This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
1. Alleged data leak of Syed Abul Hossain University College
- Category: Data Breach
- Content: The threat actor claims to have leaked 88.01KB of data from Syed Abul Hossain University College reportedly containing Indian user information.
- Date: 2025-07-21T13:46:00Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-All-India-database-of-sahc-education)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/9d6ec7ae-a7c6-4335-b9c6-22a7514e1ed2.png
- https://d34iuop8pidsy8.cloudfront.net/1f04cb50-7e82-4d4f-9bf4-d4f30ef4d64b.png
- Threat Actors: fkzsecxploit
- Victim Country: Bangladesh
- Victim Industry: Education
- Victim Organization: syed abul hossain university college
- Victim Site: sahc.edu.bd
2. Alleged data leak Club Penguin Rewritten
- Category: Data Breach
- Content: The threat actor claims to have leaked data from a July 2019 breach of Club Penguin Rewritten, an independent recreation of Disney’s original game. The breach reportedly exposed 4 million email addresses, IP addresses, usernames, and bcrypt-hashed passwords.
- Date: 2025-07-21T13:16:07Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Club-Penguin-Rewritten)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/2f165517-bd05-456f-a058-a465e7747a9f.png
- Threat Actors: TAO
- Victim Country: Unknown
- Victim Industry: Gaming
- Victim Organization: club penguin rewritten
- Victim Site: community.cprewritten.net
3. Alleged data sale of Bienestar Human Services
- Category: Data Breach
- Content: The threat actor claims to be selling data of 318K users from the database of Bienestar Human Services.
- Date: 2025-07-21T12:52:57Z
- Network: openweb
- Published URL: https://xss.is/threads/142292/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/4e791751-34da-457b-9660-51e877ced7f0.png
- Threat Actors: DataVortexDB
- Victim Country: Mexico
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: bienestar human services
- Victim Site: bienestar.org
4. Alleged dat sale of Bienestar Human Services
- Category: Data Breach
- Content: The threat actor claims to be selling data of 318K users from the database of Bienestar Human Services.
- Date: 2025-07-21T12:52:35Z
- Network: openweb
- Published URL: https://xss.is/threads/142292/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/4e791751-34da-457b-9660-51e877ced7f0.png
- Threat Actors: DataVortexDB
- Victim Country: Mexico
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: bienestar human services
- Victim Site: bienestar.org
5. Alleged sale of credit card data from UK
- Category: Data Leak
- Content: The threat actor claims to be selling 1500 credit card data from UK.
- Date: 2025-07-21T12:40:37Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262841/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/dbb46259-eea1-4078-ac84-a999053441d5.png
- Threat Actors: Stari4ok
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
6. Alleged admin access sale to Commercial Trust Bridge Bank
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized admin access to Commercial Trust Bridge Bank.
- Date: 2025-07-21T11:56:19Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Selling-LOAN-commercialtrustbridge-org-Admin-Dashboard-Selling)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/98e5706d-92ce-4fd8-ba57-3901ccce98b4.png
- Threat Actors: R0m4nce
- Victim Country: Algeria
- Victim Industry: Banking & Mortgage
- Victim Organization: commercial trust bridge bank
- Victim Site: commercialtrustbridge.org
7. Alleged Data Leak of Malindo Air
- Category: Data Breach
- Content: The threat actor claims to have leaked a customer database allegedly stolen from Malindo Air, Malaysia’s largest national airline. The breach reportedly occurred in 2019 and exposed over 4.3 million customer records. The compromised data includes names, dates of birth, genders, email addresses, physical addresses, phone numbers, nationalities, passport details, loyalty program details, and salutations. NB: The breach happened in 2019
- Date: 2025-07-21T11:51:37Z
- Network: openweb
- Published URL: https://leakbase.la/threads/malaysia-malindoair-com-largest-national-airline-4-3m-customers-2019.40592/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f2e5b19e-81da-4079-9cd5-ddc2a1e256b7.PNG
- Threat Actors: joe_goldberg
- Victim Country: Malaysia
- Victim Industry: Aviation & Aerospace
- Victim Organization: malindo air
- Victim Site: malindoair.com
8. Alleged RDWeb Access Sale to Canadian Construction Firm
- Category: Initial Access
- Content: The threat actor claims to be selling RDWeb access to a Canadian company in the commercial and residential construction industry. The access allegedly includes domain user rights and internal Zoom usage. The victim organization reportedly has a revenue of under $5 million.
- Date: 2025-07-21T11:42:49Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262801/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6e8030f9-4d8c-47a6-98b2-2a3ad5e652f4.PNG
- Threat Actors: ProfessorKliq
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
9. Alleged RDWeb Access Sale to Canadian ERP Software Company
- Category: Initial Access
- Content: The threat actor claims to be selling RDWeb access to another Canadian company using Zoom for ERP software. The access is said to include domain user credentials. The targeted organization is reported to have a revenue of $45 million.
- Date: 2025-07-21T11:42:41Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262801/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6d20573b-16b4-4737-9aaf-2b8071310a4e.PNG
- Threat Actors: ProfessorKliq
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
10. Alleged RDWeb Access Sale to UK Energy and Utilities Company
- Category: Initial Access
- Content: The threat actor claims to be offering RDWeb access to a UK-based company in the energy, utilities, and waste sector. The access allegedly grants domain user rights, and the company reportedly uses Zoom internally. The organization’s revenue is listed as $75 million.
- Date: 2025-07-21T11:42:37Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262801/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/48c97994-8d9f-492a-bb97-fd32791c5a5f.PNG
- Threat Actors: ProfessorKliq
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
11. Alleged RDWeb Access Sale to UK Civil Engineering Firm
- Category: Initial Access
- Content: The threat actor claims to be selling RDWeb access to a UK civil engineering and construction company. According to the post, the access includes domain user privileges and Zoom usage. The organization is said to have a revenue of $176 million.
- Date: 2025-07-21T11:42:28Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262801/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/20ef9dd7-366b-41d6-9af4-93c709e1f3b1.PNG
- Threat Actors: ProfessorKliq
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
12. Alleged leak of Telegram Social Engineering Database
- Category: Data Leak
- Content: The threat actor claims to have leaked an Unknown Telegram-based Social Engineering Database.
- Date: 2025-07-21T11:26:18Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-tg-Social-Engineering-Database)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/02a48426-5abb-411b-9f6c-f5ccaac91b8e.png
- Threat Actors: flyme
- Victim Country: Unknown
- Victum Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
13. Alleged data breach of Dell Technologies
- Category: Data Breach
- Content: The group claims to have obtained data from the organization.
- Date: 2025-07-21T11:20:46Z
- Network: tor
- Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/6057273603/overview
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/43c8baab-6ba3-4819-8fbb-4d487761fef8.png
- Threat Actors: Worldleaks
- Victim Country: USA
- Victim Industry: Computer Hardware
- Victim Organization: dell technologies
- Victim Site: dell.com
14. Alleged data leak of BMW Kun Exclusive
- Category: Data Breach
- Content: The threat actor claims to have leaked 60GB of data from BMW Kun Exclusive, a BMW dealership in Bengaluru, India. which includes login credentials, API keys, tokens, and access to marketing SMS platforms, WhatsApp business accounts, and internal systems for 19 BMW dealerships across India, potentially allowing full unauthorized system takeover.
- Date: 2025-07-21T10:38:44Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-BMW-INDIA-DATA-BREACH)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/4f2aef96-06ff-43ef-942f-d4dca4a8e55b.png
- Threat Actors: joe_goldberg
- Victim Country: India
- Victim Industry: Automotive
- Victim Organization: bmw kun exclusive
- Victim Site: bmw-kunexclusive-bengaluru.in
15. Alleged sale of unauthorized access to a Stock Training site in the US
- Category: Initial Access
- Content: hreat actor claims to be selling unauthorized admin and SQL access to a US-based WordPress site offering stock market training courses.
- Date: 2025-07-21T10:21:12Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262810/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6140f4c1-8332-4ce4-acae-05cb37cb8fa4.png
- Threat Actors: 0x1
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: Unknown
- Victim Site: Unknown
16. Alleged sale of unauthorized access to a US Stock Training site
- Category: Initial Access
- Content: hreat actor claims to be selling unauthorized admin and SQL access to a US-based WordPress site offering stock market training courses.
- Date: 2025-07-21T10:14:52Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/262810/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6140f4c1-8332-4ce4-acae-05cb37cb8fa4.png
- Threat Actors: 0x1
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: Unknown
- Victim Site: Unknown
17. Alleged sale of Chinese User Database
- Category: Data Leak
- Content: The threat actor claims to be selling a database of 930K real Chinese users, including real names, phone numbers, emails, passwords, ID cards, birthdates, addresses, QQ numbers, and device details. The data appears to be linked to verified identities, with fields like login status, API tokens, and registration details.
- Date: 2025-07-21T07:38:56Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-930K-CHINESE-REAL-USER-DATABASE)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/a921faef-462a-4235-a38b-6abc66031e05.png
- Threat Actors: DigitalGhostt
- Victim Country: China
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
18. Alleged sale of an unidentified German Email Database
- Category: Data Leak
- Content: The threat actor claims to be selling an unidentified German email base containing full name, email, and mobile phone details.
- Date: 2025-07-21T07:38:50Z
- Network: openweb
- Published URL: https://xss.is/threads/142274/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/34f065b5-a507-4714-b425-a3dbf39b85e7.png
- Threat Actors: erszan
- Victim Country: Germany
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
19. Alleged data leak of Kramat Jati Police Hospital
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Indonesia’s Kramat Jati Police Hospital, including 38,064 HIV patient records and 2,133 visit logs.
- Date: 2025-07-21T07:19:18Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-INDONESIA-Hospital-POLRI-Kramat-Jati)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/8d9c54d8-bf31-4a18-894b-f5159fbd63b9.png
- https://d34iuop8pidsy8.cloudfront.net/082eaaa9-03b6-4330-97b8-c4823ddb6164.png
- Threat Actors: saTaoz
- Victim Country: Indonesia
- Victim Industry: Hospital & Health Care
- Victim Organization: kramat jati police hospital
- Victim Site: rumahsakitpolrikramatjati.co.id
20. Alleged data breach of SADNAT factory
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 2TB of sensitive information stolen from the Israeli SADNAT drone equipment factory. The data reportedly includes classified details related to military components for companies like Rafael, Elbit Systems, IAI, Boeing, and Orbit.
- Date: 2025-07-21T07:01:15Z
- Network: telegram
- Published URL: https://t.me/CyberIsnaadFront1/556
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f8136901-08e0-44d7-9325-4eac53a2bc0c.png
- Threat Actors: Cyber Isnaad Front
- Victim Country: Israel
- Victim Industry: Defense & Space
- Victim Organization: sadnat factory
- Victim Site: Unknown
21. Alleged data breach of SADNAT factory
- Category: Data Breach
- Content: The threat actor claims to have breached the website of SADNAT factory.
- Date: 2025-07-21T06:38:13Z
- Network: telegram
- Published URL: https://t.me/CyberIsnaadFront1/556
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f8136901-08e0-44d7-9325-4eac53a2bc0c.png
- Threat Actors: Cyber Isnaad Front
- Victim Country: Israel
- Victim Industry: Defense & Space
- Victim Organization: sadnat factory
- Victim Site: sadatan.com
22. Alleged sale of Gui SQLMap Pro v2.0 Pentesting tool
- Category: Malware
- Content: The threat actor claims to be selling a custom-developed penetration testing tool named Gui SQLMap Pro v2.0, marketed as a powerful and comprehensive security testing solution for Windows. Designed for ethical hackers, bug bounty hunters, and cybersecurity professionals, the tool allegedly supports automatic detection of vulnerabilities like SQL Injection, XSS, and CSRF, smart crawling for admin panels, port/service scanning, and professional reporting features.
- Date: 2025-07-21T05:31:42Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Source-Code-%F0%9F%9A%80-The-most-powerful-Pentesting-tool-%F0%9F%92%BB)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/643057e7-4479-4abf-a73a-549648ab1a76.png
- Threat Actors: Mr_king
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
23. Alleged sale of Gui SQLMap Pro v2.0 Pentesting too
- Category: Malware
- Content: The threat actor claims to be selling a custom-developed penetration testing tool named Gui SQLMap Pro v2.0, marketed as a powerful and comprehensive security testing solution for Windows. Designed for ethical hackers, bug bounty hunters, and cybersecurity professionals, the tool allegedly supports automatic detection of vulnerabilities like SQL Injection, XSS, and CSRF, smart crawling for admin panels, port/service scanning, and professional reporting features.
- Date: 2025-07-21T05:31:31Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Source-Code-%F0%9F%9A%80-The-most-powerful-Pentesting-tool-%F0%9F%92%BB)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/643057e7-4479-4abf-a73a-549648ab1a76.png
- Threat Actors: Mr_king
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
24. Alleged sale of unauthorized access to Royal Thai Air Force
- Category: Initial Access
- Content: The threat actor claims to be selling shell access to the Royal Thai Air Force’s network. The listing specifies that the initial access is on a Linux operating system
- Date: 2025-07-21T05:22:11Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Selling-Royal-Thai-AirForce-Network-Access)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/47a92533-2423-4088-9d62-db2e375465b9.png
- Threat Actors: shine
- Victim Country: Thailand
- Victim Industry: Aviation & Aerospace
- Victim Organization: royal thai air force
- Victim Site: do.rtaf.mi.th
25. Alleged sale of ShadowFlood DDoS tool
- Category: Malware
- Content: The threat actor claims to be selling a custom Layer 7 DDoS tool named ShadowFlood, designed to launch HTTP-based attacks via the Tor network. The tool allegedly initiates 30 concurrent Tor instances, each using a different exit node to maximize traffic distribution and resilience. It also rotates exit nodes if blocked and employs 1,000 randomized user-agent strings to mimic legitimate web traffic, enhancing its ability to bypass common DDoS protections.
- Date: 2025-07-21T04:01:36Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-ShadowFlood-DDoS-tool-Layer-7-only)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/25842f67-f9c7-4859-bf5c-e4dab5b9a33a.png
- Threat Actors: l33tfg
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
26. Alleged access to SAGUE system in Madrid
- Category: Initial Access
- Content: The group claims access to the SAGUE irrigation system in Madrid, deactivating the main switch and causing a full shutdown. This disrupted irrigation, fertilizer control, and scheduling. Recovery attempts are logged.
- Date: 2025-07-21T03:19:31Z
- Network: telegram
- Published URL:(https://t.me/n2LP_wVf79c2YzM0/699)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/208229b0-d580-45bf-aa43-fd25fce47c9c.jpg
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Spain
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
27. Alleged Sale of Rootkit-Based Exploit Targeting Cocoa Paycard and Kapital Bank
- Category: Vulnerability
- Content: The threat actor claims to have breached Cocoa Paycard and Autofin’s Kapital Bank, gaining access to their core banking system (T24) and exposing complete customer databases. The attacker reports downloading both front-end and back-end components of the companies’ websites, exploiting weak WAF configurations. A rootkit was allegedly installed as a backdoor on Cocoa’s servers, enabling further unauthorized access.
- Date: 2025-07-21T03:14:57Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Highly-exploitable-customer-database-with-a-rootkit-to-install-viruses-or-ransomware)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3d7f5602-b895-47b1-ad95-6dec25219fd8.png
- Threat Actors: HackHawei0
- Victim Country: Mexico
- Victim Industry: Financial Services
- Victim Organization: cacao paycard
- Victim Site: cacaopaycard.com
28. Alleged Sale of Rootkit-Based Exploit Targeting Cocoa Paycard and Kapital Bank
- Category: Vulnerability
- Content: The threat actor claims to have breached Cocoa Paycard and Autofin’s Kapital Bank, gaining access to their core banking system (T24) and exposing complete customer databases. The attacker reports downloading both front-end and back-end components of the companies’ websites, exploiting weak WAF configurations. A rootkit was allegedly installed as a backdoor on Cocoa’s servers, enabling further unauthorized access.
- Date: 2025-07-21T03:11:55Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Highly-exploitable-customer-database-with-a-rootkit-to-install-viruses-or-ransomware)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3d7f5602-b895-47b1-ad95-6dec25219fd8.png
- Threat Actors: HackHawei0
- Victim Country: Mexico
- Victim Industry: Financial Services
- Victim Organization: cacao paycard
- Victim Site: cacaopaycard.com
29. Alleged data leak of French Minecraft PVP Faction
- Category: Data Leak
- Content: The threat actor claims to have leaked the IP addresses of over 300 French Minecraft PvP Faction players.
- Date: 2025-07-21T02:52:49Z
- Network: openweb
- Published URL: https://kittyforums.to/thread/654
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/989d7e37-d988-4f03-bf2d-8f8a54bbb74d.png
- Threat Actors: minebroker
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
30. Alleged leak of 2.5TB Israel database
- Category: Data Leak
- Content: The threat actor claims to have leaked a massive 2.5TB dataset allegedly from Israeli government and military sources. The database reportedly contains highly sensitive information across various sectors, including Iron Dome missile system data, military strategies, war fund details, presidential documents, and strategic national plans. It also includes civilian records such as education, healthcare, job and population data, school and university personnel files, CCTV footage, Israeli bank card information, and police contacts.
- Date: 2025-07-21T02:28:27Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Document-2-5TB-ISRAEL-STATE-DATABASE)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/e008c587-8283-4d0c-9a14-403d9073ac6c.png
- Threat Actors: DigitalGhostt
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
31. Alleged leak of unauthorized access to Hat Yai City Municipality
- Category: Initial Access
- Content: The group claims to have gained unauthorized access belonging to an Hat Yai City Municipality.
- Date: 2025-07-21T02:09:03Z
- Network: telegram
- Published URL: https://t.me/nxbbsec/960
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6f1ec6ec-21e9-435e-a4e4-233bc1cf2402.png
- Threat Actors: NXBB.SEC
- Victim Country: Thailand
- Victim Industry: Government Administration
- Victim Organization: hat yai city municipality
- Victim Site: hatyaicity.go.th
32. Alleged 60k France database leak
- Category: Data Leak
- Content: The threat claims to have leaked a database containing personal information of 60,000 individuals in France. The exposed data includes first and last names, phone numbers, dates of birth, email addresses, full physical addresses, postal codes, cities, and country
- Date: 2025-07-21T02:00:40Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-Data-Base-60k-in-France-Full-info)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/8d4fa867-4ff5-443d-914f-ba2e2a34a438.png
- Threat Actors: icikevin
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
33. Alleged leak of customer records from a Brazilian casino
- Category: Data Leak
- Content: The threat actor claims to have leaked a database containing 16 million customer records from a Brazilian online casino platform, spanning the years 2024 to 2025. The exposed data includes full names, dates of birth, email addresses, phone numbers, cities, ZIP codes, preferred games (such as Poker, Roulette, Blackjack, and Slots), last deposit amounts in USD, VIP status, last login dates, and marketing opt-in preferences.
- Date: 2025-07-21T01:47:30Z
- Network: openweb
- Published URL:(https://darkforums.st/Thread-16-Million-Cassino-In-Brazilian-2024-2025-DATABASE)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3a2712b8-db2b-4f51-b067-876af87cba63.png
- Threat Actors: DigitalGhostt
- Victim Country: Brazil
- Victim Industry: Gambling & Casinos
- Victim Organization: Unknown
- Victim Site: Unknown
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.