[May-17-2026] Daily Cybersecurity Threat Report

This comprehensive threat intelligence report provides an in-depth analysis of global cyber incidents, threat actor activities, and underground market trends observed as of mid-May 2026. The intelligence is derived from communications across the open web, Tor network, and Telegram channels, highlighting a rapidly evolving threat landscape characterized by massive credential leaks, sophisticated enterprise breaches, and highly organized cybercrime ecosystems.

1. High-Impact Corporate Data Breaches and Supply Chain Threats

The reporting period saw a surge in massive data breaches targeting multinational corporations, cloud infrastructure providers, and enterprise SaaS platforms.

  • Salesforce and Global Enterprises: The notorious threat actor group “ShinyHunters” claimed a catastrophic breach of Salesforce, alleging the theft of between 989.45 million and over 1 billion records.
    • The compromised data allegedly spans over 35 major organizations across various sectors, including automotive (Toyota, Stellantis), logistics (FedEx, UPS), retail (Home Depot, Gap), hospitality (Marriott, Disney), airlines (Qantas, Air France), and technology (Cisco).
    • Data volumes per victim range from 1GB to 172.96GB.
  • AT&T Corporation: “ShinyHunters” also advertised the sale of 200 million AT&T customer records allegedly breached on May 6, 2026.
    • The dataset reportedly includes full Personally Identifiable Information (PII), financial data (credit cards, bank accounts), credentials, health/medical records, and highly sensitive internal AT&T documents, including API keys and system configurations.
    • The asking price for this database was set at $10,000 USD.
  • Live Nation / Ticketmaster: A comprehensive breach of Ticketmaster resulted in the exposure of 560 million customer records.
    • The 1.3TB database includes full PII, event ticket sales history, and partial credit card information.
    • The threat actor demanded $10,000 USD for the data.
  • Vercel Supply Chain Threat: A critical supply chain threat emerged when a threat actor claimed to have compromised the cloud platform Vercel.
    • The actor offered access keys, source code, database dumps, API keys, NPM tokens, and GitHub tokens.
    • The actor explicitly threatened to leverage this access to conduct a supply chain attack via Next.js package updates, potentially affecting millions of global developers.
  • Mythos AI: An actor claimed unauthorized access to Mythos AI, possessing over 3,000 internal documents, superuser administrative access, and zero-day vulnerabilities.
    • The actor offered to rent access to the compromised 10-trillion parameter AI model for up to $2,500 annually.
  • Adobe Business Platform: A threat actor named “MDGhost666” claimed to have leaked 832.87GB of data associated with business.adobe.com.
    • The leak purportedly covers 2025-2026 and includes databases from integrated marketing services such as Sendgrid, HubSpot, MailGun, and MailJet.
  • Evocon Industrial Cloud: The threat actor “Sejjil” breached Evocon’s central cloud database, extracting global factory transaction logs and industrial device operational data.
    • The actor threatened to publish the data if an extortion demand was not met.

2. Critical Infrastructure, Government, and Healthcare Compromises

Cyber attacks against government infrastructure, critical services, and healthcare providers continue to pose severe national security and privacy risks.

Critical Infrastructure and Government

  • Bangladesh Atomic Energy Commission: The “Infrastructure Destruction Squad” announced imminent cyber attacks against the Bangladesh Atomic Energy Commission.
    • The group claimed to have compromised SCADA systems using the “TRK25 ADVANCED SCADA” tool, resulting in the theft of 1GB of confidential documents.
    • They also claimed to have successfully targeted systems at a Bangladeshi nuclear power plant.
  • Mexican Government Data: Multiple massive data exposures affected Mexican citizens.
    • A Telegram bot was promoted that queried student databases (OSEP) and the National Electoral Institute (INE), exposing full names, CURP, medical records, and employment histories.
    • Additionally, the actor “tabaskoss” sold 125GB of Mexican financial documents, including bank statements and tax records containing RFC and CLABE identifiers.
  • Serbian Ministry of Interior (MUP): A threat actor breached the Serbian MUP’s Foreigners Office database, stealing roughly 180,000 records.
    • The data exposed national ID numbers (JMBG), passport numbers, and visa applications for both Serbian citizens and foreign nationals.
  • Global Government Leaks: A threat actor sold the complete 160-million record database of Vietnam’s National Credit Information Center.
    • “ShinyHunters” claimed the theft of 5TB of data from the Cybersecurity Center State Security Service (CCSSS) of Uzbekistan.
    • An actor named “mosad” advertised the sale of classified US government documents from the DoD, CIA, DHS, and DIA, including military posture statements and budgets.
    • In Iran, the pro-government recruitment site “janfadaa.ir” was compromised via RDP, exposing over 31.5 million highly sensitive citizen records.

Healthcare and Education

  • Western European Healthcare: A threat actor offered over 500GB of European healthcare sector data for sale.
    • The dataset included 1.5 million Protected Health Information (PHI) documents and private keys that allegedly allow direct API queries to European Vaccination Card infrastructure.
  • Hospital Universitario Nacional de Colombia: An actor named “macaroni” dumped 8 databases from the hospital, exposing REDCap clinical research data, pharmacy records, and full PII for employees.
  • Wolfe Eye Clinic (USA): A leaked database exposed 639,640 patient records, including Social Security numbers and detailed medical information.
  • Educational Institutions: Indonesian universities were heavily targeted, with data leaks affecting Politeknik Negeri Bali and LSP Tematika. The Lahore Grammar School in Pakistan suffered a breach exposing 30,000 student and parent records.

3. The Credential Ecosystem: Stealer Logs and Combo Lists

The underground economy is currently saturated with “combo lists” (combinations of stolen email addresses and passwords) and stealer logs containing URL:Login:Password (ULP) formats. These datasets are aggressively marketed to facilitate credential stuffing, brute-forcing, and account takeover (ATO) attacks.

Massive Scale Distribution

  • Threat actors operating under handles like “ZoneX404” and “MetaCloud3” dominated the distribution of massive credential sets.
  • “ZoneX404” freely distributed ultra-high-quality (UHQ) stealer log bases in staggering volumes, including distinct releases of 36.1 million , 32.4 million , 26.2 million , 21.6 million , and 10.6 million records.
  • “MetaCloud3” distributed a 13.8 million ULP combo list and a 9 million user:login:password list.
  • Another actor, “Daxus,” operated a commercial service selling access to 18.15 million UHQ stealer logs.

Targeted Platforms and Geography

  • Email Providers: Hotmail, Outlook, Yahoo, and Gmail were the primary targets for credential stuffing databases.
    • “Vows” sold a 500,000-record Gmail list , a 50,000-record Hotmail list , and a 19,000-record Outlook list.
    • “GhostlyGamer” offered a 450,000 UHQ Gmail combo list.
    • An actor named “ImLupin” distributed 100,000 United States email/password pairs.
  • Shopping and Retail: Actors specifically tailored lists for retail fraud. A 609,000-record shopping combo list was distributed , along with a 531,000-record list targeting Nike.com , and a 403,391-record list focused on German shopping platforms.
  • Gaming and Streaming: A 4-million record list targeting the PlayStation Network (PSN) was sold , alongside a 1.5 million gaming mix list and a 560,000-record list targeting Roblox and Minecraft.
  • Geographic Targeting: Actors routinely organized credentials by region. Lists exclusively targeting Germany (e.g., 70,000 records ), France , Canada , Japan , Poland , and broader European sectors were highly prevalent.

4. Hacktivism and Mass Website Defacements

The intelligence reveals highly active hacktivist groups and individual defacers systematically exploiting Linux-based web servers to alter web pages.

Major Defacement Groups

  • Hidden Cyber Crime (Inside Alone7): This group executed a highly focused mass defacement campaign against the global diamond and luxury jewelry industry.
    • Victims included Moti Israeli Diamonds , Regent Diamonds , David Levy Diamonds , and Eye Diamonds.
    • The group also defaced Diamond Services Hong Kong and DSL Lab.
  • 0xteam (chinafans): This threat actor conducted numerous targeted defacements globally.
    • They defaced Brazilian websites such as Lancer Curitiba , iSell Brasil , and Nossa Distribuicao.
    • European targets included Italian consultancy Dottoressa Rosset , Spanish establishment Kebabaretxabaleta , and UK-based Safe Hands Accounting.
  • Anonsec Team (Mr.spongebob): This actor focused almost entirely on the Indonesian education and financial sectors.
    • They conducted mass defacements against the Universitas Akademi Sakti Nusantara (UASN) Moodle platform , the Faculty of Computer Science , and the Faculty of Economics.
  • TangerangXploit Team (YIIX103): This group targeted Indian academic institutions, defacing multiple educational portals including jrsc.ac.in and kmdc.ac.in.
  • Ushiromiya: This threat actor targeted Indonesian judicial and religious courts, defacing domains belonging to the Padang Religious Court , Pemalang Religious Court , and Maros Religious Court.
  • Midas Haxor Team: Conducted defacements against the Indonesian National Narcotics Agency (BNN) and the Bangkok Food System.

5. Cybercrime-as-a-Service (CaaS), Malware, and Exploits

The commodification of cybercrime tools continues to lower the barrier to entry for malicious actors, with thriving markets for malware, exploits, and fraudulent services.

Malware and Exploitation Frameworks

  • C2 BlackSite Framework: A highly dangerous Mobile Exploitation Framework was advertised targeting all versions of iOS and Android.
    • The tool boasted zero-click capabilities, browser Remote Code Execution (RCE), kernel read/write access, persistent implants, and the ability to extract cryptocurrency wallet seed phrases.
  • Shai-Hulud Campaign: A sophisticated cyber operation named “Shai-Hulud” was identified distributing malware-infected packages to Linux developers.
    • The actors reportedly leveraged AI capabilities to dynamically generate new security bypass methods, targeting cloud infrastructure and financial systems.
  • Amatera Stealer: Security operations identified a malware campaign delivering the “Amatera Stealer” via Fake CAPTCHA screens.
    • The attack utilized a signed Microsoft App-V script (SyncAppvPublishingServer.vbs) as a LOLBIN, retrieved live C2 configurations from Google Calendar, and used PNG steganography to execute the final payload.

Vulnerabilities and Defensive Evasion

  • Ivanti EPMM Exploits: Pre-authentication RCE vulnerabilities (CVE-2026-1281 and CVE-2026-1340) in Ivanti Endpoint Manager Mobile were widely discussed as being actively exploited by Advanced Persistent Threat (APT) actors.
  • Evil VM PRT Theft: A novel privilege escalation technique dubbed “Evil VM” was published, detailing how to abuse Azure VM Device Identity to steal Primary Refresh Tokens (PRT) and escalate to Entra ID Admin.
  • EDR/AMSI Bypasses: Actors shared techniques for blinding security software, including the abuse of Windows AppLocker deny rules to block Endpoint Detection and Response (EDR) processes using the “GhostLocker” tool. Another technical writeup released a patchless bypass for AMSI (Antimalware Scan Interface) using Page Guard Exceptions.

Infrastructure and Fraud Services

  • DDoS Stressers: Services such as “Candystress.st” and “GoliathStress” offered powerful Distributed Denial of Service (DDoS) capabilities. These services claimed to bypass major protections like Cloudflare, AWS, and Akamai using custom UDP and game-server payloads.
  • Initial Access Brokers (IABs): Sellers routinely offered Remote Desktop Protocol (RDP) access to compromised AWS, Azure, and DigitalOcean cloud infrastructure for approximately $200. Webshell access to government networks was also sold openly.
  • Carding and Fraud: The “Boss Shop” marketplace advertised the daily supply of over 100,000 freshly stolen credit cards. Furthermore, specialized threat actors sold “mentorship courses” detailing how to commit refund fraud against Amazon and Apple by fabricating damaged goods evidence using manipulated photos and videos.

6. Concluding Strategic Analysis

The intelligence gathered from these underground forums underscores a sophisticated, multi-tiered threat environment. The sheer volume of compromised credentials—numbering in the tens of millions daily—highlights the critical necessity for organizations to enforce strict multi-factor authentication (MFA) and monitor for compromised credentials actively.

The successful breaches of tier-one technology companies like Salesforce and Vercel by groups like “ShinyHunters” emphasize that supply chain vulnerabilities and API insecurity remain paramount risks for modern enterprises. Furthermore, the rapid commodification of zero-click mobile exploits and AI-assisted malware indicates that threat actors are aggressively adopting advanced capabilities that outpace traditional signature-based defenses. Organizations must prioritize behavioral analytics, rapid patch management for public-facing edge devices (such as Ivanti), and rigorous identity and access management controls in cloud environments.

Detected Incidents Draft Data

  1. Combo List with 4,200 email and password pairs allegedly from China
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 4,200 email and password pairs purportedly associated with Chinese accounts. The list was made available via an external file-sharing link. No specific victim organization or breach source is identified.
    Date: 2026-05-16T23:59:03Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-China-4-2K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Combo List: Mixed Email/Password 3.1K
    Category: Combo List
    Content: A threat actor shared a mixed email and password combo list containing approximately 3,100 credential pairs via an anonymous file-sharing service. The list appears to target no specific organization and is being distributed freely on the forum.
    Date: 2026-05-16T23:57:08Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-3-1K-Mix-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Free sharing of Claude API keys with 2 million tokens
    Category: Data Leak
    Content: A forum user is freely distributing what are claimed to be Claude API keys with approximately 2 million tokens of usage available. The post advertises access to Claude Opus 4.7 and other models. The keys appear to be compromised or stolen credentials granting unauthorized access to Anthropics API services.
    Date: 2026-05-16T23:57:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90-2-MILLION-TOKENS-CLAUDE-OPUS-4-7-AND-MORE-API-KEY-%E2%AD%90–2094945
    Screenshots:
    None
    Threat Actors: JVZU
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Anthropic
    Victim Site: anthropic.com
  4. Combo List of European Email Credentials
    Category: Combo List
    Content: A combo list of approximately 9,501 European email and password credentials described as semi-valid was shared on a public forum. The post is categorized as a free or low-cost credential list likely intended for credential stuffing. No specific victim organization or service is identified.
    Date: 2026-05-16T23:56:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-9-501-Semi-Valide-FA-Combolist-Europa-Good
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Combo List: 8,053 Semi-Valid Email and Password Credentials
    Category: Combo List
    Content: A combo list containing 8,053 semi-validated email and password credential pairs has been shared on a cracking forum. The credentials are marketed as fresh with good hit lines. No specific victim organization or service is identified.
    Date: 2026-05-16T23:56:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-053-Semi-Valide-FA-Good-Line-Fresh
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Sale of account market setup service by forum vendor
    Category: Services
    Content: A forum vendor operating under the name Paxerr is offering a paid service to build and launch account marketplace websites for clients. The offering includes revisions, refunds before delivery confirmation, and 24/7 support, governed by a stated terms of service.
    Date: 2026-05-16T23:55:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1LAUNCH-YOUR-OWN-ACCOUNT-MARKET-%E2%80%A2-100-REFUND-%E2%80%A2-UNLIMITED-REVISIONS-%E2%80%A2-24-7-SUPPORT%E2%9A%A1
    Screenshots:
    None
    Threat Actors: BossOfBosses
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. SpoofCity caller ID spoofing service advertised on cybercrime forum
    Category: Services
    Content: A threat actor operating under the handle spoofcity.io is advertising a caller ID spoofing service on a cybercrime forum, claiming over 40,000 calls weekly across multiple regions including the USA, Canada, UK, Australia, and several European countries. The service supports 3CX, regular calls, and web caller interfaces. Access is provided via a Telegram bot.
    Date: 2026-05-16T23:45:37Z
    Network: openweb
    Published URL: https://breached.st/threads/firespoofcity-calls-without-limits.87224/unread
    Screenshots:
    None
    Threat Actors: spoofcity.io
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: spoofcity.io
  8. Alleged threat of destructive attack against Bangladesh Atomic Energy Commission
    Category: Cyber Attack
    Content: Threat actor claims intention to destroy systems within the Bangladesh Atomic Energy Commission. This represents a direct threat against critical nuclear infrastructure.
    Date: 2026-05-16T23:43:26Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4366
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Bangladesh
    Victim Industry: Nuclear Energy/Government
    Victim Organization: Bangladesh Atomic Energy Commission
    Victim Site: Unknown
  9. Alleged compromise of Bangladesh Atomic Energy Centre Authority SCADA systems with 1GB data exfiltration
    Category: Cyber Attack
    Content: Infrastructure Destruction Squad claims successful compromise of Bangladesh Atomic Energy Centre Authority systems using TRK25 ADVANCED SCADA tool. Threat actor alleges exfiltration of 1GB of confidential documents through exploitation of known control infrastructure vulnerabilities. Further details promised for future announcement.
    Date: 2026-05-16T23:41:20Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4365
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Bangladesh
    Victim Industry: Nuclear Energy / Government
    Victim Organization: Bangladesh Atomic Energy Centre Authority
    Victim Site: Unknown
  10. Alleged data breach of Bangladesh Atomic Energy Commission with 1GB data theft
    Category: Data Breach
    Content: Infrastructure Destruction Squad claims to have targeted systems and servers belonging to the Bangladesh Atomic Energy Commission/Centre using an unspecified tool, resulting in the theft of approximately 1GB of sensitive data.
    Date: 2026-05-16T23:38:54Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4364
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Bangladesh
    Victim Industry: Nuclear/Atomic Energy
    Victim Organization: Bangladesh Atomic Energy Commission/Centre
    Victim Site: Unknown
  11. Alleged cyber attack on nuclear power plant in Bangladesh by Infrastructure Destruction Squad
    Category: Cyber Attack
    Content: Infrastructure Destruction Squad claims to have targeted systems and servers at a nuclear power plant in Bangladesh using a specific tool. The threat actor indicates further details will be announced.
    Date: 2026-05-16T23:37:38Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4363
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Bangladesh
    Victim Industry: Energy/Nuclear
    Victim Organization: Nuclear power plant
    Victim Site: Unknown
  12. Sale of HQ Mixed Mail Access Combo List
    Category: Combo List
    Content: A threat actor is sharing a combo list containing approximately 100 high-quality mixed mail access credentials. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-16T23:28:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-1k-hq-mixed-mail-access-combolist-303151
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Sale of EU mix mail access combo list (6.9K credentials)
    Category: Combo List
    Content: A threat actor sharing a combo list containing approximately 6,900 EU mixed valid mail access credentials, dated 15.05. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-16T23:27:32Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-6-9k-eu-mix-valid-mail-access-15-05
    Screenshots:
    None
    Threat Actors: MonnarhTeam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Sale of 160K mixed email and password combo list
    Category: Combo List
    Content: A threat actor is selling a combo list of approximately 160,000 email:password and user:password credential pairs. The list is described as high quality and fresh, covering multiple email providers including AOL, Yahoo, Hotmail, and Outlook, with credentials sourced from multiple countries including the US, UK, France, Germany, and others.
    Date: 2026-05-16T23:25:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75500/
    Screenshots:
    None
    Threat Actors: alex12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Sale of email access combo list mix (33K records)
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 33,000 email access credentials described as fresh. The list appears to be a mixed mail access combo. No additional details are available from the post content.
    Date: 2026-05-16T23:23:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-33K-FRESH-MAIL-ACCESS-MIX–2094933
    Screenshots:
    None
    Threat Actors: Alpha70
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Sale of 20,000 mixed mail access combo list
    Category: Combo List
    Content: A forum user is offering a combo list of approximately 20,000 mixed email and password credentials. No further details are available from the post content.
    Date: 2026-05-16T23:23:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-20K-MIXED-MAIL-ACCESS-GOODS
    Screenshots:
    None
    Threat Actors: MLALAKHB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Casino website setup service offered on cybercrime forum
    Category: Services
    Content: A forum seller operating under the name Paxerr is advertising a casino website setup service on a cybercrime forum, offering features such as unlimited revisions, 24/7 support, and a refund policy. The service includes terms covering ownership transfer, proprietary framework retention, and portfolio usage rights. No specific victim organization or malicious payload is involved.
    Date: 2026-05-16T23:22:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1LAUNCH-YOUR-OWN-CASINO-%E2%80%A2-100-REFUND-%E2%80%A2-UNLIMITED-REVISIONS-%E2%80%A2-24-7-SUPPORT%E2%9A%A1
    Screenshots:
    None
    Threat Actors: BossOfBosses
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged data leak of Bouygues Telecom
    Category: Data Leak
    Content: A threat actor claims to be distributing a database allegedly belonging to Bouygues Telecom, a major French telecommunications provider. The post was made on a known breach forum and suggests the data is being shared freely. No further details regarding record count or data fields were provided in the post.
    Date: 2026-05-16T23:20:18Z
    Network: openweb
    Published URL: https://breached.st/threads/fr-db-bouygues-telecom.87222/unread
    Screenshots:
    None
    Threat Actors: burnout_sphere1932
    Victim Country: France
    Victim Industry: Telecommunications
    Victim Organization: Bouygues Telecom
    Victim Site: bouyguestelecom.fr
  19. Alleged data breach of Uzbekistan Cybersecurity Center (CCSSS) – 5TB government database
    Category: Data Breach
    Content: ShinyHunters threat actor claims to have breached the Cybersecurity Center State Security Service (CCSSS) of Uzbekistan, obtaining approximately 5TB of database information and documents. Sample data includes personal information of government officials including first names, last names, masked PIN numbers (pinfl), job positions, and department assignments. The actor is offering the data for sale at a negotiable price starting at $50,000 USD. Contact information provided includes email ([email protected]) and XMPP ([email protected]).
    Date: 2026-05-16T23:20:10Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7979
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Uzbekistan
    Victim Industry: Government/Cybersecurity
    Victim Organization: Cybersecurity Center State Security Service (CCSSS)
    Victim Site: Unknown
  20. Alleged sale of National Credit Information Center of Vietnam database (160M+ records)
    Category: Data Breach
    Content: Threat actor ShinyHunters is offering to sell the complete database of Vietnams National Credit Information Center containing 160+ million records. The actor claims to have access to structured database with multiple fields and is requesting $10,000 USD for the full dataset. Contact via @shinycorpsh.
    Date: 2026-05-16T23:17:20Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7956
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Vietnam
    Victim Industry: Financial/Government
    Victim Organization: National Credit Information Center of Vietnam
    Victim Site: Unknown
  21. Hotmail credential combo list of 3.5K hits shared on cracking forum
    Category: Combo List
    Content: A threat actor is distributing 3,500 alleged UHQ Hotmail credential hits via a free drop service, with private cloud access available for purchase. The credentials are marketed as high-quality hits suitable for account access.
    Date: 2026-05-16T23:02:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%A8-3-5K-UHQ-HOTMAIL-HITS-%E2%9C%A8%E2%9C%85
    Screenshots:
    None
    Threat Actors: lundman01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Alleged combo list of educational email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 85,929 educational email and password pairs, marketed as fresh. The post was made on a public cracking forum and appears intended for credential stuffing against educational institutions.
    Date: 2026-05-16T23:02:06Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-85-929-Edu-MailPass-Leaks-Fresh
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Combo List targeting Hotmail domain
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1.68 million email:password lines targeting the Hotmail domain. The credentials are being distributed via a cracking forum. No additional details are available from the post content.
    Date: 2026-05-16T23:01:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-684-772-Lines-%E2%9C%85-Combolist-Target-Hotmail-Domain
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Free release of 160K email:password combo list targeting multiple streaming and gaming services
    Category: Combo List
    Content: A threat actor has shared a combo list of approximately 160,000 email:password credential pairs, marketed as fresh and high quality, targeting services including Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. The post provides a hidden download link and also advertises additional combo lists for sale via Telegram. Credentials are organized by email:pass and user:pass formats across multiple countries.
    Date: 2026-05-16T23:01:26Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-160k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify
    Screenshots:
    None
    Threat Actors: chriss12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Combo List: Email and Password Credentials (9,294 records)
    Category: Combo List
    Content: A combo list containing approximately 9,294 email and password credential pairs was shared on a cracking forum. The credentials are described as semi-valid and intended for mail access. No specific victim organization or targeted service is identified in the post.
    Date: 2026-05-16T23:01:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-9-294-Semi-Valide-FA-Mail-Access-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Canada combo list shared on cracking forum
    Category: Combo List
    Content: A user on a cracking forum shared a file purportedly containing a high-quality Canadian combo list. No additional details about record count or targeted services are available from the post content.
    Date: 2026-05-16T23:00:22Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-CANADA-COMBOLIST-SHROUD20-txt–2294974
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Combo List targeting Canadian accounts
    Category: Combo List
    Content: A user on a combolist forum is distributing a credential list marketed as high-quality Canadian accounts. The content is hidden behind a registration or login wall, limiting further detail. No specific breached organization or record count is disclosed.
    Date: 2026-05-16T23:00:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-hq-canada-combolist-shroud20-txt-303146
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Sale of HQ mixed combo list
    Category: Combo List
    Content: A forum user shared a mixed combo list file on a cracking forum. No additional details or record counts are available from the post content.
    Date: 2026-05-16T23:00:03Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-MIXED-COMBOLIST-SHROUD20-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Sale of HQ mixed combo list
    Category: Combo List
    Content: A forum user is offering a mixed combo list file via a hidden content gate requiring registration or login. No details on record count, format, or targeted services are visible in the post.
    Date: 2026-05-16T22:59:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-hq-mixed-combolist-shroud20-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Sale of HQ USA combo list
    Category: Combo List
    Content: A forum user shared a combo list advertised as high-quality US credentials. No further details are available from the post content.
    Date: 2026-05-16T22:59:46Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-USA-COMBOLIST-SHROUD20-txt–2294978
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Poland combo list allegedly shared by ShroudX
    Category: Combo List
    Content: A threat actor known as ShroudX has shared a combo list targeting Polish accounts on a cybercrime forum. The content is hidden behind a registration or login wall, limiting visibility into specific record counts or targeted services. The post is categorized as a credential list based on forum context and thread title.
    Date: 2026-05-16T22:59:39Z
    Network: openweb
    Published URL: https://patched.to/Thread-hq-poland-combolist-shroud20-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Combo list targeting VPN, gaming, and streaming services
    Category: Combo List
    Content: A forum post on a combolist board advertises a credential list marketed as high-quality and targeting VPN, gaming, and streaming platforms. The content is hidden behind a registration or login wall, preventing direct assessment of volume or specifics.
    Date: 2026-05-16T22:59:23Z
    Network: openweb
    Published URL: https://patched.to/Thread-hq-vpn-gaming-streaming-combolist-shroud20-txt
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Sale of stealer logs containing URL:Log:Pass combos via Daxus.pro
    Category: Logs
    Content: A threat actor operating under the alias Daxus is offering a dataset of 18.15 million URL:LOG:PASS records, advertised as UHQ (ultra-high quality) stealer log output. The full database is available via their commercial service at daxus.pro and an associated Telegram bot.
    Date: 2026-05-16T22:42:16Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-18-15-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged imminent cyber attack against critical infrastructure by Infrastructure Destruction Squad
    Category: Cyber Attack
    Content: Infrastructure Destruction Squad announced plans to conduct cyber attacks against sensitive power and hospital systems using an unspecified tool. The group indicated the attack is imminent (soon).
    Date: 2026-05-16T22:38:04Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4362
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Unknown
    Victim Industry: Critical Infrastructure (Power, Healthcare)
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Sale of 9 million user:login:password combo list targeting multiple countries
    Category: Combo List
    Content: A threat actor operating under the alias MetaCloud3 is offering for sale a combo list of approximately 9 million user:login:password credentials. The list is advertised as private and high quality, targeting users across multiple countries including the USA, UK, Germany, Poland, and broader Europe.
    Date: 2026-05-16T22:35:28Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%8E%9D-9M-U-L-P-%E2%8E%A0%E2%9A%A1100-PRIVATE%E2%9A%A1HIGH-QUALITY-LOGS%E2%9A%A1COUNTRY-TARGET-USA-UK-DE-PL-EUROPE-ETC%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Free release of 13 million URL:login:password combo list
    Category: Combo List
    Content: A threat actor known as MetaCloud3 has shared a combo list containing approximately 13 million URL:login:password credential pairs. The data is described as high quality and is freely distributed on the forum.
    Date: 2026-05-16T22:35:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-13M-%E2%9A%A1-URL-LOGIN-PASS-HQ-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Sale of European mixed combo list with 8,225 credentials
    Category: Combo List
    Content: A European mixed combo list containing approximately 8,225 semi-valid email and password pairs is being shared on a cracking forum. The list is described as semi-validated and sourced from multiple European accounts. No specific breached organization is identified.
    Date: 2026-05-16T22:34:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-225-Semi-Valide-FA-Europa-Mixed-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Free release of mixed mail credential hits combolist
    Category: Combo List
    Content: A threat actor shared a combolist of 10,000 mixed mail credential hits, marketed as freshly checked and AntiPublic verified. The credentials are distributed freely via a download link sponsored by RogenCloud.
    Date: 2026-05-16T22:23:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x10000-Mix-Mail-Hits-4-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Sale of European email combo list with 10,831 records
    Category: Combo List
    Content: A combo list containing approximately 10,831 email and password credential pairs targeting European accounts has been shared on the forum. The list is described as semi-valid and full-address (FA) format. No specific breached organization is identified.
    Date: 2026-05-16T22:22:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-10-831-Semi-Valide-FA-Europa-Mix-Combo
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Hotmail combo list with 7,570 lines shared on cracking forum
    Category: Combo List
    Content: A combo list of 7,570 email:password lines targeting Hotmail accounts has been shared on a cracking forum. The credentials are made available as a free download.
    Date: 2026-05-16T22:22:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-7-570-LINES-LOGS-ALL-TARGETS-COMBO-HOTMAIL
    Screenshots:
    None
    Threat Actors: kccloud01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Job posting seeking OPSEC consultant on Dread forum
    Category: Chatter
    Content: A Dread forum user is seeking an OPSEC expert for hire, offering payment in Monero (XMR). The poster claims to have foundational OPSEC knowledge but seeks on-demand guidance for specific questions. No threat actor, victim, or malicious service is explicitly advertised.
    Date: 2026-05-16T22:19:23Z
    Network: tor
    Published URL: https://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/0c67feeec0c9b5243c50
    Screenshots:
    None
    Threat Actors: godalambo 🍼
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Sale of combo list marketed for PayPal credential stuffing
    Category: Combo List
    Content: A threat actor is distributing a combo list of 350,000 mail:password pairs marketed as UHQ and fresh, intended for credential stuffing against PayPal. The content is gated behind a reply requirement on the forum.
    Date: 2026-05-16T22:17:16Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-350-000-star-mailpass-high-voltageuhq-database-good-for-paypal-high-voltage-fresh-data.2941605/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Combo list marketed for X and Instagram credential stuffing
    Category: Combo List
    Content: A threat actor is distributing a combo list of 165,000 email and password pairs, marketed as UHQ and fresh data suitable for credential stuffing against X (formerly Twitter) and Instagram. The content is gated behind a reply requirement on the forum.
    Date: 2026-05-16T22:16:29Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-165-000-star-mailpass-high-voltageuhq-database-good-for-x-and-instagramhigh-voltage-fresh-data.2941606/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Combo list of 145,000 email:password credentials marketed for social media
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 145,000 email and password pairs described as UHQ (ultra-high quality) and marketed as suitable for credential stuffing against social media platforms. The credentials are described as fresh data. Access to the list requires a forum reply.
    Date: 2026-05-16T22:15:28Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-145-000-star-mailpass-high-voltageuhq-database-good-for-social-mediahigh-voltage-fresh-data.2941607/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Sale of combo list marketed for banking credential stuffing
    Category: Combo List
    Content: A threat actor is distributing a combo list of 280,000 email and password pairs, marketed as UHQ (ultra-high quality) and fresh data suitable for banking credential stuffing. The post is gated behind a reply requirement, limiting visibility to forum members. No specific breached organization is identified.
    Date: 2026-05-16T22:14:34Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-280-000-star-mailpass-high-voltageuhq-database-good-banking-high-voltage-fresh-data.2941608/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Crypto wallet loading service advertised on cracking forum
    Category: Carding
    Content: A threat actor is advertising a cryptocurrency wallet loading service across multiple countries, claiming to fund BTC, ETH, USDT, BNB, TRX, and LTC wallets. The service appears to involve fraudulent transfer of funds into victim-controlled wallets for subsequent cashout, consistent with money laundering or financial fraud schemes. Contact is directed via a Telegram handle (@KIRKJNR).
    Date: 2026-05-16T22:12:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-CRYPTO-WALLET-LOADING-SERVICE
    Screenshots:
    None
    Threat Actors: Baggagane
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Sale of SMTP services on cybercrime forum
    Category: Services
    Content: A threat actor is advertising the sale of various SMTP services on a cybercrime forum, claiming to be a trusted seller with competitive pricing. The seller offers daily updates and can be contacted via Telegram. SMTP access is commonly used for spam, phishing, and malware distribution campaigns.
    Date: 2026-05-16T22:12:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Buy-All-Type-of-SMTPs-100-Trusted-Seller
    Screenshots:
    None
    Threat Actors: office_365shop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. OpSec discussion on anonymity when transitioning from clearnet to darknet communications
    Category: Chatter
    Content: A Dread forum user posted a question on the OpSec board asking whether sharing a Session ID or other identifiers when transitioning from clearnet or Telegram to darknet communications could link a pseudonymous identity to a real one. The post contains no threat activity, breach claims, or malicious content.
    Date: 2026-05-16T21:55:26Z
    Network: tor
    Published URL: https://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/1c918ec9ad5c56bfae87
    Screenshots:
    None
    Threat Actors: godalambo 🍼
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Website Defacement of Bangkok Food System by 0xNuts (Midas Haxor Team)
    Category: Defacement
    Content: On May 17, 2026, threat actor 0xNuts, operating under the Midas Haxor Team, defaced a subpage on bangkokfoodsystem.com, a Thai food industry website. The defacement targeted a specific page (zxc.html) rather than the homepage, indicating a partial or targeted page defacement. No specific motive or server details were disclosed in connection with the attack.
    Date: 2026-05-16T21:55:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923549
    Screenshots:
    None
    Threat Actors: 0xNuts, Midas Haxor Team
    Victim Country: Thailand
    Victim Industry: Food & Beverage
    Victim Organization: Bangkok Food System
    Victim Site: bangkokfoodsystem.com
  50. User seeking methods to bypass Cloudflare VPN/Tor blocking
    Category: Chatter
    Content: A forum user on a Dread OpSec board is seeking advice on bypassing Cloudflares VPN and Tor IP blocking to access an unspecified website. The user has already attempted connections via Mullvad VPN and Tor without success and is exploring decentralized VPN alternatives. No specific threat actor, victim organization, or malicious activity is identified in the post.
    Date: 2026-05-16T21:54:22Z
    Network: tor
    Published URL: https://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/31194f152515588d8974
    Screenshots:
    None
    Threat Actors: kitteninmitten 🍼
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Free combo list of 10,000 mixed email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 10,000 mixed email credentials, marketed as freshly checked and AntiPublic verified. The list was distributed for free on a public cracking forum.
    Date: 2026-05-16T21:52:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x10000-Mix-Mail-Hits-2-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Free combo list of 10,000 mixed mail credentials
    Category: Combo List
    Content: A threat actor shared a free combo list of 10,000 mixed email credentials, marketed as freshly checked and AntiPublic verified. The list was distributed via a download link sponsored by RogenCloud.
    Date: 2026-05-16T21:50:49Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x10000-Mix-Mail-Hits-1-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Free distribution of mixed email credential combo list
    Category: Combo List
    Content: A threat actor distributed a combo list of 10,000 mixed email credentials, marketed as freshly checked and verified against AntiPublic databases. The list was made available for free download via RogenCloud.
    Date: 2026-05-16T21:50:28Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-%E2%9C%85-%E2%9C%85-%E2%9C%A8x10000-Mix-Mail-Hits-3-%E2%9C%A8-Freshly-Checked-AntiPublic-Checked-%E2%9C%A8-%E2%9C%85-%E2%9C%85-%E2%9C%85
    Screenshots:
    None
    Threat Actors: RogenPlay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Combo List of 4,262 mixed email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 4,262 mixed email credentials on a crimeware forum. The content is hidden behind a registration or login wall. No specific breached organization is identified.
    Date: 2026-05-16T21:49:40Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85%E2%9A%A14262x-mixmail%E2%9A%A1%E2%9C%85
    Screenshots:
    None
    Threat Actors: NovaCloudx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged data leak of Belambra.fr
    Category: Data Leak
    Content: A threat actor has freely distributed an alleged database dump of Belambra.fr, a French holiday villages and leisure clubs network. The data is shared in JSON format across multiple file-hosting platforms, totaling approximately 77 MB. The post claims the dataset contains 402,000 records.
    Date: 2026-05-16T21:46:29Z
    Network: openweb
    Published URL: https://breached.st/threads/402k-belambra-fr.87216/unread
    Screenshots:
    None
    Threat Actors: Meowl
    Victim Country: France
    Victim Industry: Hospitality
    Victim Organization: Belambra
    Victim Site: belambra.fr
  56. Sale of X (Twitter) combo list
    Category: Combo List
    Content: A threat actor is selling a combo list of 3,813 mixed credentials advertised as valid for X (Twitter). Pricing tiers range from a 24-hour trial at $3 to a 3-month subscription at $100, with a free download link also provided.
    Date: 2026-05-16T21:29:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75495/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Combo list of 8,186 semi-valid credentials with fresh hits
    Category: Combo List
    Content: A combo list of 8,186 email:password pairs marketed as semi-valid and fresh was shared on a cracking forum. The post references FA Good Line hits, suggesting credentials tested against a specific service. No further details are available from the post content.
    Date: 2026-05-16T21:28:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-186-Semi-Valide-FA-Good-Line-Fresh
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Sale of Unlimited Shodan Searches Key
    Category: Services
    Content: A threat actor is offering for sale an unlimited Shodan search key with daily credit resets for $75. The listing is advertised on a dark web forum under the sellers section.
    Date: 2026-05-16T21:24:46Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-SELLING-Unlimited-Shodan-Searches-Key
    Screenshots:
    None
    Threat Actors: swag
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged data breach of Ipoteka Bank (Uzbekistan) – 120GB banking data sale
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have breached Ipoteka Bank (ipotekabank.uz) and obtained 120GB of sensitive data including PDF contracts, card numbers, CVVs, expiration dates, personal data (names, emails, phone numbers), account information, transaction data, and internal bank documents. The actor is offering this data for sale at $25,000 USD. Contact details provided include Telegram account @shinycorpsh and email [email protected].
    Date: 2026-05-16T21:08:35Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7943
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Uzbekistan
    Victim Industry: Banking/Financial Services
    Victim Organization: Ipoteka Bank
    Victim Site: ipotekabank.uz
  60. Alleged sale of critical API access to major financial transactions company
    Category: Initial Access
    Content: Threat actor offering sale of critical API access from a major financial transactions company processing transactions across 20+ countries including Brazil, Colombia, Argentina, Ecuador, Peru, Chile, Venezuela, United States, Indonesia, Bangladesh, Philippines, India, Thailand, Kenya, Nigeria, Tanzania, Malaysia, United Arab Emirates, Pakistan, Turkey, and Vietnam. The API includes 2FA bypass capabilities. Company has 95,000+ employees worldwide. Price: $10,000 USD. Contact via XMPP, Telegram, and email provided.
    Date: 2026-05-16T21:08:24Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7941
    Screenshots:
    None
    Threat Actors: shinycorpsh
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: TDayPay
    Victim Site: tdaypay.com
  61. Alleged sale of Mythos AI internal documents and unauthorized system access
    Category: Data Breach
    Content: Threat actor claiming to possess approximately 3,000 internal Mythos AI files including technical documentation, administrative panels with superuser access, and zero-day vulnerabilities. Offering rental access to the compromised AI system ($500-$2,500 annually) and document sales ($10,000 USD). System specifications indicate 10 trillion parameter model using Mixture-of-Experts architecture. Contact via @shinycorpsh.
    Date: 2026-05-16T21:07:51Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7940
    Screenshots:
    None
    Threat Actors: shinycorpsh
    Victim Country: Unknown
    Victim Industry: Artificial Intelligence / Technology
    Victim Organization: Mythos AI
    Victim Site: Unknown
  62. Alleged sale of Vercel access keys, source code, and employee credentials for supply chain attack
    Category: Initial Access
    Content: Threat actor claiming to have compromised Vercel (vercel.com) and offering to sell access keys, source code, database dumps, and employee credentials including API keys, NPM tokens, and GitHub tokens. Actor claims verified access to multiple employee accounts and internal deployments. Threat actor references April 19, 2026 incident involving third-party compromise (Context.ai) and OAuth token misuse. Actor explicitly threatens potential supply chain attack via Next.js package updates affecting millions of developers globally. Asking price: $10,000 USD. Contact: @shinycorpsh
    Date: 2026-05-16T21:07:43Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7929
    Screenshots:
    None
    Threat Actors: shinycorpsh
    Victim Country: United States
    Victim Industry: Cloud Computing / Web Development Platform
    Victim Organization: Vercel Inc.
    Victim Site: vercel.com
  63. Sale or distribution of cookie/session credential pack
    Category: Logs
    Content: A forum user is sharing or selling a pack of cookies described as fresh hits. The actual content is hidden behind a login/registration wall, so specific details about targeted services or record counts are unavailable.
    Date: 2026-05-16T21:06:19Z
    Network: openweb
    Published URL: https://patched.to/Thread-cookies-new-cookie-hit-pack
    Screenshots:
    None
    Threat Actors: tkoen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Free distribution of 10 million URL:Login:Pass combo list
    Category: Combo List
    Content: A threat actor shared a combo list containing 10 million URL:login:password credential pairs, marketed as high quality and fresh as of May 15, 2026. The content is gated behind forum registration or login. No specific victim organization is identified.
    Date: 2026-05-16T21:05:54Z
    Network: openweb
    Published URL: https://patched.to/Thread-lupin-ulp-10-000-000-url-login-pass-high-quality-100-fresh-05-15-2026
    Screenshots:
    None
    Threat Actors: Helpz11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Sale of European mix combo list with 7,558 semi-valid credentials
    Category: Combo List
    Content: A forum post on Cracked.st advertises a European mix combo list containing 7,558 semi-valid email:password credentials. The list is described as Full Access (FA) and targets European accounts. No additional details are available from the post content.
    Date: 2026-05-16T21:04:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-7-558-Semi-Valide-FA-Europa-Mix-Combo
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Free Hotmail combo list of 1K+ credentials
    Category: Combo List
    Content: A threat actor has shared a combo list containing over 1,000 Hotmail email and password pairs via an external file-sharing link. The credentials are described as high quality (HQ) and are being distributed freely on a cracking forum.
    Date: 2026-05-16T21:03:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1K-HOTMAILS-HQ
    Screenshots:
    None
    Threat Actors: ECLOUDV2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Sale of Telegram account session data (JSON/Tdata) across multiple countries
    Category: Services
    Content: A threat actor is selling Telegram account session files (JSON/Tdata format) sourced from multiple countries including England, Uzbekistan, Portugal, Vietnam, Cameroon, Indonesia, Laos, Morocco, and Germany, with prices ranging from $0.30 to $1.30 per account. The accounts are advertised via an external storefront at accs7.shop.
    Date: 2026-05-16T20:58:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75493/
    Screenshots:
    None
    Threat Actors: Trustacc1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged DDoS Stresser Service Advertisement – Candystress.st Botnet Recruitment
    Category: Malware
    Content: Candystress.st is advertising DDoS botnet spots and stresser services with multiple attack methods including STDHEX (UDP hexadecimal packet manipulation), FIVEM (game server payload floods), VALVE (Source engine query floods), PUBG (game server attacks), RAKNET (UDP floods), and GAME-UDP (custom UDP payloads). The operator is recruiting botnet participants and offering testing/purchase options via Telegram contact @botnetdraco.
    Date: 2026-05-16T20:52:34Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/98800
    Screenshots:
    None
    Threat Actors: Candystress.st
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Sale of European mixed combo list with 8,077 credentials
    Category: Combo List
    Content: A European mixed combo list containing approximately 8,077 email:password pairs was shared on a cracking forum. The credentials are described as semi-valid and first-attempt (FA). No specific victim organization is identified.
    Date: 2026-05-16T20:46:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-077-Semi-Valide-FA-Europa-Mixed-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Hotmail credential combo list allegedly containing 3.5K hits
    Category: Combo List
    Content: A threat actor is sharing and selling Hotmail credential hits, advertising 3,500 high-quality hits. Free drops are offered via a Telegram channel, with private access available for purchase through direct contact.
    Date: 2026-05-16T20:46:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-3-5k-HQ-HOTMAIL-HIT-%E2%9C%85
    Screenshots:
    None
    Threat Actors: lundoppp2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Sale of Hotmail credential combo list with 639 entries
    Category: Combo List
    Content: A threat actor is distributing 639 Hotmail credentials via a Telegram channel, with private access available for purchase. The post advertises free drops publicly and directs buyers to contact the seller on Telegram for premium content.
    Date: 2026-05-16T20:45:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-639x-Hotmail-Access
    Screenshots:
    None
    Threat Actors: lundman01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Sale of Europa-targeted combo list with 190,271 lines
    Category: Combo List
    Content: A combo list of 190,271 email:password lines is being shared on a cracking forum, marketed as targeting European education and shopping services. No further details are available from the post content.
    Date: 2026-05-16T20:45:24Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-190-271-Lines-%E2%9C%85-Europa-Edu-education-Shopping-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Sale of AI workflow guidance service on cybercrime forum
    Category: Services
    Content: A forum user is offering a $150 AI workflow guidance and productivity support service targeting developers, researchers, and freelancers. The service claims to provide ChatGPT Pro-style prompting tips, coding assistance, and automation guidance. No victim or breach data is involved.
    Date: 2026-05-16T20:44:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-150-%E2%9C%85-Elite-AI-Acceleration-for-Power-Users-%E2%80%93-ChatGPT-Premium-20X-Workflow-Support
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Sale of UHQ mixed combo list with 199 entries
    Category: Combo List
    Content: A threat actor on CrackingX is offering a mixed UHQ combo list containing 199 entries via external download links. The credentials are being sold under a tiered subscription model ranging from $3 for a 24-hour trial to $100 for three months of access.
    Date: 2026-05-16T20:42:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75489/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Sale of HQ combo list mix with 1,914 records
    Category: Combo List
    Content: A threat actor is offering a high-quality mixed combo list containing 1,914 credential pairs, marketed as fresh and untouched. The listing promotes daily supply volumes of 4,000–12,000 records through a private members-only network. No specific targeted service or breach source is identified.
    Date: 2026-05-16T20:33:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-1914x-hq-mix-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Alleged data breach of mybookqatar.com
    Category: Data Breach
    Content: A threat actor shared an alleged database dump from mybookqatar.com containing approximately 280,000 user records in CSV format. Exposed fields include full name, mobile number, email, hashed password, gender, date of birth, nationality, and residence. A sample of records was posted publicly on the forum.
    Date: 2026-05-16T20:16:57Z
    Network: openweb
    Published URL: https://darkpro.net/threads/database-qatar-mybookqatar-com.23153/
    Screenshots:
    None
    Threat Actors: CC-GuRu
    Victim Country: Qatar
    Victim Industry: Unknown
    Victim Organization: My Book Qatar
    Victim Site: mybookqatar.com
  77. Combo list of 17K mail access credentials (mixed providers)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 17,000 mail account credentials described as fully valid. The list is mixed across multiple email providers and is dated May 16. Access to the content requires registration or login on the forum.
    Date: 2026-05-16T20:15:51Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-17kfull-valid-mail-access-mix-16-05
    Screenshots:
    None
    Threat Actors: CitronCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged data leak of Canada Life Assurance Company
    Category: Data Leak
    Content: A threat actor has freely shared an alleged database dump from Canada Life Assurance Company (canadalife.com), claiming it contains over 5.6 million Salesforce records with personally identifiable information. The data is made available for download on the forum.
    Date: 2026-05-16T20:14:17Z
    Network: openweb
    Published URL: https://darkpro.net/threads/database-canada-life.23154/
    Screenshots:
    None
    Threat Actors: CC-GuRu
    Victim Country: Canada
    Victim Industry: Finance
    Victim Organization: Canada Life Assurance Company
    Victim Site: canadalife.com
  79. Sale of 17K mixed mail access combo list
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 17,000 claimed valid mail access credentials across mixed providers, dated May 16. The content is hidden behind a registration/login wall on the forum.
    Date: 2026-05-16T20:11:22Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-17K-Full-Valid-Mail-Access-MIX-16-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged data breach of Land Surveyors Board of Kenya
    Category: Data Breach
    Content: A threat actor claims to have breached the Land Surveyors Board of Kenya (LSB), the official government body responsible for licensing land surveyors in Kenya. The post advertises 271 records and directs users to Telegram channels to access the exposed data. No further details on the specific data types were provided in the post.
    Date: 2026-05-16T20:02:10Z
    Network: openweb
    Published URL: https://breached.st/threads/271-land-surveyors-board-of-kenya-breached.87215/unread
    Screenshots:
    None
    Threat Actors: cc5ab
    Victim Country: Kenya
    Victim Industry: Government
    Victim Organization: Land Surveyors Board of Kenya
    Victim Site: lsb.go.ke
  81. Sale of Hotmail combo list with 939 entries
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as 939 Hotmail credentials. The content is hidden behind a registration or login wall on the forum. No additional details about the data origin or validity are provided.
    Date: 2026-05-16T19:57:59Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5-939x-hotmail-access-vault-%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: RyuuMaster
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. NEW PRIVATE MIX DROP
    Category: Alert
    Content: New thread posted by Crypto_Ghost_X: NEW PRIVATE MIX DROP
    Date: 2026-05-16T19:57:42Z
    Network: openweb
    Published URL: https://patched.to/Thread-new-private-mix-drop
    Screenshots:
    None
    Threat Actors: Crypto_Ghost_X
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. Sale of counterfeit currency across multiple countries
    Category: Chatter
    Content: A forum post on a darknet market community advertises counterfeit banknotes for the US, UK, Australia, EU, Canada, and New Zealand. The post implies availability of specific denominations. No further technical details are provided.
    Date: 2026-05-16T19:50:46Z
    Network: tor
    Published URL: https://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/33239e2f9bf65bb5bcc2
    Screenshots:
    None
    Threat Actors: StockMONEY_AVAILABLE_ 🍼
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Mixed Country Education Email Combo List (81,915 Records)
    Category: Combo List
    Content: A threat actor shared a combo list containing 81,915 email and password pairs associated with education sector accounts across multiple countries. The list was posted on a public forum and is available for credential stuffing or account takeover activity.
    Date: 2026-05-16T19:50:28Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-81-915-Mixed-Country-Education-Mail-Pass
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Combo list targeting Hotmail distributed on leakforum.io
    Category: Combo List
    Content: A user on leakforum.io is distributing a combo list of 1,561 credentials marketed for use against Hotmail accounts. The content is hidden behind a registration or login gate. No breach of a specific organization is claimed.
    Date: 2026-05-16T19:48:09Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%EF%B8%8F-1561x-Verity-Vault-Hotmail-Drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Verityyyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  86. Alleged data leak of Wolfe Eye Clinic patient records
    Category: Data Leak
    Content: A threat actor has leaked a CSV database allegedly containing 639,640 patient records from Wolfe Eye Clinic, originally dated May 2021. The dataset includes highly sensitive fields such as full name, address, date of birth, Social Security number, phone number, email address, sex, race, religion, and other personally identifiable and medical information.
    Date: 2026-05-16T19:43:23Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-Wolfe-Eye-Clinic-Repost
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: United States
    Victim Industry: Healthcare
    Victim Organization: Wolfe Eye Clinic
    Victim Site: wolfeeyeclinic.com
  87. Free Iranian email:password combo list targeting gaming accounts
    Category: Combo List
    Content: A threat actor operating under the 1877 team is freely distributing an email:password combo list described as an Iranian gaming database. The post states the credentials can be used to check accounts on various Iranian sites and is made available to the public and team members at no cost.
    Date: 2026-05-16T19:42:48Z
    Network: openweb
    Published URL: https://breached.st/threads/iranian-email-pass-gaming-database.87213/unread
    Screenshots:
    None
    Threat Actors: org1877
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. Alleged data breach of Permata Bank
    Category: Data Breach
    Content: A threat actor operating under the handle jax7 on Breachforums has posted a thread claiming a data breach of Permata Bank (Indonesian financial institution). The post includes a link to the breach forum thread discussing the leak.
    Date: 2026-05-16T19:39:33Z
    Network: telegram
    Published URL: https://t.me/Jax702/46
    Screenshots:
    None
    Threat Actors: jax7
    Victim Country: Indonesia
    Victim Industry: Financial Services
    Victim Organization: Permata Bank
    Victim Site: Unknown
  89. Free German combo list with 3,443 email:password pairs
    Category: Combo List
    Content: A threat actor shared a combo list of 3,443 German email:password pairs via an external paste link, marketed as fresh and valid. The credentials are a mix of accounts and appear to be distributed for free on a cracking forum.
    Date: 2026-05-16T19:38:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Germany-Daily-Fresh-3443-Mix-Valid-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Combo List of European Email and Password Credentials
    Category: Combo List
    Content: A combo list of approximately 8,468 European email and password credential pairs is being shared on a cracking forum. The list is described as semi-valid and full-address (FA) formatted. No specific target organization or service is identified.
    Date: 2026-05-16T19:38:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-468-Semi-Valide-FA-Europa-Mix-Combo
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Combo list with alleged fresh valid credentials distributed on cracking forum
    Category: Combo List
    Content: A combo list marketed as containing 1,199 fresh valid email:password credentials was shared on a cracking forum. The post is attributed to user MTB_cloud and the credentials are described as a mixed combo list.
    Date: 2026-05-16T19:38:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Mix-Blaze-1199-Valid-Fresh-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Sale of mixed business email combo list
    Category: Combo List
    Content: A threat actor is sharing a mixed business email and password combo list via an external paste link. The post is categorized as a combolist offering targeting business accounts. No specific victim organization or record count is disclosed.
    Date: 2026-05-16T19:37:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Mix-Beast-Mode-1203-Business-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 500 UHQ Hotmail credentials on a cybercrime forum. The post is categorized as a combo list targeting Hotmail accounts, likely for use in credential stuffing or account takeover activity.
    Date: 2026-05-16T19:36:39Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-X500-UHQ-HOTMAILS
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Sale of German corporate credential combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 3,443 email:password credentials purportedly associated with German corporate accounts. The post is shared via an external paste link and marketed as premium access.
    Date: 2026-05-16T19:36:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Germany-Corporate-3443-Access-Premium-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Sale of mixed email access combo list subscription service
    Category: Combo List
    Content: A threat actor is selling daily fresh mixed email access combo lists, including Hotmail credentials, marketed as private with no duplicates. The service is offered via subscription tiers ranging from $10 for a 3-day trial to $45 for one month. The seller claims the credentials are suitable for use against any target.
    Date: 2026-05-16T19:35:51Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%98%81%EF%B8%8F-mk2-cloud-fresh-mix-mail-access-full-private-%F0%9F%92%8E-303110
    Screenshots:
    None
    Threat Actors: mk2clode
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Sale of Germany mail access combo list (4.3K credentials)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 4,300 Germany-based email credentials on a public forum. The post indicates the data was previously distributed in private groups 4–7 days before public release. No specific breached organization is identified.
    Date: 2026-05-16T19:35:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8%E2%84%B9%EF%B8%8F4-3k-GERMANY-MAIL-ACCESS-MIX%E2%9C%A8-15-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Sale of European mixed combo list with 8,353 credentials
    Category: Combo List
    Content: A European mixed combo list containing approximately 8,353 semi-valid email:password credential pairs is being shared on a cracking forum. The list is described as semi-valid and targets a mixed range of European accounts. No specific victim organization or service is identified.
    Date: 2026-05-16T19:35:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-353-Semi-Valide-FA-Europa-Mixed-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  98. Forum introduction and community inquiry on DarkNetFrance
    Category: Chatter
    Content: A user posted an introduction on the DarkNetFrance Dread board after a period of absence, asking for links to French-language darknet forums and reliable vendors for cannabis. No threat activity or cybercrime services are being advertised.
    Date: 2026-05-16T19:31:11Z
    Network: tor
    Published URL: https://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/fa01c9058061d346c96d
    Screenshots:
    None
    Threat Actors: Samoussa 🍼
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Combo list of 1,065 mixed mail credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 1,065 mixed mail credentials on a leak forum. The content is hidden behind registration or login. No specific breached organization is identified.
    Date: 2026-05-16T19:25:33Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%EF%B8%8F-1065x-Verity-Vault-Mix-Mail-Drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Verityyyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Sale of 15.6K DE/FR/IT/USA mail access combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 15,600 email account credentials spanning Germany, France, Italy, and the United States. The list is marketed as mail access credentials suitable for credential stuffing. No specific breached organization is identified.
    Date: 2026-05-16T19:24:43Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-15-6k-DE-FR-IT-USA-MAILS-ACCESS-COMBO
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Sale of DE/FR/IT/USA mail access combo list (32.9K records)
    Category: Combo List
    Content: A threat actor is offering a combo list containing approximately 32,900 email access credentials targeting users from Germany, France, Italy, and the United States. The list is marketed for mail account access across multiple countries.
    Date: 2026-05-16T19:24:23Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-32-9k-DE-FR-IT-USA-MAILS-ACCESS-COMBO
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Sale of Poland email combo list with 5.9K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 5,900 Polish email credentials. The list is advertised as mail access combos targeting Polish users. No specific breached organization is identified.
    Date: 2026-05-16T19:24:01Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-5-9k-POLAND-COMBO-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Sale of Germany combo list with 5.5K email credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 5,500 German email credentials. The post advertises the list as mail access combos targeting German accounts.
    Date: 2026-05-16T19:23:42Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-5-5k-GERMANY-COMBOS-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Combo list of 40.5K Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 40,500 Hotmail credentials. The post was made on a public forum and appears to offer the list for free distribution. No additional details about the data origin or verification status were provided.
    Date: 2026-05-16T19:23:21Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-40-5k-HOTMAILS-COMBO-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Sale of Figma Pro 1-Year Subscription Access
    Category: Services
    Content: A forum seller is offering a 1-year Figma Pro subscription for $14.99, marketed as Creative Workflow Support. The post appears to advertise unauthorized or resold access to Figma Pro accounts. No further details are available from the post content.
    Date: 2026-05-16T19:20:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-14-99-%E2%9C%85-Design-Smarter-All-Years-%E2%80%93-Figma-Pro-1-Year-Creative-Workflow-Support
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Fraud Methods and Tips Tutorial Post on Dark Web Forum
    Category: Chatter
    Content: A dark web forum post shares a broad collection of fraud tutorials and methods including card testing, BIN attacks, chargeback fraud, SIM swapping, phishing pages, ACH fraud, and money laundering techniques. The post covers operational security tips such as VPN chaining and encrypted communications. No specific victim organization or dataset is referenced; the content is instructional in nature targeting multiple fraud categories.
    Date: 2026-05-16T19:13:43Z
    Network: tor
    Published URL: https://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/77ce161221dd040584f2
    Screenshots:
    None
    Threat Actors: c2b37x62 P
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Germany mail access combo list (4.3K credentials)
    Category: Combo List
    Content: A threat actor is freely distributing a combo list of approximately 4,300 German email account credentials. The post indicates the data was initially shared in private closed groups 4–7 days prior to public release. The content is gated behind registration or login on the forum.
    Date: 2026-05-16T19:12:59Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%E2%84%B9%EF%B8%8F4-3k-germany-mail-access-mix%E2%84%B9%EF%B8%8F%E2%9C%A8-15-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Sale of mixed mail access combo list with 1,440 lines
    Category: Combo List
    Content: A threat actor shared a mixed mail access combo list containing 1,440 lines on a cybercrime forum. The content is gated behind registration or login. No specific targeted organization or country is identified.
    Date: 2026-05-16T19:12:39Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-1-440-lines-mixed-mail-access-base
    Screenshots:
    None
    Threat Actors: cloudkaraoke
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Sale of corporate mixed email combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 28,900 corporate email and password pairs, described as mixed corporate mail access. The seller also advertises bulk combo lists at various price tiers, including gaming and shopping combos, and offers access to a private combo group for a recurring subscription fee.
    Date: 2026-05-16T19:10:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-28-9k-CORPS-MIXED-COMBO-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Sale of mixed corporate email combo list
    Category: Combo List
    Content: A threat actor is offering a mixed corporate email and password combo list containing approximately 32,400 credentials. The post advertises access to larger combo lists at tiered pricing, including gaming and shopping combos. Content is gated behind forum registration or login.
    Date: 2026-05-16T19:09:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-32-4k-CORPS-MIXED-COMBO-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  111. Sale of email credentials, phone-password combos, and Gmail cookies
    Category: Combo List
    Content: A forum seller is offering email:password combos, phone number:password combos, and Gmail cookies marketed as fresh and effective. The post appears to advertise credential bundles likely suitable for credential stuffing or account takeover activity. No further details are available from the post content.
    Date: 2026-05-16T18:56:19Z
    Network: openweb
    Published URL: https://altenens.is/threads/purchase-fresh-and-effective-email-password-phone-number-password-gmail-cookie.2941544/unread
    Screenshots:
    None
    Threat Actors: zhurek
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Sale of personal data, identity documents, and credential databases
    Category: Services
    Content: A threat actor is advertising a range of data products for sale including full company databases, scanned identity documents (IDs, drivers licenses, passports), SSN/SIN records, consumer info, phone and email lists, and credentials. The seller directs prospective buyers to contact them via Telegram.
    Date: 2026-05-16T18:51:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75481/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Gmail-targeted combo list of 158K credentials offered for free
    Category: Combo List
    Content: A threat actor on a cracking forum has shared a Gmail-targeted combo list containing approximately 158,000 email:password credential pairs. The post also advertises additional combo lists for sale covering multiple email providers and regions including AOL, Yahoo, Hotmail, Outlook, and various countries. Contact is solicited via Telegram for purchases.
    Date: 2026-05-16T18:49:05Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-158K-GMAIL-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  114. Hotmail credential hits combo list shared on forum
    Category: Combo List
    Content: A threat actor shared 687 alleged high-quality Hotmail credential hits on a cybercrime forum. The post references inbox access targets, suggesting the credentials may be marketed for use in account takeover or spam campaigns. The actual content is hidden behind a registration/login requirement.
    Date: 2026-05-16T18:47:51Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5-687x-hq-hotmail-hits-%F0%9F%94%A5-%F0%9F%94%8E-inboxes-targets-%F0%9F%94%8E
    Screenshots:
    None
    Threat Actors: Lowza9
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Website Defacement of Vitpack by 0xSHALL of FOURSDEATH TEAM
    Category: Defacement
    Content: On May 17, 2026, the website vitpack.nl was defaced by threat actor 0xSHALL operating under the group FOURSDEATH TEAM. The defacement targeted a specific page (zxc.html) rather than the sites homepage, indicating a targeted page-level intrusion. The incident was recorded and mirrored by zone-xsec.com with mirror ID 923548.
    Date: 2026-05-16T18:47:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923548
    Screenshots:
    None
    Threat Actors: 0xSHALL, FOURSDEATH TEAM
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Vitpack
    Victim Site: vitpack.nl
  116. Combo List targeting Hotmail with 3,862 valid credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 3,862 credentials claimed to be valid Hotmail accounts, marketed with a validity date of May 15, 2026. The content is gated behind forum registration or login.
    Date: 2026-05-16T18:47:20Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8F%873862-hotmail-valid-access-15-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged education sector credential combo list with 101,586 lines
    Category: Combo List
    Content: A combo list containing 101,586 email and password pairs from mixed education domain leaks has been shared on a cracking forum. The credentials appear to target educational institutions. No specific organization or breach source is identified.
    Date: 2026-05-16T18:46:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-101-586-Lines-%E2%9C%85-Edu-education-Mixed-Domain-leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Sale of UHQ mixed combo list (1,782 entries)
    Category: Combo List
    Content: A user on a cracking forum shared a UHQ mixed email:password combo list containing 1,782 entries. No additional details about the source or targeted services are available from the post content.
    Date: 2026-05-16T18:45:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1782x-uhq-mixed
    Screenshots:
    None
    Threat Actors: Timi999
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. Website Defacement of Urban Lights Church by 0xSHALL (FOURSDEATH TEAM)
    Category: Defacement
    Content: On May 17, 2026, a threat actor identified as 0xSHALL, operating under the group FOURSDEATH TEAM, defaced a page on the Urban Lights Church website (urbanlights.church/zxc.html). The attack was a targeted single-page defacement rather than a mass or home page compromise. No specific motive or server details were disclosed in the available intelligence.
    Date: 2026-05-16T18:44:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923547
    Screenshots:
    None
    Threat Actors: 0xSHALL, FOURSDEATH TEAM
    Victim Country: Unknown
    Victim Industry: Religious Organization
    Victim Organization: Urban Lights Church
    Victim Site: urbanlights.church
  120. Website Defacement of Mori Castello by 0xSHALL (FOURSDEATH TEAM)
    Category: Defacement
    Content: On May 17, 2026, the Italian website moricastello.it was defaced by threat actor 0xSHALL operating under the FOURSDEATH TEAM. The attack targeted a specific page (zxc.html) rather than the homepage, suggesting a targeted single-page defacement. The incident was recorded and mirrored by zone-xsec.com with mirror ID 923545.
    Date: 2026-05-16T18:30:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923545
    Screenshots:
    None
    Threat Actors: 0xSHALL, FOURSDEATH TEAM
    Victim Country: Italy
    Victim Industry: Hospitality / Tourism
    Victim Organization: Mori Castello
    Victim Site: moricastello.it
  121. Website Defacement of kintlevoseg.hu by 0xSHALL of FOURSDEATH TEAM
    Category: Defacement
    Content: On May 17, 2026, the Hungarian website kintlevoseg.hu was defaced by threat actor 0xSHALL operating under the group FOURSDEATH TEAM. The attack targeted a specific page (zxc.html) rather than the sites homepage, indicating a targeted page-level defacement. The incident was recorded and mirrored by zone-xsec.com with mirror ID 923546.
    Date: 2026-05-16T18:29:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923546
    Screenshots:
    None
    Threat Actors: 0xSHALL, FOURSDEATH TEAM
    Victim Country: Hungary
    Victim Industry: Unknown
    Victim Organization: Kintlevoseg
    Victim Site: kintlevoseg.hu
  122. Sale of UHQ combo list targeting VPN and gaming services
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 250,000 email:password credentials marketed as UHQ (ultra-high quality) and intended for use against VPN and gaming services. No additional details are available from the post content.
    Date: 2026-05-16T18:26:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-uhq-250K-VPN-GAME-COMBO-TRY
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  123. 115K UHQ Mixed Mail Combo List
    Category: Combo List
    Content: A threat actor is sharing a combo list of 115,000 mixed email credentials, marketed as UHQ and fresh. The post is sponsored by slateaio.com, a known credential-stuffing tool platform.
    Date: 2026-05-16T18:25:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-115K-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Free Outlook combo list containing 20,000 credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 20,000 Outlook credentials, marketed as ultra-high quality and fresh. The post is sponsored by slateaio.com, suggesting use with credential-stuffing tools. No specific breach victim is identified.
    Date: 2026-05-16T18:25:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-20K-UHQ-OUTLOOK-COMBO-FRESH–2094814
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  125. Sale of semi-validated email access combo list with 14,823 credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list containing 14,823 semi-validated email address and password pairs marketed as having email access. The list is distributed via a carding/combolist forum and appears to be intended for credential stuffing or unauthorized email account access.
    Date: 2026-05-16T18:24:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-14-823-Semi-Valide-FA-Mail-Access-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  126. Combo list of 100,000 US email:password credentials shared on forum
    Category: Combo List
    Content: A threat actor operating under the alias ImLupin (also referencing TheLupin) has made available a combo list of over 100,000 United States email:password credential pairs on a cracking forum. The post markets the data as ultra high quality.
    Date: 2026-05-16T18:24:34Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-100-000-UNITED-STATES-MAIL-PASSWORD-DATA-ULTRA-HIGH-QUALITY
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  127. Sale of 7.5K mixed mail access combo list
    Category: Combo List
    Content: A forum user is sharing or selling a combo list of approximately 7,500 mixed email account credentials. No further details are available from the post content.
    Date: 2026-05-16T18:24:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-7-5k-mixed-mail-access
    Screenshots:
    None
    Threat Actors: Timi999
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged data breach of Evocon industrial cloud database
    Category: Data Breach
    Content: A threat actor claims to have breached Evocons central cloud database, allegedly obtaining factory transaction logs and industrial device operational data. The post threatens to publish the extracted files publicly if a ransom is not paid, and offers to share vulnerability details and delete the data upon payment. The exposed data reportedly includes global industrial operations logs and machinery outputs.
    Date: 2026-05-16T18:21:02Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Estonia-Evocon-Industrial-Logs-Database-%E2%80%94-Full-Factory-Transaction-Logs-Exposed
    Screenshots:
    None
    Threat Actors: Sejjil
    Victim Country: Estonia
    Victim Industry: Manufacturing
    Victim Organization: Evocon
    Victim Site: evocon.com
  129. Alleged data leak of Politeknik Negeri Bali employee database
    Category: Data Leak
    Content: A threat actor leaked for free a database purportedly belonging to Bali State Polytechnic (Politeknik Negeri Bali) containing employee records. The exposed data includes fields such as national ID numbers, full names, gender, date and place of birth, religion, marital status, phone numbers, email addresses, home addresses, bank account numbers, tax identification numbers, and employment status. The actor indicated they are continuing to search for additional data from the organization.
    Date: 2026-05-16T18:16:14Z
    Network: openweb
    Published URL: https://breached.st/threads/politeknik-bali-database.87212/unread
    Screenshots:
    None
    Threat Actors: Kyyza
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Politeknik Negeri Bali
    Victim Site: pnb.ac.id
  130. Sale of Hotmail credential combo list with 4K valid hits
    Category: Combo List
    Content: A forum user is distributing a combo list of approximately 4,000 Hotmail credentials marketed as valid hits. Access to the content requires forum engagement. The named service is a credential-stuffing target, not the breach source.
    Date: 2026-05-16T18:13:13Z
    Network: openweb
    Published URL: https://altenens.is/threads/4k-hotmails-valid-hits.2941533/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Sale of 450K UHQ Gmail combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 450,000 Gmail credentials, marketed as ultra-high quality and fresh. Access to the hidden content requires forum engagement. Gmail is a credential-stuffing target, not the breach victim.
    Date: 2026-05-16T18:12:44Z
    Network: openweb
    Published URL: https://altenens.is/threads/450k-uhq-gmail-combo-fresh.2941534/unread
    Screenshots:
    None
    Threat Actors: GhostlyGamer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  132. Free distribution of stealer logs and ULP credentials
    Category: Logs
    Content: A threat actor known as WaterCloud is freely distributing stealer logs and URL:Login:Password (ULP) credential data via a Pixeldrain link. The content is partially hidden behind a forum registration wall. No specific victim organization or record count is disclosed.
    Date: 2026-05-16T18:12:29Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90%E2%AD%90%E2%AD%90-stealer-logs-and-u-l-p-16-05-2026
    Screenshots:
    None
    Threat Actors: WaterCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Alleged data leak of Norauto France
    Category: Data Leak
    Content: A threat actor claims to be leaking the customer database of Norauto, a French automotive service and retail company. The leaked data reportedly includes names, addresses, phone numbers, and email addresses in TXT format totaling 522 MB. A sample of JSON-structured customer records was shared as proof.
    Date: 2026-05-16T17:59:57Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-FR-Norauto-fr
    Screenshots:
    None
    Threat Actors: shitanus
    Victim Country: France
    Victim Industry: Retail
    Victim Organization: Norauto
    Victim Site: norauto.fr
  134. Sale of hacked Office365 SMTP access
    Category: Initial Access
    Content: A threat actor is offering for sale a hacked SMTP access associated with office365.com. No further details are available from the post content.
    Date: 2026-05-16T17:58:21Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-HACKED-office365-com-SMTP
    Screenshots:
    None
    Threat Actors: CHS
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: office365.com
  135. Sale of compromised Ticketmaster accounts
    Category: Initial Access
    Content: A threat actor is selling compromised Ticketmaster (TM) accounts at $8 each for regular accounts and $15 each for accounts with order history, with bulk discounts available. The post does not specify the total number of accounts available or the method of compromise.
    Date: 2026-05-16T17:56:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-TM-Accounts
    Screenshots:
    None
    Threat Actors: EVERYWEEK
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Ticketmaster
    Victim Site: ticketmaster.com
  136. Combo List targeting European accounts (9,539 records)
    Category: Combo List
    Content: A combo list of 9,539 email:password credentials marketed as semi-valid and targeting European accounts was shared on a cracking forum. The list is described as suitable for credential stuffing or account checking. No specific victim organization is identified.
    Date: 2026-05-16T17:56:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-9-539-Semi-Valide-FA-Combolist-Europa-Good
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  137. Alleged sale of RDP access and compromised email accounts
    Category: Initial Access
    Content: Threat actor offering rental access to RDP instances on Azure, AWS, and DigitalOcean platforms at $200, along with compromised domain mail, Gmail, Yahoo accounts, GitHub Student accounts, and various subscription services (ChatGPT Plus, Claude, ElevenLabs). Fresh RDP with good IP reputation advertised. Escrow service offered.
    Date: 2026-05-16T17:53:57Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/83008
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 7,000 Hotmail credentials, marketed as high-quality hits. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-16T17:52:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85-7k-hq-hotmail-hit-%E2%9C%85-303067
    Screenshots:
    None
    Threat Actors: RetroCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  139. Sale of mixed mail access combo list with 3,691 credentials
    Category: Combo List
    Content: A forum user shared a mixed mail access combo list containing 3,691 credentials. The content is hidden behind registration and no further details about the data source or composition are visible.
    Date: 2026-05-16T17:46:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75479/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  140. Free combo list: geo mix multi-country URL:log:pass credentials
    Category: Combo List
    Content: A threat actor shared a free combo list containing over 10,000 URL:log:pass credential pairs sourced from multiple countries. The list is described as fresh and was made available via an external file-sharing link.
    Date: 2026-05-16T17:45:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-URL-LOG-PASS-Geo-MIX-COUNTRY-10000-Fresh
    Screenshots:
    None
    Threat Actors: HULKMAD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  141. Combo List: Mixed Mail Access Credentials (1,440 Lines)
    Category: Combo List
    Content: A threat actor has shared a combo list containing 1,440 lines of mixed mail access credentials. The list is offered as a free download on a cracking forum. No specific victim organization or country is identified.
    Date: 2026-05-16T17:45:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-440-LINES-MIXED-MAIL-ACCESS-DATABASE
    Screenshots:
    None
    Threat Actors: kccloud01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Instagram account unban and recovery service offered via claimed insider access
    Category: Services
    Content: A forum user is advertising an Instagram account unban and recovery service, claiming to operate through an insider representative. Services include ban removal and shadowban removal for $1,500, with an insider contact reportedly available for sale at $20,000. The seller states escrow is accepted and requests proof of funds for the contact sale.
    Date: 2026-05-16T17:44:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-INSTANT-INSTAGRAM-UNBANS-VIA-REP-AVAILABLE-FOR-LONGTERM-WORK
    Screenshots:
    None
    Threat Actors: richofkyc
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Mass Website Defacement of Indonesian University Moodle Platform by Mr.spongebob (Anonsec Team)
    Category: Defacement
    Content: On May 17, 2026, a threat actor known as Mr.spongebob, operating under the Anonsec Team, conducted a mass defacement targeting the Moodle e-learning platform of an Indonesian university (moodle.uasn.ac.id). The attack was carried out on a Linux-based server and is classified as a mass defacement campaign. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T17:42:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249316
    Screenshots:
    None
    Threat Actors: Mr.spongebob, Anonsec Team
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Universitas Abdurrab Pekanbaru (UASN)
    Victim Site: moodle.uasn.ac.id
  144. Mass Defacement of skilledsavers.com by Mr.spongebob of Anonsec Team
    Category: Defacement
    Content: On May 17, 2026, a threat actor known as Mr.spongebob, operating under the Anonsec Team, conducted a mass defacement attack against skilledsavers.com, a website likely associated with financial savings services. The attack targeted a Linux-based server and involved defacement of a specific page rather than the homepage. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T17:41:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249317
    Screenshots:
    None
    Threat Actors: Mr.spongebob, Anonsec Team
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Skilled Savers
    Victim Site: skilledsavers.com
  145. Mass Website Defacement of Indonesian University by Mr.spongebob of Anonsec Team
    Category: Defacement
    Content: On May 17, 2026, a threat actor identified as Mr.spongebob, operating under the Anonsec Team, conducted a mass defacement attack targeting the Faculty of Computer Science website of an Indonesian university hosted at fasilkom.uasn.ac.id. The defacement was performed on a Linux-based server and archived via haxor.id. This incident is part of a broader mass defacement campaign attributed to the same actor and group.
    Date: 2026-05-16T17:40:03Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249315
    Screenshots:
    None
    Threat Actors: Mr.spongebob, Anonsec Team
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Universitas Amikom Surakarta – Faculty of Computer Science (Fasilkom)
    Victim Site: fasilkom.uasn.ac.id
  146. Website Defacement of UASN Academic Institution by Mr.spongebob of Anonsec Team
    Category: Defacement
    Content: On May 17, 2026, a threat actor identified as Mr.spongebob, operating under the Anonsec Team, defaced a page on the Indonesian academic institution uasn.ac.id. The attack targeted a specific page (uid.html) on a Linux-based web server, and was not classified as a mass or home page defacement. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T17:39:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249313
    Screenshots:
    None
    Threat Actors: Mr.spongebob, Anonsec Team
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Universitas Akademi Sakti Nusantara (UASN)
    Victim Site: uasn.ac.id
  147. Mass Defacement of Indonesian University Website by Mr.spongebob of Anonsec Team
    Category: Defacement
    Content: On May 17, 2026, a threat actor known as Mr.spongebob, affiliated with Anonsec Team, conducted a mass defacement attack targeting the Faculty of Economics website of Universitas Abdurrab (UASN) in Indonesia. The attacker defaced the page at fekon.uasn.ac.id/uid.html on a Linux-based server. This incident was part of a broader mass defacement campaign, with a mirror of the defacement archived at haxor.id.
    Date: 2026-05-16T17:38:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249314
    Screenshots:
    None
    Threat Actors: Mr.spongebob, Anonsec Team
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Universitas Abdurrab Pekanbaru (UASN) – Faculty of Economics
    Victim Site: fekon.uasn.ac.id
  148. Mass Website Defacement of SkilledSavers by Mr.spongebob of Anonsec Team
    Category: Defacement
    Content: On May 17, 2026, a threat actor identified as Mr.spongebob, operating under the Anonsec Team, conducted a mass defacement attack targeting forms.skilledsavers.com, a subdomain associated with a savings or financial services platform. The attack targeted a Linux-based server and defaced a specific page (uid.html) as part of a broader mass defacement campaign. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T17:36:31Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249318
    Screenshots:
    None
    Threat Actors: Mr.spongebob, Anonsec Team
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: SkilledSavers
    Victim Site: forms.skilledsavers.com
  149. Distribution of stealer logs (1.6GB, May 2026)
    Category: Logs
    Content: A forum user shared a 1.6GB collection of stealer logs dated May 16, 2026. The post is a bump with no additional details about origin, target sectors, or affected organizations.
    Date: 2026-05-16T17:24:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90%EF%B8%8FLOGS-FRESH-1-6GB-FROM-16-05-2026%E2%AD%90%EF%B8%8F-%E2%98%81
    Screenshots:
    None
    Threat Actors: hellall
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Alleged defacement of ai345.cn by C10F/X404
    Category: Defacement
    Content: Indonesian defacer group C10F/X404 claimed responsibility for defacing ai345.cn website. Multiple defacement proof URLs provided including DIT.txt, C10F.html, and Defacer.html files planted on the target domain.
    Date: 2026-05-16T17:24:32Z
    Network: telegram
    Published URL: https://t.me/c/3755871403/500
    Screenshots:
    None
    Threat Actors: C10F
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: ai345.cn
    Victim Site: ai345.cn
  151. Sale of European mix combo list with 7,306 records
    Category: Combo List
    Content: A threat actor shared a combo list of 7,306 email:password credential pairs described as semi-valid and sourced from European accounts. The list is advertised as a mix combo, suggesting credentials from multiple sources or services. No specific breached organization is identified.
    Date: 2026-05-16T17:24:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-7-306-Semi-Valide-FA-Europa-Mix-Combo
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Combo List of Hotmail credentials
    Category: Combo List
    Content: A combo list of 763 Hotmail credentials marketed as UHQ (ultra-high quality) and valid was shared on a cracking forum. The credentials appear to be compiled from prior breaches and tested against Hotmail accounts.
    Date: 2026-05-16T17:24:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-x763-HOTMAILS-UHQ-VALID
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Refund fraud service offering for Amazon and Apple
    Category: Services
    Content: A threat actor operating under the alias Gr33nGoblin is advertising a refund fraud service targeting Amazon and Apple, claiming high-quality results with competitive fees and turnaround times. Refund fraud services typically involve social engineering or policy abuse to obtain refunds for items that were not legitimately returned. No further details are available as the post contained no content.
    Date: 2026-05-16T17:23:20Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Shoppy-Goblin-s-Amazon-Apple-Refunds-HQ-Refunds-Best-fee-Timeframe–2094789
    Screenshots:
    None
    Threat Actors: Gr33nGoblin
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  154. Sale of C2 Mobile Exploitation Framework Targeting iOS and Android Devices
    Category: Malware
    Content: A threat actor is selling C2 BlackSite, a claimed zero-click full-chain exploitation framework targeting iOS and Android devices across all versions. The tool advertises capabilities including browser RCE, kernel read/write, persistent implant delivery, keychain extraction, real-time surveillance (camera, microphone, GPS), cryptocurrency wallet seed phrase extraction, and banking credential theft. The product is offered with same-day exploit updates, 24/7 developer support, and delivery via SM
    Date: 2026-05-16T17:18:03Z
    Network: openweb
    Published URL: https://breached.st/threads/c2-exploit-for-ios-android-supported-all-latest-versions.87210/unread
    Screenshots:
    None
    Threat Actors: C2Exploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. Alleged data leak of Permata Bank
    Category: Data Leak
    Content: A threat actor using the handle JAX7 has leaked data allegedly belonging to Permata Bank, an Indonesian financial institution. The post includes a sample code block, though the full content and record count are not specified in the available post excerpt.
    Date: 2026-05-16T17:17:10Z
    Network: openweb
    Published URL: https://breached.st/threads/leak-permata-bank.87209/unread
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Indonesia
    Victim Industry: Finance
    Victim Organization: Permata Bank
    Victim Site: permatabank.com
  156. Wanted: Canadian personal data profiles including SIN and drivers license numbers
    Category: Combo List
    Content: A forum user is soliciting Canadian personal data profiles containing full name, date of birth, address, Social Insurance Number (SIN), and drivers license number. Bonus value is indicated for profiles that include tax information or business profiles. The post requests proof of legitimacy from potential sellers.
    Date: 2026-05-16T17:05:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75474/
    Screenshots:
    None
    Threat Actors: Cashgang2231
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Sale of UUHQ ULP combo list
    Category: Combo List
    Content: A forum user is offering a combo list containing 793,064 credentials marketed as ultra-high quality (UUHQ) and fresh, in URL:login:password (ULP) format.
    Date: 2026-05-16T17:05:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-793064-UUHQ-100-FRESH-UUHQ-ULP-BASE-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: EViLUMiNATUS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Free distribution of ULP combo list with 1.7 million lines
    Category: Combo List
    Content: A threat actor is freely distributing a URL:Login:Password (ULP) combo list containing approximately 1.7 million lines. The list is marketed as high quality and private. No specific victim organization or target service is identified.
    Date: 2026-05-16T17:04:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90ULP-URL-LOGIN-PASS-PRIVATE-1-7M-LINES%E2%AD%90HQ%E2%AD%90LEAKED%E2%AD%90BY-ACCGIR%E2%AD%90–2094783
    Screenshots:
    None
    Threat Actors: GoorG
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Sale of Germany-targeted shopping combo list (web.de, GMX, T-Online)
    Category: Combo List
    Content: A combo list of 144,289 email:password credentials targeting German email providers (web.de, GMX, T-Online) has been shared on a cracking forum. The list is described as suitable for shopping-related credential stuffing. No further details are available from the post content.
    Date: 2026-05-16T17:03:44Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-144-289-web-de-gmx-t-online-Shopping-Combolist-Germany-Target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. Sale of French email/password combo list
    Category: Combo List
    Content: A combo list containing approximately 1,400 French email and password pairs has been shared on BreachForums. The credentials are sourced from France-based accounts and appear to be intended for credential stuffing purposes.
    Date: 2026-05-16T17:03:01Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-1-4K-France-combo-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Sale of UHQ Outlook combo list containing 19K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 19,000 Outlook credentials, marketed as ultra-high quality and fresh. The list is intended for credential stuffing against Outlook/Microsoft accounts. No further details are available from the post content.
    Date: 2026-05-16T17:02:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-19K-UHQ-OUTLOOK-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Combo list of 1.8K Japanese email and password credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 1,800 email and password credential pairs associated with Japan. The list was made available via an external file-sharing link.
    Date: 2026-05-16T17:01:34Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combo-1-8K-Japan-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Sale of UHQ Yahoo combo list (25K credentials)
    Category: Combo List
    Content: A threat actor is sharing a combo list of 25,000 Yahoo credentials marketed as UHQ and fresh. The post is sponsored by slateaio.com, suggesting the list may be intended for credential stuffing use.
    Date: 2026-05-16T17:01:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-25K-UHQ-YAHOO-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Combo List of UK email credentials (2.7K)
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 2,700 UK email and password pairs on a cybercrime forum. The post targets no specific organization; credentials appear to be aggregated from multiple sources.
    Date: 2026-05-16T17:01:06Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Uk-2-7K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Combo list of 8,679 email:password credentials marketed as semi-valid and fresh
    Category: Combo List
    Content: A combo list of 8,679 email and password pairs is being shared on a cracking forum, described as semi-valid and fresh. The credentials appear to be marketed for credential stuffing or account takeover activity.
    Date: 2026-05-16T16:59:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-679-Semi-Valide-FA-Good-Line-Fresh
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Russian combo list of 1.4K email/password credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 1,400 email and password pairs, described as Russian in origin, via an external file-sharing link.
    Date: 2026-05-16T16:59:32Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Russian-Combo-1-4K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Sale of UHQ Gmail combo list with 500K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as 500K UHQ Gmail credentials described as fresh. The post is sponsored by slateaio.com, likely a credential-checking tool service. As a combo list, Gmail is a credential-stuffing target, not the breach victim.
    Date: 2026-05-16T16:59:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-500K-UHQ-GMAIL-COMBO-FRESH–2094778
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  168. Combo List: Gmail credentials (94K)
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 94,000 Gmail email and password pairs. The list is shared via an external file-hosting link. Gmail is a credential-stuffing target, not the breach source.
    Date: 2026-05-16T16:59:04Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Gmail-94K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  169. 125K UHQ Mixed Mail Combo List
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 125,000 mixed email credentials, marketed as fresh and high quality. The post is sponsored by slateaio.com. No specific breached organization is identified.
    Date: 2026-05-16T16:58:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-125K-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Sale of UHQ Hotmail combo list containing 50,000 credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 50,000 Hotmail credentials marketed as high quality and fresh. The list is advertised on a cracking forum and appears intended for credential stuffing use. The post is sponsored by vows.solutions.
    Date: 2026-05-16T16:58:28Z
    Network: openweb
    Published URL: https://cracked.st/Thread-50K-UHQ-HOTMAIL-COMBO-FRESH–2094774
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Combo List of Hotmail credentials (2.3K)
    Category: Combo List
    Content: A threat actor shared a combo list of 2,300 Hotmail email and password pairs on a public forum. The list was made available via an external file-sharing link.
    Date: 2026-05-16T16:57:22Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Hotmail-2-3K-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  172. Sale of Valorant account combo list with over 400,000 credentials
    Category: Combo List
    Content: A threat actor is selling private Valorant account combo lists claimed to contain over 400,000 credentials marketed as fresh with guaranteed hits. A credential checker (with source code) is also offered for sale via a Discord server. The combo list targets mixed-region Valorant accounts and is available through a private Discord channel.
    Date: 2026-05-16T16:57:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-gaming-2350x-valorant-mixed-region-account-combolist-303056
    Screenshots:
    None
    Threat Actors: cdrgod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Alleged DDoS Stresser Service Advertisement – GoliathStress
    Category: Malware
    Content: GoliathStress is being advertised as a Layer 4 & 7 DDoS stresser service claiming to bypass major protection systems including Cloudflare, OVH, Hetzner, Amazon, Akamai, and others. The service offers custom attack methods targeting game servers (PUBG, FiveM) with extreme GBPS power capabilities.
    Date: 2026-05-16T16:56:59Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/98795
    Screenshots:
    None
    Threat Actors: GoliathStress
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Sale of combo list targeting Libero.it
    Category: Combo List
    Content: A threat actor is sharing 623 high-quality credentials associated with Libero.it accounts. The post advertises daily supply of 4,000–12,000 fresh credentials marketed as untouched and optimized for credential stuffing.
    Date: 2026-05-16T16:56:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-623x-hq-libero-it-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Hotmail credential combo list with inbox access claims
    Category: Combo List
    Content: A threat actor is distributing a combo list of 287 claimed high-quality Hotmail credential hits, marketed as valid inbox accesses. The content is gated behind forum registration or login. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-16T16:56:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9D%84-287x-hq-hotmail-hits-%E2%9D%84-%F0%9F%94%8E-inboxes-targets-%F0%9F%94%8E
    Screenshots:
    None
    Threat Actors: Lowza9
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Free combo list of 2,000 mixed mail credentials
    Category: Combo List
    Content: A combo list of approximately 2,000 mixed email account credentials is being shared on a clearnet forum. The content is gated behind registration or login. The list is attributed to the user Kommander0 and dated May 16.
    Date: 2026-05-16T16:55:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-2k-mix-mail-access-full-valid-by-kommander0-16-05
    Screenshots:
    None
    Threat Actors: AnticaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Sale of premium mixed mail combo list with 4,807 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 4,807 mixed mail credentials, including Hotmail hits, marketed as premium and valid. The content is gated behind forum registration or login.
    Date: 2026-05-16T16:55:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1%E2%9A%A1-4807x-premium-mix-mail-hits%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: alphaaxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  178. Combo List sharing by BatmanMail
    Category: Combo List
    Content: A forum user shared a hidden combo list file titled Private Mix on a combolist forum. The content is restricted to registered or logged-in members. No additional details about the data composition or record count are available.
    Date: 2026-05-16T16:54:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-private-mix-batmanmail-2-txt
    Screenshots:
    None
    Threat Actors: BatmanMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  179. Distribution of alleged fresh stealer logs
    Category: Logs
    Content: A forum user shared a post in the stealer logs section titled MAY FRESH LOGS with minimal content referencing Leaky Pro. The post appears to advertise or distribute fresh stealer log data, though specific details regarding volume, origin, or victims are not provided.
    Date: 2026-05-16T16:53:01Z
    Network: openweb
    Published URL: https://breached.st/threads/may-fresh-logs.87208/unread
    Screenshots:
    None
    Threat Actors: webbrunch
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  180. Alleged data breach of LSP Tematika
    Category: Data Breach
    Content: A threat actor is selling a 14GB+ database allegedly exfiltrated from LSP Tematika, an Indonesian professional certification body. The dataset reportedly contains tens of thousands of personal records of assessees and assessors, including names, national ID numbers, dates of birth, contact details, credentials, and company documents. The actor claims this is a follow-up to an unmet ransom demand and threatens to release additional victim data if payment is not received.
    Date: 2026-05-16T16:52:20Z
    Network: openweb
    Published URL: https://breached.st/threads/sell-database-lsptematika.87207/unread
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: LSP Tematika
    Victim Site: lsptematika.net
  181. Alleged sale of stolen payment cards and email access credentials
    Category: Combo List
    Content: Threat actor operating Boss Shop marketplace advertising sale of first-hand stolen payment cards (100K+ daily updates) at $0.01-$0.1 per card with validity guarantees. Also offering daily free stolen cards. Separate post advertising stolen email access credentials across multiple countries (FR, BE, AU, CA, UK, US, NL, PL, DE, JP) with proof-of-life testing available. Both offerings include contact information for purchases.
    Date: 2026-05-16T16:46:42Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82972
    Screenshots:
    None
    Threat Actors: Boss Shop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  182. Sale of Office 365 combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 2 million credentials purportedly valid for Office 365, advertised via Telegram channels. The post directs interested parties to contact the seller directly or join associated Telegram groups for free combos and tools.
    Date: 2026-05-16T16:36:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75467/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  183. Sale of gaming combo list with 1.5 million mixed credentials
    Category: Combo List
    Content: A threat actor posted a gaming-themed combo list containing approximately 1.5 million mixed credentials on BreachForums. No additional details are available as the post content was not captured.
    Date: 2026-05-16T16:34:17Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-Gaming-1-5M-Mixed
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Hotmail combo list freely distributed and offered for sale
    Category: Combo List
    Content: A threat actor is distributing Hotmail credential hits via a free cloud service and offering a private version for purchase via Telegram. The post advertises high-quality hits suitable for credential stuffing against Hotmail accounts. No record count or sample data is provided in the visible portion of the post.
    Date: 2026-05-16T16:33:36Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-hq-hotmail-hit-%E2%9C%85-303047
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Sale of HQ combo list mix
    Category: Combo List
    Content: A threat actor is offering a combo list marketed as HQ Mix containing approximately 1,938 credential pairs. The post claims daily supply of 4,000–12,000 fresh and untouched credentials available through a private members-only network.
    Date: 2026-05-16T16:33:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-1938x-hq-mix-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Sale of mixed mail access combo list (14K credentials)
    Category: Combo List
    Content: A threat actor on DemonForums is sharing a mixed mail access combo list containing approximately 14,000 credentials. The content is hidden behind a registration or login wall. No specific targeted service or origin breach is identified.
    Date: 2026-05-16T16:32:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-14K-MIXED-MAIL-ACCESS-GOODS
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  187. Combo List: Mixed mail credentials with keyword targets
    Category: Combo List
    Content: A threat actor is distributing a combo list of 4,259 mixed email and password credentials on a cybercrime forum. The post includes a separate download for keyword-targeted credentials. No specific victim organization or country is identified.
    Date: 2026-05-16T16:32:28Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-4259x-HQ-MIXED-MAILS-%E2%9D%84%E2%9D%84-KEYWORD-TARGETS–204328
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. Free combo list targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of 2,020 Hotmail credentials, marketed as fresh. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-16T16:31:30Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-2020x-FRESH-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Nulled07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. Mass defacement of Inkara online store by attacker lxrdk1773n
    Category: Defacement
    Content: On May 16, 2026, the attacker known as lxrdk1773n conducted a mass defacement campaign targeting store.inkara.co.id, an Indonesian e-commerce platform operating on a Linux server. The defacement was part of a broader mass defacement operation, with the mirror archived at haxor.id. No specific motive or team affiliation was disclosed.
    Date: 2026-05-16T16:30:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249312
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Retail / E-Commerce
    Victim Organization: Inkara
    Victim Site: store.inkara.co.id
  190. Alleged data breach of SLPTEMATIKA.NET
    Category: Data Breach
    Content: A threat actor is offering for sale a 14GB+ database allegedly exfiltrated from slptematika.net, an Indonesian professional certification body. The dataset reportedly includes tens of thousands of personal records of assessees and assessors, private conversations, decrees, and company documents. The actor states this is a ransomware-related extortion action, with additional data to be released if ransom demands are not met.
    Date: 2026-05-16T16:28:35Z
    Network: openweb
    Published URL: https://breached.st/threads/slptematika-net-database.87206/unread
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: LSP Tematika
    Victim Site: slptematika.net
  191. Alleged European combo list with 10,053 semi-valid credentials
    Category: Combo List
    Content: A threat actor has shared a combo list advertised as containing 10,053 semi-valid European email and password pairs. The list is marketed as suitable for credential stuffing or account access attempts. No specific target organization or service was identified.
    Date: 2026-05-16T16:19:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-10-053-Semi-Valide-FA-Combolist-Europa-Good
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Sale of 21,000 fresh email access combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list advertised as containing 21,000 fresh email credentials. The list is described as a mixed mail access collection. No further details are available from the post content.
    Date: 2026-05-16T16:18:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-21K-FRESH-MAIL-ACCESS-MIX
    Screenshots:
    None
    Threat Actors: Alpha70
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Sale of email access combo list with 9,567 credentials
    Category: Combo List
    Content: A combo list containing 9,567 email and password combinations is being shared on a cracking forum. The credentials are described as semi-valid with full access. No specific victim organization or breach source is identified.
    Date: 2026-05-16T16:18:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-9-567-Semi-Valide-FA-Mail-Access-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  194. Sale of Crypto-Targeted Yahoo Combo List with 552,804 Lines
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list of 552,804 email:password lines sourced from Yahoo accounts, marketed as targeting cryptocurrency users. No additional details are available from the post content.
    Date: 2026-05-16T16:17:53Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-552-804-Lines-%E2%9C%85-Crypto-target-Combolist-Yahoo
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  195. Sale of discounted ChatGPT Plus subscription upgrades
    Category: Services
    Content: A forum seller is offering ChatGPT Plus one-month subscription upgrades for $7 with same-day activation, claiming the accounts are legally purchased. The seller disclaims responsibility for any misuse or policy violations by the buyer after delivery.
    Date: 2026-05-16T16:17:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-CHEAPEST-CHATGPT-UPGRADE-1MONTH-LEGAL-7
    Screenshots:
    None
    Threat Actors: ChoDesign
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Sale of discounted Amazon Prime Video subscription upgrade service
    Category: Services
    Content: A forum user is offering Amazon Prime Video 1-year subscription upgrades for $24.99, requiring customers to provide their Amazon account credentials. The service claims to be legal and delivers worldwide. The mechanism suggests possible unauthorized subscription manipulation or resale of fraudulently obtained Prime access.
    Date: 2026-05-16T16:16:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90AMAZON-PRIME-VIDEO-1-YEAR%E2%AD%90UPGRADE-YOUR-ACCOUNT%E2%AD%90100-LEGAL%E2%9C%85FAST-DELIVERY%E2%AD%90ONLY-24-99
    Screenshots:
    None
    Threat Actors: pollymydolly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Sale of damaged goods fraud video mentorship service
    Category: Services
    Content: A threat actor is selling a video mentorship course priced at €80–€100, limited to 5 customers, instructing buyers on how to fabricate damaged item videos from undamaged photos. The service is intended to facilitate refund fraud against retail stores by creating false evidence of damaged shipments.
    Date: 2026-05-16T16:15:09Z
    Network: openweb
    Published URL: https://patched.to/Thread-v-i-p-101-dmg-video-mentorship-free-lifetime-update-easy-profit
    Screenshots:
    None
    Threat Actors: Cows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Sale of image and video damage (DMG) services
    Category: Services
    Content: A forum user is offering image and video damage (DMG) services at $15 for images and $30 for videos, with middleman accepted. No target organization or victim details are specified.
    Date: 2026-05-16T16:14:30Z
    Network: openweb
    Published URL: https://patched.to/Thread-v-i-p-%E2%AD%90-dmg-image-video-%E2%AD%90unmatched-quality%E2%AD%90100-sr%E2%AD%90
    Screenshots:
    None
    Threat Actors: Cows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Alleged leak of 180,000 proxies from XSSF Russian hacking forum
    Category: Data Leak
    Content: IT ARMY OF RUSSIA forwarded a post from XSSF (Russian Hack Forum) announcing a leak of 180,000 proxies. The leaked proxies are shared via a forum link on xssf.is. This represents infrastructure that could be leveraged for malicious cyber activities including DDoS attacks, credential stuffing, and anonymized attack operations.
    Date: 2026-05-16T16:13:57Z
    Network: telegram
    Published URL: https://t.me/xssf_forum/50
    Screenshots:
    None
    Threat Actors: IT ARMY OF RUSSIA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: xssf.is
  200. Sale of 1 million Czech email and password combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of 1 million Czech email address and password pairs on a cybercrime forum. The list is hosted on an external file-sharing platform. No specific breached organization is identified.
    Date: 2026-05-16T16:13:33Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-1M-Combo-CZ-Email-Pass
    Screenshots:
    None
    Threat Actors: zubicks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  201. Combo list of 6,519 mail access credentials (EU/USA/UK)
    Category: Combo List
    Content: A threat actor has shared a combo list containing 6,519 email access credentials targeting users across the EU, USA, and UK. The content is gated behind registration or login on the forum.
    Date: 2026-05-16T16:13:24Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-6-519-good-combo-mail-access-eu-usa-uk
    Screenshots:
    None
    Threat Actors: cloudkaraoke
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Combo list of Hotmail credentials offered on forum
    Category: Combo List
    Content: A threat actor known as VerityVault is distributing a combo list containing 1,919 Hotmail credentials on a cybercrime forum. The content is gated behind registration or login. The named service is a credential-stuffing target, not the breach victim.
    Date: 2026-05-16T16:12:53Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1%EF%B8%8F-1919x-verity-vault-hotmail-drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: VerityVault
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Combo List of 759 HQ Hotmail credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 759 alleged high-quality Hotmail credentials on a cybercrime forum. The content is hidden behind a registration or login requirement. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-16T16:12:39Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9D%84%E2%9D%84-759x-hq-premium-hotmails-%E2%9D%84%E2%9D%84
    Screenshots:
    None
    Threat Actors: Lowza9
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  204. Mass Website Defacement of Indonesian Judicial Authority Site by Ushiromiya
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the handle Ushiromiya conducted a mass defacement campaign targeting the Indonesian Pengadilan Agama Padang (Padang Religious Court) web portal at panjar.pa-padang.go.id. The attacker successfully compromised the admin path of the Linux-hosted government subdomain. This incident was part of a broader mass defacement operation, with the defaced mirror archived on haxor.id.
    Date: 2026-05-16T16:09:59Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249311
    Screenshots:
    None
    Threat Actors: Ushiromiya, Ushiromiya
    Victim Country: Indonesia
    Victim Industry: Government – Judiciary
    Victim Organization: Pengadilan Agama Padang (Padang Religious Court)
    Victim Site: panjar.pa-padang.go.id
  205. Combo List: 2,329 Hotmail credential hits
    Category: Combo List
    Content: A threat actor is sharing a combo list of 2,329 claimed valid Hotmail credentials, described as premium hits. The content is gated behind forum registration or login and is associated with a Telegram contact for further distribution.
    Date: 2026-05-16T16:08:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-2329x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  206. Sale of alleged PII from moi.gov.eg (Egyptian Ministry of Interior – Tourism)
    Category: Data Breach
    Content: A threat actor on BreachForums is advertising the sale of personally identifiable information (PII) allegedly sourced from moi.gov.eg, the Egyptian Ministry of Interior, with data described as related to tourism. No further details regarding record count or data fields are available from the post.
    Date: 2026-05-16T15:54:20Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-moi-gov-eg-for-Tourism-PII
    Screenshots:
    None
    Threat Actors: Revesky
    Victim Country: Egypt
    Victim Industry: Government
    Victim Organization: Egyptian Ministry of Interior
    Victim Site: moi.gov.eg
  207. Sale of Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering a set of 666 Hotmail credentials marketed as private and fresh. The post directs interested parties to contact via Telegram. Content is gated behind registration or sign-in on the forum.
    Date: 2026-05-16T15:51:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75464/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Sale of verified credit cards, dumps with PIN, and fraudulent payment transfers
    Category: Carding
    Content: A threat actor is offering verified credit cards with online access and balances ranging from $2,000 to $6,000, as well as dumps with PIN (Track 1/2) for in-store and ATM cashout. The seller also advertises fraudulent payment transfers via PayPal, Cash App, Zelle, and other platforms, along with carding tutorials and contact via Telegram and WhatsApp.
    Date: 2026-05-16T15:48:28Z
    Network: openweb
    Published URL: https://altenens.is/threads/hello-everyone-am-honest-and-respectful-man-here-i-have-100-verified-cc-with-online-access-is-available-with-great-and-highly-balance-of-2000-to-600.2941426/unread
    Screenshots:
    None
    Threat Actors: Caato
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Sale of UHQ mixed credential combo list including Hotmail accounts
    Category: Combo List
    Content: A threat actor is offering a combo list of 4,188 claimed valid credentials described as a UHQ mixed combo including Hotmail accounts. The content is shared via a hidden forum link requiring registration or login, with contact directed to a Telegram handle.
    Date: 2026-05-16T15:46:26Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-X4188-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  210. Sale of 10 million URL:Log:Pass stealer log credentials
    Category: Logs
    Content: A threat actor is offering access to a private cloud containing approximately 10 million URL:LOG:PASS stealer log entries via a Telegram bot. The data is described as high quality and has been indexed in a ULP searcher database for rapid querying. Access to the full dataset is available for purchase through the actors Telegram service.
    Date: 2026-05-16T15:45:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-10M-URL-LOG-PASS-%E2%9C%85-PRIVATE-%E2%AD%90%EF%B8%8F-HQ
    Screenshots:
    None
    Threat Actors: LeakZero
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  211. Sale of 10 million URL:Log:Pass stealer log credentials
    Category: Logs
    Content: A threat actor is selling access to a private cloud containing approximately 10 million URL:log:pass credentials described as high quality. The dataset is available via a Telegram bot and has been indexed in a ULP searcher database for rapid querying. A sample is offered to forum members who reply to the thread.
    Date: 2026-05-16T15:45:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-10M-%F0%9F%94%A5-URL-LOG-PASS-%E2%9C%85-PRIVATE-%E2%AD%90%EF%B8%8F-HQ
    Screenshots:
    None
    Threat Actors: LeakZero
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  212. VPN service offering based on Xray/VLESS with Reality bypass
    Category: Services
    Content: A forum user is advertising a commercial VPN service called INFOCROSS, built on Xray/VLESS with Reality bypass technology. The service is offered with multiple subscription plans and a partner/referral program, with promotional discounts available.
    Date: 2026-05-16T15:44:24Z
    Network: openweb
    Published URL: https://breached.st/threads/vpn-on-xray-reality-that-actually-works-in-2026-infocross-deep-dive.87204/unread
    Screenshots:
    None
    Threat Actors: gosee
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  213. Sale of alleged US government classified documents including DOD, CIA, DHS, and intelligence agency reports
    Category: Data Breach
    Content: A threat actor is offering for sale alleged classified and sensitive US government documents, including military posture statements from AFRICOM and CENTCOM, Navy and Marine Corps budget documents, GAO reports, and Air Force testimony. The seller claims to have additional documents beyond the listed samples and is soliciting buyers via multiple messaging platforms. Escrow is accepted, and the actor claims access is not limited to US government data.
    Date: 2026-05-16T15:42:59Z
    Network: openweb
    Published URL: https://breached.st/threads/usa-top-secret-dod-cia-dhs-court-dia-reports.87205/unread
    Screenshots:
    None
    Threat Actors: mosad
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: US Department of Defense / CIA / DHS / DIA
    Victim Site: Unknown
  214. Combo List: Semi-Valid Email Access Credentials (8,712 Records)
    Category: Combo List
    Content: A threat actor shared a combo list containing 8,712 semi-validated email credentials, marketed as suitable for mail access. The list was distributed on a public forum at no specified cost.
    Date: 2026-05-16T15:28:07Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-8-712-Semi-Valide-FA-Mail-Access-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  215. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a combo list of approximately 956 Hotmail credentials, marketed as high-quality and fresh. The post advertises daily supply of 4,000–12,000 credentials through a private members-only network with encrypted access.
    Date: 2026-05-16T15:23:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75458/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  216. Combo List sample release targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a sample combo list of 1,425 Hotmail credentials on a cracking forum. The post provides a download link for the sample data, marketed for credential stuffing against Hotmail accounts.
    Date: 2026-05-16T15:22:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75459/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  217. Website Defacement of Jays Group of Companies by lxrdk1773n
    Category: Defacement
    Content: On May 16, 2026, the Australian business website of Jays Group of Companies was defaced by the threat actor lxrdk1773n. The attack targeted a Linux-based web server and resulted in unauthorized modification of the websites content. The incident was a standalone, non-mass defacement with no attributed team affiliation.
    Date: 2026-05-16T15:22:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249310
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Australia
    Victim Industry: Corporate / Business Services
    Victim Organization: Jays Group of Companies
    Victim Site: www.jaysgroupofcompanies.com.au
  218. Sale of Hotmail account combo list
    Category: Combo List
    Content: A forum post advertises 950 Hotmail accounts, likely credentials marketed for credential stuffing. The thread appears sponsored by a proxy and SMS verification service.
    Date: 2026-05-16T15:21:50Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X950-Hotmail-Accounts–2294941
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  219. Sale of mixed mail combo list
    Category: Combo List
    Content: A forum post in the cracking section advertises a mixed mail combo list of approximately 2,900 lines. The post appears to be sponsored by a proxy and SMS verification service. No further details about the source or content of the credentials are provided.
    Date: 2026-05-16T15:21:30Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X2900-Mixed-Mail-Lines–2294942
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  220. Mass Defacement of Indonesian Judicial Website by Ushiromiya
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Ushiromiya conducted a mass defacement campaign targeting the website of Pengadilan Agama Pemalang, an Indonesian religious court operating under the judiciary. The attack defaced a specific path on the site and was executed on a Linux-based server. This incident was part of a broader mass defacement operation attributed to the same actor.
    Date: 2026-05-16T15:15:50Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249309
    Screenshots:
    None
    Threat Actors: Ushiromiya, Ushiromiya
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Pengadilan Agama Pemalang (Pemalang Religious Court)
    Victim Site: www.pa-pemalang.go.id
  221. Website Defacement of Jays Group of Companies by lxrdk1773n
    Category: Defacement
    Content: On May 16, 2026, the homepage of Jays Group of Companies, an Australian business entity, was defaced by the threat actor lxrdk1773n. The attacker successfully compromised and altered the main page of the website in a targeted, non-mass defacement operation. No team affiliation, stated motive, or technical details regarding the server environment were disclosed.
    Date: 2026-05-16T15:08:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923467
    Screenshots:
    None
    Threat Actors: lxrdk1773n, No team
    Victim Country: Australia
    Victim Industry: Corporate/Business Services
    Victim Organization: Jays Group of Companies
    Victim Site: www.jaysgroupofcompanies.com.au
  222. Alleged data breach of Adecco affecting 4,284,538 accounts
    Category: Data Breach
    Content: In March 2021, Adecco suffered a massive data breach exposing over 4 million customer records from South America. The compromised data included email addresses, genders, dates of birth, marital statuses, phone numbers, and bcrypt-hashed passwords. The breach was subsequently sold on hacking forums.
    Date: 2026-05-16T15:06:04Z
    Network: telegram
    Published URL: https://t.me/c/1887244124/1640
    Screenshots:
    None
    Threat Actors: Jokers world of Database 😈
    Victim Country: Argentina
    Victim Industry: Human Resources / Staffing
    Victim Organization: Adecco
    Victim Site: adecco.com
  223. Sale of European mixed combo list with 10,833 credentials
    Category: Combo List
    Content: A European mixed combo list containing approximately 10,833 semi-validated email:password credential pairs was shared on a cracking forum. The list is described as partially validated and sourced from multiple European accounts. No specific breached organization is identified.
    Date: 2026-05-16T15:02:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-10-833-Semi-Valide-FA-Europa-Mixed-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  224. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 2,163 Hotmail email and password pairs on a cracking forum. The credentials are marketed as high quality (HQ). Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-16T15:02:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2163-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: steevee
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  225. Combo List: 70,000 German Email Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 70,000 German email credentials, marketed as mail access hits dated 16.05. The content is hidden behind a registration/login wall on the forum.
    Date: 2026-05-16T15:02:11Z
    Network: openweb
    Published URL: https://patched.to/Thread-70k-germany-just-mail-access-16-05
    Screenshots:
    None
    Threat Actors: CitronCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  226. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 2,163 Hotmail credentials on a cracking forum. The list is offered as a free download and is marketed as high quality.
    Date: 2026-05-16T15:01:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75456/
    Screenshots:
    None
    Threat Actors: stevee36
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  227. Alleged data breach of vigedo.de
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from vigedo.de, a German online retailer, containing approximately 110,000 records. The data is offered in CSV-SQL format and includes customer names, email addresses, birthdates, customer numbers, and MD5/bcrypt-hashed passwords. Sample records were provided as proof of validity.
    Date: 2026-05-16T15:00:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-vigedo-de-Database-Germany110K
    Screenshots:
    None
    Threat Actors: camillaDF
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Vigedo
    Victim Site: vigedo.de
  228. Alleged Salesforce data breach affecting 35+ organizations including Toyota, FedEx, Disney, UPS, Home Depot by ShinyHunters
    Category: Data Breach
    Content: ShinyHunters threat actor claims to have obtained approximately 989.45 million to 1 billion+ records from Salesforce and is offering stolen data from 35+ major organizations for sale. Victims span multiple industries including automotive (Toyota, Stellantis), logistics (FedEx, UPS), retail (Home Depot, Gap, Saks Fifth Avenue), hospitality (Marriott, Disney/Hulu), airlines (Vietnam Airlines, Qantas, Air France/KLM), technology (Google Adsense, Cisco), and others. Data volumes range from 1GB to 172.96GB per organization.
    Date: 2026-05-16T14:59:26Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7916
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Multiple (SaaS, automotive, logistics, retail, hospitality, airlines, technology)
    Victim Organization: Salesforce, Inc. and 35+ organizations
    Victim Site: salesforce.com
  229. Alleged data breach of Rocks & Gold jewelry store (Israel)
    Category: Data Breach
    Content: A threat actor is selling an alleged SQL database dump containing 3,500 customer records from Rocks & Gold, an Israeli boutique jewelry retailer. The dataset reportedly includes usernames, hashed passwords, full names, and email addresses. A proof screenshot was shared via an external file host.
    Date: 2026-05-16T14:59:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Israel-3-500X-Customer-Pii-from-rocksandgold-co-il
    Screenshots:
    None
    Threat Actors: BigBrother
    Victim Country: Israel
    Victim Industry: Retail
    Victim Organization: Rocks & Gold
    Victim Site: rocksandgold.co.il
  230. Sale of stealer logs including Yahoo, Outlook, and mixed domain credentials
    Category: Logs
    Content: A threat actor is advertising a private cloud service offering fresh stealer logs on a daily basis, including Yahoo, Outlook, and mixed domain accounts. Free samples are available via a Telegram channel. The logs are described as updated daily.
    Date: 2026-05-16T14:58:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%98%81%EF%B8%8FPrivate-Cloud-%E2%98%81%EF%B8%8F-Fresh-Logs-daily-yahoos-outlooks-and-mixed-domain
    Screenshots:
    None
    Threat Actors: Heimdaller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  231. Sale of Armenian residents database containing personal data
    Category: Data Breach
    Content: A threat actor is selling a database of Armenian residents containing phone numbers, first and last names, email addresses, and dates of birth for approximately 82,000 individuals. The data is claimed to be relevant as of May 15, 2026. The seller is asking $400 and can be contacted via Telegram.
    Date: 2026-05-16T14:58:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Armenian-Residents-Database
    Screenshots:
    None
    Threat Actors: c0mmandor
    Victim Country: Armenia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  232. Sale of alleged Western European healthcare sector PHI, PII, and source code
    Category: Data Breach
    Content: A threat actor is offering for sale over 500 GB of data allegedly sourced from the Western European healthcare sector, including professional, citizen, and clinical data, 200+ GB of source code, 1.5 million PHI documents, and private keys claimed to enable direct API queries to European Vaccination Card infrastructure. The seller states the data spans multiple countries and is seeking verified buyers via private message.
    Date: 2026-05-16T14:57:35Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-PHI-Medical-Health-Buyer
    Screenshots:
    None
    Threat Actors: cutecar
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: Unknown
  233. Sale of 83K mixed fresh combo list
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 83,000 mixed credentials via Pasteview, marketed as valid and fresh. The list appears to contain credentials from multiple sources and is being distributed freely on the forum.
    Date: 2026-05-16T14:57:08Z
    Network: openweb
    Published URL: https://altenens.is/threads/83k-mixed-valid-fresh-combolist.2941380/unread
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  234. Alleged data breach of Serbian Ministry of Interior (MUP) — Foreigners Office database
    Category: Data Breach
    Content: A threat actor claims to have breached the Serbian Ministry of Interior (MUP) Foreigners Office database, extracting approximately 180,000 records covering 150,000 foreign nationals and 30,000 Serbian citizens with data dated 2024–2026. Exposed fields reportedly include full names, JMBG (national ID numbers), passport numbers, visa IDs, application status, reason of stay, and additional personal details. The actor is offering the database for sale and has issued a ransom-style notice to Serbian
    Date: 2026-05-16T14:56:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-RS-Foreigners-Citizen-Sector-180k-Police
    Screenshots:
    None
    Threat Actors: vvvv
    Victim Country: Serbia
    Victim Industry: Government
    Victim Organization: Serbian Ministry of Interior (MUP)
    Victim Site: mup.gov.rs
  235. Alleged data leak of Sirun (斯润) Technology companies following ransom refusal
    Category: Data Leak
    Content: A threat actor operating as SnowSoul has publicly leaked data allegedly belonging to two related Chinese technology companies — Sirun Hefei Technology and Sirun Tianlang (Beijing) Technology — after the victims purportedly refused to pay a $2,000 USD ransom. The leaked files reportedly include database files (MDF/LDF, approximately 500M records), spreadsheets containing bills of materials, personnel lists, production orders, procurement data, and financial records. Download links to the data h
    Date: 2026-05-16T14:55:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1314
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Technology
    Victim Organization: Sirun Hefei Technology Co., Ltd. / Sirun Tianlang (Beijing) Technology Co., Ltd.
    Victim Site: Unknown
  236. Sale of webshell access
    Category: Initial Access
    Content: A threat actor is offering a webshell for sale at a price of 400K (likely Indonesian Rupiah) via Telegram. No specific victim organization or domain is disclosed in the post.
    Date: 2026-05-16T14:53:54Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-WEBSHELL–76665
    Screenshots:
    None
    Threat Actors: Y4nz404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  237. Alleged data leak of Adobe Business platform and associated marketing services
    Category: Data Leak
    Content: A threat actor operating under the alias MDGhost666 claims to have leaked 832.87GB of data associated with business.adobe.com, purportedly covering 2025-2026. The post also references databases from associated marketing and email services including Sendgrid, HubSpot, MailGun, and MailJet, totaling millions of unique lines. The data appears to be made available for free distribution on a darknet forum.
    Date: 2026-05-16T14:53:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-832-87GB-Business-adobe-com-leaked-2025-2026
    Screenshots:
    None
    Threat Actors: MDGhost666
    Victim Country: United States
    Victim Industry: Enterprise Software
    Victim Organization: Adobe
    Victim Site: business.adobe.com
  238. Request for B2B email database in large quantity
    Category: Alert
    Content: A forum user is requesting a large quantity of fresh B2B email databases. No specific target organization, country, or data volume is mentioned. This appears to be a procurement request rather than an active threat or sale.
    Date: 2026-05-16T14:52:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-I-need-Fresh-B2B-Email-database-in-Large-quantity
    Screenshots:
    None
    Threat Actors: greena001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  239. Alleged data breach of Live Nation/Ticketmaster – 560 million customer records
    Category: Data Breach
    Content: Threat actor claiming to possess comprehensive database breach of Live Nation/Ticketmaster containing 560 million customer records with full personal details (name, address, email, phone), ticket sales history, event information, order details, credit card information (customer name, last 4 digits, expiration date), and fraud details. Total data volume approximately 1.3TB across multiple CSV and sales order files. Seller requesting $10,000 USD and providing contact methods via XMPP, Telegram, and email.
    Date: 2026-05-16T14:49:36Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7912
    Screenshots:
    None
    Threat Actors: shinycorpsh
    Victim Country: United States
    Victim Industry: Entertainment/Ticketing
    Victim Organization: Live Nation Entertainment / Ticketmaster
    Victim Site: ticketmaster.com
  240. Alleged defacement of Thai government website (nongpo.go.th) by Lei$
    Category: Defacement
    Content: Thai government website nongpo.go.th reportedly defaced by threat actor Lei$. Defacement evidence provided via original URL and mirror link (zone-xsec.com). Post includes hashtags #FuckThai and #Defacement indicating malicious intent.
    Date: 2026-05-16T14:45:39Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/1065
    Screenshots:
    None
    Threat Actors: Lei$
    Victim Country: Thailand
    Victim Industry: Government
    Victim Organization: Nongpo (Thai Government)
    Victim Site: nongpo.go.th
  241. Alleged leak of Claude API tokens
    Category: Data Leak
    Content: A threat actor on a cracking forum is freely distributing what they claim to be 2 million Claude API tokens. The post offers a free sample and solicits community engagement in exchange for the data.
    Date: 2026-05-16T14:44:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9D%A4%EF%B8%8F-CLAUDE-API-TOKENS-2-MILLION-AI-TOKIES-%E2%9D%A4%EF%B8%8F
    Screenshots:
    None
    Threat Actors: JVZU
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Anthropic
    Victim Site: anthropic.com
  242. Combo List targeting AOL users
    Category: Combo List
    Content: A user on a cracking forum shared an AOL email and password combo list. The post contains minimal detail regarding record count or data origin. Users were cautioned not to leech the content without contributing.
    Date: 2026-05-16T14:44:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-AOL–2094713
    Screenshots:
    None
    Threat Actors: FlightUSA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  243. Sale of email checker and IMAP viewer tool supporting Yahoo and Gmail
    Category: Services
    Content: A forum user is advertising Heimdallr, an email checker and IMAP viewer tool supporting Yahoo and Gmail with inboxing capabilities. The tool is offered for sale on a cracking forum, with exclusive discounts mentioned for a separate channel. No specific victim organization or breach is referenced.
    Date: 2026-05-16T14:43:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8FHeimdallar-Email-checker-and-Imap-Viewer-Yahoo-Gmail-supported-Inboxing-supported
    Screenshots:
    None
    Threat Actors: Heimdaller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  244. Alleged sale of 200 million AT&T customer records including PII, financial data, and health information
    Category: Data Breach
    Content: Threat actor claiming to possess 200 million AT&T customer records allegedly breached on 6 May 2026. Data includes full PII (names, addresses, SSNs, DOBs), financial information (credit/debit cards, bank accounts, transaction history), credentials (usernames, password hashes, PINs), communication metadata, health/medical records, biometric data, and internal AT&T documents including business strategy, API keys, and system configurations. Seller requesting $10,000 USD and providing contact methods via XMPP, Telegram, and email.
    Date: 2026-05-16T14:42:52Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/7909
    Screenshots:
    None
    Threat Actors: shinycorpsh
    Victim Country: United States
    Victim Industry: Telecommunications
    Victim Organization: AT&T Corporation
    Victim Site: att.com
  245. Alleged sale of stolen payment cards, RDP access, and compromised accounts
    Category: Initial Access
    Content: Multiple threat actors operating in Squad Chat Marketplace advertising: (1) stolen credit card data with 100K+ daily updates at $0.01-$0.10 per card via Boss Shop; (2) RDP access to cloud infrastructure (Azure, AWS, DigitalOcean) for $200 daily/monthly rental; (3) compromised domain email accounts, Gmail, Yahoo accounts; (4) stolen GitHub Student accounts and subscription services (ChatGPT Plus, Claude, ElevenLabs Creator Plan). Boss Shop claims daily free card giveaways and operates on clearnet and Tor. Escrow services offered.
    Date: 2026-05-16T14:41:16Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82923
    Screenshots:
    None
    Threat Actors: Boss Shop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  246. Alleged data leak of Israeli personally identifiable information
    Category: Data Leak
    Content: A threat actor has freely shared a sample dataset purportedly containing Israeli personally identifiable information, including names, national ID numbers, email addresses, physical addresses, and phone numbers. The post is politically motivated, referencing the Palestinian cause. The source organization of the data is not identified.
    Date: 2026-05-16T14:35:38Z
    Network: openweb
    Published URL: https://breached.st/threads/israel-pii-mosad.87203/unread
    Screenshots:
    None
    Threat Actors: 053o
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  247. Combo List of 1.7 million URL:Login:Password credentials shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 1.7 million URL:login:password credential pairs on a cracking forum. The post references cloud and link services as targets, marketed as high-quality credentials. No specific organization is identified as the breach source.
    Date: 2026-05-16T14:27:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-GETCLOUD-GETLINKS-HQ-URL-LOGIN-PASSWORD-1-7kk
    Screenshots:
    None
    Threat Actors: Getpaid777
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  248. Sale of email access combo list with 9,948 credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 9,948 semi-validated email and password credentials on a public forum. The post is categorized as a mail access combo list, suggesting the credentials are intended for use in credential stuffing or account takeover attempts against email services.
    Date: 2026-05-16T14:27:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-9-948-Semi-Valide-FA-Mail-Access-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  249. Free release of mixed email:password combo list
    Category: Combo List
    Content: A threat actor shared a mixed email:password combo list containing approximately 2,850 credentials, marketed as fresh. No specific target organization or breach source was identified.
    Date: 2026-05-16T14:26:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-2850x-FRESH-MIX-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Nulled07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  250. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor has shared a combo list advertised as 384 Hotmail premium hits on a cybercrime forum. The content is hidden behind a registration or login requirement. These credentials are likely intended for credential stuffing or account takeover activity targeting Hotmail accounts.
    Date: 2026-05-16T14:23:46Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85%E2%AD%90384x-hotmail-premium-hits%E2%9C%85%E2%AD%90
    Screenshots:
    None
    Threat Actors: Psyho70244
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Sale of Hotmail combo list with 4,891 credentials
    Category: Combo List
    Content: A forum user is sharing a combo list of 4,891 Hotmail credentials marketed as fresh UHQ (ultra-high quality). The content is gated behind registration or login on the forum.
    Date: 2026-05-16T14:23:29Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-4-891x-fresh-hotmail-uhq-veen0m
    Screenshots:
    None
    Threat Actors: ELJOKER1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  252. Website Defacement of ali-altheeb.com by Threat Actor Zod
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Zod defaced the website ali-altheeb.com, targeting a specific page (zod.html) on a Linux-hosted server. The attack was a targeted single-page defacement rather than a mass or home page compromise. The incident was archived and mirrored via haxor.id.
    Date: 2026-05-16T14:21:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249308
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ali Al-Theeb
    Victim Site: ali-altheeb.com
  253. Alleged data leak of Belambra.fr
    Category: Data Leak
    Content: A threat actor has freely distributed an alleged database dump from Belambra.fr, a French holiday villages and leisure clubs operator. The leaked data, shared in JSON format across multiple file-hosting platforms, includes reservation records, user credentials (hashed passwords), names, email addresses, and childrens personal details. The dataset reportedly comprises approximately 402,000 records across three JSON files totaling 77 MB.
    Date: 2026-05-16T14:17:28Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-FR-402K-Belambra-fr
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Hospitality
    Victim Organization: Belambra
    Victim Site: belambra.fr
  254. Combo List of 65,205 corporate email credentials for leads targeting
    Category: Combo List
    Content: A threat actor shared a combo list containing 65,205 email:password lines described as corporate mail credentials marketed as suitable for leads targeting. No specific victim organization or country is identified.
    Date: 2026-05-16T14:06:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-65-205-Lines-%E2%9C%85-Corp-Mail-Good-For-leads-target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  255. Sale of email:password combo list (mixed USA and Worldwide)
    Category: Combo List
    Content: A threat actor is selling a combo list of 550,000 email:password pairs described as mixed USA and worldwide. The listing is offered at a cheap price with no refund or replacement policy, but a test option is available.
    Date: 2026-05-16T14:06:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-WTS-GOOD-COMBOS-EMAIL-PASS–2094697
    Screenshots:
    None
    Threat Actors: Reoza
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  256. Sale of PSN-targeted combo list (4 million records)
    Category: Combo List
    Content: A threat actor is offering a combo list of 4 million credentials marketed as targeted for PlayStation Network (PSN) account credential stuffing. The list is advertised via Telegram channels where free combos and tools are also distributed.
    Date: 2026-05-16T14:03:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75454/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  257. Sale of Hotmail combo list with 0.5K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 500 Hotmail email account credentials on a combolist forum. The content is hidden behind a registration/login wall and requires user engagement to access. No further details about the data source or quality are available.
    Date: 2026-05-16T14:02:37Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-0-5k-hotmail-mail-access-%E2%9C%85-303000
    Screenshots:
    None
    Threat Actors: D47
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  258. Mix email combo list with 6,510 entries
    Category: Combo List
    Content: A threat actor shared a mixed email combo list containing 6,510 entries on a cybercrime forum. The content is hidden behind a login/registration wall. No specific victim organization or targeted service is identified.
    Date: 2026-05-16T14:02:06Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5%F0%9F%94%A5-6510x-mix-mail-%F0%9F%94%A5%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  259. Website Defacement of Nikkou-Exp by Ng1ndex (Team D704T)
    Category: Defacement
    Content: On May 16, 2026, threat actor Ng1ndex operating under team D704T defaced the website nikkou-exp.com, uploading a defacement file at the path /pwn.txt. The incident was a targeted single-site defacement with no indication of mass or repeated compromise. The attackers motivation and server details remain unknown.
    Date: 2026-05-16T14:01:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923445
    Screenshots:
    None
    Threat Actors: Ng1ndex, D704T
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Nikkou Express
    Victim Site: nikkou-exp.com
  260. Combo List targeting Hotmail accounts with claimed 100% hit rate
    Category: Combo List
    Content: A threat actor is sharing a combo list claimed to have a 100% hit rate against Hotmail accounts, marketed as UHQ (ultra-high quality). The actual content is hidden behind a registration or login wall. No record count or additional details are available from the post.
    Date: 2026-05-16T14:01:35Z
    Network: openweb
    Published URL: https://patched.to/Thread-%F0%9F%94%A5-fresh-hotmail-combo-100-hit-rate-uhq-%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: VenerableDarl
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Website Defacement of tipi0905.jp by Ng1ndex (Team D704T)
    Category: Defacement
    Content: On May 16, 2026, the Japanese website tipi0905.jp was defaced by threat actor Ng1ndex, operating under the team D704T. The attacker uploaded a defacement file (pwn.txt) to the target server. The incident was a targeted single-site defacement with no further technical details such as vulnerability or server information disclosed.
    Date: 2026-05-16T13:59:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923444
    Screenshots:
    None
    Threat Actors: Ng1ndex, D704T
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Tipi0905
    Victim Site: tipi0905.jp
  262. Sale of Hotmail combo list marketed as high-quality credentials
    Category: Combo List
    Content: A threat actor is offering 380 high-quality Hotmail credentials, marketed as fresh and untouched, through a private members-only network. The post claims daily supply of 4,000–12,000 credentials optimized for credential stuffing or account takeover activity.
    Date: 2026-05-16T13:46:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75452/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  263. Sale of mixed domain combo list targeting shopping platforms
    Category: Combo List
    Content: A combo list containing approximately 1.65 million email and password pairs is being distributed, marketed as targeting shopping platforms across mixed domains.
    Date: 2026-05-16T13:46:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-650-715-Mixed-Domain-Shopping-target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  264. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum user is sharing a combo list of 403 Hotmail credentials. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-16T13:44:33Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-403x%E2%9A%A1HOTMAIL%E2%9A%A1ACCESS%E2%9A%A1
    Screenshots:
    None
    Threat Actors: RedHat29x
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Alleged data leak of Brazilian individuals personal records
    Category: Data Leak
    Content: A forum post on a combolist forum shares detailed personal information of a Brazilian individual, including full name, national ID (RG), tax ID (CPF), date of birth, address, phone numbers, email addresses, old passwords, and business registration (CNPJ). The data was posted publicly with no price indicated. The origin or source of the breach is not specified.
    Date: 2026-05-16T13:41:45Z
    Network: openweb
    Published URL: https://breached.st/threads/leak-data-from-brazil.87202/unread
    Screenshots:
    None
    Threat Actors: Deuteronomy3235
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  266. Sale of 11 million combo list targeting Alibaba, Temu, AliExpress, and streaming services
    Category: Combo List
    Content: A threat actor is offering a combo list of 11 million credentials allegedly targeting Alibaba, Temu, AliExpress, and unspecified streaming services. The actor directs interested parties to a Telegram channel for access to the combo list and related tools. The post implies both free and paid distribution via Telegram groups.
    Date: 2026-05-16T13:35:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75445/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  267. Sale of Hotmail combo list with 8,000 alleged valid credentials
    Category: Combo List
    Content: A forum user posted a combo list of 8,000 alleged valid Hotmail credentials on a cracking forum. The content is gated behind registration. The credentials are marketed as fresh and valid.
    Date: 2026-05-16T13:34:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75450/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Sale of HQ combo list targeting Germany
    Category: Combo List
    Content: A threat actor is offering a high-quality (HQ) mixed combo list of approximately 8,563 credentials purportedly associated with German users. The post advertises daily supply of 4,000–12,000 fresh credentials through a private members-only network.
    Date: 2026-05-16T13:32:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-7563x-hq-mix-germany-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Sale of HQ mix combo list with 15,129 credentials
    Category: Combo List
    Content: A threat actor is offering a high-quality mixed combo list containing 15,129 credential pairs via a private members-only network. The post advertises daily supply of 4,000–12,000 fresh credentials optimized for credential stuffing. The content is hidden behind forum registration or login.
    Date: 2026-05-16T13:31:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-15129x-hq-mix-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: A threat actor operating as s2lender is offering a combo list of 125 Hotmail credentials marketed as high quality and fresh. The seller advertises daily supply of 4,000–12,000 credentials described as untouched, with claims of private and encrypted access to their network.
    Date: 2026-05-16T13:31:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-125x-hq-hotmail-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Alleged data breach of Federal Polytechnic Ede
    Category: Data Breach
    Content: A message forwarded from Pharaohs_Team channel references federalpolyede.edu.ng (Federal Polytechnic Ede, Nigeria) with a direct message request to the threat actor. This suggests a potential breach claim or data exfiltration by the Pharaohs_Team threat group targeting this Nigerian educational institution.
    Date: 2026-05-16T13:30:57Z
    Network: telegram
    Published URL: https://t.me/Pharaoh_e/31
    Screenshots:
    None
    Threat Actors: Pharaohs_Team
    Victim Country: Nigeria
    Victim Industry: Education
    Victim Organization: Federal Polytechnic Ede
    Victim Site: federalpolyede.edu.ng
  272. Free distribution of URL:Log:Pass combo list with 8+ million lines
    Category: Combo List
    Content: A threat actor on a cybercrime forum is distributing a URL:Log:Pass combo list containing over 8 million lines as part of an ongoing free release series (part 346). The content is hidden behind a registration/login wall on the forum.
    Date: 2026-05-16T13:30:44Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-346
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  273. Sale of Hotmail combo list sample
    Category: Combo List
    Content: A threat actor is distributing a sample combo list of 1,075 Hotmail credentials on a forum. The content is gated behind registration or login. No further details about the datas origin are available.
    Date: 2026-05-16T13:30:26Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1%E2%9A%A1-1075x-sample-hotmail-%E2%9A%A1%E2%9A%A1-302991
    Screenshots:
    None
    Threat Actors: Stevejobsxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  274. Sale of Hotmail credential hits sorted by country
    Category: Combo List
    Content: A threat actor is sharing 137 alleged high-quality Hotmail credential hits, marketed as sorted by country and targeting inboxes. The content is gated behind registration or login on the forum. These credentials are intended for credential stuffing or inbox access, not indicative of a breach of Hotmail itself.
    Date: 2026-05-16T13:30:09Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9D%84-137x-hq-hotmail-hits-%E2%9D%84-%F0%9F%94%8E-inboxes-targets-%F0%9F%94%8E-%F0%9F%8C%8Esorted-countries-%F0%9F%8C%8E
    Screenshots:
    None
    Threat Actors: Lowza9
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  275. Free combo list of 8.2 million URL:login:password credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 8.2 million URL:login:password credential pairs, marketed as high quality. The data was distributed freely and attributed to MetaCloud.
    Date: 2026-05-16T13:29:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-8-2M-%E2%9A%A1-URL-LOGIN-PASS-HQ-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Free distribution of URL:Log:Pass combo list with 10 million records
    Category: Combo List
    Content: A threat actor operating under the alias MetaCloud3 has freely distributed a URL:log:pass combo list containing approximately 10 million credential pairs. The list is marketed as targeting any service and is dated May 16, 2026. No specific victim organization or sector is identified.
    Date: 2026-05-16T13:28:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90-10-MILLION-URL-LOG-PASS%E2%AD%90-16-05-2026-%E2%AD%90-NEW-ANY-TARGET
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  277. Alleged sale of access to Federal Polytechnic Ede subdomains
    Category: Initial Access
    Content: Pharaohs_Team is offering access to 11 subdomains belonging to Federal Polytechnic Ede (federalpolyede.edu.ng), a Nigerian educational institution. The subdomains include critical systems such as student accounts, LMS, medical portal, and administrative systems. Each access is being sold individually at a price determined by @phteam_1. Domain authority (DA) and page authority (PA) metrics are provided for each subdomain.
    Date: 2026-05-16T13:28:10Z
    Network: telegram
    Published URL: https://t.me/Pharaoh_e/30
    Screenshots:
    None
    Threat Actors: Pharaohs_Team
    Victim Country: Nigeria
    Victim Industry: Education
    Victim Organization: Federal Polytechnic Ede
    Victim Site: federalpolyede.edu.ng
  278. Alleged combo list of 14,788 semi-valid email credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 14,788 email address and password pairs described as semi-valid. The list was posted on a public cracking forum and appears intended for credential stuffing or account access attempts.
    Date: 2026-05-16T13:28:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-14-788-Semi-Valide-FA-Mail-Access-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  279. Sale of combo list with NFA and mail access
    Category: Combo List
    Content: A threat actor is offering a combo list advertised as UHQ quality with NFA (No Further Action) credentials and mail access for various sites. The seller requests buyers test before purchasing and directs interested parties to a Telegram contact.
    Date: 2026-05-16T13:27:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-COMBO-NFA-AND-MAIL-ACCESS-ANY-SITE
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  280. Sale of Hotmail credential combo list with 364 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as 364 premium Hotmail credential hits. The post includes a download link for the credentials. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-16T13:26:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-364x-PREMIUM-HOTMAIL-HITS-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  281. Alleged data breach of Community Choice Credit Union
    Category: Data Breach
    Content: A threat actor is offering a database allegedly sourced from communitychoicecu.com containing over 1 million records of premium credit card members. The dataset purportedly includes card numbers, full names, issuing bank, card type, addresses, email addresses, and mobile numbers. The data is offered in CSV format and is focused on US-based clients in California.
    Date: 2026-05-16T13:25:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-1M-communitychoicecu-com-Top-Credit-Card-Members
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Community Choice Credit Union
    Victim Site: communitychoicecu.com
  282. Alleged data breach of Shanghai National Police (SHGA.gov.cn)
    Category: Data Breach
    Content: A threat actor is selling data allegedly obtained from the Shanghai National Police, associated with the Chinese government domain shga.gov.cn. The seller claims the data is 100% real and provides a sample via an external paste link. Contact is facilitated through a Telegram channel.
    Date: 2026-05-16T13:25:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Shanghai-National-Police
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: China
    Victim Industry: Government
    Victim Organization: Shanghai National Police
    Victim Site: shga.gov.cn
  283. Alleged data breach of Bank Saderat Iran
    Category: Data Breach
    Content: A threat actor is offering a database purportedly belonging to Bank Saderat Iran, containing over 63 million data rows. A sample has been shared via an external paste site, with contact directed through a Telegram channel.
    Date: 2026-05-16T13:24:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Bank-Saderat-Iran-63-000-000
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Iran
    Victim Industry: Finance
    Victim Organization: Bank Saderat Iran
    Victim Site: banksaderat.ir
  284. Alleged data leak of UAE investor database (30GB)
    Category: Data Leak
    Content: A threat actor is distributing a purported 30GB database containing UAE investor data. A sample has been made available via an external paste site. The post directs interested parties to a Telegram channel for further information.
    Date: 2026-05-16T13:24:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-UAE-Investors-30GB
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: United Arab Emirates
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  285. Alleged data leak of US Chamber of Commerce members
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database of 34 million US Chamber of Commerce members via Telegram. The dataset purportedly includes full names, addresses, phone numbers, email addresses, dates of birth, gender, IP addresses, and asset class information in XLSX format. The actor claims the data was updated as of 2026.
    Date: 2026-05-16T13:23:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Leak-of-34-million-US-Chamber-of-Commerce-Members-data–76719
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: US Chamber of Commerce
    Victim Site: uschamber.com
  286. Alleged data breach of Coinbase
    Category: Data Breach
    Content: A threat actor claims to be selling a database of approximately 1 million Coinbase user records. The alleged dataset includes personally identifiable information such as name, address, phone number, IP address, and gender, as well as financial data including deposit and withdrawal totals, transaction counts, and annual income. A sample has been posted to Pastebin.
    Date: 2026-05-16T13:23:13Z
    Network: openweb
    Published URL: https://breached.st/threads/1m-coinbase-data.87199/unread
    Screenshots:
    None
    Threat Actors: Meowl
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  287. Alleged data breach of Vandenborre (vandenborre.be)
    Category: Data Breach
    Content: A threat actor is selling an alleged dataset originating from vandenborre.be, a Belgian electronics retailer, comprising approximately 264,000 records. The dataset is structured across three sections — Contacts, Order History, and Support Tickets — containing personally identifiable information including names, email addresses, birthdates, job titles, phone numbers, billing/shipping addresses, payment methods, and customer support case details. The seller is offering the data for purchase via Te
    Date: 2026-05-16T13:22:41Z
    Network: openweb
    Published URL: https://breached.st/threads/264k-belgium-https-www-vandenborre-be-customer-contacts-with-emails-job-titles-and-birthdates-dataset.87201/unread
    Screenshots:
    None
    Threat Actors: Moelester
    Victim Country: Belgium
    Victim Industry: Retail
    Victim Organization: Vandenborre
    Victim Site: vandenborre.be
  288. Alleged website defacement of manc.top by C10F./X404
    Category: Defacement
    Content: Threat actor C10F./X404, claiming affiliation with Defacer Indonesian Team, claims to have defaced manc.top. Defacement pages allegedly accessible at multiple URLs including the root domain and subdirectories.
    Date: 2026-05-16T13:20:56Z
    Network: telegram
    Published URL: https://t.me/c/3755871403/496
    Screenshots:
    None
    Threat Actors: C10F./X404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: manc.top
    Victim Site: manc.top
  289. Alleged data shared for doxing purposes
    Category: Combo List
    Content: A thread titled Data for doxing was posted on a combolist forum section, but no content is available for analysis. No further details can be determined from the post.
    Date: 2026-05-16T13:14:02Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Data-for-doxing
    Screenshots:
    None
    Threat Actors: Deuteronomy3235
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  290. Mass Website Defacement of Indonesian Judicial Authority Site by Ushiromiya
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the handle Ushiromiya conducted a mass defacement campaign targeting the Indonesian Mempawah Religious Courts permit/licensing web portal (izin.pa-mempawah.go.id). The attack affected a Linux-based server and was part of a broader mass defacement operation. The defacement was archived and mirrored via haxor.id, a known defacement tracking platform.
    Date: 2026-05-16T13:12:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249307
    Screenshots:
    None
    Threat Actors: Ushiromiya, Ushiromiya
    Victim Country: Indonesia
    Victim Industry: Government – Judiciary
    Victim Organization: Pengadilan Agama Mempawah (Mempawah Religious Court)
    Victim Site: izin.pa-mempawah.go.id
  291. Sale of HQ mix combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a high-quality mixed combo list containing approximately 140,240 credential pairs. The post advertises daily fresh supplies of 4,000–12,000 credentials through a private members-only network. The credentials are marketed as untouched and optimized for credential stuffing.
    Date: 2026-05-16T13:09:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75444/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  292. Free combo list distribution with over 7 million URL:login:password credentials
    Category: Combo List
    Content: A threat actor shared a free combo list containing over 7.1 million URL:login:password credential pairs, marketed as fresh. The list is formatted as ULP (URL:Login:Password) and distributed via a download link protected with a passphrase.
    Date: 2026-05-16T13:07:49Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-URL-LOGIN-PASS-16-05-26-Daily-Free-Lines-7-104-826-Fresh-Cloudberry-ULP
    Screenshots:
    None
    Threat Actors: idsfgofdu213
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  293. Combo List of 1 million ULP credentials
    Category: Combo List
    Content: A combo list of approximately 1 million username:login:password (ULP) credentials marketed as ultra-high quality (UHQ) and fresh was shared on the forum. No additional details about the targeted service or origin of the credentials were provided.
    Date: 2026-05-16T13:07:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-1M-ULP-UHQ-FRESH
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  294. Combo List: 970K UHQ Email:Password Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 970,000 unique email and password pairs, marketed as high quality and fresh. The post was shared on a public cracking forum. No specific victim organization or target service was identified.
    Date: 2026-05-16T13:06:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-970k-UHQ-ULP-FRESH
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  295. Mix Mail Combo List Including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live
    Category: Combo List
    Content: A threat actor shared a mixed mail combo list targeting multiple email providers including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live. The content is hidden behind a registration or login requirement. No additional details regarding record count or data format are available.
    Date: 2026-05-16T13:05:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-mix-mail-combo-hotmail-outlook-aol-gmx-inbox-icloud-live-2026-5-13
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  296. Sale of Hotmail combo list with 17,000 entries across multiple regions
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 17,000 Hotmail credentials sourced from users across the USA, Europe, Asia, and Russia. The content is hidden behind a registration or login wall on the forum. No breach of a specific organization is claimed; the list appears intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-16T13:04:44Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-17-000x-hotmail-access-combo-usa-europe-asia-russian
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  297. Alleged data leak of NASA
    Category: Data Leak
    Content: A forum post on Breached claims a database leak of nasa.gov. No further details or content are available in the post to verify the claim or assess the scope of the alleged leak.
    Date: 2026-05-16T13:02:45Z
    Network: openweb
    Published URL: https://breached.st/threads/nasa-gov-database-leak.87196/unread
    Screenshots:
    None
    Threat Actors: MrLucxy
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: NASA
    Victim Site: nasa.gov
  298. Alleged website defacement of manc.top by Indonesian defacer group
    Category: Defacement
    Content: Indonesian defacer group C10F/X404 (Defacer Indonesian Team) claims responsibility for defacing manc.top and related pages. Defacement proof/shell allegedly hosted at wendao-ai.com. Multiple hashtags reference Brotherhood Capung Indonesia (BCI) and related defacer teams.
    Date: 2026-05-16T13:00:53Z
    Network: telegram
    Published URL: https://t.me/brotheroodbci/139
    Screenshots:
    None
    Threat Actors: C10F
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: manc.top
    Victim Site: manc.top
  299. Alleged free release of mixed combo list by FATETRAFFIC
    Category: Combo List
    Content: A forum user shared what appears to be a mixed combo list of 5,957 credentials, distributed as a bonus release attributed to FATETRAFFIC. The content is hidden behind a login/registration wall, limiting further verification of its contents or origin.
    Date: 2026-05-16T12:49:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-bonus-fatetraffic-5957-mix-15-05-2026
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  300. Distribution of URL:Log:Pass combo list with 13.8 million records
    Category: Combo List
    Content: A threat actor operating as MetaCloud3 is distributing a combo list of 13.8 million URL:log:pass credentials, marketed as new and targeting any service. The post offers no additional details beyond a reference to the authors signature for further information.
    Date: 2026-05-16T12:48:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90-13-8-MILLION-URL-LOG-PASS%E2%AD%90-16-05-2026-%E2%AD%90-NEW-ANY-TARGET
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  301. Combo List targeting Germany mail accounts
    Category: Combo List
    Content: A combo list purportedly containing 15,000 German email account credentials was shared on a cracking forum. No additional details are available from the post content.
    Date: 2026-05-16T12:48:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%9015K-GERMANY-MAIL-ACCESS-%E2%AD%90–2094668
    Screenshots:
    None
    Threat Actors: Posts
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  302. Sale of 12K Mixed Mail Access Combo List
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 12,000 mixed mail access credentials on a cybercrime forum. The content is hidden behind a registration or login requirement. No additional details about the source or composition of the credentials are available.
    Date: 2026-05-16T12:47:53Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%9012k-mixed-mail-access-%E2%AD%90-302973
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  303. Sale of 15K Germany mail access combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 15,000 German email account credentials on a cybercrime forum. The content is hidden behind a registration or login wall, limiting further details. The dataset is marketed as mail access credentials targeting Germany-based accounts.
    Date: 2026-05-16T12:47:37Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%9015k-germany-mail-access-%E2%AD%90-302974
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  304. Sale of 26.2 million URL:Log:Pass combo list
    Category: Logs
    Content: A threat actor is distributing a collection of 26.2 million URL:log:pass entries, described as fresh and high-quality stealer log output. The post advertises the content as free with additional unwrapped bases available via Telegram or forum contact.
    Date: 2026-05-16T12:32:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-26-2-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  305. Free distribution of 36.1 million URL:log:pass credential logs
    Category: Logs
    Content: A threat actor on Cracked.st has made available a collection of 36.1 million URL:log:pass entries, described as fresh UHQ stealer log output. The post markets the credentials as valid hits and directs interested parties to contact the author via Telegram or the forum for higher-quality unwrapped databases.
    Date: 2026-05-16T12:31:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-36-1-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  306. Sale of 32.4 million URL:login:password log credentials
    Category: Logs
    Content: A threat actor is distributing a dataset of 32.4 million URL:login:password entries described as fresh UHQ stealer log output. The post markets the credentials as valid hits suitable for a variety of uses. The actor also advertises private, unwrapped bases available via Telegram or the forum.
    Date: 2026-05-16T12:31:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-32-4-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  307. Free release of 10.6 million URL:Log:Pass combo list
    Category: Combo List
    Content: A threat actor on Cracked.st has shared a combo list containing approximately 10.6 million URL:log:pass credential pairs, marketed as fresh and high-quality. The post describes the content as stealer log output suitable for credential stuffing across various services.
    Date: 2026-05-16T12:30:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-10-6-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  308. Free distribution of 21.6 million URL:login:password stealer log credentials
    Category: Logs
    Content: A threat actor is freely distributing a collection of 21.6 million URL:login:password entries described as fresh UHQ stealer log output. The post markets the credentials as high quality and working, with additional unwrapped bases available via Telegram or forum contact.
    Date: 2026-05-16T12:30:23Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-21-6-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  309. Distribution of 9.6 million URL:log:pass credentials
    Category: Combo List
    Content: A threat actor operating under the alias MetaCloud3 is distributing a list of 9.6 million URL:log:pass credential pairs, marketed as new and targeting any service. The post references additional details available via the authors signature.
    Date: 2026-05-16T12:30:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90-9-6-MILLION-URL-LOG-PASS%E2%AD%90-16-05-2026-%E2%AD%90-NEW-ANY-TARGET
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  310. Free distribution of 34.7 million URL:login:password stealer log credentials
    Category: Logs
    Content: A threat actor on a cracking forum is freely distributing a collection of 34.7 million URL:login:password entries described as UHQ (ultra-high quality) stealer log output. The post markets the credentials as fresh and working, and advertises premium unwrapped bases available via Telegram or forum contact.
    Date: 2026-05-16T12:29:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-34-7-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Free release of 34.1 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor has freely shared a combo list containing 34.1 million URL:login:password entries, marketed as fresh and high-quality. The post promotes the credentials as suitable for credential stuffing across various services and advertises additional unwrapped databases available via Telegram.
    Date: 2026-05-16T12:29:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-34-1-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  312. Free distribution of 12.8 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor operating as MetaCloud3 has freely distributed a combo list containing approximately 12.8 million URL:login:password credential pairs. The post describes the data as high quality. No specific victim organization or sector is identified.
    Date: 2026-05-16T12:29:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-12-8M-%E2%9A%A1-URL-LOGIN-PASS-HQ-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  313. Free distribution of 29.6 million URL:log:pass credential logs
    Category: Logs
    Content: A threat actor is freely distributing a dataset of 29.6 million URL:log:pass entries, described as fresh UHQ stealer log output. The post markets the credentials as valid hits suitable for a wide range of uses, with higher-quality unwrapped bases available via Telegram or the forum.
    Date: 2026-05-16T12:28:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-29-6-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Free release of 14.7 million URL:log:pass credential logs
    Category: Logs
    Content: A threat actor on Cracked.st has shared a dataset of 14.7 million URL:log:pass entries, described as fresh UHQ stealer log output. The post markets the credentials as working and valid, with the actor also offering unwrapped bases via Telegram for purchase.
    Date: 2026-05-16T12:28:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-14-7-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8–2094664
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  315. Sale of German combo list with 69,545 credentials
    Category: Combo List
    Content: A threat actor is offering a high-quality mixed combo list of 69,545 credentials targeting German accounts. The post advertises daily supply of 4,000–12,000 fresh credentials through a private, members-only network. The credentials are marketed as untouched and optimized for credential stuffing use.
    Date: 2026-05-16T12:28:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75443/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  316. Free distribution of 22.4 million URL:login:password combo list
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list containing approximately 22.4 million URL:login:password entries, marketed as fresh and high-quality. The post claims the credentials are valid and suitable for credential stuffing across multiple services. The actor also advertises premium unwrapped bases available via Telegram or the forum.
    Date: 2026-05-16T12:28:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-22-4-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  317. Sale of IRS tax payment phishing page
    Category: Phishing
    Content: A threat actor is offering for sale a phishing page impersonating the IRS tax payment portal. The kit harvests personal details including full name, address, SSN, and date of birth, as well as full payment card data including card number, expiration, and CVV2. The seller states that the captured data fields can be customized upon request.
    Date: 2026-05-16T12:24:51Z
    Network: openweb
    Published URL: https://breached.st/threads/sell-irs-tax-payment-scampage.87192/unread
    Screenshots:
    None
    Threat Actors: tgov02
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Internal Revenue Service
    Victim Site: irs.gov
  318. Sale of forged legal documents, government email access, and domain takedown services
    Category: Services
    Content: A threat actor is selling a range of illicit services including forged legal documents (subpoenas, court orders, seizure warrants, MLAT requests) designed to impersonate law enforcement for Emergency Disclosure Requests, access to government email accounts across multiple countries, and a domain takedown method claimed to force administrative locks on target domains. Pricing ranges from $5 to $5,000 depending on the service or asset.
    Date: 2026-05-16T12:12:35Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-SELLING-FORGED-COURT-ORDERS-DOMAIN-TAKEDOWNS-GOV-EMAILS-PRIVATE-EDR-ASSETS–188957
    Screenshots:
    None
    Threat Actors: convince
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  319. Sale of education sector combo list with 145,223 lines
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list containing 145,223 email:password lines targeting educational institutions. The list is described as a mixed-target education sector combolist. No further details are available from the post content.
    Date: 2026-05-16T12:11:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-145-223-Lines-%E2%9C%85-Edu-education-Mixed-Target-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  320. Sale of 609K shopping combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 609,000 email:password credential pairs advertised for use against shopping platforms. The post claims the list originates from a private base and is suitable for credential stuffing across various services.
    Date: 2026-05-16T12:11:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1609K-SHOPPING%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  321. Combo list targeting MSN Outlook accounts (644K credentials)
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 644,000 MSN/Outlook email and password pairs, marketed as private data with many hits. The credentials are intended for credential stuffing against Microsoft email services.
    Date: 2026-05-16T12:11:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-644K-%E3%80%8D%E2%9A%A1-MSN-OUTLOOK-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1GOOD-QUALITY-AND-MANY-HITS%E2%9A%A1-16-05-26%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  322. Twitter combo list of 698K credentials offered for free
    Category: Combo List
    Content: A threat actor operating under the alias MetaCloud3 has shared a combo list of approximately 698,000 email and password pairs marketed as a private base suitable for credential stuffing against Twitter. The post is categorized as a combo list and does not represent a breach of Twitter itself.
    Date: 2026-05-16T12:10:44Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1698K-TWITTER%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  323. Combo list targeting DoorDash accounts
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list of 573K email:password pairs marketed for use against DoorDash accounts. The post claims the credentials are private and of good quality with many hits. Per combo list conventions, DoorDash is the credential-stuffing target, not the breach source.
    Date: 2026-05-16T12:10:20Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-573K-%E3%80%8D%E2%9A%A1-DOORDASH-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1GOOD-QUALITY-AND-MANY-HITS%E2%9A%A1-16-05-26%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  324. Sale of Reddit combo list with 757K credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list marketed as containing 757,000 Reddit email:password credentials. The post describes the base as private and claims the credentials are usable across multiple services. Reddit is the credential-stuffing target, not necessarily the breach source.
    Date: 2026-05-16T12:09:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1757K-REDDIT%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  325. Free distribution of 1.5 million URL:log:pass credentials
    Category: Combo List
    Content: A threat actor shared a Mega.nz link containing approximately 1.5 million URL:log:pass credential pairs, described as stealer log output. The data was made available freely on a cracking and combolist forum.
    Date: 2026-05-16T12:07:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75441/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  326. Sale of France combo list with 10,000 credentials
    Category: Combo List
    Content: A forum member is distributing a combo list purportedly containing 10,000 credentials associated with French users. No additional details about the targeted services or data fields are available from the post content.
    Date: 2026-05-16T11:55:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-10k-France-Private-Combolist
    Screenshots:
    None
    Threat Actors: BygBB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  327. Combo list targeting PlayStation and Xbox accounts
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 535,000 email:password credentials marketed for use against PlayStation and Xbox accounts. The post claims the data is private and of good quality with many hits. No breach of PlayStation or Xbox infrastructure is claimed.
    Date: 2026-05-16T11:54:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-535K-%E3%80%8D%E2%9A%A1-PLAYSTAION-XBOX-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1GOOD-QUALITY-AND-MANY-HITS%E2%9A%A1-16-05-26%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  328. Sale of mixed combo list with 15,000 credentials
    Category: Combo List
    Content: A threat actor posted a mixed combo list containing approximately 15,000 credential pairs on a cracking forum. The list is described as private. No additional details about the targeted services or data origins are available.
    Date: 2026-05-16T11:53:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-15k-Mix-Private-Combolist
    Screenshots:
    None
    Threat Actors: BygBB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  329. Sale of combo list targeting Nike.com with 531K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 531,000 email and password pairs described as a private base suited for credential stuffing against Nike.com. The post claims the credentials are effective for various purposes. Nike.com is the targeted service, not the breach source.
    Date: 2026-05-16T11:52:49Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1531K-NIKE-COM%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  330. Alleged sale of RDP access and compromised accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to Azure, AWS, and DigitalOcean instances at $200, along with compromised domain email accounts, Gmail, Yahoo accounts, GitHub Student accounts, and stolen subscription credentials (ChatGPT Plus, Claude, ElevenLabs Creator Plan). Services offered on daily/monthly rental basis with escrow protection.
    Date: 2026-05-16T11:51:48Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82840
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  331. Combo List targeting Hotmail
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 600 Hotmail credentials marketed as fresh hits validated on 16.05. The content is restricted to registered forum users.
    Date: 2026-05-16T11:50:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75440/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  332. Sale of Japan mix email combo list
    Category: Combo List
    Content: A combo list of approximately 1,900 Japan-based email and password combinations is being shared on a cracking forum. The list is described as UHQ (ultra-high quality). No additional details about the source or target service are available.
    Date: 2026-05-16T11:49:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-9K-UHQ-JAPAN-MIX-MAILS
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  333. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 4,000 Hotmail credentials, marketed as high-quality hits. The list appears intended for credential stuffing or account takeover activity against Hotmail accounts.
    Date: 2026-05-16T11:48:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-4K-HQ-HOTMAIL-HITS
    Screenshots:
    None
    Threat Actors: SOMUCHCOM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Combo List targeting Eneba and G2A credential stuffing
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 621,000 email:password pairs marketed as a private base suitable for credential stuffing against Eneba and G2A platforms. The post was shared on a public cracking forum by the user MetaCloud3.
    Date: 2026-05-16T11:48:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1621K-ENEBA-G2A%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  335. Free combo list targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of 100,000 claimed valid Hotmail credentials via an external paste platform. The list is distributed freely on the forum.
    Date: 2026-05-16T11:47:35Z
    Network: openweb
    Published URL: https://altenens.is/threads/100k-valid-hotmail-txt.2941343/unread
    Screenshots:
    None
    Threat Actors: Vekko
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  336. Website Defacement of Indonesian Religious Court (PA Cibinong) by Ushiromiya
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Ushiromiya defaced the admin panel of the Pengadilan Agama Cibinong (Cibinong Religious Court) web application hosted on a Linux server. The targeted subdomain panjar.pa-cibinong.go.id is associated with an Indonesian government judicial institution under the .go.id domain. The incident was a targeted single-site defacement with a mirror archived on haxor.id.
    Date: 2026-05-16T11:44:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249306
    Screenshots:
    None
    Threat Actors: Ushiromiya, Ushiromiya
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Pengadilan Agama Cibinong (PA Cibinong Religious Court)
    Victim Site: panjar.pa-cibinong.go.id
  337. Combo list targeting music streaming services distributed on forum
    Category: Combo List
    Content: A threat actor distributed a combo list of approximately 639,000 credential pairs marketed as a private base suitable for music streaming services. The post advertises the data as usable for credential stuffing across multiple services.
    Date: 2026-05-16T11:38:21Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1639k-music%E2%9A%A1private-base-good-on-anything-you-need%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  338. USA Hotmail combo list with 802K credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 802,000 USA Hotmail credentials, marketed as private and high-quality with many hits. The post is associated with a combo cloud service offering affordable access to credential data.
    Date: 2026-05-16T11:37:50Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E3%80%8C-802k-%E3%80%8D%E2%9A%A1-usa-hotmail-%E2%9A%A1-100-private-data-%E2%9A%A1good-quality-and-many-hits%E2%9A%A1-16-05-26%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  339. Hotmail combo list of 2,500 credentials offered
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as 2,500 UHQ Hotmail hits. The credentials are shared freely with additional private access available for purchase via Telegram handle @window_linux01.
    Date: 2026-05-16T11:37:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-2-5k-uhq-hotmail-hit-%E2%9C%85
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  340. Hotmail combo list allegedly containing 666K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 666,000 Hotmail credentials, described as a private base suitable for credential stuffing. The post is gated behind registration or login on the forum.
    Date: 2026-05-16T11:36:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A1666k-hotmail%E2%9A%A1private-base-good-on-anything-you-need%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  341. Sale of combo list targeting Roblox and Minecraft accounts
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 560,000 credentials marketed as targeting Roblox and Minecraft accounts, advertised as private data with high hit rates. The post is dated May 16, 2026, and is associated with a self-described combo cloud service offering affordable access to credential data.
    Date: 2026-05-16T11:36:21Z
    Network: openweb
    Published URL: https://patched.to/Thread-gaming-%E3%80%8C-560k-%E3%80%8D%E2%9A%A1-roblox-minecraft-%E2%9A%A1-100-private-data-%E2%9A%A1good-quality-and-many-hits%E2%9A%A1-16-05-26%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  342. Office365 combo list of 740K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 740,000 credentials marketed as suitable for use against Office365 services. The post describes the data as sourced from a private base. The author promotes a broader combo cloud service offering additional credential sets.
    Date: 2026-05-16T11:35:50Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A1740k-office365%E2%9A%A1private-base-good-on-anything-you-need%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  343. Sale of carding full course including clone card techniques
    Category: Carding
    Content: A threat actor is selling a carding course priced at $140 (BTC/USDT) covering topics such as clone card creation using Track1/Track2 data and card cashing techniques. The course is advertised as a comprehensive guide for conducting carding operations globally.
    Date: 2026-05-16T11:34:35Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Carding-Full-Course-NEW-2026
    Screenshots:
    None
    Threat Actors: Darkode1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  344. Sale of FortiSSL IP list with 50,000 entries
    Category: Services
    Content: A threat actor is offering a list of 50,000 FortiSSL IP addresses with port and geolocation data, claiming the data was gathered using proprietary mass-scanning servers rather than third-party tools such as Fofa or Shodan. The data is provided in the format https://ip:port,GEO and hosted on an external file-sharing link.
    Date: 2026-05-16T11:33:23Z
    Network: openweb
    Published URL: https://tier1.life/thread/236
    Screenshots:
    None
    Threat Actors: AccessTracker
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  345. Sale of UHQ Hotmail combo list
    Category: Combo List
    Content: A forum post advertises a combo list of 333 purported high-quality (UHQ) Hotmail credentials. No further details are available as the post content is empty.
    Date: 2026-05-16T11:30:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-X333-UHQ-HOTMAILS
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  346. Alleged sale of mail access credentials and infostealer logs by DataxLogs and EngineeringPhantom
    Category: Logs
    Content: Threat actors advertising mail access credentials and infostealer logs (combo lists, configs, scripts, tools) for multiple countries including FR, BE, AU, CA, UK, US, NL, PL, DE, and JP. Posts claim proof/live testing available. Contact handles: @DataxLogs and @EngineeringPhantom.
    Date: 2026-05-16T11:30:21Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82817
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  347. Sale of 37K email access combo list targeting USA, EU, Asia, and Russia
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 37,000 email credentials spanning USA, EU, Asia, and Russia, marketed as fully valid mail access. The content is paywalled behind registration or login on the forum, with the seller directing buyers to their storefront at megacloudshop.top.
    Date: 2026-05-16T11:29:07Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-37K-Usa-EU-Asia-Ru-Full-Valid-Mail-Access-16-05
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  348. Alleged data leak of arbiko.pl
    Category: Data Leak
    Content: A threat actor group identified as Org1877 claims to have dumped the database of arbiko.pl and is freely distributing it to forum members. The leaked data allegedly includes first and last names, email addresses, and passwords (potentially hashed).
    Date: 2026-05-16T11:26:40Z
    Network: openweb
    Published URL: https://breached.st/threads/arbiko-pl-databases.87189/unread
    Screenshots:
    None
    Threat Actors: org1877
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Arbiko
    Victim Site: arbiko.pl
  349. Sale of 70K German email access combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 70,000 German email credentials marketed as fully valid mail access. The content is hidden behind a registration/login gate and linked to an external store at megacloudshop.top.
    Date: 2026-05-16T11:11:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-70K-Germay-Full-Valid-Mail-Access-Just-top-Quality-16-05
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  350. Website defacement of Indonesian National Narcotics Agency (BNN) by Obelix1337 of Midas Haxor Team
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Obelix1337, affiliated with Midas Haxor Team, defaced a subdomain of the Indonesian National Narcotics Agency (BNN) at sin.bnn.go.id. The defacement targeted a specific page (ft.html) rather than the homepage, indicating a targeted intrusion into the Indonesian governments drug enforcement agency web infrastructure. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T11:10:42Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249305
    Screenshots:
    None
    Threat Actors: Obelix1337, Midas Haxor Team
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Badan Narkotika Nasional (BNN) – National Narcotics Agency of Indonesia
    Victim Site: sin.bnn.go.id
  351. Free combo list of 70K German email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 70,000 German email credentials, described as fully valid mail access. The list is gated behind a reply requirement and is marketed as high quality, dated May 16.
    Date: 2026-05-16T11:10:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/70k-germay-full-valid-mail-access-just-top-quality-16-05.2941329/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  352. Alleged data leak of Hospital Universitario Nacional de Colombia
    Category: Data Leak
    Content: A threat actor claims to have dumped 8 databases and 197 tables from Hospital Universitario Nacional de Colombia, reportedly extracted on 2026-05-02 with 5 active admin sessions. The dump allegedly includes REDCap clinical research data with 2FA secrets, pharmacy records with plaintext credentials (10,000+ entries), full PII for 583 employees, and a WordPress multisite intranet with API keys. phpMyAdmin root access is also claimed to have been confirmed.
    Date: 2026-05-16T11:09:03Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-COLLECTION-Hospital-Universitario-Nacional-de-Colombia-hun-edu-co-%E2%80%93-Full-Dump
    Screenshots:
    None
    Threat Actors: macaroni
    Victim Country: Colombia
    Victim Industry: Healthcare
    Victim Organization: Hospital Universitario Nacional de Colombia
    Victim Site: hun.edu.co
  353. Website Defacement of samplebaz.com by 0xSHALL of FOURSDEATH TEAM
    Category: Defacement
    Content: On May 16, 2026, threat actor 0xSHALL, operating under the group FOURSDEATH TEAM, defaced the website samplebaz.com, targeting the page at /zxc.html. The incident was a targeted single-page defacement, not classified as a mass or home page defacement. Server and infrastructure details remain unknown, and no specific motive was disclosed.
    Date: 2026-05-16T11:07:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923129
    Screenshots:
    None
    Threat Actors: 0xSHALL, FOURSDEATH TEAM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: samplebaz.com
  354. Mass Website Defacement of e-UMKM Kediri by Irene of XmrAnonye.id
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Irene operating under the group XmrAnonye.id conducted a mass defacement attack against e-umkmkediri.com, a platform supporting small and medium enterprises (UMKM) in Kediri, Indonesia. The defacement was hosted at a dedicated path on the target domain and is part of a broader mass defacement campaign. The compromised server runs on a Linux operating system, and a mirror of the defacement has been archived at haxor.id.
    Date: 2026-05-16T11:00:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249304
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Indonesia
    Victim Industry: Small and Medium Enterprises / Government Services
    Victim Organization: e-UMKM Kediri
    Victim Site: e-umkmkediri.com
  355. Free distribution of 2.5 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor operating under the alias KURZL0GS has leaked a private combo list containing approximately 2.5 million URL:login:password credential pairs. The dataset is described as UHQ (ultra-high quality) and was made available for free on the cracked.st forum.
    Date: 2026-05-16T10:57:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9A%A1-2-5M-URL-LOG-PASS-PRIVATE-UHQ-BY-KURZL0GS-16-05-2026%E2%9A%A1
    Screenshots:
    None
    Threat Actors: KURZL0GS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  356. Sale of USA fullz with personal information
    Category: Carding
    Content: A threat actor is selling US fullz packages containing full name, email, SSN, drivers license, and other personal information. The seller claims limited stock described as UHQ (ultra-high quality).
    Date: 2026-05-16T10:56:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-Selling-USA-Fullz-w-Full-Information
    Screenshots:
    None
    Threat Actors: Nedz
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  357. Sale of debit cards, bank logs, and fullz on cybercrime forum
    Category: Carding
    Content: A threat actor is advertising the sale of debit cards, bank logs, and fullz (full identity records) via Telegram. No specific victim organization or record count is disclosed. The seller directs prospective buyers to a Telegram channel.
    Date: 2026-05-16T10:55:22Z
    Network: openweb
    Published URL: https://altenens.is/threads/hmu-call-me-hand-fa-debit-cards-credit-card-bank-logs-fullz-identification-card-telegram-yunginsbucks-come-money-ready-no-bad-business-over-here-channel-https-t-me-sudbyw.2941324/unread
    Screenshots:
    None
    Threat Actors: modajad205
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  358. Alleged sale of compromised mail access and credential lists by DataxLogs
    Category: Initial Access
    Content: Threat actor DataxLogs is advertising mail access availability across multiple countries (France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, Japan) along with configs, scripts, tools, hits, and combo lists. Multiple posts indicate active marketing of initial access and credential materials.
    Date: 2026-05-16T10:51:44Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/82789
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  359. Website Defacement of embiz.co by 0xSHALL of FOURSDEATH TEAM
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as 0xSHALL, operating under the group FOURSDEATH TEAM, defaced a page on embiz.co. The defacement targeted a specific page (zxc.html) rather than the homepage, indicating a targeted single-page intrusion. No specific motive or technical details regarding the attack vector were disclosed.
    Date: 2026-05-16T10:34:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923128
    Screenshots:
    None
    Threat Actors: 0xSHALL, FOURSDEATH TEAM
    Victim Country: Unknown
    Victim Industry: Business Services
    Victim Organization: Embiz
    Victim Site: embiz.co
  360. Sale of SONY mixed combo list
    Category: Combo List
    Content: A threat actor is offering a mixed combo list advertised as suitable for Sony platforms, containing approximately 2 million credential pairs. The list is promoted as UHQ (ultra-high quality) and is available via Telegram.
    Date: 2026-05-16T10:33:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75435/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  361. Alleged Edu Combo List with 117,532 Credentials
    Category: Combo List
    Content: A combo list advertised as fresh and targeting educational accounts was shared on a cracking forum. The list reportedly contains 117,532 email and password pairs. No additional details about the source or verification method are available.
    Date: 2026-05-16T10:32:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-117-532-%E2%9A%9C%EF%B8%8F-Good-Edu-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  362. Combo List: France email access credentials (2.8K)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 2,800 French email access credentials on a forum. The content is hidden behind registration or login, limiting further detail. The post is categorized as a combo list targeting French mail accounts.
    Date: 2026-05-16T10:31:29Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%902-8k-france-mail-access-%E2%AD%90
    Screenshots:
    None
    Threat Actors: XLM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  363. Sale of European combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a European combo list containing approximately 11,720 credential pairs, marketed as high quality and fresh. The seller claims daily supply of 4,000–12,000 credentials optimized for credential stuffing. Access appears to be restricted to registered forum members.
    Date: 2026-05-16T10:30:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-1172x-hq-mix-europe-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  364. Website Defacement of Indonesian Court Library by Ushiromiya
    Category: Defacement
    Content: The library website of Pengadilan Agama Maros, an Indonesian religious court institution, was defaced by the attacker known as Ushiromiya. This incident is classified as a redefacement, indicating the site had been previously compromised. The attack targeted a Linux-based server hosting the courts library subdomain under the official Indonesian government domain.
    Date: 2026-05-16T10:27:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249303
    Screenshots:
    None
    Threat Actors: Ushiromiya, Ushiromiya
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Pengadilan Agama Maros (Maros Religious Court) Library
    Victim Site: perpustakaan.pa-maros.go.id
  365. Website Defacement of IIFSE India by Ruiixh4xor (SHENHAXSEC)
    Category: Defacement
    Content: On May 16, 2026, the attacker Ruiixh4xor, operating under the team SHENHAXSEC, defaced the homepage of IIFSE India (www.iifseindia.in), an Indian financial services education institute. The incident was a targeted single-site homepage defacement, with the mirror archived on zone-xsec.com. No specific motive or server details were disclosed.
    Date: 2026-05-16T10:24:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923127
    Screenshots:
    None
    Threat Actors: Ruiixh4xor, SHENHAXSEC
    Victim Country: India
    Victim Industry: Education / Financial Services
    Victim Organization: Indian Institute of Financial Services Education (IIFSE India)
    Victim Site: www.iifseindia.in
  366. Sale of HQ Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering 251 high-quality Hotmail credentials, marketed as fresh and untouched. The post advertises daily supply of 4,000–12,000 credentials with claims of private, encrypted access for members.
    Date: 2026-05-16T10:15:00Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-251x-hq-hotmail-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  367. Free combo list of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing 1,919 purported Hotmail credential hits described as premium and valid. The content is hidden behind a registration or login requirement on the forum. These credentials appear to be the result of credential stuffing or prior breach aggregation, not a breach of Hotmail itself.
    Date: 2026-05-16T10:10:57Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1919x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaaxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  368. Hotmail combo list freely shared by threat actor
    Category: Combo List
    Content: A threat actor posted a Hotmail combo list on a leak forum, described as private and fresh, checked by the same user. The content is hidden behind a login/registration wall and requires a like to unlock, suggesting free distribution to forum members.
    Date: 2026-05-16T10:10:34Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1HOTMAIL%E2%9A%A1%E2%9A%A1PRIVATE%E2%9A%A1%E2%9A%A1FRESH%E2%9A%A1%E2%9A%A1CHEKED-BY-klyne05-%E2%9A%A1%E2%9A%A1–20724
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  369. Alleged data leak of CSI India (csi-india.org)
    Category: Data Leak
    Content: A threat actor operating under the alias MR ELANG XPLOIT, claiming affiliation with Cyber Team Indonesia, has freely distributed an alleged database dump from csi-india.org via a MediaFire link. The leak was posted on a public forum with no price indicated.
    Date: 2026-05-16T10:08:19Z
    Network: openweb
    Published URL: https://breached.st/threads/leaks-database-csi-indian.87188/unread
    Screenshots:
    None
    Threat Actors: MR ELANG XPLOIT
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: CSI India
    Victim Site: csi-india.org
  370. Alleged data breach of Egypt Professional Academy for Teachers
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged dataset pertaining to Egypts Professional Academy for Teachers, claiming to possess data on approximately 1.2 million teachers (including 200K Azhar teachers), STEM student records, 3,500 teacher images, Microsoft Access files, and MSSQL backups totaling over 80GB uncompressed. The seller states the target website is currently down and provides image-based proof samples. Contact and pricing are shared privately.
    Date: 2026-05-16T10:00:24Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Egypt-Professional-Academy-For-Teachers-1-2M-Teachers-Data-Images-Etc
    Screenshots:
    None
    Threat Actors: INT3X
    Victim Country: Egypt
    Victim Industry: Education
    Victim Organization: Professional Academy for Teachers
    Victim Site: Unknown
  371. Sale of 1.5M Gaming Mix Email:Password Combo List
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 1.5 million email:password credential pairs described as a gaming mix. The content is hidden behind a registration or login requirement on the forum. No specific breached organization is identified.
    Date: 2026-05-16T09:57:41Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-1-5M-Combo-Gaming-Mix-Email-Pass
    Screenshots:
    None
    Threat Actors: byakuya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  372. Sale of PayPal email and password combo list with 1.8 million credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 1.8 million email and password pairs marketed for use against PayPal accounts. The content is gated behind forum registration or login. PayPal is the credential-stuffing target, not the breach source.
    Date: 2026-05-16T09:57:11Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-1-8M-Combolist-Paypal-Email-Pass
    Screenshots:
    None
    Threat Actors: byakuya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  373. Abuse of AppLocker Rules to Block EDR Processes
    Category: Malware
    Content: A forum article describes a technique where adversaries abuse Windows AppLocker by deploying deny rules that block EDR processes, enabling arbitrary code execution without security tool interference. The post references a publicly available proof-of-concept tool called GhostLocker that automates creation of such deny rules targeting EDR executables. The Azorult loader malware was cited as a known example of this behavior, previously identified by Splunk in 2022.
    Date: 2026-05-16T09:54:47Z
    Network: openweb
    Published URL: https://tier1.life/thread/235
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  374. Alleged data leak of server.oncyprus.com (208 sites dumped)
    Category: Data Leak
    Content: A threat actor claims to have dumped data from 208 sites hosted on server.oncyprus.com, including what may be an online shopping site. The leaked data reportedly contains email addresses associated with government entities from multiple countries including Cyprus, the United States, the United Kingdom, Israel, Poland, and Australia, and is being made available for free download via a hidden forum link.
    Date: 2026-05-16T09:53:53Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-server-oncyprus-com-208-site-Dumped
    Screenshots:
    None
    Threat Actors: justscyprus
    Victim Country: Cyprus
    Victim Industry: Technology
    Victim Organization: oncyprus.com
    Victim Site: server.oncyprus.com
  375. Free distribution of URL:Log:Pass combo list with 8+ million lines
    Category: Combo List
    Content: A threat actor is distributing a URL:Log:Pass combo list containing over 8 million lines at no cost on a clearnet forum. The content is gated behind registration or login. No specific victim organization or targeted service is identified.
    Date: 2026-05-16T09:52:51Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-345
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  376. Combo List of 430K URL:Login:Password credentials
    Category: Combo List
    Content: A threat actor has shared a combo list containing approximately 430,000 URL:login:password credential pairs on a public forum. The post was made in the Other Leaks section and appears to offer the list as a free release. No specific targeted organization or service was identified.
    Date: 2026-05-16T09:50:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90430K-URL-LOGIN-PASS%E2%AD%90
    Screenshots:
    None
    Threat Actors: Posts
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  377. Alleged Hotmail combo list leak of 1.14 million lines
    Category: Combo List
    Content: A threat actor has shared a combo list containing approximately 1.14 million email and password pairs targeting Hotmail.com accounts. The list is advertised as high quality and was distributed on a cracking forum. No additional details are available from the post content.
    Date: 2026-05-16T09:49:55Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-141-136-Lines-%E2%9C%85-Hotmail-com-Combolist-HQ-LEaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  378. Free combo list shared on DM forum
    Category: Combo List
    Content: A combo list marketed as HQ Mix containing approximately 2,850 email and password pairs has been shared on a cybercrime forum. The content is hidden behind a registration or login requirement. No specific target organization or country is identified.
    Date: 2026-05-16T09:49:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2850-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  379. Sale of alleged Israeli passport documents
    Category: Carding
    Content: A threat actor is offering 126 Israeli passports for sale, directing interested buyers to a Telegram account for pricing. No further details about the source or authenticity of the documents are provided.
    Date: 2026-05-16T09:45:33Z
    Network: openweb
    Published URL: https://breached.st/threads/126-israel-passports.87187/unread
    Screenshots:
    None
    Threat Actors: Meowl
    Victim Country: Israel
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  380. Alleged Pre-Auth RCE vulnerabilities in Ivanti EPMM (CVE-2026-1281 and CVE-2026-1340) actively exploited
    Category: Vulnerability
    Content: A forum post details two pre-authentication Remote Command Execution vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340. The vulnerabilities are reported as actively exploited by APT actors and have been added to the CISA Known Exploited Vulnerabilities catalog. Temporary RPM-based patches have been released by Ivanti, with a full fix expected in version 12.8.0.0 in Q1 2026.
    Date: 2026-05-16T09:28:14Z
    Network: openweb
    Published URL: https://tier1.life/thread/234
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Ivanti
    Victim Site: ivanti.com
  381. Alleged data breach of Taiwan External Trade Development Council (TAITRA)
    Category: Data Breach
    Content: A threat actor claims to have breached TAITRA, Taiwans official trade promotion agency, via its API. The actor alleges 271 records were exposed and is distributing the data via a Telegram link. No further details on data fields or types were specified in the post.
    Date: 2026-05-16T09:24:46Z
    Network: openweb
    Published URL: https://breached.st/threads/271-taitra-breached-api.87185/unread
    Screenshots:
    None
    Threat Actors: cc5ab
    Victim Country: Taiwan
    Victim Industry: Government
    Victim Organization: Taiwan External Trade Development Council (TAITRA)
    Victim Site: taitra.org.tw
  382. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 1,600 Hotmail credentials marketed as private and fully valid. The post is categorized as a credential stuffing resource targeting Hotmail accounts. No additional details are available from the post content.
    Date: 2026-05-16T09:12:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1600X-Hotmail-Full-Private-Full-Valid
    Screenshots:
    None
    Threat Actors: MerotosCob
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  383. Evil VM privilege escalation technique in Entra ID via PRT theft published on cybercrime forum
    Category: Vulnerability
    Content: A forum post details a multi-stage attack technique dubbed Evil VM that abuses Azure VM Device Identity and Device Code Phishing to steal Primary Refresh Tokens (PRT) and escalate privileges to Entra ID Admin. The technique chains guest account compromise, subscription transfer abuse, TPM-less VM Entra join, device certificate extraction, and phishing via Device Code Flow. The post includes defensive mitigations and is framed as original security research.
    Date: 2026-05-16T09:09:53Z
    Network: openweb
    Published URL: https://tier1.life/thread/233
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  384. Alleged data breach of janfadaa.ir (Iranian pro-government recruitment site)
    Category: Data Breach
    Content: A threat actor claims to have gained RDP backup access to janfadaa.ir, an Iranian website reportedly used to recruit volunteers for military deployment. The actor alleges exfiltration of over 31.5 million records containing personal data including full name, fathers name, national code, ID number, phone number, education, occupation, and activity type. The full dataset (~35 GB) is offered for sale via Telegram, with a sample shared on Pastebin.
    Date: 2026-05-16T09:06:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-janfadaa-ir-Databases
    Screenshots:
    None
    Threat Actors: OxO
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: janfadaa.ir
    Victim Site: janfadaa.ir
  385. Alleged data breach of janfadaa.ir (Iranian pro-government recruitment site)
    Category: Data Breach
    Content: A threat actor claiming to be group #1877 alleges they gained access via RDP backup to janfadaa.ir, an Iranian website reportedly used to recruit volunteers for military deployment. The actor claims to have obtained over 31.5 million records including names, national codes, ID numbers, phone numbers, education, occupation, and request texts, totaling approximately 35 GB, and is offering the full dataset for sale via Telegram.
    Date: 2026-05-16T09:06:09Z
    Network: openweb
    Published URL: https://breached.st/threads/janfadaa-ir-databases.87183/unread
    Screenshots:
    None
    Threat Actors: org1877
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: Janfadaa
    Victim Site: janfadaa.ir
  386. Combo list of Hotmail credentials (7K)
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 7,000 Hotmail credentials marketed as UHQ and fresh. The list is posted on a public cracking forum and is intended for credential stuffing or account takeover activity.
    Date: 2026-05-16T08:59:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-7K-HOTMAILS-UHQ-FRESH
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  387. Combo List of 32K Mixed Email Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 32,000 mixed email and password pairs on a cracking forum. No additional details regarding the source or targeted services were provided.
    Date: 2026-05-16T08:58:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-32K-MIX-MAILS–2094594
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  388. Sale of UHQ mixed email combo list (3.3K credentials)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 3,300 mixed email and password credentials on a cracking forum. The post is categorized as UHQ (ultra-high quality), suggesting the credentials may be recently verified or of high validity.
    Date: 2026-05-16T08:58:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-3-3K-UHQ-MIX-MAILS
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  389. Combo List: 1.8K UHQ Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 1,800 UHQ Hotmail email:password credentials on a cracking forum. The credentials are marketed as high quality and are likely intended for credential stuffing or account takeover activity.
    Date: 2026-05-16T08:58:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-8K-UHQ-HOTMAILS–2094597
    Screenshots:
    None
    Threat Actors: Cloudredhat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  390. Alleged sale of stolen credit card data by Boss Shop
    Category: Logs
    Content: Boss Shop advertises the sale of first-hand stolen credit cards, claiming to update over 100,000 cards daily. They offer daily free activities with 10,000 free cards priced at $0.01-$0.1, all verified as valid. The operation includes a clearnet website, Tor mirror, and Telegram channel for customer access.
    Date: 2026-05-16T08:55:09Z
    Network: telegram
    Published URL: https://t.me/BossShopallqo/3
    Screenshots:
    None
    Threat Actors: Boss Shop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  391. Free distribution of stealer logs mix by fatetraffic
    Category: Logs
    Content: A threat actor operating under the alias fatetraffic has publicly shared a batch of approximately 1,700 mixed stealer logs via a file-sharing link. The logs are dated 16-05-2026 and made available at no cost with a shared password.
    Date: 2026-05-16T08:51:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%93%97-FATETRAFFIC-1700-MIX-16-05-2026-STEALER-LOGS
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  392. Malware campaign delivering Amatera Stealer via Fake CAPTCHA and PNG steganography
    Category: Malware
    Content: Blackpoint SOC identified a Fake CAPTCHA campaign delivering Amatera Stealer using a signed Microsoft App-V script (SyncAppvPublishingServer.vbs) as a LOLBIN to proxy execution. The kill chain includes behavior-gated execution stages, live C2 configuration retrieved from Google Calendar, and PNG steganography to deliver an encrypted in-memory payload. The campaign is notable for its use of legitimate infrastructure and signed components to evade detection throughout the delivery chain.
    Date: 2026-05-16T08:50:53Z
    Network: openweb
    Published URL: https://tier1.life/thread/232
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  393. Sale of Hotmail combo list with 1,931 fresh credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 1,931 Hotmail credentials marketed as fresh drops. The list is available via external paste and Telegram links, with VIP subscription tiers priced between $3 and $100.
    Date: 2026-05-16T08:43:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75427/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  394. Mass Defacement of Interior Rugs India by lxrdk1773n
    Category: Defacement
    Content: On May 16, 2026, threat actor lxrdk1773n conducted a mass defacement campaign targeting interiorrugs.in, an Indian retail website specializing in home furnishings and rugs. The incident was classified as a mass defacement, indicating multiple sites were compromised as part of the same operation. The defacement was archived and documented via haxor.id mirror service.
    Date: 2026-05-16T08:42:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249302
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: India
    Victim Industry: Retail / Home Furnishings
    Victim Organization: Interior Rugs
    Victim Site: interiorrugs.in
  395. Website Defacement of Interior Rugs by Attacker lxrdk1773n
    Category: Defacement
    Content: On May 16, 2026, the website interiorrugs.in, an Indian retail business specializing in interior rugs and home furnishings, was defaced by the attacker known as lxrdk1773n. The attack targeted the homepage of the site in a single, non-mass defacement operation. No specific motivation or technical details regarding the server were disclosed.
    Date: 2026-05-16T08:36:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923126
    Screenshots:
    None
    Threat Actors: lxrdk1773n, No team
    Victim Country: India
    Victim Industry: Retail / Home Furnishings
    Victim Organization: Interior Rugs
    Victim Site: interiorrugs.in
  396. Finland Email:Pass Combo List (12K+)
    Category: Combo List
    Content: A combo list of approximately 12,000 or more Finland-based email and password pairs was shared on a public forum. The credentials are marketed as fresh, dated 16-5-2026. No specific breached organization is identified.
    Date: 2026-05-16T08:32:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-12-K-%E2%9C%A6-Finland-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  397. Alleged data breach of PT Wijaya Karya (WIKA)
    Category: Data Breach
    Content: A threat actor is selling a database allegedly exfiltrated from PT Wijaya Karya (WIKA), an Indonesian state-owned construction company. The dataset reportedly includes personal identity records, internal documents, and company files totaling over 18GB, with fields such as full name, date of birth, national ID number, tax ID, address, education, and employment details. The actor claims to have published only 1% of the data and states they remain open to ransom negotiations with the company.
    Date: 2026-05-16T08:30:53Z
    Network: openweb
    Published URL: https://breached.st/threads/database-lsp-pt-wijaya-karya-persero.87182/unread
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Construction
    Victim Organization: PT Wijaya Karya (WIKA)
    Victim Site: perizinan.pu.go.id
  398. Denmark email:password combo list with 41K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 41,000 email and password pairs targeting Denmark-based accounts. The credentials are marketed as fresh and high quality, dated 16 May 2026.
    Date: 2026-05-16T08:19:48Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-41-K-%E2%9C%A6-Denmark-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: t4ctici4n
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  399. Greece Email:Pass Combo List
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 54,000 email and password pairs targeting Greek accounts, marketed as fresh and high quality. The list was dated May 16, 2026 and is available to registered forum members. This is a credential stuffing resource, not a breach of a specific organization.
    Date: 2026-05-16T08:19:02Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9C%A6%E2%9C%A6-54-K-%E2%9C%A6-Greece-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: Maxleak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  400. Free distribution of mixed corporate mail combo list with 7,150 valid credentials
    Category: Combo List
    Content: A threat actor on a combolist forum is sharing a mixed corporate MAILPASS combo list claiming 7,150 valid credentials with full mail access. The content is hidden behind a registration or login requirement. No specific targeted organization or country is identified.
    Date: 2026-05-16T08:18:07Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-7150-valid-mix-corp-mailpass-full-mail-acces
    Screenshots:
    None
    Threat Actors: CloudBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  401. Sale of mixed corporate mail credentials combo list with 7,150 valid entries
    Category: Combo List
    Content: A threat actor is offering a combo list of 7,150 claimed valid mixed and corporate email:password credentials with full mailbox access. The post is hosted on a public cracking forum and marketed as high-quality and fresh.
    Date: 2026-05-16T08:17:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-7150-VALID-MIX-CORP-MAILPASS-FULL-MAIL-ACCES
    Screenshots:
    None
    Threat Actors: CloudBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  402. Sale of Hotmail, Mix, and Corporate email credentials combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 700 claimed valid credentials targeting Hotmail, mixed email providers, and corporate email accounts with full mailbox access. The content is gated behind forum registration or login. No specific breached organization is identified.
    Date: 2026-05-16T08:17:36Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-700-valid-hotmail-mix-corp-mailpass-full-mail-acces-302923
    Screenshots:
    None
    Threat Actors: CloudBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  403. Sale of Hotmail and corporate email credential combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 700 email:password credentials advertised as valid Hotmail, mixed, and corporate accounts with full mail access. The post is categorized as a credential stuffing resource rather than a breach of any specific organization.
    Date: 2026-05-16T08:17:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-700-VALID-HOTMAIL-MIX-CORP-MAILPASS-FULL-MAIL-ACCES–2094577
    Screenshots:
    None
    Threat Actors: CloudBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  404. Ecuador email:password combo list with 45K+ credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing over 45,000 email:password credential pairs purportedly associated with Ecuadorian accounts, marketed as fresh and dated May 16, 2026. The content is restricted to registered forum members.
    Date: 2026-05-16T08:17:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A6%E2%9C%A6-45-k-%E2%9C%A6-ecuador-%E2%9C%A6email-pass%E2%9C%A6fresh%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Ecuador
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  405. France Email:Password Combo List
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 1.3 million French email and password pairs, marketed as fresh and high quality. The list is shared via hidden content on the forum and promoted through a Telegram channel.
    Date: 2026-05-16T08:16:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-1-301-K-%E2%9C%A6-France-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  406. Sale of Hotmail credential combo list with 2,750 valid email:password pairs
    Category: Combo List
    Content: A threat actor is sharing or selling a combo list of 2,750 claimed valid Hotmail email and password credentials with full mailbox access. The list is marketed as verified hits suitable for credential stuffing or account takeover. No additional details are available from the post content.
    Date: 2026-05-16T08:16:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-2750-VALID-HOTMAIL-MAILPASS-FULL-MAIL-ACCES
    Screenshots:
    None
    Threat Actors: CloudBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  407. Germany Email:Pass Combo List with 426K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 426,000 email:password credential pairs associated with German users, marketed as fresh and dated May 16, 2026. The list was posted on a public forum and appears intended for credential stuffing use. No specific breached organization is identified.
    Date: 2026-05-16T08:15:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-426-K-%E2%9C%A6-Germany-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  408. Czech email and password combo list with 222K+ credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing over 222,000 email and password pairs targeting Czech accounts, marketed as fresh and high quality. The list is shared as hidden content requiring registration or login to access. The post links to a Telegram channel for additional combo lists.
    Date: 2026-05-16T08:14:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-222-K-%E2%9C%A6-Czech-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-16-5-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  409. Sale of combo list with 3 million leads
    Category: Combo List
    Content: A threat actor is offering a combo list advertised as containing 3 million leads via a Telegram channel and group. The post provides links to Telegram resources where free combos and related tools are distributed.
    Date: 2026-05-16T08:13:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75425/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  410. Sale of Hotmail combo list with 12K valid credentials
    Category: Combo List
    Content: A threat actor shared a link to a combo list marketed as 12K UHQ valid Hotmail credentials. The list is described as having valid access and is being distributed via an external paste site.
    Date: 2026-05-16T08:13:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75426/
    Screenshots:
    None
    Threat Actors: Vmoon
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  411. Alleged Shai-Hulud Malware Campaign Distributing Infected Packages to Linux Developers
    Category: Malware
    Content: A sophisticated cyber operation named Shai-Hulud has been identified distributing infected packages targeting Linux developers since September 2025. Attackers are leveraging AI capabilities to develop new infiltration and security bypass methods. Primary targets include cloud infrastructure, Linux servers, and financial systems.
    Date: 2026-05-16T08:10:00Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21742
    Screenshots:
    None
    Threat Actors: Shai-Hulud
    Victim Country: Unknown
    Victim Industry: Technology, Finance, Cloud Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  412. Mass Defacement of Indian Academic Institution by TangerangXploit Team (YIIX103)
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass defacement attack targeting www.jrsc.ac.in, an Indian academic institution. The attack was executed on a Linux-based server and involved a non-homepage defacement, with a mirror of the defacement archived at haxor.id. This incident is part of a broader mass defacement campaign attributed to the group.
    Date: 2026-05-16T07:55:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249301
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: JRSC Academic Institution
    Victim Site: www.jrsc.ac.in
  413. Mass Defacement of Indian Medical College Website by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 of the TangerangXploit Team conducted a mass defacement campaign targeting the website of Shri Krishna Medical College Begusarai, an Indian academic medical institution. The attacker compromised a PHP file on the Linux-based server, leaving a defacement page archived at haxor.id. This incident is part of a broader mass defacement operation attributed to the same threat group.
    Date: 2026-05-16T07:55:22Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249298
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education / Healthcare
    Victim Organization: Shri Krishna Medical College Begusarai
    Victim Site: www.skmcbegusarai.ac.in
  414. Mass Website Defacement of HPS College by TangerangXploit Team (YIIX103)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as YIIX103, operating under the TangerangXploit Team, conducted a mass defacement campaign targeting HPS Colleges web server running on Linux. The defacement was deployed via a PHP script (yo.php) on the colleges domain, indicating unauthorized access to the web server. This incident is part of a broader mass defacement operation attributed to the same threat actor group.
    Date: 2026-05-16T07:54:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249289
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: HPS College
    Victim Site: www.hpscollege.ac.in
  415. Sale of UHQ mix mail access combo list
    Category: Combo List
    Content: A threat actor is offering a private combo list of 1,500 UHQ mixed mail access credentials for sale. Interested buyers are directed to contact the seller via the handle @window_linux01.
    Date: 2026-05-16T07:54:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-RE-%E2%AD%901-5K-UHQ-MIX-MAIL-ACCESS%E2%AD%90
    Screenshots:
    None
    Threat Actors: cloud_man01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  416. Mass Website Defacement of Womens College Samastipur by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 of TangerangXploit Team conducted a mass defacement attack against Womens College Samastipur, an educational institution in India. The defacement was hosted on a Linux-based server and targeted a non-homepage path (/yo.php), consistent with mass defacement campaign tactics. The incident has been archived and mirrored via haxor.id.
    Date: 2026-05-16T07:53:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249293
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Womens College Samastipur
    Victim Site: www.womenscollegesamastipur.ac.in
  417. Combo List of 1.6 Million Email:Password Credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 1.6 million email and password pairs on a cracking forum. The post advertises a high hit rate, suggesting the credentials have been tested against online services. No specific breached organization is identified.
    Date: 2026-05-16T07:53:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%A8-1-6M-EMAIL-PASS-%E2%9C%A8LEAK-PR%C4%B0VATE-EMAIL-PASS%E2%9C%A8HIGH-HITRATE-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: Frisbeese
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  418. Mass Website Defacement of CMB College by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass defacement attack targeting CMB Colleges web server running on Linux. The defacement was applied to a non-homepage PHP file (yo.php), indicating a targeted file-level compromise as part of a broader mass defacement campaign. The incident was archived and mirrored on haxor.id.
    Date: 2026-05-16T07:53:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249292
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: CMB College
    Victim Site: www.cmbcollege.ac.in
  419. Mass Website Defacement of VSJ College by TangerangXploit Team (YIIX103)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias YIIX103, affiliated with TangerangXploit Team, conducted a mass defacement campaign targeting the Indian academic institution VSJ College. The attack compromised a PHP file on the colleges Linux-based web server, replacing content with the attackers defacement page. This incident is part of a broader mass defacement operation attributed to the same threat actor.
    Date: 2026-05-16T07:52:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249290
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: VSJ College
    Victim Site: www.vsjcollege.ac.in
  420. Mass Website Defacement of Indian Academic Institution by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass defacement attack against www.lnjc.ac.in, an Indian academic institution. The attack targeted a Linux-based web server and compromised the file yo.php as part of a broader mass defacement campaign. The incident has been archived and mirrored via haxor.id.
    Date: 2026-05-16T07:52:04Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249291
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: LNJC Academic Institution
    Victim Site: www.lnjc.ac.in
  421. Mass Website Defacement of MCK Hagaria College by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass defacement attack targeting the Indian academic institution MCK Hagaria College. The attacker compromised the Linux-based web server and defaced the site at the path /yo.php. This incident was part of a broader mass defacement campaign attributed to the same threat group.
    Date: 2026-05-16T07:51:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249296
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: MCK Hagaria College
    Victim Site: www.mckhagaria.ac.in
  422. Mass Website Defacement of Indian Educational Institution by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass defacement attack against www.rsctarapur.ac.in, an Indian academic institution. The defacement targeted a non-homepage URL on a Linux-based server and was part of a broader mass defacement campaign. The incident was archived and mirrored on haxor.id.
    Date: 2026-05-16T07:50:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249300
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: RSC Tarapur
    Victim Site: www.rsctarapur.ac.in
  423. Alleged data leak of University of Agriculture Pakistan staff database
    Category: Data Leak
    Content: A threat actor operating under the alias FlipperOne has freely shared a staff database allegedly belonging to the University of Agriculture Pakistan. The leaked data includes personal and professional fields such as names, gender, address, phone numbers, email addresses, qualifications, designations, and social media links. The actor indicated a second part containing student information is forthcoming.
    Date: 2026-05-16T07:50:42Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-%C2%A9-2026-University-of-Agriculture-Pakistan-Staff-Database-PART-1
    Screenshots:
    None
    Threat Actors: Flipperone
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: University of Agriculture Pakistan
    Victim Site: Unknown
  424. Mass Defacement of Indian Educational Institution by TangerangXploit Team (YIIX103)
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under TangerangXploit Team conducted a mass defacement attack against JMDPL Mahila College, an Indian educational institution. The attack targeted a Linux-based web server, deploying a defacement page at a non-root path indicating a targeted file upload or injection. This incident is part of a broader mass defacement campaign attributed to the same threat actor and team.
    Date: 2026-05-16T07:50:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249294
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: JMDPL Mahila College
    Victim Site: www.jmdplmahilacollege.ac.in
  425. Mass Website Defacement of MLS College by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, the threat actor YIIX103, operating under the TangerangXploit Team, conducted a mass defacement attack targeting MLS Colleges web server running on Linux. The defacement was deployed via a PHP shell (yo.php), indicating unauthorized file upload or remote code execution capabilities. This incident is part of a broader mass defacement campaign attributed to the same threat actor.
    Date: 2026-05-16T07:49:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249299
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: MLS College
    Victim Site: www.mlscollege.ac.in
  426. Mass Web Defacement by TangerangXploit Team Targeting HSC Academic Institution
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass web defacement against hsc.ac.in, an academic institution in India. The attack targeted a Linux-based server and compromised a secondary page (yo.php) rather than the homepage, indicating a targeted intrusion within a broader mass defacement campaign. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T07:49:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249295
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: HSC (Higher Secondary Certificate) Academic Institution
    Victim Site: www.hsc.ac.in
  427. Mass Web Defacement of Indian Academic Institution by TangerangXploit Team
    Category: Defacement
    Content: On May 16, 2026, threat actor YIIX103 operating under the TangerangXploit Team conducted a mass web defacement targeting www.kmdc.ac.in, an Indian academic institution running on a Linux server. The attack involved the placement of a defacement page at a non-homepage URL, indicating a targeted file-level compromise rather than a full site takeover. This incident is part of a broader mass defacement campaign attributed to the TangerangXploit Team, a likely Indonesian hacktivist group.
    Date: 2026-05-16T07:48:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249297
    Screenshots:
    None
    Threat Actors: YIIX103, TangerangXploit Team
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Karnataka Milk Federation Development Cooperative (KMDC)
    Victim Site: www.kmdc.ac.in
  428. Sale of UK shopping-targeted combo list (Hotmail, Blueyonder, AOL)
    Category: Combo List
    Content: A combo list of 134,641 email:password credentials associated with Hotmail, Blueyonder, and AOL UK accounts is being distributed on a cracking forum. The list is marketed as targeting shopping services. No additional details are available from the post content.
    Date: 2026-05-16T07:41:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-134-641-%E2%AD%90%EF%B8%8F-hotmail-blueyonder-aol-UK-Shopping-Target-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  429. Sale of Germany-targeted shopping combo list with 403,391 lines
    Category: Combo List
    Content: A threat actor is distributing a combo list of 403,391 email:password credential pairs marketed as high-quality and targeting German shopping platforms. The post is categorized as a credential stuffing resource rather than a breach of any specific organization.
    Date: 2026-05-16T07:40:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-403-391-Lines-%E2%9C%85-Shopping-Target-HQ-Germany-De-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  430. Sale of DataCamp 12-month learning workflow support service
    Category: Services
    Content: A forum user is selling a $19.99 service advertised as 12-month learning workflow guidance for DataCamp-style data science and analytics education. The offering includes study support for Python, SQL, and machine learning, as well as course planning and portfolio project guidance. No threat activity or victim organization is identified in this post.
    Date: 2026-05-16T07:19:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-19-99-%E2%9C%85-Master-Data-Skills-All-Year-%E2%80%93-DataCamp-12-Month-Learning-Workflow-Support
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  431. Rate Limit Bypass Techniques Article Published on Cybercrime Forum
    Category: Alert
    Content: A forum article published on T1 details techniques for bypassing rate limiting mechanisms, including header manipulation (X-Forwarded-For, X-Real-IP), User-Agent spoofing, URL case variation, parameter pollution, and IP rotation. The content is framed as a reference for penetration testers and bug bounty hunters but covers offensive bypass methods applicable to brute-force and abuse scenarios.
    Date: 2026-05-16T07:17:58Z
    Network: openweb
    Published URL: https://tier1.life/thread/231
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  432. Non-threat content: automotive reference material shared on forum
    Category: Alert
    Content: A forum member shared a compressed archive containing a two-part book on Chevrolet Big Block engines via an external file-hosting link. The post contains no threat-relevant content and does not appear to be related to cybercrime activity.
    Date: 2026-05-16T07:16:23Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-For-those-who-do-something-other-than-sit-on-their-dead-ass-lol
    Screenshots:
    None
    Threat Actors: OriginalCrazyOldFart
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  433. Alleged data breach of Galatasaray University
    Category: Data Breach
    Content: A threat actor claims to have breached Galatasaray University in Istanbul, Turkey. The post alleges the compromised data includes names, identity information, and credentials that purportedly allow access to and control of the universitys systems. No specific record count or price was mentioned.
    Date: 2026-05-16T07:14:39Z
    Network: openweb
    Published URL: https://breached.st/threads/galatasaray-universitesi.87181/unread
    Screenshots:
    None
    Threat Actors: karlsssaaa1
    Victim Country: Turkey
    Victim Industry: Education
    Victim Organization: Galatasaray University
    Victim Site: gsu.edu.tr
  434. Website Defacement of coupleserrageroue.com by Y4NZ404
    Category: Defacement
    Content: On May 16, 2026, the website coupleserrageroue.com was defaced by a lone threat actor operating under the handle Y4NZ404 with no affiliated team group beyond SOLO. The attack resulted in a homepage defacement, replacing the sites content with the attackers messaging. No specific motivation or vulnerability details were disclosed in connection with the incident.
    Date: 2026-05-16T07:14:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923109
    Screenshots:
    None
    Threat Actors: Y4NZ404, SOLO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Couples Errage Roue
    Victim Site: coupleserrageroue.com
  435. Publication of AMSI Bypass Technique Using Page Guard Exceptions with Proof-of-Concept Code
    Category: Vulnerability
    Content: A threat actor published a detailed technical writeup describing a patchless AMSI bypass technique leveraging Page Guard Exceptions and Vectored Exception Handlers (VEH) to intercept and neutralize AmsiScanBuffer before a full scan occurs. The technique is implemented as both shellcode and a PowerShell-native solution, with source code published on GitHub. The post claims the method successfully bypasses Windows Defender for Endpoint during malicious payload execution inside PowerShell.
    Date: 2026-05-16T06:59:43Z
    Network: openweb
    Published URL: https://tier1.life/thread/230
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  436. Alleged sale of web shell access and automated exploitation tools
    Category: Initial Access
    Content: Threat actor offering shell access (GSC, DR 17, Terminal) and cyber tools package including brute force, shell finder, auto exploit, RCE, web grabber, and CMS checkers (cPanel, WordPress, Joomla). Priced at 400K (currency unspecified). Contact via @person131.
    Date: 2026-05-16T06:44:10Z
    Network: telegram
    Published URL: https://t.me/c/3755871403/491
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  437. Free distribution of URL:Log:Pass combo list with 8+ million lines
    Category: Combo List
    Content: A threat actor shared a URL:Log:Pass combo list containing over 8 million lines on a cybercrime forum. The content is offered for free to registered forum members. The post is part of a recurring series (part 344), suggesting ongoing distribution of credential data.
    Date: 2026-05-16T06:43:37Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-344
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  438. Alleged data breach of Stansberry Research
    Category: Data Breach
    Content: A threat actor has shared a dataset allegedly sourced from Stansberry Research containing approximately 1,179,000 records. The data includes email addresses, full names, phone numbers, physical addresses, and internal account identifiers such as TradeSmith and SNA IDs. No prices were mentioned, suggesting the data was freely distributed on the forum.
    Date: 2026-05-16T06:40:26Z
    Network: tor
    Published URL: http://pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd.onion/Thread-DATABASE-Stansberry-Research
    Screenshots:
    None
    Threat Actors: STOMP2
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Stansberry Research
    Victim Site: stansberry.com
  439. Website Defacement of Bandenspanningauto.nl by Y4NZ404
    Category: Defacement
    Content: On May 16, 2026, the Dutch automotive website bandenspanningauto.nl was defaced by a solo threat actor operating under the handle Y4NZ404. The attack targeted the homepage and is classified as a single-site defacement. The incident was mirrored and documented by zone-xsec.com with reference ID 923108.
    Date: 2026-05-16T06:40:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923108
    Screenshots:
    None
    Threat Actors: Y4NZ404, SOLO
    Victim Country: Netherlands
    Victim Industry: Automotive
    Victim Organization: Bandenspanningauto
    Victim Site: bandenspanningauto.nl
  440. Website Defacement of Nigerian Government Portal by T-XpLoiT
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as T-XpLoiT defaced a subdomain of the Katsina Investment Promotion Agency (KIPA), a Nigerian state government entity, by replacing the hosted content with a defacement page. The targeted URL was fdi.kipa.kt.gov.ng/deface.html, hosted on a Linux-based server. This was a targeted single-site defacement, not part of a mass defacement campaign.
    Date: 2026-05-16T06:17:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249288
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Nigeria
    Victim Industry: Government
    Victim Organization: Katsina State Government – Katsina Investment Promotion Agency (KIPA)
    Victim Site: fdi.kipa.kt.gov.ng
  441. Free combo list of 18K mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 18,000 mixed email:password credentials via an external paste link. The list is described as valid and is available for free download.
    Date: 2026-05-16T06:11:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-18K-MIXED-VALID
    Screenshots:
    None
    Threat Actors: COYYT
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  442. Hotmail credential combo list shared on cracking forum
    Category: Combo List
    Content: A forum post on Cracked.st advertises Hotmail credential hits. No further details are available as the post content is empty.
    Date: 2026-05-16T06:11:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-HOTMAIL-HITS–2094566
    Screenshots:
    None
    Threat Actors: racola
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  443. Mass Website Defacement of sschnitzer.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement campaign targeting sschnitzer.com, a Linux-based web server. The defacement was confirmed as part of a broader mass defacement operation, with a mirror of the defaced page archived at haxor.id. No specific motivation or server software details were disclosed in the available data.
    Date: 2026-05-16T06:11:22Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249281
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: S. Schnitzer
    Victim Site: sschnitzer.com
  444. Mass Defacement of Mor Diamonds by Inside Alone7 (Hidden Cyber Crime)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting mor-diamonds.com, a jewelry-related website hosted on a Linux server. The defacement was confirmed via a mirror archived at haxor.id, indicating the attackers intent to publicly claim the compromise. This incident is part of a broader mass defacement campaign attributed to the same actor.
    Date: 2026-05-16T06:10:48Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249271
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Mor Diamonds
    Victim Site: mor-diamonds.com
  445. Mass Defacement of Vivial Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting vivialdiamonds.com, a jewelry-related website hosted on a Linux server. The defacement was part of a broader mass defacement campaign, with the compromised page archived at haxor.id. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-05-16T06:10:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249286
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Vivial Diamonds
    Victim Site: vivialdiamonds.com
  446. Mass Defacement of Lazarov Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting lazarovdiamonds.com, a jewelry-related website hosted on a Linux server. The defacement was identified as part of a broader mass defacement operation rather than an isolated or repeated attack. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T06:09:47Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249268
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Lazarov Diamonds
    Victim Site: lazarovdiamonds.com
  447. Mass Defacement of Skymoon Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, the threat actor Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement campaign targeting skymoondiamonds.com. The defacement was hosted on a cloud-based server and is part of a broader mass defacement operation. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-16T06:09:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249279
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Skymoon Diamonds
    Victim Site: skymoondiamonds.com
  448. Combo list targeting Hotmail domains distributed on cracking forum
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 6 million credentials targeting Hotmail domains (.com, .fr, .es) via a cracking forum and associated Telegram channels. The post advertises free combo lists and tools through two Telegram groups. The credentials are intended for social-oriented credential stuffing attacks.
    Date: 2026-05-16T06:09:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75423/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  449. Mass Defacement of tbdstock.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack against tbdstock.com, a stock-related web platform running on a Linux server. The defacement was not targeting the homepage and is part of a broader mass defacement campaign. The incident was archived and mirrored on haxor.id.
    Date: 2026-05-16T06:08:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249283
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Finance / Stock Trading
    Victim Organization: TBD Stock
    Victim Site: tbdstock.com
  450. Mass Defacement Campaign by Inside Alone7 of Hidden Cyber Crime targeting sasportasdiam.com
    Category: Defacement
    Content: The threat actor Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack against sasportasdiam.com on May 16, 2026. The attack targeted a Linux-based server and was part of a broader mass defacement campaign rather than an isolated incident. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-16T06:08:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249278
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Sas Portas Diam
    Victim Site: sasportasdiam.com
  451. Mass Web Defacement by Inside Alone7 of Hidden Cyber Crime targeting technoshvavltd.com
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass web defacement targeting technoshvavltd.com. The attack was carried out on a Linux-based server, with the defacement content hosted at the path /1000.txt. This incident is part of a broader mass defacement campaign attributed to the same actor.
    Date: 2026-05-16T06:07:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249285
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Techno Shvavl Ltd
    Victim Site: technoshvavltd.com
  452. Mass Web Defacement by Inside Alone7 of Hidden Cyber Crime targeting ydvash.com
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass web defacement campaign that included the domain ydvash.com. The defacement was recorded and archived via haxor.id, indicating it is part of a broader coordinated mass defacement operation. No specific motivation or additional technical indicators were disclosed.
    Date: 2026-05-16T06:07:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249287
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ydvash
    Victim Site: ydvash.com
  453. Mass Defacement of Maroz Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack against marozdiamonds.com, a jewelry-related website running on a Linux server. The defacement was part of a broader mass defacement campaign, with the altered page archived at haxor.id. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-05-16T06:06:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249269
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Maroz Diamonds
    Victim Site: marozdiamonds.com
  454. Mass Defacement of nourican.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting nourican.com, a Linux-based web server. The defacement was confirmed via a mirrored archive and represents one of multiple sites compromised in this operation. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-05-16T06:06:16Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249274
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Nourican
    Victim Site: nourican.com
  455. Mass Defacement of Israeli Diamond Retailer by Hidden Cyber Crime Group
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack against moti-israeli-diamonds.com, a website associated with the Israeli diamond trade industry. The attack targeted a Linux-based server and was confirmed as part of a broader mass defacement campaign. The defacement was archived and mirrored via haxor.id.
    Date: 2026-05-16T06:05:48Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249273
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Retail / Luxury Goods (Diamond Trade)
    Victim Organization: Moti Israeli Diamonds
    Victim Site: moti-israeli-diamonds.com
  456. Mass Defacement of Regent Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting regentdiam.com, a domain associated with the diamond or gemstone industry. The defacement was hosted on a Linux-based server and archived via haxor.id. This incident was part of a broader mass defacement operation rather than an isolated single-site attack.
    Date: 2026-05-16T06:05:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249275
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Jewelry / Diamonds
    Victim Organization: Regent Diamonds
    Victim Site: regentdiam.com
  457. Website Redefacement of Skymoon Diamonds by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: The threat actor Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a redefacement attack against the jewelry retailer Skymoon Diamonds on May 16, 2026. This incident marks a repeated compromise of the same target, indicating persistent access or recurring vulnerability exploitation. The defacement was not classified as a mass or home page defacement, suggesting a specific subdirectory or page was targeted.
    Date: 2026-05-16T06:04:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923100
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Skymoon Diamonds
    Victim Site: www.skymoondiamonds.com
  458. Mass Defacement of moshenamdar.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement campaign targeting moshenamdar.com, a Linux-based web server. The defacement was confirmed via a mirrored archive and represents one of multiple sites targeted in the same operation. No specific motivation or server software details were disclosed.
    Date: 2026-05-16T06:04:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249272
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Moshe Namdar
    Victim Site: moshenamdar.com
  459. Mass Defacement of Israeli Website by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack targeting restartilana.co.il, an Israeli website hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement campaign, with the compromised page archived at haxor.id. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-05-16T06:03:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249276
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Restart Ilana
    Victim Site: restartilana.co.il
  460. Mass Defacement of sleipnirworld.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting sleipnirworld.com hosted on a Linux server. The defacement was confirmed as part of a mass defacement campaign, with a mirror of the attack archived at haxor.id. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-05-16T06:03:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249280
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Sleipnir World
    Victim Site: sleipnirworld.com
  461. Mass Defacement Campaign by Hidden Cyber Crime Targeting Israeli Website s-yahalom.co.il
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting the Israeli website s-yahalom.co.il. The defacement was carried out on a Linux-based server, with the compromised content archived at haxor.id. This incident is part of a broader mass defacement campaign attributed to the same threat actor.
    Date: 2026-05-16T06:02:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249277
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: S. Yahalom
    Victim Site: s-yahalom.co.il
  462. Alleged cyberattack on US gas station fuel monitoring systems
    Category: Cyber Attack
    Content: According to CNN reporting, monitoring systems for fuel reserves at gas stations across multiple US states were targeted in a cyberattack. Attackers gained access to these systems and manipulated the readings displayed on fuel tank monitoring displays. US cybersecurity experts warned that this access could enable attackers to conceal actual fuel leaks or gas leaks from monitoring systems.
    Date: 2026-05-16T06:02:25Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21731
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: United States
    Victim Industry: Energy/Fuel Distribution
    Victim Organization: US gas station networks (multiple states)
    Victim Site: Unknown
  463. Mass Defacement of msdiamtx.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement targeting store.msdiamtx.com, a Linux-based e-commerce platform. The defacement was confirmed via a mirror archived at haxor.id and was part of a broader mass defacement campaign rather than an isolated or repeated attack. No specific motivation or server software details were disclosed in the available data.
    Date: 2026-05-16T06:02:07Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249282
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / E-Commerce
    Victim Organization: MS Diamtx Store
    Victim Site: store.msdiamtx.com
  464. Email traffic service sought for cryptocurrency exchange targets
    Category: Services
    Content: A forum user is seeking individuals capable of delivering bulk emails targeting cryptocurrency exchanges. The post solicits contact from providers and suggests financial incentives for successful email traffic delivery.
    Date: 2026-05-16T05:57:08Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-EMAIL-TRAFFIC
    Screenshots:
    None
    Threat Actors: sillyrhymes
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  465. Website Defacement of drjeanvieira.com.br by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Brazilian website drjeanvieira.com.br, likely belonging to a medical professional named Dr. Jean Vieira. The defacement was a targeted, non-mass incident with a mirror archived at zone-xsec.com.
    Date: 2026-05-16T05:56:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923036
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Healthcare
    Victim Organization: Dr. Jean Vieira
    Victim Site: drjeanvieira.com.br
  466. Mass Defacement of gilkimchi.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack against gilkimchi.com, a website likely associated with a kimchi or Korean food brand. The attack targeted a Linux-based web server and was confirmed as part of a broader mass defacement campaign. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-16T05:55:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249260
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Food and Beverage
    Victim Organization: Gil Kimchi
    Victim Site: gilkimchi.com
  467. Mass Website Defacement by Inside Alone7 of Hidden Cyber Crime targeting dsl-lab.net
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack against dsl-lab.net, a Linux-based web server. The defacement was recorded and mirrored at haxor.id, indicating it is part of a broader mass defacement campaign. No specific motive or proof-of-concept details were disclosed.
    Date: 2026-05-16T05:55:01Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249249
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Technology / Research
    Victim Organization: DSL Lab
    Victim Site: dsl-lab.net
  468. Mass Defacement by Inside Alone7 of Hidden Cyber Crime targeting dorith-teichman.com
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack against dorith-teichman.com, a Linux-based web server. The defacement was confirmed as part of a broader mass defacement campaign, with the compromised page archived at haxor.id. No specific motivation or proof-of-concept details were disclosed.
    Date: 2026-05-16T05:54:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249248
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Dorith Teichman
    Victim Site: dorith-teichman.com
  469. Mass Web Defacement by Inside Alone7 of Hidden Cyber Crime targeting eglasia.com.hk
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass web defacement targeting eglasia.com.hk, a domain associated with Hong Kong. The attack was executed on a Linux-based server and is classified as a mass defacement campaign. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-16T05:54:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249254
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Hong Kong
    Victim Industry: Unknown
    Victim Organization: EGL Asia
    Victim Site: eglasia.com.hk
  470. Mass Defacement of Israeli Stock/Finance Site by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting easystock.co.il, an Israeli stock or financial services website running on a Linux server. The defacement was part of a broader mass defacement operation, with a mirror of the attack archived at haxor.id. No specific motivation or proof-of-concept details were provided.
    Date: 2026-05-16T05:53:50Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249250
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Finance / Stock Trading
    Victim Organization: EasyStock
    Victim Site: easystock.co.il
  471. Mass Defacement Campaign by Hidden Cyber Crime (Inside Alone7) Targeting easystockdiam.com
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack against easystockdiam.com, a likely diamond or stock trading related website hosted on a Linux server. The defacement was part of a broader mass defacement campaign, with the compromised page archived at haxor.id. No specific geopolitical motive or server IP was disclosed in the available data.
    Date: 2026-05-16T05:53:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249251
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Finance / Retail (Diamonds/Stocks)
    Victim Organization: Easy Stock Diam
    Victim Site: easystockdiam.com
  472. Mass Defacement of Israeli Website by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement campaign targeting daiky.co.il, an Israeli website hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement operation, with the compromised page archived at haxor.id. No specific motive or exploited vulnerability was publicly disclosed.
    Date: 2026-05-16T05:52:57Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249242
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Daiky
    Victim Site: daiky.co.il
  473. Website Defacement of Lancer Curitiba by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the Brazilian website lancercuritiba.com.br was defaced by threat actor chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) and was neither a mass nor a home page defacement, suggesting a targeted file-level intrusion. No specific motive or proof of concept was disclosed.
    Date: 2026-05-16T05:52:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923040
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Automotive / Sports
    Victim Organization: Lancer Curitiba
    Victim Site: lancercuritiba.com.br
  474. Mass defacement of Diamond Services Hong Kong by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting diamondservices.com.hk, a professional services organization based in Hong Kong. The defacement was carried out on a Linux-based server and was confirmed as part of a broader mass defacement operation. The incident was archived via haxor.id with mirror reference 249247.
    Date: 2026-05-16T05:51:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249247
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Hong Kong
    Victim Industry: Professional Services
    Victim Organization: Diamond Services
    Victim Site: diamondservices.com.hk
  475. Website Defacement of isellbrasil.com.br by chinafans of 0xTeam
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xTeam, defaced the Brazilian website isellbrasil.com.br by placing a defacement file at the path /0x.txt. The incident was a targeted, single-site defacement with no mass or redefacement indicators, and server details remain unknown.
    Date: 2026-05-16T05:51:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923038
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: E-commerce / Retail
    Victim Organization: iSell Brasil
    Victim Site: isellbrasil.com.br
  476. Website Defacement of Nossa Distribuicao by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as chinafans, affiliated with 0xteam, defaced the Brazilian website nossadistribuicao.com.br. The attack was a targeted single-page defacement, not classified as a mass or home page defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-16T05:50:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923044
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Distribution/Retail
    Victim Organization: Nossa Distribuicao
    Victim Site: nossadistribuicao.com.br
  477. Combo list of EU mixed credentials distributed on forum
    Category: Combo List
    Content: A threat actor operating under the alias BedrockDB has shared a combo list of approximately 200 email:password credential pairs targeting mixed European users. The content is hidden behind a forum registration/login wall. No specific breached organization is identified.
    Date: 2026-05-16T05:50:26Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%92%8E-0-2k-elite-eu-mixed-email-pass-bedrockdb-premier-drop-%F0%9F%92%8E
    Screenshots:
    None
    Threat Actors: BedrockDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  478. Mass Defacement of David Levy Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting davidlevydiamonds.com, a jewelry retail website. The defacement was carried out on a Linux-based server and is part of a broader mass defacement campaign. A mirror of the defacement has been archived at haxor.id.
    Date: 2026-05-16T05:49:57Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249243
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: United States
    Victim Industry: Retail / Jewelry
    Victim Organization: David Levy Diamonds
    Victim Site: davidlevydiamonds.com
  479. Sale of SMTP credential cracking tool
    Category: Combo List
    Content: A forum post advertises what is claimed to be a best-in-class SMTP cracker tool for 2026. No further content was available to assess capabilities, pricing, or targeted services.
    Date: 2026-05-16T05:49:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9A%A1-BEST-SMTP-CRACKER-IN-2026-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: racola
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  480. Mass Defacement of easystockhosting.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack against easystockhosting.com, a web hosting provider running on a Linux server. The defacement was confirmed as a mass defacement campaign, with the compromised page archived at haxor.id. No specific motivation or exploited vulnerability was publicly disclosed.
    Date: 2026-05-16T05:49:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249252
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Web Hosting / Technology
    Victim Organization: Easy Stock Hosting
    Victim Site: easystockhosting.com
  481. Mass Defacement of Ilan Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting ilandiamonds.com, a diamonds retail or wholesale organization. The defacement was hosted on a Linux-based server and has been archived via haxor.id. This incident was part of a broader mass defacement campaign rather than an isolated targeted attack.
    Date: 2026-05-16T05:49:03Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249264
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Ilan Diamonds
    Victim Site: ilandiamonds.com
  482. Mass Website Defacement of EasyStockDiam by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting demo.easystockdiam.com, a Linux-based web server. The defacement was confirmed as part of a mass defacement campaign, with the compromised page archived at haxor.id. The targeted domain appears to be associated with a stock or diamond trading e-commerce platform.
    Date: 2026-05-16T05:48:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249244
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: E-Commerce / Retail
    Victim Organization: EasyStockDiam
    Victim Site: demo.easystockdiam.com
  483. Mass Defacement of Korn Diamonds by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack targeting korndiamonds.com, a jewelry retailer. The attack was carried out on a Linux-based server, with the defacement artifact hosted at the path /1000.txt. This incident was part of a broader mass defacement campaign attributed to the same threat actor.
    Date: 2026-05-16T05:48:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249266
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: United States
    Victim Industry: Retail / Jewelry
    Victim Organization: Korn Diamonds
    Victim Site: korndiamonds.com
  484. Website Defacement of Eyal Italy by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, defaced the website eyalitaly.co.il, an Israeli fashion or retail entity. The defacement was a targeted single-site attack hosted on a cloud-based server. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-16T05:47:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249257
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Retail / Fashion
    Victim Organization: Eyal Italy
    Victim Site: eyalitaly.co.il
  485. Mass Defacement Campaign by Hidden Cyber Crime Team Targeting ben-yona.com
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack against ben-yona.com, a website hosted on a Linux server. The defacement was catalogued and mirrored on haxor.id, indicating it is part of a broader mass defacement campaign rather than a targeted single-site attack. No specific motivation or proof-of-concept details were disclosed alongside the incident.
    Date: 2026-05-16T05:47:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249238
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Ben Yona
    Victim Site: ben-yona.com
  486. Website Defacement of Carol Beauty by 0xTeam (chinafans)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xTeam, defaced the Brazilian beauty and cosmetics e-commerce website pedidoscarolbeauty.com.br on May 16, 2026. The attack was a targeted single-site defacement, not a mass or home page defacement. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-05-16T05:46:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923045
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Retail / Beauty & Cosmetics
    Victim Organization: Carol Beauty
    Victim Site: pedidoscarolbeauty.com.br
  487. Mass Web Defacement of DiamBroker by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass web defacement targeting diambroker.com, a diamond or commodities brokerage platform. The defacement was hosted on a Linux-based server and archived via haxor.id. This incident is part of a broader mass defacement campaign attributed to the same threat actor.
    Date: 2026-05-16T05:46:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249246
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Finance / Commodities Brokerage
    Victim Organization: DiamBroker
    Victim Site: diambroker.com
  488. Website defacement of Vardi Jewelry by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, the website VARDIJEWELRY.COM was defaced by threat actor Inside Alone7, operating under the group Hidden Cyber Crime. The attack targeted a Linux-based web server hosting the jewelry retailers site. The incident was a targeted defacement, not classified as a mass or home page defacement, with a mirror of the defaced content archived at haxor.id.
    Date: 2026-05-16T05:45:43Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249234
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail – Jewelry
    Victim Organization: Vardi Jewelry
    Victim Site: VARDIJEWELRY.COM
  489. Mass Web Defacement by Inside Alone7 of Hidden Cyber Crime targeting balidiam.com
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass web defacement targeting balidiam.com, a Linux-hosted website. The attack was part of a broader mass defacement campaign, with a mirror of the defacement archived at haxor.id. No specific motive or proof of concept was disclosed.
    Date: 2026-05-16T05:45:14Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249237
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Bali Diam
    Victim Site: balidiam.com
  490. Mass Defacement of Cedar Trading Inc by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, the threat actor Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting cedartradinginc.com, a trading company. The defacement was deployed on a Linux-based server and is part of a broader mass defacement operation. A mirror of the defacement has been archived at haxor.id.
    Date: 2026-05-16T05:44:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249241
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Trade and Commerce
    Victim Organization: Cedar Trading Inc
    Victim Site: cedartradinginc.com
  491. Mass Defacement of brotfeld.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement operation targeting brotfeld.com hosted on a Linux server. The defacement was confirmed as part of a broader mass defacement campaign rather than a targeted single-site attack. A mirror of the defaced content was archived at haxor.id.
    Date: 2026-05-16T05:44:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249240
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Brotfeld
    Victim Site: brotfeld.com
  492. Mass Defacement of Israeli Diamond Retailer by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting alma-diamonds.co.il, an Israeli diamond retailer. The attack was carried out on a Linux-based server and the defaced page was archived at haxor.id. This incident is part of a broader mass defacement campaign rather than an isolated single-target attack.
    Date: 2026-05-16T05:43:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249236
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Retail / Luxury Goods (Diamond Industry)
    Victim Organization: Alma Diamonds
    Victim Site: alma-diamonds.co.il
  493. Mass Defacement of Goldiamint by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack targeting goldiamint.com, a platform likely associated with gold-backed digital assets or cryptocurrency services. The defacement was executed on a Linux-based server and was confirmed as part of a mass defacement campaign. The incident was archived and mirrored via haxor.id.
    Date: 2026-05-16T05:43:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249261
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Financial Services / Cryptocurrency
    Victim Organization: Goldiamint
    Victim Site: goldiamint.com
  494. Website Defacement of Vitalcorpo by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as chinafans, operating under the group 0xteam, defaced the Brazilian website vitalcorpo.com.br. The defacement was a targeted single-site incident, leaving a text-based payload at the path /0x.txt. No specific motivation or vulnerability details were disclosed in the available intelligence.
    Date: 2026-05-16T05:42:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923049
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Health & Wellness
    Victim Organization: Vitalcorpo
    Victim Site: vitalcorpo.com.br
  495. Website Defacement of marcojenner.com by chinafans (0xteam)
    Category: Defacement
    Content: The website marcojenner.com was defaced by threat actor chinafans, operating under the team 0xteam, on May 16, 2026. The defacement was recorded as a single, non-mass, non-redefacement incident targeting a specific file path on the domain. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-16T05:42:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923041
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Marco Jenner
    Victim Site: marcojenner.com
  496. Mass Defacement of albert-robinson.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting albert-robinson.com. The attack was carried out on a Linux-based server, with a defacement file placed at the path /1000.txt. This incident was part of a broader mass defacement campaign attributed to the same actor.
    Date: 2026-05-16T05:41:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249235
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Albert Robinson
    Victim Site: albert-robinson.com
  497. Mass Web Defacement by Inside Alone7 of Hidden Cyber Crime targeting easystockhosting.com hosted site
    Category: Defacement
    Content: A threat actor identified as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass web defacement targeting a site hosted on easystockhosting.com on May 16, 2026. The defacement was not a re-defacement and was classified as part of a mass defacement campaign, affecting a Linux-based server. The incident was archived and mirrored on haxor.id.
    Date: 2026-05-16T05:41:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249239
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Web Hosting / Technology
    Victim Organization: Benyona
    Victim Site: benyona-new.easystockhosting.com
  498. Mass Defacement by Inside Alone7 of Hidden Cyber Crime targeting EGL Hong Kong hosting infrastructure
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement attack against a Linux-based web server hosted at egl-hk.easystockhosting.com. The attack targeted what appears to be a Hong Kong-based web hosting service, with the defacement artifact archived at haxor.id. This incident is classified as a mass defacement, suggesting multiple sites hosted on the same infrastructure were compromised simultaneously.
    Date: 2026-05-16T05:40:35Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249253
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Hong Kong
    Victim Industry: Web Hosting / Technology
    Victim Organization: EGL Easy Stock Hosting
    Victim Site: egl-hk.easystockhosting.com
  499. Website Defacement of Trade Finance Company Services by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced the website of Trade Finance Company Services. The attack was a targeted single-site defacement, with the mirror of the defaced page archived at zone-xsec.com. No specific motive or vulnerability details were disclosed in association with the incident.
    Date: 2026-05-16T05:40:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923052
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Trade Finance Company Services
    Victim Site: tradefinancecompanyservices.co…
  500. Mass Defacement of Israeli Jewelry Retailer by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement targeting engagementrings.co.il, an Israeli jewelry retailer. The attack targeted a Linux-based web server and was part of a broader mass defacement campaign. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-16T05:39:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249255
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Retail / Jewelry
    Victim Organization: Engagement Rings
    Victim Site: engagementrings.co.il
  501. Mass Defacement of Israeli Jewelry Retail Site by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting dev.engagementrings.co.il, an Israeli jewelry retail website. The attack was part of a broader mass defacement campaign and was executed on a Linux-based server. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-16T05:38:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249245
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Retail / Jewelry
    Victim Organization: Engagement Rings
    Victim Site: dev.engagementrings.co.il
  502. Mass defacement of havivmoreno.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting havivmoreno.com. The attack was carried out on a Linux-based server and involved the defacement of multiple sites as part of a coordinated mass defacement campaign. A mirror of the defaced page has been archived at haxor.id.
    Date: 2026-05-16T05:38:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249262
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Haviv Moreno
    Victim Site: havivmoreno.com
  503. Mass Defacement of Eydiamonds.com by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, conducted a mass defacement campaign targeting eydiamonds.com, a jewelry retail website hosted on a Linux server. The defacement was confirmed via a mirror archived at haxor.id and was part of a broader mass defacement operation rather than an isolated incident. No specific motive or proof-of-concept details were publicly disclosed.
    Date: 2026-05-16T05:38:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249258
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry
    Victim Organization: Eye Diamonds
    Victim Site: eydiamonds.com
  504. Mass Website Defacement of laurakoren.co.il by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, conducted a mass defacement attack targeting laurakoren.co.il, a website hosted on a Linux server in Israel. The defacement was confirmed as part of a mass defacement campaign, with a mirror of the attack archived at haxor.id. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-05-16T05:37:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249267
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Laura Koren
    Victim Site: laurakoren.co.il
  505. Website Defacement of Africa Trade Finance Company by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website of Africa Trade Finance Company was defaced by threat actor chinafans, operating under the group 0xteam. The attack was a targeted single-site defacement with no specified motive recorded. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-16T05:37:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923050
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Africa Trade Finance Company
    Victim Site: africatradefinancecompany.com
  506. Sale of private torrent tracker invitations on cracking forum
    Category: Services
    Content: A forum user is selling invitations to multiple private torrent and usenet trackers including PassThePopcorn, Empornium, Nebulance, UHDBits, NZBs.in, and PixelHD, with prices ranging from $100 to $350 per invite. Payment is accepted in LTC or BTC. No breach or compromised data is involved; the seller is offering legitimate-style membership access to invite-only communities.
    Date: 2026-05-16T05:33:34Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-Selling-PassThePopcorn-invite-350–2294907
    Screenshots:
    None
    Threat Actors: KenTAur
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  507. Website Defacement of Dra. Daniela Cordeiro by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced the website of Dra. Daniela Cordeiro, a Brazilian healthcare professional. The incident was a targeted, single-site defacement with a mirror archived on zone-xsec.com. No specific motive or server details were disclosed.
    Date: 2026-05-16T05:31:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923035
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Healthcare
    Victim Organization: Dra. Daniela Cordeiro
    Victim Site: dradanielecordeiro.com.br
  508. Combo List: Mixed Email:Password Credentials (25,000 Records)
    Category: Combo List
    Content: A mixed email:password combo list containing 25,000 records was shared on a cracking forum. The post was made under the username UniqueCombo and appears to offer credentials for credential stuffing or account takeover activity. No specific targeted service or origin breach was identified.
    Date: 2026-05-16T05:30:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-MIX-Unique-Combo-1-25000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  509. Combo List targeting European and German shopping platforms
    Category: Combo List
    Content: A combo list of 330,254 email:password lines is being shared on a cracking forum, marketed as targeting European and German shopping platforms. No further details about the data source or specific targeted services are provided in the post.
    Date: 2026-05-16T05:30:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-330-254-Lines-%E2%9C%85-Europa-Germany-Shopping-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  510. Sale of compromised streaming and service accounts including Netflix, ChatGPT, and NordVPN
    Category: Carding
    Content: A threat actor operating via fastsub.vip and Telegram (@Fastsubvip) is selling accounts for streaming and online services including Netflix, ChatGPT, and NordVPN. The post advertises full support for buyers and directs customers to an external shop.
    Date: 2026-05-16T05:29:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90-Ultimate-Streaming-Accounts-%E2%9A%A1-NETFLIX-CHATGPT-NORDVPN-%E2%AD%90-Full-Support-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: ZapDiZen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  511. Sale of premium account subscriptions including ChatGPT, YouTube, and Prime Video
    Category: Services
    Content: A threat actor operating under the alias ZapDiZen is advertising a service selling premium accounts for platforms including ChatGPT, YouTube, and Amazon Prime Video via their shop at Fastsub.vip and a Telegram channel. The post is listed under the Services forum section and references high ratings, suggesting an established seller. No specific breach or data leak is claimed.
    Date: 2026-05-16T05:29:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1-Cinematic-Social-Premium-%E2%AD%90-ChatGPT-YouTube-Prime-Video-%E2%9A%A1-Highly-Rated-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: ZapDiZen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  512. Alleged defacement of Ghana Army website by Nullsec Philippines
    Category: Defacement
    Content: Nullsec Philippines claims to have defaced the Ghana Army website. A screenshot is provided as proof of the defacement.
    Date: 2026-05-16T05:18:17Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/1061
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Ghana
    Victim Industry: Government/Military
    Victim Organization: Ghana Army
    Victim Site: Unknown
  513. Alleged compromise of German hydroelectric power plant SCADA system by DDoSia Project
    Category: Cyber Attack
    Content: DDoSia Project volunteers claim to have gained full control of a small hydroelectric power plants SCADA/HMI system in Germany running Windows CE. The post details real-time access to critical infrastructure including turbine control (T1/T2), hydraulic systems, pressure monitoring, valves, and all analog signals. The threat actor claims the industrial controller was exposed on the internet without proper protection.
    Date: 2026-05-16T04:56:19Z
    Network: telegram
    Published URL: https://t.me/c/3087552512/1959
    Screenshots:
    None
    Threat Actors: DDoSia Project
    Victim Country: Germany
    Victim Industry: Energy/Utilities
    Victim Organization: Hydroelectric power plant
    Victim Site: Unknown
  514. Combo list of Hotmail credentials freely shared on cracking forum
    Category: Combo List
    Content: A threat actor known as D4rkNetHub shared a combo list of 3,279 Hotmail credentials via a Mega.nz link on a cracking forum. The credentials are marketed as verified hits and distributed for free.
    Date: 2026-05-16T04:55:20Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-3-279-Good-HOTMAIL-GOODS-D4RKNETHUB-CLOUD-16-05-26
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  515. Alleged data breach of Lahore Grammar School
    Category: Data Breach
    Content: A threat actor claims to have breached Lahore Grammar School (LGS) in Pakistan, allegedly exfiltrating approximately 30,000 records covering students and their parents. Exposed data reportedly includes names, CNIC numbers, cell phone numbers, email addresses, residential addresses, dates of birth, health information, and other personal details. Sample records containing parent and student PII were posted to substantiate the claim.
    Date: 2026-05-16T04:54:48Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-Lahore-Grammar-School-Flagship-Elite-Students-Parents-Database-PAKISTAN
    Screenshots:
    None
    Threat Actors: Flipperone
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: Lahore Grammar School
    Victim Site: lgs.edu.pk
  516. Combo List: 29.9K Alleged HQ Hotmail Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 29,900 Hotmail credentials marketed as high-quality valid hits. The content is gated behind registration or login on the forum. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-16T04:52:06Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1%E2%9A%A129-9k-hq-hotmail-access-valid-hits-frash-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: gostjac
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  517. Alleged data breach of OpenAI – Internal credentials and information stolen in TanStack supply chain attack
    Category: Data Breach
    Content: OpenAI disclosed that during a cyberattack on the open-source TanStack project, a limited portion of internal information and credentials were stolen. The company confirmed no evidence of access to user data or main systems. Compromised versions contained malware designed to steal credentials and propagate to other systems. OpenAI has replaced digital certificates for some of its software.
    Date: 2026-05-16T04:51:35Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21727
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: United States
    Victim Industry: Artificial Intelligence / Software
    Victim Organization: OpenAI
    Victim Site: openai.com
  518. Free South Korea email list distribution (Batch 44/100)
    Category: Combo List
    Content: A threat actor is freely distributing a batch of South Korea email credentials, labeled as batch 44 of 100. The content is gated behind forum registration or login. No further details about record count or data source are provided.
    Date: 2026-05-16T04:33:50Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-44-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  519. Alleged sale of webshell access to Indonesian government websites
    Category: Initial Access
    Content: Threat actor MR.X MARKET is offering webshell access to multiple Indonesian websites for sale, including government desa (village) portals and Mandiri Tech infrastructure. Contact via Telegram @Mr_Lonely403 for purchase.
    Date: 2026-05-16T04:32:50Z
    Network: telegram
    Published URL: https://t.me/webshellRandom/19
    Screenshots:
    None
    Threat Actors: MR.X MARKET
    Victim Country: Indonesia
    Victim Industry: Government, Financial Technology
    Victim Organization: Multiple Indonesian government institutions and Mandiri Tech
    Victim Site: gandasolidesa.id, kawungluwukdesa.id, buniaradesa.id, kmv14.mandiritech.my.id, webapp.mandiritech.my.id, tanjungsiangdesa.id, sdp.mandiritech.my.id, sirapdesa.id, rancamanggungdesa.id, notabis.mandiritech.my.id
  520. Sale of combo list targeting Hotmail, Yahoo, and French streaming services
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 4 million credentials targeting Hotmail, Yahoo, French email providers (orange.fr), and streaming services. The list is advertised as free via Telegram channels, with additional combos available on request.
    Date: 2026-05-16T04:21:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75420/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  521. Sale of educational sector combo list
    Category: Combo List
    Content: A combo list marketed for educational sector credential stuffing is being offered on a cracking forum. The thread title suggests a hit rate of 98,180 or 98.180 valid credentials. No further details are available from the post content.
    Date: 2026-05-16T04:20:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-98-180-%E2%9A%A1-Good-Edu-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  522. BreachForums announces partnership with The Gentlemen Ransomware-as-a-Service operation
    Category: Data Breach
    Content: BreachForums announced a formal partnership with a ransomware group calling itself The Gentlemen, advertising an active Ransomware-as-a-Service (RaaS) program. The post solicits affiliates including pentesters and access brokers to join the operation. A dedicated subdomain and a Tor-based data leak site (DLS) are provided as part of the partnership infrastructure.
    Date: 2026-05-16T04:16:15Z
    Network: openweb
    Published URL: https://breached.st/threads/breachforums-the-gentlemen-raas-partnership.87178/unread
    Screenshots:
    None
    Threat Actors: diencracked
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  523. Alleged data breach of Swan Bitcoin
    Category: Data Breach
    Content: A threat actor is sharing an alleged database dump from Swan Bitcoin containing 235,000+ records. The dataset includes personally identifiable information such as email addresses, names, phone numbers, physical addresses, birthdates, KYC status, account details, and Bitcoin transaction data. Sample records indicate affected individuals are primarily US-based customers and account holders.
    Date: 2026-05-16T04:16:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Swan-Bitcoin
    Screenshots:
    None
    Threat Actors: david20
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Swan Bitcoin
    Victim Site: swanbitcoin.com
  524. Alleged data leak of FTX claimants data from Kroll breach
    Category: Data Leak
    Content: A threat actor has shared a dataset attributed to the 2023 Kroll data breach, containing 198,000 records of FTX bankruptcy claimants. The data includes applicant IDs, email addresses, phone numbers, countries, AML review statuses, and compliance tags. The content is gated behind a reply or account upgrade requirement on the forum.
    Date: 2026-05-16T04:15:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FTX-Claimants-Kroll-Breach
    Screenshots:
    None
    Threat Actors: david20
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Kroll
    Victim Site: kroll.com
  525. Sale of initial access to a Brazilian raffle website with winner manipulation capability
    Category: Initial Access
    Content: A threat actor is offering administrative access to an unnamed Brazilian raffle website for R$50,000. The seller claims the access allows manipulation of the raffle outcome, including switching vendors or selecting the winner of an active R$650,000 prize draw.
    Date: 2026-05-16T04:09:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-access-to-a-Brazilian-raffle-website-you-can-change-the-winner
    Screenshots:
    None
    Threat Actors: justicedos
    Victim Country: Brazil
    Victim Industry: Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  526. Alleged data breach of Kintetsu World Express Singapore
    Category: Data Breach
    Content: A threat actor is selling approximately 130 GB of data allegedly stolen from Kintetsu World Express Singapore. The offering includes what appears to be a database backup file (Tradenet41_backup_2026_02_05) of approximately 27 GB along with additional files. Screenshots have been posted as proof of the data.
    Date: 2026-05-16T04:08:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Kintetsu-World-Express-KWE-Singapore
    Screenshots:
    None
    Threat Actors: Moneyistime
    Victim Country: Singapore
    Victim Industry: Logistics
    Victim Organization: Kintetsu World Express
    Victim Site: kwe.com
  527. Alleged data breach of ANDE (ande.gov.py)
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from ande.gov.py, the official site of Paraguays national electricity administration. The dataset reportedly contains 50,000 records in CSV/SQL format with fields including full name, email, phone number, address, and NIS (customer identifier). Sample data provided in the post appears to show customer service contact submissions.
    Date: 2026-05-16T04:07:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-ande-gov-py%C2%A0Database-Paraguay-50K
    Screenshots:
    None
    Threat Actors: camillaDF
    Victim Country: Paraguay
    Victim Industry: Government
    Victim Organization: ANDE (AdministraciĂłn Nacional de Electricidad)
    Victim Site: ande.gov.py
  528. Alleged data leak of Israeli company Shany Tech
    Category: Data Leak
    Content: A threat actor known as MDGhost666 has leaked approximately 246.32 GB of data allegedly belonging to Shany Tech, an Israeli testing and measuring equipment company. The leaked data includes CSV files containing user records, device information, enterprise applications, role assignments, and group data. Sample records include employee names, email addresses, phone numbers, account identifiers, and directory synchronization details.
    Date: 2026-05-16T04:06:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Israeli-company-SHANY-TECH-leaks-246-32GB-of-data
    Screenshots:
    None
    Threat Actors: MDGhost666
    Victim Country: Israel
    Victim Industry: Technology
    Victim Organization: Shany Tech
    Victim Site: shany-tech.com
  529. Alleged data breach of Nike
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database belonging to Nike (nike.com). The post provides a session ID as a contact method but does not disclose the number of records, data fields, or pricing details.
    Date: 2026-05-16T04:06:00Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-nike-com
    Screenshots:
    None
    Threat Actors: Saika
    Victim Country: United States
    Victim Industry: Retail
    Victim Organization: Nike
    Victim Site: nike.com
  530. Sale of SSH and RCE access to undisclosed organizations
    Category: Initial Access
    Content: A threat actor is offering SSH and remote code execution (RCE) access to multiple unspecified organizations, categorized by resource tier (high, medium, low). Access is priced starting at $7 and is offered via direct message to verified buyers.
    Date: 2026-05-16T04:05:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-SSH-RCE-access
    Screenshots:
    None
    Threat Actors: aptelleralone
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  531. Website Defacement of DrChadda by Ruiixh4xor of SHENHAXSEC
    Category: Defacement
    Content: On May 16, 2026, the website drchadda.in, believed to be associated with a medical professional or healthcare entity in India, was defaced by threat actor Ruiixh4xor operating under the group SHENHAXSEC. The attack targeted the homepage and was a singular, non-mass defacement incident, with a mirror of the defacement archived on zone-xsec.com.
    Date: 2026-05-16T04:05:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923023
    Screenshots:
    None
    Threat Actors: Ruiixh4xor, SHENHAXSEC
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Dr. Chadda
    Victim Site: drchadda.in
  532. Sale of alleged military operations data for China and United States
    Category: Data Breach
    Content: A threat actor is claiming to sell alleged military future operations data pertaining to China and the United States, described as never previously leaked. The seller requests proof of funds as an initial message and states that escrow is accepted. No further details regarding the source, volume, or nature of the data were provided.
    Date: 2026-05-16T04:04:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-China-and-US-data-never-leaked
    Screenshots:
    None
    Threat Actors: Donnie_Brasco
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  533. Alleged sale of US and China military operations data
    Category: Data Breach
    Content: A threat actor operating under the alias Donnie_Brasco claims to be selling data related to future military operations involving the United States and China. The post solicits long-term buyers via an encrypted messaging platform and states that samples and a data list will be provided upon contact. No further details about the source, volume, or nature of the data are provided.
    Date: 2026-05-16T04:04:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-China-and-Us-Military-Operation-data
    Screenshots:
    None
    Threat Actors: Donnie_Brasco
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  534. Alleged sale of US and China military operations data
    Category: Data Breach
    Content: A threat actor operating under the alias Donnie_Brasco claims to be selling data related to future military operations involving the United States and China. The seller is soliciting buyers via a Session messaging handle, accepts escrow, and offers samples upon contact. No source, volume, or further details of the alleged data are provided in the post.
    Date: 2026-05-16T04:03:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-China-x-US-future-military-operation-data-for-sale
    Screenshots:
    None
    Threat Actors: Donnie_Brasco
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  535. Sale of alleged PLA, CIA, DOD, and DARPA reports and documents
    Category: Services
    Content: A threat actor is offering for sale purported internal reports and documents attributed to the PLA, CIA, DOD, and DARPA. The seller is soliciting long-term clients via Session messenger and states that escrow is accepted. No further details about the volume, origin, or authenticity of the documents are provided.
    Date: 2026-05-16T04:02:44Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-selling-PLA-CIA-DOD-and-DARPA-reports-documents
    Screenshots:
    None
    Threat Actors: Donnie_Brasco
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: CIA, DOD, DARPA, PLA
    Victim Site: Unknown
  536. Alleged Cyber Attack on Aran Group packaging company infrastructure
    Category: Cyber Attack
    Content: A threat actor identifying as MDGhost666/BlackH4t claims to have completely destroyed IT infrastructure belonging to Aran Group, an industrial packaging company with operations in Israel, the United States, Germany, and Spain. The actor claims full access was obtained and over 500 TB of data was wiped. The attack is framed as a politically motivated hacktivist campaign targeting Israels food supply chain.
    Date: 2026-05-16T04:02:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Israeli-aranp-group-com-ARAN-GRUP-bag-in-box-BIB
    Screenshots:
    None
    Threat Actors: MDGhost666
    Victim Country: Israel
    Victim Industry: Manufacturing
    Victim Organization: Aran Group
    Victim Site: aranp-group.com
  537. Alleged data breach of undisclosed Spanish insurance company
    Category: Data Breach
    Content: A threat actor is selling a database allegedly dumped from a small Spanish insurance company. The dataset reportedly contains 90,000 client records including full names, addresses, mobile numbers, and account numbers, with a total backup size of 50GB.
    Date: 2026-05-16T04:01:35Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-SPAIN-SMALL-INSURANCE-COMPANY-DB
    Screenshots:
    None
    Threat Actors: notjoukin
    Victim Country: Spain
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  538. Sale of fresh Australian payment cards on cybercrime forum
    Category: Carding
    Content: A threat actor is selling Australian payment card data including cardholder name, card number, expiry date, and CVV. Cards are priced on a tiered scale starting at $5 per card. The seller markets the cards as fresh and real.
    Date: 2026-05-16T04:00:54Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Real-Fresh-Australia-CC
    Screenshots:
    None
    Threat Actors: lazarus
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  539. Sale of doxing service targeting lawyers in Baja California, Mexico
    Category: Services
    Content: A threat actor is offering a doxing service for $100 USD that claims to retrieve detailed personal and professional information on any licensed lawyer in the state of Baja California, Mexico. The data reportedly includes full name, photographs, national IDs (CURP, RFC, Voter ID), contact details, home and office addresses, and personal documents. Contact is conducted via Signal.
    Date: 2026-05-16T04:00:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-MEXICO-SYSTEM-TO-DOX-ANY-LAWYER-IN-THE-STATE-OF-BAJA-CALIFORNIA-MEXICO
    Screenshots:
    None
    Threat Actors: Thelizard001
    Victim Country: Mexico
    Victim Industry: Legal
    Victim Organization: Unknown
    Victim Site: Unknown
  540. Sale of database query bot exposing Mexican student and electoral records (OSEP + INE)
    Category: Services
    Content: A threat actor is promoting a Telegram bot that queries an alleged database of students from across Mexico and records from the National Electoral Institute (INE). The bot exposes extensive personal data including full name, CURP, date of birth, contact details, home address, emergency contacts, medical records (blood type, illnesses, allergies, medications), vaccination status, and employment information. The actor states the complete database will be offered for sale, noting that a recent leak
    Date: 2026-05-16T03:59:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-BOT-Mexico-OSEP-INE
    Screenshots:
    None
    Threat Actors: Alz_157s
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: National Electoral Institute (INE)
    Victim Site: ine.mx
  541. Mass Defacement of Taraba Polytechnic by Alpha Wolf (XYZ)
    Category: Defacement
    Content: On May 16, 2026, the attacker known as XYZ, operating under the team Alpha Wolf, conducted a mass defacement targeting tarabapoly.edu.ng, the official website of Taraba State Polytechnic in Nigeria. The attack was not directed at the homepage but was part of a broader mass defacement campaign. A mirror of the defaced page has been archived at haxor.id.
    Date: 2026-05-16T03:58:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249233
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Nigeria
    Victim Industry: Education
    Victim Organization: Taraba State Polytechnic
    Victim Site: tarabapoly.edu.ng
  542. Alleged data leak of 1cartoriosbc.com.br via SQL injection
    Category: Data Leak
    Content: A threat actor claims to have breached the official Brazilian institute website 1cartoriosbc.com.br via SQL injection, extracting personal data including email addresses, passwords, contact numbers, identity codes, ID card photos, and certificates. A portion of the extracted data is being made available for free. The actor operates under the handle 1877 and promotes associated Telegram channels.
    Date: 2026-05-16T03:58:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-1cartoriosbc-com-br-Databases-User-pass-HQ
    Screenshots:
    None
    Threat Actors: 1877
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: 1 CartĂłrio SBC
    Victim Site: 1cartoriosbc.com.br
  543. Alleged data leak of 97,000 drivers licenses from Acapulco, Mexico
    Category: Data Leak
    Content: A threat actor leaked a dataset purportedly containing over 97,000 vehicle or drivers licenses from Acapulco, Mexico, sourced from calidad.acapulco.gob.mx. The approximately 28GB archive reportedly includes CURP (national ID numbers), photographs, and fingerprints. The data is described as recent and of high quality, and a free download link was shared on the forum.
    Date: 2026-05-16T03:57:26Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-90K-Licencias-De-Acapulco-MEXICO–76612
    Screenshots:
    None
    Threat Actors: homie157
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Gobierno de Acapulco
    Victim Site: calidad.acapulco.gob.mx
  544. Alleged data leak of Morocco government (.gov.ma) domains
    Category: Data Leak
    Content: A threat actor known as Fexus claims to have leaked data from multiple Moroccan government domains including education, tax, and regional administration portals. The leak is distributed freely via a file-sharing link and reportedly contains over 78,000 lines of data across at least nine .gov.ma subdomains.
    Date: 2026-05-16T03:56:49Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-gov-ma-BREACH
    Screenshots:
    None
    Threat Actors: fexus
    Victim Country: Morocco
    Victim Industry: Government
    Victim Organization: Morocco Government
    Victim Site: gov.ma
  545. Website Defacement of SkillsToDo by Threat Actor ZynxSec
    Category: Defacement
    Content: On May 16, 2026, threat actor ZynxSec successfully defaced the homepage of skillstodo.com, an online skills and learning platform. The attack was a targeted single-site defacement with no affiliation to a known hacking team. No specific motivation or technical exploitation details were disclosed alongside the incident report.
    Date: 2026-05-16T03:52:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923021
    Screenshots:
    None
    Threat Actors: ZynxSec
    Victim Country: Unknown
    Victim Industry: Education / Online Learning
    Victim Organization: SkillsToDo
    Victim Site: skillstodo.com
  546. Sale of mixed corporate and educational email:password combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of 13,441 corporate and educational email:password pairs, marketed as fully valid. The list spans mixed organization types including corporate and educational sectors.
    Date: 2026-05-16T03:46:11Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%AD%90%E2%AD%90%E2%AD%9013441-MIX-CORP-EDU-MAIL-PASS-FULL-VALID-100-%E2%AD%90%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: DexterCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  547. Alleged mixed-country education combo list with 166,273 lines
    Category: Combo List
    Content: A threat actor is distributing a combo list of 166,273 email:password pairs purportedly sourced from education-sector accounts across multiple countries. The list is shared on a public forum and marketed as education-related credential pairs.
    Date: 2026-05-16T03:27:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-166-273-Lines-%E2%9C%85-Mixed-Country-Edu-education-Leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  548. Sale of EU Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 100 EU Hotmail credentials, marketed as high-quality with no junk entries. The content is gated behind forum registration or login.
    Date: 2026-05-16T03:08:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1-0-1k-elite-eu-hotmail-zero-junk-pure-hits-%E2%9A%A1-302893
    Screenshots:
    None
    Threat Actors: BedrockDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  549. Sale of Hotmail combo list with 0.1K credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 100 Hotmail credentials marketed as high quality. The content is hidden behind a registration or login requirement on the forum. No breach of Microsoft or Hotmail infrastructure is implied; the credentials are intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-16T03:07:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-1k-hq-hotmail-mail-access-combolist-302892
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  550. Sale of stolen payment cards, dumps, fullz, and bank logs
    Category: Carding
    Content: A threat actor is advertising the sale of stolen payment card data including CC/CVV, VBV and non-VBV cards, dumps, fullz, and bank logs. The post claims high-quality linkable products but provides no additional details in the post body.
    Date: 2026-05-16T02:53:29Z
    Network: openweb
    Published URL: https://altenens.is/threads/cc-cvv-vbv-non-vbv-dumps-fullz-bank-logs-full-info-best-all-linkables-quality-product-list-always-selling-stuff-high-qualit.2941084/unread
    Screenshots:
    None
    Threat Actors: Hanntillsd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  551. Sale of Hotmail email:password combo list
    Category: Combo List
    Content: A threat actor is offering for sale a combo list of approximately 11,000 Hotmail email:password credentials, marketed as high quality and private. The content is paywalled and requires forum registration or login to access.
    Date: 2026-05-16T02:52:55Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-11k-hotmail-mailaccess-%E2%9A%AA-high-quality-private-combolist-1-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  552. Sale of Hotmail combo list with 100K credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 100,000 Hotmail email and password pairs, marketed as high quality and private. The content is gated behind forum registration or login. This is a credential stuffing resource, not a breach of Hotmail or Microsoft.
    Date: 2026-05-16T02:52:25Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-hotmail-%E2%9A%AA-high-quality-private-combolist-4-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  553. Sale of Hotmail combo list with 100K credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 100,000 Hotmail email and password pairs on a cybercrime forum. The content is gated behind registration or login. The credentials are marketed as high quality and private.
    Date: 2026-05-16T02:51:54Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-hotmail-%E2%9A%AA-high-quality-private-combolist-3-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  554. Sale of Germany-targeted shopping combo list (3 million records)
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 3 million credentials allegedly targeting German shopping platforms. The list is marketed as high quality and is being shared via Telegram channels. No specific breached organization is identified.
    Date: 2026-05-16T02:51:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75416/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  555. Hotmail combo list offered for mixed target credential stuffing
    Category: Combo List
    Content: A threat actor shared a combo list containing 601,692 Hotmail credentials (hotmail.com, .fr, .es) marketed as suitable for mixed-target credential stuffing attacks. The list was distributed on a public cracking forum.
    Date: 2026-05-16T02:50:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-601-692-%E2%9A%9C%EF%B8%8F-hotmail-com-fr-es-Good-For-Mixed-Target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  556. Sale of 1-day RCE exploit for macOS 10.11 and later
    Category: Vulnerability
    Content: A threat actor is selling a claimed 1-day, 1-click remote code execution exploit affecting Apple macOS versions 10.11 through macOS 26. The seller states no public exploit exists and that successful exploitation yields root-level permissions (GID 81). Payment is requested in Monero with middleman escrow required.
    Date: 2026-05-16T02:49:03Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-1-DAY-1-click-RCE-MacOS-10-11-up-to-macOS-26-No-public-exploit
    Screenshots:
    None
    Threat Actors: 303
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  557. Sale of Hotmail combo list with 100K credentials
    Category: Combo List
    Content: A threat actor is offering a 100K Hotmail email:password combo list marketed as high quality and private. The content is paywalled and requires registration or login to access. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-16T02:35:33Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-hotmail-%E2%9A%AA-high-quality-private-combolist-1-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  558. Sale of Hotmail combo list containing 100K credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 100,000 Hotmail email and password combinations on a cybercrime forum. The content is gated behind registration or login. The credentials are marketed as high quality and private.
    Date: 2026-05-16T02:35:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-hotmail-%E2%9A%AA-high-quality-private-combolist-2-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  559. Free South Korea email combo list (Batch 43/100)
    Category: Combo List
    Content: A threat actor is freely distributing a South Korea email list as part of an ongoing batch series (Batch 43 of 100). The content is gated behind forum registration or login. No further details about record count or data fields are provided in the post.
    Date: 2026-05-16T02:34:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-43-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  560. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering for sale a mixed email:password combo list marketed as high quality and private. The listing contains 100,000 credential pairs. Full content is hidden behind a forum registration or login requirement.
    Date: 2026-05-16T02:20:00Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-6-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  561. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials marketed as high quality. The content is gated behind forum registration or login. No specific breached organization is identified.
    Date: 2026-05-16T02:19:44Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-7-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  562. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials marketed as high quality. The content is gated behind forum registration or login. No specific breached organization is identified.
    Date: 2026-05-16T02:19:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-8-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  563. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials marketed as high quality and private. The content is paywalled and requires forum registration or login to access. No specific breached organization or service is identified.
    Date: 2026-05-16T02:19:12Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-9-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  564. Sale of stealer logs with 18.24 million URL:log:pass records
    Category: Combo List
    Content: A threat actor operating under the alias vultapower is advertising a dataset of 18.24 million URL:log:pass records marketed as fresh stealer log output, available via vulta.pw. The content is gated behind registration on the cracking forum. The seller also advertises a Telegram channel (vultanetworks) for access.
    Date: 2026-05-16T02:17:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75415/
    Screenshots:
    None
    Threat Actors: vultapower
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  565. Sale of private combo lists and stealer logs targeting US and EU accounts
    Category: Combo List
    Content: A threat actor operating as antalya_H is selling private combo lists and stealer logs, including UHQ Hotmail combos, mixed combolists, and geo-targeted credentials for USA and EU regions. The offering includes mail checkers and is marketed as fresh, high-quality private data with high hit rates. Access is sold via Telegram with a free trial sample available.
    Date: 2026-05-16T02:15:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-PRIVATE-USA-MAIL-BY-antalya-H
    Screenshots:
    None
    Threat Actors: cloudantalya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  566. Alleged data breach of ReferralRock.com referral marketing platform
    Category: Data Breach
    Content: A threat actor claims to have obtained the internal database of ReferralRock, a US-based referral marketing platform, following an alleged intrusion in May 2026. The leaked data spans 1,947 CSV files totaling approximately 5GB and over 11.2 million records, containing fields including names, emails, phone numbers, addresses, payout details, and referral program metadata.
    Date: 2026-05-16T02:13:59Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-ReferralRock-com-Referral-Marketing-Platform-11M-PART
    Screenshots:
    None
    Threat Actors: zSenior
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: ReferralRock
    Victim Site: referralrock.com
  567. Sale of 100K mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials, marketed as high quality and private. The content is gated behind registration or login on the forum. No specific targeted service or origin breach is identified.
    Date: 2026-05-16T02:00:42Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-1-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  568. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials, marketed as high quality and private. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-16T02:00:11Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-2-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  569. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials, marketed as high quality and private. The content is paywalled behind forum registration or login. No specific victim organization or country is identified.
    Date: 2026-05-16T01:59:50Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-3-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  570. Sale of private Germany-targeted combo lists and UHQ Hotmail credentials
    Category: Combo List
    Content: A threat actor operating under the handle @antalya_H is selling private combo lists described as UHQ Hotmail credentials, mixed combos, and geo-targeted lists including Germany, USA, and EU regions. The offering also includes premium logs and mail checker tools. Access is sold via direct message with a free trial sample advertised.
    Date: 2026-05-16T01:59:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-PRIVATE-GERMANY-MAIL-BY-antalya-H
    Screenshots:
    None
    Threat Actors: cloudantalya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  571. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is selling a mixed email:password combo list of 100,000 credentials, marketed as high quality and private. The content is gated behind registration or login on the forum.
    Date: 2026-05-16T01:59:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-4-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  572. Sale of URL:LOG:PASS combo list with 18.85 million credentials
    Category: Combo List
    Content: A threat actor operating as DaxusHub is offering a URL:LOG:PASS combo list containing approximately 18.85 million credential pairs, marketed as UHQ (ultra-high quality). The post directs interested parties to a Telegram channel for additional content.
    Date: 2026-05-16T01:59:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%90%EF%B8%8FURL-LOG-PASS-18-85-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: DaxusHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  573. Sale of mixed email:password combo list
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list of 100,000 credentials marketed as high quality. The content is gated behind registration or login on the forum. No specific breach source or target organization is identified.
    Date: 2026-05-16T01:58:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-email-pass-100k-mixed-%E2%9A%AA-high-quality-private-combolist-5-%E2%9A%AA
    Screenshots:
    None
    Threat Actors: uhqcomboseller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  574. Sale of mixed valid mail access combo list
    Category: Combo List
    Content: A threat actor operating as RedCloud is distributing a combo list of approximately 87.1K mixed valid mail credentials, dated 16.05.2026. The content is marketed as private and UHQ (ultra-high quality), suggesting credentials have been verified. Access to the list requires registration or login on the forum.
    Date: 2026-05-16T01:58:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-87-1K-%E2%9C%A8-Mix-%E2%9C%A8-Valid-Mail-Access-16-05
    Screenshots:
    None
    Threat Actors: RedCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  575. Alleged data leak of BlackSexFinder.com user database
    Category: Data Leak
    Content: A threat actor has shared a database dump purportedly from BlackSexFinder.com, a US-based hookup website, containing 180,515 records. Exposed fields include user IDs, usernames, email addresses, registration IPs, registration dates, cities, ZIP codes, and dates of birth. The data is described as originally posted on the Exploit forum.
    Date: 2026-05-16T01:56:19Z
    Network: openweb
    Published URL: https://spear.cx/Thread-BlackSexFinder-com-180k-users
    Screenshots:
    None
    Threat Actors: animal
    Victim Country: United States
    Victim Industry: Entertainment
    Victim Organization: BlackSexFinder
    Victim Site: blacksexfinder.com
  576. Sale of UHQ combo lists and stealer logs targeting US and EU accounts
    Category: Combo List
    Content: A threat actor operating as antalya_H is selling access to a private cloud service offering UHQ Hotmail combos, mixed combo lists, geo-targeted credentials for USA and EU regions, and stealer logs. The service includes email checkers and claims to provide fresh, high-hit-rate credentials marketed as private and deduplicated. Access is sold via direct message with a free trial sample available.
    Date: 2026-05-16T01:46:26Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-pravet-usa-%F0%9F%87%BA%F0%9F%87%B8-by-antalya-h
    Screenshots:
    None
    Threat Actors: cloudantalya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  577. Sale of UHQ combo lists and stealer logs targeting Germany and global regions
    Category: Combo List
    Content: A threat actor operating as Antalya Private Cloud is offering UHQ Hotmail combos, mixed combo lists, geo-targeted country combos, and premium stealer logs for sale. The service advertises high hit rates, private and fresh data, and includes mail/Hotmail checkers. Access is sold via Telegram with a free trial sample available.
    Date: 2026-05-16T01:46:08Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-pravet-germany-%F0%9F%87%A9%F0%9F%87%AA-by-antalya-h
    Screenshots:
    None
    Threat Actors: cloudantalya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  578. Alleged data leak of Argentine BCRA, IOMA, and PFA records by EsqueleSquad
    Category: Data Leak
    Content: A threat actor operating under the name EsqueleSquad has leaked multiple Argentine government datasets for free, including over 32 million BCRA credit scoring records, over 1 million IOMA affiliate and patient records, and approximately 903 classified PFA documents. The actor claims to also possess personal information on provincial governor Axel Kicillof, including phone numbers, chats, and addresses, with partial release contingent on community engagement. Data is distributed via a Telegram ch
    Date: 2026-05-16T01:43:20Z
    Network: openweb
    Published URL: https://xforums.st/threads/argentina-bcra-gdeba-ioma-all-leak-free.615211/
    Screenshots:
    None
    Threat Actors: Server1172
    Victim Country: Argentina
    Victim Industry: Government
    Victim Organization: BCRA / IOMA / PFA
    Victim Site: bcra.gob.ar
  579. Website Defacement of felipequiro.com.br by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Brazilian website felipequiro.com.br. The defacement was a targeted, non-mass attack with no stated motive recorded. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-16T01:42:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922964
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Felipe Quiro
    Victim Site: felipequiro.com.br
  580. Website Defacement of CargoSmart Mada by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website cargosmartmada.com was defaced by threat actor chinafans, operating under the group 0xteam. The attack targeted a cargo and logistics organization likely based in Madagascar, as inferred from the mada suffix in the domain. The defacement was a single targeted incident, not part of a mass or repeated defacement campaign.
    Date: 2026-05-16T01:42:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923014
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Madagascar
    Victim Industry: Logistics and Freight
    Victim Organization: CargoSmart Mada
    Victim Site: cargosmartmada.com
  581. Website Defacement of IGX Engenharia by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the threat actor chinafans, operating under the group 0xteam, defaced the website of IGX Engenharia, a Brazilian engineering firm. The defacement was a targeted, single-site attack rather than a mass or redefacement campaign. The incident was catalogued with a mirror archived at zone-xsec.com.
    Date: 2026-05-16T01:41:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923018
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Engineering / Construction
    Victim Organization: IGX Engenharia
    Victim Site: igxengenharia.com
  582. Website defacement of brandstore.biz by chinafans of 0xteam
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website brandstore.biz, targeting a likely retail or brand merchandise platform. The defacement was a targeted single-site compromise, not a mass or home page defacement. The incident was archived and mirrored via zone-xsec.com for record purposes.
    Date: 2026-05-16T01:40:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923001
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Brand Store
    Victim Site: brandstore.biz
  583. Website defacement of messypdf.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website messypdf.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the homepage, suggesting a targeted file-level compromise. No specific motivation or technical details regarding the attack vector were disclosed.
    Date: 2026-05-16T01:40:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922975
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology/Software
    Victim Organization: MessyPDF
    Victim Site: messypdf.com
  584. Website Defacement of ialphai.com by chinafans (0xteam)
    Category: Defacement
    Content: The website ialphai.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 16, 2026. The defacement targeted a specific file path (/0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was neither a mass defacement nor a redefacement, and server details remain unknown.
    Date: 2026-05-16T01:39:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923020
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ialphai.com
  585. Website Defacement of Tsiry Virtual SAV Assistant by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the team 0xteam, defaced the website of Tsiry, a virtual SAV (after-sales service) assistant provider. The incident was a single-target, non-mass defacement, with the mirror of the defaced page archived on zone-xsec.com. No additional technical details regarding the server infrastructure or attack vector were disclosed.
    Date: 2026-05-16T01:38:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922998
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Business Services / Virtual Assistance
    Victim Organization: Tsiry Virtual SAV Assistant
    Victim Site: tsiry-assistante-sav-virtuelle…
  586. Website Defacement of Arviax.ai by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website arviax.ai was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) on the domain, which appears to be an AI-related technology platform. The incident was a single-target, non-mass defacement with no redefacement history recorded.
    Date: 2026-05-16T01:37:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923004
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology / Artificial Intelligence
    Victim Organization: Arviax
    Victim Site: arviax.ai
  587. Website Defacement of limten.co.za by chinafans of 0xteam
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the South African website limten.co.za. The defacement was recorded as a singular targeted attack rather than a mass or redefacement event. A mirror of the defacement was archived via zone-xsec.com.
    Date: 2026-05-16T01:37:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922978
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: South Africa
    Victim Industry: Unknown
    Victim Organization: Limten
    Victim Site: limten.co.za
  588. Website Defacement of Naples Fishing Charter by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website naplesfishingcharter.com, belonging to a fishing charter service based in Naples, was defaced by threat actor chinafans operating under the group 0xteam. The attack was a targeted single-site defacement, with a mirror of the defaced page archived at zone-xsec.com. No specific motive or additional technical details were disclosed.
    Date: 2026-05-16T01:36:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922985
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Tourism and Recreation
    Victim Organization: Naples Fishing Charter
    Victim Site: naplesfishingcharter.com
  589. Website Defacement of Dualis Contabilidade by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the Brazilian accounting firm Dualis Contabilidade had its website defaced by a threat actor known as chinafans, operating under the group 0xteam. The attack was a targeted single-site defacement, not part of a mass defacement campaign. No specific motive or server details were disclosed in the available intelligence.
    Date: 2026-05-16T01:35:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922990
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Financial Services / Accounting
    Victim Organization: Dualis Contabilidade
    Victim Site: dualiscontabilidade.com.br
  590. Website Defacement of Bezpiecznakostka.pl by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Polish website bezpiecznakostka.pl by placing a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity. A mirror of the defaced content was archived via zone-xsec.com.
    Date: 2026-05-16T01:34:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922972
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Bezpieczna Kostka
    Victim Site: bezpiecznakostka.pl
  591. Website Defacement of ICT Scripts by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website ictscripts.tech by altering the file located at /0x.txt. The incident was a targeted, single-site defacement with no indicators of mass or repeated defacement activity. The server environment and specific attack vector remain unknown.
    Date: 2026-05-16T01:34:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923003
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology / Software
    Victim Organization: ICT Scripts
    Victim Site: ictscripts.tech
  592. Website Defacement of Anviet Lashing by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website anvietlashing.com was defaced by threat actor chinafans operating under the group 0xteam. The attacker placed a defacement file at the path /0x.txt, indicating a targeted single-site compromise. No specific motive or technical vector was disclosed in the available metadata.
    Date: 2026-05-16T01:33:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923006
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Vietnam
    Victim Industry: Logistics / Marine & Cargo Services
    Victim Organization: Anviet Lashing
    Victim Site: anvietlashing.com
  593. Website Defacement of famfam.cat by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced a file hosted on famfam.cat, a domain registered under the Catalan (.cat) top-level domain associated with Spain. The defacement targeted a specific text file path (0x.txt) rather than the sites homepage, indicating a targeted file-level intrusion. No mass or redefacement indicators were observed in this incident.
    Date: 2026-05-16T01:32:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/923007
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Famfam
    Victim Site: famfam.cat
  594. Website Defacement of Clinica Cetotrio by chinafans (0xteam)
    Category: Defacement
    Content: The Brazilian healthcare website clinicacetotrio.com.br was defaced by threat actor chinafans operating under the group 0xteam on May 16, 2026. The defacement was recorded at a specific file path (/0x.txt) rather than the homepage, indicating a targeted file-level compromise. The incident was catalogued with a mirror archived by zone-xsec.com.
    Date: 2026-05-16T01:31:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922977
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Healthcare
    Victim Organization: ClĂ­nica Cetotrio
    Victim Site: clinicacetotrio.com.br
  595. Website Defacement of Transportes Uriarte by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xteam, defaced the website of Transportes Uriarte, a transportation company likely based in Spain. The defacement was recorded on May 16, 2026, targeting a specific file path (0x.txt) on the domain. The incident was a singular, targeted defacement rather than a mass or repeated attack.
    Date: 2026-05-16T01:31:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922995
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Spain
    Victim Industry: Transportation and Logistics
    Victim Organization: Transportes Uriarte
    Victim Site: transportesuriarte.com
  596. Website Defacement of sdds.co.th by chinafans (0xteam)
    Category: Defacement
    Content: A threat actor known as chinafans, operating under the team 0xteam, defaced the Thai website sdds.co.th on May 16, 2026. The defacement was a targeted single-site incident, not part of a mass defacement campaign. No specific motive or server details were disclosed in association with the attack.
    Date: 2026-05-16T01:30:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922979
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Thailand
    Victim Industry: Unknown
    Victim Organization: SDDS
    Victim Site: sdds.co.th
  597. Website Defacement of Tiff Marie Photography by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website of Tiff Marie Photography was defaced by threat actor chinafans operating under the group 0xteam. The attack was a targeted single-site defacement, not classified as a mass or home page defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-16T01:29:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922961
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Photography / Creative Services
    Victim Organization: Tiff Marie Photography
    Victim Site: tiffmariephotography.com
  598. Website Defacement of Sutherland Landscaping by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website of Sutherland Landscaping was defaced by a threat actor operating under the alias chinafans, affiliated with the hacking group 0xteam. The attack targeted a subdirectory or file path on the domain and was a single, targeted defacement rather than a mass or home page compromise. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-16T01:28:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922957
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Landscaping / Agriculture & Horticulture Services
    Victim Organization: Sutherland Landscaping
    Victim Site: sutherlandlandscaping.org
  599. Combo List of 3,000 Hotmail credentials
    Category: Combo List
    Content: A threat actor on a cracking forum has shared a combo list allegedly containing 3,000 Hotmail credentials. The post includes a download link and a prompt to join the actors group. No further details about the data origin or format are provided.
    Date: 2026-05-16T01:28:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-3K-HOTMAIL-ACCESS
    Screenshots:
    None
    Threat Actors: Re4perr2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  600. Hotmail combo list with 3.4K credentials offered for free
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 3,400 Hotmail credentials via a Mediafire link. The post markets the credentials as valid and UHQ (ultra-high quality). The list appears to be distributed freely.
    Date: 2026-05-16T01:28:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/75412/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  601. Website Defacement of Iglesia Refugio by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website iglesiarefugiocr.com, belonging to a Costa Rican religious organization known as Iglesia Refugio, was defaced by threat actor chinafans operating under the group 0xteam. The defacement was a targeted single-site attack, with the defaced content accessible via the path /0x.txt and mirrored on zone-xsec.com.
    Date: 2026-05-16T01:27:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922981
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Costa Rica
    Victim Industry: Religious Organization
    Victim Organization: Iglesia Refugio
    Victim Site: iglesiarefugiocr.com
  602. Website Defacement of FreeFlashtutorials.com by chinafans (0xteam)
    Category: Defacement
    Content: The website freeflashtutorials.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 16, 2026. The defacement was a targeted, single-site attack with a text file (0x.txt) used as the defacement artifact. No specific motivation or server details were disclosed in connection with this incident.
    Date: 2026-05-16T01:26:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922956
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Education / Online Tutorials
    Victim Organization: Free Flash Tutorials
    Victim Site: freeflashtutorials.com
  603. Website Defacement of BPA Export by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website bpaexport.cl, belonging to BPA Export, a Chilean export or trade-related organization, was defaced by a threat actor known as chinafans operating under the group 0xteam. The defacement was a targeted, non-mass incident affecting a specific page on the domain. A mirror of the defacement was archived via zone-xsec.com.
    Date: 2026-05-16T01:26:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922971
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Chile
    Victim Industry: Export / Trade
    Victim Organization: BPA Export
    Victim Site: bpaexport.cl
  604. Website Defacement of Sejapiloto by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Brazilian website sejapiloto.com.br. The defacement was a targeted, single-site attack and was not classified as a mass or home page defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-16T01:25:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922970
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Seja Piloto
    Victim Site: sejapiloto.com.br
  605. Sale of HQ mixed mail access combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 1,300 high-quality mixed mail access credentials on a cybercrime forum. The content is hidden behind a registration or login requirement. No specific victim organization or country is identified.
    Date: 2026-05-16T01:24:56Z
    Network: openweb
    Published URL: https://patched.to/Thread-1-3k-hq-mixed-mail-access-combolist-302861
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  606. Website Defacement of Greenwill by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, affiliated with 0xteam, defaced the website greenwill.co, leaving a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no mass or repeat defacement indicators recorded. Server and infrastructure details were not disclosed in available intelligence.
    Date: 2026-05-16T01:18:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922862
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Greenwill
    Victim Site: greenwill.co
  607. Website defacement of Shinohara Group by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced a file hosted on shinohara.group, a domain associated with the Shinohara Group organization. The defacement was a targeted single-site attack, with the mirror of the defaced content archived at zone-xsec.com. No specific motivation or technical details regarding the server environment were disclosed.
    Date: 2026-05-16T01:18:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922839
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Japan
    Victim Industry: Corporate/Business
    Victim Organization: Shinohara Group
    Victim Site: shinohara.group
  608. Website Redefacement of Briques Finserve by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the team 0xteam, conducted a redefacement of briquesfinserve.com on May 16, 2026. This incident marks a repeated compromise of the target, suggesting the underlying vulnerability was not fully remediated after the initial defacement. The defacement was not classified as a mass or home page defacement, indicating a targeted file-level intrusion.
    Date: 2026-05-16T01:17:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922857
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Briques Finserve
    Victim Site: briquesfinserve.com
  609. Website Defacement of Cool Comfort Repair Service by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Cool Comfort Repair Service, an Indian home services and HVAC repair business. The defacement targeted the domain coolcomfirtrepairservice.in and was recorded as a single, non-mass defacement event. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-16T01:16:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922875
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Home Services / HVAC Repair
    Victim Organization: Cool Comfort Repair Service
    Victim Site: coolcomfirtrepairservice.in
  610. Website Defacement of Eagle International Logistic by chinafans (0xteam)
    Category: Defacement
    Content: The website of Eagle International Logistic was defaced by threat actor chinafans, affiliated with the hacking group 0xteam, on May 16, 2026. The attack was a targeted single-site defacement, with a mirror of the defacement archived at zone-xsec.com. No additional technical details such as server software, IP address, or attack vector were disclosed.
    Date: 2026-05-16T01:15:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922848
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Logistics and Transportation
    Victim Organization: Eagle International Logistic
    Victim Site: eagleinternationallogistic.com
  611. Website Redefacement of Laarhagro by chinafans (0xteam)
    Category: Defacement
    Content: The website laarhagro.com was redefaced by threat actor chinafans operating under the group 0xteam on May 16, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised and defaced by the same or another actor. The defacement was not a mass or homepage defacement, targeting a specific path on the domain.
    Date: 2026-05-16T01:15:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922865
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Agriculture
    Victim Organization: Laarhagro
    Victim Site: laarhagro.com
  612. Website Defacement of sra17.xyz by chinafans (0xteam)
    Category: Defacement
    Content: A threat actor operating under the handle chinafans, affiliated with 0xteam, defaced the website sra17.xyz on May 16, 2026. The defacement was a targeted single-site attack, not part of a mass defacement campaign. Limited technical details are available regarding the server infrastructure or exploitation method used.
    Date: 2026-05-16T01:14:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922855
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sra17.xyz
  613. Website Defacement of imotoshare.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website imotoshare.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was a targeted single-site incident, with the attacker leaving a text-based payload at the path /0x.txt. The incident was archived and mirrored by zone-xsec.com for record-keeping purposes.
    Date: 2026-05-16T01:13:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922851
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Automotive / Motorsports Sharing Platform
    Victim Organization: iMotoShare
    Victim Site: imotoshare.com
  614. Website Defacement of Masterigrandecoast.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website masterigrandecoast.com was defaced by a threat actor operating under the alias chinafans, affiliated with the group 0xteam. The attack involved the placement of a defacement file (0x.txt) on the target server. The incident was a singular, targeted defacement with no indication of mass or repeat defacement activity.
    Date: 2026-05-16T01:12:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922892
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Masteri Grande Coast
    Victim Site: masterigrandecoast.com
  615. Website Defacement of Terena.io by chinafans (0xteam)
    Category: Defacement
    Content: The website terena.io was defaced by a threat actor known as chinafans, operating under the group 0xteam, on May 16, 2026. The defacement was a targeted single-site attack, with the defaced content accessible at the path /0x.txt. A mirror of the defacement was archived by zone-xsec.com under ID 922889.
    Date: 2026-05-16T01:12:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922889
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Terena
    Victim Site: terena.io
  616. Sale of UHQ Hotmail combo list
    Category: Combo List
    Content: A threat actor is distributing approximately 4,500 UHQ Hotmail credential hits, with free drops advertised and a private cloud available for purchase via Telegram handle @window_linux01.
    Date: 2026-05-16T01:12:00Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9C%85-4-5k-uhq-hotmail-hit-%E2%9C%85
    Screenshots:
    None
    Threat Actors: aurexopforu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  617. Website Defacement of Kebabaretxabaleta by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website kebabaretxabaleta.es, a Spanish food and beverage establishment. The defacement was a targeted, non-mass incident affecting a single page on the domain. The attack was documented and mirrored via zone-xsec.com.
    Date: 2026-05-16T01:11:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922860
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Spain
    Victim Industry: Food & Beverage / Restaurant
    Victim Organization: Kebabaretxabaleta
    Victim Site: kebabaretxabaleta.es
  618. Combo list of mixed corporate targets distributed on forum
    Category: Combo List
    Content: A combo list containing 74,411 email:password lines targeting mixed corporate accounts was shared on a cracking forum. The list is marketed as suitable for credential stuffing against various corporate targets. No further details are available from the post content.
    Date: 2026-05-16T01:11:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-74-411-Lines-%E2%9C%85-Combolist-Corp-Mixed-target-2026
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  619. Sale of mixed corporate domain combo list with 121,950 credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 121,950 mixed corporate domain email and password pairs on a cracking forum. The list appears to target corporate email accounts across multiple organizations or domains. No additional details are available from the post content.
    Date: 2026-05-16T01:10:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-121-950-%E2%9A%A1-Mixed-Corp-Domain
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  620. Website Redefacement of Thuannong.vn by chinafans (0xteam)
    Category: Defacement
    Content: The website thuannong.vn, a Vietnamese agricultural domain, was redefaced by threat actor chinafans operating under the team 0xteam on May 16, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised and defaced by the same or a different actor. The defacement was not a mass or homepage defacement, targeting a specific path (0x.txt) on the server.
    Date: 2026-05-16T01:10:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922861
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Vietnam
    Victim Industry: Agriculture
    Victim Organization: Thuan Nong
    Victim Site: thuannong.vn
  621. Website Redefacement of skcreator.in by chinafans of 0xteam
    Category: Defacement
    Content: The website skcreator.in was defaced by threat actor chinafans, operating under the group 0xteam. This incident is classified as a redefacement, indicating the site had been previously compromised by the same or another actor. The defacement was recorded on May 16, 2026, and is mirrored at zone-xsec.com.
    Date: 2026-05-16T01:09:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922842
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: SK Creator
    Victim Site: skcreator.in
  622. Website Defacement of Suhana Realtors by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced the website of Suhana Realtors at suhanarealtors.com. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was recorded and mirrored by zone-xsec.com under mirror ID 922871.
    Date: 2026-05-16T01:08:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922871
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Suhana Realtors
    Victim Site: suhanarealtors.com
  623. Website Defacement of japclima.com by chinafans (0xteam)
    Category: Defacement
    Content: The website japclima.com was defaced by a threat actor identified as chinafans, operating under the team 0xteam, on May 16, 2026. The defacement was a targeted single-site incident, with the attacker leaving a text file (0x.txt) as proof of compromise. No additional details regarding the attackers motive or server infrastructure were disclosed.
    Date: 2026-05-16T01:08:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922858
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Japclima
    Victim Site: japclima.com
  624. Website Redefacement of Cours-Escalade by chinafans (0xteam)
    Category: Defacement
    Content: The website cours-escalade.com, a French climbing course platform, was redefaced by threat actor chinafans operating under the group 0xteam on May 16, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised and targeted again. The defacement was not categorized as a mass or homepage defacement, suggesting a targeted file-level intrusion.
    Date: 2026-05-16T01:07:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922866
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: France
    Victim Industry: Sports and Recreation
    Victim Organization: Cours Escalade
    Victim Site: cours-escalade.com
  625. Website Defacement of Leorian Outfits by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website leorianoutfits.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The attacker placed a defacement file at the path /0x.txt on the target server. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-05-16T01:06:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922876
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail / Fashion
    Victim Organization: Leorian Outfits
    Victim Site: leorianoutfits.com
  626. Website Defacement of Reebo Consult by chinafans (0xteam)
    Category: Defacement
    Content: The website reeboconsult.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 16, 2026. The defacement targeted a specific file path (0x.txt) on the consulting firms web server. This was a single targeted defacement rather than a mass or home page compromise.
    Date: 2026-05-16T01:05:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922881
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Consulting
    Victim Organization: Reebo Consult
    Victim Site: reeboconsult.com
  627. Website Defacement of 3D Print Shape by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website 3dprintshape.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The attack targeted a specific text file path (/0x.txt) on the domain. The incident was a singular, non-mass defacement with no prior redefacement history recorded.
    Date: 2026-05-16T01:05:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922845
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Manufacturing / 3D Printing
    Victim Organization: 3D Print Shape
    Victim Site: 3dprintshape.com
  628. Website Redefacement of Yuwraj Computer by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xteam, conducted a redefacement of the Indian computer services website yuwrajcomputer.in on May 16, 2026. This incident marks at least a second successful compromise of the target, indicating persistent targeting or inadequate remediation following the initial defacement. No specific motive or vulnerability details were disclosed.
    Date: 2026-05-16T01:04:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922852
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Technology / Computer Services
    Victim Organization: Yuwraj Computer
    Victim Site: yuwrajcomputer.in
  629. Website Defacement of lanaalarab.com by chinafans of 0xteam
    Category: Defacement
    Content: On May 16, 2026, the website lanaalarab.com was defaced by a threat actor identified as chinafans, operating under the group 0xteam. The attack targeted a specific file path (/0x.txt) rather than the site homepage, indicating a targeted file-level defacement. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-16T01:03:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922888
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Media/Entertainment
    Victim Organization: Lana Al Arab
    Victim Site: lanaalarab.com
  630. Website Defacement of Dewan Fashion Hub by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website dewanfashionhub.com was defaced by a threat actor operating under the handle chinafans, affiliated with the group 0xteam. The defacement was a targeted single-site compromise, with the attacker leaving a marker at the path /0x.txt. No specific motive or technical details regarding the server environment were disclosed.
    Date: 2026-05-16T00:56:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922827
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail / Fashion
    Victim Organization: Dewan Fashion Hub
    Victim Site: dewanfashionhub.com
  631. Website Defacement of Sysplorer by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the Italian website sysplorer.it was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a text file (0x.txt) hosted on the domain. The incident was a targeted, non-mass defacement with no specific motivation publicly disclosed.
    Date: 2026-05-16T00:56:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922815
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Italy
    Victim Industry: Technology
    Victim Organization: Sysplorer
    Victim Site: sysplorer.it
  632. Website Defacement of mrdan.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website mrdan.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The attacker uploaded a defacement file at mrdan.com/0x.txt. The incident was a targeted, non-mass defacement with no specific reason publicly disclosed.
    Date: 2026-05-16T00:55:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922816
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Mr. Dan
    Victim Site: mrdan.com
  633. Website Defacement of livingmx360.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website livingmx360.com was defaced by a threat actor operating under the alias chinafans, affiliated with the group 0xteam. The defacement was a targeted single-site attack, with a mirror of the defaced page archived at zone-xsec.com. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-05-16T00:54:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922806
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Living MX 360
    Victim Site: livingmx360.com
  634. Website Defacement of ranimo.co.uk by chinafans (0xteam)
    Category: Defacement
    Content: The website ranimo.co.uk was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was recorded on May 16, 2026, and involved the placement of a defacement file at ranimo.co.uk/0x.txt. The incident was a targeted single-site defacement with no additional technical indicators such as server software or IP address disclosed.
    Date: 2026-05-16T00:53:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922804
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Ranimo
    Victim Site: ranimo.co.uk
  635. Website Defacement of Cajun AG Drones by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website cajunagdrones.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a Louisiana-based agricultural drone services company, with the attack recorded as a single, non-mass defacement. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-05-16T00:52:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922800
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Agriculture / Drone Services
    Victim Organization: Cajun AG Drones
    Victim Site: cajunagdrones.com
  636. Website Defacement of pronarikka.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website pronarikka.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was a targeted, single-site incident with the defaced content accessible at the path /0x.txt. No specific motive or server details were disclosed in connection with this attack.
    Date: 2026-05-16T00:51:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922814
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Pronarikka
    Victim Site: pronarikka.com
  637. Website Defacement of Italian Accounting/Tax Consultancy by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as chinafans, operating under the group 0xteam, defaced the website of an Italian commercial accountant (commercialista) known as Dottoressa Rosset. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity. No specific motive or technical exploitation details were disclosed.
    Date: 2026-05-16T00:50:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922820
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Italy
    Victim Industry: Financial Services / Accounting
    Victim Organization: Dottoressa Rosset (Commercialista)
    Victim Site: commercialistadottoressarosset…
  638. Website Defacement of Safe Hands Accounting by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as chinafans, operating under the group 0xteam, defaced the website of Safe Hands Accounting, a UK-based accounting firm. The incident was a targeted single-site defacement, not classified as a mass or home page defacement. No specific motivation or server details were disclosed in the available intelligence.
    Date: 2026-05-16T00:50:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922819
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United Kingdom
    Victim Industry: Financial Services / Accounting
    Victim Organization: Safe Hands Accounting
    Victim Site: safehandsaccounting.co.uk
  639. Sale of stolen credit cards for multiple countries with balances up to $5,000
    Category: Carding
    Content: A threat actor is offering stolen credit cards purportedly valid for multiple countries including the UK, USA, Canada, and Australia, with claimed balances between $1,000 and $5,000. The cards are advertised as suitable for online payments, bill payments, shopping, and linking to accounts. The seller offers free replacements for non-working cards and directs buyers to contact via Telegram handle @kaiotp.
    Date: 2026-05-16T00:49:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-I-got-valid-CC%E2%80%99s-for-all-countries-with-the-balance-of-1k-5k-with-All-Access-Info–204244
    Screenshots:
    None
    Threat Actors: poisonBM265
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  640. Website Defacement of hesinhisbag.com by chinafans (0xteam)
    Category: Defacement
    Content: The website hesinhisbag.com was defaced by threat actor chinafans, operating under the team name 0xteam, on May 16, 2026. The defacement was a targeted single-site attack, leaving a text file at the path /0x.txt as evidence of the intrusion. No specific motive or reason was provided for the attack.
    Date: 2026-05-16T00:49:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922823
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hesinhisbag.com
  641. Sale of Hotmail combo list with 1,845 valid credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 1,845 purportedly valid Hotmail credentials on a cybercrime forum. The post markets the list as UHQ (ultra-high quality) and references private cloud access. Contact is directed via Telegram.
    Date: 2026-05-16T00:48:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1845-Valid-UHQ-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  642. Website Defacement of Sri Suryas International by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website of Sri Suryas International, an Indian commercial entity, was defaced by threat actor chinafans operating under the group 0xteam. The attack was a targeted, non-mass defacement of a subdirectory or specific page on the domain. The incident was archived and mirrored by zone-xsec.com under mirror ID 922813.
    Date: 2026-05-16T00:48:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922813
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Commerce / Trade
    Victim Organization: Sri Suryas International
    Victim Site: srisuryasinternational.in
  643. Website Defacement of theartitech-hub.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website theartitech-hub.com was defaced by a threat actor operating under the handle chinafans, affiliated with the group 0xteam. The defacement was a targeted, non-mass attack against what appears to be a technology-oriented organization. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-16T00:47:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922824
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: ArtiTech Hub
    Victim Site: theartitech-hub.com
  644. Website Defacement of dieciterre.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website dieciterre.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was a targeted, single-site incident with no indication of mass or repeated defacement activity. The server details and motive behind the attack remain unknown.
    Date: 2026-05-16T00:46:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922811
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Dieciterre
    Victim Site: dieciterre.com
  645. Website Defacement of AG International Group by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the threat actor chinafans, operating under the group 0xteam, successfully defaced the website of AG International Group at aginternationalgroup.net. The attack was a targeted single-site defacement, with no indication of mass or repeated defacement activity. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-05-16T00:46:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922812
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Business Services
    Victim Organization: AG International Group
    Victim Site: aginternationalgroup.net
  646. Website Defacement of tcboton.com by chinafans (0xteam)
    Category: Defacement
    Content: The website tcboton.com was defaced by a threat actor identified as chinafans, operating under the group 0xteam, on May 16, 2026. The defacement was recorded as a single, non-mass, non-repeated incident targeting a specific file path on the domain. No additional details regarding the attackers motivation, server configuration, or proof of concept were provided.
    Date: 2026-05-16T00:45:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922817
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: TC Boton
    Victim Site: tcboton.com
  647. Website Defacement of Comforth by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xteam, defaced the Brazilian website comforth.com.br on May 16, 2026. The defacement was a targeted single-site attack, not part of a mass defacement campaign. The incident was mirrored and archived by zone-xsec.com for record-keeping purposes.
    Date: 2026-05-16T00:44:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922826
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Comforth
    Victim Site: comforth.com.br
  648. Website Defacement of Hope McGill by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website hopemcgill.com was defaced by a threat actor operating under the handle chinafans, affiliated with the group 0xteam. The attacker targeted a specific file path (/0x.txt) on the domain. The incident was a single, non-mass, non-home page defacement, with a mirror of the defacement archived at zone-xsec.com.
    Date: 2026-05-16T00:43:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922805
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Hope McGill
    Victim Site: hopemcgill.com
  649. Website Defacement of Ashoka Empire by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the Indian website ashokaempire.in was defaced by threat actor chinafans operating under the group 0xteam. The attacker uploaded a defacement file at the path /0x.txt. The incident was a targeted, non-mass defacement with no specific motivation publicly disclosed.
    Date: 2026-05-16T00:37:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922733
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Ashoka Empire
    Victim Site: ashokaempire.in
  650. Website Defacement of azurprotectsystem.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor identified as chinafans, operating under the group 0xteam, defaced the website azurprotectsystem.com by placing a defacement file at the path /0x.txt. The targeted domain appears to belong to a technology or cybersecurity-oriented organization. The incident was recorded as a standalone, non-mass defacement with no additional technical server details available.
    Date: 2026-05-16T00:37:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922739
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology / Cybersecurity
    Victim Organization: Azur Protect System
    Victim Site: azurprotectsystem.com
  651. Website Defacement of Balboa Rare Books by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website balboararebooks.com was defaced by threat actor chinafans, operating under the group 0xteam. The attacker placed a defacement file at balboararebooks.com/0x.txt. This was a targeted, non-mass defacement with no prior redefacement history recorded.
    Date: 2026-05-16T00:36:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922728
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Retail / Books and Collectibles
    Victim Organization: Balboa Rare Books
    Victim Site: balboararebooks.com
  652. Website Defacement of daviddesant.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website daviddesant.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The attacker targeted a specific text file path (/0x.txt) on the domain. No additional technical details such as server software, IP address, or motivation were disclosed in connection with this incident.
    Date: 2026-05-16T00:35:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922744
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: David De Sant
    Victim Site: daviddesant.com
  653. Website Defacement of AK Art Space by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website ak-artspace.com was defaced by a threat actor identified as chinafans, operating under the group 0xteam. The defacement was a targeted single-site incident, with a mirror of the defaced page archived at zone-xsec.com. The victim organization appears to be an art-related entity based on the domain name, though further attribution details including server configuration and attacker motive remain unknown.
    Date: 2026-05-16T00:34:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922727
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Arts and Culture
    Victim Organization: AK Art Space
    Victim Site: ak-artspace.com
  654. Website defacement of AAP Social Media by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias chinafans, affiliated with 0xteam, defaced the website aapsocialmedia.org. The defacement targeted a file at the path /0x.txt and was not classified as a mass or home page defacement. No specific motive or server details were disclosed for this incident.
    Date: 2026-05-16T00:34:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922752
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Political/Social Media
    Victim Organization: AAP Social Media
    Victim Site: aapsocialmedia.org
  655. Website Defacement of MSD Consulting Services by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, threat actor chinafans operating under the group 0xteam defaced the website of MSD Consulting Services. The attack targeted a specific page on the domain rather than the homepage, indicating a targeted page-level defacement. No specific motive or server details were disclosed in association with this incident.
    Date: 2026-05-16T00:33:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922726
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Professional Services / Consulting
    Victim Organization: MSD Consulting Services
    Victim Site: msdconsultingservices.com
  656. Website Defacement of CUYCPC by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website cuycpc.org by uploading a defacement file at the path /0x.txt. The incident was a targeted, single-site defacement with no indication of mass or repeated defacement activity. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-16T00:32:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922734
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: CUYCPC
    Victim Site: cuycpc.org
  657. Germany mail access combo list (1.8K)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,800 German mail account credentials. The content is hidden behind a registration/login wall and is described as private data from the posters collection.
    Date: 2026-05-16T00:32:20Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%E2%84%B9%EF%B8%8F1-8k-germany-mail-access-mix%E2%84%B9%EF%B8%8F%E2%9C%A8-15-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  658. Website Defacement of Stylish Jewelry Wholesale by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website stylishjewelrywholesale.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The attack was a targeted single-site defacement, and a mirror of the defaced page was archived at zone-xsec.com. No specific motive, server details, or proof-of-concept were disclosed.
    Date: 2026-05-16T00:32:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922748
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail / Jewelry Wholesale
    Victim Organization: Stylish Jewelry Wholesale
    Victim Site: stylishjewelrywholesale.com
  659. Sale of 20K private combo list
    Category: Combo List
    Content: A threat actor is offering a private combo list of 20,000 email and password pairs on a cracking forum. No additional details about the targeted services or data origin are available from the post content.
    Date: 2026-05-16T00:31:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-20k-Private-Combolist
    Screenshots:
    None
    Threat Actors: BygBB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  660. Website Defacement of ghostelf.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website ghostelf.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement targeted a specific text file path (0x.txt) and was neither a mass defacement nor a redefacement, suggesting a targeted singular intrusion. A mirror of the defaced content was archived at zone-xsec.com.
    Date: 2026-05-16T00:31:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922738
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ghost Elf
    Victim Site: ghostelf.com
  661. Sale of HQ Email:Pass Combo Lists
    Category: Combo List
    Content: A threat actor is advertising high-quality email:password combo lists for sale via Telegram, with additional free combos available through a Telegram group. No specific victim organization, record count, or data origin is disclosed.
    Date: 2026-05-16T00:31:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-NEW-HQ-7-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  662. Combo list of 43,000 Hotmail credentials
    Category: Combo List
    Content: A threat actor is sharing or selling a combo list of approximately 43,000 Hotmail email and password pairs, advertised as private. No further details are available from the post content.
    Date: 2026-05-16T00:30:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-43k-Hotmail-Full-Private
    Screenshots:
    None
    Threat Actors: BygBB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  663. Website Defacement of meethubz.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website meethubz.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was a targeted, single-site incident with a text-based payload hosted at meethubz.com/0x.txt. No additional details regarding the attackers motivation or server infrastructure were disclosed.
    Date: 2026-05-16T00:30:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922751
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: MeetHubz
    Victim Site: meethubz.com
  664. Hotmail combo list freely shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of 996 Hotmail email and password pairs on a cracking forum. The post is labeled as old data and marketed as VIP Cloud access. No price is mentioned, suggesting the credentials were freely distributed.
    Date: 2026-05-16T00:30:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8%E2%84%B9%EF%B8%8FX996-HOTMAIL-MAIL-ACCESS%E2%84%B9%EF%B8%8F%E2%9C%A8-15-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  665. Website Defacement of plenum-vs.ch by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the Swiss website plenum-vs.ch was defaced by a threat actor operating under the handle chinafans, associated with the hacking group 0xteam. The defacement was a targeted, single-site incident and not part of a mass defacement campaign. A mirror of the defacement was archived via zone-xsec.com.
    Date: 2026-05-16T00:29:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922746
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Plenum VS
    Victim Site: plenum-vs.ch
  666. Website Defacement of Settvisual by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the Brazilian website settvisual.com.br was defaced by threat actor chinafans, affiliated with the hacking group 0xteam. The defacement was recorded as a targeted single-site incident, with the attacker leaving a text file (0x.txt) as evidence of the compromise. No specific motive or server details were disclosed in the available incident data.
    Date: 2026-05-16T00:29:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922736
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Visual Arts / Creative Services
    Victim Organization: Settvisual
    Victim Site: settvisual.com.br
  667. Website defacement of utility.cl by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced a file hosted on utility.cl, a Chilean website likely associated with utility services. The defacement targeted a specific text file (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The attack was neither a mass defacement nor a redefacement event.
    Date: 2026-05-16T00:28:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922730
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Chile
    Victim Industry: Utilities
    Victim Organization: Utility.cl
    Victim Site: utility.cl
  668. Website Defacement of calibelle.fr by chinafans (0xteam)
    Category: Defacement
    Content: The website calibelle.fr was defaced by threat actor chinafans, operating under the group 0xteam, on May 16, 2026. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file drop or partial defacement. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-05-16T00:27:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922756
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Calibelle
    Victim Site: calibelle.fr
  669. Website Defacement of Tomorrow Studios by chinafans (0xteam)
    Category: Defacement
    Content: The website tomorrow-studios.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a subdirectory file (0x.txt) and was recorded on May 16, 2026. The incident was a singular, non-mass defacement with no prior redefacement history noted.
    Date: 2026-05-16T00:26:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922732
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Entertainment / Media Production
    Victim Organization: Tomorrow Studios
    Victim Site: tomorrow-studios.com
  670. Website defacement of Reva Group by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced a page on revagrup.com.tr, a Turkish domain associated with Reva Group. The defacement targeted a specific URL path rather than the homepage, indicating a targeted file-level intrusion. No specific motivation or server details were disclosed in connection with this incident.
    Date: 2026-05-16T00:26:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922737
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Turkey
    Victim Industry: Unknown
    Victim Organization: Reva Group
    Victim Site: revagrup.com.tr
  671. Website Defacement of victoriabafi-yeboa.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor operating under the alias chinafans and affiliated with 0xteam defaced the website victoriabafi-yeboa.com, uploading a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no additional technical indicators such as server software or IP address recorded. The attack was documented and mirrored by zone-xsec.com.
    Date: 2026-05-16T00:25:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922731
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Victoria Bafi-Yeboa
    Victim Site: victoriabafi-yeboa.com
  672. Website Defacement of Roboops by chinafans (0xteam)
    Category: Defacement
    Content: The website roboops.com was defaced by threat actor chinafans operating under the group 0xteam on May 16, 2026. The defacement was a targeted single-site attack, leaving a text-based payload at the path /0x.txt. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-05-16T00:24:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922743
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Roboops
    Victim Site: roboops.com
  673. Website Defacement of Dainteadecor by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website dainteadecor.com, a home decor business. The defacement was a targeted, single-site incident with no mass or re-defacement indicators, and was archived via zone-xsec.com.
    Date: 2026-05-16T00:24:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922750
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail / Home Decor
    Victim Organization: Dainte a Decor
    Victim Site: dainteadecor.com
  674. Website Defacement of Pressure Cleaning Sunshine Coast by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website of Pressure Cleaning Sunshine Coast, a small business offering pressure cleaning services in Australia. The attack was a targeted single-site defacement, with no indication of mass or repeated defacement activity. The incident was documented and mirrored via zone-xsec.com.
    Date: 2026-05-16T00:23:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922747
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Australia
    Victim Industry: Home Services / Cleaning Services
    Victim Organization: Pressure Cleaning Sunshine Coast
    Victim Site: pressurecleaningsunshinecoast.com.au
  675. Website Defacement of Brandlux by chinafans (0xteam)
    Category: Defacement
    Content: On May 16, 2026, the website brandlux.shop was defaced by threat actor chinafans operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) on the e-commerce domain, consistent with the groups naming convention. The incident was a single-target, non-mass defacement with no known stated motive or exposed server details.
    Date: 2026-05-16T00:22:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/922753
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Retail / E-commerce
    Victim Organization: Brandlux
    Victim Site: brandlux.shop
  676. Combo List targeting Hotmail
    Category: Combo List
    Content: A threat actor shared a combo list of 1,920 Hotmail credentials on a cybercrime forum. The content is gated behind registration or login. The credentials are marketed as verified valid (good) hits for Hotmail accounts.
    Date: 2026-05-16T00:16:13Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85%E2%9A%A11920x-good-hotmail%E2%9A%A1%E2%9C%85
    Screenshots:
    None
    Threat Actors: NovaCloudx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  677. Sale of 980 Hotmail credentials combo list
    Category: Combo List
    Content: A forum post on a combolist section advertises 980 alleged valid Hotmail credentials dated May 15, 2026. The content is hidden behind a login/registration wall, limiting further detail. These credentials are marketed as valid access for credential stuffing purposes.
    Date: 2026-05-16T00:15:40Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8F%87980-hotmail-valid-access-15-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  678. Forum co-ownership announcement by TeamPCP on Breached forum
    Category: Alert
    Content: TeamPCP announced their new role as co-owners of the Breached forum, outlining responsibilities including platform operations, staff management, community growth, and resource quality verification. The post includes contact details via Session and TOX messaging handles.
    Date: 2026-05-16T00:11:17Z
    Network: openweb
    Published URL: https://breached.st/threads/teampcp-partnership-forum-co-ownership.87176/unread
    Screenshots:
    None
    Threat Actors: TeamPCP
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  679. Sale of Mexican bank statements and financial documents
    Category: Data Breach
    Content: A threat actor is offering for sale over 900,000 files totaling 125GB of Mexican personal and financial documents dated 2021. The dataset allegedly includes bank statements, payroll receipts, utility bills, tax documents, and ID scans, with PII fields such as full name, RFC, CURP, CLABE, home address, employer details, salary, and transaction history. The originating organization has not been identified.
    Date: 2026-05-16T00:10:13Z
    Network: openweb
    Published URL: https://breached.st/threads/mexico-900k-bank-statements-financial-documents-125gb-2021.87175/unread
    Screenshots:
    None
    Threat Actors: tabaskoss
    Victim Country: Mexico
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  680. Sale of UHQ Yahoo combo list with 1.3K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as UHQ and fresh containing approximately 1,300 Yahoo credentials. The list is intended for credential stuffing or account takeover activity targeting Yahoo accounts.
    Date: 2026-05-16T00:01:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-1-3K-UHQ-YAHOO-COMBO-FRESH–2094496
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  681. Sale of UHQ Outlook combo list
    Category: Combo List
    Content: A combo list of approximately 1,300 Outlook credentials is being shared on a cybercrime forum, marketed as UHQ and fresh. The list is intended for credential stuffing against Outlook/Microsoft accounts.
    Date: 2026-05-16T00:00:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-1-3K-UHQ-OUTLOOK-COMBO-FRESH–2094497
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown