dump belonging to French vacation rental company Maeva Group, encompassing 4,575,065 customer records and 38,945 residence entries in JSON format. The data, spanning domains like maeva.com and vacansoleil.com, exposes passenger names, phone numbers, and reservation details.
  • eSky (Poland/Brazil): Threat actor “OxO” is selling a database from esky.com containing 10.3 million records related to Delta Airlines Brazil travelers, exposing dates of birth, genders, full names, addresses, and phone numbers.
  • Podarok (Israel): 5,802 Israeli user records from the e-commerce site podarok.co.il were leaked by “yra404,” exposing names, emails, passwords, and addresses.
  • Magic Seller (South Korea): An alleged database dump from magicseller.co.kr was shared by “KoreanAshley,” including SQL table schemas for user credentials and social media account references.

2.4. Telecommunications, Finance, and Technology

  • Movistar Venezuela: Threat actor “GordonFreeman” claims to have breached Movistar Venezuela, obtaining 4.15 million customer records (ID numbers, names, billing accounts, lifecycle status) dated 2026. A proof-of-concept of 5,000 rows was publicly shared.
  • Coinbase: Threat actor “OxO” has repeatedly listed a massive 1 million customer record database from Coinbase. The dataset purportedly includes rich PII (name, address, IP) alongside deeply sensitive financial metrics, such as total deposits, withdrawals, and annual income.
  • Binance Australia: Threat actor “DanzNismXst7” is selling 470,000 Binance Australia user records for $3000 USD via Telegram. The data includes PII and trading pair/exchange data.
  • Telegram: Multiple listings exist for Telegram user databases. For instance, “Meowl” and “OxO” are selling datasets of approximately 770,000 to 771,000 records containing user IDs, phone numbers, and usernames.
  • Rockstar Games: The notorious “ShinyHunters” group leaked 78.6 million Snowflake records allegedly belonging to Rockstar Games. The breach reportedly occurred through an Anodot.com integration. ShinyHunters distributed the data via a direct download link, clarifying it was a pure leak, not a ransom attempt.
  • BreachForums itself: In a twist of fate, “ShinyHunters” also claimed to have acquired the BreachForums database backup (bf_03_2026.sql.7z) following an unauthorized leak in January 2026. The group threatened to leak complete backups, private messages, and IPs if forum clones continued to operate, providing a direct SQL archive link on Telegram.

3. The Proliferation of Combo Lists and Credential Stuffing

The vast majority of the intelligence data comprises the distribution of “Combo Lists.” These are massive text files containing email (or username) and password combinations, typically aggregated from thousands of historical data breaches. Threat actors use these lists in conjunction with automated software (checkers) to perform “credential stuffing” attacks—testing the credentials against platforms like Netflix, banking sites, and email providers to find reused passwords.

The scale of credential distribution documented on May 15, 2026, is staggering, involving hundreds of millions of lines of data.

3.1. General and Mixed Mail Providers

Major email providers like Hotmail, Gmail, Yahoo, and Outlook are the most frequent targets, as compromising an email account often grants access to all linked services via password resets.

  • Hotmail/Outlook: Hotmail is highly targeted. Threat actor “Vows” distributed 4,000 UHQ Hotmail credentials sponsored by vows.solutions. Other actors shared massive datasets: 100,000 fresh Hotmail combos by “GhostlyGamer” , 394,000 records by “zubicks” , 722,000 USA Hotmail records by “MetaCloud3” , 265,000 semi-private records by “el_capitan” , and a massive 1.28 million mixed-country Hotmail list by “HqComboSpace”. Threat actors such as “GoldMailAccs” continuously flood forums with smaller, supposedly 100% valid, validated chunks of Hotmail hits (e.g., sets of 1,290; 8,335; 1,238; 2,874; 6,071; and 822 valid credentials).
  • Gmail: “Vows” distributed a massive 4.5 million UHQ Gmail combo list. Threat actor “el_capitan” also offered a 1.5 million Gmail combo list, actively advertising dumping and cracking tools on the side. “HqComboSpace” provided a 1.4 million line Gmail combo list. Furthermore, Vows distributed another 150,000 UHQ Gmail combo sponsored by slateaio.com.
  • Yahoo: “Vows” listed a 7.3K UHQ Yahoo list and a 40,000 credentials list. “CODER” distributed a staggering 1.2 million Yahoo credentials (across Yahoo.com, Yahoo.ie, and Sapo.pt) specifically targeted toward streaming services.
  • Mixed Providers: “Vows” shared a 1.2 million mixed mail combo list and a 10,000 UHQ mixed list. A threat actor operating as “distantguy” shared a massive URL:Login:Password (ULP) combo list containing up to 26 million lines , while “GoorG” shared a private 64 million line ULP combo list freely on a public forum. “lexityfr” distributed an incomprehensible 156 million ULP combo list alongside an 8 million line list. “NightFallCloud” advertised a 4.4 million mixed email combo list, boasting daily updates of 10,000–20,000 new lines.

3.2. Country-Specific Combo Lists

Threat actors explicitly curate and market combo lists by geographic region to facilitate localized fraud and bypass geographic security anomalies.

  • European Nations: “ImLupin” shared a 110,000 European email/password mix , and “Helpz11” shared a 120,000 European combo.
  • Germany: “el_capitan” offered a 140,000 Germany UHQ fresh combolist and “Megatron” offered 165,000 German credentials. “HqComboSpace” shared an 822,830-line German social and shopping platform combo list.
  • France: Threat actors shared numerous French lists, including 10,000 records by “zubicks” , 29,000 records targeting neuf.fr , 34,000 targeting numericable.fr , and 15,000 targeting orange.fr.
  • Asia & Oceania: “moser” distributed a 900,000 line Asia private list. “Maxleak” and “CobraEgy” supplied 31,000 Chinese email/password pairs. Japanese combos of 2,500 and 1,800 pairs were shared. “Megatron” shared 142,000 Indonesian records.
  • South & Central America: Extensive drops included 285,000 Mexican credentials by “el_capitan” , 129,000 Mexican by “Megatron” , 115,000 Colombian , 100,000 Argentine , 86,000 Ecuadorian , 71,000 Chilean , and 14,000 Dominican Republic credentials.
  • Eastern Europe: Drops included 280,000 Czech credentials , 107,000 Bulgarian credentials , 68,000 and 30,000 Polish records targeting onet.pl , and 19,000 Croatian credentials.
  • USA and UK: “el_capitan” supplied 310,000 USA credentials , while “T3z” sold a heavily filtered UK-targeted combolist.

3.3. Industry-Specific Combo Lists

Threat actors pre-sort credentials to maximize their value against specific industries.

  • Gaming: “CODER” distributed a staggering 13 million record gaming combo list , and later a 12 million Spotify/Gaming list. “zubicks” shared 295,000 gaming credentials. “MetaCloud3” distributed 733,000 records targeting Xbox and PlayStation Network (PSN) , 619,000 targeting Minecraft , and 702,000 targeting Eneba and G2A.
  • Streaming & Media: “Ra-Zi” marketed 140,000 credentials specifically for Netflix, Hulu, and Spotify. “HqComboSpace” distributed over 1 million lines targeted at streaming services via Hotmail accounts. “MetaCloud3” sold 700,000 records for music services.
  • Retail & E-commerce: “HqComboSpace” shared 616,904 credentials targeting European and German shopping services , and a 745,994 mixed-country shopping combo. “MetaCloud3” shared 581,000 lines for shopping/food , and 681,000 credentials targeting Etsy and eBay.
  • Education and Corporate: “zubicks” distributed 121,362 and 53,000 credentials tailored to the education sector. Corporate targeting included 75,205 corporate SMTP targets by “AiCombo” and 50,000 corporate-targeted combos by “GhostlyGamer”.
  • Cryptocurrency & Finance: “juanca02” offered crypto leads targeting the USA. “MetaCloud3” distributed 615,000 credentials aimed at cards and crypto platforms , while “Meowl” generated crypto leads of 1 million Coinbase targets and 500,000 international leads.

4. Initial Access Brokerage and Corporate Compromises

Initial Access Brokers (IABs) play a pivotal role in the modern ransomware and espionage lifecycle by compromising networks and selling that access to the highest bidder.

  • Government & Law Enforcement Access: In a highly concerning incident, threat actor “0056115” offered alleged direct portal access to law enforcement and government entities globally. This included the Royal Thai Police, Brazil Military Police, Argentina Police, and the Malaysia Government. The actor claimed capabilities for Emergency Disclosure Request (EDR) bypasses on major platforms like Instagram, Facebook, TikTok, Snapchat, Apple, and Microsoft—allowing unauthorized legal data retrieval without legitimate judicial process.
  • ICARO CLOUD S.L. MSP Compromise: The threat actor “macaroni” is selling highly sensitive network configuration data exfiltrated from the Spanish Managed Service Provider (MSP) ICARO CLOUD S.L.. By exploiting a single reused credential across managed devices, the actor obtained over 3,500 OPNsense configuration backups, WireGuard private keys, TLS certificates, and admin password hashes. This severely compromised 20 distinct corporate clients across healthcare, education, agriculture, and hospitality. The full dataset is priced at $3,750 in Monero (XMR).
  • Global Corporate RCE/SSH Access: Threat actor “apolloteller” is offering Remote Code Execution (RCE) and Secure Shell (SSH) access to multiple small to large corporations worldwide.
  • Military Domains: “lei_bf” is selling shell access to a military domain located in the Philippines. “shadowX,” affiliated with Nullsec Philippines, compromised the Ghana Military website (ga.mil.gh) and successfully deployed a webshell (rex.php), offering the access for sale via Telegram.
  • Cloud Infrastructure: Threat actor “PORTAL” rented out RDP access to critical cloud infrastructure spanning Azure, AWS, and DigitalOcean for $200.
  • Corporate Solicitation: A buyer operating under “mansory” publicly solicited suppliers of corporate network access, expressly excluding government or educational targets while showing a strong preference for “Tier 1” countries, proposing revenue-sharing models.

5. Malware, Exploitation Tools, and Hacker Services

The data highlights a thriving marketplace for sophisticated malicious tools, logs, and cybercriminal services.

5.1. Malware and Exploits

  • Millenium RAT: “shinyenigma” is actively selling Millenium RAT version 4.1 (a C++ trojan controlled via Telegram). The malware boasts keylogging, browser credential theft, Discord token grabbing, crypto wallet recovery, webcam/mic capture, privilege escalation, and anti-VM/anti-debug features, priced at a highly accessible $50/month or $90 for lifetime.
  • Nighthawk C2: The source code for Nighthawk C2 version 0.4 “Janus” is being sold on threat markets for approximately $7,500 USD, a discount from its original $10,000 price. The code was reportedly dumped and is actively circulated.
  • Soul Clipper v3: The threat actor “anonym” distributed a cracked version of Soul Clipper v3, a cryptocurrency clipper malware designed to intercept clipboard content and redirect crypto wallet addresses to the attacker.
  • BLAIIS 820: The “Infrastructure Destruction Squad” announced the development of BLAIIS 820, a specialized vulnerability scanning and exploitation tool aimed specifically at IIS servers and related industrial systems.
  • Trillium Security Multisploit Tool v4: Distributed on DemonForums, this modular framework integrates multiple exploit modules, payloads, and post-exploitation capabilities.
  • Amuse Crypt V2.0: A cracked version of this crypter was offered for free by “deanevan.” It provides polymorphic encryption, multi-layer obfuscation, and anti-detection capabilities to protect malicious payloads from antivirus detection.
  • Targeted Threats Against Binance: Following the freezing of their accounts, members of the “Infrastructure Destruction Squad” (developers of BankGhost Builder malware) launched a public vendetta against the Binance cryptocurrency exchange. They explicitly threatened to develop new malware targeting Binance News and other platforms, offering these tools for sale to anyone willing to execute retaliatory attacks.

5.2. Hacker Services and Utilities

  • OSINT/Doxing Bots: The forum user “threxian” distributed a free Telegram bot (@Leak4Base_Bot) that purportedly indexes over 100 billion data points globally. It allows threat actors to conduct deep OSINT lookups by phone number, email, or physical address.
  • Telegram Automation and Account Removal: Threat actor “cio” offered Telegram automation services for mass DMs, member scraping, and bot automation. Concurrently, “ivebtc” offered a paid service specifically to systematically remove and ban Telegram channels, personal accounts, and bots.
  • Fake Document Rendering: “SoulService” advertised a highly sophisticated fake document rendering service capable of producing fraudulent identity documents with generated MRZ codes, barcodes, and QR codes. The actor emphasized that all forensic traces of photo editing are algorithmically scrubbed.
  • Tooling: Numerous actors sold utilities to support the underground economy, such as “Hunter Mix Inbox Checker v8” (capable of validating accounts and bypassing security across 99% of email providers with bulk SMTP capabilities) , the cracked “Crosshair X” account checker , and “BasesPro,” a tool featuring over 3,000 methods for refactoring mail:pass databases.

6. Website Defacement Campaigns and Hacktivism

The dataset logs a massive wave of website defacements orchestrated by distinct threat actor groups seeking notoriety, hacktivist goals, or simply demonstrating exploitation capabilities. Most of these incidents were mirrored and cataloged on zone-xsec.com or haxor.id.

6.1. Leviathan Perfect Hunter (Actor: aexdy)

The threat actor “aexdy,” operating under the banner of “Leviathan Perfect Hunter,” executed a highly coordinated, targeted file-level defacement campaign. Instead of defacing the entire homepage, aexdy systematically uploaded defacement texts to specific file paths (often hx.txt) on victim servers.

Targets compromised on May 15, 2026, include:

  • thebardou.com (The Bardou)
  • the-ami.org (AMI)
  • theafricanplace.com (Retail)
  • thebobmerrill.com (USA)
  • yrfindonesia.id (YRF Indonesia)
  • wasabibistro.com (Wasabi Bistro)
  • zainelhasany.com (Zain El Hasany)
  • sosolidworld.com
  • trophyfilm.com (Entertainment/Film)
  • treasurehunt.id (Indonesian Gaming)
  • therogerssisters.com (USA Entertainment/Music)

6.2. Alpha Wolf Team (Actor: XYZ)

Operating under the “Alpha Wolf” team, the threat actor “XYZ” successfully compromised and defaced the homepage index of wingfield.co.jp, a Japanese organization hosted on a Linux web server.

6.3. SHENHAXSEC (Actor: Ruiixh4xor)

The threat actor “Ruiixh4xor” executed precision defacements targeting specific subdirectories or blog detail pages.

Targets included:

  • saraswathyhospitals.com: An Indian healthcare provider.
  • icdcindia.com: An Indian domain.
  • stammeringsolution.com: A healthcare/speech therapy site, noted specifically as a re-defacement, indicating persistent vulnerabilities on the host.

6.4. Zod (Mass Defacement)

Threat actor “Zod” orchestrated a mass defacement campaign targeting Linux-based servers. By deploying a specific defacement page (/zod.html), Zod compromised multiple hosts, including:

  • senesconstructions.com: A construction firm.
  • jerryfinance.org: A financial services organization, marking a high-value target in a broader mass exploitation sweep.

6.5. Independent Actors

  • Y4NZ404: A solo threat actor executing single-site homepage defacements. Targets included Nigerian news and media outlets unitytimesng.com and 9japress.com.
  • DimasHxR: Compromised the New Zealand-based website ficeda.co.nz, placing a defacement in a custom media directory.

7. Carding, Fraud, and Financial Cybercrime

The financial fraud ecosystem is aggressively sustained by the sale of stolen credit cards, bank logs, and comprehensive cashout services.

  • Fullz and Identity Fraud: Threat actor “silasclark” provides an expansive shop selling “fullz” (complete identity profiles containing SSNs, DOBs, and Driver’s Licenses), Dumps with PIN (Track 101/202), and complete identity documents accompanied by selfies and videos required for Know Your Customer (KYC) bypass. They also sold Medicare leads and company KYC documents for the US, UK, Canada, and Australia.
  • Credit Cards and Liquidation: Actors like “BraveLuck,” “Fotso,” and “2ajcas4868” actively sell non-VBV (Verified by Visa) credit cards with ATM PINs, cloned cards, and EBT SNAP/CASH data. Fotso explicitly promoted “test run deals,” exchanging small crypto deposits for massive payouts through stolen cards linked to Apple Pay, PayPal, and Venmo. “skanty” and “Oblocck” act as cashout liquidators, taking bank logs and PayPal accounts and laundering the funds directly into cryptocurrency for their clients.
  • Fraudulent Bookings & Linking Services: Threat actor “briteny” monetized stolen CCs and BINs by offering fraudulent booking services for flights, hotels (AirBnb), car rentals, and massive retail orders. Meanwhile, “clevie339” explicitly solicited beginners and forum members for verified CashApp and PayPal accounts to use as mules for rapid fraudulent cashouts.
  • Cryptocurrency Scams: On Telegram, actors operating in the “Squad Chat Marketplace” (using handles like “changshen”) executed coordinated money laundering and USDT purchasing scams. They offered to purchase USDT at 15-25% above market rates using classic laundering tactics, claiming Chinese policy restrictions and recruiting commission-based intermediaries to wash stolen funds.

8. Threat Actor Profiling and Forum Dynamics

The underground economy observed in this dataset is highly structured, relying on reputation, sponsorships, and tiered access models.

Key Threat Actors

  • Vows: An extremely prolific distributor of massive, high-quality (“UHQ”) combo lists. Vows operates systematically, releasing multi-million line datasets sponsored by credential stuffing software providers (like vows.solutions and slateaio.com). By offering free or low-cost data, Vows inherently drives traffic and demand for the very software needed to exploit that data.
  • s2lender: Functions as a premium credential broker. S2lender actively promotes a private, encrypted “members-only network,” claiming a reliable daily supply of 4,000–12,000 fresh, untouched credentials optimized explicitly for credential stuffing.
  • ShinyHunters: An infamous top-tier extortion group responsible for massive breaches, including the 78.6 million Rockstar Games Snowflake records. Their alleged acquisition and extortion of the BreachForums database highlights the cannibalistic nature of cybercrime, where hacker forums themselves become targets for extortion.
  • MetaCloud3 & RogenPlay/RogenCloud: These entities operate large-scale distribution networks for credential logs and combo lists. RogenPlay heavily utilizes sponsorships, positioning their stealer logs (for Netflix, Spotify, Amazon, Roblox) as vastly superior to widely circulated combo lists. MetaCloud3 focuses on multi-million line distributions targeted at social media, gaming, and crypto.

Forum Operations

Cybercrime forums operate much like legitimate businesses. For example, BreachForums posted public recruitment announcements seeking new administrators to handle “upcoming targeted actions” and “anticipated traffic surges,” indicating a highly organized administrative structure. Additionally, forum geopolitics play a role. One forum administrator enacted a strict policy prohibiting any activities, breaches, or leaks targeting Russia and the Commonwealth of Independent States (CIS). Such policies are common on Russian-speaking or Russian-aligned underground forums, aiming to avoid the scrutiny of local law enforcement.


9. Conclusion

The threat intelligence derived from this May 2026 dataset illustrates a severe, hyper-active cyber threat landscape. The absolute commodification of user credentials via combo lists—totaling hundreds of millions of lines distributed daily—ensures that credential stuffing, account takeovers, and subsequent identity fraud remain primary vectors of attack.

Corporate environments are under immense pressure from Initial Access Brokers who compromise foundational network architecture (e.g., MSPs, RDPs, VPNs) and sell the keys to ransomware operators. The continued evolution of malware (such as Millenium RAT and Nighthawk C2), combined with aggressive extortion tactics by groups like ShinyHunters and hacktivist defacements by Leviathan Perfect Hunter, demands rigorous, defense-in-depth security postures. Organizations must prioritize robust multi-factor authentication, proactive dark-web intelligence monitoring, stringent API and third-party vendor security, and advanced anomaly detection to mitigate these pervasive and evolving threats.

Detected Incidents Draft Data

  1. Combo List: UHQ Hotmail credentials distributed
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 4,000 Hotmail credentials, marketed as UHQ and fresh. The post is sponsored by vows.solutions and shared on a public cracking forum.
    Date: 2026-05-15T23:58:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-4K-UHQ-HOTMAIL-COMBO-FRESH–2094498
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Sale of 10K UHQ mixed mail combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of 10,000 mixed email credentials, marketed as UHQ and fresh. The post is sponsored by slateaio.com, suggesting use with credential-stuffing tools.
    Date: 2026-05-15T23:58:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-10K-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged sale of mail access and credential lists across multiple countries
    Category: Initial Access
    Content: Threat actor operating under handle @DataxLogs is offering mail access across multiple countries (France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, Japan). The actor is advertising availability of configs, scripts, tools, hits, and combo lists (credential lists) with requests available upon contact.
    Date: 2026-05-15T23:48:51Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82426
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  4. UK Email/Password Combo List (2.7K credentials)
    Category: Combo List
    Content: A combo list containing approximately 2,700 UK email and password pairs has been shared on BreachForums. The content is hidden behind a registration/login requirement. No specific breached organization is identified.
    Date: 2026-05-15T23:40:42Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-UK-Combolist-2-7K-Email-Pass
    Screenshots:
    None
    Threat Actors: threads__
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Combo List: 2.1K Mixed Mail Access Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 2,100 mixed mail access credentials. The content is gated behind registration or login on the forum. No specific breach source or targeted service is identified.
    Date: 2026-05-15T23:40:31Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%902-1k-mixed-mail-access-%E2%AD%90
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Sale of UHQ mixed combo list with 21,590 credentials
    Category: Combo List
    Content: A threat actor known as Ebbicloud is distributing a mixed UHQ combo list containing approximately 21,590 credential pairs. The list is advertised as high quality (UHQ) and of mixed service type. No additional details are available from the post content.
    Date: 2026-05-15T23:37:38Z
    Network: openweb
    Published URL: https://altenens.is/threads/21590x-uhq-mix_-ebbi_cloud.2941019/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Sale of UHQ mix combo list
    Category: Combo List
    Content: A threat actor shared a UHQ mix combo list containing 19,588 credential pairs on a cybercrime forum. No additional details are available regarding the targeted services or origin of the credentials.
    Date: 2026-05-15T23:37:14Z
    Network: openweb
    Published URL: https://altenens.is/threads/19588x-uhq-mix_-ebbi_cloud.2941020/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. USA combo list of 1,000 email and password pairs
    Category: Combo List
    Content: A combo list of approximately 1,000 email and password pairs targeting USA-based accounts was shared on the forum. No additional details are available regarding the source or targeted services.
    Date: 2026-05-15T23:24:21Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-USA-Combolist-1K-Email-Pass
    Screenshots:
    None
    Threat Actors: threads__
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Japan combo list with 2.5K email/password credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 2,500 email and password pairs associated with Japanese accounts. The content is hidden behind a login/registration wall on the forum.
    Date: 2026-05-15T23:22:52Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Japan-Combolist-2-5K-Email-Pass
    Screenshots:
    None
    Threat Actors: threads__
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Free release of ULP combo list with 64 million lines
    Category: Combo List
    Content: A threat actor shared a URL:Login:Password (ULP) combo list containing 64 million lines, marketed as high quality and private. The dataset was made available for free on a public forum.
    Date: 2026-05-15T23:20:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90ULP-URL-LOGIN-PASS-PRIVATE-64M-LINES%E2%AD%90HQ%E2%AD%90LEAKED%E2%AD%90BY-ACCGIR%E2%AD%90
    Screenshots:
    None
    Threat Actors: GoorG
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Sale of premium SMTP services for bulk email operations
    Category: Services
    Content: A threat actor operating under the alias office_365shop is selling access to premium SMTP services including AWS SES, SendGrid, SparkPost, Mandrill, Brevo, and others. These services are commonly abused for bulk phishing or spam email campaigns. The seller advertises daily updates and can be contacted via Telegram.
    Date: 2026-05-15T23:20:01Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Buy-Premium-SMTPS-100-Trusted-Seller
    Screenshots:
    None
    Threat Actors: office_365shop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Combo List targeting German social and shopping platforms
    Category: Combo List
    Content: A combo list of 822,830 email:password lines is being shared on a cracking forum, marketed as high-quality credentials targeting German social media and shopping platforms. No specific breached organization is identified; the credentials appear to be sourced from multiple breaches and intended for credential stuffing.
    Date: 2026-05-15T23:06:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-822-830-Lines-%E2%9C%85-Social-and-Shopping-Target-Germany-HQ-Leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Sale of Millenium RAT — C++ Telegram-Controlled RAT with Stealer and Keylogger
    Category: Malware
    Content: A threat actor is selling Millenium RAT version 4.1 (latest 4.5), a fully native C++ remote access trojan controlled via Telegram. The malware includes keylogging, browser credential and cookie theft, Discord token grabbing, cryptocurrency wallet recovery, webcam/microphone capture, privilege escalation, and anti-VM/anti-debug evasion. Licenses are offered at $50 for the first month or $90 for a lifetime license.
    Date: 2026-05-15T23:04:57Z
    Network: openweb
    Published URL: https://hackforums.net/showthread.php?tid=6306020
    Screenshots:
    None
    Threat Actors: shinyenigma
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Japan Combolist with 1.8K Email/Password Pairs
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1,800 email and password pairs associated with Japanese accounts. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-15T23:04:33Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Japan-Combolist-1-8K-Email-Pass
    Screenshots:
    None
    Threat Actors: threads__
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged Development of BLAIIS 820 IIS Server Exploitation Tool
    Category: Malware
    Content: Infrastructure Destruction Squad announced the development of BLAIIS 820, a specialized tool designed for scanning, discovering, and exploiting vulnerabilities in IIS servers and related industrial systems.
    Date: 2026-05-15T23:02:14Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4348
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Industrial/IIS Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Combo List: 1.3 Million URL Log Credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list containing 1.3 million URL:login:password entries, dated 16 May. The content is gated behind forum registration or login.
    Date: 2026-05-15T23:02:10Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90-1-3-million-url-log-pass%E2%AD%90-16-may
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Sale of Hotmail combo list with alleged high hit rate
    Category: Combo List
    Content: A threat actor is offering a combo list of 10,000 Hotmail credentials, marketed as fresh with a high hit rate. The list is intended for credential stuffing against Hotmail accounts. No additional details are available from the post content.
    Date: 2026-05-15T23:00:04Z
    Network: openweb
    Published URL: https://altenens.is/threads/10k-fresh-hotmails-high-hit-rate.2941015/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Combo List of French email credentials (1.4K)
    Category: Combo List
    Content: A combo list containing approximately 1,400 France-based email and password pairs was shared on BreachForums. The post is categorized under combolists and appears to offer credentials potentially usable for credential stuffing. No additional details are available from the post content.
    Date: 2026-05-15T22:49:21Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-1-4K-France-Email-Pass
    Screenshots:
    None
    Threat Actors: threads__
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Russian Combo List 1.4K Email/Password Pairs
    Category: Combo List
    Content: A threat actor is sharing a combo list containing approximately 1,400 Russian email and password pairs on a cybercrime forum. The content is gated behind registration or login. No specific breached organization is identified.
    Date: 2026-05-15T22:47:54Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Russian-Combolist-1-4K-Email-Pass
    Screenshots:
    None
    Threat Actors: threads__
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Sale of 200K SUHQ mixed combo list
    Category: Combo List
    Content: A threat actor is sharing a mixed combo list containing 200,000 credentials marketed as super ultra high quality (SUHQ) and fresh. The post is sponsored by slateaio.com, suggesting the list may be intended for credential stuffing use.
    Date: 2026-05-15T22:42:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-200K-SUHQ-MIXED-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Buyer seeking corporate network access from Tier 1 countries
    Category: Initial Access
    Content: A threat actor is soliciting suppliers of corporate network access, accepting any access type with a preference for Tier 1 country targets. Government, educational, and academic accesses are explicitly excluded. The buyer proposes revenue-sharing arrangements and lists a nominal starting price of $1 to comply with forum rules.
    Date: 2026-05-15T22:32:33Z
    Network: openweb
    Published URL: https://tier1.life/thread/229
    Screenshots:
    None
    Threat Actors: mansory
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Sale of UHQ Hotmail combo list
    Category: Combo List
    Content: A threat actor is distributing approximately 1,400 Hotmail credentials marketed as UHQ (ultra-high quality) hits. Free drops are advertised publicly, with a private cloud of additional credentials available for purchase via Telegram at @window_linux01.
    Date: 2026-05-15T22:30:40Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-1-4k-uhq-hotmail-hit-%E2%9C%85
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Free distribution of stealer logs bundle (5,191 logs)
    Category: Logs
    Content: A threat actor shared a bundle of 5,191 stealer logs via a file-sharing link on a darknet forum. The logs are marketed as fresh and were made available for free download. No specific victim organization or country is identified.
    Date: 2026-05-15T22:27:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5191-LOGS-CLOUD-%E2%98%81-15-MAY-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Hotmail combo list (2K SUHQ, fresh)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 2,000 Hotmail credentials marketed as super ultra high quality (SUHQ) and fresh. The list is intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-15T22:26:42Z
    Network: openweb
    Published URL: https://altenens.is/threads/2k-suhq-hotmail-combo-fresh.2941008/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged data breach of Movistar Venezuela
    Category: Data Breach
    Content: A threat actor claims to have breached Movistar Venezuela, obtaining 4.15 million customer records dated 2026. The dataset allegedly includes ID numbers, full names, account numbers, billing account numbers, geographic area, lifecycle status, payment method, product line, and subscriber IDs. A proof-of-concept sample of 5,000 rows was shared in the post.
    Date: 2026-05-15T22:24:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-MOVISTAR-VENEZUELA-2026-DB-4-15-Million-Customer-Numbers
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Venezuela
    Victim Industry: Telecommunications
    Victim Organization: Movistar Venezuela
    Victim Site: movistar.com.ve
  26. Alleged education sector combo list leak
    Category: Combo List
    Content: A combo list containing approximately 121,362 email and password pairs targeting the education sector was shared on a cybercrime forum. The credentials are marketed as an education-focused combolist, likely for use in credential stuffing attacks against educational platforms or institutions.
    Date: 2026-05-15T22:08:55Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-121-362-%E2%9A%9C%EF%B8%8F-Edu-Combolist-Leaks
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Sale of 140K mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a 140,000-record mixed email:password combo list for free download (reply-gated) and also selling higher-quality combo lists via Telegram. The list reportedly includes credentials across multiple email providers and countries including the US, UK, France, Germany, Italy, Canada, and Australia.
    Date: 2026-05-15T22:08:34Z
    Network: openweb
    Published URL: https://altenens.is/threads/140k-fresh-hq-combolist-email-pass-mixed.2940992/unread
    Screenshots:
    None
    Threat Actors: carlos080
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Sale of cryptocurrency leads targeting United States users
    Category: Combo List
    Content: A threat actor is offering multiple sets of cryptocurrency-related leads for sale, targeting United States users. The seller directs interested buyers to contact them via private message or Telegram. A sample link is provided via Pastebin, with full content gated behind forum registration.
    Date: 2026-05-15T22:07:44Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-crypto-leads-for-sale-usa
    Screenshots:
    None
    Threat Actors: juanca02
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Combo List of USA Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 1,300 Hotmail email credentials targeting US accounts. The content is marked as private and requires forum registration to access. The post is dated May 15 and the data is noted as old.
    Date: 2026-05-15T22:07:14Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%E2%84%B9%EF%B8%8F1-3k-usa-hotmail-mail-access-mix%E2%84%B9%EF%B8%8F%E2%9C%A8-15-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Sale of 140K email:password combo list marketed for Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 140,000 email:password pairs, marketed as fresh and high quality for credential stuffing against services including Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. The list is advertised as spanning multiple regions including the USA, UK, France, Germany, Italy, Canada, and Australia. The actor promotes a Telegram channel and an external cracking site, and offers additional combo list sales via direct message.
    Date: 2026-05-15T21:53:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-140k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–204229
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged cryptocurrency money laundering and USDT purchasing scam operation
    Category: Cyber Attack
    Content: Threat actors operating in Squad Chat Marketplace are running a coordinated cryptocurrency scam offering to purchase USDT at 15-25% above market rates. The scheme uses classic money laundering tactics: claiming to be from China with policy restrictions, offering payment-first guarantees, and recruiting intermediaries for commission-based USDT transfers. Multiple accounts (changshen, Alexandr, Germany) post identical or near-identical messages promoting the scheme with contact handles @Hgwh1688 and @HK6880.
    Date: 2026-05-15T21:43:22Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82359
    Screenshots:
    None
    Threat Actors: changshen
    Victim Country: Unknown
    Victim Industry: cryptocurrency
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged cyber attack operations by 313 Team – Attack resumption announcement
    Category: Cyber Attack
    Content: 313 Team announced that their cyber attack operations were temporarily halted due to server infrastructure malfunction. The group stated that work is underway to fix the issue and attacks will resume soon. The group identifies as Islamic Cyber Resistance in Iraq and operates across multiple platforms including Telegram and Beamed.
    Date: 2026-05-15T21:42:53Z
    Network: telegram
    Published URL: https://t.me/c/2250158203/1163
    Screenshots:
    None
    Threat Actors: 313 Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Combo List for Venice shared on cracking forum
    Category: Combo List
    Content: A forum user shared an email:password combo list labeled VENICE on a cracking forum. No additional details regarding record count, targeted service, or data origin were provided in the post.
    Date: 2026-05-15T21:42:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-VENICE
    Screenshots:
    None
    Threat Actors: FlightUSA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Combo List: 10,000 Hotmail credentials shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of 10,000 Hotmail email and password pairs, marketed as UHQ (ultra-high quality) and private. The credentials are intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-15T21:42:01Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%9010k-UHQ-HOTMAIL-HIT-100-PRIVATE-AND-RESH%E2%AD%90
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged DDoS Attack Campaign by 313 Team – Attack Resumption Notice
    Category: Cyber Attack
    Content: 313 Team, a self-identified Iraqi Islamic Resistance cyber group, announced a temporary halt to ongoing attacks due to server malfunction, with explicit statement that attacks will resume soon. The group operates through Telegram channels and uses the Beamed network infrastructure.
    Date: 2026-05-15T21:41:55Z
    Network: telegram
    Published URL: https://t.me/c/2250158203/1162
    Screenshots:
    None
    Threat Actors: 313 Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged sale of mail access and credential materials by DataxLogs
    Category: Logs
    Content: Threat actor operating under handle @DataxLogs is advertising the sale of mail access credentials and related materials including configs, scripts, tools, hits, and combo lists. Access offered for multiple countries including France, Belgium, Australia, Canada, United Kingdom, United States, Netherlands, Poland, Germany, and Japan.
    Date: 2026-05-15T21:41:51Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82366
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Free distribution of stealer logs (1.3GB, May 2026)
    Category: Logs
    Content: A forum user is distributing 1.3GB of stealer logs dated May 15, 2026. The post is a bump with no additional detail about the origin, targeted regions, or specific malware family used to collect the logs.
    Date: 2026-05-15T21:41:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90%EF%B8%8FLOGS-FRESH-1-3GB-FROM-15-05-2026%E2%AD%90%EF%B8%8F-%E2%98%81
    Screenshots:
    None
    Threat Actors: DaWeasel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Hotmail combo list of 1,000 credentials freely shared
    Category: Combo List
    Content: A threat actor shared a combo list of 1,000 Hotmail credentials, marketed as UHQ (ultra-high quality) and private. The list was made available for free on a public forum.
    Date: 2026-05-15T21:41:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%901k-HOTMAIL-UHQ-COMBO-100-PRIVATE-AND-RESH%E2%AD%90
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Combo List targeting gaming, shopping, and Yahoo services
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 965,637 email:password lines reportedly targeting gaming, shopping, and Yahoo services. The list is advertised for credential stuffing against these platforms. No additional details are available from the post content.
    Date: 2026-05-15T21:41:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-965-637-Lines-%E2%9C%85-Gaming-and-Shopping-Target-Yahoo
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Sale of HQ mix combo list with approximately 3,674 credentials
    Category: Combo List
    Content: A threat actor operating under the handle s2lender is offering a high-quality mixed combo list containing approximately 3,674 credential pairs, marketed as fresh and untouched. The post advertises daily supply of 4,000–12,000 credentials through a private members-only network with encrypted access.
    Date: 2026-05-15T21:40:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-3674x-hq-mix-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Combo List: 19K Mixed Country Credentials
    Category: Combo List
    Content: A threat actor has shared a mixed-country combo list containing approximately 19,000 credential pairs on a public forum. The content is hidden behind a registration or login wall. No specific targeted service or organization is identified.
    Date: 2026-05-15T21:40:29Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-19k-mixed-country-combo-302831
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged leak of NordVPN account credentials
    Category: Combo List
    Content: A forum user is distributing NordVPN account credentials behind a registration wall. The post does not specify the number of accounts or how the credentials were obtained.
    Date: 2026-05-15T21:40:11Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90%EF%B8%8Fnordvpn-accounts%E2%AD%90%EF%B8%8F-2026%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: databreach
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Hotmail combo list shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 764 Hotmail mail access credentials on a combolist forum. The content is gated behind registration or login. The data is noted as old.
    Date: 2026-05-15T21:39:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%E2%84%B9%EF%B8%8Fx764-hotmail-mail-access%E2%84%B9%EF%B8%8F%E2%9C%A8-15-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Combo List: 1.6K Germany mail access mix
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 1,600 German email account credentials, described as a mail access mix. Access to the content requires forum engagement, suggesting it is being shared freely in exchange for replies.
    Date: 2026-05-15T21:38:01Z
    Network: openweb
    Published URL: https://altenens.is/threads/sparklesinformation1-6k-germany-mail-access-mixinformationsparkles-15-05.2940934/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Sale of stolen credit and debit cards with cashout services
    Category: Carding
    Content: A threat actor is offering stolen credit and debit cards claimed to work for any country, with cashout capabilities via CashApp, Apple Pay, PayPal, Venmo, and ATMs. The seller advertises cards with PINs and promotes test run deals exchanging small deposits for significantly larger payouts. Contact is facilitated via Telegram.
    Date: 2026-05-15T21:34:56Z
    Network: openweb
    Published URL: https://altenens.is/threads/enjoy-a-secure-dependable-service-anytime-begin-with-your-budget-and-receive-your-deposit-in-just-3-5-minutes-c4shapp-deposit-p4yp4l-deposit-cry.2940953/unread
    Screenshots:
    None
    Threat Actors: Fotso
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Czech combo list of 280K+ credentials freely shared on forum
    Category: Combo List
    Content: A combo list of approximately 280,000 email:password pairs targeting Czech accounts was shared on a breach forum. The credentials are marketed as fresh and high quality. The content is hidden behind a registration or login requirement.
    Date: 2026-05-15T21:31:35Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9C%AA-280-K-Combo-%E2%9C%AA-Czech-%E2%9C%AA-15-MAY-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Ecuador combo list with 86K+ credentials
    Category: Combo List
    Content: A combo list containing over 86,000 credentials associated with Ecuador was shared on BreachForums. The post is dated May 15, 2026, and was published in the combolists section. No additional details about the targeted services or data fields are available.
    Date: 2026-05-15T21:29:53Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9C%AA-86-K-Combo-%E2%9C%AA-Ecuador-%E2%9C%AA-15-MAY-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Combo list targeting Denmark distributed on breach forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 51,000+ email:password pairs associated with Denmark, marketed as fresh and high quality. The list was made available on a breach forum behind a registration/login gate.
    Date: 2026-05-15T21:28:17Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9C%AA-51-K-Combo-%E2%9C%AA-Denmark-%E2%9C%AA-15-MAY-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Combo list targeting Cuba distributed on cybercrime forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 21,000 email:password credential pairs purportedly associated with Cuba. The credentials are marketed as fresh and high quality. The list is available to registered forum members as hidden content.
    Date: 2026-05-15T21:26:36Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9C%AA-21-K-Combo-%E2%9C%AA-Cuba-%E2%9C%AA-15-MAY-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Free combo list targeting Dominican Republic accounts
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 14,000 email:password credential pairs described as fresh and high quality, targeting Dominican Republic accounts. The list was made available for free to registered forum members on BreachForums.
    Date: 2026-05-15T21:24:54Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9C%AA-14-K-Combo-%E2%9C%AA-Dominican-Republic-%E2%9C%AA-15-MAY-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Sale of high-quality mixed combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a mixed combo list marketed as high-quality and untouched, with a claimed daily supply of 4,000–12,000 credentials. The listing advertises private, encrypted access through a members-only network.
    Date: 2026-05-15T21:19:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75397/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Sale of stolen credit cards and bank logs with cashout services
    Category: Combo List
    Content: A threat actor is advertising stolen credit cards and bank logs with cashout services including transfers to CashApp and cryptocurrency. Services offered include bank log and PayPal liquidation as well as CC-to-crypto conversions. Contact is solicited via Telegram.
    Date: 2026-05-15T21:19:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75399/
    Screenshots:
    None
    Threat Actors: skanty
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Sale of alleged US personal data database with 85,000 records
    Category: Data Breach
    Content: A threat actor is offering for sale a dataset of approximately 85,000 US individuals containing full names, addresses, gender, date of birth, email, and mobile numbers. The source organization of the data is not disclosed. The seller directs buyers to a Telegram channel for purchase.
    Date: 2026-05-15T20:58:27Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DATA-USA-PERSONAL-8-5MB-OR-85K-ROWS
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged data breach of Morocco Government portals
    Category: Data Breach
    Content: A threat actor is selling an alleged breach of multiple Moroccan government portals spanning education and tax authority domains. The dataset is claimed to contain approximately 827,000 lines across 16MB, sourced from at least nine distinct gov.ma subdomains. A sample is provided via Hastebin and the seller is directing buyers to a Telegram contact.
    Date: 2026-05-15T20:57:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-MOROCCO-GOVERNMENT-BREACH
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Morocco
    Victim Industry: Government
    Victim Organization: Government of Morocco
    Victim Site: gov.ma
  55. Combo List: 510 Hotmail Valid Credentials
    Category: Combo List
    Content: A threat actor has shared a combo list of 510 claimed valid Hotmail credentials on a public forum. The content is hidden behind registration or login, indicating it is distributed to forum members. Hotmail is a credential-stuffing target, not the breach source.
    Date: 2026-05-15T20:41:13Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8F%87510-hotmail-valid-access-15-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Hotmail combo list of 3.8K credentials freely shared
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as 3.8K high-quality Hotmail credential hits. The list is offered as a free drop, with a private version available for purchase via Telegram. Hotmail is a credential-stuffing target, not the breach source.
    Date: 2026-05-15T20:40:43Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-3-8k-hq-hotmail-hit-%E2%9C%85
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Free sharing of search dorks for credential stuffing or data harvesting
    Category: Combo List
    Content: A forum member shared a collection of search dorks freely with the community. The post is framed as a community contribution with no price indicated. No specific victim organization or record count is mentioned.
    Date: 2026-05-15T20:40:39Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90%EF%B8%8F-QUALITY-DORKS-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: RomeF
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A forum user is distributing a combo list of 658 claimed valid Hotmail credentials, marketed as active as of May 15, 2026. The content is hidden behind a registration or login wall. Hotmail is the credential-stuffing target, not the breach source.
    Date: 2026-05-15T20:40:22Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8F%87658-hotmail-valid-access-15-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Mix mail access combo list of 4.5K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 4,500 mixed mail access credentials. Free drops are advertised publicly, with a private cloud version available for purchase via Telegram.
    Date: 2026-05-15T20:40:05Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-4-5k-hq-mix-mail-access-%E2%9C%85
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Sale of discounted Discord store products
    Category: Services
    Content: A forum user is advertising discounted Discord store products with cryptocurrency (Litecoin) payment accepted. The seller directs interested buyers to a Telegram contact. No specific victim or compromised data is referenced.
    Date: 2026-05-15T20:39:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-Discord-store-discounts
    Screenshots:
    None
    Threat Actors: CicadaHunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Sale of UHQ mix email combo list with 4,750 entries
    Category: Combo List
    Content: A forum user shared a combo list containing 4,750 mixed email credentials, marketed as UHQ (ultra-high quality). The actual content is hidden behind a registration or login wall.
    Date: 2026-05-15T20:39:32Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-4750x-mix-mails-uhq
    Screenshots:
    None
    Threat Actors: shhherrry
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  62. Combo list of 4,188 mixed mail credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 4,188 mixed email credentials on a leak forum. The content is gated behind registration or login. No specific breached organization is identified.
    Date: 2026-05-15T20:39:06Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%EF%B8%8F-4188x-Verity-Vault-Mix-Mail-Drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Verityyyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Combo List: Mix Mail Access credentials shared on forum
    Category: Combo List
    Content: A forum user shared a combo list containing 3,161 mixed mail access credentials behind a registration/login gate. The post is categorized as a combolist targeting mail services with no specific victim organization identified.
    Date: 2026-05-15T20:38:45Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-3161x-Mix-Mail-Access-Vault
    Screenshots:
    None
    Threat Actors: RyuuLord
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a combo list of approximately 188 high-quality Hotmail credentials on a cracking forum. The post claims daily supply of 4,000–12,000 fresh credentials via a private members-only network. Credentials are marketed as untouched and high-performance for credential stuffing use.
    Date: 2026-05-15T20:33:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75363/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Sale of combo list mix (HQ Mix)
    Category: Combo List
    Content: A threat actor known as s2lender is offering a combo list marketed as 6033X HQ Mix on a cracking forum. The listing claims credentials are fresh and untouched, with daily supply of 4,000–12,000 lines available through a private members-only network.
    Date: 2026-05-15T20:32:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75364/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Sale of HQ Mix Combo List by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a high-quality mixed combo list containing approximately 13,420 credential pairs. The post advertises daily supply of 4,000–12,000 fresh credentials distributed through a private members-only network. The credentials are marketed as untouched and optimized for credential stuffing.
    Date: 2026-05-15T20:32:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75367/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Sale of Spotify credential combo list
    Category: Combo List
    Content: A threat actor operating under the handle CODER is advertising a Spotify combo list on a cracking forum, directing interested parties to a Telegram channel for access. The post promotes free combo lists and associated tools via two Telegram groups.
    Date: 2026-05-15T20:31:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75368/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: A threat actor operating as s2lender is offering a combo list of 134 high-quality Hotmail credentials on a cracking forum. The post advertises daily supply of 4,000–12,000 fresh credentials through a private members-only network. The credentials are marketed as untouched and optimized for credential stuffing.
    Date: 2026-05-15T20:31:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75372/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is sharing 836 Hotmail credential hits on a cracking forum. The post is categorized as a combo list of credentials likely obtained from credential stuffing or prior breaches. No additional details are provided beyond the download link.
    Date: 2026-05-15T20:31:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75373/
    Screenshots:
    None
    Threat Actors: anonymous_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a combo list of 260 high-quality Hotmail credentials, marketed as fresh and untouched. The post advertises daily supply of 4,000–12,000 credentials via a private members-only network with encrypted access.
    Date: 2026-05-15T20:30:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75374/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Sale of Hotmail combo list with 2.4K credentials
    Category: Combo List
    Content: A threat actor shared a link via Mega.nz containing approximately 2,400 Hotmail email credentials. The list is distributed freely on a cracking forum and is marketed as mail access credentials for credential stuffing or account takeover purposes.
    Date: 2026-05-15T20:30:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75378/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Sale of mixed gaming combo list with 13 million credentials
    Category: Combo List
    Content: A threat actor is distributing a mixed gaming combo list containing approximately 13 million credential pairs via a Telegram channel. The post advertises free combos and tools through two separate Telegram groups.
    Date: 2026-05-15T20:30:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75384/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Distribution of ULP combo list with up to 26 million lines
    Category: Combo List
    Content: A threat actor on a cracking forum has freely shared a URL-Login-Password (ULP) combo list marketed as containing up to 26 million lines. An additional file of approximately 380,000 credentials labeled as a private May 2026 dump is also distributed via external file-sharing links.
    Date: 2026-05-15T20:29:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75388/
    Screenshots:
    None
    Threat Actors: distantguy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Sale of HQ mix combo list
    Category: Combo List
    Content: A threat actor operating as s2lender is offering a high-quality mixed combo list containing approximately 130,820 credential pairs. The listing claims daily supply of 4,000–12,000 fresh entries through a private, encrypted members-only network. No specific victim organization or service is identified.
    Date: 2026-05-15T20:29:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75389/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Sale of mixed combo list with 3,190 credentials
    Category: Combo List
    Content: A threat actor is offering a mixed combo list containing 3,190 credential pairs via an external paste site and a Telegram channel. The post advertises tiered paid access ranging from a 24-hour trial at $3 to three months at $100, with VIP access available through a Telegram bot.
    Date: 2026-05-15T20:29:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75392/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Sale of database from alleged breach of undisclosed Spanish insurance company
    Category: Data Breach
    Content: A threat actor is selling a database allegedly dumped this week from a small Spanish insurance company. The data includes full names, national IDs, addresses, mobile numbers, and IBANs across 110,000 lines in CSV format, as well as a 50GB SQL Server backup file. Payment is accepted in BTC, XMR, and LTC.
    Date: 2026-05-15T20:27:23Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-SPANISH-SMALL-INSURANCE-COMPANY-DUMPED-THIS-WEEK
    Screenshots:
    None
    Threat Actors: albmstwntd
    Victim Country: Spain
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  77. BreachForums Recruiting New Administrators
    Category: Alert
    Content: BreachForums posted an announcement seeking two new administrators to support moderation and daily operations. The post references upcoming targeted actions against companies and an anticipated traffic surge. Interested applicants are directed to contact forum leadership via qTox.
    Date: 2026-05-15T20:23:27Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-IMPORTANT-READ-BreachForums-is-Recruiting-New-Administrators
    Screenshots:
    None
    Threat Actors: Hollow
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Sale of 5,800 HQ mixed valid mail access combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list containing 5,800 high-quality mixed valid mail access credentials. The post is categorized as a combo list offering on an underground forum. No additional details are available from the post content.
    Date: 2026-05-15T20:14:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/5-800-hq-mixed-valid-mail-access.2940880/unread
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Mix Mail Access Combo List with 65K Credentials
    Category: Combo List
    Content: A combo list advertised as containing 65K mixed mail access credentials has been shared on the forum. The post is categorized as a combo list likely used for credential stuffing against various mail services. No additional details were available in the post content.
    Date: 2026-05-15T20:14:08Z
    Network: openweb
    Published URL: https://altenens.is/threads/comet-65k-mix-mail-access-vaultcomet.2940891/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Sale of Hotmail combo list with 740 entries
    Category: Combo List
    Content: A threat actor shared a combo list of 740 Hotmail credentials, marketed as fresh and dated May 15. The list is intended for credential stuffing or unauthorized email access.
    Date: 2026-05-15T20:13:42Z
    Network: openweb
    Published URL: https://altenens.is/threads/740x-hotmail-fresh-mail-access-15-05.2940892/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Free Telegram OSINT/database search bot advertised on forum
    Category: Services
    Content: A forum user is sharing a free Telegram bot (@Leak4Base_Bot) that enables OSINT lookups by phone number, email, physical address, or username. The operator claims the bot indexes over 100 billion user data points from global sources. The service appears to aggregate leaked or scraped personal data to facilitate individual lookups.
    Date: 2026-05-15T20:12:36Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Telegram-Database-Searcher–188910
    Screenshots:
    None
    Threat Actors: threxian
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged data breach of Coinbase with 1 million customer records
    Category: Data Breach
    Content: A threat actor is selling an alleged database of 1 million Coinbase customer records. The dataset purportedly includes personally identifiable information (name, address, phone, email, IP, gender) as well as financial activity fields such as total deposits, withdrawals, deposit counts, and annual income. A sample is linked via Pastebin.
    Date: 2026-05-15T20:04:20Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-1M-COINBASE-LEADS
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  83. Combo List targeting Gmail accounts (4.5 million credentials)
    Category: Combo List
    Content: A threat actor has shared a combo list claimed to contain 4.5 million Gmail credentials, marketed as fresh and high quality. The post is sponsored by a third-party AIO service. Gmail is the credential-stuffing target, not the breach source.
    Date: 2026-05-15T19:46:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-4-5M-UHQ-GMAIL-COMBO-FRESH–2094329
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Sale of corporate SMTP combo list with 75,205 credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 75,205 email:password pairs marketed as corporate SMTP targets. The post was made on a public cracking forum. No additional details about the source or affected organizations are available.
    Date: 2026-05-15T19:45:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-75-205-Corp-SMTP-Target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Combo List targeting European and German shopping services
    Category: Combo List
    Content: A combo list containing 616,904 email:password lines is being shared, marketed as targeting European and German shopping platforms. No specific breached organization is identified; this appears to be a credential stuffing list intended for use against retail or e-commerce services.
    Date: 2026-05-15T19:45:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-616-904-Lines-%E2%9C%85-Europa-Germany-Shopping-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  86. Free combo list of 110K+ European email and password pairs
    Category: Combo List
    Content: A threat actor known as ImLupin (also referenced as TheLupin) shared a combo list containing over 110,000 European email and password pairs on a cracking forum. The credentials are described as SUHQ (super ultra high quality) and are marketed as suitable for credential stuffing across various services.
    Date: 2026-05-15T19:45:07Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-110k-EUROPE-MIX-MAIL-PASSWORD-DATA-SUHQ-FOR-EVERYTHING-05-15
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Sale of European mix combo list with 110K email:password credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing over 110,000 European email:password credential pairs, marketed as SUHQ (Super Ultra High Quality). The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-15T19:44:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-110k-europe-mix-mail-password-data-suhq-for-everything-05-15
    Screenshots:
    None
    Threat Actors: Helpz11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. Gmail Combo List with 1.4 Million Lines
    Category: Combo List
    Content: A threat actor shared a Gmail combo list containing approximately 1.4 million email:password lines, marketed as high quality. The list is intended for credential stuffing against Gmail accounts.
    Date: 2026-05-15T19:44:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-442-085-Lines-%E2%9C%85-Gmail-com-Combolist-HQ-LEaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Sale of 120K European combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of over 120,000 European email:password pairs, marketed as SUHQ (super ultra high quality) for credential stuffing purposes. The content is hidden behind a registration or login gate on the forum.
    Date: 2026-05-15T19:44:27Z
    Network: openweb
    Published URL: https://patched.to/Thread-120k-europe-mix-mail-password-data-suhq-for-everything-05-15
    Screenshots:
    None
    Threat Actors: Helpz11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Combo list of 1.2 million mixed mail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 1.2 million mixed email credentials, marketed as UHQ and fresh. The post is sponsored by an AIO checker service, suggesting the credentials are intended for credential stuffing use.
    Date: 2026-05-15T19:44:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-1-2M-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum user shared a combo list marketed as UHQ Hotmail login credentials. The content is hidden behind a registration or login wall, limiting visibility into the datas scope or origin.
    Date: 2026-05-15T19:43:56Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-hotmail-login-uhq-302783
    Screenshots:
    None
    Threat Actors: BuggracK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum thread on Cracked.st advertises a Hotmail UHQ combo list. The post content is a bump with no additional details provided about record count or data specifics.
    Date: 2026-05-15T19:43:39Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Hotmail-Login-UHQ–2094415
    Screenshots:
    None
    Threat Actors: BTC88
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Free release of 300K email:password combo list
    Category: Combo List
    Content: A threat actor operating under the alias CELESTIALHQ has freely distributed a combo list of approximately 300,000 email:password pairs, described as private and anti-public. The list is shared on a combolist forum with hidden content gated behind registration or login.
    Date: 2026-05-15T19:43:24Z
    Network: openweb
    Published URL: https://patched.to/Thread-legendary-%E2%9C%85email-pass%E2%9C%85-%E2%AD%90300k-full-anti-public-private-mail%E2%AD%90-%E2%9A%A1drop-by-celestial-admin%E2%9A%A1-302786
    Screenshots:
    None
    Threat Actors: CELESTIALHQ
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Free release of 300K email:password combo list
    Category: Combo List
    Content: A threat actor operating under the name CELESTIAL has freely distributed a combo list of approximately 300,000 email:password credential pairs, marketed as private and anti-public. The post offers the credentials at no charge while also advertising personal purchase options for additional drops.
    Date: 2026-05-15T19:43:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%85EMAIL-PASS%E2%9C%85-%E2%AD%90300K-FULL-ANTI-PUBLIC-PRIVATE-MAIL%E2%AD%90-%E2%9A%A1DROP-BY-CELESTIAL-ADMIN%E2%9A%A1–2094420
    Screenshots:
    None
    Threat Actors: CELESTIAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Combo List: 4K Valid Fresh Mix
    Category: Combo List
    Content: A threat actor has shared a combo list advertised as containing 4,000 valid, fresh mixed credentials. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-15T19:42:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-4k-valid-fresh-mix
    Screenshots:
    None
    Threat Actors: shhherrry
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Sale of discounted ChatGPT Plus accounts
    Category: Services
    Content: A threat actor is offering ChatGPT Plus accounts for $7.99, marketed as discounted alternatives to the standard $29 subscription. Accounts are advertised with instant delivery and payment via PayPal or cryptocurrency through an autobuy storefront.
    Date: 2026-05-15T19:42:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Shoppy-%E2%9A%A1%EF%B8%8F-CHATGPT-PLUS-1-MONTH-PRIVATE-ACCOUNT-%E2%9C%85-7-99-INSTEAD-OF-28-%E2%9C%85
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Combo List: URL:Login:Pass credentials shared on forum
    Category: Combo List
    Content: A forum user shared a combo list described as fresh URL:login:password credentials. The content is hidden behind a registration or login wall, limiting visibility into scope or origin. No specific organization or country is identified as the breach source.
    Date: 2026-05-15T19:42:25Z
    Network: openweb
    Published URL: https://patched.to/Thread-fresh-url-login-pass-private-302806
    Screenshots:
    None
    Threat Actors: ZAMPARA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  98. Sale of Hotmail credential combo list with 1,004 valid entries
    Category: Combo List
    Content: A forum post on a combolist section advertises 1,004 allegedly valid Hotmail credentials dated May 14, 2026. The content is hidden behind a registration or login wall, limiting further detail. The listed credentials are intended for use in credential stuffing against Hotmail accounts.
    Date: 2026-05-15T19:42:07Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%A5%801004-hotmail-valid-access-14-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Telegram content/account removal service offered on forum
    Category: Services
    Content: A forum user is advertising a paid service to remove Telegram channels, personal accounts, and bots. The seller accepts middleman (MM) arrangements and can be contacted via Telegram.
    Date: 2026-05-15T19:42:02Z
    Network: openweb
    Published URL: https://patched.to/Thread-doing-telegram-removals-fastest-cheapest
    Screenshots:
    None
    Threat Actors: ivebtc
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Hotmail combo list of 3,500 credentials freely distributed
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 3,500 Hotmail credential hits at no cost, with private cloud access available for purchase via Telegram. The credentials are marketed as high quality and are intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-15T19:41:50Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-3-5k-hq-hotmail-hit-%E2%9C%85
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Combo List targeting Hotmail with 953 alleged valid credentials
    Category: Combo List
    Content: A threat actor shared a combo list on a forum claiming to contain 953 valid Hotmail credentials, dated May 14, 2026. The content is gated behind registration or login. No additional details about the data source or composition are available.
    Date: 2026-05-15T19:41:33Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%A5%80953-hotmail-valid-access-14-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Hotmail combo list drop of 725 credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 725 Hotmail credentials on a leak forum. The content is hidden behind a registration or login requirement. No further details about the data origin or verification status are provided.
    Date: 2026-05-15T19:40:54Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%EF%B8%8F-725x-Verity-Vault-Hotmail-Drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Verityyyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Sale of fresh mix combo list with 102,164 lines
    Category: Combo List
    Content: A threat actor is sharing a mixed email:password combo list containing 102,164 lines, marketed as fresh. The content is gated behind forum registration or login. The actor promotes a Telegram channel for additional data distribution.
    Date: 2026-05-15T19:40:30Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-102-164-Lines-Fresh-Mix-Combolist
    Screenshots:
    None
    Threat Actors: stormtrooper
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged BreachForums Database Leak by ShinyHunters Group
    Category: Data Leak
    Content: ShinyHunters threat actor group claims to have obtained BreachForums database backup (bf_03_2026.sql.7z) following an unauthorized leak on January 9, 2026. The group states they have exploits for MyBB 1.8 versions and threatens to leak complete BreachForums backups including private messages, emails, IP addresses, and posts if current forum clones (.ai, .sb, .ac, .fi, .bf, .us) continue to operate. A downloadable SQL archive is provided via direct link.
    Date: 2026-05-15T19:32:54Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7894
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Cybercriminal Forum/Platform
    Victim Organization: BreachForums
    Victim Site: breachforums.ai, breachforums.sb, breachforums.ac, breachforums.fi, breachforums.bf, breachforums.us
  105. Sale of 300 SUHQ mix email access credentials
    Category: Combo List
    Content: A threat actor is sharing 300 so-called Super Ultra High Quality (SUHQ) mixed valid email access credentials on a clearnet forum. The post is categorized as a combo list offering, with credentials marketed as verified valid mail access. No specific victim organization or country is identified.
    Date: 2026-05-15T19:32:27Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttonmail-accesscheck-mark-button-star300x-full-suhq-mix-valids-star.2940872/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Sale of 5,000 EDU-targeted email and password combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 5,000 email:password pairs targeted at educational institutions. The post markets the credentials as verified hits. No specific organization or breach source is identified.
    Date: 2026-05-15T19:30:01Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttonemail-passcheck-mark-button-star5k-edu-targeted-combosstar-check-mark-buttonhits-assuredcheck-mark-button.2940873/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Sale of Hotmail combo list containing 100K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 100,000 Hotmail credentials, marketed as fresh. Access to the list requires a reply to the thread, suggesting a gated free release.
    Date: 2026-05-15T19:27:34Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttonprivate-hotmail-combocheck-mark-button-star100k-full-fresh-hotmail-combo-star.2940871/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Sale of 1 million username and password combo list with assured hits
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 1 million username, login, and password credentials marketed as private and with assured hits. Access to the hidden content requires a reply to the thread.
    Date: 2026-05-15T19:25:48Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttonu-l-pcheck-mark-button-star1m-full-private-u-l-pstar-check-mark-buttonhits-assuredcheck-mark-button.2940875/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Sale of 50,000 corporate-targeted email:password combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 50,000 corporate-targeted email:password pairs on a cybercrime forum. The post markets the credentials as yielding assured hits, suggesting prior validation. Access to the list requires forum engagement.
    Date: 2026-05-15T19:24:47Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttonemail-passcheck-mark-button-star50k-corp-targeted-combosstar-check-mark-buttonhits-assuredcheck-mark-button.2940874/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Sale of fullz, dumps with PIN, identity documents, and fraud tools by threat actor silasclark
    Category: Carding
    Content: A threat actor operating as silasclark is selling a broad range of fraud-enabling goods including fullz (SSN, DOB, DL), dumps with PIN (Track 101/202), identity documents with selfies and video, company and KYC documents, Medicare leads, and various carding tutorials and tools. Offerings span multiple countries including the USA, UK, Canada, and Australia. The seller accepts cryptocurrency and advertises bulk discounts with 24/7 support via Telegram and other channels.
    Date: 2026-05-15T19:21:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75391/
    Screenshots:
    None
    Threat Actors: silasclark
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  111. Sale of stolen credit cards and carding services including non-VBV cards, dumps, and cloned cards
    Category: Carding
    Content: A threat actor is offering stolen non-VBV credit cards with ATM PINs, dumps (101s/201s/211s), cloned cards, and stealer logs for sale via Telegram. The seller also advertises carding services for payment platforms including Cashapp, Venmo, PayPal, Google Pay, and Zelle, as well as order fraud services for DoorDash, UberEats, Walmart, and others. Payment is accepted in Bitcoin or CashApp.
    Date: 2026-05-15T19:18:59Z
    Network: openweb
    Published URL: https://xforums.st/threads/selling-ccs-non-vbv-used-for-any-online-payment-or-online-shopping-with-high-good-of-balance-in-each-of-my-cards-comes-with-atm-pin.615207/
    Screenshots:
    None
    Threat Actors: BraveLuck
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged data leak of fff.fr with 3.5 million French users
    Category: Data Leak
    Content: A threat actor has shared what is alleged to be a database dump from fff.fr containing approximately 3.5 million user records. The post was made on a known data breach forum. No additional details about the data fields or breach circumstances are available from the post content.
    Date: 2026-05-15T19:11:29Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-FFF-FR-3-5M-USERS-FRENCH
    Screenshots:
    None
    Threat Actors: xdbreachedww
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: FFF
    Victim Site: fff.fr
  113. Alleged Rockstar Games data breach – 78.6M+ Snowflake records leaked by ShinyHunters
    Category: Data Breach
    Content: ShinyHunters threat actor claims responsibility for compromising Rockstar Games Snowflake instances through Anodot.com integration breach. The group states 78.6M+ total records were compromised and is now distributing the data via direct download link. The post clarifies that contrary to earlier reports, the data was never for sale and is being leaked rather than ransomed.
    Date: 2026-05-15T19:00:23Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7893
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Entertainment/Gaming
    Victim Organization: Rockstar Games
    Victim Site: rockstargames.com
  114. Alleged data breach of Arrotex Pharmaceuticals
    Category: Data Breach
    Content: A threat actor is offering for sale approximately 2.5 TB of data allegedly exfiltrated from Arrotex Pharmaceuticals. The data purportedly includes confidential business documents such as recruitment records, partner and distributor information, agreements, finance documents, sales data, and business plans. The actor can be contacted via email for further details.
    Date: 2026-05-15T18:59:31Z
    Network: openweb
    Published URL: https://breached.st/threads/arrotex-pharmaceuticals-2-5-tb.87165/unread
    Screenshots:
    None
    Threat Actors: wower
    Victim Country: Australia
    Victim Industry: Healthcare
    Victim Organization: Arrotex Pharmaceuticals
    Victim Site: arrotex.com.au
  115. Alleged data leak of Podarok (podarok.co.il) — 5,802 Israeli user records
    Category: Data Leak
    Content: A threat actor leaked what they claim are 5,802 user records from the Israeli e-commerce site podarok.co.il. The exposed fields allegedly include names, email addresses, phone numbers, passwords, addresses, birthdays, and other account metadata. The data was shared freely on a public forum.
    Date: 2026-05-15T18:58:42Z
    Network: openweb
    Published URL: https://breached.st/threads/il-5802-isreal-userdata-leaks.87164/unread
    Screenshots:
    None
    Threat Actors: yra404
    Victim Country: Israel
    Victim Industry: Retail
    Victim Organization: Podarok
    Victim Site: podarok.co.il
  116. Alert: Unintelligible forum post requesting Discord data
    Category: Alert
    Content: A forum user posted an unintelligible request on a database forum with no substantive threat content or actionable information.
    Date: 2026-05-15T18:58:10Z
    Network: openweb
    Published URL: https://breached.st/threads/pls-data-discord.87166/unread
    Screenshots:
    None
    Threat Actors: sltfils
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged data leak of multiple Morocco government websites
    Category: Data Leak
    Content: A threat actor known as fexus claims to have leaked data from multiple Moroccan government websites across education and tax ministry domains. The leak includes at least nine identified subdomains with a combined total of approximately 78,082 lines of data. The data has been made available for free download via a file-sharing service.
    Date: 2026-05-15T18:57:41Z
    Network: openweb
    Published URL: https://breached.st/threads/gov-ma-websites-breach.87168/unread
    Screenshots:
    None
    Threat Actors: fexus
    Victim Country: Morocco
    Victim Industry: Government
    Victim Organization: Morocco Government
    Victim Site: gov.ma
  118. Forum posting and topic promotion service offered on dark web forums
    Category: Services
    Content: A threat actor operating under the alias digidi is selling a curated list of 180+ Russian and English-language shadow and general forums, alongside manual topic posting and bump/up services for advertisements. The service is priced at $13 for the forum list and $25–$50 minimum for posting campaigns, with payments accepted in USDT, LTC, and ETH. The offering targets those seeking to promote services or find sellers across dark web and shadow forums.
    Date: 2026-05-15T18:56:39Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-%F0%9F%8C%9F-LIST-OF-FORUMS-MANUAL-POSTING-OF-YOUR-TOPICS-ON-FORUMS-UP-BUMPING-OF-TOPICS-%F0%9F%8C%9F
    Screenshots:
    None
    Threat Actors: digidi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Alleged sale of Nighthawk C2 v0.4 Janus source code on dark web
    Category: Malware
    Content: Source code for Nighthawk C2 version 0.4 Janus (reportedly the final version) is allegedly being sold on threat markets at approximately $7,500 USD, down from the original sellers asking price of $10,000 USD. The source code has reportedly been dumped and is being sold at discounted prices on dark web marketplaces.
    Date: 2026-05-15T18:44:15Z
    Network: telegram
    Published URL: https://t.me/c/3575098403/203
    Screenshots:
    None
    Threat Actors: Nighthawk C2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  120. Alleged leak of US consumer dataset containing 202 million records
    Category: Data Leak
    Content: A threat actor shared a link to a large compressed file purportedly containing data on 202 million US consumers. The dataset, approximately 20.6 GB in size, was made available via a file-sharing service. The source organization of the data is not identified in the post.
    Date: 2026-05-15T18:40:29Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-I-stuck-this-on-Upgraded-Lounge-under-An-idea-for-Data-sorter-LLM-Ai
    Screenshots:
    None
    Threat Actors: OriginalCrazyOldFart
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Alleged compromise of Ghana Military website (ga.mil.gh) with webshell access
    Category: Initial Access
    Content: Threat actors claiming to have compromised the Ghana Military website (ga.mil.gh) and deployed a webshell (rex.php). Access is being offered for sale with contact via @PHTEAM_1. Attributed to shadowX and members from Nullsec Philippines (n.s.p).
    Date: 2026-05-15T18:39:34Z
    Network: telegram
    Published URL: https://t.me/Pharaoh_e/28
    Screenshots:
    None
    Threat Actors: shadowX
    Victim Country: Ghana
    Victim Industry: Government/Military
    Victim Organization: Ghana Military
    Victim Site: ga.mil.gh
  122. Alleged data leak of wateenapp.org — Saudi Arabia blood donor database
    Category: Data Leak
    Content: A threat actor has leaked a database allegedly obtained from wateenapp.org, the official Saudi Ministry of Health blood donation application. The exposed data reportedly includes donor names, blood groups, gender, donation dates, mobile numbers, ID numbers, blood bag numbers, blood bank details, and donation status for approximately 180,438 blood donors. The data is being made available for free download on the forum.
    Date: 2026-05-15T18:38:51Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-SA-wateenapp-org-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: lulzintel
    Victim Country: Saudi Arabia
    Victim Industry: Healthcare
    Victim Organization: Wateen
    Victim Site: wateenapp.org
  123. Alleged data breach of Binance Australia – 470K records
    Category: Data Breach
    Content: A threat actor claiming to possess a database of 470,000 Binance Australia user records is offering the data for sale at 3000 USD. The dataset includes personal identifiable information (ID, firstname, lastname, country, email, phone, date, trading pair, exchange data). The threat actor is attributed as DanzNismXst7.
    Date: 2026-05-15T18:36:23Z
    Network: telegram
    Published URL: https://t.me/c/3841736872/446
    Screenshots:
    None
    Threat Actors: DanzNismXst7
    Victim Country: Australia
    Victim Industry: Cryptocurrency Exchange
    Victim Organization: Binance
    Victim Site: binance.com
  124. Sale of UHQ Hotmail combo list containing 15K credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 15,000 Hotmail credentials marketed as UHQ (ultra-high quality) and fresh. The list is advertised on a criminal forum and appears intended for credential stuffing against Hotmail/Outlook accounts.
    Date: 2026-05-15T18:35:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-15K-UHQ-HOTMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  125. Combo List: UHQ Outlook Credentials (6.5K)
    Category: Combo List
    Content: A threat actor is distributing a combo list of 6,500 Outlook credentials, marketed as UHQ (ultra-high quality) and fresh. The post is sponsored by a third-party AIO tool service.
    Date: 2026-05-15T18:35:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-6-5K-UHQ-OUTLOOK-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  126. Sale of UHQ Gmail combo list with 150,000 credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list marketed as 150,000 UHQ Gmail credentials described as fresh. The post is sponsored by slateaio.com, suggesting association with credential-stuffing tooling. Gmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T18:34:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-150K-UHQ-GMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  127. Combo List: Alleged Hotmail valid mail access credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 1,290 allegedly valid Hotmail email account credentials. The content is hidden behind a registration or login wall on the forum. These credentials appear to be marketed as fully valid mail access.
    Date: 2026-05-15T18:34:33Z
    Network: openweb
    Published URL: https://patched.to/Thread-1290-full-valid-hotmail-mail-access-302754
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 8,335 alleged full valid Hotmail email account credentials. The credentials are marketed as active and verified mail access. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T18:34:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-8335-FULL-VALID-HOTMAIL-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Combo List: Alleged Hotmail credential list with 8,335 valid entries
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as containing 8,335 fully valid Hotmail mail access credentials. The content is hidden behind a registration or login wall on the forum. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T18:34:12Z
    Network: openweb
    Published URL: https://patched.to/Thread-8335-full-valid-hotmail-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Combo List: Alleged Hotmail Credential Hits
    Category: Combo List
    Content: A forum user is distributing a combo list advertised as 1,238 fully valid Hotmail email account credentials. The content is hidden behind a registration or login wall. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T18:33:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-1238-full-valid-hotmail-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Sale of UHQ Yahoo combo list (7.3K credentials)
    Category: Combo List
    Content: A threat actor is sharing a combo list of 7.3K credentials marketed as UHQ and fresh, targeting Yahoo accounts. The post is sponsored by an AIO (all-in-one) checker service. No victim organization is identified as the source of the credentials.
    Date: 2026-05-15T18:33:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-7-3K-UHQ-YAHOO-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  132. Sale of mixed email access combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 2,874 reportedly valid mixed email account credentials. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-15T18:33:34Z
    Network: openweb
    Published URL: https://patched.to/Thread-2874-full-valid-mix-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Combo List of mixed email account credentials
    Category: Combo List
    Content: A combo list of 2,874 allegedly valid mixed email account credentials was shared on a cracking forum. The post is categorized under combolists and marketed as full valid access across multiple email providers.
    Date: 2026-05-15T18:33:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-2874-FULL-VALID-MIX-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  134. Sale of mix mail access combo list
    Category: Combo List
    Content: A threat actor is sharing or selling a combo list of 1,063 reportedly valid mixed mail access credentials. The content is hidden behind a registration or login wall, limiting visibility into specific details.
    Date: 2026-05-15T18:33:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-1063-full-valid-mix-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Combo List of mixed mail account credentials
    Category: Combo List
    Content: A combo list of 3,867 allegedly valid mixed mail account credentials was shared on a cracking forum. The post is categorized under combolists and marketed as fully valid mail access.
    Date: 2026-05-15T18:33:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-3867-FULL-VALID-MIX-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  136. Sale of mix mail access combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 3,659 claimed valid mixed mail access credentials. The content is hidden behind a registration or login wall, limiting visibility into the specific providers or data fields included.
    Date: 2026-05-15T18:32:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-3659-full-valid-mix-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  137. Alleged combo list of 1,701 valid mixed mail access credentials
    Category: Combo List
    Content: A forum user shared a combo list of 1,701 reportedly valid mixed email account credentials. The post is categorized as a combo list of mail access credentials. No additional details are available from the post content.
    Date: 2026-05-15T18:32:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-1701-FULL-VALID-MIX-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Sale of Hotmail combo list with 100 credentials
    Category: Combo List
    Content: A threat actor on a cybercrime forum is distributing a combo list of approximately 100 Hotmail credentials, marketed as elite with no junk entries. The content is hidden behind a registration or login requirement, limiting full verification of the claimed data.
    Date: 2026-05-15T18:32:26Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1-0-1k-elite-global-hotmail-zero-junk-pure-hits-%E2%9A%A1-302745
    Screenshots:
    None
    Threat Actors: NokiaDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  139. Sale of mixed mail access combo list with 5,229 entries
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list advertised as 5,229 fully valid mixed mail access credentials. No additional details are available from the post content.
    Date: 2026-05-15T18:32:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-5229-FULL-VALID-MIX-MAIL-ACCESS–2094389
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  140. Sale of multi-country combo list with ULP and mail lines
    Category: Combo List
    Content: A threat actor operating under the alias Coolconfigcloud is offering free and paid access to daily-updated ULP and mail combo lines sourced from multiple countries. Free lines are publicly available, while premium tiers are priced between $15 and $250 depending on subscription duration. The service is marketed as providing high-quality, consistently fresh credential lines.
    Date: 2026-05-15T18:32:06Z
    Network: openweb
    Published URL: https://patched.to/Thread-%F0%9F%8C%A9-cool-cloud-%F0%9F%8C%A9-%F0%9F%93%A8-multiple-country-base-%F0%9F%93%A8-%F0%9F%94%A5-hq-mails-%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: Coolconfigcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  141. Sale of Hotmail combo list with 822 valid credentials
    Category: Combo List
    Content: A forum post advertises 822 reportedly valid Hotmail email account credentials. The post is categorized as a combo list offering, with credentials likely harvested from prior breaches and verified for access. No additional details are available in the post content.
    Date: 2026-05-15T18:31:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-822-FULL-VALID-HOTMAIL-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Free combo list shared on forum
    Category: Combo List
    Content: A forum user shared a free ULP (URL:Login:Password) combo list on a cybercrime forum. The content is hidden behind a login/registration wall, so specific details about the data are unavailable.
    Date: 2026-05-15T18:31:36Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90free-ulp%E2%AD%90
    Screenshots:
    None
    Threat Actors: databreach
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Sale of mixed mail access combo list
    Category: Combo List
    Content: A forum post on Cracked.st advertises 2,030 allegedly valid mixed mail access credentials. No additional details are available as the post content is empty.
    Date: 2026-05-15T18:31:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-2030-FULL-VALID-MIX-MAIL-ACCESS–2094406
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Free distribution of mixed UHQ combo list with 3,000 credentials
    Category: Combo List
    Content: A threat actor shared a mixed combo list marketed as UHQ (ultra-high quality) and fresh, containing approximately 3,000 credential pairs. The list was made available via an external paste link on rentry.co.
    Date: 2026-05-15T18:31:05Z
    Network: openweb
    Published URL: https://patched.to/Thread-3k-mix-uhq-fresh
    Screenshots:
    None
    Threat Actors: HolyCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  145. Sale of discounted Framer Pro subscription access on cybercrime forum
    Category: Services
    Content: A forum seller is offering 1-year Framer Pro access at $44.99, advertised as 88% off the official price of $360/year. The nature of the access — whether legitimate, shared, or obtained through unauthorized means — is not disclosed in the post.
    Date: 2026-05-15T18:30:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-44-99-%E2%9C%85-Build-Stunning-Websites-Faster-with-Framer-Pro-%E2%80%94-Now-at-88-OFF-1-Year-Pro-A–2094364
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  146. Sale of mixed mail access combo list with 4,542 entries
    Category: Combo List
    Content: A threat actor is offering a combo list of 4,542 alleged valid mixed email account credentials. The content is hidden behind a registration or login wall on the forum. No specific email provider or target service is identified in the post.
    Date: 2026-05-15T18:30:35Z
    Network: openweb
    Published URL: https://patched.to/Thread-4542-full-valid-mix-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  147. Combo List targeting smtp.office365.com
    Category: Combo List
    Content: A forum post on PT – Combolist advertises a credential list targeting smtp.office365.com. The actual content is hidden behind a login/registration wall, so specific details such as record count and data composition are unavailable.
    Date: 2026-05-15T18:30:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-smtp-office365-com
    Screenshots:
    None
    Threat Actors: Flexedz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  148. Combo List of 4 million URL:login:password credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 4 million URL, login, and password combinations. The content is gated behind forum registration or login. No specific victim organization or targeted service is identified.
    Date: 2026-05-15T18:29:53Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90-4-million-url-login-pass%E2%AD%90
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  149. Combo List: Alleged Hotmail credential list with 6,071 entries
    Category: Combo List
    Content: A forum user is sharing a combo list advertised as containing 6,071 fully valid Hotmail email access credentials. The content is hidden behind a registration or login requirement. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T18:29:46Z
    Network: openweb
    Published URL: https://patched.to/Thread-6071-full-valid-hotmail-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Alleged leak of Claude API keys with token balance
    Category: Data Leak
    Content: A threat actor is freely sharing alleged Anthropic Claude API keys with approximately 2 million tokens of remaining balance. The post offers a free sample and directs users to hidden content requiring forum registration to access the full set of leaked keys.
    Date: 2026-05-15T18:29:34Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90-2-million-tokens-claude-opus-4-7-and-more-api-key-%E2%AD%90
    Screenshots:
    None
    Threat Actors: JVZU
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Anthropic
    Victim Site: anthropic.com
  151. Combo List: 753 Valid Hotmail Credentials Shared
    Category: Combo List
    Content: A forum user is sharing 753 allegedly valid Hotmail email account credentials. The content is hidden behind a registration or login wall. These credentials are marketed as fully valid mail access.
    Date: 2026-05-15T18:29:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-753-full-valid-hotmail-mail-access-302762
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Sale of Hotmail combo list with 764 entries
    Category: Combo List
    Content: A threat actor is distributing a combo list of 764 Hotmail email and password pairs, marketed as high quality. The credentials are intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-15T18:29:05Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-764x-HQ-PREMIUM-HOTMAILS-%E2%9D%84%E2%9D%84–204190
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Sale of fresh mix combo list with 444 credentials
    Category: Combo List
    Content: A threat actor shared a link to an external paste site containing a mix combo list advertised as fresh, consisting of approximately 444 credential pairs.
    Date: 2026-05-15T18:28:46Z
    Network: openweb
    Published URL: https://patched.to/Thread-444x-fresh-mix
    Screenshots:
    None
    Threat Actors: HolyCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  154. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 6,000 Hotmail credentials, marketed as high-quality hits. The content is gated behind forum registration or login and may be freely shared or sold.
    Date: 2026-05-15T18:28:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85-6k-hq-hotmail-hit-%E2%9C%85-302770
    Screenshots:
    None
    Threat Actors: RetroCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of 564 Hotmail email and password pairs, marketed as premium and fresh. The list is offered as a free download on a dark web forum.
    Date: 2026-05-15T18:28:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1564x-PREMIUM-FRESH-HOTMAILS-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Combo List of 3,340 mixed email credentials shared
    Category: Combo List
    Content: A forum user shared a combo list containing 3,340 mixed email and password credentials. The content is hidden behind a login/registration wall. No specific targeted service or breach source is identified.
    Date: 2026-05-15T18:27:40Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3340x-MIX-MAIL
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Sale of 1,300 Hotmail account credentials
    Category: Combo List
    Content: A forum post advertises 1,300 Hotmail account credentials. The thread appears to be sponsored by a proxy and SMS verification service. No further details about the source or validity of the accounts are provided.
    Date: 2026-05-15T18:27:23Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1300-Hotmail-Accounts–2294846
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Sale of mixed email combo list
    Category: Combo List
    Content: A threat actor is offering a mixed mail combo list of approximately 1,100 lines on a cracking forum. The post is sponsored by a proxy and SMS verification service. No specific victim organization or breach source is identified.
    Date: 2026-05-15T18:27:04Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1100-Mixed-Mail-Lines–2294847
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Sale of 36K mixed mail access combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 36,000 mixed email account credentials. The content is hidden behind a registration or login requirement on the forum. No specific targeted service or organization is identified.
    Date: 2026-05-15T18:26:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-36K-MIXED-MAIL-ACCESS-GOODS
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. Sale of 1,400 Hotmail account credentials
    Category: Combo List
    Content: A forum post advertises 1,400 Hotmail account credentials. The post appears to be sponsored by a proxy and SMS verification service. No additional details about the source or validity of the credentials are provided.
    Date: 2026-05-15T18:26:43Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1400-Hotmail-Accounts–2294848
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Sale of mixed mail combo list (2,200 lines)
    Category: Combo List
    Content: A forum user shared a mixed mail combo list containing 2,200 lines. The post is sponsored by a proxy and SMS verification service. No specific breach source or target service is identified.
    Date: 2026-05-15T18:26:22Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X2200-Mixed-Mail-Lines–2294849
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Sale of 8K mixed email access combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 8,000 mixed email credentials, marketed as fresh. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-15T18:26:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-8K-FRESH-MAIL-ACCESS-MIX
    Screenshots:
    None
    Threat Actors: AlphaCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Sale of 1,800 Hotmail account credentials
    Category: Combo List
    Content: A forum post advertises 1,800 Hotmail accounts in a cracking forum. The post appears to be sponsored by a proxy and SMS verification service. No further details about the data source or contents are provided.
    Date: 2026-05-15T18:26:02Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1800-Hotmail-Accounts–2294850
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Sale of 2,500 mixed email credential combo list
    Category: Combo List
    Content: A forum post advertises 2,500 mixed email lines, consistent with a combo list offering. The post appears to be sponsored by a proxy and SMS verification service. No additional details about the source or content of the credentials are provided.
    Date: 2026-05-15T18:25:42Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X2500-Mixed-Mail-Lines–2294851
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Sale of 140K Germany UHQ Fresh Combolist
    Category: Combo List
    Content: A threat actor is offering a 140,000-record German email:password combolist marketed as UHQ (ultra-high quality) and fresh. The content is hidden behind registration or login, with the actor also advertising spamming, dumping, and cracking tools and lessons via Telegram.
    Date: 2026-05-15T18:25:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-140K-GERMANY-UHQ-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Sale of 265K Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering a 265K Hotmail email:password combo list described as semi-private and high quality. The content is gated behind registration or login, with the seller also advertising combo, spamming, dumping, and cracking tools and lessons via Telegram.
    Date: 2026-05-15T18:25:02Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-265K-HOTMAIL-Semi-Private-HQ-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Combo List: Mixed email credentials shared on forum
    Category: Combo List
    Content: A forum user is distributing a mixed email combo list marketed as private and fresh, verified by the poster. The content is hidden behind a login/registration wall, limiting visibility into the full scope of the dataset.
    Date: 2026-05-15T18:24:44Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1MIX-MAIL%E2%9A%A1%E2%9A%A1PRIVATE%E2%9A%A1%E2%9A%A1FRESH%E2%9A%A1%E2%9A%A1CHEKED-BY-klyne05-%E2%9A%A1%E2%9A%A1–20688
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  168. Sale of 310K USA email:password combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 310,000 USA email:password credential pairs on a dark web forum. The content is hidden behind registration/login, with the seller also advertising cracking, spamming, and dumping tools and services via Telegram.
    Date: 2026-05-15T18:24:26Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-310K-USA-Good-Quality-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  169. Free combo list release: 2,300 mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 2,300 mixed credentials, marketed as fresh. The content is gated behind forum registration or login.
    Date: 2026-05-15T18:24:22Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-2300x-FRESH-MIX-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Nulled07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Hotmail combo list sample shared on leak forum
    Category: Combo List
    Content: A sample combo list of 1,210 Hotmail credentials was shared on a leak forum. The content is hidden behind a registration or login wall. This post targets Hotmail as a credential-stuffing service, not as the breach origin.
    Date: 2026-05-15T18:23:59Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-1210x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Stevejobs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Sale of HQ combo list targeting Mexico with 285K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 285,000 email:password pairs marketed as high-quality and associated with Mexican users. The post advertises additional services including spamming, dumping, and cracking tools. Contact is provided via Telegram.
    Date: 2026-05-15T18:23:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-285K-MEXICO-HQ-Good-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  172. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum member is sharing a combo list purportedly containing 318 Hotmail account credentials. The content is hidden behind a registration or login wall. No further details about the data source or composition are available from the post.
    Date: 2026-05-15T18:23:37Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-318x-HOTMAIL-ACCESS
    Screenshots:
    None
    Threat Actors: MeiMisakix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Free Hotmail combo list shared on leak forum
    Category: Combo List
    Content: A user on a leak forum shared a combo list of 1,762 Hotmail credentials, marketed as high quality. The content is hidden behind a registration or login wall.
    Date: 2026-05-15T18:23:15Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-X1762-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: stevee
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Sale of Gmail combo list with 1.5 million credentials
    Category: Combo List
    Content: A threat actor is offering a Gmail combo list containing approximately 1.5 million email and password pairs. The content is hidden behind a registration or login wall on the forum. The actor also advertises related services including spamming, dumping, and cracking tools via Telegram.
    Date: 2026-05-15T18:22:59Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-5M-GMAIL-Good-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Sale of UHQ mix combo list including Hotmail and private cloud credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 2,873 validated credentials marketed as UHQ mix, including Hotmail and private cloud accounts. The content is hidden behind a registration wall and the actor advertises via Telegram.
    Date: 2026-05-15T18:22:53Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-X2873-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Free combo list of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 3,759 mixed email credentials, marketed as high quality. The list was made available for free download on the forum.
    Date: 2026-05-15T18:22:21Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-3759x-HQ-PREMIUM-MIXED-MAILS-%E2%9D%84%E2%9D%84
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Sale of combo sorting tool for credential list organization
    Category: Combo List
    Content: A forum user is offering a combo sorting tool in the cracking tools section. The tool appears designed to sort or organize credential combo lists. Full details are hidden behind a registration or login wall.
    Date: 2026-05-15T18:22:17Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-COMBO-SORTER-Quick-tool-made-for-sorting
    Screenshots:
    None
    Threat Actors: nexuss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  178. Sale of full database and admin access to Tata-Tour.com (Travel Agency, Djibouti)
    Category: Initial Access
    Content: A threat actor is offering for sale full database access and admin credentials to tata-tour.com, a Djibouti-based travel agency. The offering includes a 135-table PostgreSQL dump containing bookings, CRM data, payment transactions, and client contact information, as well as active admin account credentials and direct database connection strings. The asking price is $1,000 in cryptocurrency.
    Date: 2026-05-15T18:21:10Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Tata-Tour-com-%E2%80%94-Full-Website-Database-Access-Travel-Agency-Djibouti
    Screenshots:
    None
    Threat Actors: TrinityID
    Victim Country: Djibouti
    Victim Industry: Travel & Tourism
    Victim Organization: Tata Tour
    Victim Site: tata-tour.com
  179. Sale of full database access to Hablax.com (VividPlate) restaurant platform in Ethiopia
    Category: Initial Access
    Content: A threat actor is selling full database access to Hablax.com (VividPlate), an Ethiopian restaurant platform. The offering includes a PostgreSQL database dump with 55 user records spanning restaurants, agents, cashiers, and waiters, along with order and payment data. The seller also claims active superadmin account access and direct PostgreSQL connectivity, priced at $300.
    Date: 2026-05-15T18:19:27Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Hablax-com-VividPlate-%E2%80%94-Full-Database-Access-Restaurant-Platform-Ethiopia
    Screenshots:
    None
    Threat Actors: TrinityID
    Victim Country: Ethiopia
    Victim Industry: Food & Beverage
    Victim Organization: Hablax / VividPlate
    Victim Site: hablax.com
  180. Sale of CVVs, Dumps, Fullz, BINs, and Carding Methods for Multiple Countries
    Category: Carding
    Content: A threat actor is offering stolen payment card data including CVVs, dumps, fullz, and BINs for the United States, United Kingdom, Canada, and Australia across multiple card networks (Visa, Mastercard, Amex, Discover). The seller also advertises fraudulent booking services covering flights, hotels, car rentals, and retail orders. Contact is solicited via Telegram and WhatsApp.
    Date: 2026-05-15T18:10:31Z
    Network: openweb
    Published URL: https://altenens.is/threads/hellooo-everyone-cvv-dumps-fullz-bins-and-methods-available-bookings-flight-booking-air-bnb-hotel-apartments-apple-orders-car-rentals-f.2940819/unread
    Screenshots:
    None
    Threat Actors: briteny
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Sale of CashApp and PayPal account linking service for fraudulent cashout
    Category: Carding
    Content: A threat actor is advertising a CashApp and PayPal account linking scheme, claiming to provide linkable accounts for quick cashout. The post targets beginners and solicits verified accounts from other forum members. Contact is offered via Telegram and WhatsApp.
    Date: 2026-05-15T18:10:00Z
    Network: openweb
    Published URL: https://altenens.is/threads/cashapp-linkable-and-paypal-linkable-i-just-need-a-verified-account-tap-in-lets-work-official1dae-firefire.2940841/unread
    Screenshots:
    None
    Threat Actors: clevie339
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  182. Website Defacement of Unity Times Nigeria by Threat Actor Y4NZ404
    Category: Defacement
    Content: On May 16, 2026, threat actor Y4NZ404 operating solo defaced the homepage of unitytimesng.com, a Nigerian news media outlet. The attack was a targeted single-site homepage defacement with no indication of mass defacement activity. The incident was mirrored and archived on zone-xsec.com.
    Date: 2026-05-15T18:07:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922668
    Screenshots:
    None
    Threat Actors: Y4NZ404, SOLO
    Victim Country: Nigeria
    Victim Industry: Media & News
    Victim Organization: Unity Times Nigeria
    Victim Site: unitytimesng.com
  183. Sale of RCE and SSH access to multiple organizations across multiple countries
    Category: Initial Access
    Content: A threat actor is offering RCE and SSH access to multiple organizations spanning various countries and sizes, described as ranging from small to large corporations. The seller claims all access is private with proof-of-concept available, and is advertising below-market pricing.
    Date: 2026-05-15T18:07:29Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Selling-RCE-SSH-Access-Looking-for-Buyer
    Screenshots:
    None
    Threat Actors: apolloteller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Sale of ULP combo lists from Europe and worldwide
    Category: Combo List
    Content: A threat actor is selling ULP (URL:Login:Password) combo lists sourced from Europe and other regions. The seller is advertising the credentials as good quality and is accepting contact via direct message or Telegram.
    Date: 2026-05-15T18:07:02Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-ULP-combos
    Screenshots:
    None
    Threat Actors: JohnnyMorton
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Sale of compromised law enforcement and government portal access with EDR bypass capabilities
    Category: Initial Access
    Content: A threat actor is selling alleged direct portal access to law enforcement and government entities across multiple countries, including Royal Thai Police, Brazil Military Police, Argentina Police, Malaysia Government, and others. The offering includes claimed capabilities for Emergency Disclosure Request (EDR) bypasses on major platforms such as Instagram, Facebook, TikTok, Snapchat, Microsoft, and Apple, enabling unauthorized data retrieval without legal process. The seller also advertises forge
    Date: 2026-05-15T18:05:20Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Gov-Access-EDR-Execution-Global-Inventory
    Screenshots:
    None
    Threat Actors: 0056115
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Alleged data leak of South Korean platform bestexp.co.kr
    Category: Data Leak
    Content: A threat actor is freely distributing an alleged database dump from the South Korean website bestexp.co.kr. The dataset reportedly contains approximately 11,000 user records including 6,000 email and SHA1-hashed password pairs.
    Date: 2026-05-15T17:59:42Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-%E2%AD%90-South-Korea-Database-bestexp-co-kr-%E2%AD%90-11K-User%E2%AD%90-6K-Password-Email-SHA1
    Screenshots:
    None
    Threat Actors: KoreanAshley
    Victim Country: South Korea
    Victim Industry: Unknown
    Victim Organization: bestexp.co.kr
    Victim Site: bestexp.co.kr
  187. Alleged data leak of South Korean e-commerce platform magicseller.co.kr
    Category: Data Leak
    Content: A threat actor has freely shared an alleged database dump from magicseller.co.kr, a South Korean platform. The sample includes SQL table schema containing fields for user credentials, email addresses, names, IP addresses, and social media account references.
    Date: 2026-05-15T17:59:14Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-%E2%AD%90%EF%B8%8F-South-Korea-Database-magicseller-co-kr-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: KoreanAshley
    Victim Country: South Korea
    Victim Industry: Retail
    Victim Organization: Magic Seller
    Victim Site: magicseller.co.kr
  188. Alleged data leak of djaboo.com — 25GB SQL and files
    Category: Data Leak
    Content: A threat actor has leaked approximately 25GB of SQL database files and system files allegedly sourced from djaboo.com. The post includes download links to a full database dump and archive files. Notable email addresses from various financial institutions and data protection contacts were observed within the dataset.
    Date: 2026-05-15T17:57:31Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-djaboo-com-25Gb-sql-files-Leaked
    Screenshots:
    None
    Threat Actors: justscyprus
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Djaboo
    Victim Site: djaboo.com
  189. Mix Mail Combo List Including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live
    Category: Combo List
    Content: A threat actor shared a mixed mail combo list targeting multiple email providers including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live. The credentials are gated behind a reply requirement and linked to a Telegram channel. No record count or additional details were disclosed in the post.
    Date: 2026-05-15T17:54:29Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-mail-combo-hotmail-outlook-aol-gmx-inbox-icloud-live-2026-5-12.2940806/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Hotmail access combo list with 3,350 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list of 3,350 Hotmail credentials sourced from users across the USA, Europe, Asia, and Russia. The content is hidden behind a reply gate. The list is marketed as verified access hits suitable for credential stuffing.
    Date: 2026-05-15T17:53:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/3-350x-hotmail-access-combo-usa-europe-asia-russian.2940804/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  191. Alleged sale of RDP access and compromised cloud service accounts
    Category: Initial Access
    Content: Threat actor PORTAL is offering rental of RDP access to Azure, AWS, and DigitalOcean infrastructure ($200), along with compromised domain email accounts (Gmail, Yahoo), GitHub student accounts, ChatGPT Plus subscriptions, and Claude 20x plan accounts. Services offered on daily/monthly rental basis with escrow payment option.
    Date: 2026-05-15T17:51:25Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82257
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Combo List of 295K Gaming Credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 295,000 email and password pairs described as high-quality gaming credentials. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-15T17:42:34Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-295K-Gaming-HQ-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Combo List targeting Hotmail with 394K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 394,000 email and password pairs marketed for use against Hotmail accounts. The post was made on BreachForums under the Combolists section. No additional details are available as the post content was not captured.
    Date: 2026-05-15T17:40:52Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Hotmail-394K-Email-Pass–188875
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  194. Combo List of 13K Mixed Email and Password Credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list containing approximately 13,000 mixed email and password credential pairs on a cybercrime forum. The content is gated behind a registration or login requirement. No specific targeted organization or service is identified.
    Date: 2026-05-15T17:39:26Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-13K-Mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  195. Sale of education sector combo list with 53K email/password pairs
    Category: Combo List
    Content: A combo list containing approximately 53,000 education-sector email and password pairs was shared on BreachForums. No additional details are available from the post content.
    Date: 2026-05-15T17:39:01Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Edu-53K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Sale of French email:password combo list with 10,000 credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 10,000 email and password pairs purportedly associated with French accounts. The content is gated behind forum registration or login. No specific breached organization is identified.
    Date: 2026-05-15T17:37:33Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-FR-10K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Combo list mix of 5K email and password credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 5,000 email and password pairs. The list is described as a mixed combo, suggesting credentials sourced from multiple services or breaches. No additional details are available from the post content.
    Date: 2026-05-15T17:37:05Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Good-Mix-5K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Sale of Hotmail credential combo list with 1,961 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list of 1,961 alleged valid Hotmail credentials marketed as premium hits. The post describes the content as a mix of mail formats stored on private cloud infrastructure.
    Date: 2026-05-15T17:35:26Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1961x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: xdalphaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Sale of MSN combo list with 175K email and password pairs
    Category: Combo List
    Content: A threat actor is distributing a combo list of 175,000 MSN email and password pairs on a cybercrime forum. The content is hidden behind a registration or login requirement. MSN is the credential-stuffing target, not the breach source.
    Date: 2026-05-15T17:34:58Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Msn-175K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Combo List of Narod.ru Email and Password Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of email and password credentials associated with Narod.ru accounts on a cybercrime forum. The content is gated behind forum registration or login. No record count or additional details were provided.
    Date: 2026-05-15T17:33:17Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Narod-ru-Email-Pass
    Screenshots:
    None
    Threat Actors: hansa__
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  201. Combo list targeting Hotmail with 16K email/password pairs
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 16,000 Hotmail email and password pairs on a cybercrime forum. The content is hidden behind a registration or login requirement. This list is intended for credential stuffing or account takeover activity targeting Hotmail accounts.
    Date: 2026-05-15T17:31:34Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Hotmail-16K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Combo list: 2.6K fresh mail access mix
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 2,600 email account credentials marketed as fresh. The post is dated May 15 and was shared on a known cybercrime forum.
    Date: 2026-05-15T17:29:53Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-2-6K-Fresh-Mail-Access-Mix-15-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Combo List targeting Neuf.fr with 29K email/password pairs
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 29,000 email and password pairs associated with neuf.fr accounts on a cybercrime forum. The content is hidden behind a registration or login requirement. Neuf.fr is a French ISP-linked email service and is referenced as a credential-stuffing target, not necessarily the breach source.
    Date: 2026-05-15T17:28:25Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Neuf-fr-29K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  204. Combo List targeting Numericable.fr users with 34K credentials
    Category: Combo List
    Content: A combo list of approximately 34,000 email and password pairs associated with Numericable.fr accounts was shared on BreachForums. The post contains no additional details about the origin or validity of the credentials.
    Date: 2026-05-15T17:27:58Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Numericable-fr-34K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  205. Combo List targeting Poland with 68K email/password pairs
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 68,000 email and password pairs purportedly associated with Polish users. The content is hidden behind a registration/login wall on the forum. No specific breached organization is identified.
    Date: 2026-05-15T17:26:33Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Poland-68K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  206. Sale of combo list targeting optonline.net with 12K credentials
    Category: Combo List
    Content: A combo list of approximately 12,000 email and password pairs associated with optonline.net accounts was posted on a cybercrime forum. The post appears in a combolists section, suggesting the credentials may be intended for credential stuffing or account takeover activity.
    Date: 2026-05-15T17:26:03Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-optonline-net-12K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  207. Sale of combo list targeting onet.pl users with 30K email/password pairs
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 30,000 email and password pairs associated with onet.pl accounts. The content is hidden behind a registration or login requirement on the forum. This appears to be a credential stuffing list rather than a direct breach of onet.pl.
    Date: 2026-05-15T17:24:37Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-onet-pl-30K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Combo List targeting Nate.com with 12K email/password pairs
    Category: Combo List
    Content: A threat actor has shared a combo list of approximately 12,000 email and password pairs marketed for use against Nate.com. The content is gated behind forum registration or login. This is a credential stuffing list and does not represent a direct breach of Nate.com.
    Date: 2026-05-15T17:24:10Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Nate-com-12K-Email-Pass–188893
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Sale of mixed email credential hits including Hotmail and private cloud accounts
    Category: Combo List
    Content: A threat actor is distributing a set of 3,731 credential hits described as a premium mixed mail combo list, including Hotmail and private cloud accounts. The post provides a download link and references a Telegram contact for further access.
    Date: 2026-05-15T17:22:29Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9A%A1%E2%9A%A1-3731x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: xdalphaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  210. Sale of 1,536 verified Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a list of 1,536 Hotmail credentials marketed as recently verified and active. The list was distributed via an external paste service.
    Date: 2026-05-15T17:19:57Z
    Network: openweb
    Published URL: https://breached.st/threads/fire-fresh-drop-1-536-valid-hotmail-accounts-envelope-with-arrow.87154/unread
    Screenshots:
    None
    Threat Actors: cryocrezaz4103
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  211. Sale of Spotify combo list containing 10K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 10,000 credentials marketed for use against Spotify. The list is hosted on an external paste site. No information is provided about the origin of the credentials.
    Date: 2026-05-15T17:19:27Z
    Network: openweb
    Published URL: https://breached.st/threads/10k-spotify-private-combo.87163/unread
    Screenshots:
    None
    Threat Actors: supergirl
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  212. Sale of Spanish phone numbers database
    Category: Services
    Content: A threat actor is selling a list of over 4,000 valid Spanish phone numbers, advertised as suitable for spam campaigns or other purposes. Contact is provided via Telegram.
    Date: 2026-05-15T17:18:36Z
    Network: openweb
    Published URL: https://breached.st/threads/spanish-phone-numbers.87160/unread
    Screenshots:
    None
    Threat Actors: nebulark
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  213. Sale of cryptocurrency-focused email lead databases
    Category: Combo List
    Content: A threat actor is selling multiple cryptocurrency-themed email lead databases, including approximately 1 million leads targeting the Coinbase market, 500,000 international leads, and a 527K worldwide crypto email database. The seller is soliciting price offers via private message or Telegram.
    Date: 2026-05-15T17:17:42Z
    Network: openweb
    Published URL: https://breached.st/threads/cryptocurrency-lead-generation-1-million-leads-for-the-coinbase-market-and-cryptocurrencies-and-500-000-international-leads.87155/unread
    Screenshots:
    None
    Threat Actors: Meowl
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  214. Alleged data leak of JATCO Thailand
    Category: Data Leak
    Content: A threat actor has freely shared what is claimed to be JATCO Thailand customer personal and login data. The leaked dataset appears to include fields such as personal ID, age, email, address, province, marital status, and emergency contact information. The post is attributed to threat actors identifying as INFERNALIS, 404Crew, and EXADOS.
    Date: 2026-05-15T17:17:10Z
    Network: openweb
    Published URL: https://breached.st/threads/jatco-co-th-jatco-thailand-dataleaks.87158/unread
    Screenshots:
    None
    Threat Actors: yra404
    Victim Country: Thailand
    Victim Industry: Manufacturing
    Victim Organization: JATCO Thailand
    Victim Site: jatco.co.th
  215. Alleged data breach of Afrilims
    Category: Data Breach
    Content: A threat actor claims to have dumped the full database of afrilims.co.za, a South African healthcare platform, across all subdomains. The dump reportedly includes tables for doctors, patients, and users, containing personal, medical, and credential data such as names, dates of birth, addresses, emails, phone numbers, ICD-10 codes, and hashed passwords. The data was shared freely on a clear-web forum.
    Date: 2026-05-15T17:16:39Z
    Network: openweb
    Published URL: https://breached.st/threads/afrilims-co-za-all-subdomains-database-dumped.87159/unread
    Screenshots:
    None
    Threat Actors: yra404
    Victim Country: South Africa
    Victim Industry: Healthcare
    Victim Organization: Afrilims
    Victim Site: afrilims.co.za
  216. Alleged data leak of Aran Group (aranp-group.com)
    Category: Data Leak
    Content: A threat actor operating under the alias MDGhost has leaked data allegedly belonging to Aran Group, an Israeli industrial liquid packaging company. The post provides a session identifier and references the BlackH4t group. No specific record count or data fields were disclosed in the post.
    Date: 2026-05-15T17:16:07Z
    Network: openweb
    Published URL: https://breached.st/threads/israeli-aranp-group-com-bag-in-box-bib.87161/unread
    Screenshots:
    None
    Threat Actors: MDGhost
    Victim Country: Israel
    Victim Industry: Manufacturing
    Victim Organization: Aran Group
    Victim Site: aranp-group.com
  217. Alleged sale of Telegram user database with 770K records
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged Telegram database containing approximately 770,000 records. The dataset includes fields such as user ID, phone number, username, first name, and last name. A sample is provided via an external paste site, with purchase inquiries directed to a Telegram contact.
    Date: 2026-05-15T17:15:35Z
    Network: openweb
    Published URL: https://breached.st/threads/770k-telegram-database.87162/unread
    Screenshots:
    None
    Threat Actors: Meowl
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Telegram
    Victim Site: telegram.org
  218. Alleged data breach of Telegram with 771K user records
    Category: Data Breach
    Content: A threat actor is selling an alleged Telegram database containing approximately 771,000 records. The dataset includes user IDs, phone numbers, usernames, and first and last names. A sample is provided via an external paste site, with purchase directed through a Telegram contact.
    Date: 2026-05-15T17:09:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-771K-TELEGRAM-DATABASE
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Telegram
    Victim Site: telegram.org
  219. Website Defacement of Wingfield by XYZ (Alpha Wolf Team)
    Category: Defacement
    Content: On May 15, 2026, the website wingfield.co.jp was defaced by attacker XYZ operating under the team Alpha Wolf. The attack targeted a Japanese organization hosted on a Linux server, resulting in the compromise and defacement of the sites index page. The incident was a singular targeted defacement, not part of a mass defacement campaign.
    Date: 2026-05-15T17:06:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249232
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Wingfield
    Victim Site: wingfield.co.jp
  220. Website Defacement of Wingfield by XYZ (Alpha Wolf Team)
    Category: Defacement
    Content: On May 15, 2026, the website wingfield.co.jp was defaced by threat actor XYZ, operating under the team name Alpha Wolf. The attack targeted the homepage of the Japanese organization, resulting in a single-site defacement. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-05-15T17:03:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922666
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Wingfield
    Victim Site: wingfield.co.jp
  221. Telegram automation and growth services offered on forum
    Category: Services
    Content: A forum seller is advertising Telegram automation and growth services including mass DMs, group member scraping, account sessions (TData), aged accounts, and bot automation. The services are marketed for digital marketing, lead collection, and promotional campaigns. Contact is provided via a Telegram handle.
    Date: 2026-05-15T17:01:57Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-Telegram-Automation-Growth-Services
    Screenshots:
    None
    Threat Actors: cio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  222. Sale of Argentina combo list with 100K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 100,000 credentials marketed as high quality and targeting Argentine users. The content is gated behind a reply requirement on the forum. No specific breached organization is identified.
    Date: 2026-05-15T16:56:32Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-100K-ARGENTINA-High-Quality-Combolist
    Screenshots:
    None
    Threat Actors: Megatron
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  223. Sale of 129K Mexico UHQ combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list purportedly containing 129,000 UHQ credentials associated with Mexican accounts. No additional details are available from the post content.
    Date: 2026-05-15T16:53:56Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-129K-MEXICO-UHQ-Combolist
    Screenshots:
    None
    Threat Actors: Megatron
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  224. Sale of 165K Germany HQ Fresh Combolist
    Category: Combo List
    Content: A threat actor is sharing a combolist of approximately 165,000 credentials marketed as high-quality and fresh, targeting German accounts. The content is hidden behind a reply gate on the forum.
    Date: 2026-05-15T16:51:11Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-165K-Germany-HQ-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: Megatron
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  225. 115K Colombia UHQ Combo List
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 115,000 credentials described as UHQ (ultra-high quality) and targeting Colombian accounts. The content is gated behind a reply requirement on a dark web forum.
    Date: 2026-05-15T16:48:37Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-115K-Colombia-UHQ-Combolist
    Screenshots:
    None
    Threat Actors: Megatron
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  226. Sale of Indonesian combo list with 142K credentials
    Category: Combo List
    Content: A threat actor on a cybercrime forum is sharing a combo list purportedly containing 142,000 Indonesian credentials, marketed as high-quality and fresh. The content is gated behind a reply requirement, limiting immediate visibility into the specific services or data fields included.
    Date: 2026-05-15T16:46:05Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-142K-INDONESIA-HQ-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: Megatron
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  227. Alleged sale of shell access to military domain
    Category: Initial Access
    Content: Threat actor offering to sell shell access to a military domain. Contact: @lei_bf
    Date: 2026-05-15T16:44:26Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/1057
    Screenshots:
    None
    Threat Actors: lei_bf
    Victim Country: Philippines
    Victim Industry: Military/Defense
    Victim Organization: Military domain
    Victim Site: Unknown
  228. Website Defacement of Saraswathy Hospitals by Ruiixh4xor (SHENHAXSEC)
    Category: Defacement
    Content: On May 15, 2026, a threat actor identified as Ruiixh4xor, affiliated with the group SHENHAXSEC, defaced a page on saraswathyhospitals.com, an Indian healthcare providers website. The attack targeted a specific subdirectory rather than the homepage and was not conducted as part of a mass defacement campaign. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-15T16:39:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922664
    Screenshots:
    None
    Threat Actors: Ruiixh4xor, SHENHAXSEC
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Saraswathy Hospitals
    Victim Site: saraswathyhospitals.com
  229. Forum policy announcement prohibiting CIS-related threat content
    Category: Alert
    Content: The forum administrator announced a blanket prohibition on all activities targeting Russia and CIS member states, including data breaches and document leaks related to those countries. Violations will result in thread deletion and potential account bans. This is a forum policy update with no associated threat data.
    Date: 2026-05-15T16:37:32Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-IMPORTANT-READ-Statement-Regarding-Russian-Data-CIS
    Screenshots:
    None
    Threat Actors: John
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  230. Sale of private donor contact list linked to New York nonprofit
    Category: Data Breach
    Content: A threat actor is selling a private list of 520 names and email addresses purportedly belonging to wealthy or notable New Yorkers associated with an unnamed nonprofit organization based in New York City. The seller is advertising the dataset on a dark web forum and requesting contact via Session messenger.
    Date: 2026-05-15T16:26:08Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-Private-New-York-donors-names-emails
    Screenshots:
    None
    Threat Actors: Kurd
    Victim Country: United States
    Victim Industry: Nonprofit
    Victim Organization: Unknown
    Victim Site: Unknown
  231. Alleged data breach of Perum Daerah Tirta Musi
    Category: Data Breach
    Content: A threat actor is selling a database allegedly sourced from perumdatirtamusi.co.id, an Indonesian regional water utility. The dataset contains over 437,000 customer records including names, addresses, phone numbers, meter data, and tariff codes, with 257,000 unique phone numbers. The seller is asking $300 and accepts escrow.
    Date: 2026-05-15T16:23:36Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-Indonesia-perumdatirtamusi-co-id-437k
    Screenshots:
    None
    Threat Actors: Sorb
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Perum Daerah Tirta Musi
    Victim Site: perumdatirtamusi.co.id
  232. Alleged data breach of Nirvasa (nirvasa.com)
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database dump from Nirvasa, an Indian digital healthcare platform, claiming approximately 3.5 million user records with 2.9 million unique phone numbers. The dataset purportedly includes fields such as first name, last name, telephone, email, pincode, and address, with data dated between 2024 and 2026. The seller is asking $600 and has provided sample records as proof.
    Date: 2026-05-15T16:21:10Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-India-nirvasa-com-3-5kk-users
    Screenshots:
    None
    Threat Actors: Masterbyte
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Nirvasa
    Victim Site: nirvasa.com
  233. Alleged data breach of Stych
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database dump from Stych, a French driving school platform, containing approximately 1.34 million records. The dataset includes full names, email addresses, mobile phone numbers, dates of birth, postal codes, nationality, and other personal details. The seller claims the data is fresh and has not been previously circulated.
    Date: 2026-05-15T16:18:39Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-FR-STYCH-DATABASE-1-3M
    Screenshots:
    None
    Threat Actors: Lagui
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Stych
    Victim Site: stych.fr
  234. Alleged data breach of Auchan
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from French retail chain Auchan, containing approximately 1.29 million customer records. The dataset includes personally identifiable information such as names, email addresses, phone numbers, postal addresses, and loyalty card numbers. The seller claims the data is fresh, unprocessed, and not previously circulated.
    Date: 2026-05-15T16:15:56Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-FR-AUCHAN-DATABASE-1-2M
    Screenshots:
    None
    Threat Actors: Lagui
    Victim Country: France
    Victim Industry: Retail
    Victim Organization: Auchan
    Victim Site: auchan.fr
  235. Sale of compromised network configurations and credentials from Spanish MSP ICARO CLOUD S.L. affecting 20 corporate clients
    Category: Initial Access
    Content: A threat actor is selling network configuration data exfiltrated from Spanish MSP ICARO CLOUD S.L., reportedly obtained via a single reused credential across all managed devices. The dataset includes over 3,500 OPNsense config backups, WireGuard private keys, TLS certificates, admin password hashes, and plaintext credentials affecting 20 client organizations across sectors including healthcare, education, agriculture, and hospitality. The full dataset is offered at $3,750 XMR with individual cli
    Date: 2026-05-15T16:13:01Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-20-Spanish-Corporate-Networks-%E2%80%94-Full-Firewall-Configs-VPN-Keys-TLS-Certs-Internal
    Screenshots:
    None
    Threat Actors: macaroni
    Victim Country: Spain
    Victim Industry: Information Technology
    Victim Organization: ICARO CLOUD S.L.
    Victim Site: Unknown
  236. Alleged data breach of Nike
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database belonging to Nike (nike.com). No further details regarding the data type, record count, or sample files were provided in the post.
    Date: 2026-05-15T16:06:53Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-nike-com
    Screenshots:
    None
    Threat Actors: Saikaa
    Victim Country: United States
    Victim Industry: Retail
    Victim Organization: Nike
    Victim Site: nike.com
  237. Free distribution of random stealer logs
    Category: Logs
    Content: A threat actor is freely distributing a collection of stealer logs on a dark web forum. The post offers the logs at no cost and markets them as fresh. No further details about the volume, origin, or affected organizations are provided.
    Date: 2026-05-15T16:01:27Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-FREEBIES-Random-Logs
    Screenshots:
    None
    Threat Actors: domainbreachkaduu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  238. Free distribution of cookies and combo list
    Category: Logs
    Content: A forum user is freely distributing a collection of cookies and combo list credentials. No specific victim organization, record count, or data details are provided in the post.
    Date: 2026-05-15T15:58:30Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-FREEBIES-COOKIES-COMBO
    Screenshots:
    None
    Threat Actors: domainbreachkaduu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  239. Arabic Combo List
    Category: Combo List
    Content: A forum user shared an Arabic combo list as hidden content, requiring replies to access the download link. No details on record count, source, or targeted services were provided.
    Date: 2026-05-15T15:56:03Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-Arabic-Combo-List
    Screenshots:
    None
    Threat Actors: portoreu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  240. Alleged data breach of Shany Tech
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database dump attributed to Shany Tech, an Israeli testing and measuring equipment company. The dataset totals 246.32 GB and includes CSV files for applications, devices, enterprise apps, groups, role assignments, and users. A sample is provided via an anonymous file-sharing link, with purchase directed to a Telegram channel.
    Date: 2026-05-15T15:44:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-shany-tech-246-32-GB
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Israel
    Victim Industry: Technology
    Victim Organization: Shany Tech
    Victim Site: shany-tech.com
  241. Alleged data breach of esky.com exposing Delta Airlines Brazil traveler records
    Category: Data Breach
    Content: A threat actor is selling an alleged database from esky.com containing 10.3 million records purportedly related to Delta Airlines Brazil travelers. The dataset reportedly includes date of birth, gender, full name, city, address, email, and phone number in CSV format. The seller is directing prospective buyers to a Telegram channel.
    Date: 2026-05-15T15:44:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-10-3M-esky-com-Delta-Airlines-BR-Travelers-Poland-2026
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Poland
    Victim Industry: Travel
    Victim Organization: eSky
    Victim Site: esky.com
  242. Sale of Coinbase and worldwide cryptocurrency email leads database
    Category: Data Breach
    Content: A threat actor is offering for sale multiple cryptocurrency-related email lead databases, including a dataset attributed to Coinbase users (USA) and a worldwide crypto email database of approximately 527,000 records totaling 231MB. The seller is soliciting price offers via private message or Telegram.
    Date: 2026-05-15T15:43:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-COINBASE-CRYPTO-LEADS-USA-AND-AROUND-THE-WORLD
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  243. Alleged data leak of Maeva Group
    Category: Data Leak
    Content: A threat actor claiming to be ChimeraZ has leaked an alleged database dump attributed to Maeva Group, a French vacation rental company. The dataset reportedly contains 4,575,065 customer records and 38,945 residence entries in JSON format across multiple affiliated domains including maeva.com, vacansoleil.com, and campings-paradis.com. Sample data includes full passenger names, phone numbers, reservation details, and dates of stay.
    Date: 2026-05-15T15:42:28Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-FR-4-5M-MAEVA-GROUP
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Hospitality
    Victim Organization: Maeva Group
    Victim Site: maeva.com
  244. Alleged data leak of CCAS Dunkerque (France)
    Category: Data Leak
    Content: A threat actor has leaked data allegedly belonging to CCAS Dunkerque, a French municipal social action center, via an anonymous file-sharing link. The actor claims to also be selling 220 records of French personal data for $500 via Telegram.
    Date: 2026-05-15T15:39:52Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-FR-CCAS-DUNKERQUE
    Screenshots:
    None
    Threat Actors: arpanet7444
    Victim Country: France
    Victim Industry: Government
    Victim Organization: CCAS Dunkerque
    Victim Site: Unknown
  245. Website Defacement of 9japress.com by Y4NZ404
    Category: Defacement
    Content: The Nigerian news/press website 9japress.com was defaced by a solo threat actor operating under the handle Y4NZ404. The attack involved a homepage defacement, replacing the sites content with the attackers message. The incident was recorded on May 15, 2026, with a mirror archived at zone-xsec.com.
    Date: 2026-05-15T15:32:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922662
    Screenshots:
    None
    Threat Actors: Y4NZ404, SOLO
    Victim Country: Nigeria
    Victim Industry: Media and Press
    Victim Organization: 9ja Press
    Victim Site: 9japress.com
  246. Free combo list of 6.9K EU mixed valid mail access credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 6,900 EU mixed valid mail access credentials dated May 15. The list is gated behind a reply requirement on the forum.
    Date: 2026-05-15T14:55:42Z
    Network: openweb
    Published URL: https://altenens.is/threads/6-9k-eu-mix-valid-mail-access-15-05.2940744/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  247. Sale of stolen payment card data including CVV2, Dumps+PIN, and EBT+PIN
    Category: Carding
    Content: A threat actor is advertising a carding shop via Telegram offering stolen payment card data including CVV2, Dumps+PIN (Track1/2), EBT SNAP/CASH, SSN lookups, and Non-VBV BINs. The shop claims first-hand, non-reseller inventory with auto-delivery and a refund guarantee. Products are sold for cryptocurrency and other payment methods.
    Date: 2026-05-15T14:55:08Z
    Network: openweb
    Published URL: https://altenens.is/threads/gem-stonegem-stone-encrypted-gem-stonegem-stone-best-cvv2-dumps-pin-ebt-pin-shop-the-best-products-all-in-one-store-first-hand-and-high-quality-fireencrypted-premium-bases.2940757/unread
    Screenshots:
    None
    Threat Actors: 2ajcas4868
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  248. Sale of 500K URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor is offering a private combo list of 500,000 URL:login:password credentials, marketed as ultra high quality and suitable for general-purpose credential stuffing. The list is dated May 2026.
    Date: 2026-05-15T14:39:06Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-PRIVATE-500K-ULP-%E2%9A%A1ULTRA-HIGH-QUALITY%E2%9A%A1MIX-USE-FOR-ANYTHING-YOU-NEED%E2%9A%A1-MAY-2026
    Screenshots:
    None
    Threat Actors: artmolchanov
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  249. Sale of business corporate mail credentials combo list with 155,672 lines
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 155,672 email and password pairs described as business corporate mail credentials with SMTP access. The post was shared on a public cracking forum. No specific victim organization or country is identified.
    Date: 2026-05-15T14:38:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-155-672-Lines-%E2%9C%85-Business-Corp-Mail-Pass-SMTP-Leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  250. Free South Korea email combo list (Batch 42/100)
    Category: Combo List
    Content: A threat actor is freely distributing a South Korea-focused email list as part of an ongoing batch series (42 of 100). The content is gated behind registration or login on the forum. No specific breached organization or record count is identified.
    Date: 2026-05-15T14:38:33Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-42-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Germany mail access combo list (14K)
    Category: Combo List
    Content: A combo list advertised as 14,000 Germany mail access credentials has been shared on a public forum. The content is gated behind registration or login. No additional details about the source or format are available.
    Date: 2026-05-15T14:38:02Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%9014k-germany-mail-access-%E2%AD%90
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  252. Sale of premium Hotmail account combo list
    Category: Combo List
    Content: A threat actor is selling access to a collection of Hotmail accounts described as premium, private, and fresh. Access is offered via a private cloud service at tiered pricing of $20 for 7 days and $50 for 30 days. The content is gated behind registration or login on the forum.
    Date: 2026-05-15T14:37:43Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-premium-private-hotmail-accounts-%E2%9A%A1-high-quality
    Screenshots:
    None
    Threat Actors: acodark1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  253. Sale of fresh Hotmail combo list subscription service
    Category: Combo List
    Content: A threat actor is selling subscription-based access to daily fresh Hotmail and mixed email credential lines, marketed as private with no duplicates. Pricing tiers range from $10 for a 3-day trial to $45 for one month. The credentials are advertised as suitable for credential stuffing against any target service.
    Date: 2026-05-15T14:37:12Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%98%81%EF%B8%8F-mk2-cloud-fresh-hotmail-mail-access-full-private-%F0%9F%92%8E-302687
    Screenshots:
    None
    Threat Actors: mk2clode
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  254. Hotmail combo list freely distributed
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 455 Hotmail credentials, marketed as high-quality and fresh. Free drops are advertised via a Telegram channel, with private access available for purchase through a separate Telegram contact.
    Date: 2026-05-15T14:37:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-455X-HQ-FRESH-HOTMAIL-%E2%9C%85
    Screenshots:
    None
    Threat Actors: chutguard
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  255. Free distribution of URL:Log:Pass combo list with 8+ million lines
    Category: Combo List
    Content: A threat actor shared a URL:Log:Pass combo list containing over 8 million lines on a cybercrime forum. The content is gated behind registration or login. No specific victim organization or country is identified.
    Date: 2026-05-15T14:36:52Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-343
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  256. Sale of mixed email combo list by NightFallCloud
    Category: Combo List
    Content: A threat actor operating as NightFallCloud is distributing a large mixed email combo list containing approximately 4.4 million credential pairs, with a claimed daily update of 10,000–20,000 new lines. The list includes Hotmail and mixed email credentials marketed as fresh.
    Date: 2026-05-15T14:36:36Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A14400k-mixmail-uhq-nightfall-cloud
    Screenshots:
    None
    Threat Actors: NightFallCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  257. Website Defacement of Senes Constructions by Threat Actor Zod
    Category: Defacement
    Content: On May 15, 2026, a threat actor operating under the alias Zod defaced the website of Senes Constructions by deploying a defacement page at the URL senesconstructions.com/zod.html. The attack targeted a Linux-based web server and was a single-site, non-mass defacement incident. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-15T14:36:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249230
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Construction
    Victim Organization: Senes Constructions
    Victim Site: senesconstructions.com
  258. Bulgaria Email:Password Combo List with 107K+ Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 107,000 email and password pairs purportedly sourced from Bulgaria, marketed as fresh and high quality. The credentials were made available via a hidden link requiring forum registration or login. The post references an external Telegram channel for additional combo lists.
    Date: 2026-05-15T14:35:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-107-K-%E2%9C%A6-Bulgaria-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Bulgaria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  259. Bulgaria Email:Pass combo list with 107K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 107,000 email and password pairs allegedly sourced from Bulgarian accounts. The credentials are marketed as fresh and high quality, dated May 15, 2026. The content is gated behind forum registration or login.
    Date: 2026-05-15T14:35:22Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9C%A6%E2%9C%A6-107-K-%E2%9C%A6-Bulgaria-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: Maxleak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Chile email:password combo list with 71K+ credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 71,000 email and password pairs purportedly sourced from Chile, marketed as fresh and high quality. The list is available behind a registration/login wall on the forum. Additional combo lists are advertised via a Telegram channel.
    Date: 2026-05-15T14:35:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-71-K-%E2%9C%A6-Chile-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Free combo list of Chilean email credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing over 71,000 email and password pairs purportedly sourced from Chile, marketed as fresh and high quality. The content is gated behind forum registration or login. No specific breached organization is identified.
    Date: 2026-05-15T14:35:00Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9C%A6%E2%9C%A6-71-K-%E2%9C%A6-Chile-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: Maxleak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  262. China email:password combo list leaked on forum
    Category: Combo List
    Content: A threat actor known as Maxleak has shared a combo list containing over 31,000 email and password pairs purportedly associated with Chinese users. The credentials are marketed as fresh and high quality, dated 15 May 2026. The content is gated behind forum registration or login.
    Date: 2026-05-15T14:34:39Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9C%A6%E2%9C%A6-31-K-%E2%9C%A6-China-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: Maxleak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  263. Free China email:password combo list with 31K+ credentials
    Category: Combo List
    Content: A threat actor shared a free combo list containing over 31,000 email and password pairs claimed to be from China, marketed as fresh and high quality. The list was made available on a cybercrime forum with a link to a Telegram channel for additional combo lists.
    Date: 2026-05-15T14:34:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-31-K-%E2%9C%A6-China-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  264. Sale of Hotmail combo list marketed as fresh UHQ credentials
    Category: Combo List
    Content: A threat actor is distributing approximately 700 Hotmail credentials marketed as fresh UHQ (Ultra High Quality) via a hidden forum link. The content is gated behind registration or login and is associated with a service called GoodTimes Cloud.
    Date: 2026-05-15T14:34:17Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%8E%9D-700-%E2%8E%A0-HOTMAIL-FRESH-UHQ%E2%9C%A8GOODTIMES-CLOUD
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Mass Website Defacement of JerryFinance by Threat Actor Zod
    Category: Defacement
    Content: On May 15, 2026, threat actor Zod conducted a mass defacement campaign targeting jerryfinance.org, replacing the content of the page at /zod.html on a Linux-based server. The attack is part of a broader mass defacement operation attributed to Zod, with the defaced mirror archived at haxor.id. No specific motive or proof of concept has been publicly disclosed.
    Date: 2026-05-15T14:34:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249231
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Jerry Finance
    Victim Site: jerryfinance.org
  266. Cuba email:password combo list with 19K+ credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 19,000 email and password pairs allegedly associated with Cuba, marketed as fresh and high quality. The credentials are shared behind a registration/login wall on a cybercrime forum.
    Date: 2026-05-15T14:34:01Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-19-K-%E2%9C%A6-Cuba-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  267. Sale of cracked crypto clipper malware (Soul Clipper v3)
    Category: Malware
    Content: A forum post on DemonForums offers a cracked version of Soul Clipper v3, a cryptocurrency clipper malware, available for download. Cryptocurrency clippers intercept clipboard content to redirect crypto wallet addresses to attacker-controlled addresses.
    Date: 2026-05-15T14:33:35Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Crypto-clipper-soul-cracked-v3
    Screenshots:
    None
    Threat Actors: anonym
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Croatia email:password combo list freely shared
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 19,000 email and password pairs purportedly sourced from Croatia, marketed as fresh and high quality. The list was distributed freely via a hidden content link on a dark web forum. The post references a Telegram channel for additional combolists.
    Date: 2026-05-15T14:33:30Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-19-K-%E2%9C%A6-Croatia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Croatia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Sale of combo list targeting Poland with 20,000 email and password pairs
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 20,000 email and password pairs associated with Polish users on a cybercrime forum. No additional details about the source or nature of the credentials are available from the post content.
    Date: 2026-05-15T14:30:54Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Poland-20K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Combo List of 23K Mixed Email/Password Credentials
    Category: Combo List
    Content: A threat actor is sharing a mixed combolist containing approximately 23,000 email and password pairs. The content is gated behind forum registration or login. No specific target organization or service is identified.
    Date: 2026-05-15T14:29:28Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Mixed-23K-Email-Pass–188869
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Combo List targeting Libero.it with 27K email/password pairs
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 27,000 email and password pairs associated with Libero.it accounts. The content is gated behind forum registration or login. This represents a credential stuffing list, not a direct breach of Libero.it.
    Date: 2026-05-15T14:29:00Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Libero-it-27K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  272. Combo List Mixed 50K Email/Pass
    Category: Combo List
    Content: A threat actor has shared a mixed combolist containing 50,000 email and password pairs on a cybercrime forum. The content is gated behind registration or login. No specific breached organization is identified.
    Date: 2026-05-15T14:27:18Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Mixed-50K-Email-Pass–188871
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  273. Sale of combo list targeting Microsoft services including SMTP, IMAP, Azure, Office, Xbox, and Copilot
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 7 million credential pairs targeting Microsoft services including SMTP, IMAP, Azure, Microsoft Office, Microsoft Surface, Xbox, and Copilot. The credentials are being offered via Telegram channels, with the actor advertising both free and paid access.
    Date: 2026-05-15T14:24:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75356/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  274. Sale of mixed mail access combo list with 22,000 credentials
    Category: Combo List
    Content: A forum user is offering a mixed mail access combo list containing approximately 22,000 credentials. The content is restricted to registered users. No further details about the origin or targeted services are available from the post.
    Date: 2026-05-15T14:24:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75357/
    Screenshots:
    None
    Threat Actors: FAITHINUS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  275. Sale of 30,000 fresh mail access combo list mix
    Category: Combo List
    Content: A forum user is offering a combo list of 30,000 mixed mail access credentials, marketed as fresh. The content is restricted to registered users of the forum.
    Date: 2026-05-15T14:23:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75358/
    Screenshots:
    None
    Threat Actors: AlphaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Sale of 141K USA-targeted combo list
    Category: Combo List
    Content: A threat actor is offering a 141K USA-targeted combo list containing email:password and user:password credential pairs. The post advertises coverage across multiple email providers and countries including AOL, Yahoo, Hotmail, and Outlook. The seller is marketing the combo list via Telegram handle @KOCsupport.
    Date: 2026-05-15T14:23:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75359/
    Screenshots:
    None
    Threat Actors: alex12
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  277. Alleged data leak of South African local government website by hacktivist groups
    Category: Data Leak
    Content: Hacktivist groups Nullsec Nigeria, 404crews Cyber Team, and Infernalis claim to have breached the website of the Ephraim Mogale Local Municipality in South Africa, citing xenophobic attacks against Nigerians as motivation. The actors allege they obtained approximately 111GB of documents and have leaked a portion via a public file-sharing link. The post threatens further exposure if the South African government does not respond.
    Date: 2026-05-15T14:04:17Z
    Network: openweb
    Published URL: https://breached.st/threads/opsouthafrica.87149/unread
    Screenshots:
    None
    Threat Actors: ki4tane
    Victim Country: South Africa
    Victim Industry: Government
    Victim Organization: Ephraim Mogale Local Municipality
    Victim Site: ephraimmogalelm.gov.za
  278. Combo List of Hotmail Credentials Shared on Cracking Forum
    Category: Combo List
    Content: A threat actor shared a combo list of 48,384 Hotmail credential hits on a cracking forum. The credentials are marketed as freshly checked and AntiPublic verified. The post includes a download link sponsored by RogenCloud.
    Date: 2026-05-15T13:52:24Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x48384-Hotmail-Hits-1-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  279. Hotmail combo list with 15K credentials available on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 15,000 Hotmail credentials on a cybercrime forum. The credentials are marketed as fresh and unverified hits suitable for gaming and shopping account takeover. Content is gated behind forum registration.
    Date: 2026-05-15T13:52:01Z
    Network: openweb
    Published URL: https://patched.to/Thread-15k-hotmail-goods-combolist-%E2%9C%94%EF%B8%8F-unraped-and-fresh-lines-%E2%9C%94%EF%B8%8Fgaming-shopping-fresh
    Screenshots:
    None
    Threat Actors: Matrix432
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  280. Free Hotmail combo list with 2,645 credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 2,645 Hotmail credentials, marketed as fresh. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-15T13:51:03Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-2645x-FRESH-HOTMAI-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Nulled07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  281. Canada Email:Pass combo list with 243K credentials
    Category: Combo List
    Content: A threat actor is freely distributing a combo list of approximately 243,000 email and password pairs reportedly associated with Canadian accounts. The credentials are marketed as fresh and high quality, dated 15-5-2026. The post directs users to a Telegram channel for additional combo lists.
    Date: 2026-05-15T13:50:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-243-K-%E2%9C%A6-Canada-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Colombia Email:Password Combo List of 165K Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 165,000 email and password pairs attributed to Colombian users, marketed as fresh and high quality. The credentials were made available behind a registration/login gate on the forum. The post directs users to a Telegram channel for additional combolists.
    Date: 2026-05-15T13:50:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-165-K-%E2%9C%A6-Colombia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-15-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Colombia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  283. Distribution of stealer logs and combo list (ULP/Logs/PC format, 0.57 GB)
    Category: Logs
    Content: A threat actor is distributing 0.57 GB of stealer logs in ULP, logs, and PC formats, marketed as fresh and high quality. The content is available to registered forum members via a hidden download link. Additional combo lists are advertised via a Telegram channel.
    Date: 2026-05-15T13:50:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Request-%E2%9C%A6%E2%9C%A6-LOG-S-%E2%9C%A6%E2%9C%A6-ULP-LOGS-PC-%E2%9C%A6%E2%9C%A6-0-57-GB-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  284. Sale of mixed combo list with valid credentials
    Category: Combo List
    Content: A threat actor is sharing a mixed combo list with purportedly valid credentials via a file download link. The post provides minimal detail regarding the source, record count, or targeted services.
    Date: 2026-05-15T13:47:31Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-MIX-WITH-VALIDS-f1veu
    Screenshots:
    None
    Threat Actors: yonatanlevin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  285. 15K Germany valid mail access combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of 15,000 allegedly valid German email credentials, dated May 15. Access to the hidden content requires forum interaction.
    Date: 2026-05-15T13:43:54Z
    Network: openweb
    Published URL: https://altenens.is/threads/15k-germany-valid-mail-access-15-05.2940727/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  286. Sale of AI-assisted patch-diffing pipeline and N-day exploit generation tooling targeting CVE-2026-27914 in Microsoft Management Console
    Category: Vulnerability
    Content: A researcher published a two-stage AI-assisted pipeline (PatchWatch and Pocsmith) capable of automating patch-diffing and generating N-day exploits from Patch Tuesday releases. The tooling was validated against CVE-2026-27914, an elevation-of-privilege vulnerability in Microsoft Management Console (mmc.exe), producing a verified proof-of-concept that escalates from Medium IL to High IL by abusing missing Mark-of-the-Web trust checks prior to patch KB5083768. The full exploit report and POC d
    Date: 2026-05-15T13:43:03Z
    Network: openweb
    Published URL: https://tier1.life/thread/228
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Microsoft
    Victim Site: microsoft.com
  287. Alleged DDoS Attack on Austrian Government Websites by NoName057(16)
    Category: Cyber Attack
    Content: NoName057(16) threat actor announced plans to conduct cyberattacks against Austrian government infrastructure on May 16, 2026, in coordination with a protest action titled No Stage for Genocide in Vienna. The group claims previous attacks on Eurovision-related websites due to perceived government failures and political grievances regarding Palestine.
    Date: 2026-05-15T13:39:59Z
    Network: telegram
    Published URL: https://t.me/c/3087552512/1958
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Austria
    Victim Industry: Government
    Victim Organization: Austrian Government
    Victim Site: Unknown
  288. Alleged data leak of Sophos IP data
    Category: Data Leak
    Content: A threat actor has leaked a dataset allegedly containing Sophos IP-related data, comprising approximately 201,146 lines, via a file-sharing link on exploit.in. The data was shared freely on a data leaks forum without a stated price.
    Date: 2026-05-15T13:33:52Z
    Network: openweb
    Published URL: https://tier1.life/thread/226
    Screenshots:
    None
    Threat Actors: AccessTracker
    Victim Country: United Kingdom
    Victim Industry: Technology
    Victim Organization: Sophos
    Victim Site: sophos.com
  289. Sale of IP lists for network devices via AccessTracker service
    Category: Services
    Content: A threat actor operating under the name AccessTracker is selling regularly updated IP lists of internet-exposed network devices from vendors including Cisco, Fortinet, WireGuard, SonicWall, Citrix, and RDWeb. The service is marketed as a minimal alternative to FOFA and Shodan, with purchases available via BTC/XMR through an automated Telegram bot. The seller states the service excludes CIS and BRICS-region infrastructure.
    Date: 2026-05-15T13:27:46Z
    Network: openweb
    Published URL: https://tier1.life/thread/227
    Screenshots:
    None
    Threat Actors: AccessTracker
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  290. Distribution of combo list via Telegram channel
    Category: Combo List
    Content: A threat actor shared a ULP (URL:Login:Password) combo list via a Pixeldrain download link, with the password gated behind a Telegram channel. No specific victim organization, record count, or geographic scope was disclosed in the post.
    Date: 2026-05-15T13:25:52Z
    Network: openweb
    Published URL: https://breached.st/threads/vip-ulp-by-hello_zod_bot.87148/unread
    Screenshots:
    None
    Threat Actors: zoood
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  291. Combo List: Mixed Domain Email and Password List with 1.7 Million Records
    Category: Combo List
    Content: A combo list containing approximately 1.7 million email and password pairs across mixed domains has been shared on a cracking forum. The credentials are marketed as fresh leaks. No additional details are available from the post content.
    Date: 2026-05-15T13:15:24Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-714-874-Mixed-Domain-Fresh-Leaks
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  292. Combo List: HQ Hotmail Mail Access Credentials
    Category: Combo List
    Content: A combo list of approximately 200 Hotmail mail access credentials has been shared on a forum. The content is hidden behind a registration or login requirement. The credentials are marketed as high quality (HQ) and intended for mail access.
    Date: 2026-05-15T13:15:08Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-2k-hq-hotmail-mail-access-combolist-302653
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  293. Wanted: Germany mail access credentials targeting o2business.de
    Category: Combo List
    Content: A forum user is seeking to purchase German mail access credentials associated with the domain easyaccess.o2business.de. The buyer requests that the credentials be functional and is soliciting sellers via Telegram or direct forum messages.
    Date: 2026-05-15T13:15:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-WTB-GERMANY-MAIL-ACCESS-TARGET
    Screenshots:
    None
    Threat Actors: Sexydawn62
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  294. Free Gmail combo list of 10,000 credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 10,000 Gmail email and password combinations, marketed as private and fresh. The post is accompanied by a promotion for an account-selling store offering streaming, VPN, and Steam accounts.
    Date: 2026-05-15T13:14:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%9010k-UHQ-COMBO-DATABASE-GMAIL-100-PRIVATE-AND-RESH%E2%AD%90
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  295. Sale of Hotmail combo list with 1K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 1,000 Hotmail mail access credentials on a cybercrime forum. The content is gated behind registration or login, with engagement incentivized by a request for likes.
    Date: 2026-05-15T13:14:37Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-1k-hotmail-mail-access-%E2%9C%85-302656
    Screenshots:
    None
    Threat Actors: D47
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  296. Combo List of Hotmail credentials (1K)
    Category: Combo List
    Content: A threat actor shared a combo list containing 1,000 Hotmail email and password pairs. The post requests likes in exchange for additional releases. No breach of Hotmail/Microsoft is implied; the credentials are likely aggregated from prior breaches for use in credential stuffing.
    Date: 2026-05-15T13:14:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1K-HOTMAIL-MAIL-ACCESS-%E2%9C%85–2094266
    Screenshots:
    None
    Threat Actors: Drip443
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  297. Sale of Hotmail credential combo list with 11K hits
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 11,000 Hotmail credential hits, described as high quality. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-15T13:14:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85-11k-hq-hotmail-hit-%E2%9C%85-302657
    Screenshots:
    None
    Threat Actors: RetroCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  298. Alleged leak of 2.9 million URL:Login:Password credential combo list
    Category: Combo List
    Content: A forum user shared a combo list containing approximately 2.9 million URL:login:password credential pairs, marketed as fresh and high quality. The content is hidden behind a registration or login wall. No specific victim organization is identified.
    Date: 2026-05-15T13:13:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%A8-2-9m-url-login-pass-%E2%9C%A8leak-private-url-login-pass%E2%9A%A1fresh-uhq%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Frisbeese
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  299. Combo List: 3,100 Line Mixed Mail Credentials Targeting Cloud Services
    Category: Combo List
    Content: A threat actor shared a combo list of 3,100 lines of mixed email credentials, marketed as fresh Hotmail accounts, purportedly valid for one cloud service. The content is gated behind registration or login on the forum.
    Date: 2026-05-15T13:12:54Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F3100-LINE-MIXMAIL-ONE-CLOUD-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: ALVIN
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  300. Combo list targeting Hotmail distributed via Telegram
    Category: Combo List
    Content: A threat actor is distributing an 8 million entry combo list targeting Hotmail accounts via Telegram channels. The post advertises free combo lists and tools through two Telegram groups.
    Date: 2026-05-15T13:09:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75350/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  301. Sale of fresh Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering a set of 1,500 Hotmail credentials described as private and fresh. The post directs interested parties to a Telegram account for access. Content is gated behind forum registration.
    Date: 2026-05-15T13:09:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75353/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  302. Alert: Deleted or unintelligible forum post
    Category: Alert
    Content: A forum post titled del was observed with no meaningful content. No threat data could be extracted.
    Date: 2026-05-15T12:58:20Z
    Network: openweb
    Published URL: https://tier1.life/thread/225
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  303. Alleged sale of military operations data for China and United States
    Category: Data Breach
    Content: A threat actor is offering for sale alleged information on future military operations involving China and the United States. The seller requests proof of funds via direct message and states samples and an inventory list will be provided upon contact. Escrow is accepted and the seller indicates interest in long-term clients.
    Date: 2026-05-15T12:54:11Z
    Network: openweb
    Published URL: https://breached.st/threads/china-x-us-data.87143/unread
    Screenshots:
    None
    Threat Actors: Jack_Falcone
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  304. Sale of Microsoft credential hits combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as VIP Microsoft Hits via a file-sharing link. Access to the password is gated through a Telegram channel. The post does not disclose the number of records or their origin.
    Date: 2026-05-15T12:53:21Z
    Network: openweb
    Published URL: https://breached.st/threads/vip-microsoft-hits-by-hello_zod_bot.87144/unread
    Screenshots:
    None
    Threat Actors: zoood
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  305. Sale of UK-targeted combo list
    Category: Combo List
    Content: A threat actor is selling a UK-targeted combo list on a cybercrime forum. The seller claims garbage and duplicate entries have been filtered, and offers bulk discounts and samples upon request.
    Date: 2026-05-15T12:42:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-UK-Targeted-Combolist–2094246
    Screenshots:
    None
    Threat Actors: T3z
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  306. Combo list of Hotmail credentials advertised as fresh
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 12,000 Hotmail credentials marketed as fresh. The content is gated behind forum registration or login. The post promotes a Discord server for additional free drops.
    Date: 2026-05-15T12:42:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-gaming-%F0%9F%93%8C12k-fresh-hotmails-%F0%9F%93%8C
    Screenshots:
    None
    Threat Actors: shinigami84
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  307. Sale of premium account access services including Claude, Cursor, and Hulu
    Category: Services
    Content: A forum seller is advertising a shop offering access to premium accounts for services including Claude, Cursor, and Hulu with claimed 24/7 support. The post appears to be a commercial storefront for account access services.
    Date: 2026-05-15T12:41:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-1-THE-SHOP-%E2%9A%9C%EF%B8%8F-PREMIUM-HUB-%E2%9A%9C%EF%B8%8F-CLAUDE-CURSOR-HULU-%E2%9A%A1-24-7-SUPPORT-%E2%AD%90
    Screenshots:
    None
    Threat Actors: Solane
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  308. Hotmail combo list with 260 premium hits shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list advertised as 260 Hotmail premium hits on a public forum. The content is hidden behind a registration or login requirement. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T12:41:46Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%93%8C260x-hotmail-premium-hits%F0%9F%93%8C
    Screenshots:
    None
    Threat Actors: Psyho70244
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  309. Sale of fake document rendering service on cracking forum
    Category: Services
    Content: A threat actor operating as SoulService is advertising a fake document rendering service on a cracking forum. The service claims to produce fraudulent identity documents with generated MRZ codes, barcodes, and QR codes, and asserts that all outputs are checked to remove forensic traces of photo editing. Payment is accepted in BTC, USDT, and Ethereum.
    Date: 2026-05-15T12:41:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-SPACE-RENDERING-from-Soules
    Screenshots:
    None
    Threat Actors: SoulService
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  310. Hotmail combo list with 9,805 credentials
    Category: Combo List
    Content: A threat actor has shared a combo list containing 9,805 Hotmail credentials on a public forum. The content is gated behind registration or login. Hotmail is a credential-stuffing target, not the breach source.
    Date: 2026-05-15T12:41:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5%F0%9F%94%A5-9805x-hotmail-%F0%9F%94%A5%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Hotmail combo list with 5,000 entries shared on forum
    Category: Combo List
    Content: A combo list titled Hotmail Unique Combo_3_5000 containing approximately 5,000 credential pairs was shared on a leak forum. The content is hidden behind a registration or login gate. The credentials appear to be targeted for use against Hotmail accounts.
    Date: 2026-05-15T12:40:32Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Hotmail-Unique-Combo-3-5000–20665
    Screenshots:
    None
    Threat Actors: UniqueComb
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  312. Sale of Hotmail combo list with 5,000 credentials
    Category: Combo List
    Content: A threat actor is offering a Hotmail combo list containing 5,000 email and password pairs on a cybercrime forum. The content is hidden behind a registration or login wall. The actor also advertises a shop (unique-combo.shop) selling combo lists of various countries and accepting custom requests.
    Date: 2026-05-15T12:40:14Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-3-5000–204160
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  313. Educational article on Linux virtual memory internals published on forum
    Category: Alert
    Content: A forum member published a long-form technical article (~25,000 words) on Linux virtual memory internals, covering page tables, TLB, demand paging, NUMA topology, and related performance topics. The post contains no threat activity, malicious tooling, or compromised data. It appears to be an educational or research-oriented article shared on the forum.
    Date: 2026-05-15T12:32:52Z
    Network: openweb
    Published URL: https://tier1.life/thread/224
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Website Defacement of ICDC India by Ruiixh4xor (SHENHAXSEC)
    Category: Defacement
    Content: On May 15, 2026, the website icdcindia.com was defaced by threat actor Ruiixh4xor, operating under the team SHENHAXSEC. The attack targeted a specific blog detail page and was a singular, targeted defacement rather than a mass or home page compromise. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-05-15T12:26:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922656
    Screenshots:
    None
    Threat Actors: Ruiixh4xor, SHENHAXSEC
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: ICDC India
    Victim Site: icdcindia.com
  315. Alleged malware development threat against Binance
    Category: Malware
    Content: Infrastructure Destruction Squad member threatens to develop malware and fraud platforms targeting Binance cryptocurrency exchange.
    Date: 2026-05-15T12:20:24Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4340
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Cryptocurrency/Financial Services
    Victim Organization: Binance
    Victim Site: binance.com
  316. Free Mixed Combo List of 212,581 Lines
    Category: Combo List
    Content: A threat actor shared a mixed combo list containing 212,581 lines, marketed as fresh and high quality. The list is available for free download via Pixeldrain, with the password distributed through a Telegram channel.
    Date: 2026-05-15T12:19:53Z
    Network: openweb
    Published URL: https://breached.st/threads/212581-lines-fresh-hq-mixed-combo-by-hello_zod_bot.87141/unread
    Screenshots:
    None
    Threat Actors: zoood
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  317. Alleged threat to develop and sell malware targeting Binance News by Infrastructure Destruction Squad
    Category: Malware
    Content: A member of Infrastructure Destruction Squad claims to have developed BankGhost Builder malware and threatens to create new malicious software specifically targeting Binance News and other platforms in retaliation for account freezing. The threat actor states these tools will be offered for sale to anyone willing to use them against the targeted platforms.
    Date: 2026-05-15T12:19:32Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4338
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Cryptocurrency Exchange
    Victim Organization: Binance News
    Victim Site: binance.com
  318. Alleged threat to develop malware targeting Binance by BankGhost Builder developers
    Category: Malware
    Content: A threat actor claiming to be part of the team that developed BankGhost Builder (a malicious tool targeting banks) has publicly threatened to create new malware specifically designed to target Binance News in retaliation for account freezing. The actor claims their funds were frozen without evidence and threatens to develop and sell malicious tools to expose corruption at Binance and other platforms.
    Date: 2026-05-15T12:13:55Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4337
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Financial Services/Cryptocurrency Exchange
    Victim Organization: Binance
    Victim Site: binance.com
  319. Sale of combo list targeting FunPay
    Category: Combo List
    Content: A threat actor is distributing credentials marketed as FunPay Logs and described as freshly checked. The post is sponsored by RogenCloud and promotes high-quality combo lists as an alternative to overused credential sets. No record count or pricing details are specified.
    Date: 2026-05-15T12:08:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8FunPay-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  320. Combo list targeting Orange.fr users with 15,000 credentials
    Category: Combo List
    Content: A combo list containing approximately 15,000 credentials associated with orange.fr accounts was shared on a cracking forum. The file was distributed by user VEOMINARINA with no additional post content available.
    Date: 2026-05-15T12:08:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-15k-orange-fr-txt
    Screenshots:
    None
    Threat Actors: VEOMINARINA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  321. Sale of combo list targeting Supercell accounts
    Category: Combo List
    Content: A threat actor is distributing credentials marketed as freshly checked Supercell account combos. The post advertises the content as high-quality and promotes an associated service called RogenCloud. A download link is implied but no record count or further technical details are provided.
    Date: 2026-05-15T12:08:07Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8SuperCell-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  322. Combo list of orange.fr credential hits shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of 4,500 credential hits targeting orange.fr accounts, advertised as freshly checked and AntiPublic-checked. The post was sponsored by RogenCloud, a service promoting high-quality combolists. Orange.fr is the credential-stuffing target, not the breach source.
    Date: 2026-05-15T12:07:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x4500-orange-fr-Hits-1-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: France
    Victim Industry: Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown
  323. Sale of Roblox stealer logs marketed as freshly checked
    Category: Logs
    Content: A threat actor is distributing stealer logs targeting Roblox accounts, described as freshly checked. The post is sponsored by RogenCloud and promotes high-quality logs as an alternative to widely circulated combo lists. No record count or specific victim details are provided.
    Date: 2026-05-15T12:07:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Roblox-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  324. Hotmail and streaming service combo list with over 1 million lines
    Category: Combo List
    Content: A threat actor is distributing a combo list containing over 1 million email and password combinations. The list is marketed as fresh and intended for credential stuffing against streaming services using Hotmail accounts.
    Date: 2026-05-15T12:07:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-022-973-Lines-%E2%9C%85-Streaming-Target-Hotmail-Combolist-Fresh-Leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  325. Sale of alleged Apple TV+ account access or subscription service
    Category: Services
    Content: A forum user is offering a 12-month Apple TV+ streaming support package for $119.99, framed as viewing workflow guidance. The listing uses obfuscated language but is consistent with the sale of unauthorized or cracked streaming account access on a cracking forum.
    Date: 2026-05-15T12:07:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-119-99-%E2%9C%85-Stream-Premium-Entertainment-All-Year-%E2%80%93-Apple-TV-12-Month-Viewing-Support
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  326. Combo list targeting orange.fr distributed on forum
    Category: Combo List
    Content: A combo list of approximately 5,000 credentials associated with orange.fr accounts has been shared on a forum. The content is hidden behind a registration or login requirement. Orange.fr is a credential-stuffing target, not necessarily the breached source.
    Date: 2026-05-15T12:07:03Z
    Network: openweb
    Published URL: https://patched.to/Thread-5k-orange-fr-txt
    Screenshots:
    None
    Threat Actors: veloorinaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  327. Sale of Spotify, Crunchyroll, and Claude accounts in bulk
    Category: Services
    Content: A forum seller is offering accounts for Spotify, Crunchyroll, and Claude in bulk quantities with warranty included. The post advertises these accounts as available at low prices, suggesting resale of compromised or cracked accounts.
    Date: 2026-05-15T12:06:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90-CHEAPEST-%E2%AD%90-SPOTIFY-CRUNCHYROLL-CLAUDE-%E2%9A%A1-BULK-READY-%E2%9C%85-WARRANTY-INCL-%E2%9A%9C%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Solane
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  328. Sale of HQ mixed mail access combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 300 high-quality mixed mail access credentials on a cybercrime forum. The content is hidden behind a registration or login requirement. No specific victim organization or country is identified.
    Date: 2026-05-15T12:06:42Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-3k-hq-mixed-mail-access-combolist-302632
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  329. Sale of cracked Acunetix Web Vulnerability Scanner v13.0.2
    Category: Vulnerability
    Content: A forum post on DemonForums offers a cracked copy of Acunetix Web Vulnerability Scanner v13.0.2 for download. Acunetix is a commercial web security testing tool capable of detecting SQL injection, XSS, and other web application vulnerabilities. The post includes a file security verification result and a download link.
    Date: 2026-05-15T12:05:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Acunetix-Web-Vulnerability-Scanner-v13-0-2–204155
    Screenshots:
    None
    Threat Actors: sophia01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  330. Alleged sale of mail access and credential combolists across multiple countries
    Category: Combo List
    Content: Threat actor advertising mail account access availability along with configs, scripts, tools, and credential combolists (combo) for multiple countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. Contact via @DataxLogs for requests.
    Date: 2026-05-15T12:04:27Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82090
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  331. Sale of dating site-based email list with personal data for spam campaigns
    Category: Combo List
    Content: A threat actor is distributing an email list sourced from dating sites, including fields such as email, gender, age, and location. The list is marketed for spam campaigns targeting dating sites and financial institutions. The data is offered via an external store and Telegram channel.
    Date: 2026-05-15T12:03:37Z
    Network: openweb
    Published URL: https://altenens.is/threads/emails-list-1-including-email-gender-age-location-100-datingsite-based-good-for-spaaming-datingsite-and-financial-institution.2940646/unread
    Screenshots:
    None
    Threat Actors: gray84a
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  332. Sale of Hotmail credential hits
    Category: Combo List
    Content: A forum user shared a download link purportedly containing 1,764 Hotmail credential hits. The post provides no further details about the origin or validity of the credentials.
    Date: 2026-05-15T11:56:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75346/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  333. Combo list of 1,637 Hotmail credentials with inbox targets and country sort
    Category: Combo List
    Content: A threat actor has shared a combo list of 1,637 alleged high-quality Hotmail credential hits, distributed for free. The list includes keyword-targeted inbox results and credentials sorted by country.
    Date: 2026-05-15T11:56:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75347/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Website Defacement of JEM Systems by azraelzer0d4y (b1ohaz4rd)
    Category: Defacement
    Content: On May 15, 2026, threat actor azraelzer0d4y, operating under the team b1ohaz4rd, defaced a media/custom directory page on the JEM Systems website. The attack was a targeted single-page defacement rather than a mass or home page compromise. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-15T11:54:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922655
    Screenshots:
    None
    Threat Actors: azraelzer0d4y, b1ohaz4rd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: JEM Systems
    Victim Site: www.jemsystems.com
  335. Alleged sale of RDP access and compromised email accounts
    Category: Initial Access
    Content: Threat actor offering rental access to RDP servers hosted on Azure, AWS, and DigitalOcean infrastructure for daily/monthly rates ($200 mentioned). Also advertising compromised domain mail accounts, Gmail, Yahoo accounts, GitHub Student accounts, and ChatGPT Plus/Claude subscriptions. Services marketed as fresh RDP with good IP and best for inbox operations.
    Date: 2026-05-15T11:51:45Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82097
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  336. Alleged data leak of goakab.go.id (Indonesian government portal)
    Category: Data Leak
    Content: A threat actor operating under the alias Xyph0rix has shared a download link purportedly containing a database dump associated with goakab.go.id, an Indonesian government domain. The post provides a direct download URL with no additional context regarding the volume or nature of the data contained within.
    Date: 2026-05-15T11:44:10Z
    Network: openweb
    Published URL: https://breached.st/threads/database-goakab-go-id.87137/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Goakab
    Victim Site: goakab.go.id
  337. Alleged data leak of US personal database
    Category: Data Leak
    Content: A threat actor shared a download link to a CSV file purportedly containing personal data belonging to individuals in the United States. No specific victim organization or record count was disclosed in the post.
    Date: 2026-05-15T11:43:39Z
    Network: openweb
    Published URL: https://breached.st/threads/database-usa-personal.87139/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  338. Website Defacement of Spark Vidyut by Ruiixh4xor (SHENHAXSEC)
    Category: Defacement
    Content: On May 15, 2026, the homepage of sparkvidyut.in, an Indian energy or electrical services company, was defaced by threat actor Ruiixh4xor operating under the team SHENHAXSEC. The attack was a targeted homepage defacement and has been mirrored for record at zone-xsec.com. No mass defacement or prior redefacement activity was associated with this incident.
    Date: 2026-05-15T11:34:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922654
    Screenshots:
    None
    Threat Actors: Ruiixh4xor, SHENHAXSEC
    Victim Country: India
    Victim Industry: Energy / Utilities
    Victim Organization: Spark Vidyut
    Victim Site: sparkvidyut.in
  339. Combo List targeting Riot Games accounts (783K credentials)
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 783,000 email:password credentials advertised as suitable for use against Riot Games accounts. The post describes the base as private and marketed as effective for credential stuffing. No specific breach source is identified.
    Date: 2026-05-15T11:32:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1783K-RIOT-GAMES%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  340. Combo list targeting cards and crypto services with 615K credentials
    Category: Combo List
    Content: A threat actor on Cracked is distributing a combo list of approximately 615,000 email:password credentials marketed for use against cards and cryptocurrency services. The post claims the data is private and advertises an impressive hit rate. The list is labeled as new for 2026.
    Date: 2026-05-15T11:32:34Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-615K-%E3%80%8D%E2%9A%A1-CARDS-AND-CRYPTO-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  341. Sale of 700K music service combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 700,000 email:password credentials marketed as a private base suitable for music services. The post claims the list is effective for general credential stuffing use.
    Date: 2026-05-15T11:32:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1700K-MUSIC%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  342. Sale of mixed combo list with 673K credentials
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a mixed combo list containing approximately 673,000 email and password pairs. The list is marketed as private data with a high hit rate and is advertised as new for 2026.
    Date: 2026-05-15T11:31:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-673K-%E3%80%8D%E2%9A%A1-MIX-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  343. Sale of Hotmail credential hits combo list
    Category: Combo List
    Content: A threat actor is distributing 500 Hotmail credential hits described as freshly checked and AntiPublic-checked. The post is sponsored by RogenCloud, advertising high-quality combo lists. These credentials are marketed for credential stuffing against Hotmail accounts.
    Date: 2026-05-15T11:31:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x500-Hotmail-Hits-2-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  344. Alleged distribution of valid cookies
    Category: Logs
    Content: A forum post titled Valid Cookies was shared by user R0BIN1337 on a cracking forum. No content was available to determine the scope, origin, or target of the claimed cookies.
    Date: 2026-05-15T11:31:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Valid-Cookies–2094211
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  345. Sale of Minecraft credential combo list with 619K entries
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 619,000 email:password credentials marketed for use against Minecraft accounts. The post claims the data is private and advertises a high hit rate. The list is presented as new for 2026.
    Date: 2026-05-15T11:30:50Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-619K-%E3%80%8D%E2%9A%A1-MINECRAFT-EP-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  346. Free distribution of Booking.com stealer logs
    Category: Logs
    Content: A threat actor shared what are described as freshly checked Booking.com stealer logs via a download link on a cracking forum. The post advertises the logs as high quality and distinguishes them from previously used combo lists. The content is distributed for free and sponsored by a combo/log service called RogenCloud.
    Date: 2026-05-15T11:30:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Booking-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Travel
    Victim Organization: Booking.com
    Victim Site: booking.com
  347. Free distribution of Grok account logs
    Category: Logs
    Content: A threat actor is distributing logs described as freshly checked Grok account credentials via a download link. The post is sponsored by RogenCloud, which advertises high-quality combo lists. No record count or additional technical details are provided.
    Date: 2026-05-15T11:30:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Grok-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  348. Sale of Hotmail credential hits combo list
    Category: Combo List
    Content: A threat actor is distributing 500 Hotmail credential hits described as freshly checked and AntiPublic checked. The post is sponsored by RogenCloud and promotes high-quality combo lists for credential stuffing purposes.
    Date: 2026-05-15T11:30:20Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x500-Hotmail-Hits-1-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  349. Free release of Yahoo combo list
    Category: Combo List
    Content: A threat actor shared a combo list described as Yahoo Logs and marketed as freshly checked credentials. The post is sponsored by RogenCloud and advertises high-quality combos. A download link was included, though no record count was specified.
    Date: 2026-05-15T11:29:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Yahoo-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  350. Sale of Hotmail credential hits combo list
    Category: Combo List
    Content: A threat actor is distributing 500 Hotmail credential hits described as freshly checked and AntiPublic checked. The post is sponsored by RogenCloud, a service advertising high-quality combo lists. These credentials are intended for credential stuffing and are not indicative of a breach of Hotmail or Microsoft.
    Date: 2026-05-15T11:29:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x500-Hotmail-Hits-3-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  351. Sale of Hotmail combo list with 933 valid credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 933 allegedly valid Hotmail credentials, dated 14 May 2026. The content is gated behind registration or login on the forum. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T11:29:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%A5%80933-hotmail-valid-access-14-05-2026-302609
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  352. Free distribution of URL:Log:Pass combo list with 18.2 billion lines
    Category: Combo List
    Content: A forum user is distributing a large URL:Log:Pass combo list containing approximately 18.242 billion lines. The content is hidden behind a registration or login wall. No specific victim organization is identified.
    Date: 2026-05-15T11:28:43Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-The-best-Url-Log-Pass-18-242-888-M%C4%B1ll%C4%B1on-L%C4%B1nes
    Screenshots:
    None
    Threat Actors: Max095
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  353. Sale of mixed combo list with 4,272 entries
    Category: Combo List
    Content: A threat actor is selling a mixed combo list containing 4,272 credential entries. The list is offered at tiered pricing with subscription options ranging from $3 for 24 hours to $100 for three months, with access via a Telegram channel and external paste link.
    Date: 2026-05-15T11:27:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75341/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  354. Sale of 100K UHQ Mixed Valid Combo List
    Category: Combo List
    Content: A threat actor shared a link to a combo list marketed as 100K UHQ mixed valid credentials. The list is described as high quality and mixed, suggesting credentials sourced from multiple services or regions.
    Date: 2026-05-15T11:27:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75342/
    Screenshots:
    None
    Threat Actors: Vmoon
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  355. Combo List of Japanese email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,900 Japanese email credentials, marketed as fresh and dated 15.05. Access to the content requires forum registration.
    Date: 2026-05-15T11:26:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75343/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  356. Sale of combo lists and account credentials targeting dating sites and financial institutions
    Category: Combo List
    Content: A threat actor is offering email lists containing personal attributes (gender, age, location, country) sourced from dating sites, marketed as suitable for spamming dating platforms and financial institutions. The post also advertises combo lists, SSN data, webmail and Office365 credentials, and fresh accounts for multiple dating services. Hidden content is available to registered users.
    Date: 2026-05-15T11:26:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75344/
    Screenshots:
    None
    Threat Actors: DatingBaseStore
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  357. Free Bitcoin stealer malware distributed on cybercrime forum
    Category: Malware
    Content: A threat actor is distributing a Bitcoin stealer malware for free on a cybercrime forum. The tool appears to target cryptocurrency wallets and is available as Windows and Linux binaries. The post includes build instructions and references to blockchain data fetching via third-party servers.
    Date: 2026-05-15T11:24:58Z
    Network: openweb
    Published URL: https://xforums.st/threads/bitcoin-stealer-absoloutly-free-stealer.615187/
    Screenshots:
    None
    Threat Actors: cryptocarding007
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  358. Sale of Prynt Stealer Cracked Version
    Category: Malware
    Content: A forum post advertises a cracked version of Prynt Stealer, an information-stealing malware capable of harvesting saved browser passwords, cookies, session tokens, financial data, and files from infected systems. The post includes download links gated behind forum registration. Distribution of cracked stealer builds is a common vector for malware proliferation in underground communities.
    Date: 2026-05-15T11:24:13Z
    Network: openweb
    Published URL: https://xforums.st/threads/prynt-stealer-cracked.615189/
    Screenshots:
    None
    Threat Actors: cryptocarding007
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  359. Alleged USA Personal Database Breach
    Category: Data Breach
    Content: Threat actor xyph0rix posted a database breach containing USA personal information on Breachforums. The breach appears to be a structured database dump with personal data records.
    Date: 2026-05-15T11:23:45Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix/369
    Screenshots:
    None
    Threat Actors: xyph0rix
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  360. Sale of cryptocurrency clipper malware supporting multiple blockchain networks
    Category: Malware
    Content: A threat actor is offering a cryptocurrency clipper malware written in C++ without .NET dependencies. The malware supports address substitution for Bitcoin, Ethereum, TRX, DOGE, Monero, Litecoin, and TRC-20 Tether transactions. The actor provides a compiled executable and source for self-compilation.
    Date: 2026-05-15T11:23:36Z
    Network: openweb
    Published URL: https://xforums.st/threads/supports-bitcoin-ethereum-trx-doge-monero-litecoin-and-trc-20-tether.615190/
    Screenshots:
    None
    Threat Actors: cryptocarding007
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  361. Sale of root access to high-capacity EU server
    Category: Services
    Content: A threat actor is offering root access to a large EU-based server with 77TB storage, 24 cores, and 96GB RAM, with approximately 20TB in active use. The seller requests buyers contact via private message for pricing. It is unclear whether this is a compromised server or a self-operated resource being rented out.
    Date: 2026-05-15T11:20:18Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Massive-root-access-80TB-24-Core-96-Gb
    Screenshots:
    None
    Threat Actors: apolloteller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  362. お知らせ | Orientaldiamond
    Category: Cyber Attack
    Content: Oriental Diamond announced that on May 4, 2026, it fell victim to a ransomware cyberattack carried out by a third party, which resulted in the encryption of data on its internal servers and a risk of personal data leakage. The company immediately isolated its servers from the network, reported the incident to the police and the Personal Data Protection Commission, and launched an investigation as well as restoration work entrusted to external experts. It stated that it would henceforth strive to prevent any recurrence and restore trust by implementing measures such as suspending VPN usage and strengthening authentication procedures.
    Date: 2026-05-15T11:18:28Z
    Network: openweb
    Published URL: https://www.orientaldiamond.jp/お知らせ
    Screenshots:
    None
    Threat Actors: Thegentlemen
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: 株式会社オリエンタルダイヤモンド
    Victim Site: orientaldiamond.jp
  363. Sale of multinational passport and ID numbers database
    Category: Carding
    Content: A threat actor is selling a database of 964 passport and national ID numbers spanning multiple countries including Canada, France, the USA, UK, Australia, Germany, India, and Nigeria. The data is offered in bulk or per piece, with pricing ranging from $2 per record to $800 for the full database. The origin or source of the passport and ID numbers is not disclosed in the post.
    Date: 2026-05-15T11:15:03Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Passport-ID-Numbers-Database-%E2%80%94-964-pcs-USA-Canada-EU-UK-AU-more
    Screenshots:
    None
    Threat Actors: TrinityID
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  364. Sale of initial access and data from Tata-Tour Travel Agency
    Category: Initial Access
    Content: A threat actor is selling a full access package for Tata-Tour, a travel agency operating in Ethiopia and Djibouti. The package includes admin credentials, a dealer database with names and phone numbers, agent KYC documents (passport scans and selfies), full database structure, and order history. The package is offered for $150, with cryptocurrency payment options accepted.
    Date: 2026-05-15T11:13:21Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Tata-Tour-Travel-Agency-%E2%80%94-Admin-Access-Dealer-Database-KYC-Documents
    Screenshots:
    None
    Threat Actors: TrinityID
    Victim Country: Ethiopia
    Victim Industry: Travel & Tourism
    Victim Organization: Tata-Tour
    Victim Site: Unknown
  365. Sale of live database connection strings with credentials across multiple sectors
    Category: Initial Access
    Content: A threat actor is selling 77 live database connection strings with usernames and passwords, offering direct backend access to databases across multiple sectors including e-commerce, healthcare, travel, fitness, dating, education, crypto, hospitality, and employment. The full pack is priced at $500, with individual connections available for $10 each. Targeted databases reportedly contain sensitive data including patient records, passport scans, financial transactions, and user credentials.
    Date: 2026-05-15T11:11:22Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-77-Live-Database-Access-%E2%80%94-Full-Connection-Strings-with-Passwords
    Screenshots:
    None
    Threat Actors: TrinityID
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Unknown
    Victim Site: Unknown
  366. Sale of stolen payment cards, dumps, and skimmer-obtained data across multiple countries
    Category: Carding
    Content: A threat actor is selling stolen payment card data including virtual credit cards (VCC), non-VbV cards, and dumps with PIN obtained via physical skimmers and POS terminals. Products cover cards from the US, UK, Canada, Australia, EU, and other regions, marketed with full cardholder details. The seller also advertises ATM cashout services for high-balance cards.
    Date: 2026-05-15T11:07:14Z
    Network: openweb
    Published URL: https://altenens.is/threads/i-sell-legit-products-good-best-quality-services-contact-me-to-make-money-for-a-long-time.2940641/unread
    Screenshots:
    None
    Threat Actors: wacri
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  367. Alleged data breach of Argentine Ministry of Health affecting 52 million citizens
    Category: Data Breach
    Content: Two threat actors claim to have accessed a database belonging to Argentinas Ministry of Health, compromising medical records, identity information, addresses, health insurance details, and mental health files for approximately 52 million Argentine citizens. The exposed data is reported to total approximately 700 GB.
    Date: 2026-05-15T11:05:07Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21723
    Screenshots:
    None
    Threat Actors: Unknown (two threat actors)
    Victim Country: Argentina
    Victim Industry: Healthcare/Government
    Victim Organization: Ministry of Health of Argentina
    Victim Site: Unknown
  368. Sale of supplier and company registration database with legal and contact information
    Category: Data Breach
    Content: A threat actor is offering for sale an XLSX database containing registration records of 556 supplier companies. The dataset includes company names, contact details, person in charge, business category, address, and legal identifiers such as NIB and NPWP, with most records showing a verification status of Pending. The origin of the database and the breached platform are not explicitly identified in the post.
    Date: 2026-05-15T10:56:19Z
    Network: openweb
    Published URL: https://breached.st/threads/database-registrasi-supplier-perusahaan-status-verifikasi-pending.87134/unread
    Screenshots:
    None
    Threat Actors: whoare
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  369. Alleged data leak of Police Nationale database
    Category: Data Leak
    Content: A threat actor on Breached forum claims to be freely sharing a database allegedly belonging to the French Police Nationale. The data is made available via an external file-sharing link. No further details regarding record count or data fields are provided in the post.
    Date: 2026-05-15T10:55:25Z
    Network: openweb
    Published URL: https://breached.st/threads/database-police-nationale.87135/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: France
    Victim Industry: Government
    Victim Organization: Police Nationale
    Victim Site: Unknown
  370. Alleged data breach of ESDM
    Category: Data Breach
    Content: A forum post titled DATA BASE ESDM was shared by user CatNatXploit on a breach forum, suggesting a database associated with ESDM may have been leaked or sold. No content was available in the post to confirm details, data types, or record counts.
    Date: 2026-05-15T10:54:53Z
    Network: openweb
    Published URL: https://breached.st/threads/data-base-esdm.87136/unread
    Screenshots:
    None
    Threat Actors: CatNatXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: ESDM
    Victim Site: Unknown
  371. Alleged data breach of ESDM (Indonesian Ministry of Energy and Mineral Resources)
    Category: Data Breach
    Content: Threat actor Brotheroodcapung Indonesia claims to have leaked a database from ESDM (jdih.esdm.go.id), an Indonesian government ministry. Evidence shared via MediaFire link containing alleged compromised data.
    Date: 2026-05-15T10:52:37Z
    Network: telegram
    Published URL: https://t.me/brotheroodbci/129
    Screenshots:
    None
    Threat Actors: Brotheroodcapung Indonesia
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: ESDM (Ministry of Energy and Mineral Resources)
    Victim Site: esdm.go.id
  372. Alleged breach of French Police Nationale database
    Category: Data Breach
    Content: A threat actor using the handle xyph0rix has posted on Breachforums claiming access to a database from Frances Police Nationale. The breach thread is being shared and discussed within the Rakyat Digital Crew channel.
    Date: 2026-05-15T10:50:26Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix/364
    Screenshots:
    None
    Threat Actors: xyph0rix
    Victim Country: France
    Victim Industry: Law Enforcement
    Victim Organization: Police Nationale
    Victim Site: Unknown
  373. Website Defacement of Technofunda by DimasHxR
    Category: Defacement
    Content: On May 15, 2026, a threat actor identified as DimasHxR defaced a media/custom directory on technofunda.store, a technology-focused e-commerce domain. The incident was a targeted, non-mass defacement affecting a specific page rather than the site homepage. No team affiliation, exploit details, or stated motive were disclosed in connection with this attack.
    Date: 2026-05-15T10:49:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922652
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-Commerce / Technology
    Victim Organization: Technofunda
    Victim Site: technofunda.store
  374. Website Defacement of Triniti-SB by DimasHxR
    Category: Defacement
    Content: On May 15, 2026, the Ukrainian website triniti-sb.com.ua, associated with Triniti SB, was defaced by the threat actor DimasHxR. The attacker targeted a specific media/custom directory path rather than the sites homepage, suggesting a partial or targeted defacement. No team affiliation, stated motive, or technical exploitation details were disclosed alongside the incident.
    Date: 2026-05-15T10:46:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922653
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ukraine
    Victim Industry: Security Services
    Victim Organization: Triniti SB
    Victim Site: triniti-sb.com.ua
  375. Sale of Apple iCloud combo list with 644K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 644,000 email and password pairs marketed for use against Apple iCloud accounts. The post advertises a high hit rate and claims the data is private and new for 2026. Apple iCloud is the credential-stuffing target, not the breach source.
    Date: 2026-05-15T10:43:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-644K-%E3%80%8D%E2%9A%A1-APPLE-ICLOUD-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  376. Sale of 510K Bet365 combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 510,000 email:password credentials marketed for use against Bet365. The post describes the base as private and suitable for multiple credential stuffing purposes.
    Date: 2026-05-15T10:43:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1510K-BET365%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  377. Hotmail USA combo list of 722K credentials
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list of approximately 722,000 Hotmail USA email and password pairs, marketed as private data with a high hit rate. The post claims the credentials are fresh for 2026. No specific breached organization is identified; the named service is a credential-stuffing target, not the breach victim.
    Date: 2026-05-15T10:43:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-722K-%E3%80%8D%E2%9A%A1-HOTMAIL-USA-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  378. Combo list targeting shopping and food platforms with 581K credentials
    Category: Combo List
    Content: A threat actor operating as MetaCloud3 is distributing a combo list of approximately 581,000 email and password pairs described as a private base suitable for credential stuffing against shopping and food platforms.
    Date: 2026-05-15T10:42:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1581K-SHOPPING-AND-FOOD%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  379. Combo list of 8 million URL:Log:Pass credentials shared for free
    Category: Combo List
    Content: A threat actor shared a combo list containing over 8 million URL:login:password credential pairs on a cybercrime forum. The content is gated behind registration or login. This is part 342 of an ongoing series of free credential list releases by the same actor.
    Date: 2026-05-15T10:42:30Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-342
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  380. Sale of 12K Mixed Mail Access Combo List
    Category: Combo List
    Content: A forum user is sharing a combo list of approximately 12,000 mixed mail access credentials. The content is hidden behind a login/registration wall. No additional details about the source or origin of the credentials are available.
    Date: 2026-05-15T10:41:59Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%9012k-mixed-mail-access-%E2%AD%90
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  381. Alleged data breach of supplier registration database
    Category: Data Breach
    Content: A database containing supplier registration information and verification status has been posted on Breach Forums. The post references a supplier company database with pending verification status records.
    Date: 2026-05-15T10:41:31Z
    Network: telegram
    Published URL: https://t.me/c/3841736872/444
    Screenshots:
    None
    Threat Actors: DEWATA BLACKHAT
    Victim Country: Indonesia
    Victim Industry: Supply Chain/Procurement
    Victim Organization: Unknown
    Victim Site: Unknown
  382. Sale of Trillium Security Multisploit Tool v4 Private Edition
    Category: Malware
    Content: A threat actor is distributing a tool called Trillium Security Multisploit Tool v4 Private Edition on a cracking forum. The tool is described as a modular framework integrating multiple exploit modules, payload delivery mechanisms, and post-exploitation capabilities. It is being offered with a download link and antivirus scan output.
    Date: 2026-05-15T10:41:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Trillium-security-multisploit-tool-v4-private-edition
    Screenshots:
    None
    Threat Actors: deanevan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  383. Combo list targeting Hotmail accounts
    Category: Combo List
    Content: A combo list purportedly containing 5,000 unique Hotmail credentials was shared on a cracking forum. The full content is restricted to registered and signed-in members. No further details about the datas origin are available from the post.
    Date: 2026-05-15T10:37:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75337/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  384. Sale of cloned cards, CVV, dumps, and fullz across multiple regions
    Category: Carding
    Content: A threat actor is offering stolen payment card data for sale including non-VBV credit cards, CVV/CCV, clone cards with ATM PINs, magnetic stripe dumps (Track 1 & 2 with and without PIN), BINs, DOBs, and fullz information. Cards are priced for US, UK, CA, AU, and EU regions across Visa, Mastercard, Amex, and Discover networks. Physical cloned cards with ATM PINs are also advertised for cash-out at ATMs and point-of-sale terminals.
    Date: 2026-05-15T10:32:02Z
    Network: openweb
    Published URL: https://xforums.st/threads/sell-non-vbv-cc-cvv-ccv-clone-cards-carding-dumps.615186/
    Screenshots:
    None
    Threat Actors: MrDumpsCC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  385. Alleged cPanel Account Credentials Combolist Leaked
    Category: Combo List
    Content: A user on Breachforums (JAX7) has shared a file named ACOONT_CPANEL.txt via MediaFire containing cPanel account credentials. The file appears to be a combolist of compromised cPanel accounts.
    Date: 2026-05-15T10:21:59Z
    Network: telegram
    Published URL: https://t.me/byjax7/725
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Unknown
    Victim Industry: hosting/web services
    Victim Organization: Unknown
    Victim Site: Unknown
  386. Sale of cPanel account logs
    Category: Logs
    Content: A threat actor operating under the alias JAX7 has shared a TXT file containing cPanel account credentials via a MediaFire download link. The post provides no details regarding the number of records, targeted organizations, or geographic origin of the compromised accounts.
    Date: 2026-05-15T10:21:13Z
    Network: openweb
    Published URL: https://breached.st/threads/234-9kb-account-cpanel.87133/unread
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  387. Alleged data breach of Bellavista School
    Category: Data Breach
    Content: The threat actor 404Crew Cyber Team claims to have breached the official website of Bellavista School, a South African educational institution. The alleged data includes names, email addresses, registration timestamps, and additional contact information such as phone numbers and account status.
    Date: 2026-05-15T10:20:10Z
    Network: openweb
    Published URL: https://breached.st/threads/the-official-website-of-an-educational-school-in-south-africa-bellavista-school.87131/unread
    Screenshots:
    None
    Threat Actors: 404Crew Cyber Team
    Victim Country: South Africa
    Victim Industry: Education
    Victim Organization: Bellavista School
    Victim Site: bellavista.co.za
  388. Alleged data breach of Cargo International
    Category: Data Breach
    Content: A threat actor is sharing an alleged database belonging to Cargo International on a cybercrime forum. The post includes a sample of the data. No further details regarding record count or data fields are visible in the post.
    Date: 2026-05-15T10:19:39Z
    Network: openweb
    Published URL: https://breached.st/threads/database-cargo-international.87132/unread
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Unknown
    Victim Industry: Transportation
    Victim Organization: Cargo International
    Victim Site: Unknown
  389. Free distribution of Minecraft credential logs
    Category: Logs
    Content: A threat actor is distributing what are described as freshly checked Minecraft logs via a download link. The post is sponsored by RogenCloud and markets the logs as higher quality than commonly circulated combos. No record count or specific victim organization is identified.
    Date: 2026-05-15T10:08:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Minecraft-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  390. Sale of Twitch credential combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as Twitch Logs and described as freshly checked. The post is sponsored by RogenCloud and promotes high-quality credentials for credential stuffing purposes. No record count or price is specified.
    Date: 2026-05-15T10:08:23Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Twitch-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  391. Free distribution of Instagram credential logs
    Category: Logs
    Content: A threat actor is distributing Instagram credentials marketed as freshly checked logs. The post is sponsored by RogenCloud and includes a download link for the credential data. The content implies the logs are sourced from stealer output rather than a direct breach of Instagram.
    Date: 2026-05-15T10:08:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8instagram-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  392. Sale of ChatGPT credential logs marketed as freshly checked
    Category: Combo List
    Content: A threat actor is distributing credentials marketed as freshly checked ChatGPT logs via a download link. The post is sponsored by RogenCloud and promotes the content as higher quality than commonly circulated combo lists.
    Date: 2026-05-15T10:07:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8ChatGpt-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  393. Sale of mixed combo list with fresh credentials
    Category: Combo List
    Content: A forum user shared a combo list containing 2,779 mixed email:password lines marketed as fresh. No additional details about the source or targeted services are available.
    Date: 2026-05-15T10:07:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-x2779-Mix-Fresh-Lines
    Screenshots:
    None
    Threat Actors: stvannx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  394. Free distribution of Netflix combo list
    Category: Combo List
    Content: A threat actor distributed a combo list marketed as freshly checked Netflix credentials. The post was sponsored by RogenCloud, a service advertising high-quality combos. No record count or additional details were provided.
    Date: 2026-05-15T10:07:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Netflix-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  395. Combo List targeting Hotmail (mixed regional domains)
    Category: Combo List
    Content: A combo list containing 315,323 email:password pairs for Hotmail accounts across multiple regional domains (.com, .fr, .es) has been shared on a cracking forum. The credentials are marketed as suitable for mixed-target credential stuffing. No specific breach source is identified.
    Date: 2026-05-15T10:07:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-315-323-%E2%9C%85-hotmail-com-fr-es-Good-For-Mixed-Target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  396. Sale of Twitter stealer logs marketed as freshly checked
    Category: Logs
    Content: A threat actor is distributing stealer log output described as Twitter Logs and marketed as freshly checked. The post promotes RogenCloud as a source for high-quality combo material. No record count or pricing details are provided.
    Date: 2026-05-15T10:06:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Twitter-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  397. Sale of Mixed Country Hotmail Combo List with 1.28 Million Lines
    Category: Combo List
    Content: A threat actor shared a mixed-country Hotmail combo list containing approximately 1.28 million email:password lines on a public forum. The list is marketed for credential stuffing against Hotmail/Outlook accounts. No further details are available as the post content was not accessible.
    Date: 2026-05-15T10:06:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-282-207-Lines-%E2%9C%85-Mixed-Country-Hotmail-com-COmbolist-2026
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  398. Free distribution of Amazon stealer logs
    Category: Logs
    Content: A threat actor distributed what are described as freshly checked Amazon logs via a download link on a cracking forum. The post promotes RogenCloud as a source for high-quality combo lists. No record count or specific data fields were disclosed.
    Date: 2026-05-15T10:06:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Amazon-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Amazon
    Victim Site: amazon.com
  399. Combo list targeting social media platforms with 656K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 656,000 email and password pairs claimed to target social media platforms. The post markets the credentials as private data with a high hit rate and labels them as new for 2026. No specific breached organization is identified.
    Date: 2026-05-15T10:06:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-656K-%E3%80%8D%E2%9A%A1-SOCIAL-MEDIA-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  400. Free combo list distribution — 500MB username:login:password dataset
    Category: Combo List
    Content: A threat actor is distributing a 500MB username:login:password combo list, marketed as fresh and high quality. The post advertises a Telegram channel (RogenCloud) for additional combo list parts. No specific breached organization is identified.
    Date: 2026-05-15T10:06:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8500MB-U-L-P-%E2%9C%A8-Fresh-Other-Parts-On-TG-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  401. Combo list targeting Xbox and PSN accounts distributed on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 733,000 email and password pairs marketed for use against Xbox and PlayStation Network (PSN) accounts. The post claims the data is private and advertises an impressive hit rate. Xbox and PSN are credential-stuffing targets, not breach victims.
    Date: 2026-05-15T10:05:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-733K-%E3%80%8D%E2%9A%A1-XBOX-PSN-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  402. Combo List: 25,000 Germany Mail Access Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 25,000 Germany-based email access credentials. The content is gated behind forum registration or login. No further details about the source or targeted services are available.
    Date: 2026-05-15T10:05:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%9025k-germany-mail-access-%E2%AD%90
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  403. Combo List of 702K credentials targeting Eneba and G2A
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 702,000 email:password credentials, described as a private base and marketed as suitable for credential stuffing against Eneba and G2A gaming platforms. The post claims the credentials are from a private source.
    Date: 2026-05-15T10:05:28Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1702K-ENEBA-G2A%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  404. Alleged combo list targeting Asia region with 900K credentials
    Category: Combo List
    Content: A forum user shared a hidden post titled 900K ASIA PRIVATE on a combolist forum, purportedly containing 900,000 credentials targeting the Asia region. The actual content is gated behind registration or login. No further details about the targeted services or data composition are available.
    Date: 2026-05-15T10:05:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-900k-asia-private
    Screenshots:
    None
    Threat Actors: moser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  405. Sale of combo list targeting Etsy and eBay accounts
    Category: Combo List
    Content: A threat actor is offering a combo list of 681K email:password credentials marketed for credential stuffing against Etsy and eBay accounts. The post claims the data is private and boasts an impressive hit rate, with the content described as new for 2026.
    Date: 2026-05-15T10:05:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-681K-%E3%80%8D%E2%9A%A1-ETSY-EBAY-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  406. Sale or distribution of 1 million EU combo list
    Category: Combo List
    Content: A forum member is sharing or selling a combo list advertised as containing 1 million European credentials. The content is hidden behind a registration or login requirement. No further details about the targeted services or data fields are available.
    Date: 2026-05-15T10:04:47Z
    Network: openweb
    Published URL: https://patched.to/Thread-1ml-eu-private-302570
    Screenshots:
    None
    Threat Actors: moser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  407. Sale of 601K email access combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of 601,000 email and password credentials, marketed as a private base suitable for various credential stuffing purposes. The post offers no information on the source of the credentials or specific targeted services.
    Date: 2026-05-15T10:04:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1601K-MAIL-ACCESS%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  408. Sale of Hotmail combo list with 617 valid credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 617 claimed valid Hotmail credentials, dated May 14, 2026. The content is gated behind forum registration or login. The credentials are marketed as verified valid access.
    Date: 2026-05-15T10:04:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%A5%80617-hotmail-valid-access-14-05-2026-302565
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  409. Sale of alleged 1.2 million USA combo list
    Category: Combo List
    Content: A forum member is offering a private combo list purportedly containing 1.2 million US-based credentials. The full content is hidden behind a registration or login requirement. No additional details about the source or targeted services are available.
    Date: 2026-05-15T10:04:11Z
    Network: openweb
    Published URL: https://patched.to/Thread-1-2ml-usa-private
    Screenshots:
    None
    Threat Actors: moser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  410. Distribution of cracked Money Robot Submitter 7.37 SEO software
    Category: Services
    Content: A forum post offers a free cracked version of Money Robot Submitter 7.37, an SEO automation tool, with an included loader. The post claims the software is fully functional and includes the latest Google algorithm updates. No victim organization or sensitive data is involved.
    Date: 2026-05-15T10:02:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-GET-Money-Robot-Submitter-7-37-Cracked-Free-Download-Crack-WORKING-LINK
    Screenshots:
    None
    Threat Actors: anonym
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  411. Alleged data breach of Binance with 1.5 million records
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged Binance database containing 1.5 million records priced at $650. The dataset purportedly includes fields such as email, password, full name, phone number, country, last login date, 2FA status, KYC status, and USD balance. Sample records provided contain US-based user entries with dates referencing 2026.
    Date: 2026-05-15T10:02:36Z
    Network: openweb
    Published URL: https://darkpro.net/threads/binance-2026-latest-database-1-5-million.23140/
    Screenshots:
    None
    Threat Actors: ⭐ RED✘ ⭐
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Binance
    Victim Site: binance.com
  412. Sale of stolen CVV card data across multiple countries
    Category: Carding
    Content: A threat actor operating under the alias Devvy Curtis is offering stolen CVV card data for multiple countries including the US, UK, Canada, Australia, EU, France, and Mexico. Cards are advertised as updated daily and include full card details such as card number, expiration date, CVV2, cardholder name, billing address, and bank information. Payment is accepted via Bitcoin and USDT.
    Date: 2026-05-15T09:57:17Z
    Network: openweb
    Published URL: https://altenens.is/threads/hello-all-buyer-my-nickname-is-devvy-curtis-i-sell-all-cvv-all-country-us-uk-ca-au-eu-fr-mx-all-cvv-is-updated-every-da.2940618/unread
    Screenshots:
    None
    Threat Actors: Rich977
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  413. Sale of Hotmail combo lists targeting multiple online services
    Category: Combo List
    Content: A threat actor is offering Hotmail combo lists via Telegram, advertising credentials usable for credential stuffing against multiple platforms including gaming services, LinkedIn, Tinder, Amazon, eBay, and GitHub. The actor directs interested parties to a Telegram contact and group channels for free combo lists and tools.
    Date: 2026-05-15T09:55:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75327/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  414. Sale of Xfinity credential combo list
    Category: Combo List
    Content: A threat actor is advertising a combo list targeting Xfinity users via a Telegram channel. The post directs interested parties to a Telegram group offering free combo lists and related programs. No record count or sample data was provided in the post.
    Date: 2026-05-15T09:55:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75335/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  415. Sale of Hotmail combo list with 1,500 valid credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 1,500 purportedly valid Hotmail full mail access credentials via a Telegram channel. The credentials are described as fully valid and sourced from EU, USA, corporate, and mixed origins with daily updates. The post links to an external paste site containing the credential data.
    Date: 2026-05-15T09:55:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75336/
    Screenshots:
    None
    Threat Actors: bigdatacombos
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  416. Alleged data leak of Argentine government agencies BCRA, IOMA, and GDEBA
    Category: Data Leak
    Content: A threat actor claiming affiliation with EsqueleSquad is freely distributing data allegedly obtained from multiple Argentine government entities, including the BCRA (Central Bank of Argentina) with over 32 million credit scoring records, IOMA with over 2 million affiliate/patient records including names, addresses, and CUITs, and GDEBA with over 900 classified PDF documents. An additional dossier on Argentine provincial governor Axel Kicillof, allegedly containing personal contact details and fi
    Date: 2026-05-15T09:51:33Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-Argentina-BCRA-IOMA-GDEBA
    Screenshots:
    None
    Threat Actors: Skull1172
    Victim Country: Argentina
    Victim Industry: Government
    Victim Organization: BCRA, IOMA, GDEBA
    Victim Site: Unknown
  417. Alleged defacement of KEC Sukabumi government website by Mr.PIMZZZXploit
    Category: Defacement
    Content: Threat actor Mr.PIMZZZXploit claims to have defaced the Sukabumi District Government website (kec-sukabumi.sukabumikab.go.id). Defacement message posted in BABAYO EROR SYSTEM channel with photo evidence.
    Date: 2026-05-15T09:41:06Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/950
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: KEC Sukabumi (Sukabumi District Government)
    Victim Site: kec-sukabumi.sukabumikab.go.id
  418. Free distribution of Outlook stealer logs
    Category: Logs
    Content: A threat actor distributed what are described as freshly checked Outlook logs via a download link. The post is sponsored by RogenCloud, a combo/log service. No record count or specific victim details are provided.
    Date: 2026-05-15T09:27:07Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Outlook-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  419. Free distribution of YouTube credential logs
    Category: Logs
    Content: A threat actor is distributing what are described as freshly checked YouTube logs via a download link. The post is sponsored by RogenCloud, which is advertised as a source of high-quality combo lists. No further details on record count or data scope are provided.
    Date: 2026-05-15T09:26:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Youtube-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  420. Sale of Trustpilot credential logs marketed as freshly checked
    Category: Combo List
    Content: A threat actor is distributing credentials advertised as Trustpilot Logs and marketed as freshly checked. The post promotes a service called RogenCloud offering high-quality combo lists. No record count or pricing details are specified.
    Date: 2026-05-15T09:26:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Trustpilot-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  421. Sale of SurfShark credential combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as freshly checked SurfShark credentials. The post advertises the content as high quality and includes a download link. The named service (SurfShark) is a credential-stuffing target, not necessarily the breach source.
    Date: 2026-05-15T09:26:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8SurfShark-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  422. Website Defacement of BPS Dompu by Ushiromiya
    Category: Defacement
    Content: On May 15, 2026, the attacker known as Ushiromiya defaced the homepage of bpsdompu.com, the website associated with BPS Dompu, the regional statistics agency of Dompu Regency in Indonesia. The attack was a targeted homepage defacement and was not part of a mass defacement campaign. The incident was documented and mirrored via zone-xsec.com.
    Date: 2026-05-15T09:26:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922651
    Screenshots:
    None
    Threat Actors: Ushiromiya, Ushiromiya
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: BPS Dompu (Badan Pusat Statistik Dompu)
    Victim Site: bpsdompu.com
  423. Sale of TikTok combo list marketed as freshly checked
    Category: Combo List
    Content: A forum user is distributing credentials marketed as freshly checked TikTok logs. The post promotes a service called RogenCloud offering combo lists. No record count or specific breach source is identified.
    Date: 2026-05-15T09:25:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8TikTok-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  424. Alleged free release of Onet credential combo list
    Category: Combo List
    Content: A forum user distributed credentials described as Onet Logs and marketed as freshly checked. The post promotes RogenCloud as a source for high-quality combo lists. No record count or additional details were provided.
    Date: 2026-05-15T09:25:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Onet-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  425. Free distribution of Reddit credential combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as Reddit Logs described as freshly checked. The post is sponsored by RogenCloud, a combo list service, and includes a download link for the credentials.
    Date: 2026-05-15T09:25:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Reddit-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  426. Free Spotify credential combo list
    Category: Combo List
    Content: A threat actor shared a combo list advertised as freshly checked Spotify credentials. The post promotes RogenCloud as a source for high-quality combos. No record count or specific breach source was disclosed.
    Date: 2026-05-15T09:24:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8Spotify-Logs-%E2%9C%A8-Freshly-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  427. Sale of cryptocurrency seed phrase generator and balance checker tool
    Category: Malware
    Content: A threat actor is offering a cryptocurrency seed phrase generator and balance checker tool capable of processing over 5 million phrases per hour. The basic version checks Bitcoin wallets, while a paid version supports 23 blockchain networks. The tool is designed to brute-force valid seed phrases and identify wallets with positive balances.
    Date: 2026-05-15T09:11:11Z
    Network: openweb
    Published URL: https://altenens.is/threads/seed-phrase-generator-and-balance-checker-2026.2940543/unread
    Screenshots:
    None
    Threat Actors: ananalbzoor
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  428. Sale of stolen payment cards, EBT cards, and dumps via carding marketplace
    Category: Carding
    Content: A threat actor operating under the name BigDevvyTEAM is advertising a carding marketplace offering daily-updated EBT cards with PINs, credit cards with CVV2, and dumps with PINs covering all US states. The operation claims over 30,000 existing customers and is actively recruiting new sellers. The marketplace operates primarily via Telegram and Discord.
    Date: 2026-05-15T09:04:30Z
    Network: openweb
    Published URL: https://altenens.is/threads/big-american-fraud-market-high-quality-we-update-daily-thousands-of-ebts-dumps-pin-ccs-cvv2-we-have-more-than-30-000-customers-already-wit.2940556/unread
    Screenshots:
    None
    Threat Actors: noretta
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  429. Sale of alleged Instagram database with 6 million records
    Category: Data Breach
    Content: A threat actor is selling an alleged Instagram database containing 6 million records. The dataset purportedly includes email addresses, first and last names, phone numbers, and Instagram IDs. Contact is offered via Telegram.
    Date: 2026-05-15T08:59:11Z
    Network: openweb
    Published URL: https://breached.st/threads/instagram-6m-database-for-sale.87129/unread
    Screenshots:
    None
    Threat Actors: Kevin Williams
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Instagram
    Victim Site: instagram.com
  430. Alleged data breach of Indonesia National Police
    Category: Data Breach
    Content: A threat actor is offering what they claim to be a database from the Indonesia National Police, containing fields such as officer ID, rank, name, position, unit, address, phone, and status. A sample is provided with a download link hosted on Mediafire. The post indicates negotiation is possible, suggesting the data may be for sale.
    Date: 2026-05-15T08:58:19Z
    Network: openweb
    Published URL: https://breached.st/threads/indonesia-police-database.87128/unread
    Screenshots:
    None
    Threat Actors: whoare
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Indonesia National Police
    Victim Site: Unknown
  431. Alleged data breach of Thai local government website kohkaewroiet.go.th
    Category: Data Breach
    Content: A threat actor claims to have hacked the Thai local government website kohkaewroiet.go.th and dumped all data, including admin credentials and over 10 internal accounts. The actor also claims to have a web shell and is soliciting contact via direct message or email.
    Date: 2026-05-15T08:57:50Z
    Network: openweb
    Published URL: https://breached.st/threads/thai-local-gov-kohkaewroiet-go-th-hacked.87130/unread
    Screenshots:
    None
    Threat Actors: yra404
    Victim Country: Thailand
    Victim Industry: Government
    Victim Organization: Koh Kaew Roiet Local Government
    Victim Site: kohkaewroiet.go.th
  432. Free combo list of mixed mail credentials
    Category: Combo List
    Content: A threat actor has shared a combo list of approximately 3,600 mixed email credentials, advertised as freshly checked and AntiPublic verified. The list is being distributed freely via a Telegram channel. The post promotes the channel as a source for additional credential drops.
    Date: 2026-05-15T08:43:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x3600-Mix-Mail-Hits-2-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  433. Free combo list of mixed mail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 3,600 mixed email credentials, marketed as freshly checked and AntiPublic verified. The list is being shared freely via a Telegram channel.
    Date: 2026-05-15T08:43:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x3600-Mix-Mail-Hits-1-%E2%9C%A8-Freshly-Checked-AntiPublic-CHecked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  434. Free distribution of mixed email combo list with 3,500 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 3,500 mixed email credential hits, marketed as freshly checked and AntiPublic verified. The list is shared freely via a Telegram channel. No specific breached organization is identified.
    Date: 2026-05-15T08:42:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x3500-Mix-Mail-Hits-3%E2%9C%A8-Freshly-Checked-AntiPublic-CHecked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  435. Alleged combo list of mixed fresh credentials
    Category: Combo List
    Content: A forum post on Cracked.st advertises a combo list of 4,160 mixed fresh credentials. No additional details are available as the post content is empty.
    Date: 2026-05-15T08:42:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-x4160-Mix-Fresh-Line
    Screenshots:
    None
    Threat Actors: stvannx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  436. Free release of mixed mail combo list with 3,000 credential hits
    Category: Combo List
    Content: A threat actor is distributing a mixed mail combo list containing approximately 3,000 credential hits, described as freshly checked and AntiPublic-verified. The list is shared freely via a Telegram channel and promoted as high-quality, unused credentials.
    Date: 2026-05-15T08:42:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x3K-Mix-Mail-Hits-4-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  437. Combo List or credentials shared for Figma PRO access
    Category: Combo List
    Content: A forum post offers hidden content purportedly enabling free access to Figma PRO accounts. The post likely contains credentials or account details for Figma, marketed as a method to obtain premium access at no cost.
    Date: 2026-05-15T08:41:21Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Get-Figma-PRO-For-Free
    Screenshots:
    None
    Threat Actors: Bug
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  438. Sale of Hotmail combo list sample (1,325 credentials)
    Category: Combo List
    Content: A threat actor shared a sample combo list of 1,325 Hotmail credentials on a leak forum. The content is hidden behind a registration or login requirement. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T08:40:48Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A11325x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Stevejobs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  439. Free combo list of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 3,759 mixed email and password credentials, made available for free download on a cybercrime forum. The list is marketed as high quality and contains credentials from various email providers.
    Date: 2026-05-15T08:40:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-3759x-HQ-MIXED-MAILS-%E2%9D%84%E2%9D%84
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  440. Sale of cracked credential stuffing tool Crosshair X
    Category: Combo List
    Content: A forum post in the Cracking Tools section advertises a cracked version of Crosshair X, a credential stuffing or account-checking tool, available for download. No further details about targeted services or record counts are provided.
    Date: 2026-05-15T08:40:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Crosshair-X-CRACKED–204133
    Screenshots:
    None
    Threat Actors: anonym
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  441. Combo List of 4,259 mixed email credentials with keyword targets
    Category: Combo List
    Content: A threat actor is distributing a combo list of 4,259 mixed email and password credentials, advertised as high quality. The post also includes a separate download for keyword-targeted credential sets.
    Date: 2026-05-15T08:40:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-4259x-HQ-MIXED-MAILS-%E2%9D%84%E2%9D%84-KEYWORD-TARGETS
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  442. Sale of ChatGPT credential stuffing configuration
    Category: Combo List
    Content: A threat actor is offering a credential stuffing configuration (config) targeting ChatGPT accounts. The post requires a reply to access the hidden content and directs interested parties to a Telegram contact for purchasing.
    Date: 2026-05-15T08:38:42Z
    Network: openweb
    Published URL: https://altenens.is/threads/svb-chatgpt-config-2026.2940536/unread
    Screenshots:
    None
    Threat Actors: GHOSTATN
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  443. Sale of credential stuffing config for SVB targeting Crackermain
    Category: Combo List
    Content: A forum member is sharing a Crackermain credential stuffing configuration file targeting SVB. The content is gated behind a reply requirement. No further details about record counts or capture fields are disclosed in the post.
    Date: 2026-05-15T08:38:11Z
    Network: openweb
    Published URL: https://altenens.is/threads/crackermain-full-capture-config-svb.2940537/unread
    Screenshots:
    None
    Threat Actors: GHOSTATN
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  444. Sale of Hotmail combo list with 1,527 hits
    Category: Combo List
    Content: A threat actor is offering a combo list of 1,527 claimed valid Hotmail credentials marketed as premium hits. The post requires a reply to access the hidden content, suggesting a free-share format contingent on forum engagement. The credentials are described as a private cloud mix of mail accounts.
    Date: 2026-05-15T08:37:40Z
    Network: openweb
    Published URL: https://altenens.is/threads/snowflakesnowflake-1527x-premium-hotmail-hits-snowflakesnowflake.2940551/unread
    Screenshots:
    None
    Threat Actors: alphacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  445. Sale of Byterat V20 Malware with HVNC and Browser Credential Theft Capabilities
    Category: Malware
    Content: A forum post by GollumsCoder advertises what appears to be Byterat V20, a malware tool featuring UAC bypass, Chrome credential cloning, and a Super Fast HVNC (Hidden Virtual Network Computing) module. The post lacks detailed content but the thread title indicates a tool designed for stealthy remote access and browser credential theft. No victim or pricing details are available.
    Date: 2026-05-15T08:36:54Z
    Network: openweb
    Published URL: https://hackforums.net/showthread.php?tid=6325441
    Screenshots:
    None
    Threat Actors: GollumsCoder
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  446. Alleged sale of RDP access to cloud infrastructure and premium accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to Azure, AWS, and DigitalOcean infrastructure on daily/monthly basis at $200. Also advertising domain email accounts (Gmail, Yahoo), GitHub Student accounts, ChatGPT Plus, and Claude 20x Max Plan access. Claims fresh IPs and limited stock availability. Escrow service offered.
    Date: 2026-05-15T08:35:07Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/81980
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  447. Alleged sale of compromised email account access to multiple platforms
    Category: Initial Access
    Content: Threat actor offering to sell valid, targeted email account access to multiple platforms including Hotmail, Yahoo, Reddit, Kleinanzeigen, Walmart, Grailed, Vinted, AT&T, eBay, Uber, Marriott, and Poshmark. Claims accounts are fresh, valid, and of top quality. Buyer can search for specific keywords/targets.
    Date: 2026-05-15T08:32:45Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/81984
    Screenshots:
    None
    Threat Actors: Yuze
    Victim Country: United States, United Kingdom, Canada
    Victim Industry: Technology, E-commerce, Social Media, Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown
  448. Alleged data breach of Indonesia Police database
    Category: Data Breach
    Content: A breach of the Indonesia Police database has been posted on Breached.st forum. The post includes a direct link to the breach thread discussing the compromised police database.
    Date: 2026-05-15T08:18:57Z
    Network: telegram
    Published URL: https://t.me/c/3841736872/438
    Screenshots:
    None
    Threat Actors: DEWATA BLACKHAT
    Victim Country: Indonesia
    Victim Industry: Government/Law Enforcement
    Victim Organization: Indonesia Police
    Victim Site: Unknown
  449. Sale of alleged Rich People financial database containing 2 million records
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database of 2 million high-net-worth individuals priced at $2,000. The dataset purportedly originates from bank data and includes highly sensitive fields such as SSN, date of birth, drivers license number, bank account and routing numbers, net income, employment details, and contact information. The victim organization is not identified.
    Date: 2026-05-15T08:09:12Z
    Network: openweb
    Published URL: https://breached.st/threads/rich-people-database-2m.87127/unread
    Screenshots:
    None
    Threat Actors: Kevin Williams
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  450. Alleged cyber attack on the Ethiopian Food and Drug Administration (EFDA)
    Category: Cyber Attack
    Content: The threat actor group 404Crew Cyber Team claims to have hacked the official website of the Ethiopian Food and Drug Administration (EFDA). No further details or proof were provided in the post.
    Date: 2026-05-15T08:08:33Z
    Network: openweb
    Published URL: https://breached.st/threads/the-official-website-of-the-ethiopian-food-and-drug-administration-efda-was-hacked.87126/unread
    Screenshots:
    None
    Threat Actors: 404Crew Cyber Team
    Victim Country: Ethiopia
    Victim Industry: Government
    Victim Organization: Ethiopian Food and Drug Administration
    Victim Site: efda.gov.et
  451. Free distribution of URL:log credential combo list including admin panels, VPN, and Citrix access
    Category: Combo List
    Content: A threat actor is freely distributing a 5.97 MB credential list containing approximately 18 million URL:log:pass combinations. The dataset reportedly includes credentials for admin panels, proxies, VPN services, Citrix, DANA, and WordPress instances. The archive is shared via Mega.nz with a provided password.
    Date: 2026-05-15T07:57:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-URLS-LOG-PASS-5-97-MB-ADMIN-VPN-CITRIX-DANA-REMOTE-FREE
    Screenshots:
    None
    Threat Actors: psychologist
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  452. Combo List marketed for Shopping Corp Business
    Category: Combo List
    Content: A combo list containing 53,015 email:password lines has been shared on a cracking forum, marketed as suitable for use against shopping and corporate business targets. No additional details are available from the post content.
    Date: 2026-05-15T07:57:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-53-015-Lines-%E2%9C%85-Combolist-Good-For-Shopping-Corp-Business
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  453. Sale of UHQ EU mixed combo list
    Category: Combo List
    Content: A threat actor is offering approximately 400 UHQ (ultra-high quality) EU mixed credentials on a cybercrime forum, marketed as VIP exclusive with high conversion rates. The content is hidden behind a registration or login wall. No specific victim organization or service is identified.
    Date: 2026-05-15T07:56:53Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%91%91-0-4k-uhq-eu-mixed-vip-exclusive-access-high-conversion-%F0%9F%91%91-302528
    Screenshots:
    None
    Threat Actors: BedrockDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  454. Sale of Amuse Crypt V2.0 crypter/obfuscation tool
    Category: Malware
    Content: A threat actor is distributing a cracked version of Amuse Crypt V2.0, advertised as a fully unlocked crypter with polymorphic encryption, multi-layer obfuscation, and anti-detection capabilities. The tool is marketed for payload protection and evasion of threat detection systems. It is offered as a free install on a cracking forum.
    Date: 2026-05-15T07:55:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Amuse-Crypt-V-2-0–204129
    Screenshots:
    None
    Threat Actors: deanevan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  455. Sale of BasesPro database redistribution and mail:pass combo tool
    Category: Combo List
    Content: A forum user is sharing a tool called BasesPro, advertised as offering 3,000+ methods for refactoring mail:pass databases. The content is hidden behind a login/register gate, suggesting it is distributed to registered forum members. This tool appears designed to support credential stuffing or combo list processing activities.
    Date: 2026-05-15T07:55:33Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Cracked-BasesPro-database-redistribution-mail-pass
    Screenshots:
    None
    Threat Actors: stak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  456. Website Defacement of Stammering Solution by Ruiixh4xor (SHENHAXSEC)
    Category: Defacement
    Content: On May 15, 2026, the website stammeringsolution.com was defaced by threat actor Ruiixh4xor, affiliated with the group SHENHAXSEC. This incident represents a redefacement of the homepage, indicating the site had been previously compromised and targeted again. The attack was an individual site defacement rather than a mass campaign.
    Date: 2026-05-15T07:55:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922649
    Screenshots:
    None
    Threat Actors: Ruiixh4xor, SHENHAXSEC
    Victim Country: Unknown
    Victim Industry: Healthcare / Speech Therapy
    Victim Organization: Stammering Solution
    Victim Site: stammeringsolution.com
  457. Sale of credential stuffing tool X3 Solution Trial
    Category: Combo List
    Content: A forum user is distributing a trial version of a tool called X3 Solution in the cracking tools section. The post provides a download link with no further details about the tools capabilities or targets.
    Date: 2026-05-15T07:55:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-X3-Solution-Trial–204132
    Screenshots:
    None
    Threat Actors: anonym
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  458. Sale of 3.4 million Germany-targeted mail:pass combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 3.4 million email and password pairs allegedly targeting German users, including web.de and gmx.de accounts. The list is advertised as available via Telegram. No specific breached organization is identified.
    Date: 2026-05-15T07:47:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75324/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  459. Combo List of 29,000 mixed mail access credentials
    Category: Logs
    Content: A combo list of approximately 29,000 reportedly valid mixed email access credentials was shared on the forum. The post is dated May 15 and is titled Full Valid Mail Access Mix, suggesting the credentials span multiple mail providers. No additional post content was available for further analysis.
    Date: 2026-05-15T07:39:39Z
    Network: openweb
    Published URL: https://xforums.st/threads/29k-full-valid-mail-access-mix-15-05.613848/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  460. Alleged sale of counterfeit currency (fake banknotes)
    Category: Cyber Attack
    Content: User qiyu repeatedly posts links to Telegram channels advertising the sale of counterfeit banknotes, described in Chinese as 精品假钞 (premium counterfeit currency) and 假钞天花板 (counterfeit currency ceiling/top tier). Multiple posts across the channel with consistent messaging and Telegram contact links for transactions.
    Date: 2026-05-15T07:24:40Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/81943
    Screenshots:
    None
    Threat Actors: qiyu
    Victim Country: Unknown
    Victim Industry: Financial/Currency
    Victim Organization: Unknown
    Victim Site: Unknown
  461. Alleged data breach of uEngage restaurant ordering and delivery platform
    Category: Data Breach
    Content: A threat actor claims to have compromised uEngages internal database in May 2026, exfiltrating approximately 3 million records totaling 14GB. The dataset allegedly includes customer PII (name, address, phone, email, date of birth), KYC documents (Aadhaar card, PAN card, bank statements, selfies, FSSAI licenses), order records, delivery reports, and wallet ledger data. Sample records referencing Indian customers and businesses were provided as proof.
    Date: 2026-05-15T07:23:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-uEngage-io-Restaurant-Ordering-Delivery-KYC-PII-PART
    Screenshots:
    None
    Threat Actors: zSenior
    Victim Country: India
    Victim Industry: Technology
    Victim Organization: uEngage
    Victim Site: uengage.io
  462. Website Defacement of Vipertek by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, a threat actor known as aexdy, operating under the group Leviathan Perfect Hunter, defaced the Indonesian website vipertek.id. The attack targeted a specific file (hx.txt) on the domain and was neither a mass defacement nor a redefacement. The motive behind the attack remains unknown.
    Date: 2026-05-15T07:21:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922640
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Vipertek
    Victim Site: vipertek.id
  463. Website Defacement of thebardou.com by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, the website thebardou.com was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The attack targeted a specific file path (hx.txt) rather than the homepage, suggesting a targeted file-level defacement. No specific motive or exploitation method was disclosed in the available data.
    Date: 2026-05-15T07:20:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922627
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: The Bardou
    Victim Site: thebardou.com
  464. Website Defacement of the-ami.org by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: The website the-ami.org was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter, on May 15, 2026. The defacement targeted a specific file (hx.txt) on the domain and was not classified as a mass or home page defacement. The incident has been mirrored and archived by zone-xsec.com for record-keeping purposes.
    Date: 2026-05-15T07:19:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922626
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: AMI
    Victim Site: the-ami.org
  465. Website defacement of The African Place by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, threat actor aexdy, operating under the team Leviathan Perfect Hunter, defaced the website theafricanplace.com, targeting a file path at hx.txt. The incident was a targeted single-site defacement with no indication of mass or repeat defacement activity. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-05-15T07:18:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922625
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Retail/E-Commerce
    Victim Organization: The African Place
    Victim Site: theafricanplace.com
  466. Website Defacement of thebobmerrill.com by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, the website thebobmerrill.com was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The defacement targeted a specific text file at thebobmerrill.com/hx.txt and was not classified as a mass or home page defacement. The incident was recorded and mirrored by zone-xsec.com.
    Date: 2026-05-15T07:17:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922628
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: The Bob Merrill
    Victim Site: thebobmerrill.com
  467. Sale of HQ fresh Hotmail combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as containing 621 fresh high-quality Hotmail credentials via a Telegram channel. The actor also offers private cloud access for purchase through a separate Telegram contact. Hotmail is a credential-stuffing target, not the breach source.
    Date: 2026-05-15T07:17:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85%E2%9C%A8-621X-HQ-FRESH-HOTMAIL-%E2%9C%85%E2%9C%A8
    Screenshots:
    None
    Threat Actors: chutguard
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  468. Website defacement of YRF Indonesia by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, a threat actor known as aexdy, operating under the group Leviathan Perfect Hunter, defaced the Indonesian website yrfindonesia.id. The defacement was a targeted single-site attack, not part of a mass defacement campaign. The incident was mirrored and documented by zone-xsec.com.
    Date: 2026-05-15T07:17:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922646
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: YRF Indonesia
    Victim Site: yrfindonesia.id
  469. Sale of HQ Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering a high-quality Hotmail combo list for sale via Telegram. The content is hidden behind a registration/login wall, with the seller directing buyers to contact them on Telegram at @window_linux01.
    Date: 2026-05-15T07:16:42Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-hq-hotmail-hit-%E2%9C%85-302519
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  470. Website Defacement of Wasabi Bistro by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, a threat actor identified as aexdy, affiliated with the group Leviathan Perfect Hunter, defaced the website of Wasabi Bistro, a restaurant-related domain. The defacement targeted a single page (hx.txt) and was neither a mass nor a redefacement event. The motivation and server details remain unknown.
    Date: 2026-05-15T07:16:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922643
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: United States
    Victim Industry: Food & Beverage / Restaurant
    Victim Organization: Wasabi Bistro
    Victim Site: wasabibistro.biz
  471. Sale of HQ fresh Hotmail and mix combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list described as high-quality and fresh Hotmail and mixed credentials, reportedly dropped in a private Telegram channel 24 hours prior. The content is hidden behind a registration or login requirement on the forum. No record count or pricing details are provided in the post.
    Date: 2026-05-15T07:16:23Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%B4%EF%B8%8F-hq-fresh-hotmails-mix-%E2%9C%B4%EF%B8%8F-dropped-in-private-channel-24h-ago-%F0%9F%94%A5%F0%9F%94%A5-302522
    Screenshots:
    None
    Threat Actors: nikyofficial
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  472. Sale of subscription upgrade services for streaming and software platforms
    Category: Services
    Content: A threat actor operating under the alias Wellix is offering cheap subscription upgrades on customers own accounts for a wide range of streaming, VPN, software, and media platforms including Netflix, ChatGPT, Disney+, Spotify, and many others. Services are sold via an autobuy storefront and advertised across Discord and Telegram. The offering suggests use of compromised or fraudulently obtained subscription credentials to upgrade third-party accounts.
    Date: 2026-05-15T07:16:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-nova-%E2%AD%90cheapest-upgrades%E2%AD%90-on-your-accounts-chatgpt-netflix-disney-supergrok-perplexitypro
    Screenshots:
    None
    Threat Actors: Wellix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  473. Open-source tool shared for using Telegram as cloud storage
    Category: Alert
    Content: A forum post shares hidden content advertising a free, open-source tool that enables users to use Telegram as a cloud storage solution similar to Google Drive. The actual content is gated behind registration or login. No threat actor, victim, or specific malicious activity is identifiable from the available post content.
    Date: 2026-05-15T07:15:39Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Turn-Telegram-Into-Google-Drive-Free-Open-Source
    Screenshots:
    None
    Threat Actors: Bug
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  474. Website Defacement of Youth United for Change by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: On May 15, 2026, the website youthunitedforchange.com was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The attack was a targeted single-site defacement, modifying a non-homepage resource at the specified path. No specific motivation or server details were disclosed in the available incident data.
    Date: 2026-05-15T07:15:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922645
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Non-Profit / Youth Advocacy
    Victim Organization: Youth United for Change
    Victim Site: youthunitedforchange.com
  475. Website Defacement of traffictalk.info by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, the website traffictalk.info was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The defacement targeted a specific file path (hx.txt) on the domain. This was a single targeted defacement, not a mass or redefacement incident, with the mirror archived on zone-xsec.com.
    Date: 2026-05-15T07:14:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922634
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Transportation / Traffic Information
    Victim Organization: Traffic Talk
    Victim Site: traffictalk.info
  476. Website Defacement of Virginia Woolf Blog by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: On May 15, 2026, the website virginiawoolfblog.com was defaced by threat actor aexdy, operating under the team Leviathan Perfect Hunter. The defacement targeted a text file (hx.txt) on the domain, indicating a targeted file-level intrusion. This was a singular, non-mass defacement incident with no prior redefacement history recorded.
    Date: 2026-05-15T07:13:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922641
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Media and Publishing
    Victim Organization: Virginia Woolf Blog
    Victim Site: virginiawoolfblog.com
  477. Website Defacement of Storybank.id by Aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, the Indonesian website storybank.id was defaced by a threat actor known as aexdy, operating under the group Leviathan Perfect Hunter. The defacement targeted a specific file path (hx.txt) rather than the homepage, suggesting a targeted file-level intrusion. The incident was recorded and mirrored by zone-xsec.com, a known defacement tracking platform.
    Date: 2026-05-15T07:13:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922621
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Indonesia
    Victim Industry: Media / Digital Content
    Victim Organization: Storybank
    Victim Site: storybank.id
  478. Website Defacement of The Station Inn by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: On May 15, 2026, the website thestationinn.net was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The defacement targeted a file path on the domain and was neither a mass nor redefacement incident. The Station Inn is likely a hospitality or live music venue based on its domain name.
    Date: 2026-05-15T07:12:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922631
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: United States
    Victim Industry: Hospitality / Entertainment
    Victim Organization: The Station Inn
    Victim Site: thestationinn.net
  479. Website defacement of Wizard Mode Film by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, the website wizardmodefilm.com was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The defacement targeted a file path on the domain associated with a film production entity. The incident was a single-target, non-mass defacement with limited technical metadata available.
    Date: 2026-05-15T07:11:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922644
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Entertainment / Film
    Victim Organization: Wizard Mode Film
    Victim Site: wizardmodefilm.com
  480. Website Defacement of zainelhasany.com by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, the website zainelhasany.com was defaced by threat actor aexdy, operating under the group Leviathan Perfect Hunter. The attack targeted a specific file path (hx.txt) on the domain and was neither a mass nor a redefacement incident. The defacement was documented and mirrored by zone-xsec.com.
    Date: 2026-05-15T07:10:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922647
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zain El Hasany
    Victim Site: zainelhasany.com
  481. Website Defacement of SoSolidWorld by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, a threat actor identified as aexdy, operating under the team Leviathan Perfect Hunter, defaced the website sosolidworld.com by uploading a defacement file at /hx.txt. The attack was a targeted single-site defacement with no mass defacement or redefacement indicators reported.
    Date: 2026-05-15T07:10:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922619
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: SoSolidWorld
    Victim Site: sosolidworld.com
  482. Website defacement of TrophyFilm by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: The website trophyfilm.com was defaced by threat actor aexdy, operating under the team name Leviathan Perfect Hunter, on May 15, 2026. The defacement targeted a specific file path (hx.txt) rather than the homepage, suggesting a targeted file-level intrusion rather than a full site takeover. The incident was recorded and mirrored by zone-xsec.com with mirror ID 922637.
    Date: 2026-05-15T07:09:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922637
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Entertainment/Film
    Victim Organization: TrophyFilm
    Victim Site: trophyfilm.com
  483. Website Defacement of Treasurehunt.id by aexdy of Leviathan Perfect Hunter
    Category: Defacement
    Content: On May 15, 2026, a threat actor operating under the alias aexdy, affiliated with the group Leviathan Perfect Hunter, defaced a file hosted on treasurehunt.id, an Indonesian domain. The defacement targeted a specific text file (hx.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was recorded and mirrored by zone-xsec.com.
    Date: 2026-05-15T07:08:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922635
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Indonesia
    Victim Industry: Entertainment / Gaming
    Victim Organization: Treasure Hunt
    Victim Site: treasurehunt.id
  484. Website Defacement of The Rogers Sisters by aexdy (Leviathan Perfect Hunter)
    Category: Defacement
    Content: On May 15, 2026, the website therogerssisters.com was defaced by threat actor aexdy, operating under the team Leviathan Perfect Hunter. The defacement targeted a specific file path (hx.txt) rather than the homepage, indicating a targeted file-level intrusion. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-15T07:07:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922630
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: United States
    Victim Industry: Entertainment / Music
    Victim Organization: The Rogers Sisters
    Victim Site: therogerssisters.com
  485. Combo list distribution on cracking forum
    Category: Combo List
    Content: A user on cracking forum CrackingX shared a post advertising a private ULP (URL:Login:Password) combo list dated 05/15/26. The post contains minimal detail beyond an access link, with no record count or target service specified.
    Date: 2026-05-15T07:00:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75306/
    Screenshots:
    None
    Threat Actors: distantguy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  486. Sale of combo list targeting Yahoo and streaming services
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 1.2 million credentials associated with Yahoo.com, Yahoo.ie, and Sapo.pt accounts, marketed for use against streaming services. The list is advertised as available via Telegram, with the actor also promoting a free combo group channel.
    Date: 2026-05-15T07:00:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75307/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  487. Sale of Spotify and Gaming Combo List
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 12 million credentials marketed as hits for Spotify and gaming platforms. The list is advertised via a cracking forum with distribution through Telegram channels. No specific breach source is identified.
    Date: 2026-05-15T07:00:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75318/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  488. Free combo list targeting French mail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,500 French email account credentials, marketed as valid and fresh as of May 15. The content is gated behind a reply requirement on the forum.
    Date: 2026-05-15T06:59:18Z
    Network: openweb
    Published URL: https://altenens.is/threads/1-5k-france-valid-fresh-mail-access-15-05.2940472/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  489. Sale of Hotmail combo list with 94K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 94,000 Hotmail mail access credentials via an external paste service. The credentials are marketed as fresh mail access. Hotmail is the credential-stuffing target, not the breach source.
    Date: 2026-05-15T06:58:49Z
    Network: openweb
    Published URL: https://altenens.is/threads/94k-fresh-mail-access-hotmail.2940474/unread
    Screenshots:
    None
    Threat Actors: Vekko
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  490. Free combo list of 7,500 valid mail credentials across multiple regions
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 7,500 email credentials described as valid, covering users from the USA, EU, Asia, and Russia. The list was dated May 15 and made available to forum members upon reply.
    Date: 2026-05-15T06:58:21Z
    Network: openweb
    Published URL: https://altenens.is/threads/7-5k-usa-eu-asia-ru-valid-mail-access-15-05.2940482/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  491. Website Defacement of FICEDA by DimasHxR
    Category: Defacement
    Content: On May 15, 2026, a threat actor identified as DimasHxR defaced a page on the New Zealand-based website ficeda.co.nz, targeting a media or custom content directory. The attack was a targeted, non-mass defacement and does not appear to be a redefacement. No specific motive, team affiliation, or server details were disclosed.
    Date: 2026-05-15T06:39:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922459
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: New Zealand
    Victim Industry: Unknown
    Victim Organization: FICEDA
    Victim Site: www.ficeda.co.nz
  492. Sale of TryHackMe Premium account upgrades
    Category: Services
    Content: A forum user is offering TryHackMe Premium account upgrades for sale at $19.99 for 3-month access and $49.99 for 1-year access. The seller claims the upgrades unlock premium content and include unspecified bonus gifts. It is unclear whether these are legitimate vouchers, compromised accounts, or unauthorized access methods.
    Date: 2026-05-15T06:37:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%E2%9A%A1%E2%9A%A1Tryhackme-Premium-upgrade-Unlock-Your-Hacking-Potential%E2%AD%90%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  493. Sale of mixed domain mixed target combo list with 856,784 credentials
    Category: Combo List
    Content: A combo list containing 856,784 email:password pairs across mixed domains and targets has been shared on a cracking forum. The list is described as mixed domain and mixed target, suggesting credentials sourced from multiple services and breaches.
    Date: 2026-05-15T06:37:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-856-784-Mixed-Domain-Mixed-Target-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  494. Sale of discounted VAPI AI voice platform credits
    Category: Services
    Content: A forum seller is offering $200 VAPI (vapi.ai) platform credits with 12-month validity at an undisclosed price via direct message. The offer includes access to VAPIs real-time AI voice call and agent API, marketed toward developers, SaaS products, and AI calling automation use cases. Delivery is advertised as 12–24 hours with private activation on the buyers email.
    Date: 2026-05-15T06:37:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%9C%A8%E2%9C%A8%E2%9C%A8VAPI-%E2%80%94-200-CREDITS-12-MONTHS-Real-time-AI-voice-calls-agents%E2%9A%A1%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  495. Sale of Steam account credential hits
    Category: Combo List
    Content: A threat actor is sharing 100 working credential hits for Steam accounts. The post is listed under a cracking forum section, indicating the credentials were tested against Steams platform via credential stuffing. No additional details about the data source are provided.
    Date: 2026-05-15T06:37:13Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A8STEAM%E2%9C%A8-%E2%9A%A1100-WORKING-HITS%E2%AD%90
    Screenshots:
    None
    Threat Actors: digital26
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  496. Sale of IPTV service access credentials or subscription
    Category: Combo List
    Content: A forum user is sharing or selling access to an IPTV service marketed as IPTV4K, claiming access to 39,000 live channels including adult content. The post includes a link, likely to credentials or a subscription token for the service.
    Date: 2026-05-15T06:36:54Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-TEST-IPTV4K-39K-Live-Channels-Adult-Content
    Screenshots:
    None
    Threat Actors: digital26
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  497. Free share of Netflix premium session cookies
    Category: Combo List
    Content: A threat actor shared Netflix premium session cookies on a cracking forum, marketed as working and checked as of May 15, 2026. The cookies were made available for free via an external link.
    Date: 2026-05-15T06:36:36Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%A4%EF%B8%8F-NETFLIX-%E2%9D%A4%EF%B8%8F-PREMIUM-COOKIES-WORKING-CHECKED-%E2%9D%A4%EF%B8%8F-15-05-2026-%E2%9D%A4%EF%B8%8F
    Screenshots:
    None
    Threat Actors: teemofacfeed
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  498. Free distribution of URL:Log:Pass combo list with 8+ million lines
    Category: Combo List
    Content: A forum user shared a URL:Log:Pass combo list containing over 8 million lines, distributed for free on a combolist forum. The content is hidden behind a registration/login wall. No specific victim organization or country is identified.
    Date: 2026-05-15T06:36:32Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-341
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  499. Free sharing of Paramount Premium accounts
    Category: Combo List
    Content: A forum user shared two Paramount Premium account credentials in the cracking section. The accounts are described as being associated with United States users. No further details about the source or method of compromise are provided.
    Date: 2026-05-15T06:36:12Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-2-x-Paramount-Premuim-Accounts-United-States
    Screenshots:
    None
    Threat Actors: teemofacfeed
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  500. Sale of German email credential combo list (54K)
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 54,000 German email credentials, advertised as mail access and marketed as top quality. The list appears to be restricted to German accounts and is available via the actors storefront at megacloudshop.top.
    Date: 2026-05-15T06:35:30Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-54K-Just-Germany-Jyst-Mail-Access-Top-Quality-15-05
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  501. VPS and dedicated server hosting service advertised on cracking forum
    Category: Services
    Content: A forum seller operating under the brand ahost.eu is advertising VPS and dedicated server hosting services across 35 countries, with prices starting at €7/month for VPS and €67/month for dedicated servers. The seller claims to have been operating since 2011 and offers SSL certificates, NVMe SSD storage, and 24/7 support. This appears to be a commercial hosting service offering promoted to forum members.
    Date: 2026-05-15T06:30:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75315/
    Screenshots:
    None
    Threat Actors: SeoHide
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  502. Combo List: 785 Hotmail fresh credential hits
    Category: Combo List
    Content: A threat actor shared 785 Hotmail credential hits described as fresh and high quality, dated May 15. Access to the content requires forum engagement.
    Date: 2026-05-15T06:16:26Z
    Network: openweb
    Published URL: https://altenens.is/threads/785x-hotmail-fresh-hits-top-quality-15-05.2940427/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  503. Mass Website Defacement of Thai Educational Institution by Alpha Wolf (XYZ)
    Category: Defacement
    Content: On May 15, 2026, threat actor XYZ operating under the team Alpha Wolf conducted a mass defacement campaign targeting www.suttawas.ac.th, a Thai educational institution hosted on a Linux server. The attack was part of a broader mass defacement operation, with the defaced page archived at haxor.id. This incident represents a non-targeted opportunistic defacement likely aimed at maximizing visibility across multiple sites simultaneously.
    Date: 2026-05-15T06:05:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249229
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Thailand
    Victim Industry: Education
    Victim Organization: Suttawas School
    Victim Site: www.suttawas.ac.th
  504. Combo List targeting German gaming and casino services
    Category: Combo List
    Content: A threat actor shared a combo list containing 652,357 email:password lines purportedly targeting gaming and casino platforms in Germany. The list was posted on a public forum and appears intended for credential stuffing against German gaming and casino services.
    Date: 2026-05-15T05:57:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-652-357-Lines-%E2%9C%85-Gaming-and-Casino-Target-Germany-DE-Leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  505. Sale of unauthorized PostHog Scale plan access on cracking forum
    Category: Services
    Content: A forum seller is offering 1-year access to PostHog Scale plan accounts with 2× monthly limits, advertised at a fraction of the official $16,500+ value. The offer includes full platform features and is activated on the buyers own email. The nature of the access suggests unauthorized or fraudulently obtained account provisioning.
    Date: 2026-05-15T05:56:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%9A%A1-PostHog-Scale-%E2%80%93-1-Year-Access-2%C3%97-Monthly-Limits-%C2%A0%C2%A0%E2%9A%A1%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  506. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 7,000 claimed high-quality Hotmail credential hits on a cybercrime forum. The content is hidden behind a registration or login requirement. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-15T05:55:56Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85-7k-hq-hotmail-hit-%E2%9C%85-302515
    Screenshots:
    None
    Threat Actors: RetroCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  507. Alleged data breach of Credilink Brazil
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump attributed to Credilink Brazil, reportedly containing 243 million records from 2024. The dataset includes CPF (national ID), full name, address, phone numbers, date of birth, mothers name, email, vehicle information, income estimates, and Federal Revenue status. The seller is requesting $200 USD payable in XMR or BTC.
    Date: 2026-05-15T05:55:27Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-DATABASE-CREDILINK-BRASIL-BRAZIL
    Screenshots:
    None
    Threat Actors: Just23
    Victim Country: Brazil
    Victim Industry: Finance
    Victim Organization: Credilink
    Victim Site: Unknown
  508. Sale of Hotmail combo list with 39,000 fresh credential hits
    Category: Combo List
    Content: A threat actor is advertising a combo list of approximately 39,000 Hotmail, Outlook, Live, and MSN email credentials marketed as fresh hits with a high hit rate. The seller claims to release 2–4 files daily via a Telegram channel, targeting accounts associated with US and European regions. No specific breached organization is identified; this appears to be a credential stuffing list aggregated from multiple sources.
    Date: 2026-05-15T05:54:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-39k-Premium-Mail-Access-Fresh-Hits
    Screenshots:
    None
    Threat Actors: mailcombo01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  509. Alleged counterfeit currency sales operation
    Category: Cyber Attack
    Content: User qiyu is advertising the sale of counterfeit banknotes (described as 精品假钞 – premium counterfeit currency) through Telegram links. Multiple identical posts indicate an active counterfeit currency distribution scheme.
    Date: 2026-05-15T05:49:41Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/81886
    Screenshots:
    None
    Threat Actors: qiyu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  510. Hotmail combo list with 38K fresh hits distributed via Telegram
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 38,000 Hotmail, Outlook, Live, and MSN credentials described as fresh hits with a high hit rate. The list is advertised as covering users from the US, EU, France, Germany, and Italy. Files are distributed daily via a Telegram channel under the alias HiddenAccessX.
    Date: 2026-05-15T05:48:49Z
    Network: openweb
    Published URL: https://altenens.is/threads/hotmail-38k-premium-mail-access-fresh-hits.2940409/unread
    Screenshots:
    None
    Threat Actors: mailcombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  511. Mix combo list of 73K premium email credentials with fresh hits
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 73,000 email credentials targeting Hotmail, Outlook, Live, and MSN accounts, marketed as fresh hits with a high hit rate. The list covers multiple regions including the US and several European countries. Access is advertised via a Telegram channel with daily drops of 2–4 files.
    Date: 2026-05-15T05:48:12Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-73k-premium-mail-access-fresh-hits.2940410/unread
    Screenshots:
    None
    Threat Actors: mailcombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  512. Combo List: Hotmail credentials (5,000 records)
    Category: Logs
    Content: A combo list purportedly containing 5,000 unique Hotmail credentials was shared on a cybercrime forum. The post provides minimal details beyond the thread title. These credentials are likely intended for credential stuffing or account takeover activity.
    Date: 2026-05-15T05:38:11Z
    Network: openweb
    Published URL: https://xforums.st/threads/hotmail-unique-combo_1_5000.613842/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  513. Sale of mixed email credential combo list with multi-factor authentication details
    Category: Combo List
    Content: A threat actor on Cracked forum is sharing a combo list described as Valid Mail FA Private Mixed, suggesting the credentials include email and password pairs with associated multi-factor authentication details. The post provides minimal context regarding the origin, volume, or targeted services. The content appears to be offered as a form of community support.
    Date: 2026-05-15T05:10:53Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Valid-Mail-FA-Private-Mixed–2094079
    Screenshots:
    None
    Threat Actors: Phantom4T
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  514. Combo list of Hotmail credentials shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 3,800 Hotmail email credentials on a cracking forum. The post is dated May 14 and the data is described as old. The credentials are marketed as mail access, suggesting usability for account takeover.
    Date: 2026-05-15T05:10:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8%E2%9C%88%EF%B8%8F3-8k-HOTMAIL-MAIL-ACCESS%E2%9C%88%EF%B8%8F%E2%9C%A8-14-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  515. Combo List: HQ Mix credential list shared by Stevee36
    Category: Combo List
    Content: A user on a cracking forum shared a combo list of approximately 2,294 email:password pairs marketed as high quality. No specific breach source or targeted service was identified in the post.
    Date: 2026-05-15T05:10:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2294-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: steevee
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  516. Sale of discounted Telegram Premium subscriptions and Stars on cybercrime forum
    Category: Services
    Content: A forum user is selling Telegram Premium subscriptions and Telegram Stars at below-market prices. Offerings include Premium plans ranging from 3 months at $15 to 1 year at $35, and Stars packages from 50 to 500,000 units. The origin or legitimacy of these subscriptions is not disclosed.
    Date: 2026-05-15T05:09:43Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%8E%9Dcheapest%E2%8E%A0-telegram-premium%F0%9F%92%8Eand-stars%E2%AD%90-on-the-market%F0%9F%92%B8
    Screenshots:
    None
    Threat Actors: Saudi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  517. Free South Korea email combo list (Batch 41/100)
    Category: Combo List
    Content: A threat actor shared a free South Korean email list as part of a series (Batch 41 of 100) on a public forum. The content is hidden behind registration/login, limiting visibility into specific record counts or data fields. The post is categorized as a combo list targeting South Korean email accounts.
    Date: 2026-05-15T05:09:30Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-41-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  518. Germany mail access combo list with 3.2K credentials
    Category: Combo List
    Content: A combo list of approximately 3,200 German email account credentials is being shared on a cybercrime forum. The content is hidden behind a registration or login requirement. The post is labeled as old data from a private collection by the user TraxGod.
    Date: 2026-05-15T05:09:13Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%BB3-2k-germany-mail-access-mix%F0%9F%8C%BB%E2%9C%A8-14-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  519. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of 800 purportedly valid Hotmail credentials on a cybercrime forum. The content is gated behind registration or login. These credentials are likely intended for use in credential stuffing or account takeover activity.
    Date: 2026-05-15T05:08:27Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-800x-Valid-HQ-Hotmails–204106
    Screenshots:
    None
    Threat Actors: Sellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  520. Sale of Hotmail combo list with 800 valid credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list containing 800 purportedly valid Hotmail credentials. The content is hidden behind a registration or login requirement on the forum. The credentials are marketed as high-quality (HQ) hits.
    Date: 2026-05-15T05:08:20Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-800x-Valid-HQ-Hotmails
    Screenshots:
    None
    Threat Actors: xleov
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  521. Combo List of 800 Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 800 alleged Hotmail credential hits on a cybercrime forum. The content is hidden behind registration or login. The credentials are marketed as high quality (HQ) hits.
    Date: 2026-05-15T05:08:02Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-NUM-PASS-%E2%9C%85-800-HQ-HOTMAIL-HIT-%E2%9C%85
    Screenshots:
    None
    Threat Actors: AWSCRACKSISTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  522. Website Defacement of Canela Abogados by Anonym (3XPLOIT.ID)
    Category: Defacement
    Content: On May 15, 2026, the website of Canela Abogados, a law firm, was defaced by a threat actor operating under the alias Anonym affiliated with the Indonesian hacking group 3XPLOIT.ID. The defacement targeted a specific file path rather than the homepage, indicating a targeted intrusion rather than a mass or home page defacement. The incident was archived and mirrored via haxor.id.
    Date: 2026-05-15T04:53:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249227
    Screenshots:
    None
    Threat Actors: Anonym, 3XPLOIT.ID
    Victim Country: Spain
    Victim Industry: Legal Services
    Victim Organization: Canela Abogados
    Victim Site: canelaabogados.com
  523. Mass Defacement of Canela Abogados Mail Server by 3XPLOIT.ID
    Category: Defacement
    Content: The threat actor Anonym operating under the team 3XPLOIT.ID conducted a mass defacement targeting the mail server of Canela Abogados, a law firm identifiable by the abogados (Spanish for lawyers) designation in the domain. The defacement was detected on May 15, 2026, and is classified as a mass defacement campaign rather than an isolated or repeated attack against this specific target. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-15T04:50:05Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249228
    Screenshots:
    None
    Threat Actors: Anonym, 3XPLOIT.ID
    Victim Country: Unknown
    Victim Industry: Legal Services
    Victim Organization: Canela Abogados
    Victim Site: mail.canelaabogados.com
  524. Alleged data leak of infinition.es – CSV file distributed
    Category: Data Leak
    Content: A CSV file allegedly containing data from infinition.es has been leaked and made available for download via MediaFire. The post references KARAWANG ERROR SYSTEM and includes a photo allegedly showing the compromised system. The file is being distributed publicly without payment.
    Date: 2026-05-15T04:44:22Z
    Network: telegram
    Published URL: https://t.me/KAR4WANG_ERROR_SYSTEM/499
    Screenshots:
    None
    Threat Actors: KARAWANG ERROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: infinition.es
    Victim Site: infinition.es
  525. Alleged data breach of Ethiopian government NGO registration agency
    Category: Data Breach
    Content: The threat actor 404Crew Cyber Team posted in a database forum claiming a breach of an official Ethiopian government agency responsible for registering and auditing NGOs. No further details or post content were available to confirm the nature or scope of the data involved.
    Date: 2026-05-15T04:36:44Z
    Network: openweb
    Published URL: https://breached.st/threads/official-government-agency-site-that-registers-and-audits-ngos-ngos-in-ethiopia.87124/unread
    Screenshots:
    None
    Threat Actors: 404Crew Cyber Team
    Victim Country: Ethiopia
    Victim Industry: Government
    Victim Organization: Ethiopian Government NGO Registration and Audit Agency
    Victim Site: Unknown
  526. DDoS-for-hire service offering with 90 attack methods across Layer 4 and Layer 7
    Category: DDoS
    Content: A threat actor is advertising a stress testing and DDoS-for-hire platform marketed as JINKUSU ATTACK featuring 90 attack methods spanning Layer 4 and Layer 7. The service includes additional capabilities such as a real IP finder, port scanner, proxy manager, and live traffic analytics.
    Date: 2026-05-15T04:32:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-JINKUSU-ATTACK-DDOS-MASTER
    Screenshots:
    None
    Threat Actors: jinkusu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  527. Alleged data breach of Auchan France
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from French retailer Auchan, containing approximately 1,291,028 records. The dataset includes customer names, email addresses, phone numbers, physical addresses, loyalty card numbers, and customer IDs. The seller claims the data is fresh and previously uncirculated, and directs interested buyers to contact via Telegram or Discord.
    Date: 2026-05-15T04:29:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FRENCH-DATABASE-AUCHAN-1-2M
    Screenshots:
    None
    Threat Actors: Lagui
    Victim Country: France
    Victim Industry: Retail
    Victim Organization: Auchan
    Victim Site: auchan.fr
  528. Sale of alleged US investor PII dataset containing 1 million records
    Category: Data Breach
    Content: A threat actor is offering for sale a dataset purportedly containing over one million US investor records. The data includes investor IDs, full names, email addresses, phone numbers, dates of birth, physical addresses, and account type information (e.g., Roth IRA, 401(k), Brokerage Account). The origin or breached organization has not been identified.
    Date: 2026-05-15T04:29:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SELL-PII-US-1001K-INCLUDE-INVESTOR-ID-FIRST-NAME-FUL-NAME-EMAIL-PHONE-DATOFBIRTH
    Screenshots:
    None
    Threat Actors: 053o
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  529. Sale of credential stuffing tool targeting Crypto.com
    Category: Combo List
    Content: A threat actor is offering for sale a credential stuffing tool targeting Crypto.com for $900. The tool is written in GoLang, claims captcha-bypass capability, and supports high-speed checking (up to 200k CPM with HQ proxies). Full source code is included in the sale.
    Date: 2026-05-15T04:28:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-crypto-com-vm–76482
    Screenshots:
    None
    Threat Actors: dragono
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  530. Sale of initial access to Directorate General of Drug Administration, Bangladesh
    Category: Initial Access
    Content: A threat actor is selling what appears to be session-based access to the Directorate General of Drug Administration (DGDA), a regulatory body under the Ministry of Health & Family Welfare of Bangladesh. The post includes a session token and lists the agencys functions covering drug registration, licensing, and pharmaceutical regulations. Access is priced at $500.
    Date: 2026-05-15T04:28:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Directorate-General-of-Drug-Administration-Government-of-Bangladesh
    Screenshots:
    None
    Threat Actors: dragono
    Victim Country: Bangladesh
    Victim Industry: Government
    Victim Organization: Directorate General of Drug Administration
    Victim Site: dgda.gov.bd
  531. Alleged sale of MistralAI internal source code and repositories
    Category: Data Breach
    Content: A threat actor is offering for sale approximately 5GB of alleged internal source code and repositories from Mistral AI, priced at $5,000. The purported dataset includes repositories related to training, fine-tuning, benchmarking, model inference, platform dashboards, and future projects for both mistralai and mistral-solutions. The seller provided a list of sample repository names and a Session messaging contact for transaction.
    Date: 2026-05-15T04:27:26Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-MistralAI-internal-source-code-repos
    Screenshots:
    None
    Threat Actors: dragono
    Victim Country: France
    Victim Industry: Technology
    Victim Organization: Mistral AI
    Victim Site: mistral.ai
  532. Alleged data breach of Cairo and Galala University
    Category: Data Breach
    Content: A threat actor identified as INT3X is offering for sale approximately 10GB of data allegedly exfiltrated from Cairo University and Galala University in Egypt. The dataset reportedly includes PII for approximately 45,000 students (41,000 from Cairo, 4,000 from Galala), encompassing national IDs, passwords, emails, phone numbers, guardian details, and addresses, along with student images and documents.
    Date: 2026-05-15T04:26:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Egypt-Cairo-Galala-University-PII-Students-Images-Docs-10GB
    Screenshots:
    None
    Threat Actors: INT3X
    Victim Country: Egypt
    Victim Industry: Education
    Victim Organization: Cairo University and Galala University
    Victim Site: Unknown
  533. Sale of proxy business setup service
    Category: Services
    Content: A seller operating under the name Paxerr is advertising a proxy business setup service on a darknet forum. The offering includes unlimited revisions, a refund policy, and 24/7 support. The post outlines terms of service covering payment, delivery, ownership transfer, and liability limitations.
    Date: 2026-05-15T04:25:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-%E2%9A%A1LAUNCH-YOUR-PROXY-BUSINESS-%E2%80%A2-100-REFUND-%E2%80%A2-UNLIMITED-REVISIONS-%E2%80%A2-24-7-SUPPORT%E2%9A%A1
    Screenshots:
    None
    Threat Actors: BossOfBosses
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  534. Alleged data breach of Aviso Wealth
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from Aviso Wealth (aviso.ca), a Canadian wealth management and financial services company. The dataset, purportedly breached on 1 May 2026, contains approximately 261,382 records including customer full names, street addresses, cities, provinces, postal codes, and phone numbers. A sample of Canadian records, predominantly from Alberta, was provided as proof.
    Date: 2026-05-15T04:25:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Aviso-Wealth-aviso-ca-261-382
    Screenshots:
    None
    Threat Actors: lowiqq
    Victim Country: Canada
    Victim Industry: Finance
    Victim Organization: Aviso Wealth
    Victim Site: aviso.ca
  535. Graphic design and video editing services offered on dark forum
    Category: Services
    Content: A forum user is advertising graphic design, video editing, and GIF animation services on a dark web forum. The seller claims over 13 years of professional experience and offers logo design, promotional videos, motion graphics, and social media content. Contact is solicited via Telegram.
    Date: 2026-05-15T04:24:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Hello-I%E2%80%99m-a-graphic-designer-and-video-editor
    Screenshots:
    None
    Threat Actors: aslantr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  536. Sale of root access to high-capacity server in Germany
    Category: Initial Access
    Content: A threat actor is offering root access to a server located in Germany with 24 cores, 96GB RAM, and 80TB storage. The access is being auctioned to the highest bidder via Telegram. No victim organization is identified in the post.
    Date: 2026-05-15T04:23:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Huge-access-sell-80Tb-24-core-96Gb-RAM
    Screenshots:
    None
    Threat Actors: aptelleralone
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  537. Alleged data breach of CA Indosuez Spain
    Category: Data Breach
    Content: A threat actor is offering for sale approximately 200,000 lines of personally identifiable information allegedly extracted from CA Indosuez Spain account holders. The dataset includes phone numbers, full names, gender, email addresses, physical addresses, postal codes, and dates of birth. Sample records provided contain data consistent with Spanish residents.
    Date: 2026-05-15T04:22:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-SPAIN-ca-indosuez-com-PII-200k-lines
    Screenshots:
    None
    Threat Actors: Tink3rTech
    Victim Country: Spain
    Victim Industry: Finance
    Victim Organization: CA Indosuez
    Victim Site: ca-indosuez.com
  538. Alleged data leak of yalelodges.com
    Category: Data Leak
    Content: A threat actor operating under the handle 1877Team has freely distributed what is claimed to be the database of yalelodges.com via a file-sharing link. The post frames the release as free content for the new beginning, suggesting a promotional leak. No record count or data field details were specified in the post.
    Date: 2026-05-15T04:21:00Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-yalelodges-com-database
    Screenshots:
    None
    Threat Actors: 1877
    Victim Country: Unknown
    Victim Industry: Hospitality
    Victim Organization: Yale Lodges
    Victim Site: yalelodges.com
  539. Alleged data leak of eak-electronic.com phone:password database
    Category: Data Leak
    Content: A threat actor known as 1877 has freely shared a phone:password database allegedly sourced from eak-electronic.com. The post is attributed to the #1877Team and directs users to a Telegram channel for access. No record count or additional technical details were provided.
    Date: 2026-05-15T04:20:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-eak-electronic-com-phone-password-DB
    Screenshots:
    None
    Threat Actors: 1877
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: EAK Electronic
    Victim Site: eak-electronic.com
  540. Alleged data leak of ssgmce.ac.in
    Category: Data Leak
    Content: A threat actor operating under the 1877 Team banner has freely released what they claim is a database associated with ssgmce.ac.in, an Indian engineering college. The data was made publicly available via a file-sharing link and promoted across their Telegram channel and affiliated site. No details regarding record count or specific data fields were disclosed in the post.
    Date: 2026-05-15T04:19:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-ssgmce-ac-in-Databases
    Screenshots:
    None
    Threat Actors: 1877
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Shri Sant Gajanan Maharaj College of Engineering
    Victim Site: ssgmce.ac.in
  541. Alleged data leak of Basij member information database
    Category: Data Leak
    Content: A threat actor operating under the 1877Team handle claims to have leaked a database containing detailed personal information on Basij members, including full names, national IDs, addresses, ranks, and phone numbers. A free sample is offered, with further details available via Telegram. The post is written in both English and Kurdish.
    Date: 2026-05-15T04:18:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-BASIJ-MEMBER-INFO-DATABASE
    Screenshots:
    None
    Threat Actors: 1877
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: Basij (Islamic Revolutionary Guard Corps)
    Victim Site: Unknown
  542. Alleged data breach of RIMATEL.MR with ransom demand
    Category: Cyber Attack
    Content: Threat actor Signal404 claims to have compromised the internal infrastructure of RIMATEL, a private telecommunications company in Mauritania, and extracted customer personal identification records, payment receipts, transaction records, employee information, and billing/financial documents. Sample data includes customer subscription and invoicing records denominated in Mauritanian Ouguiya (MRU). The actor has issued a ransom demand, threatening to publish all data if payment is not received be
    Date: 2026-05-15T04:18:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-RIMATEL-MR-%E2%80%94-Internal-Database-Compromised
    Screenshots:
    None
    Threat Actors: Signal404
    Victim Country: Mauritania
    Victim Industry: Telecommunications
    Victim Organization: RIMATEL
    Victim Site: rimatel.mr
  543. Alleged data leak of Bangladesh Customs (customs.gov.bd)
    Category: Data Leak
    Content: A threat actor leaked a database allegedly belonging to Bangladesh Customs, operating under the National Board of Revenue (NBR). The leak reportedly contains email subscriptions related to customs enforcement and hashed passwords associated with the NBR and various private companies. The data was made available via an anonymous file-sharing link.
    Date: 2026-05-15T04:17:30Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-customs-gov-bd-Bangladesh-Customs-enforcement
    Screenshots:
    None
    Threat Actors: vicmeow
    Victim Country: Bangladesh
    Victim Industry: Government
    Victim Organization: Bangladesh Customs / National Board of Revenue
    Victim Site: customs.gov.bd
  544. Alleged data leak of Bengkalis Regency Integrated Electronic Licensing Service (EPINTER)
    Category: Data Leak
    Content: A threat actor has leaked data from EPINTER, the Integrated Electronic Licensing Service platform of Bengkalis Regency, Indonesia, managed by the DPMPTSP. The leaked dataset allegedly contains email addresses and plaintext passwords for registered users of the platform. The data was made available via an external file-sharing link.
    Date: 2026-05-15T04:16:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-epinter-bengkaliskab-go-id-Integrated-Electronic-Licensing-Service
    Screenshots:
    None
    Threat Actors: vicmeow
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Bengkalis Regency DPMPTSP
    Victim Site: epinter.bengkaliskab.go.id
  545. Sale of mixed-country shopping combo list with 745,994 credentials
    Category: Combo List
    Content: A combo list containing approximately 745,994 email:password pairs is being shared on a cracking forum. The credentials are described as mixed-country and targeted toward shopping platforms. No specific breached organization is identified.
    Date: 2026-05-15T04:10:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-745-994-Mixed-Country-Shopping-Target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  546. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 635 Hotmail mail access credentials on a public forum. The content is gated behind registration or login. The post is dated May 14 and notes the data is old.
    Date: 2026-05-15T04:10:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%BBx635-hotmail-mail-access%F0%9F%8C%BB%E2%9C%A8-14-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  547. Combo List: USA, Germany, and Switzerland mail access mix
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 2,400 mail access credentials sourced from the United States, Germany, and Switzerland. The content is hidden behind a registration or login requirement. The post is dated May 14 and is labeled as private data from the author.
    Date: 2026-05-15T04:10:11Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%BB2-4k-usa-de-ch-mail-access-mix%F0%9F%8C%BB%E2%9C%A8-14-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  548. Combo List: 30K UHQ Outlook Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 30,000 Outlook credentials marketed as UHQ (ultra-high quality) and fresh. The post is sponsored by a third-party AIO service. These credentials are intended for credential stuffing against Outlook/Microsoft accounts.
    Date: 2026-05-15T03:29:20Z
    Network: openweb
    Published URL: https://cracked.st/Thread-30K-UHQ-OUTLOOK-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  549. Sale of 200K UHQ mixed mail combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of 200,000 mixed email credentials marketed as UHQ and fresh. The post is sponsored by slateaio.com, suggesting use with account-checking tools.
    Date: 2026-05-15T03:29:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-200K-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  550. Sale of UHQ Yahoo combo list with 40,000 credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 40,000 Yahoo credentials marketed as UHQ and fresh. The post is sponsored by a third-party AIO service. This is a credential stuffing resource, not a breach of Yahoo itself.
    Date: 2026-05-15T03:28:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-40K-UHQ-YAHOO-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  551. Sale of UHQ Gmail combo list with 735,000 credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as containing 735,000 UHQ Gmail credentials marketed as fresh. The post is sponsored by slateaio.com, suggesting association with credential-stuffing tooling.
    Date: 2026-05-15T03:28:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-735K-UHQ-GMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  552. Free combo list of European email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,200 European email credentials, described as private data from the poster. The list was made available for free on a cracking forum.
    Date: 2026-05-15T03:28:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8%E2%9C%88%EF%B8%8F1-2k-EUROPE-MAIL-ACCESS-MIX%E2%9C%88%EF%B8%8F%E2%9C%A8-14-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  553. Combo List targeting German social and shopping platforms
    Category: Combo List
    Content: A combo list of 845,641 email:password lines is being distributed, marketed as high-quality credentials targeting German social media and shopping platforms. The list is described as HQ (high quality) leaks intended for credential stuffing against German-language services.
    Date: 2026-05-15T03:27:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-845-641-Lines-%E2%9C%85-Social-and-Shopping-Target-Germany-HQ-Leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  554. Hotmail combo list of 4K credentials marketed as daily fresh bases
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 4,000 Hotmail credentials, advertised as fresh and updated daily. The post is located in a combolist forum section and implies ongoing availability of fresh credential bases. No breach of Microsoft or Hotmail infrastructure is claimed.
    Date: 2026-05-15T03:27:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%854K-HOTMAIL-ACCESS%E2%9C%89%EF%B8%8F%E2%9C%85EVERY-DAY-FRESH-BASES%E2%9C%89%EF%B8%8F%E2%9C%85
    Screenshots:
    None
    Threat Actors: readyoffice
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  555. Free combo list of 11K mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 11,000 mixed credentials, claimed to be 100% valid and recently checked. The list was distributed freely on a cracking forum.
    Date: 2026-05-15T03:26:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-11K-Mix-100-Valid-just-checked-COMBO
    Screenshots:
    None
    Threat Actors: Bandyta
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  556. Sale of UHQ Hotmail combo list containing 63K credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 63,000 Hotmail credentials, marketed as ultra-high quality and fresh. The list is intended for credential stuffing against Hotmail/Microsoft accounts.
    Date: 2026-05-15T03:26:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-63K-UHQ-HOTMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  557. Sale of Instagram Custom Business Meta Verification Service
    Category: Services
    Content: A threat actor is advertising a service to obtain Instagram Business Meta verification badges without requiring legitimate documentation from the buyer. The service claims a 0-2 hour turnaround and allows any name and profile picture. This appears to be a fraudulent account verification service targeting Instagram/Metas verification system.
    Date: 2026-05-15T03:26:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1-Instagram-Custom-Business-Meta-Verification%C2%A0-Fast-Turnaround-Best-Prices-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Artistice
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  558. Combo List targeting Hotmail accounts (930 credentials)
    Category: Combo List
    Content: A threat actor shared a combo list of 930 Hotmail mail access credentials on a public forum. The content is gated behind registration or login. The post notes the data is old.
    Date: 2026-05-15T03:25:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%BBx930-hotmail-mail-access%F0%9F%8C%BB%E2%9C%A8-14-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  559. Sale of fraudulent document creation and KYC/AML bypass service
    Category: Services
    Content: A threat actor operating under the name Diamond Service is advertising a document forgery and KYC/AML verification bypass service. The service claims to produce falsified identity documents for over 70 countries, including correct barcode generation and metadata manipulation to avoid forensic detection. The offering targets account verification bypass and unblocking of restricted accounts across unspecified platforms.
    Date: 2026-05-15T03:25:27Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9C%94%EF%B8%8F-Drawing-editing-documents-drops-templates-KYC-AML-V-erification–204093
    Screenshots:
    None
    Threat Actors: Resddddf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  560. Sale of stolen payment cards, dumps, and financial account access
    Category: Carding
    Content: A threat actor is offering stolen credit cards (CC/CVV/Fulls), magnetic stripe dumps (101/201, with and without PIN), and compromised financial accounts including PayPal, CashApp, and verified bank wallets. The seller also advertises carding tutorials, order fulfillment from major retailers at 20–60% cost, and cashout services via Bitcoin exchange. Cards are claimed to have a 90–100% validity rate across USA, EU, and global BINs.
    Date: 2026-05-15T03:24:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9C%94%EF%B8%8FDUMPS-CC-CVV-CLONE-CARDS-PAYPAL-CASHAPP-ACCOUNTS%E2%9C%94%EF%B8%8F–204098
    Screenshots:
    None
    Threat Actors: Dayroeh
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  561. Alleged defacement of ELN Voces infrastructure by IRON ATLAS NEW GENERATION
    Category: Defacement
    Content: Threat actor IRON ATLAS NEW GENERATION claims to have compromised the digital infrastructure of ELN VOCES (Ejército de Liberación Nacional). The actor provides a link to allegedly hacked content at https://radio.eln-voces.net/public/frontera and references their official Telegram channel for further information.
    Date: 2026-05-15T03:22:38Z
    Network: telegram
    Published URL: https://t.me/c/3518294966/144
    Screenshots:
    None
    Threat Actors: IRON ATLAS NEW GENERATION
    Victim Country: Colombia
    Victim Industry: Political/Military Organization
    Victim Organization: ELN VOCES (Ejército de Liberación Nacional)
    Victim Site: eln-voces.net
  562. Sale of bank logs with mail access and RDP credentials
    Category: Logs
    Content: A threat actor operating under the alias GHOSTLOGGY1 is advertising fresh bank logs with mail access and RDP credentials via a Telegram channel. The post markets these as valid and directs buyers to an external Telegram storefront.
    Date: 2026-05-15T03:06:59Z
    Network: openweb
    Published URL: https://altenens.is/threads/bankjack-o-lanternlogsjack-o-lanternstore.2940343/unread
    Screenshots:
    None
    Threat Actors: GHOSTLOGGY1
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  563. Sale of Apple Pay-linked payment cards in bulk
    Category: Carding
    Content: A threat actor is advertising bulk Apple Pay-linked credit cards (CCs/Fullz) for sale, claiming no OTP is required and that cards auto-add. The seller offers replacement guarantees and guidance for new buyers, accepting cryptocurrency payments via Telegram.
    Date: 2026-05-15T03:06:15Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttonall-newbies-trynna-chop-red-appleapple-pay-ccs-available-in-bulk.2940356/unread
    Screenshots:
    None
    Threat Actors: Baintek
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  564. Sale of 50,000 email credentials combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 50,000 email credentials marketed as valid full mail access. No additional details are available from the post content.
    Date: 2026-05-15T02:42:34Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-50k-Full-MailAccess-Valid
    Screenshots:
    None
    Threat Actors: private_crew
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  565. Sale of stolen US payment cards with full billing information
    Category: Carding
    Content: A threat actor is selling fresh US payment cards with full billing information on a cybercrime forum. No further details regarding card volume, price, or source were provided in the post.
    Date: 2026-05-15T02:42:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-S-FRESH-CARDS-W-FULL-BILLING
    Screenshots:
    None
    Threat Actors: jinxsz
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  566. Sale of email inbox checker and credential validation tool targeting mixed email providers
    Category: Combo List
    Content: A threat actor is offering for sale a credential-checking tool called Hunter Mix Inbox Checker v8 capable of validating email accounts across 99% of email providers including Hotmail. The tool includes inbox viewing, bulk SMTP sending, proxy support, and webhook integration for pushing results to Discord or Telegram. Prospective buyers are directed to contact the seller via direct message.
    Date: 2026-05-15T02:41:23Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%9A%A1%E2%9A%A1Hunter-Mix-Inbox-Checker-v8%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: hunterX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  567. Combo List of Hotmail credentials available on forum
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 2,600 Hotmail credentials, marketed as valid and high quality. The list is dated May 15 and is available to forum members upon reply.
    Date: 2026-05-15T02:31:29Z
    Network: openweb
    Published URL: https://altenens.is/threads/2-6k-high-voltagehotmailhigh-voltagevalid-mail-access-15-05.2940329/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  568. Sale of Hotmail combo list with 1,072 valid credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 1,072 claimed valid Hotmail credentials, marketed as UHQ (ultra-high quality). The content is hidden behind registration and the actor is directing interested parties to a Telegram channel for access.
    Date: 2026-05-15T01:59:32Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1072-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  569. Sale of Hotmail combo list with 1,072 valid credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 1,072 claimed valid Hotmail credentials, marketed as UHQ (ultra-high quality). The content is hidden behind registration or login, with the actor also advertising via Telegram.
    Date: 2026-05-15T01:59:29Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-X1072-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  570. Free combo list of 14,593 mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 14,593 mixed credentials on a leak forum. The content is hidden behind registration or login, suggesting distribution to forum members. No specific victim organization or country is identified.
    Date: 2026-05-15T01:59:07Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-14-593-Good-MIXED-GOODS-D4RKNETHUB-CLOUD
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  571. Sale of mixed combo list via D4rkNetHub cloud service
    Category: Combo List
    Content: A threat actor operating as D4rkNetHub is selling a mixed combo list containing 14,593 email:password credentials via their cloud service. Access is offered on subscription tiers ranging from $10 for a 3-day trial to $50 for 30 days. The list is described as good hits with no specific victim organization identified.
    Date: 2026-05-15T01:58:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-14-593-Good-MIXED-GOODS-D4RKNETHUB-CLOUD
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  572. Alleged data leak of Chinese passport records
    Category: Data Leak
    Content: A threat actor has shared what appears to be a collection of 1,075 Chinese passport records via file hosting links. The archive is password-protected and posted on a carding forum. The origin or source of the passport data is not specified.
    Date: 2026-05-15T01:53:06Z
    Network: openweb
    Published URL: https://altenens.is/threads/china-1075x-passport.2940282/unread
    Screenshots:
    None
    Threat Actors: ketrin24
    Victim Country: China
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  573. Mix valid mail access combo list (82.6K credentials)
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 82,600 mixed email credentials, marketed as valid and private. The list is dated 15.05.2026 and is available via a reply-gated download on the forum.
    Date: 2026-05-15T01:52:31Z
    Network: openweb
    Published URL: https://altenens.is/threads/82-6k-sparkles-mix-sparkles-valid-mail-access-15-05.2940308/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  574. Alleged sale of Eli Lilly internal source code repositories and documents
    Category: Data Breach
    Content: A threat actor claims to be selling over 1,200 internal source code repositories totaling approximately 80GB (compressed) allegedly stolen from Eli Lilly, covering drug research tools, AI agents, medical devices, manufacturing systems, and clinical platforms. An additional 40GB of documents reportedly exfiltrated from Eli Lillys Veeva vault are also included in the offering. The actor is seeking $70,000 USD for exclusive sale and has offered to sell back to Eli Lilly directly, threatening to le
    Date: 2026-05-15T01:28:21Z
    Network: openweb
    Published URL: https://breached.st/threads/eli-lilly-internal-codebases-for-drug-development-and-trials.87122/unread
    Screenshots:
    None
    Threat Actors: TeamPCP
    Victim Country: United States
    Victim Industry: Healthcare
    Victim Organization: Eli Lilly
    Victim Site: lilly.com
  575. Sale of stolen payment cards, bank logs, and cashout services
    Category: Carding
    Content: A threat actor is offering stolen credit cards, bank logs, and cashout services including transfers to CashApp and cryptocurrency. Services advertised include converting PayPal balances, bank logs, and CCs to crypto. Contact is directed to a Telegram handle.
    Date: 2026-05-15T01:24:17Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-Linkable-Ccs-Bank-logs-Slips
    Screenshots:
    None
    Threat Actors: Oblocck
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  576. Free release of 156 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor has shared a combo list containing 156 million URL:login:password credential pairs, marketed as high quality. The post appears to be a bump of a prior release thread on the forum.
    Date: 2026-05-15T01:08:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-156M-%E2%9A%A1-URL-LOGIN-PASS-HQ-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  577. Mixed country combo list distribution
    Category: Combo List
    Content: A combo list containing 84,482 email:password credential pairs from mixed countries is being distributed on a cracking forum. The post is categorized as a mixed-country corporate combo list, suggesting credentials from various corporate targets.
    Date: 2026-05-15T01:08:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-84-482-%E2%9A%9C%EF%B8%8F-Mixed-Country-Corp
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  578. Distribution of 1.8GB stealer logs
    Category: Logs
    Content: A threat actor is freely sharing 1.8GB of stealer logs described as full logs. The post contains no additional details about the origin, targeted regions, or specific malware family used to generate the logs.
    Date: 2026-05-15T01:08:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-1-8GB-%E2%AD%90%EF%B8%8F-STEALER-LOGS-FULL-LOGS-%E2%AD%90%EF%B8%8F–2094021
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  579. Sale of mixed-country Yahoo.com combo list with 1.6 million lines
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1.6 million email:password lines targeting Yahoo.com accounts, advertised as mixed-country. The post is categorized as a credential stuffing list and does not represent a breach of Yahoos infrastructure.
    Date: 2026-05-15T01:08:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-665-843-Lines-%E2%9C%85-Mixed-Country-Yahoo-com-COmbolist-2026
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  580. Distribution of URL:Login:Pass combo list with 687K credentials
    Category: Combo List
    Content: A threat actor shared a URL:Login:Pass combo list containing approximately 687,000 credential pairs on a cybercrime forum. The content is hidden behind a registration/login gate. No specific victim organization is identified.
    Date: 2026-05-15T01:07:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90%EF%B8%8F%E3%80%8C687k%E3%80%8D-url-login-pass-%E2%AD%90%EF%B8%8F-26-11-2025-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: databreach
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  581. Alleged leak of Claude API tokens
    Category: Data Leak
    Content: A threat actor is distributing a claimed dataset of 2 million Claude API tokens at no cost on a forum. The post offers a free sample and directs users to hidden content requiring registration. It is unclear whether the tokens were obtained via a breach, credential stuffing, or scraping.
    Date: 2026-05-15T01:07:27Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9D%A4%EF%B8%8F-claude-api-tokens-2-million-ai-tokies-%E2%9D%A4%EF%B8%8F
    Screenshots:
    None
    Threat Actors: JVZU
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Anthropic
    Victim Site: anthropic.com
  582. Sale of Germany-targeted Hotmail combo list
    Category: Combo List
    Content: A threat actor is selling UHQ Hotmail and mixed email combo lists targeting Germany, marketed as fresh and private. The offering includes credentials, logs, and mail checkers available via a paid subscription service. A sample is provided with full access requiring purchase.
    Date: 2026-05-15T01:07:19Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-pravet-germany-%F0%9F%87%A9%F0%9F%87%AA-mail-access-by-antalya-h
    Screenshots:
    None
    Threat Actors: cloudantalya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  583. Sale of HQ mixed email combo list including Hotmail accounts
    Category: Combo List
    Content: A threat actor operating as Hunter Cloud is selling access to a subscription-based combo list service offering approximately 6,600 mixed email credentials, including Hotmail accounts with full mailbox access. Tiered VIP plans are offered ranging from a trial to lifetime access. The credentials are marketed as high quality and frequently updated.
    Date: 2026-05-15T01:06:42Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A16-6k-HQ-Mixed-Access-VALID-HITS-Frash-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: hunterX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  584. Sale of stolen payment cards and fraudulent transfer services
    Category: Carding
    Content: A threat actor is advertising stolen non-VBV fullz cards, clone cards, and linkable accounts for payment platforms including CashApp, PayPal, Zelle, Chime, Venmo, Skrill, Google Pay, Apple Pay, and Western Union. The actor claims a 30–40% return rate and is soliciting buyers via Telegram. Bank transfers and crypto transfers are also offered on a promotional basis.
    Date: 2026-05-15T00:47:08Z
    Network: openweb
    Published URL: https://altenens.is/threads/anyone-looking-to-make-quick-money-today-message-me-ive-got-a-100-full-proof-method-with-a-30-to-40-return-rate-trust-me-you-are-going-to-make-mon.2940251/unread
    Screenshots:
    None
    Threat Actors: 04tr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  585. Sale of Hotmail combo list with 4K valid email credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 4,000 Hotmail and mixed email credentials advertised as valid. Access to the hidden content requires a reply to the thread. The post encourages users to visit the authors profile for additional similar posts.
    Date: 2026-05-15T00:46:30Z
    Network: openweb
    Published URL: https://altenens.is/threads/4k-sparkles-hotmail-mix-valid-mail-access-sparkles.2940266/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  586. Alleged GoliathStress DDoS Stresser Service Advertisement
    Category: Malware
    Content: GoliathStress is being advertised as a Layer 4 & 7 DDoS stresser service claiming to bypass major protection systems including Cloudflare, OVH, Hetzner, Amazon, and Akamai. The service offers custom attack methods targeting game servers (PUBG, FiveM) and heavily protected websites with extreme GBPS power. No specific pricing is mentioned in the GoliathStress posts themselves.
    Date: 2026-05-15T00:45:16Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/98485
    Screenshots:
    None
    Threat Actors: GoliathStress
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  587. Alleged data leak of Baitzakat (baitzakat.org.eg) exposing 300,000 Egyptian records
    Category: Data Leak
    Content: A threat actor known as DR-X-LOL claims to have leaked a database from baitzakat.org.eg containing over 300,000 records of Egyptian individuals. The leaked data allegedly includes National ID numbers, phone numbers, government affiliation, full names, and email addresses. The data was made available via a post on a cybercrime forum.
    Date: 2026-05-15T00:39:37Z
    Network: openweb
    Published URL: https://breached.st/threads/baitzakat-org-eg-100k-leaked-database-egypt-flag-egypt.87121/unread
    Screenshots:
    None
    Threat Actors: DR-X-LOL
    Victim Country: Egypt
    Victim Industry: Government
    Victim Organization: Baitzakat
    Victim Site: baitzakat.org.eg
  588. Alleged data breach of Colombian Ministry of Health (Ministerio de Salud de Colombia) by Iron Atlas New Generation
    Category: Data Breach
    Content: Iron Atlas New Generation claims to have breached the Colombian Ministry of Health (Ministerio de Salud de Colombia). The threat actor states they identified security vulnerabilities, notes that some have been patched but many remain unfixed, and has leaked backup files via MediaFire. A vulnerable API endpoint is referenced: https://www.minsalud.gov.co/_api/Web/AllProperties
    Date: 2026-05-15T00:31:49Z
    Network: telegram
    Published URL: https://t.me/c/3518294966/143
    Screenshots:
    None
    Threat Actors: Iron Atlas New Generation
    Victim Country: Colombia
    Victim Industry: Healthcare/Government
    Victim Organization: Ministerio de Salud de Colombia
    Victim Site: minsalud.gov.co
  589. Social media account banning and removal service offered on forum
    Category: Services
    Content: A threat actor operating under the alias SamuraiDDos is advertising a paid service to get accounts banned or content removed across major social media platforms including Instagram, TikTok, YouTube, WhatsApp, Facebook, Twitter/X, Telegram, and Discord. Prices range from $300 to $1,400 depending on the platform, with processing times of up to 21 days. The actor also claims to offer data lookup and account recovery or unban services.
    Date: 2026-05-15T00:19:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85Social-Media-Service-BAN-Instagram-WhatsApp-FB-TikTok-Youtube-X-Telegram-Discord
    Screenshots:
    None
    Threat Actors: SamuraiDDos
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  590. DDoS-for-hire service offered by threat actor SamuraiDDos
    Category: DDoS
    Content: A threat actor operating under the alias SamuraiDDos is advertising a DDoS-for-hire service on the Cracked.st forum. No additional details regarding pricing, capacity, or targets are available from the post content.
    Date: 2026-05-15T00:19:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85DDOS-Attack-Powerful-DDOS-Service-Order-DDOS
    Screenshots:
    None
    Threat Actors: SamuraiDDos
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  591. Alleged GoliathStress DDoS Stresser Service Advertisement
    Category: Malware
    Content: GoliathStress is being advertised as a Layer 4 & 7 DDoS stresser service claiming to bypass major protection systems including Cloudflare, OVH, Hetzner, Amazon, Akamai, and Hostinger. The service offers custom attack methods, extreme GBPS power, and specialized game server attack capabilities (PUBG, FiveM). Service is actively recruiting customers through Telegram.
    Date: 2026-05-15T00:12:50Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/98482
    Screenshots:
    None
    Threat Actors: GoliathStress
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  592. Sale of IMAP combo list
    Category: Combo List
    Content: A threat actor is advertising an IMAP combo list, directing interested parties to a Telegram account and two Telegram groups offering free combos and tools. No details on record count, targeted services, or data origin are provided in the post.
    Date: 2026-05-15T00:01:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75296/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown