[April-1-2026] Daily Cybersecurity Threat Report

Comprehensive Threat Intelligence Report: Analysis of Global Cybersecurity Incidents (April 1-2, 2026)

1. Executive Summary This comprehensive threat intelligence report provides an in-depth analysis of a concentrated wave of global cybersecurity incidents recorded primarily between April 1 and April 2, 2026. Based on the provided dataset of hundreds of distinct cyber events, this report identifies, categorizes, and evaluates the tactics, techniques, and procedures (TTPs) employed by various threat actors across the globe. The threat landscape during this period was characterized by a massive volume of website defacements, the widespread free distribution of multi-million-record credential combo lists, severe data breaches targeting both government infrastructure and major corporations, and the active trading of initial access to compromised networks.

The data reveals a highly active cybercriminal ecosystem where low-tier attacks (such as defacements) operate concurrently with highly sophisticated data exfiltration campaigns and the mass distribution of compromised identities. A significant portion of the recorded incidents can be attributed to specific, highly prolific threat actors and groups, most notably the “Ratman” team (specifically an actor named “Rici144”), “scattered LAPSUS$ hunters part 9”, “Grubder”, “xorcat”, and “CODER”. The targeting spans across all major industries, including retail, government, education, healthcare, and critical manufacturing, indicating that no sector is immune to the current wave of cyber threats. This report serves to dissect these incidents, profile the key adversaries, assess the potential impact on affected organizations, and provide actionable strategic recommendations to mitigate these persistent risks.

2. Introduction and Methodology The digital ecosystem is under constant siege from a myriad of threat actors ranging from script kiddies and hacktivists to organized cybercriminal syndicates and financially motivated data brokers. This report analyzes a specific snapshot of threat intelligence data comprising nearly 300 documented incidents. The purpose of this analysis is to distill raw incident data into actionable intelligence, providing organizations with a clear understanding of the immediate threat landscape.

The methodology involves parsing the raw data to extract key indicators: the category of the attack, the threat actor involved, the victim’s industry and geographical location, and the nature of the compromised data or system. By aggregating these data points, we can identify macro-level trends, such as which geographic regions are being targeted by specific hacking groups, what types of data are currently most valuable in the underground economy, and the prevalent attack vectors being utilized to compromise perimeters. The report is structured to provide a macroscopic overview followed by microscopic deep dives into specific threat categories and actor profiles, concluding with defensive strategies.

3. Threat Landscape Overview An analysis of the dataset reveals a multi-faceted threat landscape dominated by four primary categories of malicious activity:

  • Website Defacements: Representing the highest volume of individual incidents, website defacements were rampant during this period. While often considered a low-level threat or a form of digital graffiti, the sheer scale of these attacks indicates widespread vulnerabilities in web applications, Content Management Systems (CMS), and server configurations.
  • Data Breaches and Leaks: High-impact data breaches were prevalent, with threat actors exfiltrating massive databases containing Personally Identifiable Information (PII), corporate communications, and proprietary data. These breaches target organizations of all sizes, from local municipalities to global conglomerates.
  • Credential Combo Lists: The distribution of “combo lists” (combinations of usernames/emails and passwords) has reached an industrial scale. Threat actors are sharing lists containing millions of records, fueling secondary attacks such as credential stuffing and account takeovers across multiple platforms.
  • Initial Access and Malware Sales: The underground economy is thriving with Initial Access Brokers (IABs) selling direct access (RDP, VPN, Shell) to compromised corporate networks. Concurrently, advanced malware, including ring-0 kernel-level implants, is actively traded, providing attackers with the tools needed to establish deep persistence.

Geographically, the attacks are indiscriminately global. However, specific campaigns show regional focus; for example, a massive defacement campaign heavily targeted European nations, while data breaches hit a diverse array of countries including the USA, Brazil, India, and various European states.

4. Detailed Analysis of Attack Vectors

4.1 Website Defacement Campaigns: The “Ratman” Phenomenon The most striking statistical anomaly in the dataset is the overwhelming number of website defacements orchestrated by a threat actor using the moniker “Rici144”, who is affiliated with the “Ratman” team. This single actor/group is responsible for over a hundred documented defacements within a 48-hour window.

  • Target Profile: The Ratman team’s targets are primarily Small and Medium-sized Enterprises (SMEs) located in Western and Northern Europe. Countries hit particularly hard include Italy, Germany, the United Kingdom, Sweden, Switzerland, Belgium, and France. The industries vary widely, encompassing retail, e-commerce, manufacturing, publishing, and specialized local services (e.g., swimming pool services, local restaurants).
  • Modus Operandi: A critical pattern observed in the Ratman team’s activity is the high frequency of “redefacements.” Numerous incidents are flagged as repeat compromises of the same target domain (e.g., Munditalia, Naturhouse, Palline da Golf USA TE, ColorMax). Furthermore, the defacements rarely target the main root directory or homepage. Instead, the attackers consistently target specific subdirectories, frequently noted as “media directories,” “customer upload directories,” or specific file paths.
  • Technical Implications: The pattern of redefacing media subdirectories strongly suggests that the Ratman team is exploiting a specific, widespread vulnerability. This could be an unpatched flaw in a common CMS plugin (such as a vulnerable file upload module in WordPress or Joomla), weak directory permissions, or exposed administrative interfaces. The fact that sites are repeatedly defaced indicates a profound failure in the victims’ incident response capabilities; organizations are likely removing the defacement file without patching the underlying vulnerability or securing the compromised vector, leaving the door wide open for the attacker to simply re-execute their script.
  • Other Defacement Actors: While Ratman dominated Europe, other actors conducted similar campaigns elsewhere. The “Alpha wolf” team (actor “XYZ”) targeted domains in China and the Czech Republic. Indonesian threat actors like “maw3six” and the “DEFACER INDONESIAN TEAM” conducted mass defacement campaigns targeting Asian and global sites. “OpsShadowStrike” focused on Indian and US targets.

4.2 Data Exfiltration and Database Leaks While defacements are highly visible, data breaches represent a significantly higher risk to corporate integrity and user privacy. The dataset highlights several distinct threat actors operating in this space, each with specific target profiles.

  • The LAPSUS$ Legacy: A group identifying as “scattered LAPSUS$ hunters part 9” conducted a highly aggressive campaign targeting government and public sector infrastructure globally. Their victims included the Secretariat of Administration of the State of Bahia (Brazil), ePortugal, the Department of Information and Communication Technology (Bangladesh), Kogi State IRS (Nigeria), Ghana Standards Authority, and the Government of Madhesh Province (Nepal). This suggests a concerted effort to compromise poorly secured municipal and national government databases, likely exploiting legacy systems or weak access controls to exfiltrate citizen data and administrative records.
  • Grubder’s Corporate Harvesting: The threat actor “Grubder” focused on exfiltrating and selling massive databases from commercial entities, primarily in Europe and South America. Notable breaches attributed to Grubder include Verkkokauppa.com Oyj (Finland, 427K records), the Citizen Portal (Czech Republic, 437K records), Mediatel CZ (487K records), Sauto.cz (476K records), Kabum (Brazil, 724K records), and the Regional Council of Veterinary Medicine in São Paulo (452K records). These databases typically contain high-value PII, including contact details, physical addresses, order histories, and authentication logs, making them prime material for phishing campaigns, identity theft, and corporate espionage.
  • xorcat and the Targeting of User Communities: The actor “xorcat” demonstrated a capability to breach platforms with massive user bases, focusing on gaming, social, and utility applications. Their victims included Animoto (5M records), Warframe (3M records), HauteLook (6.5M records), Eyeem (3.8M records), Lookbook (1.2M records), DuelingNetwork (2.5M records), and Job&Talent (2.6M records). These databases often include bcrypt-hashed passwords, full names, locations, and behavioral data. The sheer volume of compromised accounts (tens of millions in total) drastically increases the global risk of credential reuse attacks.
  • ShinyHunters and Enterprise Compromise: The notorious group “ShinyHunters” was linked to highly sophisticated breaches of major corporations, including Cisco Systems and Hallmark Cards. These breaches are particularly alarming because they involve the compromise of complex enterprise environments such as Salesforce platforms, AWS storage buckets (S3), and internal GitHub repositories. The exfiltration of internal development data and cloud infrastructure configurations indicates a high level of technical sophistication and poses severe risks regarding supply chain compromises and intellectual property theft.

4.3 The Credential Economy: Combo Lists and Telegram Distribution A pervasive and highly dangerous trend identified in the report is the industrial-scale distribution of “Combo Lists.” These are massive text files containing paired usernames (or email addresses) and passwords. They are the primary fuel for credential stuffing attacks, where bots automatically test these stolen credentials against thousands of other websites, betting on the fact that users reuse passwords across multiple platforms.

  • The Reign of CODER: The threat actor “CODER” is the most prominent distributor of these lists in the provided data. CODER regularly releases databases containing millions of records. Examples include a 15 million record list targeting social media and streaming (Facebook, Spotify, Apple Music), a 5 million list targeting e-commerce (Amazon, eBay, Walmart), a 5 million list targeting educational and developer tools (Wikipedia, GitHub, Stack Overflow), and lists of 11 million and 9.3 million records containing mixed international data.
  • Distribution Channels: A significant shift in the cybercriminal underground is the method of distribution. While traditional dark web forums (like CrackingX, which is frequently cited ) remain popular, actors like CODER and others are heavily utilizing Telegram channels for distribution. Telegram offers anonymity, massive file hosting capabilities, and the ability to build large, instant communities of lower-tier cybercriminals who consume these free lists to launch automated attacks.
  • The Focus on Email Providers: There is a persistent, high-volume market specifically for valid email credentials. Actors like “MailAccesss,” “TeraCloud1,” “UniqueCombo,” and “HQcomboSpace” constantly upload thousands of verified credentials for services like Hotmail, Gmail, Outlook, and Yahoo. Compromising an email account is often the “holy grail” for an attacker, as it allows them to intercept password reset links for banking, cryptocurrency, and social media accounts, effectively granting them control over the victim’s entire digital life.

4.4 Initial Access Brokering and Malware Sales Before a ransomware deployment or a massive data exfiltration can occur, an attacker must first gain a foothold in the network. The data reveals an active market for “Initial Access Brokers” (IABs) who specialize in compromising networks and selling that access to the highest bidder.

  • Corporate Access: We observe threat actors selling highly privileged access to corporate environments. For example, the actor “boat” advertised Domain Admin privileges and VPN access (via FortiClient) to a US-based manufacturing company, even noting the presence of specific security solutions (Trend Micro) and cloud backups (Datto). Another actor, “someone0717,” sold Domain Admin access via RDP to two Czech companies (Food Production and IT services). This commoditization of access significantly lowers the barrier to entry for advanced attacks like ransomware.
  • E-commerce Shells: Actors are also selling unauthorized backend access to online stores. “Malwareboy” sold access to an active Magento store processing payments, while “kobenotnow” sold shell access to a French PrestaShop store. These access points are typically used to inject digital skimmers (Magecart attacks) to steal customer credit card data during checkout.
  • Advanced Malware: The sale of sophisticated malware continues to thrive. The actor “coree” was observed selling a “Windows Ring-0 Kernel-Level Micro-Implant”. Malware operating at the kernel level (Ring-0) is exceptionally dangerous because it runs with the highest privileges on the operating system, allowing it to subvert antivirus software, hide its processes, and establish nearly undetectable persistence.

4.5 High-Profile Corporate and Government Incidents Several incidents stand out due to the profile of the victim or the nature of the breach.

  • Hasbro, Inc. Cyber Attack: The toy and gaming giant Hasbro suffered a significant network compromise. Detected on March 28 and disclosed via an SEC filing on April 1, the incident required the activation of incident response protocols, the isolation of systems, and the engagement of third-party experts. While business continuity plans were invoked, the company warned of operational delays. This highlights the severe business disruption caused by enterprise-level breaches.
  • Anthropic’s Claude Code Leak: A unique incident involved the AI company Anthropic. A packaging error in an npm release accidentally exposed a large portion of the source code for their “Claude Code” assistant. While the company confirmed this was a human error rather than a malicious breach, and no customer data was compromised, the incident underscores the severe risks associated with software supply chain management and DevOps misconfigurations.
  • Government Target Infrastructure: Beyond the LAPSUS$ group, other critical infrastructure was targeted. An actor named “wh6ami” offered databases from the National Weather Forecasting Centre and National Agromet Centre of Pakistan, as well as the Construction Industry Development Authority of Sri Lanka. Another actor, “Z-PENTEST ALLIANCE,” claimed to have unrestricted administrative control over unidentified critical operating technology (HMI and PLC) in South Korea, demonstrating a severe threat to physical infrastructure.

5. Threat Actor Profiling Based on the intelligence gathered, we can profile several key archetypes operating in this ecosystem:

  • The Mass Defacer (e.g., Rici144 / Ratman): Highly automated, opportunistic, and relentless. They utilize scanning tools to find specific vulnerabilities (likely in CMS plugins) across vast ranges of IP addresses. Their goal is volume and visibility rather than financial theft. They rely on the poor patching cadence of SMEs to maintain their statistics.
  • The Database Hunter (e.g., Grubder, xorcat): Financially motivated and technically proficient in SQL injection (SQLi) or exploiting misconfigured APIs. They target web applications with large user bases. They monetize their efforts by selling the databases on dark web forums or using them for targeted extortion.
  • The State-Targeting Hacktivist/Opportunist (e.g., scattered LAPSUS$ hunters part 9): This group exhibits a specific interest in government portals (.gov domains). While their motivations may mix hacktivism with financial gain, their methodology involves finding the weakest links in municipal and state IT infrastructure, often resulting in the exposure of sensitive citizen registries.
  • The Credential Wholesaler (e.g., CODER): These actors sit at the center of the cybercriminal supply chain. They aggregate data from various breaches, parse it, and distribute it. By providing massive combo lists for free on Telegram, they build a following and likely monetize premium, unreleased lists or associated cracking tools in private channels.
  • The Initial Access Broker (e.g., boat): Highly skilled penetration testers who operate solely to breach perimeters. They understand corporate networks (Active Directory, VPNs, EDR solutions) and focus on silent intrusion and privilege escalation. They are the enablers of the modern ransomware-as-a-service (RaaS) ecosystem.

6. Industry and Geographic Impact Analysis

Industry Impact:

  • Retail and E-commerce: Disproportionately targeted for both defacements (by Ratman) and backend shell access (for card skimming). The high volume of online transactions makes them a perpetual target.
  • Government and Public Sector: Frequently compromised for database leaks. Municipal and regional governments often lack the budget for robust cybersecurity, making their databases—rich in citizen PII—easy prey.
  • Technology and Software: Targeted for source code (Anthropic), cloud infrastructure (Cisco), and as vectors for credential harvesting.
  • Education: Universities and institutes are regularly targeted (e.g., Cairo University, Taipei Computer Association) due to vast, decentralized networks and large repositories of student and staff data.
  • Healthcare: Facilities and professional registries (e.g., São Paulo Veterinary Council, Sportsmed Mexico) are targeted, exposing highly sensitive personal and medical data.

Geographic Impact: The data demonstrates a truly borderless threat landscape.

  • Europe (Particularly Italy, Germany, UK, Sweden): Experienced an intense bombardment of website defacements and significant corporate database leaks.
  • United States: Bore the brunt of high-profile, sophisticated enterprise breaches involving major corporations (Hasbro, Cisco, Hallmark) and complex cloud environments.
  • Asia-Pacific (India, China, Southeast Asia): Saw a mix of mass defacement campaigns, educational sector breaches, and targeting by regional hacking groups.
  • South America (Brazil, Argentina): Frequently targeted for large-scale database leaks affecting both commercial retail (Kabum) and government/legal institutions (Judicial Branch of Mendoza).

7. Strategic Recommendations and Mitigation The diverse nature of the threats outlined in this report requires a multi-layered, defense-in-depth approach to cybersecurity. Organizations must implement strategic mitigations across their entire infrastructure.

Mitigating Website Defacements and Web App Attacks:

  • Aggressive Patch Management: The high rate of redefacements indicates that organizations are not patching. Implementing automated patching for CMS platforms (WordPress, Joomla, Magento) and all associated plugins is non-negotiable.
  • Directory Permissions and File Upload Security: The Ratman team’s success relies on exploiting media and upload directories. Organizations must enforce strict principle-of-least-privilege on all web directories. Upload folders must not allow the execution of scripts (e.g., disabling PHP execution in /wp-content/uploads/).
  • Web Application Firewalls (WAF): Deploying a robust WAF can heuristically detect and block common web exploits like SQL injection, Cross-Site Scripting (XSS), and malicious file uploads before they reach the server.

Defending Against Data Breaches and Exfiltration:

  • Database Encryption and Masking: Sensitive PII must be encrypted at rest. In the event of a database compromise (as seen with Grubder and xorcat), encrypted data significantly reduces the impact of the breach.
  • Zero Trust Architecture and Access Controls: The breaches at Cisco and Hallmark highlight the danger of compromised cloud environments. Implement strict Zero Trust policies. No user or service should have access to AWS S3 buckets, GitHub repos, or Salesforce data without continuous verification and strict least-privilege scoping.
  • API Security: Many modern data breaches occur through unsecured or undocumented APIs. Regular API auditing and rate-limiting are essential to prevent mass data scraping.

Combating the Credential Combo List Threat:

  • Mandatory Multi-Factor Authentication (MFA): With tens of millions of valid credentials circulating freely on Telegram, passwords alone are obsolete. MFA must be enforced across all corporate accounts, VPNs, and cloud services.
  • Proactive Credential Monitoring: Organizations should utilize threat intelligence services to monitor underground forums and Telegram channels for corporate email addresses appearing in newly released combo lists, forcing proactive password resets.
  • Bot Management and Rate Limiting: To prevent credential stuffing attacks utilizing these lists, public-facing login portals must implement bot detection, CAPTCHAs, and strict rate limiting to thwart automated login attempts.

Protecting Against Initial Access Brokers and Advanced Malware:

  • Secure Remote Access: VPNs and RDP gateways are prime targets for IABs. RDP should never be exposed directly to the internet. Remote access must be secured behind VPNs requiring MFA and device posture checks.
  • Endpoint Detection and Response (EDR): To detect kernel-level implants and stealthy lateral movement, organizations must deploy advanced EDR solutions capable of behavioral analysis and memory scanning, moving beyond signature-based antivirus.
  • Network Segmentation: If an IAB compromises a single workstation, robust network segmentation prevents them from moving laterally to Domain Controllers or critical data servers.

8. Conclusion The cybersecurity events spanning April 1-2, 2026, paint a stark picture of a relentless and multifaceted threat environment. The sheer volume of compromised data—ranging from millions of plaintext credentials distributed on Telegram to deeply sensitive corporate and government databases sold on dark web forums—highlights a systemic vulnerability in global digital infrastructure.

Threat actors are operating with increasing specialization. While some groups blanket the internet with automated defacement scripts exploiting basic web hygiene failures, others operate as sophisticated syndicates, breaking into complex cloud environments or brokering initial access to the highest bidder. The recurring theme across these incidents is the exploitation of foundational security gaps: unpatched software, reused passwords, lack of multi-factor authentication, and over-permissive network architectures.

For organizations to survive in this landscape, cybersecurity can no longer be viewed as an IT checklist. It requires a proactive, intelligence-driven approach that anticipates attacks, assumes a state of constant threat, and builds resilience into the core of business operations. Implementing robust access controls, aggressive vulnerability management, and comprehensive monitoring are imperative steps in defending against the diverse array of actors detailed in this report.

Detected Incidents Draft Data

  1. Website defacement of Neem Holidays by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced the admin upload directory of Neem Holidays website on April 2, 2026. The attack targeted the travel companys administrative interface, compromising their web presence.
    Date: 2026-04-01T23:31:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824406
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Unknown
    Victim Industry: Travel and Tourism
    Victim Organization: Neem Holidays
    Victim Site: neemholidays.com
  2. Alleged leak of 190,000 credential combinations targeting multiple platforms
    Category: Combo List
    Content: A threat actor shared a combolist containing 190,000 URL:username:password combinations targeting multiple platforms. The credentials are being distributed for free to registered forum users.
    Date: 2026-04-01T23:28:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70749/
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. OpsShadowStrike targets the website of Oakstreet Events
    Category: Defacement
    Content: The group claims to have defaced the website of Oakstreet Events.
    Date: 2026-04-01T23:21:29Z
    Network: telegram
    Published URL: https://t.me/OpsShadowStrike/225
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: India
    Victim Industry: Events Services
    Victim Organization: oakstreet events
    Victim Site: oakstreetevents.com/index.html
  4. Alleged leak of mixed email-password combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 180,000 email and password combinations described as fresh high quality credentials. The post offers both free download and paid high-quality combo services.
    Date: 2026-04-01T23:16:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70748/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Website defacement of Thanboon.com by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced a subdirectory on thanboon.com on April 2, 2026. This appears to be an isolated single-target defacement rather than part of a mass campaign.
    Date: 2026-04-01T23:14:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824405
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Thailand
    Victim Industry: Unknown
    Victim Organization: Thanboon
    Victim Site: thanboon.com
  6. HASBRO, INC. Cybersecurity Incident Details – Board Cybersecurity
    Category: Cyber Attack
    Content: Hasbro, Inc. disclosed on April 1, 2026 that it detected unauthorized access to its network on March 28, 2026. The company activated its incident response protocols, isolated certain systems and initiated an investigation with the assistance of cybersecurity experts. While business operations are being maintained through continuity plans, delays are possible during resolution of the situation.
    Date: 2026-04-01T22:53:52Z
    Network: openweb
    Published URL: https://www.board-cybersecurity.com/incidents/tracker/hasbro-cybersecurity-incident-c3438674#8-k-filed-on-2026-04-01
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: HASBRO, INC.
    Victim Site: hasbro.com
  7. Alleged data leak of Secretariat of Administration of the State of Bahia
    Category: Data Breach
    Content: Group claims to have leaked the database from Secretariat of Administration of the State of Bahia.
    Date: 2026-04-01T22:40:33Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5230
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Brazil
    Victim Industry: Government Administration
    Victim Organization: secretariat of administration of the state of bahia.
    Victim Site: ba.gov.br
  8. Alleged leak of multi-platform credential combolist
    Category: Combo List
    Content: Threat actor distributing a 15 million record credential combolist containing login credentials for multiple social media and music streaming platforms including Facebook, Instagram, TikTok, Twitter, Snapchat, LinkedIn, Pinterest, Spotify, SoundCloud, Apple Music, and Deezer. The credentials are being shared freely through Telegram channels.
    Date: 2026-04-01T22:26:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70745/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple platforms
    Victim Site: facebook.com, instagram.com, tiktok.com, twitter.com, snapchat.com, linkedin.com, pinterest.com, spotify.com, soundcloud.com, music.apple.com, deezer.com
  9. Alleged leak of Hotmail and Outlook credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,160 Hotmail and Outlook email credentials for free download on a cybercriminal forum.
    Date: 2026-04-01T22:26:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70746/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  10. Alleged data leak of ePortugal
    Category: Data Breach
    Content: Group claims to have leaked data from ePortugal.
    Date: 2026-04-01T22:16:16Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5221
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Portugal
    Victim Industry: Government & Public Sector
    Victim Organization: eportugal
    Victim Site: eportugal.gov.pt
  11. Alleged leak of Department of Information and Communication Technology of Bangladesh
    Category: Data Breach
    Content: Group claims to have leaked data from Department of Information and Communication Technology of Bangladesh.
    Date: 2026-04-01T22:15:16Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5221
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Bangladesh
    Victim Industry: Government Administration
    Victim Organization: department of information and communication technology
    Victim Site: ictd.gov.bd
  12. Alleged data leak of Department of Information and Communication Technology Bangladesh
    Category: Data Breach
    Content: Group claims to have leaked data from Department of Information and Communication Technology Bangladesh.
    Date: 2026-04-01T22:14:40Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5221
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Bangladesh
    Victim Industry: Government Administration
    Victim Organization: department of information and communication technology bangladesh
    Victim Site: ictd.gov.bd
  13. Alleged data breach of the National Agency for the Administration and Destination of Assets Seized and Confiscated from Organized Crime
    Category: Data Breach
    Content: The threat actor claims to have breached data from the the National Agency for the Administration and Destination of Assets Seized and Confiscated from Organized Crime(ANBSC), allegedly including anti-mafia case files from 2013–2026.
    Date: 2026-04-01T22:13:45Z
    Network: openweb
    Published URL: https://breached.st/threads/anbsc-agenzia-nazionale-per-lamministrazione-e-la-destinazione-dei-beni-sequestrati-e-confiscati-alla-criminalita-organizzata.85789/
    Screenshots:
    None
    Threat Actors: cozypandas
    Victim Country: Italy
    Victim Industry: Government Administration
    Victim Organization: national agency for the administration and destination of assets seized and confiscated from organized crime
    Victim Site: benisequestraticonfiscati.it
  14. Alleged sale of government datas
    Category: Data Leak
    Content: The threat actor claims to selling unauthorized access to law enforcement emails, EDR services, and forged legal documents to obtain sensitive user data, including IP addresses, device information, emails, and phone numbers from major platforms.
    Date: 2026-04-01T22:06:09Z
    Network: openweb
    Published URL: https://breached.st/threads/selling-hq-govmails-police-emails-edr-services-domain-seizure-forged-court-orders-law-enforcement-portals-edr-guide.85764/
    Screenshots:
    None
    Threat Actors: convince
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Actor NUllSHop0X shared a free download link containing 5,000 allegedly valid Hotmail email credentials described as fresh hits.
    Date: 2026-04-01T21:58:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70743/
    Screenshots:
    None
    Threat Actors: NUllSHop0X
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  16. Alleged leak of Gmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 410,000 Gmail email and password combinations from mixed countries via a file sharing service.
    Date: 2026-04-01T21:58:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70744/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  17. Alleged data leak of Doxbin
    Category: Data Leak
    Content: The threat actor claims to have leaked the data from Doxbin, the exposure could reveal backend logic, application structure, configuration elements, and platform internals, potentially creating security and operational risks.NB: The authenticity of the claim is yet to be verified. This organization has been breached multiple times.
    Date: 2026-04-01T21:58:05Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Free-Doxbin-Source-Code
    Screenshots:
    None
    Threat Actors: punk
    Victim Country: Unknown
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: doxbin
    Victim Site: doxbin.org
  18. Alleged data leak ofsouthgloss.gov.uk
    Category: Data Breach
    Content: Group claims to have leaked data from beta southgloss.gov.uk.
    Date: 2026-04-01T21:56:36Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5234
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: southgloss.gov.uk
  19. Alleged Sale of Compromised Magento Store Orders
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to a Magento-based online store with active order activity and payment processing capabilities.
    Date: 2026-04-01T21:55:02Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279697/
    Screenshots:
    None
    Threat Actors: Malwareboy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Website defacement of Motofix by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Motofix automotive services website on April 2, 2026. The defacement targeted a specific page within the customer media directory of the Greek motorcycle/automotive service providers website.
    Date: 2026-04-01T21:50:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824374
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Greece
    Victim Industry: Automotive Services
    Victim Organization: Motofix
    Victim Site: www.motofix.gr
  21. Website defacement of Munditalia by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, conducted a redefacement of the Munditalia website on April 2, 2026. This represents a repeat compromise of the same target rather than an initial attack.
    Date: 2026-04-01T21:49:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824375
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Munditalia
    Victim Site: www.munditalia.it
  22. Website defacement of Naturhouse by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced a media subdirectory of the Naturhouse Italy website on April 2, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T21:48:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824376
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Healthcare/Wellness
    Victim Organization: Naturhouse
    Victim Site: www.naturhouse.it
  23. Website defacement of Net Integratori by Rici144 (Ratman team)
    Category: Defacement
    Content: Italian technology company Net Integratori suffered a website defacement attack by threat actor Rici144, associated with the Ratman team. This incident represents a redefacement of the target system.
    Date: 2026-04-01T21:48:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824378
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Technology
    Victim Organization: Net Integratori
    Victim Site: www.netintegratori.it
  24. Website defacement of Palline da Golf USA TE by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of an Italian golf equipment website on April 2nd, 2026. This represents a repeat attack against the same target domain.
    Date: 2026-04-01T21:47:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824380
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Sports/Recreation
    Victim Organization: Palline da Golf USA TE
    Victim Site: www.pallinedagolfusate.it
  25. Website defacement of Pharmasole by Rici144/Ratman team
    Category: Defacement
    Content: Pharmaceutical company Pharmasoles website was defaced by attacker Rici144 from the Ratman team on April 2, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-01T21:47:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824381
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Pharmaceutical
    Victim Organization: Pharmasole
    Victim Site: www.pharmasole.it
  26. Website defacement of r-shop.gr by Rici144/Ratman team
    Category: Defacement
    Content: Greek e-commerce website r-shop.gr was defaced by attacker Rici144 affiliated with the Ratman team on April 2, 2026. The attack targeted a specific media directory rather than the homepage.
    Date: 2026-04-01T21:46:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824383
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Greece
    Victim Industry: E-commerce
    Victim Organization: R-Shop
    Victim Site: r-shop.gr
  27. Website defacement of RedRock by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced a subdirectory of the RedRock website on April 2, 2026. This appears to be a targeted single-site defacement rather than part of a mass attack campaign.
    Date: 2026-04-01T21:45:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824384
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: RedRock
    Victim Site: www.redrock.it
  28. Website defacement of Norwegian Red Cross shop by Rici144/Ratman team
    Category: Defacement
    Content: The Norwegian Red Cross online shop was defaced by attacker Rici144 from the Ratman team on April 2, 2026. This incident appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T21:45:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824385
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Norway
    Victim Industry: Non-profit/Humanitarian
    Victim Organization: Norwegian Red Cross
    Victim Site: www.rodekorsbutikken.no
  29. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,600 allegedly valid Hotmail email credentials with full access capabilities.
    Date: 2026-04-01T21:44:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70742/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  30. Website defacement of Sportsile by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team, specifically attacker Rici144, successfully defaced the Italian sports website Sportsile on April 2, 2026. This was a targeted single-site defacement rather than a mass attack.
    Date: 2026-04-01T21:44:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824389
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Sports/Media
    Victim Organization: Sportsile
    Victim Site: www.sportsile.it
  31. Website defacement of Store4You by Rici144/Ratman team
    Category: Defacement
    Content: The e-commerce website store4you.gr was defaced by attacker Rici144 affiliated with the Ratman team on April 2, 2026. This represents a redefacement of the target, indicating the site had been previously compromised.
    Date: 2026-04-01T21:44:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824392
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Greece
    Victim Industry: E-commerce
    Victim Organization: Store4You
    Victim Site: www.store4you.gr
  32. Alleged data leak of Kogi State IRS
    Category: Data Breach
    Content: Group claims to have leaked data from Kogi State IRS.
    Date: 2026-04-01T21:43:53Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5234
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Nigeria
    Victim Industry: Government Administration
    Victim Organization: kogi state irs
    Victim Site: irs.kg.gov.ng
  33. Website defacement of Tomar.it by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced a subdirectory of the Italian website tomar.it on April 2, 2026. The defacement targeted a specific media/customer section rather than the main homepage.
    Date: 2026-04-01T21:43:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824394
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Tomar
    Victim Site: tomar.it
  34. Website defacement of Tonelli Online by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of the Italian website tonellionline.it on April 2, 2026. This appears to be a targeted attack against a specific subdirectory of the victims website rather than a mass defacement campaign.
    Date: 2026-04-01T21:42:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824396
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Tonelli Online
    Victim Site: www.tonellionline.it
  35. Website defacement of TouchShop by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144, affiliated with the Ratman team, successfully defaced the TouchShop e-commerce website on April 2, 2026. The defacement targeted a specific media directory path rather than the main homepage.
    Date: 2026-04-01T21:42:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824397
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: E-commerce
    Victim Organization: TouchShop
    Victim Site: www.touchshop.it
  36. Website defacement of Veng.no by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 affiliated with Ratman team defaced a subdirectory of the Norwegian website veng.no on April 2, 2026. The defacement targeted a specific customer addition page within the media section of the site.
    Date: 2026-04-01T21:41:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824398
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Norway
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: veng.no
  37. Website defacement of Vinotop by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Italian wine retailer Vinotops website on April 2, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T21:41:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824400
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Food and Beverage
    Victim Organization: Vinotop
    Victim Site: www.vinotop.it
  38. Website defacement of Vivaraise by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced a subdirectory of the vivaraise.it website on April 2, 2026. The defacement targeted a specific media/custom path rather than the main homepage.
    Date: 2026-04-01T21:40:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824403
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Vivaraise
    Victim Site: vivaraise.it
  39. Website defacement of ZE Parts by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against Greek automotive parts retailer ZE Parts on April 2, 2026. The attack targeted a customer-related subdirectory of the companys website.
    Date: 2026-04-01T21:40:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824404
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Greece
    Victim Industry: Automotive/Parts Retail
    Victim Organization: ZE Parts
    Victim Site: www.zeparts.gr
  40. Alleged data leak of Ghana Standards Authority
    Category: Data Breach
    Content: Group claims to have leaked data from Ghana Standards Authority.
    Date: 2026-04-01T21:39:32Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5224
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Ghana
    Victim Industry: Government Administration
    Victim Organization: ghana standards authority
    Victim Site: gsa.gov.gh
  41. Alleged leak of Speedex Tools
    Category: Data Breach
    Content: Group claims to have leaked data from Speedex Tools.
    Date: 2026-04-01T21:34:45Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5330
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: UAE
    Victim Industry: Retail Industry
    Victim Organization: speedex tools
    Victim Site: speedextools.com
  42. Website defacement of Brondi by Rici144/Ratman team
    Category: Defacement
    Content: Italian electronics company Brondi suffered a website defacement attack by threat actor Rici144 from the Ratman team on April 2, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T21:33:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824329
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Technology/Electronics
    Victim Organization: Brondi
    Victim Site: www.brondi.it
  43. Website defacement of carrelli.it by Rici144/Ratman team
    Category: Defacement
    Content: The website carrelli.it was defaced by attacker Rici144 associated with the Ratman team on April 2, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T21:33:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824330
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: carrelli.it
  44. Website defacement of Casa della Gomma by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, successfully defaced the Casa della Gomma website on April 2, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T21:32:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824331
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Manufacturing
    Victim Organization: Casa della Gomma
    Victim Site: www.casadellagomma.it
  45. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing 3,200 valid email credentials described as mixed sources from April 1st. The credentials are being distributed for free to registered forum users.
    Date: 2026-04-01T21:32:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70740/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Website defacement of Collect World by Rici144 (Ratman team)
    Category: Defacement
    Content: The website www.collect-world.it was defaced by attacker Rici144, associated with the Ratman team, on April 2, 2026. This appears to be a targeted single-site defacement incident.
    Date: 2026-04-01T21:32:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824332
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Collect World
    Victim Site: www.collect-world.it
  47. Alleged distribution of credential combolists targeting multiple e-commerce platforms
    Category: Combo List
    Content: Threat actor distributes a 5 million credential combolist containing email and password combinations for testing against major e-commerce platforms including Amazon, eBay, AliExpress, Walmart, Etsy, Shopify, BestBuy, Target, and Flipkart. The credentials are being shared through Telegram channels and appear to be offered for free.
    Date: 2026-04-01T21:31:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70741/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Multiple
    Victim Site: Unknown
  48. Website defacement of Collini Atomi by Rici144 (Ratman team)
    Category: Defacement
    Content: The threat actor Rici144, affiliated with the Ratman team, successfully defaced a subdirectory of the Collini Atomi website on April 2, 2026. The attack targeted a media directory within the organizations web infrastructure.
    Date: 2026-04-01T21:31:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824333
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Collini Atomi
    Victim Site: colliniatomi.it
  49. Website defacement of ColorMax by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team member Rici144 conducted a redefacement attack against ColorMaxs website on April 2, 2026. This represents a repeat compromise of the Italian organizations web presence.
    Date: 2026-04-01T21:31:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824334
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: ColorMax
    Victim Site: www.colormax.it
  50. Website defacement of Costway Italy by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team defaced a customer media section of Costway Italys e-commerce website on April 2, 2026. This was identified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T21:30:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824335
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: E-commerce
    Victim Organization: Costway
    Victim Site: www.costway.it
  51. Website defacement of DIAS by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced a customer portal page on the DIAS website on April 2, 2026. The defacement targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-01T21:29:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824336
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: DIAS
    Victim Site: www.dias.it
  52. Website defacement of domenicomaggio.it by Rici144/Ratman team
    Category: Defacement
    Content: The website domenicomaggio.it was defaced by attacker Rici144 from the Ratman team on April 2, 2026. The attack targeted a media subdirectory of the Italian website.
    Date: 2026-04-01T21:29:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824337
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Domenico Maggio
    Victim Site: domenicomaggio.it
  53. Website defacement of Ediorso by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team successfully defaced the Ediorso website on April 2, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-01T21:28:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824339
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Ediorso
    Victim Site: www.ediorso.it
  54. Website defacement of Edizioni BD by Rici144 (Ratman team)
    Category: Defacement
    Content: Rici144 from the Ratman team conducted a redefacement attack against Italian publisher Edizioni BDs website on April 2, 2026. This marks a repeat compromise of the same target.
    Date: 2026-04-01T21:28:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824340
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Publishing
    Victim Organization: Edizioni BD
    Victim Site: www.edizionibd.it
  55. Website defacement of Norwegian electrical equipment company by Rici144/Ratman team
    Category: Defacement
    Content: Norwegian electrical equipment company website was defaced by attacker Rici144 from the Ratman team on April 2, 2026. The defacement targeted a media subdirectory of the companys website.
    Date: 2026-04-01T21:27:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824341
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Norway
    Victim Industry: Electrical Equipment/Manufacturing
    Victim Organization: Elutstyrbedrift
    Victim Site: elutstyrbedrift.no
  56. Website defacement of Equipara Farmacie by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from team Ratman defaced the Italian pharmaceutical company Equipara Farmacies website on April 2, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T21:27:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824343
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: Equipara Farmacie
    Victim Site: www.equiparafarmacie.it
  57. Website defacement of eweki.it by Rici144/Ratman team
    Category: Defacement
    Content: On April 2, 2026, attacker Rici144 from the Ratman team defaced a specific page on eweki.it targeting the media/customer section. This was an isolated defacement incident rather than a mass or repeat attack.
    Date: 2026-04-01T21:26:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824346
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: eweki.it
  58. Website redefacement of Excelsa by Ratman team member Rici144
    Category: Defacement
    Content: The Ratman team member Rici144 conducted a redefacement attack against the Italian website excelsa.it on April 2, 2026. This represents a repeat defacement of the same target rather than an initial compromise.
    Date: 2026-04-01T21:26:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824347
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Excelsa
    Victim Site: www.excelsa.it
  59. Website defacement of Fadelux by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the Fadelux website on April 2, 2026. This incident represents a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T21:25:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824348
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Fadelux
    Victim Site: fadelux.it
  60. Website defacement of firofichi.it by Rici144/Ratman team
    Category: Defacement
    Content: The website firofichi.it was defaced by attacker Rici144 associated with the Ratman team on April 2, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T21:24:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824350
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: firofichi.it
  61. Website defacement of Geelist.gr by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement targeting Greek site geelist.gr performed by attacker Rici144 from the Ratman team on April 2, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T21:24:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824351
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Greece
    Victim Industry: Unknown
    Victim Organization: Geelist
    Victim Site: geelist.gr
  62. Website defacement of Giappichelli publisher by Rici144/Ratman team
    Category: Defacement
    Content: Italian publisher Giappichelli Editores website was defaced by attacker Rici144 associated with the Ratman team. This represents a redefacement of a previously targeted site, occurring in April 2026.
    Date: 2026-04-01T21:23:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824352
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Publishing
    Victim Organization: Giappichelli Editore
    Victim Site: giappichelli.it
  63. Website defacement of GLD Forniture by Rici144/Ratman team
    Category: Defacement
    Content: Italian furniture company GLD Forniture suffered a website defacement attack by threat actor Rici144 associated with the Ratman team. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T21:23:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824354
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Furniture/Manufacturing
    Victim Organization: GLD Forniture
    Victim Site: gldforniture.it
  64. Website defacement of Glowell by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the Glowell website on April 2, 2026. The attack targeted a specific media customer section of the Italian companys website.
    Date: 2026-04-01T21:22:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824355
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Glowell
    Victim Site: www.glowell.it
  65. Website defacement of Grafiche Dalla Valle by Rici144/Ratman team
    Category: Defacement
    Content: Rici144 from the Ratman team conducted a redefacement attack against Italian graphics company Grafiche Dalla Valles website on April 2, 2026. This represents a repeat targeting of the same victim organization.
    Date: 2026-04-01T21:22:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824356
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Printing/Graphics Services
    Victim Organization: Grafiche Dalla Valle
    Victim Site: www.grafichedallavalle.it
  66. Alleged Sale of Unauthorized Multiple Access to a PrestaShop Case Store in France
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access (shell access) to a France-based PrestaShop online store.
    Date: 2026-04-01T21:16:08Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279691/
    Screenshots:
    None
    Threat Actors: kobenotnow
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged sale of SpoofCity tool
    Category: Alert
    Content: The threat actor claims to be selling a service called SpoofCity, allegedly offering caller ID spoofing capabilities, mass calling at scale, global coverage, AI voice generation, call monitoring and recordings, as well as features such as IVR routing, outbound campaigns, and OTP bot functionality.
    Date: 2026-04-01T21:07:12Z
    Network: openweb
    Published URL: https://breached.st/threads/welcome-to-spoofcity-powerful-calling-spoofing-made-simple.85788/
    Screenshots:
    None
    Threat Actors: spoofcity.io
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged data leak of Government of Madhesh Province
    Category: Data Breach
    Content: Group claims to have leaked data from Government of Madhesh Province.
    Date: 2026-04-01T21:05:37Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5224
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Nepal
    Victim Industry: Government Administration
    Victim Organization: government of madhesh province
    Victim Site: madhesh.gov.np
  69. Alleged leak of Wikipedia, Coursera, Khan Academy, GitHub, and Stack Overflow credential lists
    Category: Combo List
    Content: Threat actor CODER is distributing free credential lists (combolists) allegedly containing 5 million SMTP credentials from Wikipedia, Coursera, Khan Academy, GitHub, and Stack Overflow through Telegram channels.
    Date: 2026-04-01T21:05:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70737/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Wikipedia, Coursera, Khan Academy, GitHub, Stack Overflow)
    Victim Site: Multiple
  70. Alleged leak of Saudi arabia government data
    Category: Data Leak
    Content: The threat actor claims to have leaked internal data from the government of Saudi Arabia, allegedly containing documents, Excel files, and database access, along with Hikvision camera access, employer data including ID numbers, phone numbers, and names, as well as NAS admin credentials and remote database server access.
    Date: 2026-04-01T21:02:57Z
    Network: openweb
    Published URL: https://breached.st/threads/gov-saudi-arabia-saudi-arabia-documents-databases-access.85783/
    Screenshots:
    None
    Threat Actors: w00l_ysh1
    Victim Country: Saudi Arabia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged sale of National Weather Forecasting Centre of Pakistan
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset allegedly associated with the National Weather Forecasting Center (NWFC), a core operational unit of the Pakistan Meteorological Department. The dataset reportedly contains user-related and operational data linked to weather forecasting services.
    Date: 2026-04-01T20:57:01Z
    Network: openweb
    Published URL: https://breached.st/threads/government-of-sri-lanka-access-construction-industry-development-authority-cida-of-sri-lanka.85778/
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Pakistan
    Victim Industry: Government Administration
    Victim Organization: national weather forecasting centre
    Victim Site: nwfc.pmd.gov.pk
  72. Alleged sale of Construction Indusstry Development Authority
    Category: Data Breach
    Content: The threat actor claims to be selling database of Construction Indusstry Development Authority.
    Date: 2026-04-01T20:51:53Z
    Network: openweb
    Published URL: https://breached.st/threads/government-of-sri-lanka-access-construction-industry-development-authority-cida-of-sri-lanka.85778/
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Sri Lanka
    Victim Industry: Government & Public Sector
    Victim Organization: construction indusstry development authority
    Victim Site: cida.gov.lk
  73. Alleged sale of National Agromet Centre of Pakistan
    Category: Data Breach
    Content: The threat actor claims to be selling database of National Agromet Centre of Pakistan. The dataset reportedly contains user and subscription information tied to agro-meteorological services.
    Date: 2026-04-01T20:51:43Z
    Network: openweb
    Published URL: https://breached.st/threads/government-of-pakistan-national-agro-meteorological-center-namc.85774/
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Pakistan
    Victim Industry: Government Administration
    Victim Organization: national agromet centre
    Victim Site: namc.pmd.gov.pk
  74. Alleged leak of Trilhas da Arte
    Category: Data Breach
    Content: Group claims to have leaked data from Trilhas da Arte.
    Date: 2026-04-01T20:49:52Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5324
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Brazil
    Victim Industry: Arts & Crafts
    Victim Organization: trilhas da arte
    Victim Site: trilhasdaarte.com.br
  75. Alleged data leak of Greenpicks – Eco & Upcycling Market
    Category: Data Leak
    Content: The group claims to have leaked data from Greenpicks – Eco & Upcycling Market.
    Date: 2026-04-01T20:46:40Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5314
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Germany
    Victim Industry: Retail Industry
    Victim Organization: greenpicks – eco & upcycling market
    Victim Site: greenpicks.de
  76. Alleged leak of Gourmet Wholesale Limited
    Category: Data Breach
    Content: Group claims to have leaked data from Gourmet Wholesale Limited.
    Date: 2026-04-01T20:40:40Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5324
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Cyprus
    Victim Industry: Food & Beverages
    Victim Organization: gourmet wholesale limited
    Victim Site: limassol.gourmetcy.com
  77. Alleged distribution of credential combinations targeting multiple streaming and e-commerce platforms
    Category: Combo List
    Content: Threat actor distributes 7 million credential combinations for various streaming and gaming platforms through Telegram channels. The combolist targets multiple popular services including Netflix, Twitch, Amazon, and gaming platforms.
    Date: 2026-04-01T20:39:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70736/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Netflix, Twitch, Amazon, eBay, AliExpress, Steam, Epic Games, Miniclip)
    Victim Site: Multiple platforms
  78. Alleged data breach of Restaurant Guru
    Category: Data Breach
    Content: The threat actor claims to have breached data from Restaurant Guru.
    Date: 2026-04-01T20:32:14Z
    Network: openweb
    Published URL: https://breached.st/threads/restaurantguru.85780/
    Screenshots:
    None
    Threat Actors: s1ethx7z
    Victim Country: British Virgin Islands
    Victim Industry: Food & Beverages
    Victim Organization: restaurant guru
    Victim Site: restaurantguru.com
  79. Alleged data leak of exam.id
    Category: Data Leak
    Content: The group claims to have leaked data from exam.id.
    Date: 2026-04-01T20:31:59Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5314
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: exam.id
  80. Alleged leak of Compare The Coin
    Category: Data Breach
    Content: Group claims to have leaked data from Compare The Coin.
    Date: 2026-04-01T20:30:54Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5324
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Australia
    Victim Industry: Financial Services
    Victim Organization: compare the coin
    Victim Site: comparethecoin.com.au
  81. Alleged data leak of Delhi NCR doctor list
    Category: Data Leak
    Content: The group claims to have leaked data of Delhi NCR doctor list.
    Date: 2026-04-01T20:30:27Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5314
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged distribution of multi-country credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a 9.3 million record credential combolist containing data from multiple countries including Bosnia and Herzegovina, Bangladesh, Belgium, and others through Telegram channels. The combolist appears to be freely distributed rather than sold.
    Date: 2026-04-01T20:26:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70735/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. French Hackers Squad targets the website of Matrix Motor Kontrol
    Category: Defacement
    Content: The group claims to have defaced the website of Matrix Motor Kontrol.
    Date: 2026-04-01T20:16:38Z
    Network: telegram
    Published URL: https://t.me/FrenchsAnons/371
    Screenshots:
    None
    Threat Actors: French Hackers Squad
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: matrix motor kontrol
    Victim Site: matrix-motor.com
  84. Alleged data leak of seat-leon.serverdesarrollo.com
    Category: Data Leak
    Content: The group claims to have leaked data from seat-leon.serverdesarrollo.com.
    Date: 2026-04-01T20:16:34Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5314
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: seat-leon.serverdesarrollo.com
  85. Alleged leak of Zora Supermarkt
    Category: Data Breach
    Content: Group claims to have leaked data from Zora Supermarkt.
    Date: 2026-04-01T20:14:59Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5332
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Germany
    Victim Industry: Retail Industry
    Victim Organization: zora supermarkt
    Victim Site: zorastore.de
  86. Alleged data leak of Zhmerynka City Council
    Category: Data Breach
    Content: The group claims to have leaked the database from Zhmerynka City Council.
    Date: 2026-04-01T20:04:20Z
    Network: telegram
    Published URL: https://t.me/perunswaroga/1323
    Screenshots:
    None
    Threat Actors: Перун Сварога
    Victim Country: Ukraine
    Victim Industry: Government Administration
    Victim Organization: zhmerynka city council
    Victim Site: zhmerinka-adm.gov.ua
  87. Alleged leak of Taleb Tyres & Wheels
    Category: Data Breach
    Content: Group claims to have leaked data from Taleb Tyres & Wheels
    Date: 2026-04-01T20:04:16Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5314
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: Australia
    Victim Industry: Automotive
    Victim Organization: taleb tyres & wheels
    Victim Site: talebtyres.com.au
  88. Alleged data leak of lpgunjab.gov.in
    Category: Data Leak
    Content: The threat actor claims to have leaked the data from vlpgunjab.gov.in.
    Date: 2026-04-01T19:58:17Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5314
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lpgunjab.gov.in
  89. Alleged leak of European credential combolist
    Category: Combo List
    Content: Threat actor shared a credential combolist containing 4,590 lines of mixed European access credentials for free download on an underground forum.
    Date: 2026-04-01T19:48:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70733/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged leak of German shopping credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 583,267 credential pairs allegedly targeting German shopping websites. The data is being distributed for free via file sharing platform.
    Date: 2026-04-01T19:47:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70734/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Alleged sale of multiple identity document databases and personal information
    Category: Data Breach
    Content: Threat actor jannatmirza11 advertises various databases containing identity documents (drivers licenses, passports), SSNs, consumer information, phone numbers, and email lists via Telegram contact. The post offers comprehensive personal information databases including company records and citizen data.
    Date: 2026-04-01T19:47:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70732/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Alleged distribution of credential combolists from multiple countries
    Category: Combo List
    Content: Threat actor CODER is distributing a 9 million record credential combolist containing data from multiple countries including Venezuela, British Virgin Islands, United States Virgin Islands, Vietnam, and others. The actor is promoting free combo distribution through Telegram channels.
    Date: 2026-04-01T19:35:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70731/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged unauthorized admin access to Rumahweb Indonesia
    Category: Initial Access
    Content: Group claims to have gained unauthorized admin access to Rumahweb Indonesia.
    Date: 2026-04-01T19:34:21Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/185
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Indonesia
    Victim Industry: Information Technology (IT) Services
    Victim Organization: rumahweb indonesia
    Victim Site: kapuas.iixcp.rumahweb.net
  94. Alleged leak of Crypto Leads Databases From Various Countries
    Category: Data Leak
    Content: Threat actor has leaked the 14 million record crypto-related lead databases from multiple countries, including the USA, UK, Canada, and Germany. the dataset includes personal IDs, contact info, financial activity, and deposit/withdrawal profiling, posing risks of privacy breaches, fraud, and targeted phishing.
    Date: 2026-04-01T19:33:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-14-Million-Crypto-Leads-USA-UK-Canada-Germany-and-More
    Screenshots:
    None
    Threat Actors: datasellerx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Alleged unauthorized admin access to cPanel
    Category: Initial Access
    Content: Group claims to have gained unauthorized admin access to cPanel.
    Date: 2026-04-01T19:31:06Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/185
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: cpanel
    Victim Site: demo.cpanel.net
  96. Alleged unauthorized admin access to omlinux.info
    Category: Initial Access
    Content: Group claims to have gained unauthorized admin access to
    Date: 2026-04-01T19:27:48Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/185
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: omlinux.info
  97. Alleged data breach of Paidwork
    Category: Data Breach
    Content: The threat actor claims to have breached data of 22 million users from Paidwork, allegedly containing names, full names, email addresses, hashed passwords, and banking information.
    Date: 2026-04-01T19:27:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-PaidWork-com-breach-22M-users–71911
    Screenshots:
    None
    Threat Actors: hackformetome
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: paidwork
    Victim Site: paidwork.com
  98. Alleged data breach of Verkkokauppa.com Oyj
    Category: Data Breach
    Content: The threat actor claims to have breached 427K records from Verkkokauppa.com Oyj, allegedly containing contacts, orders, and payment methods.
    Date: 2026-04-01T19:19:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-427k-Finland-https-www-verkkokauppa-com-Retail-customer-records-with-contact-a
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Finland
    Victim Industry: Retail Industry
    Victim Organization: verkkokauppa.com oyj
    Victim Site: verkkokauppa.com
  99. Alleged Sale of Windows Ring-0 Kernel-Level Micro-Implant Malware
    Category: Malware
    Content: The threat actor claims to be selling a Windows-based kernel-level (Ring-0) micro-implant designed for stealthy execution and persistence in memory. The malware reportedly supports multiple Windows versions, enables remote command execution, and includes capabilities such as encrypted communication, process injection, and evasion of security controls.
    Date: 2026-04-01T19:16:07Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279683/
    Screenshots:
    None
    Threat Actors: coree
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged unauthorized admin access to Terracasa Incorporadora
    Category: Initial Access
    Content: Group claims to have gained unauthorized admin access to Terracasa Incorporadora.
    Date: 2026-04-01T19:15:00Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/185
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: terracasa incorporadora
    Victim Site: terracasa.com.br
  101. Alleged distribution of mixed credential combolist from multiple countries
    Category: Combo List
    Content: Threat actor CODER is distributing a free combolist containing 11 million email and password combinations from multiple countries including Ascension Island, Andorra, United Arab Emirates, Afghanistan, and others through Telegram channels.
    Date: 2026-04-01T19:03:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70730/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Alleged distribution of business corporate domain credential combos targeting multiple countries
    Category: Combo List
    Content: Threat actor CODER is distributing free credential combinations (combos) targeting business corporate domains from multiple countries including Iran, Jordan, Israel, Ireland, Latvia, Laos, Kuwait, and Kenya through Telegram channels.
    Date: 2026-04-01T18:34:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70728/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Website defacement of e-baby.hr by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced the Croatian e-commerce website e-baby.hr on April 2, 2026. The attack targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-01T18:34:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824246
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Croatia
    Victim Industry: Retail/E-commerce
    Victim Organization: E-Baby
    Victim Site: e-baby.hr
  104. Cyber Attack Hits Hasbro
    Category: Cyber Attack
    Content: Hasbro, Inc. disclosed a cybersecurity incident in an SEC filing on April 1, 2026, after identifying unauthorized access to its network on March 28, 2026. The company activated incident response protocols, took certain systems offline to contain the breach, and engaged third-party cybersecurity experts to investigate. The full scope and impact of the incident remain under investigation, and temporary operational disruptions, including potential delays, are expected.
    Date: 2026-04-01T18:33:54Z
    Network: openweb
    Published URL: https://www.board-cybersecurity.com/incidents/tracker/hasbro-cybersecurity-incident-c3438674#8-k-filed-on-2026-04-01
    Screenshots:
    None
    Threat Actors:
    Victim Country: USA
    Victim Industry: Gaming
    Victim Organization: hasbro
    Victim Site: shop.hasbro.com
  105. Website defacement of fromalfred.ch by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced a subdirectory of fromalfred.ch on April 2, 2026. The incident was documented with a mirror hosted on zone-xsec.com for threat intelligence purposes.
    Date: 2026-04-01T18:33:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824247
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: fromalfred.ch
  106. Website defacement of ggifts.es by Rici144 (Ratman team)
    Category: Defacement
    Content: The Spanish e-commerce website ggifts.es was defaced by attacker Rici144, associated with the Ratman team, on April 2, 2026. The defacement targeted a specific page within the media/customer directory rather than the homepage.
    Date: 2026-04-01T18:32:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824248
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: E-commerce
    Victim Organization: GGifts
    Victim Site: ggifts.es
  107. Website defacement of HEXIS by Ratman team member Rici144
    Category: Defacement
    Content: The Ratman team member Rici144 conducted a redefacement attack against Swiss company HEXISs website on April 2nd, 2026. This represents a repeat defacement of the same target rather than an initial compromise.
    Date: 2026-04-01T18:31:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824250
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Manufacturing
    Victim Organization: HEXIS
    Victim Site: www.hexis-swiss.ch
  108. Website defacement of Holity by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Holity website on April 2, 2026. The incident targeted a Spanish domain and was documented with mirror evidence.
    Date: 2026-04-01T18:31:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824251
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Holity
    Victim Site: www.holity.es
  109. Website defacement of Jamieson Vitamins by Rici144/Ratman team
    Category: Defacement
    Content: The Croatian Jamieson Vitamins website was defaced by attacker Rici144 from the Ratman team on April 2, 2026. This appears to be a redefacement incident targeting the pharmaceutical companys media directory.
    Date: 2026-04-01T18:30:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824252
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Croatia
    Victim Industry: Healthcare/Pharmaceuticals
    Victim Organization: Jamieson Vitamins
    Victim Site: www.jamiesonvitamins.hr
  110. Website defacement of Koala.ch by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced a subdirectory of the Swiss website koala.ch on April 2, 2026. The defacement targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-01T18:30:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824254
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Koala
    Victim Site: koala.ch
  111. Website defacement of laufshirt-bedrucken.ch by Rici144 (Ratman team)
    Category: Defacement
    Content: Swiss custom running shirt printing company website was defaced by attacker Rici144 affiliated with Ratman team on April 2, 2026. This incident represents a redefacement of a previously compromised website.
    Date: 2026-04-01T18:29:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824255
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Retail/E-commerce
    Victim Organization: Laufshirt Bedrucken
    Victim Site: laufshirt-bedrucken.ch
  112. Website defacement of Metagenics España by Rici144/Ratman team
    Category: Defacement
    Content: Cybercriminal Rici144 from the Ratman team successfully defaced the Spanish website of Metagenics, a healthcare and nutrition company, on April 2, 2026. The attack targeted a specific media subdirectory rather than the main homepage.
    Date: 2026-04-01T18:28:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824256
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: Healthcare/Nutrition
    Victim Organization: Metagenics España
    Victim Site: metagenics.es
  113. Website defacement of Modax by Rici144/Ratman team
    Category: Defacement
    Content: On April 2, 2026, the website www.modax.com.ar was defaced by attacker Rici144, who is associated with the Ratman team. The defacement targeted a specific page within the media/custom directory of the Argentine companys website.
    Date: 2026-04-01T18:28:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824257
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Modax
    Victim Site: www.modax.com.ar
  114. Website defacement of Motcom by Rici144 from Ratman team
    Category: Defacement
    Content: Rici144 from the Ratman team conducted a redefacement attack against Motcoms website on April 2, 2026. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T18:27:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824258
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Motcom
    Victim Site: www.motcom.ch
  115. Website defacement of nuk.es by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the nuk.es website on April 2, 2026, targeting a specific media/customer address page.
    Date: 2026-04-01T18:27:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824262
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: nuk.es
  116. Website defacement of oanailsystem.ch by Rici144 (Ratman team)
    Category: Defacement
    Content: Website defacement attack conducted by attacker Rici144 affiliated with Ratman team against oanailsystem.ch on April 2, 2026. The attack targeted a Swiss domain with unknown organizational affiliation and technical details.
    Date: 2026-04-01T18:26:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824264
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: oanailsystem.ch
  117. Website defacement of PNI by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from team Ratman defaced the PNI website on April 2, 2026, targeting a customer address page on the Croatian domain.
    Date: 2026-04-01T18:26:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824265
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Croatia
    Victim Industry: Unknown
    Victim Organization: PNI
    Victim Site: www.pni.hr
  118. Website defacement of PNI by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced a subdirectory of the PNI website on April 2, 2026. The defacement targeted a media customer address page on the Spanish domain.
    Date: 2026-04-01T18:25:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824266
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: PNI
    Victim Site: www.pni.es
  119. Website defacement of Pro Beauty Institute by Rici144 (Ratman team)
    Category: Defacement
    Content: The website of Pro Beauty Institute, a Swiss beauty education institution, was defaced by attacker Rici144 from the Ratman team on April 2, 2026. This was a single-target defacement rather than part of a mass campaign.
    Date: 2026-04-01T18:25:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824267
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Beauty/Cosmetics Education
    Victim Organization: Pro Beauty Institute
    Victim Site: www.probeauticinstitut.ch
  120. Website defacement of Raab Verlag by Rici144/Ratman team
    Category: Defacement
    Content: Swiss publishing company Raab Verlag suffered a website defacement attack by attacker Rici144 from the Ratman team on April 2, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-01T18:24:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824268
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Publishing
    Victim Organization: Raab Verlag
    Victim Site: www.raabverlag.ch
  121. Website defacement of Sodeal by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the Sodeal website on April 2, 2026. The incident targeted a media subdirectory of the Swiss companys domain.
    Date: 2026-04-01T18:23:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824269
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Sodeal
    Victim Site: www.sodeal.ch
  122. Website defacement of StayHealthy platform by Rici144/Ratman team
    Category: Defacement
    Content: The healthcare website stayhealthy.ch was defaced by attacker Rici144 affiliated with the Ratman team on April 2, 2026. This incident represents a redefacement targeting the Swiss healthcare platforms media section.
    Date: 2026-04-01T18:23:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824271
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Healthcare
    Victim Organization: StayHealthy
    Victim Site: stayhealthy.ch
  123. Website defacement of Strunz company by Ratman team member Rici144
    Category: Defacement
    Content: The Ratman team, specifically member Rici144, successfully defaced a customer media page on the Swiss company Strunzs website on April 2, 2026. The attack targeted a specific customer area rather than the main homepage.
    Date: 2026-04-01T18:22:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824272
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Switzerland
    Victim Industry: Unknown
    Victim Organization: Strunz
    Victim Site: www.strunz.ch
  124. Website defacement of The Body Shop Croatia by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of The Body Shop Croatias website on April 2, 2026. This was a targeted single-site defacement rather than a mass campaign.
    Date: 2026-04-01T18:22:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824273
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Croatia
    Victim Industry: Retail/Cosmetics
    Victim Organization: The Body Shop Croatia
    Victim Site: www.thebodyshop.hr
  125. Website defacement of TrendingPC by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the TrendingPC website, a Spanish technology/computing platform, on April 2, 2026.
    Date: 2026-04-01T18:21:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824274
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: Technology/Computing
    Victim Organization: TrendingPC
    Victim Site: www.trendingpc.es
  126. Website defacement of Vivaraise by Rici144/Ratman team
    Category: Defacement
    Content: The website www.vivaraise.es was defaced by attacker Rici144 from the Ratman team on April 2, 2026. The attack targeted a specific media/custom directory path on the Spanish domain.
    Date: 2026-04-01T18:21:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824275
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Vivaraise
    Victim Site: www.vivaraise.es
  127. Alleged Sale of U.S. Driver’s License/ID Images
    Category: Data Leak
    Content: The threat actor claims to be selling images of U.S. driver’s licenses or identification documents.
    Date: 2026-04-01T18:17:36Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279675/
    Screenshots:
    None
    Threat Actors: My_World
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged leak of mixed domain credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 10,115 credential pairs targeting mixed domains via a file sharing service.
    Date: 2026-04-01T17:56:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70723/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged distribution of credential combolists from multiple countries
    Category: Combo List
    Content: Threat actor CODER distributes credential combolists containing approximately 8 million records from multiple countries including Czech Republic, Israel, Greece, and Finland through Telegram channels. The actor operates free distribution channels for both credential lists and related tools.
    Date: 2026-04-01T17:56:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70724/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged leak of USA credential combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 3,310 USA-based credentials on a cybercriminal forum. The content is hidden and requires forum registration to access.
    Date: 2026-04-01T17:55:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70725/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Alleged sale of Deutsche Bahn database
    Category: Data Breach
    Content: The threat actor claims to be selling Deutsche Bahn database. The compromised data contains over 27 million records and includes personal and travel-related information such as full names, dates of birth, email addresses, phone numbers, physical addresses, ticket types, travel class, and booking status.
    Date: 2026-04-01T17:53:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Germany-tickets-reservations-18-millions-int-bahn-de
    Screenshots:
    None
    Threat Actors: hackboy
    Victim Country: Germany
    Victim Industry: Transportation & Logistics
    Victim Organization: deutsche bahn
    Victim Site: int.bahn.de
  132. Alleged Sale of US-Based Network Access with Domain Admin Privileges
    Category: Data Leak
    Content: The threat actor claims to be offering access to a US-based organization involved in manufacturing custom orthotics and prosthetics. The listing allegedly includes domain administrator access, VPN connectivity via FortiClient, and infrastructure spanning approximately 20 hosts. The actor further claims the presence of security solutions from Trend Micro with administrative credentials, along with cloud services such as Datto and OneDrive.
    Date: 2026-04-01T17:52:38Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279673/
    Screenshots:
    None
    Threat Actors: boat
    Victim Country: USA
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  133. DEFACER INDONESIAN TEAM targets the website of Jedlian Holdings Inc.
    Category: Defacement
    Content: The group claims to have defaced the website of Jedlian Holdings Inc.
    Date: 2026-04-01T17:52:34Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1402
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: Philippines
    Victim Industry: Network & Telecommunications
    Victim Organization: jedlian holdings inc.
    Victim Site: mail.jedlian.net/uploads/lucu.sql
  134. Alleged data breach of The Citizen Portal
    Category: Data Breach
    Content: The threat actor claims to be offering a database allegedly sourced from the Citizen Portal, a Czech Republic-based government platform. The dataset reportedly includes citizen contact details, service request records, and authentication logs, potentially exposing sensitive personal and access-related information.
    Date: 2026-04-01T17:49:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-437k-Czech-Republic-https-obcan-portal-gov-cz-Personal-ID-contacts-addresses
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Czech Republic
    Victim Industry: Government Administration
    Victim Organization: the citizen portal
    Victim Site: obcan.portal.gov.cz
  135. Alleged leak of educational institution credentials
    Category: Combo List
    Content: Threat actor shared a combolist containing 187,921 credential pairs targeting educational domain institutions. The data is being distributed for free via a file sharing service.
    Date: 2026-04-01T17:44:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70722/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  136. Alleged data breach of Mediatel CZ, s.r.o.
    Category: Data Breach
    Content: The threat actor claims to be offering a database allegedly sourced from Mediatel CZ, s.r.o. The dataset reportedly contains contact details, booking history, and customer account information, potentially exposing sensitive business and user-related data.
    Date: 2026-04-01T17:41:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-487k-Czech-Republic-https-www-zlatestranky-cz-Verified-business-contacts-and-em
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Czech Republic
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: mediatel cz, s.r.o.
    Victim Site: zlatestranky.cz
  137. Alleged leak of mixed email provider credentials
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 4,706 premium mixed email credentials including Hotmail accounts. The credentials are being offered as a free download through Telegram contact.
    Date: 2026-04-01T17:32:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70721/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Alleged data breach of suzhouyou.com
    Category: Data Breach
    Content: The threat actor claims to have breached data from suzhouyou.com, allegedly containing contacts, support tickets, and emails.
    Date: 2026-04-01T17:24:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-472k-China-https-www-suzhouyou-com-Contact-info-including-emails-phone-numbers
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: suzhouyou.com
  139. Alleged data breach of sauto.cz
    Category: Data Breach
    Content: The threat actor claims to be offering a database allegedly sourced from sauto.cz, a Czech Republic-based automotive platform. The dataset contains approximately 476,000 records, including customer contact details, vehicle inquiries, and reservation information. The data is structured across multiple sections such as contacts, vehicle inquiries, and bookings, potentially exposing sensitive personal and transactional information.
    Date: 2026-04-01T17:23:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-476k-Czech-Republic-https-www-sauto-cz-Contact-records-with-emails-phone-IPs-an
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Czech Republic
    Victim Industry: Automotive
    Victim Organization: sauto.cz
    Victim Site: sauto.cz
  140. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Threat actor TeraCloud1 shared a combolist containing 34,000 valid email credentials on a cybercrime forum. Additional private cloud services are advertised through Telegram contact.
    Date: 2026-04-01T17:21:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70720/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  141. DEFACER INDONESIAN TEAM targets the website of Christ’s Forgiveness Bible Studies
    Category: Defacement
    Content: The group claims to have defaced the website of Christ’s Forgiveness Bible Studies.
    Date: 2026-04-01T17:19:37Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1401
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: USA
    Victim Industry: Religious Institutions
    Victim Organization: christ’s forgiveness bible studies
    Victim Site: cfmbiblestudy.com
  142. Alleged distribution of multi-domain credential combolist
    Category: Combo List
    Content: Actor distributes an 11.2 million record credential combolist containing various domain extensions including business, commercial, and country-specific domains through Telegram channels.
    Date: 2026-04-01T17:09:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70719/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Alleged leak of email credentials combolist
    Category: Combo List
    Content: TeraCloud1 made available a combolist containing 42,000 valid email credentials on CrackingX forum with additional private cloud access offered through Telegram.
    Date: 2026-04-01T16:58:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70718/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Alleged data leak of CAPIC
    Category: Data Leak
    Content: The threat actor claims to have leaked 376,000 records of data from CAPIC. The compromised data reportedly includes member contact details, accreditation records, and support ticket information, posing risks such as identity exposure, targeted phishing, and privacy violations.
    Date: 2026-04-01T16:52:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-376k-Canada-https-www-capic-ca-contact-emails-phone-numbers-personal-details
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Canada
    Victim Industry: Other Industry
    Victim Organization: capic
    Victim Site: capic.ca
  145. Alleged leak of Hotmail credentials on cybercrime forum
    Category: Combo List
    Content: A threat actor shared a combolist containing 42,000 Hotmail email credentials on a cybercrime forum. The credentials are claimed to be valid and related to forum accounts.
    Date: 2026-04-01T16:48:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70717/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  146. Alleged unauthorized admin access to Politeknik Elektronika Negeri Surabaya (PENS)
    Category: Initial Access
    Content: Group claims to have gained unauthorized admin access to Politeknik Elektronika Negeri Surabaya (PENS).
    Date: 2026-04-01T16:41:14Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/184
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Indonesia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: politeknik elektronika negeri surabaya
    Victim Site: andhikasyawalludin.it.student.pens.ac.id
  147. Alleged Data breach of Telecommunications and Digital Government Regulatory Authority
    Category: Data Breach
    Content: The group claims to have breached data from Telecommunications and Digital Government Regulatory Authority.
    Date: 2026-04-01T16:40:13Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5331
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: UAE
    Victim Industry: Network & Telecommunications
    Victim Organization: telecommunications and digital government regulatory authority
    Victim Site: tra.gov.ae
  148. Alleged data leak of Kabum
    Category: Data Leak
    Content: The threat actor claims to have leaked 724,000 records of data from Kabum. The compromised data reportedly includes customer contact details, order information, and delivery/logistics records, which could expose users to targeted phishing, fraud, identity misuse, and privacy risks.
    Date: 2026-04-01T16:40:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-724k-Brazil-https-www-kabum-com-br-User-contact-records-with-emails-phones-l
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Brazil
    Victim Industry: E-commerce & Online Stores
    Victim Organization: kabum
    Victim Site: kabum.com.br
  149. Website defacement of medantainment.com by maw3six
    Category: Defacement
    Content: Threat actor maw3six successfully defaced the medantainment.com website on April 1, 2026. The attack targeted an entertainment industry website running on a Linux server.
    Date: 2026-04-01T16:39:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248202
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Medantainment
    Victim Site: medantainment.com
  150. Mass defacement campaign by maw3six targeting halopahawang.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting halopahawang.com on April 1, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single site.
    Date: 2026-04-01T16:39:00Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248203
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: halopahawang.com
  151. Mass website defacement by maw3six targeting travel website
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting the Sujud Travel website. The attack was part of a broader mass defacement operation rather than targeting this specific organization.
    Date: 2026-04-01T16:38:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248204
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Travel/Tourism
    Victim Organization: Sujud Travel
    Victim Site: sujud.travel
  152. Alleged data breach of IRISbox
    Category: Data Breach
    Content: The threat actor claims to have breached data from IRISbox, allegedly containing contact, box subscription, and identity verification information.
    Date: 2026-04-01T16:28:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-467k-Belgium-https-irisbox-brussels-Personal-records-including-IDs-phone-numbe
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Belgium
    Victim Industry: Government & Public Sector
    Victim Organization: irisbox
    Victim Site: irisbox.irisnet.be
  153. Alleged distribution of mixed credential combolists from multiple platforms
    Category: Combo List
    Content: Threat actor distributing a 16 million record mixed credential combolist containing data from multiple platforms including Replit, Creator Center, Reactiflux, DevOps Chat, Kubernetes Slack, Habr, and BlackHatWorld across various country domains. The credentials are being shared through Telegram channels.
    Date: 2026-04-01T16:25:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70715/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple platforms
    Victim Site: Multiple domains
  154. Alleged leak of login credentials to The BSS School
    Category: Initial Access
    Content: The Group claims to have leaked login credentials to The BSS School. The shared details reportedly include hashed password data, directory paths, storage quota information, and references to a mail or administrative account.
    Date: 2026-04-01T16:25:08Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/182
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: India
    Victim Industry: Education
    Victim Organization: the bss school
    Victim Site: thebssschool.com
  155. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 545 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-01T16:25:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70716/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  156. Alleged unauthorized access to the website of Shri Shikshayatan College.
    Category: Initial Access
    Content: The group claims to have gained Unauthorized Access to the website of Shri Shikshayatan College.
    Date: 2026-04-01T16:19:39Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/181
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: India
    Victim Industry: Education
    Victim Organization: shri shikshayatan college
    Victim Site: shrishikshayatancollege.org
  157. Alleged data breach of Cairo University
    Category: Data Breach
    Content: The threat actor claims to have breached data from Cairo University, allegedly containing contacts, student enrollments, and support tickets.
    Date: 2026-04-01T16:18:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-284k-Egypt-https-cu-edu-eg-Educational-records-including-personal-IDs-emails-a
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Egypt
    Victim Industry: Education
    Victim Organization: cairo university
    Victim Site: cu.edu.eg
  158. Alleged data leak of Taipei Computer Association
    Category: Data Breach
    Content: The group claims to have leaked the database of Taipei Computer Association.
    Date: 2026-04-01T16:12:55Z
    Network: telegram
    Published URL: https://t.me/Noheartz1337/58
    Screenshots:
    None
    Threat Actors: NoHeartz
    Victim Country: Taiwan
    Victim Industry: Information Technology (IT) Services
    Victim Organization: taipei computer association
    Victim Site: smartcityonline.org.tw
  159. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor UniqueCombo allegedly shared a combolist containing 18,000 unique Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-01T16:12:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70714/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  160. Alleged Unauthorized Access to Unidentified critical operating technology in South Korea
    Category: Initial Access
    Content: The group claims to have gained Unauthorized Access to Unidentified critical operating technology in South Korea. They can control unrestricted administrative control over the HMI and PLC, allowing them to monitor, modify, and override all system operations, parameters, programs, and data.
    Date: 2026-04-01T16:00:49Z
    Network: telegram
    Published URL: https://t.me/Z_Pentest_Alliance_ru/916
    Screenshots:
    None
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: South Korea
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged leak of mixed credential combolist containing 51,591 entries
    Category: Combo List
    Content: A threat actor shared a fresh mixed combolist containing 51,591 credential entries on a cybercrime forum. The actor also promoted their Telegram channel for additional content distribution.
    Date: 2026-04-01T16:00:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70713/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Forum user TeraCloud1 shared a combolist containing 33,000 valid email credentials on CrackingX forum. The threat actor also advertises additional private cloud services available through Telegram contact.
    Date: 2026-04-01T15:49:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70711/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged leak of credential combolist containing 253,000 records
    Category: Combo List
    Content: Threat actor shared a fresh credential combolist containing 253,000 records on an underground forum. The post advertises the data as high quality and recently obtained.
    Date: 2026-04-01T15:48:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70712/
    Screenshots:
    None
    Threat Actors: Blackcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Alleged leak of 26,000 email credentials
    Category: Combo List
    Content: A threat actor claims to have leaked 26,000 fresh valid email access credentials in a mixed collection. The credentials are being distributed through a cybercrime forum.
    Date: 2026-04-01T15:38:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70707/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged leak of mixed email credentials including Hotmail accounts
    Category: Combo List
    Content: Actor noir is distributing a collection of valid email credentials described as UHQ Mix including Hotmail accounts and private cloud credentials through Telegram channel @NoirAccesss.
    Date: 2026-04-01T15:37:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70708/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Website defacement of Hoist and Winch Co UK by Rici144/Ratman team
    Category: Defacement
    Content: On April 1, 2026, the UK-based industrial equipment company Hoist and Winch Co had their website defaced by attacker Rici144, associated with the Ratman team. The defacement targeted a specific media directory on the companys website.
    Date: 2026-04-01T15:37:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824157
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Manufacturing
    Victim Organization: Hoist and Winch Co UK
    Victim Site: hoistandwinch.co.uk
  167. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 2.16 million Hotmail email and password combinations through a file sharing service. The credentials are described as high quality and made available for free download.
    Date: 2026-04-01T15:37:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70709/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  168. Website defacement of Hometex by Rici144 (Ratman team)
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team defaced the Hometex company website on April 1, 2026. The attack targeted a UK-based textile or home goods manufacturers media directory.
    Date: 2026-04-01T15:37:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824158
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Textiles/Manufacturing
    Victim Organization: Hometex
    Victim Site: hometex.co.uk
  169. Alleged data leak of Regional Council of Veterinary Medicine of the State of São Paulo
    Category: Data Leak
    Content: The threat actor claims to have leaked 452,000 records of data from Regional Council of Veterinary Medicine of the State of São Paulo. the compromised data includes vet contact info, registration details, compliance records, and appointment bookings, posing risks of privacy exposure, profiling, and targeted phishing.
    Date: 2026-04-01T15:37:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-452k-Brazil-https-www-crmvsp-gov-br-Veterinary-professional-registry-data-incl
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Brazil
    Victim Industry: Government Administration
    Victim Organization: regional council of veterinary medicine of the state of são paulo
    Victim Site: crmvsp.gov.br
  170. Alleged leak of multi-platform credential combolist including Stack Overflow, Dev.to, and email providers
    Category: Combo List
    Content: Threat actor distributes a 13 million record credential combolist containing data allegedly from Stack Overflow, Dev.to, Hashnode, and various email providers including Hotmail, AOL, GMX, and others. The credentials are being freely distributed through Telegram channels.
    Date: 2026-04-01T15:36:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70710/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple
    Victim Site: stackoverflow.com
  171. Website defacement of Industrial Lifting Bags by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team, specifically attacker Rici144, conducted a redefacement of Industrial Lifting Bags website on April 1, 2026. This incident represents a repeat compromise of the industrial equipment companys web presence.
    Date: 2026-04-01T15:36:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824159
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Industrial Equipment
    Victim Organization: Industrial Lifting Bags
    Victim Site: www.industrialliftingbags.co.uk
  172. Website defacement of Jacksons Garden Supplies by Rici144/Ratman team
    Category: Defacement
    Content: The website of Jacksons Garden Supplies was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. This incident represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-01T15:35:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824160
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Retail/Garden Supplies
    Victim Organization: Jacksons Garden Supplies
    Victim Site: www.jacksonsgardensupplies.co….
  173. Alleged data leak of Dr. Ambedkar Institute of Management Studies & Research
    Category: Data Breach
    Content: The group claims to have leaked the database of Dr. Ambedkar Institute of Management Studies & Research.
    Date: 2026-04-01T15:35:51Z
    Network: telegram
    Published URL: https://t.me/Noheartz1337/58
    Screenshots:
    None
    Threat Actors: NoHeartz
    Victim Country: India
    Victim Industry: Education
    Victim Organization: dr. ambedkar institute of management studies & research
    Victim Site: daimsr.edu.in
  174. Website defacement of JeanScene by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced the JeanScene UK retail website on April 1, 2026. This appears to be a targeted defacement of a single commercial fashion retailers media directory.
    Date: 2026-04-01T15:35:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824161
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/Fashion
    Victim Organization: JeanScene
    Victim Site: jeanscene.co.uk
  175. Website defacement of JetEase by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with team Ratman, successfully defaced a subdirectory of the JetEase aviation company website on April 1st, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-01T15:34:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824162
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Aviation/Travel
    Victim Organization: JetEase
    Victim Site: jetease.co.uk
  176. Website defacement of joalexander.co.uk by Rici144/Ratman team
    Category: Defacement
    Content: The website joalexander.co.uk was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. The defacement targeted a specific media subdirectory rather than the homepage.
    Date: 2026-04-01T15:33:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824163
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: joalexander.co.uk
  177. Website defacement of jimsbits.co.uk by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the jimsbits.co.uk website on April 1, 2026. The defacement targeted a specific media subdirectory of the UK-based website.
    Date: 2026-04-01T15:33:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824164
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Jims Bits
    Victim Site: jimsbits.co.uk
  178. Website defacement of JustItems by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the UK-based e-commerce website JustItems on April 1, 2026. This appears to be a repeat attack targeting the same victim site.
    Date: 2026-04-01T15:32:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824165
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: E-commerce
    Victim Organization: JustItems
    Victim Site: justitems.co.uk
  179. Website defacement of K-Sport UK by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144, affiliated with team Ratman, defaced the K-Sport UK website on April 1, 2026. The defacement targeted a media subdirectory of the sports organizations website.
    Date: 2026-04-01T15:32:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824166
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Sports/Recreation
    Victim Organization: K-Sport UK
    Victim Site: www.k-sport-uk.co.uk
  180. Website defacement of Kuul by Rici144 (Ratman team)
    Category: Defacement
    Content: On April 1, 2026, attacker Rici144 from team Ratman defaced the UK-based website www.kuul.co.uk. The attack targeted a specific page within the sites media/customer directory.
    Date: 2026-04-01T15:31:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824167
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Kuul
    Victim Site: www.kuul.co.uk
  181. Website defacement of Love Espresso by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team member Rici144 defaced the Love Espresso coffee company website on April 1, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-01T15:30:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824168
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Food and Beverage
    Victim Organization: Love Espresso
    Victim Site: love-espresso.co.uk
  182. Website defacement of Mainland Aggregates by Rici144/Ratman team
    Category: Defacement
    Content: The threat actor Rici144, associated with the Ratman team, defaced the website of Mainland Aggregates, a UK-based construction materials company, on April 1, 2026.
    Date: 2026-04-01T15:30:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824169
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Construction/Mining
    Victim Organization: Mainland Aggregates
    Victim Site: www.mainlandaggregates.co.uk
  183. Website defacement of Mayfair Stationers by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the Mayfair Stationers website on April 1, 2026. This represents a redefacement of a previously compromised target.
    Date: 2026-04-01T15:29:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824171
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/Office Supplies
    Victim Organization: Mayfair Stationers
    Victim Site: www.mayfairstationers.co.uk
  184. Website defacement of Merlin Workwear by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team member Rici144 successfully defaced the Merlin Workwear website on April 1st, 2026. This appears to be a targeted single-site defacement of a UK-based workwear retailers media directory.
    Date: 2026-04-01T15:28:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824172
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/Apparel
    Victim Organization: Merlin Workwear
    Victim Site: www.merlinworkwear.co.uk
  185. Website defacement of MyPNI by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, successfully defaced a customer media page on the MyPNI website on April 1, 2026. This appears to be a targeted single-site defacement rather than a mass or repeat attack.
    Date: 2026-04-01T15:28:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824173
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: MyPNI
    Victim Site: www.mypni.co.uk
  186. Website defacement of Novo Shoes by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the Novo Shoes UK website on April 1st, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T15:27:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824174
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/Fashion
    Victim Organization: Novo Shoes
    Victim Site: www.novoshoes.co.uk
  187. Website defacement of Paco Perfumerias by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the Paco Perfumerias UK website on April 1, 2026. This appears to be a single-site defacement targeting the cosmetics retailers online presence.
    Date: 2026-04-01T15:26:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824176
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/Cosmetics
    Victim Organization: Paco Perfumerias
    Victim Site: www.pacoperfumerias.co.uk
  188. Website defacement of Pawfect Foods by Rici144 (Ratman team)
    Category: Defacement
    Content: On April 1, 2026, attacker Rici144 from the Ratman team successfully defaced the Pawfect Foods website. The defacement targeted a specific page within the media directory rather than the main homepage.
    Date: 2026-04-01T15:26:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824177
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Food and Beverage
    Victim Organization: Pawfect Foods
    Victim Site: www.pawfectfoods.co.uk
  189. Website defacement of Pongees by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Pongees website on April 1, 2026. The defacement targeted a specific media directory rather than the homepage.
    Date: 2026-04-01T15:25:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824178
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Pongees
    Victim Site: www.pongees.co.uk
  190. Website defacement of Rattan Furniture Fairy by Rici144/Ratman team
    Category: Defacement
    Content: The UK-based furniture retailer Rattan Furniture Fairys website was defaced by attacker Rici144, associated with the Ratman team, on April 1, 2026. The incident represents a single-target defacement of an e-commerce furniture business.
    Date: 2026-04-01T15:25:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824179
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: Rattan Furniture Fairy
    Victim Site: www.rattanfurniturefairy.co.uk
  191. Website defacement of Shower Seals Direct by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Shower Seals Direct website on April 1, 2026. The incident targeted a UK-based retail company specializing in shower sealing products.
    Date: 2026-04-01T15:24:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824180
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: Shower Seals Direct
    Victim Site: showersealsdirect.co.uk
  192. Alleged leak of German shopping credentials combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 545,433 credential pairs allegedly targeting German shopping websites. The data was made available for free download via a file sharing service.
    Date: 2026-04-01T15:23:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70706/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Website defacement of SourceMedia by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of SourceMedias UK website on April 1, 2026. This appears to be a targeted attack against the media companys web presence.
    Date: 2026-04-01T15:23:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824181
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Media/Publishing
    Victim Organization: SourceMedia
    Victim Site: www.sourcemedia.co.uk
  194. Website defacement of Sure24 by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced a media subdirectory on the Sure24 website on April 1, 2026.
    Date: 2026-04-01T15:23:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824182
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Sure24
    Victim Site: sure24.co.uk
  195. Website defacement of Tiling Logistics by Rici144/Ratman team
    Category: Defacement
    Content: Cyber attacker Rici144 from the Ratman team conducted a redefacement of the UK-based Tiling Logistics company website on April 1, 2026. This represents a secondary attack on a previously compromised logistics company website.
    Date: 2026-04-01T15:22:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824183
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Logistics
    Victim Organization: Tiling Logistics
    Victim Site: www.tilinglogistics.co.uk
  196. Website defacement of Uther Peptide by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the Uther Peptide website on April 1, 2026. This appears to be a redefacement of a previously compromised site rather than an initial attack.
    Date: 2026-04-01T15:21:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824185
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Biotechnology/Pharmaceuticals
    Victim Organization: Uther Peptide
    Victim Site: utherpeptide.co.uk
  197. Website defacement of ZFS Solution by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced a subdirectory of ZFS Solutions website on April 1, 2026. The defacement targeted a custom media directory rather than the main homepage.
    Date: 2026-04-01T15:21:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824186
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Kingdom
    Victim Industry: Technology/IT Services
    Victim Organization: ZFS Solution
    Victim Site: zfssolution.co.uk
  198. Alleged data leak of BulgarianProperties
    Category: Data Leak
    Content: The threat actor claims to have leaked 147,000 records of data from BulgarianProperties. The compromised data includes customer contacts, inquiry records, property viewings, and transaction info, posing risks of phishing, fraud, and profiling.
    Date: 2026-04-01T15:20:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-147k-Bulgaria-https-www-bulgarianproperties-com-Active-real-estate-contacts-wit
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Bulgaria
    Victim Industry: Real Estate
    Victim Organization: bulgarianproperties
    Victim Site: bulgarianproperties.com
  199. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum user alphaxdd shared a collection of 1,264 allegedly valid Hotmail credentials described as premium hits with mixed email addresses.
    Date: 2026-04-01T15:13:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70705/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  200. Alleged distribution of Reddit and Replit credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a 5 million credential combolist allegedly containing Reddit and Replit accounts through Telegram channels. The credentials are being shared for free through dedicated Telegram groups.
    Date: 2026-04-01T15:03:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70704/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Reddit, Replit
    Victim Site: reddit.com, replit.com
  201. Website defacement of Atlas Ice by Rici144/Ratman team
    Category: Defacement
    Content: Atlas Ices Malaysian website was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-01T14:52:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824063
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Malaysia
    Victim Industry: Food and Beverage
    Victim Organization: Atlas Ice
    Victim Site: www.atlasice.com.my
  202. Website defacement of Byggfabriken by Rici144 (Ratman team)
    Category: Defacement
    Content: Website defacement attack against Swedish construction company Byggfabriken carried out by attacker Rici144 from the Ratman team on April 1, 2026.
    Date: 2026-04-01T14:51:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824064
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Construction/Manufacturing
    Victim Organization: Byggfabriken
    Victim Site: www.byggfabriken.se
  203. Alleged leak of mixed credential data via D4RKNETHUB
    Category: Combo List
    Content: Threat actor D4rkNetHub shared a collection of 19,024 mixed credential records on a cybercriminal forum, with content hosted on image sharing platform and requiring registration to access.
    Date: 2026-04-01T14:51:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70703/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  204. Website defacement of Dekker Nordic by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team conducted a redefacement attack against Dekker Nordics website on April 1, 2026. This incident represents a secondary compromise of the target organizations web infrastructure.
    Date: 2026-04-01T14:50:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824066
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Dekker Nordic
    Victim Site: dekkernordic.se
  205. Website defacement of Depo Bangunan by Rici144/Ratman team
    Category: Defacement
    Content: Indonesian construction company Depo Bangunans website was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This incident represents a redefacement of the target website.
    Date: 2026-04-01T14:49:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824067
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Indonesia
    Victim Industry: Construction/Building Supplies
    Victim Organization: Depo Bangunan
    Victim Site: www.depobangunan.co.id
  206. Website defacement of ENSI by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of the Swedish ENSI website on April 1, 2026. This marks a repeat attack on the same target domain.
    Date: 2026-04-01T14:49:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824068
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: ENSI
    Victim Site: www.ensi.se
  207. Website defacement of Fiskejournalen by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144, associated with the Ratman team, defaced a page on the Swedish fishing publication website Fiskejournalen on April 1, 2026. The incident targeted a specific media subdirectory rather than the main homepage.
    Date: 2026-04-01T14:48:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824069
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Media/Publishing
    Victim Organization: Fiskejournalen
    Victim Site: www.fiskejournalen.se
  208. Website defacement of Fitness Concept by Rici144/Ratman team
    Category: Defacement
    Content: Malaysian fitness company website was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This was identified as a redefacement attack targeting the organizations web presence.
    Date: 2026-04-01T14:47:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824070
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Malaysia
    Victim Industry: Health and Fitness
    Victim Organization: Fitness Concept
    Victim Site: www.fitnessconcept.com.my
  209. Website defacement of GIS One by Rici144 (Ratman team)
    Category: Defacement
    Content: Cybercriminal Rici144 from the Ratman team successfully defaced the GIS One website on April 1, 2026. The attack targeted a specific media/customer section of the AI-focused companys website.
    Date: 2026-04-01T14:47:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824071
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: GIS One
    Victim Site: gisone.ai
  210. Website defacement of Gymbutiken by Rici144/Ratman team
    Category: Defacement
    Content: Swedish fitness equipment retailer Gymbutiken was defaced by attacker Rici144 associated with the Ratman team. This represents a redefacement of a previously compromised target rather than an initial attack.
    Date: 2026-04-01T14:46:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824072
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Retail/Fitness
    Victim Organization: Gymbutiken
    Victim Site: gymbutiken.se
  211. Website defacement of Glamira Bolivia by Rici144/Ratman team
    Category: Defacement
    Content: The Bolivian website of jewelry retailer Glamira was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. The defacement targeted a specific media/customer page rather than the main homepage.
    Date: 2026-04-01T14:46:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824073
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Bolivia
    Victim Industry: Retail/Jewelry
    Victim Organization: Glamira
    Victim Site: www.glamira.com.bo
  212. Website defacement of Kitchen Arena by Rici144/Ratman team
    Category: Defacement
    Content: Malaysian kitchen retail website kitchen-arena.com.my was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. The defacement targeted a specific media directory on the site.
    Date: 2026-04-01T14:45:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824076
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Malaysia
    Victim Industry: Retail/E-commerce
    Victim Organization: Kitchen Arena
    Victim Site: kitchen-arena.com.my
  213. Website defacement of KTSPS by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced a Malaysian website belonging to KTSPS organization on April 1, 2026. The defacement targeted a specific media/customer advertising section of the website.
    Date: 2026-04-01T14:44:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824077
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Malaysia
    Victim Industry: Unknown
    Victim Organization: KTSPS
    Victim Site: www.ktsps.my
  214. Website defacement of Louis XIII Cognac by Rici144/Ratman team
    Category: Defacement
    Content: The Chinese website of luxury cognac brand Louis XIII was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a targeted single-site defacement of the premium spirits companys regional website.
    Date: 2026-04-01T14:44:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824078
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: China
    Victim Industry: Food and Beverage
    Victim Organization: Louis XIII Cognac
    Victim Site: www.louisxiii-cognac-cn.com
  215. Website defacement of Mad Wizard Games by Rici144/Ratman team
    Category: Defacement
    Content: Gaming company Mad Wizard Games suffered a website defacement attack by threat actor Rici144 associated with the Ratman team on April 1, 2026. The attack targeted a specific page within the companys media directory rather than the main homepage.
    Date: 2026-04-01T14:43:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824079
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Gaming/Entertainment
    Victim Organization: Mad Wizard Games
    Victim Site: www.madwizardgames.se
  216. Alleged data breach of Animoto
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Animoto. The compromised data reportedly contains 5M records including User ID, Email Address, First name, Last Name, Password, IP Address, Registration Date, Subscription Type, Payment Status, Video Count, Storage Usage, Last Login.
    Date: 2026-04-01T14:43:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-ANIMOTO-COM-Video-Creation-5M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: animoto
    Victim Site: animoto.com
  217. Website defacement of MVM by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement incident targeting MVMs Mexican domain by attacker Rici144 affiliated with Ratman team on April 1, 2026. The attack compromised the organizations media/customer section.
    Date: 2026-04-01T14:43:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824081
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: MVM
    Victim Site: www.mvm.com.mx
  218. Website defacement of Nexperia Store by Rici144/Ratman team
    Category: Defacement
    Content: The Nexperia Store website was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The attack targeted a media subdirectory of the Chinese semiconductor companys e-commerce platform.
    Date: 2026-04-01T14:42:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824082
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: China
    Victim Industry: Electronics/Semiconductor
    Victim Organization: Nexperia
    Victim Site: www.nexperiastore.cn
  219. Website defacement of Outdoor Retail Mexico by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, conducted a redefacement of the Mexican outdoor retail companys website on April 1, 2026. This appears to be a targeted attack against a specific retail organization rather than part of a mass defacement campaign.
    Date: 2026-04-01T14:41:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824083
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Mexico
    Victim Industry: Retail
    Victim Organization: Outdoor Retail
    Victim Site: www.outdoorretail.mx
  220. Website defacement of Pinturas FMC by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the website of Pinturas FMC, a Mexican paint manufacturing company, on April 1, 2026.
    Date: 2026-04-01T14:41:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824084
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Mexico
    Victim Industry: Manufacturing
    Victim Organization: Pinturas FMC
    Victim Site: www.pinturasfmc.com.mx
  221. Website defacement of Ronnmans by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from team Ratman conducted a redefacement attack against the Swedish website www.ronnmans.se on April 1, 2026. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T14:40:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824085
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Ronnmans
    Victim Site: www.ronnmans.se
  222. Alleged leak of credential combolist containing 21,000 records
    Category: Combo List
    Content: A threat actor shared a link to what appears to be a credential combolist containing 21,000 records on a cybercriminal forum. The post provides minimal details about the source or nature of the credentials.
    Date: 2026-04-01T14:40:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70700/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  223. Website defacement of se-branded.com by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of se-branded.com on April 1, 2026. This was identified as a redefacement rather than an initial compromise of the target website.
    Date: 2026-04-01T14:39:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824086
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: SE Branded
    Victim Site: se-branded.com
  224. Alleged leak of Russian credential data
    Category: Combo List
    Content: A threat actor shared a collection of 6,000 fresh Russian credentials that were reportedly verified. The data is being distributed through a cybercriminal forum focused on credential lists and financial data.
    Date: 2026-04-01T14:39:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70701/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  225. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 7,000 mixed email credentials described as fresh and high quality. The credentials are being distributed for free to registered forum users.
    Date: 2026-04-01T14:39:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70702/
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  226. Website defacement of Sikkerthjem by Rici144/Ratman team
    Category: Defacement
    Content: Swedish website sikkerthjem.se was defaced by attacker Rici144, associated with the Ratman team, on April 1st, 2026. The defacement targeted a specific media directory on the site.
    Date: 2026-04-01T14:39:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824087
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Sikkerthjem
    Victim Site: sikkerthjem.se
  227. Website defacement of sexpuppe.ai by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the sexpuppe.ai website on April 1, 2026. This appears to be a subsequent attack on a previously compromised target in the adult entertainment sector.
    Date: 2026-04-01T14:38:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824088
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Adult Entertainment
    Victim Organization: Unknown
    Victim Site: sexpuppe.ai
  228. Website defacement of Sportsmed by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team conducted a redefacement attack against Mexican sports medicine organization Sportsmed on April 1, 2026. This represents a repeat compromise of the targets web infrastructure.
    Date: 2026-04-01T14:37:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824089
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: Sportsmed
    Victim Site: sportsmed.com.mx
  229. Website defacement of Steren Shop by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against Mexican electronics retailer Steren Shops website on April 1, 2026. This represents a repeat compromise of the target system.
    Date: 2026-04-01T14:37:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824090
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Mexico
    Victim Industry: Retail/E-commerce
    Victim Organization: Steren Shop
    Victim Site: www.sterenshop.com.mx
  230. Website defacement of Textilgallerian by Rici144/Ratman team
    Category: Defacement
    Content: Swedish textile retailer Textilgallerian was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The defacement targeted a media subdirectory of the companys website.
    Date: 2026-04-01T14:36:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824091
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Retail/Textile
    Victim Organization: Textilgallerian
    Victim Site: textilgallerian.se
  231. Website defacement of TUV Academy by Rici144/Ratman team
    Category: Defacement
    Content: The TUV Academy website was defaced by attacker Rici144 associated with the Ratman team on April 1st, 2026. The defacement targeted a specific media/custom page rather than the homepage.
    Date: 2026-04-01T14:35:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824092
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: China
    Victim Industry: Education/Training
    Victim Organization: TUV Academy
    Victim Site: www.tuv-academy.cn
  232. Website defacement of Swedish beauty club by Rici144/Ratman team
    Category: Defacement
    Content: On April 1, 2026, attacker Rici144 from team Ratman defaced the website of a Swedish beauty club. The incident was a single-target defacement with no indication of mass compromise or redefacement.
    Date: 2026-04-01T14:35:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824093
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Sweden
    Victim Industry: Recreation/Beauty Services
    Victim Organization: Skönhetsklubben
    Victim Site: www.xn--sknhetsklubben-wpb.se
  233. Alleged leak of LinkedIn, ChatGPT, Pinterest, Twitter, and Bluesky credentials
    Category: Combo List
    Content: Threat actor CODER is distributing a 12 million credential combolist containing email:password combinations allegedly from LinkedIn, ChatGPT, Pinterest, Twitter (X), Threads, and Bluesky through Telegram channels. The credentials are being shared for free through dedicated Telegram groups.
    Date: 2026-04-01T14:15:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70696/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  234. Alleged sale of unauthorized access to unidentified multiple companies
    Category: Initial Access
    Content: Threat actor claims to be selling domain admin (DA) access to two Czech-based companies, one in food production and another in software/IT services. The access reportedly includes RDP connectivity with administrative privileges, with pricing open to offers.
    Date: 2026-04-01T14:11:35Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279650/
    Screenshots:
    None
    Threat Actors: someone0717
    Victim Country: Czech Republic
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  235. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A forum post claims to contain a combolist of 18,000 unique Hotmail email and password combinations. The actual content requires forum registration to view, making verification of the claims impossible.
    Date: 2026-04-01T14:04:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70695/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  236. Alleged leak of email credentials from multiple regions
    Category: Combo List
    Content: A threat actor shared a collection of 7,600 allegedly valid email credentials from users across the United States, Europe, and Asia. The combolist appears to contain fresh email access credentials dated April 1st.
    Date: 2026-04-01T13:55:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70693/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  237. Alleged Data Leak of Warframe
    Category: Data Leak
    Content: The threat actor claims to be leaked data from Warframe. The compromised data reportedly contains 3M records including User ID, Email Address, Username, Password, Display Name, Account level, Platinum Balance, Registration Date, Last login, Play time, Clan name, Country, IP address.NB: This organization was previously breached on November 24 2014
    Date: 2026-04-01T13:45:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-WARFRAME-COM-Online-Game-3M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: digital extremes ltd.
    Victim Site: warframe.com
  238. Alleged distribution of credential lists targeting multiple social media platforms
    Category: Combo List
    Content: Threat actor CODER is distributing a 15 million record credential list (combolist) targeting multiple social media platforms including Facebook, Instagram, YouTube, TikTok, WeChat, Telegram, and Snapchat. The credentials are being shared through Telegram channels for free distribution.
    Date: 2026-04-01T13:45:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70691/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Multiple (Facebook, Instagram, YouTube, TikTok, WeChat, Telegram, Snapchat)
    Victim Site: Unknown
  239. OpsShadowStrike targets the website of Oakstreet Events
    Category: Defacement
    Content: The group claims to have defaced the website of Oakstreet Events
    Date: 2026-04-01T13:41:15Z
    Network: telegram
    Published URL: https://t.me/OpsShadowStrike/219
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: USA
    Victim Industry: Events Services
    Victim Organization: oakstreet events
    Victim Site: oakstreetcalendar.com
  240. Alleged Data breach Of Ambu Personalservice
    Category: Data Breach
    Content: The threat actor claims to have breached data from Ambau Team and intends to publish it within 1-2 days.
    Date: 2026-04-01T13:35:14Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/2617010624/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: Germany
    Victim Industry: Software Development
    Victim Organization: ambau personalservice
    Victim Site: ambau-team.de
  241. Website defacement of pellets-brandhout.be by Rici144/Ratman team
    Category: Defacement
    Content: The website of Belgian pellets and firewood retailer pellets-brandhout.be was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The defacement targeted a media subdirectory of the companys website.
    Date: 2026-04-01T13:33:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823976
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Retail/Energy
    Victim Organization: Pellets Brandhout
    Victim Site: pellets-brandhout.be
  242. Website defacement of pekaneurohinnat.fi by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against the Finnish website pekaneurohinnat.fi on April 1, 2026. This represents a repeat defacement of the same target by the threat actor.
    Date: 2026-04-01T13:32:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823977
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Finland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pekaneurohinnat.fi
  243. Website defacement of Plastex by Rici144/Ratman team
    Category: Defacement
    Content: Finnish manufacturing company Plastex suffered a website defacement attack by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T13:32:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823978
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Finland
    Victim Industry: Manufacturing
    Victim Organization: Plastex
    Victim Site: www.plastex.fi
  244. Website defacement of Polar India by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of the Polar India website on April 1, 2026. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T13:31:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823979
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Polar India
    Victim Site: www.polarindia.co.in
  245. Website defacement of ProAtWork by Rici144 (Ratman team)
    Category: Defacement
    Content: ProAtWork website was defaced by attacker Rici144 affiliated with the Ratman team on April 1st, 2026. The defacement targeted a specific media directory path on the Belgian professional services website.
    Date: 2026-04-01T13:30:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823980
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Professional Services
    Victim Organization: ProAtWork
    Victim Site: www.proatwork.be
  246. Website defacement of Prylstaden.fi by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced a page on the prylstaden.fi website on April 1, 2026. The incident appears to be a single page defacement rather than a mass or home page attack.
    Date: 2026-04-01T13:30:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823981
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Finland
    Victim Industry: Unknown
    Victim Organization: Prylstaden
    Victim Site: prylstaden.fi
  247. Website defacement of Raceline by Rici144 (Ratman team)
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team successfully defaced the Belgian racing company Racelines website on April 1, 2026. The attack targeted a specific media/customer directory on the site.
    Date: 2026-04-01T13:29:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823983
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Automotive/Racing
    Victim Organization: Raceline
    Victim Site: www.raceline.be
  248. OpsShadowStrike targets the website of myfuturejob.in
    Category: Defacement
    Content: The group actor claims to have defaced the website of myfuturejob.in.
    Date: 2026-04-01T13:29:43Z
    Network: telegram
    Published URL: https://t.me/OpsShadowStrike/220
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: India
    Victim Industry: Human Resources
    Victim Organization: myfuturejob.in
    Victim Site: myfuturejob.in
  249. Website defacement of Quick Heal Technologies by Rici144/Ratman team
    Category: Defacement
    Content: The cybersecurity company Quick Heal Technologies had their website defaced by attacker Rici144 from the Ratman team on April 1, 2026. The defacement targeted a specific media/customer section of the companys Indian domain.
    Date: 2026-04-01T13:29:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823984
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: India
    Victim Industry: Cybersecurity/Technology
    Victim Organization: Quick Heal Technologies
    Victim Site: www.quickheal.co.in
  250. Website defacement of Shopping4Camping by Rici144/Ratman team
    Category: Defacement
    Content: The Belgian camping equipment retailer Shopping4Camping was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. The defacement targeted a media subdirectory of the e-commerce website.
    Date: 2026-04-01T13:28:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823986
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Retail/E-commerce
    Victim Organization: Shopping4Camping
    Victim Site: www.shopping4camping.be
  251. Alleged data breach of HauteLook
    Category: Data Breach
    Content: The threat actor claims to be leaked data from HauteLook. The compromised data reportedly contains 6.5 million records including User Id, Full names, user names, passwords and moreNote: This organization was previously breached on March 18 2022
    Date: 2026-04-01T13:28:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-HAUTELOOK-COM-Fashion-Retail-6-5M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: USA
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hautelook
    Victim Site: hautelook.com
  252. Website defacement of Stretch Group by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from team Ratman conducted a redefacement attack against Stretch Groups website on April 1, 2026. This appears to be a repeat attack on the Belgian organizations web presence.
    Date: 2026-04-01T13:28:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823987
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Stretch Group
    Victim Site: www.stretchgroup.be
  253. Website defacement of Tires247 by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced a page on the Tires247 automotive retail website on April 1, 2026. The defacement targeted a specific customer media directory rather than the main homepage.
    Date: 2026-04-01T13:27:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823988
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Arab Emirates
    Victim Industry: Automotive/Retail
    Victim Organization: Tires247
    Victim Site: www.tires247.ae
  254. Website defacement of uittokalusto.fi by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team defaced the Finnish website www.uittokalusto.fi on April 1, 2026. The defacement targeted a media subdirectory of the site.
    Date: 2026-04-01T13:26:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823990
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Finland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: www.uittokalusto.fi
  255. Website defacement of TyresCart by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144, associated with the Ratman team, successfully defaced the TyresCart automotive retail website on April 1, 2026. The defacement targeted a specific media directory path on the UAE-based tire retailers website.
    Date: 2026-04-01T13:26:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823991
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United Arab Emirates
    Victim Industry: Automotive/Retail
    Victim Organization: TyresCart
    Victim Site: www.tyrescart.ae
  256. Website defacement of Verberckmoes by Rici144/Ratman team
    Category: Defacement
    Content: Cybercriminal Rici144 from the Ratman team conducted a redefacement attack against the Belgian website www.verberckmoes.be on April 1, 2026. This marks a repeat compromise of the same target by the threat actor.
    Date: 2026-04-01T13:25:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823993
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Verberckmoes
    Victim Site: www.verberckmoes.be
  257. Website defacement of Vipra by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from team Ratman conducted a redefacement of the Finnish website www.vipra.fi on April 1, 2026. This incident represents a repeated compromise of the same target by the threat actor.
    Date: 2026-04-01T13:25:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823995
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Finland
    Victim Industry: Unknown
    Victim Organization: Vipra
    Victim Site: www.vipra.fi
  258. Alleged data breach of Eyeem
    Category: Data Breach
    Content: The threat actor claims to be leaked data from EyeEm. The compromised data reportedly contains 3,800,000 records including User ID, Email Address, Username, Password, Display Name, Full Name, Location, Registration Date, Followers Count, Photo Count, Camera Equipment, Website/Portfolio.NB: This organization was previously breached on February 28 2018
    Date: 2026-04-01T13:24:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-EYEEM-COM-Photography-Platform-3-8M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Germany
    Victim Industry: Photography
    Victim Organization: eyeem
    Victim Site: eyeem.com
  259. Website defacement of Vital Agriculture by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Vital Agriculture website on April 1st, 2026. The defacement targeted a Belgian agricultural companys media subdirectory.
    Date: 2026-04-01T13:24:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823996
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Agriculture
    Victim Organization: Vital Agriculture
    Victim Site: www.vital-agriculture.be
  260. Website defacement of Yacht Supplier by Rici144/Ratman team
    Category: Defacement
    Content: The yacht supplier website www.yachtsupplier.be was defaced by attacker Rici144, associated with the Ratman team, on April 1, 2026. The defacement targeted a specific media subdirectory rather than the main homepage.
    Date: 2026-04-01T13:24:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823998
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Belgium
    Victim Industry: Marine/Yachting Services
    Victim Organization: Yacht Supplier
    Victim Site: www.yachtsupplier.be
  261. Website defacement of Worbis by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against the Finnish website www.worbis.fi on April 1, 2026. This represents a subsequent attack on a previously compromised target.
    Date: 2026-04-01T13:23:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823999
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Finland
    Victim Industry: Unknown
    Victim Organization: Worbis
    Victim Site: www.worbis.fi
  262. Website defacement of FN Verlag by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the FN Verlag website on April 1, 2026. The defacement targeted a German publishing companys media customer portal section.
    Date: 2026-04-01T13:23:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824002
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Publishing
    Victim Organization: FN Verlag
    Victim Site: www.fnverlag.de
  263. Website defacement of paulmarius.de by Rici144/Ratman team
    Category: Defacement
    Content: The website paulmarius.de was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T13:22:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/824004
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: paulmarius.de
  264. Alleged distribution of multi-company credential combolist targeting major corporations
    Category: Combo List
    Content: Threat actor distributes credential combolist containing 11 million entries allegedly targeting multiple major corporations across various industries including pharmaceutical, financial, technology, and energy sectors. The credentials are being distributed through Telegram channels.
    Date: 2026-04-01T13:14:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70687/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Lam Research, AstraZeneca, LVMH, RTX, Philip Morris, Shell, Wells Fargo, IBM, GE Vernova
    Victim Site: Unknown
  265. Alleged leak of German shopping site credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 335,917 credential pairs allegedly from German shopping websites. The data is being distributed for free via a cloud storage link.
    Date: 2026-04-01T13:13:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70688/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  266. Alleged data breach of Lookbook
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Lookbook. The compromised data reportedly contains 1.2M Users records including User Id, Usernames, Password, Email Address and moreNote: This Organization was previously breached on April 17 2023
    Date: 2026-04-01T13:07:44Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-LOOKBOOK-NU-Fashion-Social-1-2M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: USA
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: lookbook
    Victim Site: lookbook.com
  267. Website defacement of Paradies Pool by Rici144/Ratman team
    Category: Defacement
    Content: The German swimming pool services website paradies-pool.de was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T13:05:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823850
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Recreation/Swimming Pool Services
    Victim Organization: Paradies Pool
    Victim Site: paradies-pool.de
  268. Alleged leak of Polish credential list
    Category: Combo List
    Content: A threat actor shared a credential list containing 5,688 lines of access credentials allegedly targeting Polish entities. The data is being distributed for free download on an underground forum.
    Date: 2026-04-01T13:04:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70686/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Website defacement of Merkle-Shop by Rici144/Ratman team
    Category: Defacement
    Content: German e-commerce website Merkle-Shop was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. This incident represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-01T13:04:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823852
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: E-commerce/Retail
    Victim Organization: Merkle Shop
    Victim Site: merkle-shop.de
  270. Website defacement of pop.de by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of the German domain pop.de, specifically targeting a customer address section of the website on April 1, 2026.
    Date: 2026-04-01T13:04:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823853
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pop.de
  271. Website defacement of project-camper.de by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the project-camper.de website on April 1, 2026. This appears to be a targeted attack against a German domain, with the incident documented on zone-xsec.com mirror.
    Date: 2026-04-01T13:03:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823854
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: www.project-camper.de
  272. Website defacement of Raab Verlag by Rici144/Ratman team
    Category: Defacement
    Content: German publishing company Raab Verlag was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. The defacement targeted a specific media/customer page rather than the main homepage.
    Date: 2026-04-01T13:02:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823855
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Publishing
    Victim Organization: Raab Verlag
    Victim Site: www.raab-verlag.de
  273. Website defacement of Reisebank by Rici144/Ratman team
    Category: Defacement
    Content: Redefacement attack targeting German financial services company Reisebanks website conducted by attacker Rici144 affiliated with Ratman team on April 1, 2026.
    Date: 2026-04-01T13:02:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823856
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Financial Services
    Victim Organization: Reisebank
    Victim Site: www.reisebank.de
  274. Website defacement of Reiss Laboratory Supplies by Rici144/Ratman team
    Category: Defacement
    Content: The German laboratory equipment supplier Reiss Laboratory Supplies was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The defacement targeted a media subdirectory of the companys website.
    Date: 2026-04-01T13:01:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823857
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Laboratory Equipment/Scientific Supplies
    Victim Organization: Reiss Laboratory Supplies
    Victim Site: www.reiss-laborbedarf.de
  275. Website defacement of Rhein-Neckar-Markt by Rici144 (Ratman team)
    Category: Defacement
    Content: The German regional publication Rhein-Neckar-Markt website was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This incident represents a redefacement, indicating the site may have been previously compromised.
    Date: 2026-04-01T13:01:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823858
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Media/Publishing
    Victim Organization: Rhein-Neckar-Markt
    Victim Site: www.rhein-neckar-markt.de
  276. Website defacement of Rettungspfoten animal rescue by Rici144/Ratman team
    Category: Defacement
    Content: The Rettungspfoten animal rescue organization website was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a redefacement of a previously compromised site rather than an initial attack.
    Date: 2026-04-01T13:00:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823859
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Non-profit/Animal Welfare
    Victim Organization: Rettungspfoten
    Victim Site: www.rettungspfoten.de
  277. Website defacement of sogood.de by Rici144/Ratman team
    Category: Defacement
    Content: The website sogood.de was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. This incident represents a redefacement of a previously compromised site.
    Date: 2026-04-01T13:00:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823861
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sogood.de
  278. Website defacement of Stein-Mosaik by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of the German mosaic/stone company Stein-Mosaiks website on April 1st, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-01T12:59:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823862
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Construction/Building Materials
    Victim Organization: Stein-Mosaik
    Victim Site: www.stein-mosaik.de
  279. Website defacement of Stegplatten-Shop by Rici144/Ratman team
    Category: Defacement
    Content: The German e-commerce website Stegplatten-Shop was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The defacement targeted the media directory of the online retailers website.
    Date: 2026-04-01T12:58:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823863
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Retail/E-commerce
    Victim Organization: Stegplatten-Shop
    Victim Site: www.stegplatten-shop.de
  280. Website defacement of Swarco Dambach by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from team Ratman conducted a redefacement of the Swarco Dambach shop website on April 1, 2026. This was identified as a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T12:58:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823865
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Technology/Industrial
    Victim Organization: Swarco Dambach
    Victim Site: www.swarco-dambach-shop.de
  281. Website defacement of Swimea by Rici144/Ratman team
    Category: Defacement
    Content: The website swimea.de was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. This incident appears to be a redefacement of a previously compromised target.
    Date: 2026-04-01T12:57:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823866
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Swimea
    Victim Site: swimea.de
  282. Website defacement of Taschen-bedrucken.de by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement incident targeting German bag printing company taschen-bedrucken.de by attacker Rici144 associated with Ratman team on April 1, 2026. This was identified as a redefacement incident, indicating the site had been previously compromised.
    Date: 2026-04-01T12:57:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823868
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Retail/E-commerce
    Victim Organization: Taschen-bedrucken
    Victim Site: taschen-bedrucken.de
  283. Website defacement of tassenfuzzi.de by Rici144 (Ratman team)
    Category: Defacement
    Content: On April 1, 2026, attacker Rici144 from the Ratman team defaced a subdirectory of the German website tassenfuzzi.de. The defacement targeted a specific media/custom path rather than the main homepage.
    Date: 2026-04-01T12:56:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823869
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Tassenfuzzi
    Victim Site: tassenfuzzi.de
  284. Website defacement of Uhren Versand Herne by Rici144/Ratman team
    Category: Defacement
    Content: German watch retailer Uhren Versand Herne was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T12:56:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823871
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Retail/E-commerce
    Victim Organization: Uhren Versand Herne
    Victim Site: www.uhren-versand-herne.de
  285. Website defacement of Toscana Mainz restaurant by Rici144/Ratman team
    Category: Defacement
    Content: The website of Toscana Mainz, a restaurant in Germany, was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. The defacement targeted a specific media directory rather than the homepage.
    Date: 2026-04-01T12:55:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823872
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Food Service
    Victim Organization: Toscana Mainz
    Victim Site: www.toscana-mainz.de
  286. Website defacement of Tutorial Experts by Rici144/Ratman team
    Category: Defacement
    Content: The German educational website tutorial-experts.de was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. The defacement targeted the media subdirectory of the site.
    Date: 2026-04-01T12:54:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823873
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Education/Training
    Victim Organization: Tutorial Experts
    Victim Site: tutorial-experts.de
  287. Website defacement of Wein Weuste by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team successfully defaced a subdirectory of the German wine company Wein Weustes website on April 1st, 2026. The defacement targeted a specific media/custom directory rather than the main homepage.
    Date: 2026-04-01T12:54:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823874
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Food and Beverage
    Victim Organization: Wein Weuste
    Victim Site: www.wein-weuste.de
  288. Website defacement of xylit-echt-billig.de by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the German e-commerce website xylit-echt-billig.de on April 1, 2026. The defacement targeted the media directory of the xylitol product retailers website.
    Date: 2026-04-01T12:53:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823877
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: E-commerce
    Victim Organization: Xylit Echt Billig
    Victim Site: xylit-echt-billig.de
  289. Website defacement of WSS Berlin by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, affiliated with team Ratman, conducted a redefacement attack against WSS Berlins website on April 1, 2026. This marks a repeat targeting of the same victim organization.
    Date: 2026-04-01T12:53:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823878
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: WSS Berlin
    Victim Site: wss-berlin.de
  290. Website defacement of Equipol by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from team Ratman defaced the Equipol website on April 1, 2026. This was identified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T12:47:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823735
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Equipol
    Victim Site: www.equipol.fr
  291. Website defacement of Ferme Avicole Declerck by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team, specifically attacker Rici144, defaced the website of French poultry farm Ferme Avicole Declerck. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T12:46:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823736
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Agriculture
    Victim Organization: Ferme Avicole Declerck
    Victim Site: www.fermeavicoledeclerck.fr
  292. Website defacement of HelpCard organization by Rici144/Ratman team
    Category: Defacement
    Content: The HelpCard organization website was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. The defacement targeted a specific media directory on the helpcard.org domain.
    Date: 2026-04-01T12:46:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823737
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Non-profit/Charity
    Victim Organization: HelpCard
    Victim Site: helpcard.org
  293. Website defacement of HM Renov26 by Rici144/Ratman team
    Category: Defacement
    Content: French renovation company HM Renov26s website was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. The defacement targeted a specific media directory path on the companys website.
    Date: 2026-04-01T12:45:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823738
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Construction/Renovation
    Victim Organization: HM Renov26
    Victim Site: hmrenov26.fr
  294. Website defacement of joute-et-jeux.fr by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team conducted a redefacement attack against the French entertainment website joute-et-jeux.fr on April 1, 2026. This appears to be a targeted single-site defacement rather than a mass attack.
    Date: 2026-04-01T12:44:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823739
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Entertainment
    Victim Organization: Joute et Jeux
    Victim Site: joute-et-jeux.fr
  295. Website defacement of Kabelis by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the Kabelis website on April 1st, 2026. The defacement targeted a specific media/customer section of the French domain.
    Date: 2026-04-01T12:44:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823740
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Kabelis
    Victim Site: www.kabelis.fr
  296. Website defacement of Le Roi De La Fenetre by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team defaced the French window/construction company Le Roi De La Fenetres website on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T12:43:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823741
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Retail/Construction
    Victim Organization: Le Roi De La Fenetre
    Victim Site: www.leroidelafenetre.fr
  297. Website defacement of Meuble-Promo by Rici144/Ratman team
    Category: Defacement
    Content: The French furniture retailer Meuble-Promo website was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The attack targeted a specific media directory within the site rather than the homepage.
    Date: 2026-04-01T12:43:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823742
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Retail/Furniture
    Victim Organization: Meuble-Promo
    Victim Site: www.meuble-promo.fr
  298. Website defacement of Menzzo by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team defaced the French furniture retailer Menzzos website on April 1, 2026. The defacement targeted a specific media/customer directory rather than the homepage.
    Date: 2026-04-01T12:42:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823743
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Retail/E-commerce
    Victim Organization: Menzzo
    Victim Site: www.menzzo.fr
  299. Website defacement of Motonice by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, defaced the Motonice website on April 1st, 2026. The incident targeted a French motorcycle retailers media directory.
    Date: 2026-04-01T12:42:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823744
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Retail/Automotive
    Victim Organization: Motonice
    Victim Site: motonice.fr
  300. Alleged data leak of Claude
    Category: Data Leak
    Content: ANTHROPIC has confirmed an accidental source code leak affecting its AI coding assistant, Claude Code, caused by a packaging error in an npm release. The issue exposed a large portion of the codebase through a source map file, making it publicly accessible before the affected version was removed. According to the company, the incident was due to human error rather than a security breach, and there is no impact on customer data or credentials. The exposed code has since circulated online, revealing internal features and architecture details of the tool. Anthropic stated it is implementing safeguards to prevent similar incidents and is continuing to monitor the situation.
    Date: 2026-04-01T12:41:51Z
    Network: openweb
    Published URL: https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html
    Screenshots:
    None
    Threat Actors:
    Victim Country: USA
    Victim Industry: Software
    Victim Organization: claude
    Victim Site: claude.ai
  301. Website defacement of NUK by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team defaced a customer address page on the NUK website on April 1, 2026. The incident targeted a specific subdirectory rather than the main site homepage.
    Date: 2026-04-01T12:41:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823745
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: NUK
    Victim Site: www.nuk.fr
  302. Website defacement of paulmarius.fr by Rici144/Ratman team
    Category: Defacement
    Content: The website paulmarius.fr was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-01T12:41:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823747
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: paulmarius.fr
  303. Website defacement of PhotoWeb by Rici144 (Ratman team)
    Category: Defacement
    Content: Rici144 from the Ratman team conducted a redefacement attack against PhotoWeb, a French photography and printing service website. The incident occurred on April 1, 2026, targeting the media/customer section of the site.
    Date: 2026-04-01T12:40:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823748
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Photography/E-commerce
    Victim Organization: PhotoWeb
    Victim Site: www.photoweb.fr
  304. Website defacement of playthis.org by Rici144/Ratman team
    Category: Defacement
    Content: The gaming/entertainment website playthis.org was defaced by attacker Rici144, operating as part of the Ratman team. The defacement occurred on April 1, 2026, targeting the media section of the website.
    Date: 2026-04-01T12:39:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823749
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Gaming/Entertainment
    Victim Organization: PlayThis
    Victim Site: playthis.org
  305. Website defacement of PNI by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the PNI website on April 1, 2026, targeting the customer address section of their media portal.
    Date: 2026-04-01T12:39:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823751
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: PNI
    Victim Site: www.pni.fr
  306. Website defacement of Pro-Living by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the Pro-Living website on April 1st, 2026. This appears to be a single-target defacement incident affecting the French organizations media directory.
    Date: 2026-04-01T12:38:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823752
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Pro-Living
    Victim Site: www.pro-living.fr
  307. Website defacement of Ressorts Sodemann by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from team Ratman conducted a redefacement of the French spring manufacturing company Ressorts Sodemanns website on April 1, 2026. This represents a targeted attack against a single organization rather than a mass defacement campaign.
    Date: 2026-04-01T12:38:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823753
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Manufacturing
    Victim Organization: Ressorts Sodemann
    Victim Site: www.ressorts-sodemann.fr
  308. Website defacement of Reverdy by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced a subdirectory of the Reverdy website on April 1, 2026. The defacement targeted a customer media section of the French organizations website.
    Date: 2026-04-01T12:37:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823754
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Reverdy
    Victim Site: www.reverdy.fr
  309. Website defacement of Secretbox by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, defaced the French website www.secretbox.fr on April 1, 2026. This incident was identified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T12:37:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823755
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Secretbox
    Victim Site: www.secretbox.fr
  310. Website defacement of Tecnosell by Ratman team member Rici144
    Category: Defacement
    Content: French technology company Tecnosell suffered a website defacement attack on April 1, 2026, carried out by attacker Rici144 who is affiliated with the Ratman team. The attack targeted a specific media directory on the companys website rather than the main homepage.
    Date: 2026-04-01T12:36:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823756
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Technology/E-commerce
    Victim Organization: Tecnosell
    Victim Site: www.tecnosell.fr
  311. Website defacement of Topper by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the Topper.fr website on April 1, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T12:35:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823758
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Topper
    Victim Site: www.topper.fr
  312. Website defacement of TotalSport by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced a page on the TotalSport French sports website on April 1st, 2026. This appears to be a targeted single-page defacement rather than a mass attack.
    Date: 2026-04-01T12:35:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823759
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Sports/Recreation
    Victim Organization: TotalSport
    Victim Site: www.totalsport.fr
  313. Website defacement of Vital Agriculture by Rici144/Ratman team
    Category: Defacement
    Content: The French agriculture company Vital Agriculture had their website defaced by attacker Rici144, operating as part of the Ratman team, on April 1, 2026.
    Date: 2026-04-01T12:34:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823761
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Agriculture
    Victim Organization: Vital Agriculture
    Victim Site: www.vital-agriculture.fr
  314. Website defacement of Voilerie Rochard by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against French sail manufacturer Voilerie Rochards website on April 1, 2026. This appears to be a repeat attack against the same target.
    Date: 2026-04-01T12:34:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823762
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Manufacturing
    Victim Organization: Voilerie Rochard
    Victim Site: voilerie-rochard.fr
  315. Alleged distribution of credential combolists targeting major corporations
    Category: Combo List
    Content: Threat actor CODER is distributing a 14 million credential combolist allegedly containing data from major corporations including Home Depot, Coca-Cola, Toyota Motor, and Cisco Systems through Telegram channels.
    Date: 2026-04-01T12:34:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70683/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Home Depot, Coca-Cola, Toyota Motor, Cisco Systems
    Victim Site: Unknown
  316. Website defacement of webstore-securite.fr by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced a French security-related webstore on April 1, 2026. The attack targeted the media section of the website, though specific technical details and motivations remain unknown.
    Date: 2026-04-01T12:33:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823763
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Technology/Security
    Victim Organization: Webstore Securite
    Victim Site: webstore-securite.fr
  317. Website defacement of Zacatrus by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, successfully defaced the French gaming retailer Zacatrus website on April 1, 2026. The defacement targeted a customer-related page on the zacatrus.fr domain.
    Date: 2026-04-01T12:33:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823765
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Retail/Gaming
    Victim Organization: Zacatrus
    Victim Site: zacatrus.fr
  318. Website defacement of yogitri.fr by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced the French website yogitri.fr on April 1st, 2026. The attack targeted a specific media/customer subdirectory of the site.
    Date: 2026-04-01T12:32:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823766
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Yogitri
    Victim Site: yogitri.fr
  319. Alleged sale of Asociación de Institutos de Enseñanza Privada de Argentina database
    Category: Data Breach
    Content: The threat actor claims to be selling the dataset allegedly originating from AIEPA, an Argentine association representing private educational institutions. The dataset contains across multiple sections, including contacts, event registrations, and billing/account data.
    Date: 2026-04-01T12:24:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-423k-Argentina-www-aiepba-org-ar-Personal-contact-and-professional-details-datas
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Argentina
    Victim Industry: Education
    Victim Organization: asociación de institutos de enseñanza privada de argentina (aiepa)
    Victim Site: aiepba.org.ar
  320. Alleged data leak of Stalker.so
    Category: Data Leak
    Content: The threat actor claims to be leaked data from Stalker.so. The compromised data reportedly contains 500K records including User ID, Email Address, Username, Password, Full Name, Phone Number, City, Registration Date, Last Login, Friends Count, Photos Count.
    Date: 2026-04-01T12:21:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-STALKER-SO-Russian-Social-Network-500K-User
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Russia
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: stalker.so
  321. Alleged data breach of St. Joseph County
    Category: Data Breach
    Content: The threat actor claims to have breached over 2 TB of sensitive data from St. Joseph County, including records from the prosecutor’s office, health centers, and police, along with releasing thousands of confidential documents.
    Date: 2026-04-01T12:17:58Z
    Network: openweb
    Published URL: https://handala-hack.tw/st-joseph-county-hacked/
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Government Administration
    Victim Organization: st. joseph county
    Victim Site: sjcindiana.gov
  322. Alleged leak of mixed stealer logs containing credentials
    Category: Combo List
    Content: Threat actor fatetraffic shared a collection of 1,401 mixed stealer logs dated April 1, 2026, made available for free download via file hosting service.
    Date: 2026-04-01T12:13:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70680/
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  323. Alleged leak of email credential combolist via Telegram channel
    Category: Combo List
    Content: Threat actor universal_mail is distributing a credential combolist containing valid email access combinations through a private Telegram channel. The post promotes a mail checker tool and provides access to validated credential hits.
    Date: 2026-04-01T12:12:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70681/
    Screenshots:
    None
    Threat Actors: universal_mail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  324. Alleged data leak of DuelingNetwork
    Category: Data Leak
    Content: The threat actor claims to be leaked data from DuelingNetwork. The compromised data reportedly contains 2.5 million records including user id, Email address, Usernames, Password, Display names, Country and more Note: This organization was previously breached on March 29 2017
    Date: 2026-04-01T12:05:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DUELINGNETWORK-COM-Yu-Gi-Oh-Platform-2-5M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: duelingnetwork
    Victim Site: duelingnetwork.com
  325. Website defacement of lcd-rgb.com by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the LCD RGB website on April 1, 2026. The defacement targeted a customer-related subdirectory of the electronics companys website.
    Date: 2026-04-01T12:04:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823630
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Technology/Electronics
    Victim Organization: LCD RGB
    Victim Site: lcd-rgb.com
  326. Website defacement of Mage Expo by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Mage Expo website on April 1, 2026. The incident targeted a subdirectory of the events/exhibitions companys website.
    Date: 2026-04-01T12:03:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823632
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Events/Exhibitions
    Victim Organization: Mage Expo
    Victim Site: mage-expo.com
  327. Website defacement of MageWorx by Rici144/Ratman team
    Category: Defacement
    Content: MageWorx website was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-01T12:02:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823633
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: MageWorx
    Victim Site: mageworx.com
  328. Website defacement of Nassau Magnet by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Nassau Magnet company website on April 1, 2026. The incident targeted a specific media directory rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-01T12:02:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823636
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Nassau Magnet
    Victim Site: www.nassmagnet.com
  329. Website defacement of North Bay Trading by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the North Bay Trading website on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T12:01:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823637
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Trading/Commerce
    Victim Organization: North Bay Trading
    Victim Site: northbaytrading.com
  330. Website defacement of NYIF Global by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, defaced a media subdirectory of the NYIF Global website on April 1st, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-01T12:01:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823639
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: NYIF Global
    Victim Site: www.nyif-global.com
  331. Website defacement of OlaKrutrim by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team successfully defaced a media section of the OlaKrutrim website on April 1, 2026. This appears to be a targeted single-site defacement rather than a mass attack or redefacement.
    Date: 2026-04-01T12:00:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823641
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: India
    Victim Industry: Technology
    Victim Organization: OlaKrutrim
    Victim Site: olakrutrim.com
  332. Website defacement of peter-polo.com by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of peter-polo.com on April 1, 2026. This appears to be a targeted attack against a specific subdirectory rather than the main homepage.
    Date: 2026-04-01T11:59:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823642
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Peter Polo
    Victim Site: peter-polo.com
  333. Website defacement of Rayher by Rici144/Ratman team
    Category: Defacement
    Content: Rayher arts and crafts retailer website was defaced by attacker Rici144 from the Ratman team on April 1st, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T11:59:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823643
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Germany
    Victim Industry: Retail/Arts and Crafts
    Victim Organization: Rayher
    Victim Site: rayher.com
  334. Website defacement of RTC Cuba by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the RTC Cuba website on April 1, 2026. The defacement targeted a specific media/customer page rather than the homepage.
    Date: 2026-04-01T11:58:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823644
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Cuba
    Victim Industry: Unknown
    Victim Organization: RTC Cuba
    Victim Site: www.rtccuba.com
  335. Website defacement of Sacer Shop by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team member Rici144 conducted a redefacement attack against Sacer Shops e-commerce website on April 1, 2026. This appears to be a targeted defacement of a commercial retail site rather than a mass defacement campaign.
    Date: 2026-04-01T11:57:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823645
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Sacer Shop
    Victim Site: sacer-shop.com
  336. Website defacement of Sacer by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, affiliated with the Ratman team, successfully defaced the Chinese website www.sacer.com.cn on April 1, 2026. This was an isolated defacement incident targeting a specific page within the media section of the site.
    Date: 2026-04-01T11:57:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823646
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Sacer
    Victim Site: www.sacer.com.cn
  337. Website defacement of Scooters Coffee by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team, specifically attacker Rici144, conducted a redefacement attack against Scooters Coffees website on April 1, 2026. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T11:56:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823647
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United States
    Victim Industry: Food and Beverage
    Victim Organization: Scooters Coffee
    Victim Site: www.scooterscoffee.com
  338. Website defacement of Strunz.com by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced the Strunz.com website on April 1, 2026. The defacement targeted a specific media/customer section of the site rather than the homepage.
    Date: 2026-04-01T11:56:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823648
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Strunz
    Victim Site: www.strunz.com
  339. Website defacement of Taurus Legend by Rici144/Ratman team
    Category: Defacement
    Content: Australian website tauruslegend.com.au was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. The defacement targeted a media subdirectory of the site.
    Date: 2026-04-01T11:55:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823650
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Taurus Legend
    Victim Site: tauruslegend.com.au
  340. Website defacement of thebasketbd.com by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement attack conducted by attacker Rici144 affiliated with Ratman team against Bangladeshi sports website thebasketbd.com on April 1, 2026. The attack targeted a specific media directory rather than the homepage.
    Date: 2026-04-01T11:55:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823651
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Bangladesh
    Victim Industry: Sports/Recreation
    Victim Organization: The Basket BD
    Victim Site: thebasketbd.com
  341. Website defacement of Goa Duty Free by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from team Ratman conducted a redefacement of the Goa Duty Free website on April 1, 2026. This appears to be a subsequent attack on a previously compromised retail website.
    Date: 2026-04-01T11:54:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823653
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: India
    Victim Industry: Retail
    Victim Organization: Goa Duty Free
    Victim Site: www.thegoadutyfree.com
  342. Website defacement of TourSpec Golf by Rici144 (Ratman team)
    Category: Defacement
    Content: Rici144 from the Ratman team conducted a redefacement attack against TourSpec Golfs website on April 1, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-01T11:53:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823654
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Sports/Recreation
    Victim Organization: TourSpec Golf
    Victim Site: www.tourspecgolf.com
  343. Website defacement of Treon Store by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement attack against Treon Stores website on April 1, 2026. This was not the first compromise of this target, as indicated by the redefacement classification.
    Date: 2026-04-01T11:53:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823655
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Treon Store
    Victim Site: treonstore.com
  344. Website defacement of TrustedSDK by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement attack targeting TrustedSDKs media section conducted by attacker Rici144 associated with the Ratman team on April 1, 2026.
    Date: 2026-04-01T11:52:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823656
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: TrustedSDK
    Victim Site: www.trustedsdk.com
  345. Website defacement of WaveFutura by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the WaveFutura website on April 1, 2026. This appears to be a repeat attack on the same target, indicating persistent threat actor interest in this organization.
    Date: 2026-04-01T11:52:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823657
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: WaveFutura
    Victim Site: www.wavefutura.com
  346. Website defacement of xinbaian.com.cn by Rici144 (Ratman team)
    Category: Defacement
    Content: Chinese website xinbaian.com.cn was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. This was identified as a redefacement of the target system.
    Date: 2026-04-01T11:51:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823658
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: xinbaian.com.cn
  347. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample of 645 Hotmail credentials on a cybercrime forum as a free download.
    Date: 2026-04-01T11:51:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70678/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  348. Website defacement of zinko.com by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team successfully defaced zinko.com, specifically targeting a customer address page on the website. The defacement occurred on April 1st, 2026 and was documented with a mirror URL for evidence preservation.
    Date: 2026-04-01T11:51:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823659
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Zinko
    Victim Site: zinko.com
  349. Alleged distribution of credential combolist targeting multiple e-commerce platforms
    Category: Combo List
    Content: Threat actor CODER is distributing a credential combolist containing 13 million username:password combinations allegedly valid for major platforms including Walmart, American Express, and Amazon. The credentials are being shared through Telegram channels for free access.
    Date: 2026-04-01T11:51:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70679/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Multiple (Walmart, American Express, Amazon)
    Victim Site: Unknown
  350. Alleged sale of NOS data
    Category: Data Breach
    Content: The threat actor claims to be selling a structured dataset originating from NOS, a major telecommunications provider in Portugal.
    Date: 2026-04-01T11:49:30Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-284k-Portugal-www-nos-pt-Customer-records-with-emails-phone-numbers-addresses
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Portugal
    Victim Industry: Network & Telecommunications
    Victim Organization: nos, sgps s.a
    Victim Site: nos.pt
  351. Alleged data leak of Documents in UAE
    Category: Data Leak
    Content: The group claims to have leaked private documents in the UAE
    Date: 2026-04-01T11:49:11Z
    Network: telegram
    Published URL: https://t.me/c/3816027580/5259
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters part 9
    Victim Country: UAE
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  352. Alleged Data Leak of MPGH.NET
    Category: Data Leak
    Content: The threat actor claims to be leaked data from mpgh.net. The compromised data reportedly contains 2.85 million user records including account credentials and activity data, posing significant risks of credential compromise and user exposure.
    Date: 2026-04-01T11:48:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-MPGH-NET-Multiplayer-Game-Hacking-2-85M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: mpgh.net
  353. Website defacement of labucovineanca.ro by aexdy (Leviathan Perfect Hunter team)
    Category: Defacement
    Content: The Romanian website labucovineanca.ro was defaced by attacker aexdy, associated with the Leviathan Perfect Hunter team, on April 1st, 2026. The defacement targeted a specific file (hx.txt) on the domain.
    Date: 2026-04-01T11:45:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823523
    Screenshots:
    None
    Threat Actors: aexdy, Leviathan Perfect Hunter
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: labucovineanca.ro
  354. RASHTRIYA CYBER SENA targets the website of aspirants.edu.pk
    Category: Defacement
    Content: The group claims to have defaced the website of aspirants.edu.pk .
    Date: 2026-04-01T11:44:15Z
    Network: telegram
    Published URL: https://t.me/teamRcs/194
    Screenshots:
    None
    Threat Actors: RASHTRIYA CYBER SENA
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: aspirants.edu.pk
    Victim Site: aspirants.edu.pk
  355. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor klyne05 shared a combolist containing Hotmail email credentials on CrackingX forum, claiming the data is private, fresh, and verified.
    Date: 2026-04-01T11:41:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70677/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  356. OpsShadowStrike targets the website of Kisor kumar NLP coach & consultant
    Category: Defacement
    Content: The group claims to have defaced the website of Kisor kumar NLP coach & consultant.
    Date: 2026-04-01T11:40:06Z
    Network: telegram
    Published URL: https://t.me/OpsShadowStrike/218
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: India
    Victim Industry: Professional Training
    Victim Organization: nlp coaching academy india
    Victim Site: nlpcoachindia.com
  357. Alleged Data Leak of Avideo Sites User Credentials
    Category: Data Leak
    Content: The threat actor claims to be leaked 50K Avideo Sites User Credentials The compromised reportedly contains email addresses, usernames, and MD5-hashed passwords
    Date: 2026-04-01T11:36:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-avideo-sites-50k
    Screenshots:
    None
    Threat Actors: polrbear
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  358. Alleged leak of UE credential combolist
    Category: Combo List
    Content: Threat actor shared a credential combolist labeled UE COMBO on underground forum. The combolist is password protected and distributed through Telegram channel.
    Date: 2026-04-01T11:32:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70676/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: UE
    Victim Site: Unknown
  359. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 18,000 unique Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-01T11:23:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70675/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  360. Alleged Data Breach of Starbucks Corporation
    Category: Data Breach
    Content: The threat actor claims to have breached Starbucks and exfiltrated approximately 10 GB of sensitive data, including source code and intellectual property.
    Date: 2026-04-01T11:21:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-ShadowByt3-Breaches-StarBucks
    Screenshots:
    None
    Threat Actors: shadowbyt3$
    Victim Country: USA
    Victim Industry: Food & Beverages
    Victim Organization: starbucks corporation
    Victim Site: starbucks.com
  361. Alleged distribution of credential combolists targeting multiple major organizations
    Category: Combo List
    Content: Threat actor CODER is distributing a 7 million record combolist containing credentials allegedly from major organizations including Tesla, Broadcom, Saudi Aramco, Amazon, Alphabet, Google, and Apple. The combolists are being shared through Telegram channels for free distribution.
    Date: 2026-04-01T11:10:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70674/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Tesla, Broadcom, Saudi Aramco, Amazon, Alphabet, Google, Apple
    Victim Site: Unknown
  362. Alleged Data Breach of Starbucks
    Category: Data Breach
    Content: The threat actor claims to be breached 10Gb data from Starbucks. The compromised data reportedly contains source code, proprietary systems, and internal operational technology information.
    Date: 2026-04-01T11:07:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-ShadowByt3-Breaches-StarBucks
    Screenshots:
    None
    Threat Actors: BlackVortex1
    Victim Country: USA
    Victim Industry: Food & Beverages
    Victim Organization: starbucks
    Victim Site: tarbucks.com
  363. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing 5,700 Japanese email accounts with full access credentials on an underground forum.
    Date: 2026-04-01T11:01:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70672/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  364. Alleged leak of German credential combolist
    Category: Combo List
    Content: A credential combolist containing 548,922 lines targeting German users has been made available for download on a cybercriminal forum.
    Date: 2026-04-01T11:01:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70673/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  365. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor FlashCloud2 claims to have private Hotmail valid credentials available on a cracking forum. The post content is hidden behind registration requirements, preventing verification of the scope or distribution method.
    Date: 2026-04-01T10:50:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70671/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  366. Alleged sale of Australian financial services data and cloned payment cards
    Category: Data Breach
    Content: Threat actor offering Australian non-VBV credit cards, cloned ATM cards, payment card dumps with PINs, and money transfer services via Telegram contact.
    Date: 2026-04-01T10:40:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70670/
    Screenshots:
    None
    Threat Actors: crdtrox
    Victim Country: Australia
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  367. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a combolist containing 5 million Hotmail credentials across multiple domains (hotmail.com, hotmail.fr, hotmail.es) through Telegram channels. The credentials are being shared for free through dedicated Telegram groups.
    Date: 2026-04-01T10:31:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70668/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  368. Alleged Iranian Cyberattack Threat Targeting Israel
    Category: Cyber Attack
    Content: A recent post by the group claims that Iranian-linked actors have infiltrated and hacked at least 50 security cameras and 60 Israeli companies.
    Date: 2026-04-01T10:26:11Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20885
    Screenshots:
    None
    Threat Actors:
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  369. Alleged sale of financial card data with PINs from multiple countries
    Category: Combo List
    Content: Threat actor is selling freshly skimmed credit card dumps with PINs from multiple countries including US, UK, Canada, Australia, and EU at prices ranging from $60-$80 per card. The actor claims the data includes both track 1 and track 2 data and is obtained firsthand.
    Date: 2026-04-01T10:22:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70665/
    Screenshots:
    None
    Threat Actors: crdtrox
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  370. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 22,000 German email credentials with full mail access on a cybercrime forum.
    Date: 2026-04-01T10:21:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70666/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  371. Alleged Sale of Kuwaiti Ministry of Higher Education Data
    Category: Data Leak
    Content: The threat actor claims to be selling a portion of data allegedly belonging to Kuwaiti citizens associated with the Ministry of Higher Education. The dataset contains sensitive personal and academic information.
    Date: 2026-04-01T10:21:33Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Kuwaiti-Ministry-of-Higher-Education-data-for-sale
    Screenshots:
    None
    Threat Actors: null313
    Victim Country: Kuwait
    Victim Industry: Education
    Victim Organization: ministry of higher education
    Victim Site: mohe.edu.kw
  372. Alleged leak of Gmail credentials
    Category: Combo List
    Content: Threat actor D4rkNetHub claims to have leaked over 100,000 Gmail credentials on a cybercrime forum. The post appears to offer access to a credential list containing Gmail accounts.
    Date: 2026-04-01T10:21:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70667/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  373. Website defacement of TIA by Aptisme from Leviathan Perfect Hunter team
    Category: Defacement
    Content: The attacker Aptisme, affiliated with the Leviathan Perfect Hunter team, successfully defaced the TIA organizations website on April 1, 2026. The attack targeted a specific page on the Indian domain tia.org.in.
    Date: 2026-04-01T10:14:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823505
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: TIA
    Victim Site: tia.org.in
  374. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,596 Hotmail email and password combinations on a cybercriminal forum. The credentials are described as goods suggesting they are valid working accounts.
    Date: 2026-04-01T10:11:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70664/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  375. Website defacement of Global Springs by Rici144/Ratman team
    Category: Defacement
    Content: Portuguese manufacturing company Global Springs was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T10:02:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823474
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Portugal
    Victim Industry: Manufacturing
    Victim Organization: Global Springs
    Victim Site: www.global-springs.pt
  376. Website defacement of Jomafe by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the Portuguese website www.jomafe.pt on April 1, 2026. This represents a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-01T10:02:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823477
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Jomafe
    Victim Site: www.jomafe.pt
  377. Website defacement of Infantile Moveis by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian furniture retailer Infantile Moveis suffered a website defacement attack by threat actor Rici144, associated with the Ratman team, on April 1, 2026.
    Date: 2026-04-01T10:01:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823478
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Retail/Furniture
    Victim Organization: Infantile Moveis
    Victim Site: www.infantilemoveis.com.br
  378. Website defacement of Lasso by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against the Brazilian website www.lasso.com.br on April 1, 2026. This was identified as a redefacement incident, indicating the site had been previously compromised.
    Date: 2026-04-01T10:01:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823479
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Lasso
    Victim Site: www.lasso.com.br
  379. Website defacement of Hunter Force Suplementos by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement attack against Hunter Force Suplementos, a supplements company website. The incident occurred on April 1, 2026 and represents a repeated targeting of the same victim.
    Date: 2026-04-01T10:00:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823480
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Health and Wellness/Supplements
    Victim Organization: Hunter Force Suplementos
    Victim Site: www.hunterforcesuplementos.com
  380. Website defacement of Maniaweb.com.br by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian website www.maniaweb.com.br was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T09:59:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823482
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Maniaweb
    Victim Site: www.maniaweb.com.br
  381. Website defacement of Maple Bear educational platform by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team member Rici144 defaced a subdirectory of the Maple Bear educational store website in Brazil on April 1, 2026. This was an isolated defacement incident targeting the educational services platform.
    Date: 2026-04-01T09:59:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823483
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Education
    Victim Organization: Maple Bear
    Victim Site: www.maplebearstore.com.br
  382. Website defacement of Menzzo by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, successfully defaced the Menzzo Portugal website on April 1st, 2026. The attack targeted a specific media/customer directory on the Portuguese retail companys website.
    Date: 2026-04-01T09:58:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823484
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Portugal
    Victim Industry: Retail/E-commerce
    Victim Organization: Menzzo
    Victim Site: www.menzzo.pt
  383. Website defacement of meucabelonatural.com.br by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian hair care website meucabelonatural.com.br was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-01T09:58:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823485
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Beauty/Personal Care
    Victim Organization: Meu Cabelo Natural
    Victim Site: meucabelonatural.com.br
  384. Website redefacement of petinelimais.com.br by Rici144/Ratman team
    Category: Defacement
    Content: The threat actor Rici144 from the Ratman team conducted a redefacement attack against the Brazilian website petinelimais.com.br on April 1st, 2026. This represents a repeat attack on the same target, indicating persistent unauthorized access to the website.
    Date: 2026-04-01T09:57:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823489
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: petinelimais.com.br
  385. Website defacement of Phebo by Rici144 (Ratman team)
    Category: Defacement
    Content: Brazilian cosmetics and fragrance company Phebo suffered a website defacement attack by threat actor Rici144 from the Ratman team on April 1, 2026.
    Date: 2026-04-01T09:57:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823490
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Retail/Consumer Goods
    Victim Organization: Phebo
    Victim Site: www.phebo.com.br
  386. Website defacement of pequenosecuriosos.com.br by Rici144 (Ratman team)
    Category: Defacement
    Content: The Brazilian educational website pequenosecuriosos.com.br was defaced by attacker Rici144, operating as part of the Ratman team, on April 1, 2026.
    Date: 2026-04-01T09:56:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823492
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Education
    Victim Organization: Pequenos Ecuriosos
    Victim Site: pequenosecuriosos.com.br
  387. Website defacement of RDO Sol by Rici144 (Ratman team)
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team successfully defaced a specific page on the RDO Sol website on April 1, 2026. This was a targeted single-page defacement rather than a mass or home page attack.
    Date: 2026-04-01T09:56:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823494
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: RDO Sol
    Victim Site: www.rdosol.com.br
  388. Website defacement of PowerRun Shop by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian retail website PowerRun Shop was defaced by attacker Rici144 from the Ratman team on April 1, 2026. The defacement targeted a media directory on the e-commerce platform.
    Date: 2026-04-01T09:55:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823495
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Retail/E-commerce
    Victim Organization: PowerRun Shop
    Victim Site: www.powerrunshop.com.br
  389. Website defacement of riodejas.com.br by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian website riodejas.com.br was defaced by attacker Rici144 affiliated with the Ratman team on April 1, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-01T09:54:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823496
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: riodejas.com.br
  390. Website defacement of Seven Auto Store by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian automotive retailer Seven Auto Store was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This incident represents a redefacement of the target website.
    Date: 2026-04-01T09:54:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823498
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Automotive
    Victim Organization: Seven Auto Store
    Victim Site: www.sevenautostore.com.br
  391. Website defacement of Brazilian e-commerce site by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian e-commerce website www.umsenhorproduto.com.br was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This was identified as a redefacement of a previously compromised site.
    Date: 2026-04-01T09:53:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823499
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: E-commerce
    Victim Organization: Um Senhor Produto
    Victim Site: www.umsenhorproduto.com.br
  392. Website defacement of Viallure by Rici144 (Ratman team)
    Category: Defacement
    Content: Brazilian website www.viallure.com.br was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This incident represents a redefacement of a previously compromised site.
    Date: 2026-04-01T09:53:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823500
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Viallure
    Victim Site: www.viallure.com.br
  393. Website defacement of Vivaraise by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced the Portuguese website www.vivaraise.pt on April 1, 2026. The incident targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-01T09:52:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823501
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Vivaraise
    Victim Site: www.vivaraise.pt
  394. Alleged leak of Yahoo, Outlook, and Docomo credentials
    Category: Combo List
    Content: Threat actor CODER allegedly leaked a combolist containing 6 million credentials from Yahoo, Outlook, and Docomo Japan email services. The credentials are being distributed for free through Telegram channels.
    Date: 2026-04-01T09:52:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70662/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo, Outlook, Docomo
    Victim Site: yahoo.com, outlook.com, docomo.ne.jp
  395. Alleged Cyberattack threat targeting Batelco
    Category: Cyber Attack
    Content: A recent post by the group claims that they are targeting Batelco
    Date: 2026-04-01T09:44:53Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20886
    Screenshots:
    None
    Threat Actors:
    Victim Country: Bahrain
    Victim Industry: Network & Telecommunications
    Victim Organization: batelco
    Victim Site: Unknown
  396. Alleged Cyberattack threat targeting Starlink Infrastructure
    Category: Cyber Attack
    Content: Iran Signals Intent to Target Starlink Infrastructure in the Region.
    Date: 2026-04-01T09:34:45Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20884
    Screenshots:
    None
    Threat Actors:
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  397. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor distributing fresh Hotmail credential lists containing 1,500 records via Telegram channel and file sharing platform. Claims to add new credential lists daily with latest and relevant data.
    Date: 2026-04-01T08:53:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70659/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  398. Alleged leak of German social media and e-commerce credentials
    Category: Combo List
    Content: Threat actor shared a credential list containing 671,324 entries allegedly targeting German social media and shopping platforms. The data is distributed via a Mega.nz download link.
    Date: 2026-04-01T08:53:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70660/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  399. ./RAZOR targets the website of Sage International Visas & Migration
    Category: Defacement
    Content: The group claims to have defaced the website of Sage International Visas & Migration
    Date: 2026-04-01T08:44:54Z
    Network: telegram
    Published URL: https://t.me/IndoHaxSec3/81
    Screenshots:
    None
    Threat Actors: ./RAZOR
    Victim Country: Nepal
    Victim Industry: Education
    Victim Organization: sage international visas & migration
    Victim Site: sage.edu.np
  400. Alleged data breach of Cisco Systems, Inc.
    Category: Data Breach
    Content: The threat actor claims to have breached the Cisco Systems, Inc. database. The Compromised data includes over 3 million records from Salesforce containing PII, along with GitHub repositories, AWS storage buckets, and other internal corporate data affected across UNC6040, Salesforce Aura, and AWS account breaches.
    Date: 2026-04-01T08:17:21Z
    Network: tor
    Published URL: http://shnyhntww34phqoa6dcgnvps2yu7dlwzmy5lkvejwjdo6z7bmgshzayd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: cisco systems, inc.
    Victim Site: cisco.com
  401. Alleged Data Breach of Cisco Systems, Inc
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Cisco Systems, the dataset contains personally identifiable information (PII), corporate data stored in AWS S3 buckets, and internal development or operational data from repositories.
    Date: 2026-04-01T08:13:48Z
    Network: tor
    Published URL: http://shnyhntww34phqoa6dcgnvps2yu7dlwzmy5lkvejwjdo6z7bmgshzayd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: USA
    Victim Industry: Computer Networking
    Victim Organization: cisco systems, inc.
    Victim Site: cisco.com
  402. Alleged Data Breach of AIRBUS
    Category: Data Breach
    Content: Threat actor claims to be leaking Airbus Artifactory/DevOps data, allegedly totaling 16GB (compressed) with over 1,200 directories and 6,200 files, and shared a download link for access.
    Date: 2026-04-01T08:10:31Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/279636/
    Screenshots:
    None
    Threat Actors: AckLine
    Victim Country: France
    Victim Industry: Aviation & Aerospace
    Victim Organization: airbus
    Victim Site: airbus.com
  403. Mr. BDKR28 targets the website of Anchor Consultants UAE
    Category: Defacement
    Content: The group claims to have defaced the website of Anchor Consultants UAE.
    Date: 2026-04-01T07:57:17Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41656149
    Screenshots:
    None
    Threat Actors: Mr. BDKR28
    Victim Country: UAE
    Victim Industry: Financial Services
    Victim Organization: anchor consultants uae
    Victim Site: anchorconsultants.ae
  404. Mass defacement targeting Indonesian corporate websites by maw3six
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement campaign targeting Indonesian websites including ascorp.co.id on April 1, 2026. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-01T07:50:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248201
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ascorp.co.id
  405. Alleged data breach of Hallmark Cards
    Category: Data Breach
    Content: The threat actor claims to have breached the Hallmark Cards database. The compromised data includes over 7.9 million records from Salesforce, containing personally identifiable information (PII) and internal corporate data.
    Date: 2026-04-01T07:49:21Z
    Network: tor
    Published URL: http://shnyhntww34phqoa6dcgnvps2yu7dlwzmy5lkvejwjdo6z7bmgshzayd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: hallmark cards
    Victim Site: hallmark.com
  406. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor BoogyBlue shared a free Hotmail credential combolist described as FRESH UHQ PRIVATE through Pasteview and Telegram cloud storage links.
    Date: 2026-04-01T07:29:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70656/
    Screenshots:
    None
    Threat Actors: BoogyBlue
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  407. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A forum user shared a combolist containing 18,000 Hotmail email and password combinations. The post content is restricted to registered forum members only.
    Date: 2026-04-01T07:29:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70658/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  408. Alleged sale of cryptocurrency exchange user data affecting multiple platforms
    Category: Data Breach
    Content: Threat actor claims to be selling user data from multiple major cryptocurrency exchanges including Robinhood, Ledger, Binance USA, Binance UK, KuCoin, Bitget, and Coinbase. The actor provides sample data links and contact information for potential buyers.
    Date: 2026-04-01T07:29:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70657/
    Screenshots:
    None
    Threat Actors: Cypher_leads
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Multiple Cryptocurrency Exchanges
    Victim Site: Unknown
  409. Alleged data breach of Judicial Branch of Mendoza
    Category: Data Breach
    Content: The threat actor claims to have breached 478,000 of data from Judicial Branch of Mendoza. The compromised data includes contacts, judicial roles, and case interactions.
    Date: 2026-04-01T06:53:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-478k-Argentina-https-www-jus-mendoza-gov-ar-National-ID-personal-details-cont
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Argentina
    Victim Industry: Legal Services
    Victim Organization: judicial branch of mendoza
    Victim Site: jus.mendoza.gov.ar
  410. Alleged data leak of Mission Local
    Category: Data Leak
    Content: The threat actor claims to have leaked the database of Mission locale de Paris, the compromised dataset include name, age and etc.Threat actor claims to have leaked data of mission local from France. The compromised data reportedly includes name, age, email, phone numbers and etc.
    Date: 2026-04-01T06:43:20Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Mission-Local-506K-FR
    Screenshots:
    None
    Threat Actors: suxsuxsux
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  411. Alleged data leak of Poder Judicial de la Provincia de Mendoza
    Category: Data Leak
    Content: The threat actor claims to have leaked the database of Poder Judicial de la Provincia de Mendoza, the compromised dataset include organizations operations, including Contacts, Judicial Roles, Case Interactions.
    Date: 2026-04-01T06:41:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-478k-Argentina-https-www-jus-mendoza-gov-ar-National-ID-personal-details-cont
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Argentina
    Victim Industry: Government Administration
    Victim Organization: poder judicial de la provincia de mendoza
    Victim Site: jus.mendoza.gov.ar
  412. Alleged leak of educational institution credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing 120,777 lines targeting social media, shopping, and educational platforms. The data is being distributed for free via a file sharing service.
    Date: 2026-04-01T06:36:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70655/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  413. Alleged Android malware tool for financial fraud
    Category: Combo List
    Content: Threat actor promotes Android hacking tool claiming ability to remotely control victim devices and extract money. Contact information provided via Telegram and other messaging platforms.
    Date: 2026-04-01T06:27:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70653/
    Screenshots:
    None
    Threat Actors: xibulipali
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  414. phr099 8484 targets the website of Bonyad Hami Peyman
    Category: Defacement
    Content: The threat actor claims to have defaced the website of Bonyad Hami Peyman.
    Date: 2026-04-01T06:05:28Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41656676
    Screenshots:
    None
    Threat Actors: phr099 8484
    Victim Country: Iran
    Victim Industry: Software Development
    Victim Organization: bonyad hami peyman
    Victim Site: bhamipeyman.ir
  415. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 18,000 Hotmail email and password combinations on a cybercriminal forum. The credentials are described as unique combinations potentially usable for account takeover attacks.
    Date: 2026-04-01T05:48:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70651/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  416. Alleged leak of credential combolist containing 35 million records
    Category: Combo List
    Content: A threat actor named Daxus has made available a combolist containing 35.05 million URL:LOG:PASS format credentials through their website and Telegram channel. The data is being distributed as a free download rather than being sold.
    Date: 2026-04-01T05:28:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70648/
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  417. Alleged leak of phone number and password combinations
    Category: Combo List
    Content: A forum post advertising high-quality private credential lists containing phone numbers and passwords. The post appears to be offering access to phone number and password combinations without explicit mention of pricing or sale terms.
    Date: 2026-04-01T05:27:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70649/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  418. Alleged leak of WordPress credential lists
    Category: Combo List
    Content: A threat actor shared WordPress credential lists in URL:LOGIN:PASS format on a cybercriminal forum. No post content was available to determine the scope or source of the credentials.
    Date: 2026-04-01T05:27:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70650/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  419. Alleged distribution of European and US credential combolists
    Category: Combo List
    Content: Threat actor gsmfix claims to distribute high quality credential combolists containing European and US user accounts. The post advertises the credentials as 100% valid but provides no specific details about victim organizations or record counts.
    Date: 2026-04-01T05:15:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70647/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  420. Alleged distribution of USA and Europe credential combolist
    Category: Combo List
    Content: Threat actor gsmfix is distributing an exclusive combolist containing credentials from USA and Europe regions on CrackingX forum.
    Date: 2026-04-01T04:52:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70646/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  421. Website defacement of quatreau.cn by Alpha wolf team member XYZ
    Category: Defacement
    Content: The Alpha wolf team, specifically member XYZ, successfully defaced the quatreau.cn website on April 1, 2026. This represents a redefacement of the target site, indicating the victim had previously been compromised by the same or different threat actors.
    Date: 2026-04-01T04:41:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823389
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: quatreau.cn
  422. Website defacement of Bajatrend e-commerce site by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf hacking team, with member XYZ, defaced the Bajatrend e-commerce website on April 1, 2026. The attack targeted a Czech Republic-based online shopping platform running on a Linux server.
    Date: 2026-04-01T04:40:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248197
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Czech Republic
    Victim Industry: E-commerce
    Victim Organization: Bajatrend
    Victim Site: eshop.bajatrend.cz
  423. Website defacement of eng.dracaena.cn by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, with attacker XYZ, successfully defaced the English version of the Dracaena website on April 1st, 2026. The target server was running on a Linux operating system and the incident has been archived for reference.
    Date: 2026-04-01T04:40:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248198
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Dracaena
    Victim Site: eng.dracaena.cn
  424. Website defacement of quatreau.cn by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker from Alpha wolf team successfully defaced the quatreau.cn website on April 1st, 2026. The targeted site was running on a Linux operating system.
    Date: 2026-04-01T04:40:01Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248199
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: quatreau.cn
  425. Alleged leak of credential combolist in URL:LOGIN:PASS format
    Category: Combo List
    Content: A threat actor shared a high-quality private combolist containing credentials in URL:LOGIN:PASS format on a cybercriminal forum.
    Date: 2026-04-01T04:39:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70645/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  426. Mass defacement targeting media websites by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement campaign targeting multiple websites, including the Media News Online platform. This was identified as part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-01T04:39:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248200
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Media/News
    Victim Organization: Media News Online
    Victim Site: 2-dec.medianewsonline.com
  427. Alleged leak of Yahoo credential combolist targeting crypto users
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.5 million Yahoo credentials specifically targeting cryptocurrency users. The data was made available as a free download via a cloud storage link.
    Date: 2026-04-01T04:26:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70644/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  428. Alleged unauthorized access to Vessale
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Vessale.
    Date: 2026-04-01T04:06:52Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1399
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: USA
    Victim Industry: E-commerce & Online Stores
    Victim Organization: vessale
    Victim Site: vessale.com
  429. OpsShadowStrike targete the website of Metaevent
    Category: Defacement
    Content: The group claims to have defaced the website of Metaevent.
    Date: 2026-04-01T03:44:03Z
    Network: telegram
    Published URL: https://t.me/OpsShadowStrike/217
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: India
    Victim Industry: Events Services
    Victim Organization: metaevent
    Victim Site: metaevent.in
  430. Alleged data leak of Spanish famous people
    Category: Data Leak
    Content: Threat actor claims to have leaked data of famous peoples from Spain. The compromised data reportedly includes emails and phone numbers of sanchezcastejon, thegrefg, kiddkeo, 6n etc.
    Date: 2026-04-01T03:30:01Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Email-Phone-Famous-People-From-Spain-Leak
    Screenshots:
    None
    Threat Actors: catwoman
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  431. Alleged data breach of Bangkok Bank
    Category: Data Breach
    Content: Threat actor claims to have breached customer data from Bangkok Bank. The compromised dataset reportedly contains approximately 1,400,000 unique records, including name, surname, country code, mobile number, customer type, and bank card type.
    Date: 2026-04-01T03:23:08Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Bangkok-Bank-customers-in-Thailand-1400000
    Screenshots:
    None
    Threat Actors: dataPenetrationA
    Victim Country: Thailand
    Victim Industry: Financial Services
    Victim Organization: bangkok bank
    Victim Site: bangkokbank.com
  432. DEFACER INDONESIAN TEAM targets the website of Karya Keeper
    Category: Defacement
    Content: The group claims to have defaced the website of Karya Keeper.
    Date: 2026-04-01T03:19:10Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/1398
    Screenshots:
    None
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: India
    Victim Industry: Software Development
    Victim Organization: karya keeper
    Victim Site: dev.karyakeeper.com/hacked-by-mr-yos
  433. Mass defacement campaign by Zod targeting premium pool table retailer
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting premiumpooltableoutlet.com, a retail website selling pool tables. This incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-01T03:10:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248196
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Premium Pool Table Outlet
    Victim Site: premiumpooltableoutlet.com
  434. Alleged leak of FateTraffic credentials
    Category: Combo List
    Content: A threat actor shared a 813.28 MB credential list allegedly containing FateTraffic user data on a cybercrime forum.
    Date: 2026-04-01T03:04:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70643/
    Screenshots:
    None
    Threat Actors: blacksatan666
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: FateTraffic
    Victim Site: Unknown
  435. Alleged data leak of Job&Talent
    Category: Data Leak
    Content: The threat actor claims to have leaked a 2,600,000 users of records from Job&Talent, compromised data includes user ID, email address, username, password (bcrypt), full name, account type (homeowner/professional), company name, phone number, address, city, state, ZIP code, country, professional category, years in business, project photos count.
    Date: 2026-04-01T02:57:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-JOBANDTALENT-COM-Job-Platform-2-6M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Spain
    Victim Industry: Software Development
    Victim Organization: job&talent
    Victim Site: jobandtalent.com
  436. Alleged leak of Hotmail credentials on cybercriminal forum
    Category: Combo List
    Content: A threat actor is allegedly distributing a list of 42,000 Hotmail credentials on a cybercriminal forum. The post indicates the credentials are valid and sourced from forum breaches.
    Date: 2026-04-01T02:27:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70642/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  437. Alleged data leak of Houzz
    Category: Data Leak
    Content: The threat actor claims to have leaked a 3,200,000 users of records from Houzz, compromised data includes user ID, email address, username, password (bcrypt), full name, account type (homeowner/professional), company name, phone number, address, city, state, ZIP code, country, professional category, years in business, project photos count.
    Date: 2026-04-01T02:21:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-HOUZZ-COM-Home-Design-Platform-3-2M-Users
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: houzz
    Victim Site: houzz.com
  438. Alleged data leak of Russian job seekers
    Category: Data Leak
    Content: Threat actor claims to have leaked data of job seekers from Russia. The compromised data reportedly includes full name, phone number, email address, region, start date, salary, job type, job title, department, birthday, activities, education (university), work location, major, occupation, language proficiency, drivers license, skills, previous work experience.
    Date: 2026-04-01T02:20:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-complete-resumes-of-Russian-job-seekers
    Screenshots:
    None
    Threat Actors: XiaoSaoBi
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  439. Alleged leak of educational institution credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing 197,445 entries allegedly targeting social media, shopping, and educational (.edu) platforms. The data was made available as a free download via a Mega file sharing link.
    Date: 2026-04-01T02:16:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70640/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  440. Website defacement of topcordlesstools.com by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The attacker tirz4sec from team jatengblekhet successfully defaced the WordPress content directory of topcordlesstools.com on April 1, 2026. This appears to be a single-target defacement incident affecting an e-commerce website specializing in cordless tools.
    Date: 2026-04-01T02:15:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823386
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Top Cordless Tools
    Victim Site: topcordlesstools.com
  441. Website defacement of Nina Bijoux by Rici144/Ratman team
    Category: Defacement
    Content: Brazilian jewelry retailer Nina Bijoux was defaced on April 1, 2026 by attacker Rici144 from the Ratman team. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-01T02:03:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823345
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Jewelry/Retail
    Victim Organization: Nina Bijoux
    Victim Site: www.ninabijoux.com.br
  442. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,200 Hotmail email credentials, claiming they are valid and private. The credentials are being distributed for free via MediaFire download link.
    Date: 2026-04-01T02:03:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70639/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  443. Website defacement of NUK.pt by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144, associated with the Ratman team, successfully defaced a page on the NUK.pt website on April 1st, 2026. The defacement targeted a specific customer address page rather than the main homepage.
    Date: 2026-04-01T02:03:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823346
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: NUK
    Victim Site: www.nuk.pt
  444. Website defacement of Officine Tessili by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the Italian textile company Officine Tessilis website on April 1, 2026. This represents a repeated attack on the same target rather than an initial compromise.
    Date: 2026-04-01T02:02:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823348
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Italy
    Victim Industry: Textile Manufacturing
    Victim Organization: Officine Tessili
    Victim Site: www.officinetessili.com
  445. Website defacement of oscarbarbieri.com by Ratman team member Rici144
    Category: Defacement
    Content: The Ratman team, through member Rici144, successfully defaced a subdirectory of oscarbarbieri.com on April 1st, 2026. This appears to be a targeted single-site defacement rather than part of a broader campaign.
    Date: 2026-04-01T02:02:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823351
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Oscar Barbieri
    Victim Site: oscarbarbieri.com
  446. Website defacement of Papadopoulos company by Rici144/Ratman team
    Category: Defacement
    Content: The Ratman team, specifically attacker Rici144, conducted a redefacement of the Greek Papadopoulos company website on April 1, 2026. This represents a repeat targeting of the same victim organization.
    Date: 2026-04-01T02:01:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823353
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Greece
    Victim Industry: Unknown
    Victim Organization: Papadopoulos
    Victim Site: www.papadopoulos.com.gr
  447. Website defacement of Peças Bitts by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144, affiliated with the Ratman team, successfully defaced the Brazilian automotive parts company Peças Bitts website on April 1, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-01T02:00:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823354
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Brazil
    Victim Industry: Automotive/Parts
    Victim Organization: Peças Bitts
    Victim Site: www.pecasbitts.com.br
  448. Website defacement of Peple Optics by Rici144/Ratman team
    Category: Defacement
    Content: The website pepleroptics.com was defaced by attacker Rici144 from the Ratman team on April 1, 2026. This was identified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T02:00:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823355
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Optics/Technology
    Victim Organization: Peple Optics
    Victim Site: pepleroptics.com
  449. Website defacement of PetStoreNow by Rici144 (Ratman team)
    Category: Defacement
    Content: Threat actor Rici144, associated with the Ratman team, successfully defaced the PetStoreNow website on April 1, 2026. The attack targeted a media directory on the pet retail companys website.
    Date: 2026-04-01T01:59:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823356
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Retail/Pet Services
    Victim Organization: PetStoreNow
    Victim Site: petstorenow.com
  450. Website defacement of poly-lumber furniture company by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144, associated with the Ratman team, defaced the website of a poly lumber furniture company on April 1, 2026. The incident was archived on zone-xsec mirror platform.
    Date: 2026-04-01T01:59:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823357
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Poly Lumber Furniture
    Victim Site: www.poly-lumber-furniture.com
  451. Website defacement of posic.com by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the posic.com website on April 1, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T01:58:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823358
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Posic
    Victim Site: posic.com
  452. Website defacement of QuickHeal by Rici144/Ratman team
    Category: Defacement
    Content: The cybersecurity company QuickHeals media subdirectory was defaced by attacker Rici144, affiliated with the Ratman team, on April 1st, 2026. The defacement targeted a specific custom media page rather than the main homepage.
    Date: 2026-04-01T01:58:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823359
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: India
    Victim Industry: Cybersecurity
    Victim Organization: QuickHeal
    Victim Site: www.quickheal.com
  453. Website defacement of Reell World by Rici144 (Ratman team)
    Category: Defacement
    Content: The website www.reellworld.com was defaced by attacker Rici144, affiliated with the Ratman team, on April 1, 2026. This was an isolated defacement targeting a specific page on the victims media directory.
    Date: 2026-04-01T01:57:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823361
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Reell World
    Victim Site: www.reellworld.com
  454. Website defacement of Rodo by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team conducted a redefacement of the Argentine website www.rodo.com.ar on April 1, 2026. This represents a repeat compromise of the same target.
    Date: 2026-04-01T01:57:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823363
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Rodo
    Victim Site: www.rodo.com.ar
  455. Website defacement of Scout Lighting ATX by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement attack conducted by attacker Rici144 from the Ratman team targeting Scout Lighting ATXs website on April 1, 2026. The attack compromised the media section of the companys website.
    Date: 2026-04-01T01:56:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823364
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United States
    Victim Industry: Commercial Services
    Victim Organization: Scout Lighting ATX
    Victim Site: scoutlightingatx.com
  456. Website defacement of Selfoil by Rici144 (Ratman team)
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced the Selfoil company website on April 1, 2026. This incident was identified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-01T01:55:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823365
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Oil & Gas
    Victim Organization: Selfoil
    Victim Site: selfoil.com
  457. Website defacement of Solar Electric Supply by Rici144/Ratman team
    Category: Defacement
    Content: Threat actor Rici144 from the Ratman team conducted a redefacement attack against Solar Electric Supplys website on April 1, 2026. This represents a repeat compromise of the solar energy companys web infrastructure.
    Date: 2026-04-01T01:55:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823366
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: United States
    Victim Industry: Energy/Solar
    Victim Organization: Solar Electric Supply
    Victim Site: www.solarelectricsupply.com
  458. Website defacement of Tailoy by Rici144/Ratman team
    Category: Defacement
    Content: Website defacement incident targeting Tailoys Peruvian website conducted by attacker Rici144 associated with the Ratman team on April 1, 2026.
    Date: 2026-04-01T01:54:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823367
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Peru
    Victim Industry: Unknown
    Victim Organization: Tailoy
    Victim Site: www.tailoy.com.pe
  459. Website defacement of Teamsport-ID by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement attack against the Indonesian sports website teamsport-id.com. This appears to be a repeat attack on the same target, indicating persistent targeting of the organizations web infrastructure.
    Date: 2026-04-01T01:54:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823368
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Indonesia
    Victim Industry: Sports/Recreation
    Victim Organization: Teamsport-ID
    Victim Site: www.teamsport-id.com
  460. Website defacement of The Berkel World by Rici144/Ratman team
    Category: Defacement
    Content: The Berkel World website was defaced by attacker Rici144, associated with the Ratman team, on April 1, 2026. The defacement targeted a specific media page rather than the homepage.
    Date: 2026-04-01T01:53:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823369
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: The Berkel World
    Victim Site: theberkelworld.com
  461. Website defacement of Thomsun Music House by Rici144/Ratman team
    Category: Defacement
    Content: Attacker Rici144 from the Ratman team defaced a subdirectory of Thomsun Music Houses website on April 1, 2026. The incident appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-01T01:53:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823370
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Music/Entertainment
    Victim Organization: Thomsun Music House
    Victim Site: www.thomsunmusichouse.com
  462. Website defacement of threadsme.com by Rici144/Ratman team
    Category: Defacement
    Content: The attacker Rici144 from the Ratman team conducted a redefacement of the ThreadsMe website on April 1, 2026. This represents a subsequent attack on a previously compromised target.
    Date: 2026-04-01T01:52:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823371
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: ThreadsMe
    Victim Site: threadsme.com
  463. Website defacement of uniters.com by Rici144 (Ratman team)
    Category: Defacement
    Content: The website uniters.com was defaced by attacker Rici144, who is affiliated with the Ratman team. The defacement occurred on April 1, 2026 and targeted a specific media/customer page rather than the homepage.
    Date: 2026-04-01T01:51:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823372
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Uniters
    Victim Site: uniters.com
  464. Website defacement of yogitri.com by Rici144/Ratman team
    Category: Defacement
    Content: The website yogitri.com was defaced by attacker Rici144 associated with the Ratman team on April 1, 2026. The defacement targeted a specific media/customer subdirectory rather than the main homepage.
    Date: 2026-04-01T01:51:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823373
    Screenshots:
    None
    Threat Actors: Rici144, Ratman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Yogitri
    Victim Site: yogitri.com
  465. Website defacement of asesmensmaplos.com by tirz4sec/jatengblekhet
    Category: Defacement
    Content: Website defacement incident targeting asesmensmaplos.com conducted by attacker tirz4sec affiliated with jatengblekhet team on April 1, 2026. The attack compromised WordPress content directory indicating potential CMS vulnerability exploitation.
    Date: 2026-04-01T01:50:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823375
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: asesmensmaplos.com
  466. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is allegedly distributing a combolist containing Hotmail email credentials, described as valid and high-quality. The credentials are being shared through Telegram with registration required to view the full content.
    Date: 2026-04-01T01:48:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70637/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  467. Alleged sale of RAT logs containing cryptocurrency wallet data
    Category: Data Breach
    Content: Threat actor bsanana4 is allegedly selling RAT (Remote Access Trojan) logs containing cryptocurrency wallets and other stolen data on CrackingX forum. Contact is provided via Discord and Telegram for potential buyers.
    Date: 2026-04-01T01:48:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70638/
    Screenshots:
    None
    Threat Actors: bsanana4
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  468. Website defacement of FitEmpowHer by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The health and fitness website FitEmpowHer was defaced by attacker tirz4sec, affiliated with the jatengblekhet team, on April 1, 2026. The defacement targeted a specific file upload directory rather than the main homepage.
    Date: 2026-04-01T01:39:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823204
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Health and Fitness
    Victim Organization: FitEmpowHer
    Victim Site: fitempowher.com
  469. Website defacement of Roof Restorations Brisbane by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The attacker tirz4sec, affiliated with the jatengblekhet team, defaced the website of Roof Restorations Brisbane on April 1, 2026. This appears to be a targeted single-site defacement of an Australian roofing services company.
    Date: 2026-04-01T01:38:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823205
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Australia
    Victim Industry: Construction/Roofing Services
    Victim Organization: Roof Restorations Brisbane
    Victim Site: www.roofrestorationsbrisbane.c…
  470. Website defacement of deregistration.de by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The website deregistration.de was defaced by attacker tirz4sec, associated with the jatengblekhet team, on April 1, 2026. The defacement targeted a specific page within the WordPress content directory of the German domain.
    Date: 2026-04-01T01:37:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823206
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: deregistration.de
  471. Alleged TikTok cookies leak on cybercriminal forum
    Category: Combo List
    Content: A threat actor with username blacksatan666 posted about TikTok cookies on a cybercriminal forum specializing in credential lists and data dumps. The full content requires forum registration to access.
    Date: 2026-04-01T01:29:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70635/
    Screenshots:
    None
    Threat Actors: blacksatan666
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: TikTok
    Victim Site: tiktok.com
  472. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: Threat actor NUllSHop0X shared a combolist containing 9,000 mixed high-quality valid credentials on CrackingX forum. The credentials are described as fresh and valid, distributed via Pasteview link.
    Date: 2026-04-01T01:28:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70636/
    Screenshots:
    None
    Threat Actors: NUllSHop0X
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  473. Alleged data breach of Smarteez – Digital factory
    Category: Data Breach
    Content: The threat actor claims to have leaked a database from Smarteez – Digital factory, The Compromised data includes full name, physical address, GPS coordinates, city, sales territory, and client reference codes and etc.
    Date: 2026-04-01T01:19:41Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Smarteez-eu-Moroccan-Digital-Factory-Full-Database
    Screenshots:
    None
    Threat Actors: xNov
    Victim Country: Morocco
    Victim Industry: Information Technology (IT) Services
    Victim Organization: smarteez – digital factory
    Victim Site: smarteez.eu
  474. Website defacement of New Life Shop by Aptisme
    Category: Defacement
    Content: The attacker Aptisme defaced the New Life Shop e-commerce website hosted in Kenya on April 1, 2026. This appears to be a single-target defacement rather than part of a mass attack campaign.
    Date: 2026-04-01T01:15:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/823197
    Screenshots:
    None
    Threat Actors: Aptisme
    Victim Country: Kenya
    Victim Industry: E-commerce
    Victim Organization: New Life Shop
    Victim Site: newlifeshop.co.ke
  475. Alleged Data Leak of Meritorious National Teachers College
    Category: Data Leak
    Content: The group claims to have leaked the data of Meritorious National Teachers College.
    Date: 2026-04-01T01:01:48Z
    Network: telegram
    Published URL: https://t.me/speakteamm/55
    Screenshots:
    None
    Threat Actors: SpeakTeam
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: meritorious national teachers college
    Victim Site: benm.mx
  476. Alleged data leak of Unique Computing LLC / Gennet.ai / ReFocus AI exposing insurance policyholder data
    Category: Data Leak
    Content: Threat actor claims to have leaked data from a shared AWS environment associated with Unique Computing LLC, Gennet.ai, and ReFocus AI, allegedly exposing insurance policyholder information, cloud storage contents, and sensitive credentials.
    Date: 2026-04-01T00:52:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-FRESH-BREACH-Refocus-AI-Unique-Computing-Gennet-ai-Insurance-Policyholder-Data
    Screenshots:
    None
    Threat Actors: FulcrumSec
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: unique computing llc
    Victim Site: unique.computer
  477. Alleged Data Breach of Mata UMKM Riau
    Category: Data Breach
    Content: The group claims to have breached the database of Mata UMKM Riau.
    Date: 2026-04-01T00:50:20Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/429
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: mata umkm riau
    Victim Site: mataumkm.riau.go.id
  478. Alleged service offering ULP extraction and credential data access
    Category: Combo List
    Content: Threat actor vultapower is advertising VULTA Intelligence, a service claiming to provide ULP (Username:Login:Password) extraction from databases at $0.50 per 1,000 records. The service offers real-time synchronization, high accuracy results, and instant delivery via Telegram or dashboard.
    Date: 2026-04-01T00:47:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70634/
    Screenshots:
    None
    Threat Actors: vultapower
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  479. Alleged leak of Gmail credentials
    Category: Combo List
    Content: Threat actor D4rkNetHub allegedly shared a combolist containing over 100,000 Gmail credentials on a cybercriminal forum. The post appears to offer free access to the credential list.
    Date: 2026-04-01T00:25:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70633/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  480. Alleged Sale of XWorm V5.7 Chinese Malware
    Category: Malware
    Content: Threat actor claims to be sellling a cracked version of XWorm V5.7, a Remote Access Trojan (RAT) with capabilities including remote control, keylogging, data theft, persistence, and execution of additional malicious payloads.
    Date: 2026-04-01T00:12:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Leak-XWorm-V5-7-Chinese-Edition-Cracked
    Screenshots:
    None
    Threat Actors: rippors
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown