[April-14-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a comprehensive analysis of a massive surge in cybercriminal activity, data breaches, and website defacements recorded primarily on April 13 and April 14, 2026. Based strictly on the provided incident logs, the threat landscape is currently dominated by a high volume of credential stuffing lists, large-scale mass website defacements, industrial control system (ICS) compromises, and high-profile corporate data extortion.

The data reveals a highly active cybercrime ecosystem operating across both the open web (forums like CrackingX, BreachForums, DemonForums, and PwnForums) and encrypted Telegram channels. The most significant threat actor identified during this period is the “ShinyHunters” group, which is currently executing a massive extortion campaign against major global corporations, including Rockstar Games, Salesforce, and Santander Bank. Simultaneously, a distinct wave of mass website defacements was carried out by an actor known as “maw3six,” targeting dozens of international domains. Furthermore, the underground economy is heavily saturated with the free distribution and sale of “combolists” (email and password combinations), signaling a robust infrastructure supporting credential stuffing and account takeover attacks.


2. Threat Actor Profiles and Major Campaigns

2.1. ShinyHunters: Corporate Extortion and Data Breaches

The threat group known as ShinyHunters is the most prominent actor in the documented incidents, executing a sophisticated extortion and data leak campaign across multiple sectors. The group operates using a “pay or leak” ransomware model, although their recent attacks appear focused on data exfiltration and extortion rather than traditional file encryption. ShinyHunters utilizes Telegram channels (handles including @shinyc0rpsss) to communicate, advertise stolen data, and issue threats, while using Tox, Session, and PGP keys to verify their identity and ward off impersonators (such as “Mattys Savoie & James”) who allegedly misused their PGP keys for independent ransom demands.

Targeted Organizations and Extortion Details:

  • Rockstar Games: ShinyHunters claims to have compromised Rockstar Games through a third-party analytics vendor, Anodot. The threat actor allegedly exfiltrated over 78.6 million records from Snowflake instances.
  • The Rockstar Ransom: The group demanded a $200,000 USD ransom, which Rockstar reportedly refused to pay, stating the stolen data contained anonymized financial and sales records rather than customer personally identifiable information (PII).
  • The Rockstar Leak: Following the refusal, ShinyHunters published the data, which included a decade of internal sales transactions (2014-2024), total earnings exceeding $5 billion, regional sales figures, and in-game currency (Shark Card) purchase data. The group also posted threatening messages directed at the company following the dispute.
  • Salesforce: The group claims to possess full access to the complete Salesforce ecosystem, including Sales Cloud, Service Cloud, Marketing Cloud, AI automation systems, VPNs, and backend source code.
  • Salesforce Offerings: They are offering this complete access for $25 million. Additionally, they are selling tiered data packages, including a “Files Cloud” with 9.1 million Salesforce files (2024-2026) for $10,000, and a ransom database of 1 million files for $5,000.
  • Santander Bank: ShinyHunters is offering a dataset allegedly affecting Santander Bank customers in Spain, Chile, and Uruguay for $1 million USD. The data purportedly contains 30 million customer records, 28 million credit card numbers, and 6 million account numbers with balances.
  • Live Nation / Ticketmaster: The group is selling a 1.3TB dataset on BreachForums containing information on 560 million Live Nation/Ticketmaster users, including credit card details. They previously valued this data at $75,000 USD.
  • Government Credentials: The group offered for sale approximately 73,000 government email login credentials from Brazil and Zambia, affecting police, military, and prison administration sectors, claiming an 80% validity rate.
  • Other Corporate Targets: ShinyHunters claims to possess data from AT&T (valued at $100,000), Kemper Corporation (13 million Salesforce records containing PII), ZenBusiness (802GB of Snowflake/Mixpanel data), Hallmark Cards (7.9 million records), Neiman Marcus, Cisco (3 million source code files), Microsoft, Google, Victoria’s Secret, CrowdStrike, and NATO’s Jira instance.

2.2. The ‘maw3six’ Mass Defacement Campaign

A threat actor utilizing the handle “maw3six” executed a widespread and indiscriminate mass website defacement campaign primarily on April 13 and April 14, 2026. The attacks predominantly targeted websites hosted on Linux and Cloud infrastructure. The defacements generally involved altering specific pages (often naming the file maw.html) rather than the main homepages, and the campaign affected organizations across multiple continents without a clear ideological or sector-specific focus.

Notable ‘maw3six’ Defacement Targets:

  • Nepal: Extensive targeting of Nepalese infrastructure, including Nepal Brokers (financial services), Sawari Sewa (transportation), educational examination systems, Wonjala E-mart, and various .com.np domains.
  • Indonesia: Compromise of Batavia (business) and Pandu Warta (news media).
  • Africa: Defacement of Senegalese government infrastructure (ggis.sn) and SnapTech, a South African technology company.
  • Europe & Americas: Defacements affecting UK environmental firm EECO Solutions, Argentine e-commerce site Glow Store, Ecuadorian financial services firm Factoring Ecuador, and French site fournisseurs-astucieux.fr.
  • Other Sectors: Aviation (Prestige Air Parts), Defense (Vigor Defense), and Creative Services (Upturn Studio in Australia).

2.3. Z-Pentest Alliance and DDoSia Project: ICS/OT Attacks

The landscape features highly critical claims of Industrial Control Systems (ICS) and Operational Technology (OT) compromises by politically motivated hacktivist groups.

  • Z-Pentest Alliance: This pro-Russian hacktivist group claimed full takeover of the ICS and Building Management Systems (BMS) of the Albert Most Velebudická hypermarket in the Czech Republic.
  • Attack Vector and Impact: They claimed the intrusion exploited weak network segmentation and unprotected management interfaces to control boiler rooms, Trane industrial chillers, VZT ventilation, and cold storage rooms. The group threatened to disable refrigeration systems to destroy thousands of tons of food as retaliation for European support for Ukraine.
  • DDoSia Project: Affiliated with the pro-Russian group NoName057(16), this actor claimed to have breached the ICS/SCADA systems of Nova-Tech Poultry in South Korea. The group claimed control over modules managing infrared chicken beak processing, injection rates, and production lines as part of an anti-South Korean campaign named #OpSouthKorea.

2.4. Handala Hack (حنظله): Middle Eastern Infrastructure Threats

The Iranian cyber group Handala (or Hanzala) claimed responsibility for large-scale cyber operations targeting the Persian Gulf steel industry.

  • Targets: The group claims to have completely compromised and taken offline Fulat in Bahrain and SULB in Saudi Arabia. These companies reportedly possess an annual revenue exceeding $5 billion.
  • Motivation: Handala framed the attacks as revenge for fallen hackers during the “Ramadan War” and in retaliation for actions against the “Axis of Resistance” and southern Lebanon. The group also issued broad threats against Saudi Arabian leadership and industrial infrastructure.

2.5. Additional Defacement Actors (T-XpLoiT, DimasHxR, Zod, CYKOMNEPAL)

Alongside maw3six, several other actors executed defacement campaigns:

  • T-XpLoiT: Targeted government and educational institutions, defacing the Tanzania ICT Commission events portal, the internal intranet of Guatemala’s National Institute of Public Administration (INAP), and multiple Indonesian Islamic schools (MTs Nurussyafa’ah, STKIP PGRI Sidoarjo).
  • DimasHxR: Conducted single-page defacements across varied international targets, including a Chinese acrylic sheet manufacturer, an Iranian website, a Ukrainian domain, and a Japanese site.
  • CYKOMNEPAL: Defaced the Wonjala E-mart in Nepal and a specific product page of Brazilian IT company Informatica CPU.
  • Zod: Executed mass defacements targeting vendorinfra.com and the aviation company Wonder Air.
  • CyberOprationCulture / Nullsec Philippines: CyberOprationCulture defaced a Dreams Marketplace subdomain, while Nullsec Philippines claimed politically motivated defacements of the Uruguayan Ministry of Environment and Electronic Sworn Statement System.

3. Detailed Threat Landscape Analysis by Category

3.1. Data Breaches and Corporate Data Leaks

Beyond the ShinyHunters extortion campaigns, numerous independent data breaches were advertised or leaked on underground forums.

  • VUMI Group: Threat actor “bytetobreach” leaked an insurance database containing PII, social security numbers, passport documents, and W-9 forms for approximately 300,000 insured individuals and 25,000 staff members. The data was allegedly exfiltrated over six days and distributed via cloud storage.
  • Talabat Saudi Arabia: Threat actor “Jeffrey Epstein” offered a database containing between 536,000 and 563,000 user records from the food delivery platform, including names, emails, phone numbers, and addresses.
  • National Credit Information Center of Vietnam (CIC): Actor “Dedale Office” claimed to sell a database of over 160 million records containing full names, national ID numbers, loan data, and tax IDs.
  • Emaar Properties: Actor “ksa901” offered a database of 400,000 records of property owners and renters in the UAE, including high-profile Burj Khalifa residents, for $10,000.
  • Government Data Leaks: Breaches targeted the Bila Tserkva City Council in Ukraine (by “Perun Svaroga”), the Municipality of São Mateus in Brazil, the Ukrainian Information Resource Center (600,000 educational/family records), and Iraq’s 2025-2026 census data (47.7 million records for $1200). Furthermore, an actor named “Tendi” leaked passport documents for 200 Moscow citizens and a database containing details of 70,000 alleged Russian military casualties.
  • Other Notable Leaks: Breaches affected American Express (200,000 card records by INNG), NurtureLife (27.5k customer records including children’s birthdates), Farmacias del Ahorro in Mexico (18,530 records), FoodPapa.pk in Pakistan (239,109 records), OfferteCartucce in Italy (229,000 records), and an alleged database of FBI agents containing bcrypt-hashed passwords and vehicle plates. Furthermore, technical data from SEKISUI Aerospace Corporation, including export-controlled Boeing part information, was listed for $200,000.

3.2. Combo Lists, Credential Stuffing, and Log Distribution

The cybercriminal open web forums (such as CrackingX and DemonForums) are experiencing a massive influx of “combolists” (lists of compromised email and password combinations) and stealer logs. These lists are primarily used for automated credential stuffing attacks.

  • High-Volume Distributors: Actors like “CODER” are distributing massive datasets for free via Telegram, including an 11 million record mixed combo list, a 7 million record corporate SMTP list, and an 8 million record list targeting diverse social media platforms (Myspace, Bebo, Netlog). Another actor, “StarLinkClub,” posted a 21.4 million URL:login:password combolist.
  • Targeted Platform Combolists: Specific platforms are heavily targeted. “HQcomboSpace” leaked 1.69 million Yahoo credentials. Multiple actors (including “UniqueCombo,” “alphaxdd,” and “D4rkNetHub”) flooded forums with highly specific Hotmail credential lists ranging from a few hundred to over 500,000 verified hits. Streaming and gaming services were also targeted, with actor “Ra-Zi” distributing 120,000 credentials for Netflix, Minecraft, Steam, and Hulu.
  • Geo-Targeted Data: Distributors like “thejackal101” (under the “Elite_Cloud1” brand) and “CobraEgy” released massive country-specific combolists. These included datasets targeting France (1.4 million), Germany (1.15 million), India (246k), Indonesia (246k), Hungary (135k), Greece (63k), Finland (12k), Colombia (183k), Ecuador (183k), Denmark (47k), Croatia (23k), and the Czech Republic (272k).
  • Stealer Logs and Cookies: Actors are selling fresh infostealer logs containing credentials and session cookies. Actor “BBB” offered logs for Amazon, eBay, Booking.com, and Uber across multiple global regions. Another actor, “tuzelity,” sold combos and cookies for Facebook, PayPal, Airbnb, Roblox, and dating sites. Authentication cookies for eBay and Google Pay were also shared by actor “bluestarcrack” for potential session hijacking.

3.3. Initial Access Brokering and Cybercrime Services

The underground economy heavily features the sale of initial access to compromised systems and the provision of malicious services to facilitate further attacks.

  • Mail Account Access: Actor “D4RCK MAGICIAN” advertised the sale of direct mail account access across ten countries (including France, UK, US, and Japan), accompanied by scripts and credential hits. Actor “mu” sold fresh, keyword-searchable credential databases and access to valid webmails on private cloud infrastructure.
  • Infrastructure Access: The “Infrastructure Destruction Squad” advertised access to compromised servers and systems. Another actor sold access to verified FTX exchange accounts via the Kroll portal, claiming account balances up to $9.5 million, for an asking price of $50,000.
  • Spam and Phishing Infrastructure: Threat actor “Skybat” offered premium SMTP inbox services capable of sending 25,000 emails per day from dedicated IPs, alongside worldwide SMS sender packages. Actor “NullPointerPanic” advertised a “Sendgrid.com Phishing Suite” for advanced email service theft.
  • Domain Abuse Services: An actor named “clean_search” advertised comprehensive cybercrime services, including anti-phishing evasion, domain abuse operations, and DMCA manipulation, claiming to process 15,000 abuse cases daily for cryptocurrency payments ranging from $100 to $1000.

3.4. Malware Tooling and Vulnerability Exploitation

The proliferation of offensive tooling and zero-day exploits remains a persistent threat vector.

  • Offensive Tool Suites: Threat actor “Yoshi Data” actively advertised a comprehensive suite of offensive security and cybercrime tools. These included credential stuffing tools like SilverBullet and OpenBullet, Python automation scripts, CC+ tools, and custom executable development focused on stealth and precision for Kali Linux and Windows environments. Tools specific to validating stolen credentials, such as the “Discord Nitro Checker” and “Weeber Crunchyroll Checker,” were also widely distributed for high-speed automated workflows.
  • Zero-Day Exploits: Actor “phanes” (or “phanesthegreat”) attempted to sell two critical zero-day exploits. The first was a Windows RDP Denial-of-Service (DoS) exploit priced at $850, allegedly utilizing an integer overflow to crash Windows Server 2012/2016 and Windows 8.1/10 systems, claiming to affect over 1 million devices. The second was a FreeBSD FTP Remote Code Execution (RCE) exploit priced at $900, allegedly affecting over 11,000 devices. Furthermore, actor “SysInvaders” sold reflected XSS vulnerabilities affecting corporate entities in Sweden, Norway, and Poland.
  • Software Piracy and Cracking: The actor “GoRainCC” actively distributed cracked versions of commercial and professional software, including FlyPaper Sherlock investigation software, Site Modeller Pro, Domain Hunter Gatherer Pro, and various Digi-Ants CAD tools.
  • Automated Scanning Activity: The “Rakyat Digital Crew” shared automated vulnerability scan results indicating active exploitation attempts against Indonesian government portals (Ministry of Education, Ministry of Finance) and commercial sites using Open Redirect, Directory Traversal, RFI, and Command Injection techniques.

3.5. Specialized Cyber Threats and Alerts

  • AI Model Security Risks: US senior officials reportedly held an emergency meeting with banking executives and the Treasury Department regarding cybersecurity risks posed by a new Anthropic AI model known as “Glasswing” (Project Mythos). The technology is perceived as a threat to the US banking system due to potential cyber intrusion capabilities.
  • State-Sponsored Spyware: Reports surfaced alleging that the CIA utilized NSO Group’s Pegasus spyware in a deception operation targeting Iranian officials. The spyware was reportedly used to send spoofed messages to IRGC members to falsely claim a downed American pilot had been recovered, demonstrating the use of commercial spyware in complex geopolitical intelligence operations.
  • Financial Fraud: The sale of stolen payment card data remains active, with actors like “petac” and “Coleman” advertising fresh CC/CVV information, high balances, and financial transfer services via Cash App and PayPal on Telegram carding marketplaces. In addition, 40,000 Belgian IBANs were offered for sale via cryptocurrency by actor “jza1337”.

4. Comprehensive Incident Log (Selected Detailed Events)

To provide a granular view of the incident data, the following highlights specific tactical events executed over the reporting period.

  • Incident 151-153: Tanzanian and Indonesian Government/Education Defacements. Threat actor T-XpLoiT compromised the Tanzania ICT Commission (events.ictc.go.tz) on a government subdomain. Concurrently, the actor executed mass defacements against the online examination systems (admujian.mtsnurussyafaah.sch.id and rdm.mtsnurussyafaah.sch.id) of MTs Nurussyafa’ah, an Indonesian Islamic school, indicating automated exploitation of shared vulnerabilities across varied geographic regions.
  • Incident 161: City of Anthony, New Mexico Incident. The local government reported a cybersecurity incident involving inaccessible systems and missing public records. The anomalies, which included erased police devices, coincided with a mayoral transition. While an external hack is not confirmed, state authorities are investigating data integrity and access controls.
  • Incident 162: Straumann Legacy System Exposure. Swiss dental company Straumann reported a cyberattack targeting a legacy internal control system used between 2021 and 2024, resulting in exposed internal documents. The company isolated the incident with cybersecurity experts and confirmed that core business operations and client systems were unaffected.
  • Incident 261: Healthdaq Cyber Security Incident. Healthcare recruitment company Healthdaq suffered a cyber incident that was subsequently reported to regulatory authorities and the Garda National Cyber Crime Bureau in Ireland. Due to the ongoing criminal investigation, specifics regarding the attack vector were withheld.
  • Incident 263: Spring Lake Park Schools Ransomware Suspicions. The Spring Lake Park school district in Minnesota preemptively closed all facilities following a suspected ransomware attack. Local authorities and cybersecurity experts initiated an investigation to secure networks and assess the potential compromise of IT systems.
  • Incident 296: WRG College SQL Injection. A threat actor named Mr.SonicX, part of the TEGAL CYBER TEAM, reported performing a targeted SQL injection attack against an Indian educational institution (wrgcollege.edu.in) by exploiting an injectable id parameter on the gallery_img.php endpoint.
  • Incident 336: #OpsShadowStrike Defacement. A coalition of hacktivist groups (including TengkorakCyberCrew, MalaysiaHacktivist, and EagleCyberCrew) defaced the Indian website myseba.in. The attack utilized the #AllMuslimHackers banner and carried pro-Palestine and anti-Israel political messaging.

5. Conclusion

The cybersecurity landscape analyzed in this dataset indicates a highly volatile period characterized by massive data extortion, automated exploitation, and the weaponization of compromised credentials.

The activities of ShinyHunters represent the most severe financial and reputational threat. By compromising third-party vendors (like Anodot) and critical cloud infrastructure (like Snowflake and Salesforce), they have successfully exfiltrated millions of sensitive records from top-tier global corporations. Their aggressive “pay or leak” strategy and multi-million dollar ransom demands highlight the critical risk posed by supply chain vulnerabilities and improperly secured cloud environments.

Concurrently, the underground economy is thriving on the mass distribution of combolists and stealer logs. The sheer volume of credentials being distributed for free or sold cheaply—numbering in the tens of millions—provides low-skill threat actors with the necessary ammunition to conduct endless credential stuffing and account takeover attacks against platforms ranging from Hotmail and Yahoo to highly sensitive corporate VPNs and financial services.

Politically motivated hacktivism also poses a severe physical and operational threat. The claims by groups like the Z-Pentest Alliance and Handala regarding the full takeover of Industrial Control Systems (ICS) in European hypermarkets and Middle Eastern steel manufacturing facilities demonstrate a dangerous escalation from digital defacement to physical disruption. Threatening to destroy physical inventory by manipulating refrigeration controls or halting steel production emphasizes the urgent need for robust network segmentation and the securing of OT environments against external intrusion.

Finally, the relentless mass defacement campaigns executed by actors like maw3six and T-XpLoiT across vulnerable Linux servers and WordPress installations highlight the continuous, automated scanning and exploitation of unpatched web infrastructure globally.

In summary, organizations must urgently prioritize the securing of third-party SaaS integrations, implement robust multi-factor authentication to combat credential stuffing, and rigidly segment industrial control systems to defend against an increasingly bold and diversified threat actor ecosystem.

Detected Incidents Draft Data

  1. Alleged Data Breach of criminallaw.com Legal Directory
    Category: Data Breach
    Content: A threat actor operating under the alias Angel Tsvetkov has claimed responsibility for breaching criminallaw.com, a criminal law attorney directory. The actor has made available a CSV database dump containing 35,149 records with user details including emails, full names, law firms, cities, states, phone numbers, photos, bios, social links, and internal account statuses. The post includes sample records of attorneys and a proof-of-defacement link, suggesting the site may have also been defaced
    Date: 2026-04-14T23:35:45Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-criminallaw-com-Angel-Tsvetkov-TRIBUTE
    Screenshots:
    None
    Threat Actors: Erich
    Victim Country: United States
    Victim Industry: Legal Services
    Victim Organization: criminallaw.com
    Victim Site: criminallaw.com
  2. Alleged Data Breach of onona.ru Sex Shop Database
    Category: Data Breach
    Content: A threat actor known as Tendi has allegedly made available a database dump associated with onona.ru, a Russian online sex shop. The dataset purportedly contains approximately 257,000 records. No further details regarding the specific data fields or method of acquisition are available from the post content.
    Date: 2026-04-14T23:34:01Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-onona-ru-sex-shop-257k
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Russia
    Victim Industry: Retail
    Victim Organization: Onona
    Victim Site: onona.ru
  3. Alleged Data Breach of Morocco Royal Palace Staff Database
    Category: Data Breach
    Content: A threat actor operating under the alias Rihana has allegedly posted a staff database belonging to the Morocco Royal Palace on a cybercrime forum. The post claims to contain personal data of Royal Palace staff members. No further details regarding record count, data fields, or pricing are available as post content was not accessible.
    Date: 2026-04-14T23:33:14Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-MOROCCO-Royal-Palace-Staff-Database
    Screenshots:
    None
    Threat Actors: Rihana
    Victim Country: Morocco
    Victim Industry: Government
    Victim Organization: Morocco Royal Palace
    Victim Site: Unknown
  4. Alleged forum advertising and intermediary services for cybercriminal transactions
    Category: Initial Access
    Content: User vlesskey offers intermediary services for posting advertisements on various forums and facilitating transactions between buyers and sellers using escrow services. The actor explicitly excludes Ukrainian clients and requests payment in cryptocurrency (USDT/TRX) with commission rates of 10-20% depending on transaction amount.
    Date: 2026-04-14T23:11:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72114/
    Screenshots:
    None
    Threat Actors: vlesskey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Alleged graphic design intermediary service on cybercriminal forum
    Category: Initial Access
    Content: A threat actor on CrackingX forum offers graphic design services as an intermediary, accepting cryptocurrency payments through guarantor services. The actor provides multiple secure communication channels and operates with detailed transaction protocols to maintain anonymity.
    Date: 2026-04-14T23:11:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72115/
    Screenshots:
    None
    Threat Actors: vlesskey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor named TeraCloud1 shared a combolist containing 33,000 valid email credentials on a cybercrime forum. The credentials are being distributed for free with additional private cloud access offered via Telegram.
    Date: 2026-04-14T22:44:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-33K-VALID-MAIL-ACCESS–200455
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged leak of social media and e-commerce credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 309,339 credential pairs allegedly targeting social media and shopping platforms for 2026. The data was made available for free download via file sharing service.
    Date: 2026-04-14T22:43:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72113/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data leak of MRW Venezuela shipping records
    Category: Data Leak
    Content: Threat actor claims to have leaked confidential shipping and customer data from MRW Venezuela, including personal information, addresses, phone numbers, and transaction details of customers and recipients.
    Date: 2026-04-14T22:42:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-MRW-VENEZUELA-7-6-MILLIONS-CONFIDENTIAL-DATA-14-04-2026
    Screenshots:
    None
    Threat Actors: malconguerra2
    Victim Country: Venezuela
    Victim Industry: Logistics and Shipping
    Victim Organization: MRW Venezuela
    Victim Site: mrwve.com
  9. Alleged distribution of multi-platform credential combolist targeting Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify
    Category: Combo List
    Content: Threat actor Ra-Zi distributed a combolist containing 140,000 email and password combinations targeting multiple platforms including Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. The actor also advertised selling additional credential lists and email databases through Telegram.
    Date: 2026-04-14T22:22:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-140k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–200453
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,606 valid email and password combinations from mixed sources with mail access capability.
    Date: 2026-04-14T22:20:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72109/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged leak of credential combolist containing 22.52 million records
    Category: Combo List
    Content: A threat actor named Daxus has made available a credential combolist in URL:LOG:PASS format containing 22.52 million records through their website and Telegram channel.
    Date: 2026-04-14T22:20:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72110/
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged leak of mixed email and password credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 140,000 email and password combinations from various providers including AOL, Yahoo, Hotmail, and Outlook across multiple countries. The actor also advertises selling additional credential lists and mailing lists through Telegram.
    Date: 2026-04-14T22:20:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72111/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Website defacement of Oakwood Lodges by H4CKTHOR
    Category: Defacement
    Content: The attacker H4CKTHOR successfully defaced the homepage of Oakwood Lodges, a UK-based hospitality company, on April 15, 2026. This was a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-14T21:58:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832980
    Screenshots:
    None
    Threat Actors: H4CKTHOR
    Victim Country: United Kingdom
    Victim Industry: Hospitality
    Victim Organization: Oakwood Lodges
    Victim Site: oakwoodlodges.co.uk
  14. Alleged data breach of Rockstar Games by ShinyHunters
    Category: Data Leak
    Content: ShinyHunters allegedly breached Rockstar Games with leaked data made available for free download, reportedly disclosed on April 14th 2026.
    Date: 2026-04-14T21:54:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Rockstar-Breach-from-ShinyHunters
    Screenshots:
    None
    Threat Actors: Liquid
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Rockstar Games
    Victim Site: Unknown
  15. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 770,000 Hotmail email and password combinations on a cybercrime forum. The credentials are allegedly valid hits from credential stuffing attacks.
    Date: 2026-04-14T21:34:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-770X-%C2%A0-Hotmail-HITS-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  16. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 84,000 mixed email and password combinations on a cybercrime forum. The credentials appear to be from various email providers and sources.
    Date: 2026-04-14T21:33:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-84K-Mail-Access-Mix
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 770,000 Hotmail credentials via file sharing platform. The credentials are described as HITS suggesting they are verified working credentials.
    Date: 2026-04-14T21:31:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72108/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  18. Alleged data breach of Ukrainian military equipment retailer
    Category: Data Breach
    Content: Threat actor is selling a database containing 50,000 customer records and 100,000 order records from a Ukrainian military equipment retailer. The data includes full names, email addresses, phone numbers, IP addresses, physical addresses, purchase information, birthdates, and payment methods.
    Date: 2026-04-14T21:13:12Z
    Network: openweb
    Published URL: https://breached.st/threads/military-shop-ukraine-50k-customers-data-100k-orders-data.86000/unread
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Ukraine
    Victim Industry: Military/Defense Equipment Retail
    Victim Organization: Unknown
    Victim Site: specprom-kr.com.ua
  19. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor snowstormxd shared what appears to be a fresh Hotmail credential list through free download links on Pasteview and Telegram. The post offers free access to the combolist without any payment required.
    Date: 2026-04-14T21:11:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72107/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  20. Alleged leak of Gmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.8 million Gmail email and password combinations through a file sharing service. The credentials are described as high quality leaks from various sources.
    Date: 2026-04-14T20:48:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72104/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  21. Alleged leak of mixed domain credential list
    Category: Combo List
    Content: A threat actor shared a combolist containing 27,000 email and password combinations from various domains via a paste sharing service. The credentials appear to cover multiple organizations and domains.
    Date: 2026-04-14T20:48:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-27-000-Mixed-Good-Domains-List
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 51,000 valid email and password combinations on a cybercrime forum. The credentials are being made available for free download with registration required.
    Date: 2026-04-14T20:48:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-51K-VALID-MAIL-ACCESS–200421
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged sharing of credential combolist on CrackingX forum
    Category: Combo List
    Content: Forum user webvvork allegedly shared a combolist containing 3,000 valid credentials on CrackingX forum, with contact information provided via Telegram handle @pikachu_perehodnik.
    Date: 2026-04-14T20:48:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72105/
    Screenshots:
    None
    Threat Actors: webvvork
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged leak of mixed domain credential list
    Category: Combo List
    Content: A credential list containing 46,000 mixed domain entries was allegedly shared on a cybercrime forum. The post includes a Telegram contact for further communication.
    Date: 2026-04-14T20:47:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72106/
    Screenshots:
    None
    Threat Actors: webvvork
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged leak of US personal information database
    Category: Data Leak
    Content: A threat actor leaked a database containing 85,000 US personal records from 2021 including names, addresses, birthdates, emails, and mobile numbers across multiple states. The data was validated as active and processed to remove invalid entries before being made available for free download.
    Date: 2026-04-14T20:47:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-USA-Personal-info-DB-85K
    Screenshots:
    None
    Threat Actors: Immanuel_Kant
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged leak of 210K credential combinations
    Category: Data Leak
    Content: A threat actor allegedly shared a credential list containing 210,000 URL:username:password combinations described as high quality and fresh. No specific victim or pricing information was provided in the available content.
    Date: 2026-04-14T20:39:14Z
    Network: openweb
    Published URL: https://xforums.st/threads/210k-high-quality-and-fresh-url-log-pass.608311/
    Screenshots:
    None
    Threat Actors: Seaborg_p
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Mass defacement campaign by QATAR911 team member MR~TNT targeting hospie.site
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign on April 15, 2026, with attacker MR~TNT compromising hospie.site among other targets. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-14T20:39:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248550
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hospie.site
  28. Mass website defacement by QATAR911 team targeting shoeworth.store
    Category: Defacement
    Content: The QATAR911 team, with member MR~TNT, conducted a mass defacement campaign targeting the Shoeworth online shoe retailer on April 15, 2026. The attack was part of a broader mass defacement operation affecting multiple websites.
    Date: 2026-04-14T20:37:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248549
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Shoeworth
    Victim Site: shoeworth.store
  29. Mass defacement targeting himony.store by MR~TNT/QATAR911 group
    Category: Defacement
    Content: The QATAR911 group, through attacker MR~TNT, conducted a mass defacement campaign targeting the Himony Store e-commerce website on April 15, 2026. This appears to be part of a broader mass defacement operation rather than a targeted attack on this specific organization.
    Date: 2026-04-14T20:36:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248551
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Himony Store
    Victim Site: himony.store
  30. Website defacement of amandeepsinghchawla.com by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL group successfully defaced the amandeepsinghchawla.com website on April 15, 2026. The attack targeted a specific subdirectory rather than the main homepage, indicating a targeted defacement rather than a mass campaign.
    Date: 2026-04-14T20:35:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832976
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: amandeepsinghchawla.com
  31. Mass website defacement by QATAR911 team member MR~TNT targeting zulery.shop
    Category: Defacement
    Content: The QATAR911 team member MR~TNT conducted a mass defacement attack targeting the e-commerce site zulery.shop on April 15, 2026. The attack was part of a broader mass defacement campaign affecting multiple websites simultaneously.
    Date: 2026-04-14T20:34:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248548
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Zulery
    Victim Site: zulery.shop
  32. Alleged leak of credential combolist containing 210,000 records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 210,000 URL:username:password combinations on a cybercrime forum. The data is being distributed for free to registered forum members.
    Date: 2026-04-14T20:22:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-210K-HIGH-QUALITY-AND-FRESH-URL-LOG-PASS
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged rental service for Intelligence X database access
    Category: Combo List
    Content: Threat actor offers rental access to Intelligence X account for $15 per search, providing screen sharing during searches and delivering results as zip files.
    Date: 2026-04-14T20:22:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72100/
    Screenshots:
    None
    Threat Actors: Chamane99
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged leak of credential combolist containing 210,000 records
    Category: Combo List
    Content: A threat actor shared a combolist containing 210,000 URL:username:password combinations on a cybercrime forum. The credentials are described as high quality and fresh, though no specific victim organizations are identified.
    Date: 2026-04-14T20:21:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72102/
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged rental service for IntelX intelligence platform access
    Category: Initial Access
    Content: Threat actor offering rental access to IntelX intelligence platform for $15 per search, providing screen sharing sessions and delivering search results as zip files.
    Date: 2026-04-14T20:21:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72101/
    Screenshots:
    None
    Threat Actors: Chamane99
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Website defacement of Fashium store by MR~TNT (QATAR911 team)
    Category: Defacement
    Content: The retail website fashium.store was defaced by attacker MR~TNT, affiliated with the QATAR911 team, on April 15, 2026. The target appears to be an online fashion store running on a Linux server.
    Date: 2026-04-14T20:17:35Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248547
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Fashium
    Victim Site: www.fashium.store
  37. Alleged leak of email credential combolist containing 43,000 records
    Category: Combo List
    Content: A threat actor shared a combolist containing 43,000 valid email and password combinations through a free download link on a cybercriminal forum.
    Date: 2026-04-14T19:59:46Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-43K-VALID-MAIL
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 11,000 Hotmail email and password combinations through a free download link on a cybercriminal forum.
    Date: 2026-04-14T19:59:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-11K-HQ-HOTMAIL
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  39. Alleged leak of credential combolist containing 675,000 records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing approximately 675,000 records in URL:login:password format, claiming the data is fresh and high quality.
    Date: 2026-04-14T19:58:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72098/
    Screenshots:
    None
    Threat Actors: Foosa22
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged leak of credential combolist containing 393,000 records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing approximately 393,000 records in URL:login:password format, described as fresh and high quality. The data is being distributed for free download on a cybercriminal forum.
    Date: 2026-04-14T19:58:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72099/
    Screenshots:
    None
    Threat Actors: herewahyu2k
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged leak of credential combolist containing 583,000 records
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 583,000 credential pairs in URL:login:password format, described as fresh and high quality. The data is being distributed for free download on a cybercriminal forum.
    Date: 2026-04-14T19:36:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72096/
    Screenshots:
    None
    Threat Actors: Foosa22
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Mass website defacement campaign by QATAR911 team member MR~TNT targeting quantumbot.cloud
    Category: Defacement
    Content: The QATAR911 team member MR~TNT conducted a mass defacement campaign targeting quantumbot.cloud on April 15, 2026. This attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-14T19:05:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248546
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: QuantumBot
    Victim Site: quantumbot.cloud
  43. Mass defacement campaign by QATAR911 team targeting encomendix.online
    Category: Defacement
    Content: QATAR911 threat group conducted a mass defacement campaign targeting multiple websites including encomendix.online. The attack was carried out by an individual using the handle MR~TNT on April 15, 2026.
    Date: 2026-04-14T18:48:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248525
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: encomendix.online
  44. Mass defacement campaign by QATAR911 team targeting gaming websites
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign on April 15, 2026, with attacker MR~TNT targeting multiple websites including the gaming site gamesforplay.xyz. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-14T18:47:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248528
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: gamesforplay.xyz
  45. Mass defacement campaign by QATAR911 team targeting trusted-peptides.store
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign targeting multiple websites including trusted-peptides.store, with attacker MR~TNT claiming responsibility. The incident occurred on April 15, 2026, affecting a peptide/pharmaceutical retail website hosted on a Linux server.
    Date: 2026-04-14T18:47:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248545
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Healthcare/Pharmaceuticals
    Victim Organization: Trusted Peptides
    Victim Site: trusted-peptides.store
  46. Mass website defacement by QATAR911 team member MR~TNT targeting digitalfunhub.xyz
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign targeting multiple websites including digitalfunhub.xyz. The attack was carried out by team member MR~TNT on April 15, 2026, affecting an entertainment-focused website as part of a broader coordinated defacement operation.
    Date: 2026-04-14T18:46:57Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248524
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Digital Fun Hub
    Victim Site: digitalfunhub.xyz
  47. Mass website defacement by QATAR911 team targeting deliciousfoodrecipe.site
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement attack targeting deliciousfoodrecipe.site on April 15, 2026. The attack was part of a broader mass defacement campaign rather than targeting the specific site.
    Date: 2026-04-14T18:46:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248523
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Food and Recipe Services
    Victim Organization: Unknown
    Victim Site: deliciousfoodrecipe.site
  48. Mass website defacement campaign by QATAR911 team member MR~TNT targeting quantumbot.online
    Category: Defacement
    Content: MR~TNT from the QATAR911 team conducted a mass defacement campaign targeting quantumbot.online on April 15, 2026. The attack was part of a broader mass defacement operation rather than targeting a single website.
    Date: 2026-04-14T18:45:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248540
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: QuantumBot
    Victim Site: quantumbot.online
  49. Mass defacement campaign by QATAR911 team member MR~TNT targeting logistics websites
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign targeting multiple websites including logistificando.online, with attacks carried out by member MR~TNT on April 15, 2026. The campaign targeted logistics sector websites hosted on Linux servers.
    Date: 2026-04-14T18:45:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248531
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Logistics
    Victim Organization: Unknown
    Victim Site: logistificando.online
  50. Mass defacement campaign by QATAR911 team targeting gaming websites
    Category: Defacement
    Content: The QATAR911 team, specifically attacker MR~TNT, conducted a mass defacement campaign targeting gaming-related websites including playforgames.xyz on April 15, 2026. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-14T18:44:50Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248536
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: playforgames.xyz
  51. Mass website defacement by QATAR911 team member MR~TNT targeting alphalabs-wellness.online
    Category: Defacement
    Content: The attacker MR~TNT from the QATAR911 team conducted a mass defacement campaign targeting multiple websites including alphalabs-wellness.online on April 15, 2026. The attack compromised a wellness industry website running on a Linux server.
    Date: 2026-04-14T18:44:17Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248521
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Healthcare/Wellness
    Victim Organization: Alpha Labs Wellness
    Victim Site: alphalabs-wellness.online
  52. Alleged solicitation for Brazilian access and infrastructure
    Category: Initial Access
    Content: Threat actor ekko2k is actively purchasing Brazilian digital assets and infrastructure access including shells, cPanel accounts, and employee credentials, with particular interest in e-commerce and payment systems. Offers range from $500 to $10,000 USD with transactions conducted through forum escrow.
    Date: 2026-04-14T18:43:49Z
    Network: openweb
    Published URL: https://tier1.life/thread/144
    Screenshots:
    None
    Threat Actors: ekko2k
    Victim Country: Brazil
    Victim Industry: E-commerce
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Mass defacement campaign by QATAR911 team member MR~TNT targeting therheuco.online
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement campaign targeting therheuco.online on April 15, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-14T18:43:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248544
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: therheuco.online
  54. Mass website defacement campaign by QATAR911 team member MR~TNT targeting printer security services
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement campaign targeting multiple websites including PrinterGuard, a printer security service provider. The attack occurred on April 15, 2026 and targeted Linux-based web servers.
    Date: 2026-04-14T18:43:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248539
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: PrinterGuard
    Victim Site: printerguard.online
  55. Website defacement of ABMarketing Blog by MR~TNT (QATAR911 team)
    Category: Defacement
    Content: The marketing blog website abmarketingblog.online was defaced by attacker MR~TNT affiliated with the QATAR911 team on April 15, 2026. The incident targeted a Linux-based server hosting the marketing website.
    Date: 2026-04-14T18:42:43Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248520
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Marketing
    Victim Organization: AB Marketing Blog
    Victim Site: abmarketingblog.online
  56. Mass defacement campaign by QATAR911 team member MR~TNT targeting quantumbot.space
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement campaign targeting quantumbot.space on April 15, 2026. The attack was part of a broader mass defacement operation rather than targeting a single organization.
    Date: 2026-04-14T18:42:17Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248541
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: quantumbot.space
  57. Mass defacement campaign by QATAR911 team targeting gaming website
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign targeting multiple websites including playstationforgames.biz, with the attack carried out by member MR~TNT on April 15, 2026. The targeted site appears to be a gaming-related platform running on a Linux server.
    Date: 2026-04-14T18:41:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248537
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: PlayStation For Games
    Victim Site: playstationforgames.biz
  58. Mass website defacement campaign by QATAR911 team member MR~TNT targeting Brazilian laboratory
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign targeting multiple websites including a Brazilian laboratory services website. The attack was carried out by team member MR~TNT on April 15, 2026, affecting the Envia Labs Brazil online platform.
    Date: 2026-04-14T18:41:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248527
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Brazil
    Victim Industry: Healthcare/Laboratory Services
    Victim Organization: Envia Labs
    Victim Site: envialabsbra.online
  59. Mass website defacement by QATAR911 team member MR~TNT targeting sigma-aminos.space
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement attack targeting sigma-aminos.space on April 15, 2026. The attack was part of a larger mass defacement campaign rather than targeting a single organization.
    Date: 2026-04-14T18:40:57Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248543
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: sigma-aminos.space
  60. Mass defacement campaign by QATAR911 team targeting peptidezone.online
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign on April 15, 2026, targeting peptidezone.online among other sites. The attack was executed by MR~TNT on a Linux-based server hosting what appears to be a peptide-related pharmaceutical or research website.
    Date: 2026-04-14T18:40:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248535
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Healthcare/Pharmaceuticals
    Victim Organization: Unknown
    Victim Site: peptidezone.online
  61. Mass defacement targeting marketing websites by QATAR911 team member MR~TNT
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement attack targeting multiple websites including alphamarketing.blog on April 15, 2026. The attack was part of a broader mass defacement campaign rather than targeting a specific organization.
    Date: 2026-04-14T18:40:03Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248522
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Marketing
    Victim Organization: Alpha Marketing
    Victim Site: alphamarketing.blog
  62. Mass defacement targeting research peptide website by QATAR911 team
    Category: Defacement
    Content: On April 15, 2026, attacker MR~TNT from the QATAR911 team conducted a mass defacement operation targeting researchpeptide.online, a website in the pharmaceutical research sector. This was part of a broader mass defacement campaign rather than a targeted attack on a single site.
    Date: 2026-04-14T18:39:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248542
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Pharmaceutical/Research
    Victim Organization: Unknown
    Victim Site: researchpeptide.online
  63. Mass defacement campaign by QATAR911 team targeting newsforflash.online
    Category: Defacement
    Content: Mass defacement attack conducted by attacker MR~TNT from the QATAR911 team targeting newsforflash.online on April 15, 2026. The incident was part of a larger mass defacement campaign rather than a targeted attack on a single website.
    Date: 2026-04-14T18:39:09Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248533
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Media/News
    Victim Organization: News for Flash
    Victim Site: newsforflash.online
  64. Mass website defacement by QATAR911 team targeting heartandflowers.store
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign targeting multiple websites including heartandflowers.store on April 15, 2026. The attack was carried out by an individual using the handle MR~TNT against what appears to be an online retail business.
    Date: 2026-04-14T18:38:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248529
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Heart and Flowers
    Victim Site: heartandflowers.store
  65. Mass defacement campaign by QATAR911 team member MR~TNT targeting labvial.online
    Category: Defacement
    Content: The attacker MR~TNT from the QATAR911 team conducted a mass defacement campaign targeting labvial.online on April 15, 2026. This was part of a broader mass defacement operation rather than a targeted attack on a specific organization.
    Date: 2026-04-14T18:38:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248530
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: labvial.online
  66. Mass website defacement campaign by QATAR911 team member MR~TNT targeting mailassist.online
    Category: Defacement
    Content: The QATAR911 team member MR~TNT conducted a mass defacement campaign targeting multiple websites including mailassist.online, an email services provider. The attack occurred on April 15, 2026, compromising a Linux-based web server.
    Date: 2026-04-14T18:37:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248532
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Technology/Email Services
    Victim Organization: Mail Assist
    Victim Site: mailassist.online
  67. Mass defacement campaign by QATAR911 team member MR~TNT targeting peptidecore.site
    Category: Defacement
    Content: The QATAR911 team conducted a mass defacement campaign on April 15, 2026, with member MR~TNT successfully compromising peptidecore.site. This attack was part of a broader mass defacement operation targeting multiple websites simultaneously.
    Date: 2026-04-14T18:37:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248534
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Biotechnology
    Victim Organization: Peptide Core
    Victim Site: peptidecore.site
  68. Mass website defacement campaign by QATAR911 team member MR~TNT
    Category: Defacement
    Content: QATAR911 team member MR~TNT conducted a mass defacement attack targeting multiple websites including entregopedia.online. The attack occurred on April 15, 2026 and affected Linux-based web servers.
    Date: 2026-04-14T18:36:24Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248526
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: entregopedia.online
  69. Mass defacement campaign by QATAR911 team member MR~TNT targeting premiosrapidos.co
    Category: Defacement
    Content: Website defacement attack conducted by MR~TNT from the QATAR911 team against premiosrapidos.co on April 15, 2026. This was part of a mass defacement campaign targeting multiple websites rather than an isolated attack.
    Date: 2026-04-14T18:35:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248538
    Screenshots:
    None
    Threat Actors: MR~TNT, QATAR911
    Victim Country: Colombia
    Victim Industry: Entertainment/Gaming
    Victim Organization: Premios Rapidos
    Victim Site: premiosrapidos.co
  70. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 29,000 email and password combinations with full valid mail access on a cybercrime forum. The credentials appear to be from mixed sources and were made available as a free download to registered forum members.
    Date: 2026-04-14T18:33:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-29K-Full-Valid-Mail-Access-MIX-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged leak of credential combolist containing 1.1 million records
    Category: Combo List
    Content: A combolist containing 1.1 million URL-LOGIN-PASS combinations dated April 15, 2026 was allegedly leaked on a cybercrime forum. The credentials appear to be made available for free download to registered forum users.
    Date: 2026-04-14T18:32:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72092/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 29,000 email credentials described as Full Valid Mail Access MIX on an underground forum. The post appears to offer the credentials as a free download to registered forum users.
    Date: 2026-04-14T18:32:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72093/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Alleged leak of business corporate email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 104,618 business corporate email credentials with SMTP access via a file sharing platform.
    Date: 2026-04-14T18:31:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72094/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to share 313 Hotmail credential hits. The actual content is hidden and only available to registered users of the forum.
    Date: 2026-04-14T18:31:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72095/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  75. Alleged distribution of stealer logs and credential data
    Category: Logs
    Content: Threat actor watercloud distributed stealer logs and credential data via file sharing platform with password protection. The actor promotes a Telegram channel for accessing fresh logs daily.
    Date: 2026-04-14T18:06:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90%E2%AD%90%E2%AD%90-STEALER-LOGS-AND-U-L-P-14-04-2026
    Screenshots:
    None
    Threat Actors: watercloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,401 mixed email credentials including Hotmail accounts, distributed through a private cloud service.
    Date: 2026-04-14T17:43:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-4401x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  77. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor has allegedly made available a combolist containing 5,984 valid Hotmail email credentials on a cybercrime forum.
    Date: 2026-04-14T17:43:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72089/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  78. Alleged leak of premium email credential combolist
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 4,401 premium mixed email credentials including Hotmail accounts. The credentials are being shared for free download via Telegram contact.
    Date: 2026-04-14T17:42:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72090/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged distribution of mixed credential combolist containing 20,000 records
    Category: Combo List
    Content: A threat actor distributed a mixed credential combolist containing 20,000 email and password combinations. No specific victim organization or breach source was identified.
    Date: 2026-04-14T17:24:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-MIX-Unique-Combo-6-20000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged leak of French email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,500 fresh French email credentials on a cybercriminal forum. The credentials appear to be recently obtained as indicated by the date reference in the post title.
    Date: 2026-04-14T17:21:12Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-1-5K-Frace-Fresh-Mail-Access-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Alleged leak of credential combolist containing 20,000 records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 20,000 username and password combinations on a cybercriminal forum in the combolists and dumps section.
    Date: 2026-04-14T17:16:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72086/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged leak of Hotmail and email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,942 email and password combinations for Hotmail and other email services. The credentials are being distributed for free download on cybercriminal forums.
    Date: 2026-04-14T17:16:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72087/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  83. Alleged leak of French email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,500 French email credentials dated April 14th on an underground forum.
    Date: 2026-04-14T17:16:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72088/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Alleged sale of iOS exploitation tool targeting financial and cryptocurrency data
    Category: Initial Access
    Content: Threat actor OnarDev is selling IExploit Lab v1.0, an iOS exploitation tool that allegedly targets devices running iOS 13 through iOS 17.2.1. The tool claims to exploit vulnerabilities to steal cryptocurrency and banking information from compromised devices through malicious links.
    Date: 2026-04-14T17:15:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-IExploit-Lab-v1-0-C2-Integrated-Panel
    Screenshots:
    None
    Threat Actors: OnarDev
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Alleged leak of Russian email credentials
    Category: Logs
    Content: A threat actor allegedly leaked 4,200 Russian email credentials described as fresh hits from April 14th. The credentials appear to be distributed through a forum specializing in mail access and combolists.
    Date: 2026-04-14T17:05:29Z
    Network: openweb
    Published URL: https://xforums.st/threads/4-2k-russian-mail-access-fresh-hits-14-04.608292/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  86. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 2,029 Hotmail email credentials on DemonForums. The credentials are described as valid hits from premium accounts and are being distributed through Telegram.
    Date: 2026-04-14T16:49:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-2029x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  87. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 2,029 allegedly valid Hotmail email credentials for free download. The actor claims these are premium hits from a private cloud and mix mail sources.
    Date: 2026-04-14T16:48:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72081/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  88. Alleged distribution of 9 million credential combolist targeting multiple countries
    Category: Combo List
    Content: Threat actor CODER is distributing a 9 million record credential combolist containing data from multiple countries including Bangladesh, Belarus, Belgium, Brazil and others. The combolist is being shared through Telegram channels for free distribution.
    Date: 2026-04-14T16:48:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72082/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Multiple
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Alleged leak of Russian email credentials
    Category: Combo List
    Content: A threat actor shared access to approximately 4,200 Russian email credentials described as fresh hits from April 14th. The credentials appear to be distributed as a combolist on an underground forum.
    Date: 2026-04-14T16:48:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72083/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged leak of mixed email credential lists
    Category: Combo List
    Content: User klyne05 shared mixed email credential lists described as private, fresh, and checked on the CrackingX forum. The post offers free download access to the combolists without specifying record counts or victim sources.
    Date: 2026-04-14T16:47:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72084/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Alleged kernel address leak vulnerability in Windows EventLog RPC
    Category: Data Leak
    Content: Security researcher documents an information disclosure vulnerability in Windows Event Log service that enables extraction of kernel pool pointers from Windows machines locally and remotely via RPC. The leak occurs in the Microsoft-Windows-Storage-Storport/Operational channel within EventID 524 generated by the stornvme driver during NVMe device errors.
    Date: 2026-04-14T16:38:59Z
    Network: openweb
    Published URL: https://tier1.life/thread/143
    Screenshots:
    None
    Threat Actors: Elijah
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Microsoft
    Victim Site: Unknown
  92. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,300 Japanese email and password combinations through a file sharing service. The credentials are claimed to be validated and high quality.
    Date: 2026-04-14T16:24:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3-3K-Japan-Full-Valid-Mail-Just-Top-Quality-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged leak of educational institution credential list
    Category: Combo List
    Content: A threat actor shared a credential list containing 109,000 email and password combinations specifically targeting educational institutions. The actor also advertises selling additional credential lists for various email providers and countries through Telegram.
    Date: 2026-04-14T16:23:46Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-109K-EDU-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Alleged leak of Chinese email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,900 Chinese email credentials through a file sharing platform. The credentials are claimed to be fresh and dated April 14th.
    Date: 2026-04-14T16:22:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-9-K-China-Fresh-Mail-Access-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Alleged distribution of educational institution credential lists
    Category: Combo List
    Content: Threat actor CODER is distributing credential lists targeting educational institutions through Telegram channels, offering free access to combolists and related programs.
    Date: 2026-04-14T16:21:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72076/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: A threat actor shared a list containing 3,300 allegedly valid Japanese email credentials on an underground forum. The actor claims the credentials are of top quality and dated April 14th.
    Date: 2026-04-14T16:21:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72077/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.1 million Hotmail email and password combinations on a cybercrime forum. The credentials are claimed to be from fresh leaks and are being distributed for free.
    Date: 2026-04-14T16:21:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72078/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  98. Alleged leak of Chinese email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 1,900 Chinese email credentials dated April 14th. The credentials appear to be fresh mail access data targeting Chinese users.
    Date: 2026-04-14T16:20:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72079/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged sale of stolen credentials via Raccoon Stealer logs from Netherlands
    Category: Logs
    Content: Threat actor KazeFreak advertises 1,000 credential logs stolen via Raccoon Stealer v2 malware from Netherlands-based Windows Server 2019 systems running Edge browser. The logs contain credentials, cookies, and autofill data but exclude crypto wallets.
    Date: 2026-04-14T16:19:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-URL-LOGIN-PASS-Raccoon-Stealer-1000-logs-NL
    Screenshots:
    None
    Threat Actors: KazeFreak
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged sale of UAE business owners database
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing personal information of UAE business owners including names, phone numbers, and business classifications across major Emirates cities including Dubai, Abu Dhabi, and Sharjah.
    Date: 2026-04-14T16:19:44Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Business-Owners-United-Arab-Emirates-417k-contacts
    Screenshots:
    None
    Threat Actors: Solana0011
    Victim Country: United Arab Emirates
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged sale of Italian identity document database
    Category: Data Breach
    Content: Threat actor MirrorHub is allegedly selling a database containing identity documents and selfies for 2,500 Italian citizens for $120. The data includes passports, drivers licenses, ID cards, and selfie photos with documents.
    Date: 2026-04-14T16:19:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-For-Sale-Database-of-Documents-ITALY-2-5%D0%BA-Kits-GEO-ITALY-DL-ID-Pass-Selfie
    Screenshots:
    None
    Threat Actors: MirrorHub
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Alleged data breach of Municipality of Miracatu government database
    Category: Data Breach
    Content: Threat actor is selling access to the Municipality of Miracatu government database for $100. The compromised data includes financial records, credentials, and procurement information from the Brazilian municipal government website.
    Date: 2026-04-14T15:58:37Z
    Network: openweb
    Published URL: https://breached.st/threads/municipality-of-miracatu-government-of-brazil.85998/unread
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: Municipality of Miracatu
    Victim Site: miracatu.sp.gov.br
  103. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Actor shared a combolist containing 2,877 validated email and password combinations described as UHQ (Ultra High Quality) mix including Hotmail and private cloud credentials.
    Date: 2026-04-14T15:57:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2877-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged leak of US email credentials combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 1,400 allegedly valid US email credentials on an underground forum. The credentials are described as having full mail access and are dated April 14th.
    Date: 2026-04-14T15:56:24Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-1-4K-Usa-Full-Valid-MaIL-Access-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged leak of Hotmail credentials and mixed email combolist
    Category: Combo List
    Content: Threat actor noir shared a combolist containing Hotmail credentials and mixed email accounts through Telegram. The post advertises valid high-quality credentials but requires forum registration to view details.
    Date: 2026-04-14T15:56:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72073/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Hotmail
    Victim Site: hotmail.com
  106. Alleged leak of USA email credentials
    Category: Combo List
    Content: A threat actor leaked approximately 1,400 valid email credentials from USA-based accounts on a cybercriminal forum. The credentials appear to be current as of April 14th and are being distributed for free to registered forum members.
    Date: 2026-04-14T15:56:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72074/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Alleged leak of Gmail credentials
    Category: Combo List
    Content: Threat actor D4rkNetHub shared a combolist containing 1 million Gmail credentials on a cybercriminal forum. The post content is restricted to registered forum members.
    Date: 2026-04-14T15:55:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72075/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  108. Website defacement of webuikits.com by QATAR911
    Category: Defacement
    Content: QATAR911 threat actor defaced webuikits.com on April 14, 2026. The attack targeted a web UI development platform, compromising content in the WordPress uploads directory.
    Date: 2026-04-14T15:48:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832972
    Screenshots:
    None
    Threat Actors: QATAR911, QATAR911
    Victim Country: Unknown
    Victim Industry: Technology/Web Services
    Victim Organization: WebUIKits
    Victim Site: webuikits.com
  109. Alleged leak of German email credentials
    Category: Logs
    Content: A threat actor shared a combolist containing 43,000 German email credentials with full mail access on a cybercrime forum.
    Date: 2026-04-14T15:44:35Z
    Network: openweb
    Published URL: https://xforums.st/threads/43k-germany-full-mail-access-top-quality-14-04.608279/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor allegedly made available a combolist containing 43,000 German email credentials with full mail access. The post was shared on a cybercriminal forum specializing in credential lists.
    Date: 2026-04-14T15:30:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-43K-Germany-Full-Mail-Access-Top-Quality-14-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  111. Alleged distribution of mixed stealer logs containing credentials
    Category: Combo List
    Content: Threat actor fatetraffic distributed a collection of 1,385 mixed stealer logs through a file sharing platform. The logs appear to contain stolen credentials and related data harvested by information stealing malware.
    Date: 2026-04-14T15:29:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72070/
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 43,000 German email credentials with full mail access, posted on a cybercrime forum on April 14th.
    Date: 2026-04-14T15:28:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72071/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Alleged distribution of mixed corporate credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing an 11 million record credential combolist containing mixed corporate credentials through Telegram channels. The actor operates free Telegram groups for sharing credential lists and related tools.
    Date: 2026-04-14T15:28:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72072/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  114. Alleged distribution of mixed stealer logs by FateTraffic
    Category: Logs
    Content: Threat actor fatetraffic distributed a collection of 1,385 mixed stealer logs via file sharing platform, containing stolen credentials and browser data from information stealing malware.
    Date: 2026-04-14T15:27:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%93%97-FATETRAFFIC-1385-MIX-14-04-2026-STEALER-LOGS
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Alleged data breach of French ANTS government agency database for sale
    Category: Data Breach
    Content: Threat actor EvilDump claims to be selling a database containing 18 million records from the French ANTS government agency. The data allegedly includes full names, contact details, birth information, addresses, and account metadata with government-verified identities.
    Date: 2026-04-14T15:26:51Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-FR-ANTS-Database-18M
    Screenshots:
    None
    Threat Actors: EvilDump
    Victim Country: France
    Victim Industry: Government
    Victim Organization: ANTS (Agence Nationale des Titres Sécurisés)
    Victim Site: Unknown
  116. ⎝ 2500 ⎠ MIXMAIL FRESH UHQ✨GOODTIMES CLOUD
    Category: Combo List
    Content: New thread posted by Lexser: ⎝ 2500 ⎠ MIXMAIL FRESH UHQ✨GOODTIMES CLOUD
    Date: 2026-04-14T15:06:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72064/
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample containing 680 Hotmail credentials on a cybercriminal forum. The credentials appear to be offered as a free download sample, likely to demonstrate the quality of a larger dataset.
    Date: 2026-04-14T15:06:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72066/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  118. MIX Unique Combo_5_20000
    Category: Combo List
    Content: New thread posted by UniqueCombo: MIX Unique Combo_5_20000
    Date: 2026-04-14T15:06:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72067/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  119. [700x] ⭐⭐ FRESH HQ HOTMAIL ⭐⭐
    Category: Combo List
    Content: New thread posted by KiwiShio: [700x] ⭐⭐ FRESH HQ HOTMAIL ⭐⭐
    Date: 2026-04-14T15:05:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72068/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  120. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Actor NightFall shared a combolist containing 8,700 mixed email and password combinations via an external paste service. The credentials are described as fresh and high quality.
    Date: 2026-04-14T15:05:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72069/
    Screenshots:
    None
    Threat Actors: NightFall
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. École Supérieure de Génie Biomédical et des Techniques de Santé MOROCCO DB
    Category: Alert
    Content: New thread posted by xNov: École Supérieure de Génie Biomédical et des Techniques de Santé MOROCCO DB
    Date: 2026-04-14T15:04:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-%C3%89cole-Sup%C3%A9rieure-de-G%C3%A9nie-Biom%C3%A9dical-et-des-Techniques-de-Sant%C3%A9-MOROCCO-DB
    Screenshots:
    None
    Threat Actors: xNov
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  122. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 14,516 allegedly valid email and password combinations on a cybercrime forum. The credentials are described as high quality mail access.
    Date: 2026-04-14T14:44:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-14-516-HQ-Mail-Access-Valid-txt
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  123. Alleged leak of HQ Mix credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist titled X1842 HQ Mix on a cybercriminal forum. The post requires registration to view the hidden content containing the credential list.
    Date: 2026-04-14T14:43:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1842-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged leak of mixed countries email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 7,129 email credentials from mixed countries, making it available as a free download on a cybercriminal forum.
    Date: 2026-04-14T14:42:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72063/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  125. Website defacement of Bobco Metal by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the Bobco Metal company website on April 14, 2026. The attack targeted a specific subdirectory of the companys media content rather than the homepage.
    Date: 2026-04-14T14:35:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832968
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing/Metal Industry
    Victim Organization: Bobco Metal
    Victim Site: www.bobcometal.com
  126. Alleged leak of Hotmail credentials
    Category: Logs
    Content: A threat actor allegedly leaked a combolist containing 46,000 Hotmail email credentials described as fresh access.
    Date: 2026-04-14T14:33:16Z
    Network: openweb
    Published URL: https://xforums.st/threads/46k-hotmail-fresh-access.607098/
    Screenshots:
    None
    Threat Actors: Vekkoo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  127. Alleged leak of mixed credential combolist containing 50,956 records
    Category: Combo List
    Content: Threat actor stormtrooper shared a fresh mixed combolist containing 50,956 email and password combinations on DemonForums. The credentials appear to be from various sources and are being distributed for free.
    Date: 2026-04-14T14:23:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-50-956-Lines-Fresh-Mix-Combolist
    Screenshots:
    None
    Threat Actors: stormtrooper
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged leak of Yahoo gaming and shopping credentials
    Category: Combo List
    Content: Threat actor shared a combolist containing approximately 1.9 million credential pairs targeting Yahoo users involved in gaming and shopping activities. The data was made available for free download via cloud storage.
    Date: 2026-04-14T14:22:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72061/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  129. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a fresh mixed combolist containing 50,956 credential pairs on a cybercrime forum. The actor promoted their Telegram channel for additional content distribution.
    Date: 2026-04-14T14:21:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72062/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged distribution of proxy scraping tool X0 Proxy Scraper V2
    Category: Initial Access
    Content: A cybercriminal shared X0 Proxy Scraper V2, a tool designed for scraping and filtering proxy lists across multiple protocols including HTTP/S, SOCKS4, and SOCKS5. The tool is promoted as useful for automation and feeding other tools that require fresh proxy lists for potentially malicious activities.
    Date: 2026-04-14T13:54:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-X0-Proxy-Scraper-V2-by-ManiacX0
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Alleged distribution of Matrix AIO credential checking tool
    Category: Initial Access
    Content: Threat actor shares Matrix AIO Checker, a multi-platform credential validation tool with 100+ modules targeting Steam, Disney, Yahoo, Call of Duty and other major platforms. The tool processes large credential datasets and provides real-time validation statistics for automated credential stuffing operations.
    Date: 2026-04-14T13:54:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Matrix-AIO-Checker
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Multiple platforms including Steam, Disney, Yahoo, Call of Duty
    Victim Site: Unknown
  132. Alleged distribution of PayPal credential combolist
    Category: Combo List
    Content: Threat actor distributing a PayPal credential combolist containing 11 million entries through Telegram channels, offering free access to the compromised credentials.
    Date: 2026-04-14T13:53:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72060/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: PayPal
    Victim Site: paypal.com
  133. Alleged data breach of ANDE Paraguay government database
    Category: Data Breach
    Content: Threat actor claims to possess a database from Paraguays ANDE government website containing 50,000 records with personal information including names, emails, phone numbers, addresses, and customer service messages. The data is offered in CSV-SQL format with sample records showing customer complaints and service requests.
    Date: 2026-04-14T13:52:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-www-ande-gov-py-Database-Paraguay-50K
    Screenshots:
    None
    Threat Actors: camillaDF
    Victim Country: Paraguay
    Victim Industry: Government
    Victim Organization: ANDE
    Victim Site: ande.gov.py
  134. Alleged sale of initial access to multiple financial services organizations
    Category: Initial Access
    Content: Threat actor KazeFreak advertised 500 new listings including initial access to financial services organizations across Czech Republic, Sweden, Portugal, Brazil, and United States. Access methods include RDP, RMM, SSH, webshells, and VPN with varying privilege levels and revenue ranges from unknown to $1 billion.
    Date: 2026-04-14T13:52:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Financial-Services-Access
    Screenshots:
    None
    Threat Actors: KazeFreak
    Victim Country: Multiple
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Alleged data breach of Zadig & Voltaire customer database
    Category: Data Breach
    Content: Threat actor jza1337 claims to possess a Zadig & Voltaire customer database containing over 500,000 records with first name, last name, email, and gender information. The data is being made available for download on a dark web forum.
    Date: 2026-04-14T13:51:59Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FR-ZADIG-VOLTAIRE-500K
    Screenshots:
    None
    Threat Actors: jza1337
    Victim Country: France
    Victim Industry: Retail/Fashion
    Victim Organization: Zadig & Voltaire
    Victim Site: Unknown
  136. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a list containing 3,782 Hotmail email credentials on a cybercrime forum. The credentials appear to be distributed as a free download to registered forum users.
    Date: 2026-04-14T13:32:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72055/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  137. Alleged distribution of VIP ULP 4 combolist by threat actor zod
    Category: Combo List
    Content: Threat actor zod shared a credential list labeled VIP ULP 4 on CrackingX forum in the combolists section. Access details are provided through a Telegram channel.
    Date: 2026-04-14T13:32:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72056/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Mass defacement campaign by Zod targeting apreal.in
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting apreal.in on April 14, 2026. The attack was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-14T13:28:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248507
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: apreal.in
  139. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The threat actor known as Zod conducted a mass defacement campaign targeting multiple websites including dtekarnic.org on April 14, 2026. The attack targeted a Linux-based server and was part of a broader mass defacement operation rather than a targeted attack.
    Date: 2026-04-14T13:28:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248511
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dtekarnic.org
  140. Mass website defacement campaign by Zod targeting farmgreenvalley.com
    Category: Defacement
    Content: The threat actor known as Zod conducted a mass defacement campaign targeting multiple websites including farmgreenvalley.com on April 14, 2026. The attack affected a Linux-hosted agricultural website as part of a broader defacement operation.
    Date: 2026-04-14T13:27:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248512
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Agriculture
    Victim Organization: Farm Green Valley
    Victim Site: farmgreenvalley.com
  141. Website defacement of Outreach Recruitment by Zod
    Category: Defacement
    Content: The attacker known as Zod successfully defaced the Outreach Recruitment website on April 14, 2026. The defacement targeted a recruitment companys online presence, compromising their web infrastructure hosted on cloud services.
    Date: 2026-04-14T13:27:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248505
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Human Resources/Recruitment
    Victim Organization: Outreach Recruitment
    Victim Site: outreachrecruitment.net
  142. Mass defacement campaign by Zod targeting ucesap.in
    Category: Defacement
    Content: The threat actor known as Zod conducted a mass defacement campaign targeting ucesap.in on April 14, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-14T13:26:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248518
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ucesap.in
  143. Mass website defacement campaign by Zod targeting cbseonline.co.in
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting cbseonline.co.in, an Indian educational website related to the Central Board of Secondary Education. The attack occurred on April 14, 2026 and was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-14T13:26:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248510
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Education
    Victim Organization: CBSE Online
    Victim Site: cbseonline.co.in
  144. Mass defacement targeting eckmart.in by Zod
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting the Indian e-commerce website eckmart.in on April 14, 2026. This was part of a broader mass defacement operation rather than a targeted attack on a single site.
    Date: 2026-04-14T13:25:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248519
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: E-commerce
    Victim Organization: Eckmart
    Victim Site: eckmart.in
  145. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The threat actor known as Zod conducted a mass defacement campaign targeting multiple websites including svspdc.in. The attack occurred on April 14, 2026 and affected Linux-based servers as part of a broader defacement operation.
    Date: 2026-04-14T13:25:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248516
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: svspdc.in
  146. Website defacement of 123po.vn by Zod
    Category: Defacement
    Content: The threat actor Zod successfully defaced the website 123po.vn on April 14, 2026. The attack targeted a Linux-based server and resulted in the compromise of a specific page on the Vietnamese domain.
    Date: 2026-04-14T13:24:42Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248504
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 123po.vn
  147. Website defacement of Brand Education by Zod
    Category: Defacement
    Content: The attacker known as Zod successfully defaced the Brand Education website on April 14, 2026. The compromised site was running on a Linux server and the defacement was archived for documentation purposes.
    Date: 2026-04-14T13:24:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248506
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Brand Education
    Victim Site: brandeducation.in
  148. Mass defacement campaign by Zod threat actor targeting tejahomes.com
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting tejahomes.com on April 14, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-14T13:23:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248517
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Teja Homes
    Victim Site: tejahomes.com
  149. Mass website defacement campaign by Zod targeting inbhu.in
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting the Banaras Hindu University website. The attack occurred on April 14, 2026, affecting a Linux-based server hosting the educational institutions web presence.
    Date: 2026-04-14T13:22:59Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248513
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Banaras Hindu University
    Victim Site: inbhu.in
  150. Mass website defacement by Zod targeting bnkfarmfoods.com
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting multiple websites including bnkfarmfoods.com on April 14, 2026. The attack compromised a Linux-based server and was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-14T13:22:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248509
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Food & Agriculture
    Victim Organization: BNK Farm Foods
    Victim Site: bnkfarmfoods.com
  151. Mass defacement campaign by Zod targeting construction company website
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting the Prime Builders construction company website. This was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-14T13:21:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248515
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Construction
    Victim Organization: Prime Builders
    Victim Site: primebuilders.apreal.in
  152. Mass defacement campaign targeting educational institutions by Zod
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting multiple websites including the Bangalore University Online portal. This incident was part of a broader defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-14T13:21:18Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248508
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Bangalore University Online
    Victim Site: bangaloreuniversityonline.com
  153. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting multiple websites including PNR Organics. The attack occurred on April 14, 2026, affecting a Linux-based web server hosting the organic products companys website.
    Date: 2026-04-14T13:20:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248514
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Agriculture/Organic Products
    Victim Organization: PNR Organics
    Victim Site: pnrorganics.com
  154. Alleged sale of forged identity documents and personal data services
    Category: Data Breach
    Content: Threat actor offers forged identity documents including passports, driver licenses, and ID cards for USA and EU, along with personal information services including SSN, addresses, phone numbers, and associated data. Services appear to target identity verification systems.
    Date: 2026-04-14T13:06:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Offering-ID-DOCUMENTS-4-VERIFICATIONS
    Screenshots:
    None
    Threat Actors: Koolpp
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample combolist containing 780 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-14T13:05:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72054/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  156. Alleged data breach of Nigeria Corporate Affairs Commission
    Category: Data Breach
    Content: Threat actor claims to have downloaded 25 million documents from Nigerias Corporate Affairs Commission infrastructure. 750GB of data is offered for free download while remaining data is sold separately.
    Date: 2026-04-14T13:04:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-NIGERIA-GOV-Corporate-Affairs-Commission
    Screenshots:
    None
    Threat Actors: ByteToBreach
    Victim Country: Nigeria
    Victim Industry: Government
    Victim Organization: Corporate Affairs Commission
    Victim Site: Unknown
  157. Alleged sale of gift certificates for multiple e-commerce platforms
    Category: Initial Access
    Content: Threat actor EastEow is allegedly selling electronic gift certificates for major retailers including ASOS, Adidas, eBay, Amazon, Walmart, Target, and Steam. The actor claims to offer certificates at prices much lower than other suppliers and is seeking long-term cooperation with regular buyers.
    Date: 2026-04-14T12:45:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-ASOS-Ozon-Adidas-Eldorado-Ebay-Amazon-Walmart-Target-Steam–200388
    Screenshots:
    None
    Threat Actors: EastEow
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Multiple retailers
    Victim Site: Unknown
  158. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 7,900 mixed email and password combinations on a cybercrime forum as hidden content requiring registration to access.
    Date: 2026-04-14T12:44:54Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-7900x-MIX-MAIL
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: User NotSellerxd shared a mixed email combolist containing approximately 7.9 million credentials for free download on CrackingX forum.
    Date: 2026-04-14T12:43:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72050/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. Alleged distribution of credential combolist containing 20,000 records
    Category: Combo List
    Content: A threat actor allegedly shared a unique credential combolist containing 20,000 records on a cybercriminal forum specializing in stolen credentials and financial data.
    Date: 2026-04-14T12:42:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72051/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged leak of credential combolist containing URL-login-password combinations
    Category: Combo List
    Content: A credential combolist containing 1 million URL-login-password combinations was allegedly made available for free download on a cybercriminal forum. The data appears to be from April 2026 based on the filename timestamp.
    Date: 2026-04-14T12:42:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72052/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged data leak of Spanish Wind Energy Association (AEE)
    Category: Data Leak
    Content: User s1ethx7z shared alleged data from the Spanish Wind Energy Association containing user profiles, messages, calendar data, private files, reports, preferences, and courses. The data is being distributed for free via file sharing and Telegram channels.
    Date: 2026-04-14T11:55:28Z
    Network: openweb
    Published URL: https://breached.st/threads/aee-aeeolica.85996/unread
    Screenshots:
    None
    Threat Actors: s1ethx7z
    Victim Country: Spain
    Victim Industry: Energy
    Victim Organization: Spanish Wind Energy Association (AEE)
    Victim Site: Unknown
  163. Alleged distribution of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a mixed combolist containing 35,965 credential pairs on a cybercrime forum. The data is protected with a password available through a Telegram channel.
    Date: 2026-04-14T11:53:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72048/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Alleged leak of corporate email credentials targeting business organizations
    Category: Combo List
    Content: A combolist containing 193,768 email and password combinations allegedly targeting corporate business accounts has been made available for download. The credentials are described as suitable for SMTP spam operations against business entities.
    Date: 2026-04-14T11:53:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72049/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged data leak of Spanish Wind Energy Association (AEE)
    Category: Data Leak
    Content: Actor leaked database contents from the Spanish Wind Energy Association containing user profiles, messages, calendar data, private files, reports, preferences, and course information. The data is being distributed for free download on cybercrime forums.
    Date: 2026-04-14T11:26:17Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DOCUMENTS-AEE-aeeolica-org
    Screenshots:
    None
    Threat Actors: s1ethx7z
    Victim Country: Spain
    Victim Industry: Energy
    Victim Organization: Spanish Wind Energy Association (AEE)
    Victim Site: aeeolica.org
  166. Alleged leak of Russian government officials data
    Category: Data Leak
    Content: Personal information of Russian government officials and executives including names, titles, companies, phone numbers and email addresses was leaked on a cybercrime forum. The data appears to contain contact details for individuals in various Russian organizations including energy companies and government-related entities.
    Date: 2026-04-14T11:08:27Z
    Network: openweb
    Published URL: https://breached.st/threads/russian-ministry-governments-data.85994/unread
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Alleged leak of French Ministry government database
    Category: Data Leak
    Content: User spider321 shared samples from an alleged French Ministry government database containing structured data about government commissioners, nominations, and administrative council information including personal details and organizational assignments.
    Date: 2026-04-14T11:07:54Z
    Network: openweb
    Published URL: https://breached.st/threads/french-ministry-government-db.85995/unread
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Ministry
    Victim Site: Unknown
  168. Alleged data leak of Russian government officials and corporate executives
    Category: Data Leak
    Content: Forum user spider321 leaked personal information of Russian government officials and corporate executives including names, titles, companies, phone numbers, and email addresses. The data appears to contain contact details for individuals associated with Russian ministries and various Russian companies including energy sector organizations.
    Date: 2026-04-14T11:07:03Z
    Network: openweb
    Published URL: https://breached.st/threads/russian-ministry-governments-data.85992/unread
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: Russia
    Victim Industry: Government
    Victim Organization: Russian Ministry
    Victim Site: Unknown
  169. Alleged leak of French Ministry government database
    Category: Data Leak
    Content: Actor shared samples from an alleged French Ministry government database containing structured data on government commissioners and administrative council appointments. The data includes personal information, organizational appointments, and official government references from JORF (Official Journal of the French Republic).
    Date: 2026-04-14T11:06:31Z
    Network: openweb
    Published URL: https://breached.st/threads/french-ministry-government-db.85993/unread
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Ministry
    Victim Site: Unknown
  170. Alleged distribution of Hunter Mix Mail Inboxer cracking tool
    Category: Initial Access
    Content: A forum user is distributing a reversed and cleaned version of the Hunter Mix Mail Inboxer tool through multiple download mirrors. The tool appears to be designed for email account access or credential harvesting purposes.
    Date: 2026-04-14T11:05:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Hunter-Mix-Mail-Inboxer-Reversed-and-Cleaned-By-XMRjr
    Screenshots:
    None
    Threat Actors: makitabosch
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,600 allegedly valid Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-14T11:04:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1600x-HQ-Valid-Hotmails
    Screenshots:
    None
    Threat Actors: Sellerxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  172. Mass website defacement by BABAYO EROR SYSTEM targeting Vietnamese sites
    Category: Defacement
    Content: The threat group BABAYO EROR SYSTEM conducted a mass defacement campaign targeting multiple websites including caitaonhahanoi.com.vn. The attack was carried out by an individual identified as Mr.XycanKing on April 14, 2026.
    Date: 2026-04-14T11:02:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248503
    Screenshots:
    None
    Threat Actors: Mr.XycanKing, BABAYO EROR SYSTEM
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: caitaonhahanoi.com.vn
  173. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 43,000 email credentials described as good mail access mixed on a cybercrime forum.
    Date: 2026-04-14T10:35:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72045/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Alleged leak of credential combolist containing 20,000 records
    Category: Combo List
    Content: A threat actor allegedly shared a credential combolist containing 20,000 unique records on an underground forum. The post content is hidden behind authentication requirements.
    Date: 2026-04-14T10:35:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72046/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Alleged leak of Doxbin source code
    Category: Data Leak
    Content: User claims to have leaked the source code of Doxbin, though notes that critical files are missing and the code is non-functional. The source code is being distributed for free on the forum.
    Date: 2026-04-14T10:09:29Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SOURCE-CODE-DOXBIN-LEAKED-SOURCE
    Screenshots:
    None
    Threat Actors: 503
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Doxbin
    Victim Site: Unknown
  176. Alleged leak of Hotmail credentials
    Category: Logs
    Content: Threat actor D4rkNetHub shared a collection of 194 Hotmail credentials on a cybercrime forum. The credentials are described as good suggesting they are valid and functional.
    Date: 2026-04-14T10:01:08Z
    Network: openweb
    Published URL: https://xforums.st/threads/194-good-hotmail-goods-d4rknethub-cloud-14-04-26.606936/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  177. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor D4rkNetHub shared a combolist containing 194 Hotmail email and password combinations on cybercriminal forum. The actor also promotes their premium cloud service for accessing additional credential data.
    Date: 2026-04-14T09:49:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-194-Good-HOTMAIL-GOODS-D4RKNETHUB-CLOUD-14-04-26
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  178. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: Forum user D4rkNetHub shared 194 Hotmail credentials on CrackingX forum. The data appears to be distributed as a free leak rather than sold.
    Date: 2026-04-14T09:48:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72040/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  179. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: User klyne05 shared Hotmail credentials on CrackingX forum, claiming they are private, fresh, and checked. The post appears to offer free download of the credential list.
    Date: 2026-04-14T09:48:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72041/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  180. Alleged leak of German social media and e-commerce credentials
    Category: Combo List
    Content: Threat actor shared a combolist containing over 822,000 credentials allegedly targeting German social media and shopping platforms. The data was made available as a free download via file sharing service.
    Date: 2026-04-14T09:47:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72044/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 Hotmail email and password combinations through a free download link on a cybercrime forum.
    Date: 2026-04-14T09:25:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-HQ-HOTMAIL–200377
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  182. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Threat actor snowstormxd shared a free download link to a FRESH MIX MAIL credential list on a cybercriminal forum. The combolist is being distributed for free via Pasteview and Telegram channels.
    Date: 2026-04-14T09:23:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72038/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  183. Alleged leak of credentials from multiple platforms including PSN, PayPal, Amazon, Twitter, Facebook, and Bitcoin services
    Category: Combo List
    Content: Threat actor distributing credential lists allegedly containing login data from PSN, PayPal, Amazon, Twitter, Facebook, and Bitcoin services through Telegram channels. The combolist contains approximately 11 million credential pairs and is being distributed for free through dedicated Telegram groups.
    Date: 2026-04-14T09:23:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72039/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Alleged sale of access to US prepaid mobile carrier with 3 million customer records
    Category: Data Breach
    Content: Threat actor claims to be selling administrative access to a US prepaid mobile phone carrier system along with a database containing 3 million customer records including personal information, account details, and device data for $75,000 in Monero cryptocurrency.
    Date: 2026-04-14T09:22:24Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-USA-Prepaid-Mobile-Phone-Carrier
    Screenshots:
    None
    Threat Actors: TheAuditors
    Victim Country: United States
    Victim Industry: Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 38,000 valid email credentials on a cybercrime forum. The credentials are being distributed for free download through a paste sharing service.
    Date: 2026-04-14T08:57:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-38K-VALID-MAIL-ACCESS–200373
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 3.8K mixed email credentials via file sharing service. The credentials appear to be from various sources and are being distributed for free download.
    Date: 2026-04-14T08:56:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72036/
    Screenshots:
    None
    Threat Actors: Kommander0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  187. Alleged request for log files on Swedish cybercriminal forum
    Category: Combo List
    Content: Forum user posted in Swedish requesting tips on where to find new log files, likely referring to stealer logs containing credentials and sensitive data.
    Date: 2026-04-14T08:55:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72037/
    Screenshots:
    None
    Threat Actors: Zxhuwu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. MIX Unique Combo_2_20000
    Category: Logs
    Content: New thread posted by UniqueCombo: MIX Unique Combo_2_20000
    Date: 2026-04-14T08:46:53Z
    Network: openweb
    Published URL: https://xforums.st/threads/mix-unique-combo_2_20000.606929/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. ❄️❄️ 1567x PREMIUM HOTMAIL HITS ❄️❄️
    Category: Combo List
    Content: New thread posted by alphaxdd: ❄️❄️ 1567x PREMIUM HOTMAIL HITS ❄️❄️
    Date: 2026-04-14T08:34:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1567x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a collection of 1,567 allegedly valid Hotmail credentials through a free download. The credentials are described as premium hits from a private cloud source.
    Date: 2026-04-14T08:32:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72034/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  191. MIX Unique Combo_2_20000
    Category: Combo List
    Content: New thread posted by UniqueCombo: MIX Unique Combo_2_20000
    Date: 2026-04-14T08:32:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72035/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Viewcaller 6.8 M Russia
    Category: Alert
    Content: New thread posted by Tendi: Viewcaller 6.8 M Russia
    Date: 2026-04-14T08:30:43Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Viewcaller-6-8-M-Russia
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Mass website defacement campaign by PredixorX/XSQDD PHILIPPINE targeting soundforce.co.in
    Category: Defacement
    Content: The threat actor PredixorX from the XSQDD PHILIPPINE team conducted a mass defacement campaign targeting SoundForces website on April 14, 2026. The attack compromised a Windows Server 2016 system as part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-14T07:53:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248502
    Screenshots:
    None
    Threat Actors: PredixorX, XSQDD PHILIPPINE
    Victim Country: India
    Victim Industry: Technology/Audio Equipment
    Victim Organization: SoundForce
    Victim Site: www.soundforce.co.in
  194. Alleged leak of German credential combolist
    Category: Combo List
    Content: A credential combolist containing 429,608 lines targeting German users has been made available for free download. The combolist appears to contain mixed credentials from various sources.
    Date: 2026-04-14T07:46:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72032/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  195. Alleged distribution of office-related credential combos via Telegram
    Category: Combo List
    Content: Threat actor CODER is distributing a 3 million record office-related credential combolist through Telegram channels. The actor operates multiple Telegram groups offering free credential lists and programs.
    Date: 2026-04-14T07:46:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72033/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Mass defacement campaign by XSQDD PHILIPPINE targeting environmental organizations
    Category: Defacement
    Content: XSQDD PHILIPPINE conducted a mass defacement campaign targeting environmental websites including growgreencampaign.com on April 14, 2026. The attack was carried out by threat actor PredixorX as part of a coordinated campaign affecting multiple sites.
    Date: 2026-04-14T07:36:37Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248501
    Screenshots:
    None
    Threat Actors: PredixorX, XSQDD PHILIPPINE
    Victim Country: Unknown
    Victim Industry: Environmental/Non-profit
    Victim Organization: Grow Green Campaign
    Victim Site: growgreencampaign.com
  197. Website defacement of Green Campaign organization by PredixorX/XSQDD PHILIPPINE
    Category: Defacement
    Content: PredixorX, associated with XSQDD PHILIPPINE team, conducted a home page defacement of the Grow Green Campaign website on April 14, 2026. This was an isolated defacement targeting an environmental organizations web presence.
    Date: 2026-04-14T07:34:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832944
    Screenshots:
    None
    Threat Actors: PredixorX, XSQDD PHILIPPINE
    Victim Country: Unknown
    Victim Industry: Environmental/Non-profit
    Victim Organization: Grow Green Campaign
    Victim Site: growgreencampaign.com
  198. Alleged leak of Ukraine customs database
    Category: Data Leak
    Content: A threat actor shared a Ukraine customs database from March 2026 containing 930,000 records with detailed customs declaration information including company data, trade details, and financial information.
    Date: 2026-04-14T07:18:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-UIkraine-customs-03-2026-930k
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Ukraine
    Victim Industry: Government
    Victim Organization: Ukraine Customs Service
    Victim Site: Unknown
  199. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,356 Hotmail email and password combinations on a cybercrime forum. The credentials are described as high quality and appear to be distributed for free.
    Date: 2026-04-14T06:59:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1356-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  200. Alleged leak of email credential combos from multiple providers
    Category: Combo List
    Content: Threat actor distributing free credential combos containing 5 million email:password combinations from Hotmail, Gmail and other providers across multiple countries including France, Germany, Italy, UK, and Israel through Telegram channels.
    Date: 2026-04-14T06:57:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72030/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple Email Providers
    Victim Site: Unknown
  201. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing Hotmail email and password credentials on a cybercrime forum. The post appears to offer free download of the credential list without any payment required.
    Date: 2026-04-14T06:57:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72031/
    Screenshots:
    None
    Threat Actors: stevee36
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  202. Alleged leak of Telmex credentials
    Category: Data Leak
    Content: Forum user Z3r00 and MagoSpeak leaked a credential dump allegedly from Telmex MX containing 214,418 records with URLs, usernames, and passwords. The actors claim to target the Mexican government and plan to release more Mexican government data.
    Date: 2026-04-14T06:56:34Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-COLLECTION-CREDENTIAL-DUMP-TELMEX-MX-214-418
    Screenshots:
    None
    Threat Actors: Z3r00
    Victim Country: Mexico
    Victim Industry: Telecommunications
    Victim Organization: Telmex
    Victim Site: Unknown
  203. Alleged leak of mixed credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 58,000 mixed email and password combinations through a free download link on a cybercrime forum.
    Date: 2026-04-14T06:34:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-58K-MIXED-ACCESS
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  204. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Threat actor COYTO shared a combolist containing 63,000 valid mixed email and password combinations through a free download link on cybercriminal forums.
    Date: 2026-04-14T06:34:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-63K-VALID-MIX-MAIL
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  205. Alleged data breach of LogisHotels France loyalty program
    Category: Data Breach
    Content: Threat actor HexDex claims to be selling personal data of 598,154 LogisHotels loyalty program members covering bookings from 2012 to 2026. The data allegedly includes client identity information, contact details, addresses, loyalty program data, payment transactions, and authentication credentials.
    Date: 2026-04-14T06:33:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FR-600K-Logis-H%C3%B4tels-France
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Hospitality
    Victim Organization: LogisHotels
    Victim Site: logishotels.com
  206. Alleged leak of mixed credential combolist
    Category: Logs
    Content: A threat actor shared a mixed credential combolist containing 20,000 unique email and password combinations on an underground forum.
    Date: 2026-04-14T06:23:43Z
    Network: openweb
    Published URL: https://xforums.st/threads/mix-unique-combo_1_20000.606922/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  207. Alleged distribution of credential combolist containing 20,000 records
    Category: Combo List
    Content: Forum user UniqueCombo shared a credential combolist containing 20,000 unique email and password combinations on the CrackingX forum.
    Date: 2026-04-14T06:13:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72029/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged data breach of Blackline
    Category: Data Breach
    Content: Threat actor TheAuditors is allegedly selling 354.4GB of data containing approximately 1,532,718 documents processed by Blackline for their high-profile clients. The documents reportedly include bills, licenses, certificates and other client materials.
    Date: 2026-04-14T05:49:04Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-354GB-Blackline-com-Breach-2026
    Screenshots:
    None
    Threat Actors: TheAuditors
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Blackline
    Victim Site: blackline.com
  209. Alleged data breach of Xtium involving 485.8TB of client data
    Category: Data Breach
    Content: Threat actor TheAuditors claims to have breached Xtium (formerly ATSG), a managed service provider, obtaining 485.8TB of data including 480TB of client virtual machine backups from Veeam and 5.8TB of TeamShares data. The actor is selling the data after failed ransom negotiations.
    Date: 2026-04-14T05:48:48Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-485-8TB-Xtium-com-Breach-2026
    Screenshots:
    None
    Threat Actors: TheAuditors
    Victim Country: Unknown
    Victim Industry: Information Technology
    Victim Organization: Xtium
    Victim Site: Xtium.com
  210. Alleged data breach of Goldapple.ru database
    Category: Data Breach
    Content: Actor claims to have obtained a database from Goldapple.ru containing 4 million records with personal and shipping information including names, addresses, phone numbers, emails, and order details. The data includes many duplicate addresses and phone numbers.
    Date: 2026-04-14T05:48:39Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Goldapple-ru-4-M
    Screenshots:
    None
    Threat Actors: Tendi
    Victim Country: Russia
    Victim Industry: Retail/E-commerce
    Victim Organization: Goldapple
    Victim Site: goldapple.ru
  211. Alleged leak of corporate email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 113,101 email and password combinations allegedly from corporate mail accounts with SMTP hits available for free download.
    Date: 2026-04-14T05:27:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72028/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  212. Website defacement of SMK Smart Al-Muhsin school by Irene/XmrAnonye.id team
    Category: Defacement
    Content: The XmrAnonye.id team, represented by attacker Irene, successfully defaced the website of SMK Smart Al-Muhsin, an Indonesian educational institution. The defacement occurred on April 14, 2026, targeting the schools subdomain.
    Date: 2026-04-14T05:17:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248500
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: SMK Smart Al-Muhsin
    Victim Site: www.indocentris.smksmart-almuhsin.sch.id
  213. Alleged leak of Farmacias del Ahorro credentials
    Category: Data Leak
    Content: Threat actors Z3r00 and MagoSpeak leaked a credential list containing 18,530 email and password combinations associated with Mexican pharmacy chain Farmacias del Ahorro. The leak includes URLs for system access and was distributed for free via file sharing service.
    Date: 2026-04-14T05:00:03Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-COLLECTION-FARMACIAS-DEL-AHORRO-MX-18-530
    Screenshots:
    None
    Threat Actors: Z3r00
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: Farmacias del Ahorro
    Victim Site: Unknown
  214. Alleged compromise of Venezuelan national electric system CORPOELEC
    Category: Data Breach
    Content: Threat actors claim to have compromised Venezuelas national electric system, gaining SCADA control over critical infrastructure including the Guri Hydroelectric Plant and Yaracuy Substation. The actors allege they have exfiltrated critical operational data including black-start recovery sequences and protection layer logic.
    Date: 2026-04-14T04:37:44Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-National-Electric-System-SEN-CORPOELEC-Venezuela-2026
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Venezuela
    Victim Industry: Energy/Utilities
    Victim Organization: CORPOELEC
    Victim Site: Unknown
  215. Alleged leak of Hotmail credential combolists
    Category: Combo List
    Content: Threat actor CODER is distributing Hotmail credential combolists through Telegram channels, offering free access to compromised email credentials and related cracking tools.
    Date: 2026-04-14T04:13:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72027/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  216. Mass website defacement by T-XpLoiT targeting Indonesian educational institution
    Category: Defacement
    Content: Threat actor T-XpLoiT conducted a mass defacement attack against Indonesian educational websites, targeting the student admission portal of MTS Darul Hikmah Islamic school. The attack was part of a broader mass defacement campaign affecting multiple sites simultaneously.
    Date: 2026-04-14T04:11:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248498
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTS Darul Hikmah
    Victim Site: ppdb.mtsdarulhikmah.sch.id
  217. Mass defacement campaign by T-XpLoiT targeting Indonesian educational institutions
    Category: Defacement
    Content: Threat actor T-XpLoiT conducted a mass defacement campaign targeting educational websites, compromising the training center portal of MTS Darul Hikmah Islamic School in Indonesia. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-14T04:11:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248499
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTS Darul Hikmah Islamic School
    Victim Site: pusdik.mtsdarulhikmah.sch.id
  218. T-XpLoiT defaced ppdb.mtsdarulhikmah.sch.id
    Category: Defacement
    Content: Target: https://ppdb.mtsdarulhikmah.sch.id/deface.htmlAttacker: T-XpLoiTDate: 2026-04-14 10:47:45OS: LinuxFlags: Mass Defacement (IP: 103.79.244.217)
    Date: 2026-04-14T04:08:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248498
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ppdb.mtsdarulhikmah.sch.id
  219. Website defacement of Nihon Mart by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Nihon Mart e-commerce website on April 14, 2026. The incident targeted a single subdirectory rather than the main homepage.
    Date: 2026-04-14T04:02:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832731
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Indonesia
    Victim Industry: E-commerce
    Victim Organization: Nihon Mart
    Victim Site: nihonmart.id
  220. Website defacement of The Lubricant Store by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a commercial retail website on April 14, 2026. The incident targeted a specific page rather than the main site and was not part of a mass defacement campaign.
    Date: 2026-04-14T04:02:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832883
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Commerce
    Victim Organization: The Lubricant Store
    Victim Site: www.thelubricantstore.com
  221. Website defacement of MobileCiti by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Australian mobile phone retailer MobileCitis website on April 14, 2026. The defacement targeted a specific subdirectory of the companys e-commerce platform.
    Date: 2026-04-14T04:01:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832767
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Technology/Retail
    Victim Organization: MobileCiti
    Victim Site: www.mobileciti.com.au
  222. Website defacement of tehnoturg.ee by DimasHxR
    Category: Defacement
    Content: On April 14, 2026, attacker DimasHxR defaced a subdirectory of tehnoturg.ee, an Estonian website. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-14T04:00:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832757
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Estonia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tehnoturg.ee
  223. Website defacement of York Armoury by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced the York Armoury website on April 14, 2026. The attack targeted what appears to be a military surplus or firearms retailer based on the domain name.
    Date: 2026-04-14T03:59:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832769
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Military Surplus
    Victim Organization: York Armoury
    Victim Site: yorkarmoury.com
  224. Website defacement of Hindleys by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced a specific media page on the Hindleys website on April 14, 2026. This was an isolated defacement incident targeting a single page rather than a mass defacement campaign.
    Date: 2026-04-14T03:59:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832712
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Hindleys
    Victim Site: hindleys.com
  225. Website defacement of Würth Group by DimasHxR
    Category: Defacement
    Content: The Spanish website of Würth Group, a multinational manufacturing company specializing in fasteners and assembly materials, was defaced by threat actor DimasHxR on April 14, 2026. The attack targeted a customer address page on the companys Spanish domain.
    Date: 2026-04-14T03:58:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832882
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Spain
    Victim Industry: Manufacturing
    Victim Organization: Würth Group
    Victim Site: wurth.es
  226. Mass website defacement by T-XpLoiT targeting Indonesian educational institution
    Category: Defacement
    Content: Attacker T-XpLoiT conducted a mass defacement operation targeting the blog website of MTs Darul Hikmah, an Indonesian Islamic school. The defacement occurred on April 14, 2026, affecting a Linux-hosted educational website as part of a broader mass defacement campaign.
    Date: 2026-04-14T03:57:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248495
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTs Darul Hikmah
    Victim Site: blog.mtsdarulhikmah.sch.id
  227. Website defacement of The Varsity Store by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced The Varsity Store website, an Australian retail company. The defacement occurred on April 14, 2026 and was archived on zone-xsec.com mirror.
    Date: 2026-04-14T03:56:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832758
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Retail
    Victim Organization: The Varsity Store
    Victim Site: thevarsitystore.com.au
  228. Website defacement of Plumbline by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the Plumbline company website on April 14, 2026. This was an isolated defacement targeting a New Zealand-based plumbing services company.
    Date: 2026-04-14T03:56:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832736
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: New Zealand
    Victim Industry: Construction/Plumbing Services
    Victim Organization: Plumbline
    Victim Site: plumbline.co.nz
  229. Mass defacement targeting Indonesian educational institution by T-XpLoiT
    Category: Defacement
    Content: Attacker T-XpLoiT conducted a mass defacement campaign targeting an Indonesian Islamic secondary schools infrastructure reporting system. The defacement was part of a broader mass attack rather than a targeted assault on the specific institution.
    Date: 2026-04-14T03:55:22Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248497
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTs Darul Hikmah
    Victim Site: laporsarpras.mtsdarulhikmah.sch.id
  230. Website defacement of tiendaempleado.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the tiendaempleado.com retail website on April 14, 2026. The defacement targeted a specific subdirectory rather than the homepage.
    Date: 2026-04-14T03:54:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832884
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Tienda Empleado
    Victim Site: tiendaempleado.com
  231. Website defacement of sloantika.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced sloantika.com on April 14, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-14T03:54:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832744
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Sloantika
    Victim Site: sloantika.com
  232. Alleged leak of Iranian IRGC surveillance system and police database
    Category: Data Leak
    Content: Threat actor claims to have leaked sensitive data from Irans IRGC surveillance apparatus and police database, allegedly containing user account details, social connections, personal information, sentiment analysis, and emotion analysis data. The data is being distributed for free download via file hosting services.
    Date: 2026-04-14T03:53:16Z
    Network: openweb
    Published URL: https://breached.st/threads/iran-irgc-surveillance-system-police-database-leaked-download.85961/unread
    Screenshots:
    None
    Threat Actors: IamNotaFBIWorker
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: Islamic Revolutionary Guard Corps (IRGC)
    Victim Site: Unknown
  233. Website defacement of VON Energy by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the VON Energy website on April 14, 2026, targeting the media section of the Indian energy companys domain. The incident was documented as a single defacement rather than part of a mass campaign.
    Date: 2026-04-14T03:53:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832880
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: India
    Victim Industry: Energy
    Victim Organization: VON Energy
    Victim Site: vonenergy.in
  234. Website defacement of Mercury Marine dealer portal by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced a Mercury Marine dealer labels portal on April 14, 2026. The incident targeted what appears to be a dealer management system for the marine engine manufacturer.
    Date: 2026-04-14T03:52:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832843
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Marine/Automotive
    Victim Organization: Mercury Marine
    Victim Site: mercurymarineb10dealerlabels.c…
  235. Website defacement of Miniland Group by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against minilandgroup.com on April 14, 2026. The attacker operated independently without team affiliation and targeted a media subdirectory of the organizations website.
    Date: 2026-04-14T03:51:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832729
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Miniland Group
    Victim Site: minilandgroup.com
  236. Website defacement of missy-x.de by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the German website missy-x.de on April 14, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-14T03:50:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832730
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: missy-x.de
  237. Website defacement of Larasa by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the larasa.com.ar website on April 14, 2026. The attack targeted a specific directory path on the Argentine website without being part of a mass or re-defacement campaign.
    Date: 2026-04-14T03:50:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832716
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Larasa
    Victim Site: larasa.com.ar
  238. Mass defacement campaign by T-XpLoiT targeting Indonesian educational institution
    Category: Defacement
    Content: Threat actor T-XpLoiT conducted a mass defacement campaign targeting the database subdomain of MTS Darul Hikmah, an Indonesian Islamic school. The attack occurred on April 14, 2026, affecting the institutions database server running on Linux infrastructure.
    Date: 2026-04-14T03:49:21Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248496
    Screenshots:
    None
    Threat Actors: T-XpLoiT
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTS Darul Hikmah
    Victim Site: database.mtsdarulhikmah.sch.id
  239. Website defacement of nobleplace.lv by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced the nobleplace.lv website on April 14, 2026. The defacement targeted a specific media/customer section of the site rather than the homepage.
    Date: 2026-04-14T03:48:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832732
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Latvia
    Victim Industry: Unknown
    Victim Organization: Noble Place
    Victim Site: nobleplace.lv
  240. Website defacement of jangrotest1.piranha.digital by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a subdomain belonging to Piranha Digital on April 14, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-14T03:48:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832832
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology/Digital Services
    Victim Organization: Piranha Digital
    Victim Site: jangrotest1.piranha.digital
  241. Website defacement of BM Emploi by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the Swiss employment services website bm-emploi.ch on April 14, 2026. The attack targeted a subdirectory of the site rather than the homepage.
    Date: 2026-04-14T03:41:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832687
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Switzerland
    Victim Industry: Employment Services
    Victim Organization: BM Emploi
    Victim Site: bm-emploi.ch
  242. Website defacement of Beauty Buffet by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a media subdirectory of Beauty Buffets Thai e-commerce website on April 14, 2026. The attack targeted a specific page rather than the homepage of the cosmetics retailers online platform.
    Date: 2026-04-14T03:41:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832682
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Thailand
    Victim Industry: Retail/Cosmetics
    Victim Organization: Beauty Buffet
    Victim Site: beautybuffet.co.th
  243. Website defacement of 1mg Store by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the 1mg Store website, targeting the Indian online pharmacy platforms media directory on April 14, 2026.
    Date: 2026-04-14T03:40:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832667
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: India
    Victim Industry: Healthcare/Pharmaceuticals
    Victim Organization: 1mg
    Victim Site: 1mgstore.com
  244. Website defacement of bricolaj-mag.ro by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the Romanian magazine website bricolaj-mag.ro on April 14, 2026. The attack targeted a specific subdirectory of the media publications website rather than the main homepage.
    Date: 2026-04-14T03:39:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832689
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Romania
    Victim Industry: Media/Publishing
    Victim Organization: Bricolaj Magazine
    Victim Site: bricolaj-mag.ro
  245. Website defacement of bhcinefoto.com.br by DimasHxR
    Category: Defacement
    Content: Brazilian photography/media services website bhcinefoto.com.br was defaced by attacker DimasHxR on April 14, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-14T03:38:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832683
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Photography/Media Services
    Victim Organization: BH Cine Foto
    Victim Site: bhcinefoto.com.br
  246. Website defacement of duka254.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Kenyan e-commerce website duka254.com on April 14, 2026. The defacement targeted a specific page within the customer media directory rather than the homepage.
    Date: 2026-04-14T03:38:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832704
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Kenya
    Victim Industry: E-commerce
    Victim Organization: Duka254
    Victim Site: duka254.com
  247. Website defacement of codestore.ua by DimasHxR
    Category: Defacement
    Content: Ukrainian software/technology website codestore.ua was defaced by threat actor DimasHxR on April 14, 2026. The attack targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-14T03:37:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832693
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ukraine
    Victim Industry: Technology/Software
    Victim Organization: CodeStore
    Victim Site: codestore.ua
  248. Website defacement of Drogaria Cristal by DimasHxR
    Category: Defacement
    Content: Brazilian pharmacy website Drogaria Cristal was defaced by attacker DimasHxR on April 14, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-14T03:36:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832702
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Healthcare/Pharmacy
    Victim Organization: Drogaria Cristal
    Victim Site: drogariacristal.com
  249. Website defacement of Blueprint3D by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Blueprint3D website on April 14, 2026. The incident targeted a specific page rather than the main homepage and was not part of a mass defacement campaign.
    Date: 2026-04-14T03:35:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832685
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Design/Architecture
    Victim Organization: Blueprint3D
    Victim Site: blueprint3d.co.uk
  250. Website defacement of bagger-monkey.de by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the German website bagger-monkey.de on April 14, 2026. The incident was a targeted single-site defacement with no apparent team affiliation.
    Date: 2026-04-14T03:34:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832680
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bagger-monkey.de
  251. Website defacement of diustou.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a specific page on diustou.com on April 14, 2026. This appears to be a single-target defacement affecting the customer add functionality of the website.
    Date: 2026-04-14T03:34:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832701
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: diustou.com
  252. Website defacement of constructii-mag.ro by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the Romanian construction magazine website constructii-mag.ro on April 14, 2026. The attack targeted the media directory of the construction industry publications website.
    Date: 2026-04-14T03:33:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832694
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Romania
    Victim Industry: Construction/Publishing
    Victim Organization: Constructii Magazine
    Victim Site: constructii-mag.ro
  253. Website defacement of Continental Art Center by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the Continental Art Center website on April 14, 2026. This was an isolated single-site defacement targeting the organizations web presence.
    Date: 2026-04-14T03:32:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832695
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Arts and Culture
    Victim Organization: Continental Art Center
    Victim Site: continentalartcenter.com
  254. Website defacement of All Fasteners by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the All Fasteners website on April 14, 2026. The attack targeted a specific media directory path rather than the main homepage of the Australian industrial fasteners supplier.
    Date: 2026-04-14T03:31:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832673
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Manufacturing/Industrial Supplies
    Victim Organization: All Fasteners
    Victim Site: allfasteners.com.au
  255. Website defacement of buyldnonline.com by DimasHxR
    Category: Defacement
    Content: Solo attacker DimasHxR successfully defaced the buyldnonline.com website on April 14, 2026. The incident was a single-target defacement rather than part of a mass campaign.
    Date: 2026-04-14T03:30:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832690
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: buyldnonline.com
  256. Website defacement of aweda.com.br by DimasHxR
    Category: Defacement
    Content: Brazilian website aweda.com.br was defaced by attacker DimasHxR on April 14, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-14T03:30:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832677
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Aweda
    Victim Site: aweda.com.br
  257. Alleged leak of Gmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 724,368 Gmail credentials via file sharing platform. The credential list specifically targets Gmail domain accounts.
    Date: 2026-04-14T03:26:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72024/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  258. Alleged leak of phone number and password credentials
    Category: Combo List
    Content: A threat actor shared what appears to be a credential list containing phone numbers paired with passwords, claiming the data is high quality and private.
    Date: 2026-04-14T03:25:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72025/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  259. Website defacement of mechanicallugs.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the mechanicallugs.com website on April 14, 2026. The attack targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-14T03:23:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832623
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Mechanical Lugs
    Victim Site: mechanicallugs.com
  260. Website defacement of ziajashop.uz by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the Uzbekistani e-commerce website ziajashop.uz on April 14, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-14T03:23:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832666
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Uzbekistan
    Victim Industry: E-commerce
    Victim Organization: ZiajaShop
    Victim Site: ziajashop.uz
  261. Website defacement of qmanual.com by DimasHxR
    Category: Defacement
    Content: The website qmanual.com was defaced by threat actor DimasHxR on April 14, 2026. The attack specifically targeted the customer_add page within the media directory of the site.
    Date: 2026-04-14T03:22:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832631
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: qmanual.com
  262. Website defacement of tarnava.ro by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of tarnava.ro on April 14, 2026. The defacement targeted a specific media/customer address page rather than the main homepage.
    Date: 2026-04-14T03:21:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832656
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tarnava.ro
  263. Website defacement of erliner.eu by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the erliner.eu website on April 14, 2026. The attack targeted a specific subdirectory within the sites customer media section.
    Date: 2026-04-14T03:20:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832592
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: erliner.eu
  264. Website defacement of Essential Oil Bulk by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the essentialoilbulk.com website on April 14, 2026. This was an individual defacement incident targeting a retail e-commerce site specializing in essential oil products.
    Date: 2026-04-14T03:20:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832593
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Essential Oil Bulk
    Victim Site: essentialoilbulk.com
  265. Website defacement of SRS Tactical by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the SRS Tactical website on April 14, 2026, targeting a tactical equipment companys media customer section.
    Date: 2026-04-14T03:19:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832647
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Defense/Military Equipment
    Victim Organization: SRS Tactical
    Victim Site: srstactical.com
  266. Website defacement of martinomidali.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced martinomidali.com on April 14, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-14T03:18:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832617
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: martinomidali.com
  267. Website defacement of her-him.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the her-him.com website on April 14, 2026. The defacement targeted a specific page within the media/customer section of the site.
    Date: 2026-04-14T03:18:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832600
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: her-him.com
  268. Website defacement of lukeyu.cc by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against lukeyu.cc on April 14, 2026. The attack targeted a customer address page within the media directory of the website.
    Date: 2026-04-14T03:17:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832607
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lukeyu.cc
  269. Website defacement of gripzakjes.net by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the gripzakjes.net website on April 14, 2026. This appears to be an isolated defacement incident targeting a Dutch e-commerce site specializing in grip bags or packaging materials.
    Date: 2026-04-14T03:16:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832597
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: E-commerce
    Victim Organization: Gripzakjes
    Victim Site: gripzakjes.net
  270. Website defacement of Phillip McCallene Bikes by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced a subdirectory of the Phillip McCallene Bikes website on April 14, 2026. The attack targeted a specific path rather than the main homepage of the bicycle retailers website.
    Date: 2026-04-14T03:15:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832627
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Bicycle Sales
    Victim Organization: Phillip McCallene Bikes
    Victim Site: phillipmccallenebikes.com
  271. Website defacement of Medideal by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Medideal healthcare website on April 14, 2026. The attack targeted a subdirectory of the UK-based medical services companys website.
    Date: 2026-04-14T03:15:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832624
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Healthcare
    Victim Organization: Medideal
    Victim Site: medideal.co.uk
  272. Website defacement of justynachrabelska.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced justynachrabelska.com on April 14, 2026. The incident appears to be a targeted single-site defacement with no apparent political motivation disclosed.
    Date: 2026-04-14T03:14:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832604
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: justynachrabelska.com
  273. Website defacement of CortEvents by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the CortEvents website on April 14, 2026. This was an individual attack rather than part of a mass defacement campaign.
    Date: 2026-04-14T03:13:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832665
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Events/Entertainment
    Victim Organization: CortEvents
    Victim Site: www.cortevents.com
  274. Website defacement of vlaggenactie.nl by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the vlaggenactie.nl website on April 14, 2026. The attack targeted a specific subdirectory rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-14T03:13:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832661
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: vlaggenactie.nl
  275. Website defacement of gtmotoparts.shop by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the GT Moto Parts e-commerce website on April 14, 2026. The defacement targeted a specific subdirectory rather than the main homepage of the automotive parts retailer.
    Date: 2026-04-14T03:12:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832598
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Automotive/E-commerce
    Victim Organization: GT Moto Parts
    Victim Site: gtmotoparts.shop
  276. Website defacement of Knitters Pride by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Knitters Pride website on April 14, 2026. The defacement targeted a specific media/custom subdirectory rather than the main homepage.
    Date: 2026-04-14T03:11:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832605
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Manufacturing
    Victim Organization: Knitters Pride
    Victim Site: knitterspride.com
  277. Website defacement of craftwoodle.eu by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the craftwoodle.eu website on April 14, 2026, targeting a specific customer media directory path.
    Date: 2026-04-14T03:10:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832587
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Craftwoodle
    Victim Site: craftwoodle.eu
  278. Website defacement of Halsteds by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer media section of the Halsteds website on April 14, 2026. This was an individual defacement incident targeting the Zimbabwean organizations web presence.
    Date: 2026-04-14T03:10:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832599
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Zimbabwe
    Victim Industry: Unknown
    Victim Organization: Halsteds
    Victim Site: halsteds.co.zw
  279. Website defacement of terrederandonnee.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the French hiking/outdoor recreation website terrederandonnee.com on April 14, 2026. The incident targeted a specific media directory rather than the homepage.
    Date: 2026-04-14T03:09:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832657
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Tourism/Recreation
    Victim Organization: Terre de Randonnee
    Victim Site: terrederandonnee.com
  280. Website defacement of willjaya.net by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced willjaya.net on April 14, 2026. This was an isolated defacement incident targeting a single website without apparent team affiliation.
    Date: 2026-04-14T03:08:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832663
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: willjaya.net
  281. Alleged distribution of credential combolist targeting USA and Europe
    Category: Combo List
    Content: Threat actor gsmfix is allegedly distributing a credential combolist containing email:password combinations targeting users from USA and Europe regions. The post advertises the list as exclusive and hits mix suggesting the credentials may be verified or high-quality.
    Date: 2026-04-14T03:03:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72021/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Alleged distribution of 7 million credential combolist for SMTP targeting
    Category: Combo List
    Content: Threat actor CODER is distributing a 7 million credential combolist specifically targeted for SMTP usage through Telegram channels. The actor operates multiple Telegram groups offering free combos and programs for credential stuffing attacks.
    Date: 2026-04-14T03:03:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72022/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  283. Alleged distribution of European and US credential combolists
    Category: Combo List
    Content: Threat actor claiming to distribute high quality credential combolists targeting users from Europe and USA regions. The post emphasizes full validity of the credential data being shared.
    Date: 2026-04-14T03:02:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72023/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  284. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 690 allegedly valid Hotmail email and password combinations on a cybercrime forum. The credentials are described as high quality and privately sourced.
    Date: 2026-04-14T02:38:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X690-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  285. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Actor RedCloud shared a combolist containing 3.7K Hotmail email credentials claimed to be valid and private, distributed for free download on cybercrime forum.
    Date: 2026-04-14T02:38:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-3-7K-%E2%9A%A1Hotmail%E2%9A%A1Valid-Mail-Access-14-04
    Screenshots:
    None
    Threat Actors: RedCloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  286. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor noir allegedly shared valid Hotmail credential lists on underground forum. The actor claims the credentials are high quality and valid, distributed through private cloud storage and Telegram contact.
    Date: 2026-04-14T02:37:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72017/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  287. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor redcloud shared a combolist containing 3.7K Hotmail email credentials via MediaFire download link. The actor claims the credentials are valid and high quality, dated April 14, 2026.
    Date: 2026-04-14T02:36:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72019/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  288. Alleged leak of private logs data
    Category: Data Leak
    Content: Actor shared a 500MB collection of private logs via file sharing service with password protection for free download.
    Date: 2026-04-14T01:32:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-500mb-prv-logs
    Screenshots:
    None
    Threat Actors: niven938644
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  289. Alleged leak of private logs (~500MB)
    Category: Combo List
    Content: Actor maicolpg19 shared a link to approximately 500MB of private logs via file sharing service, with password distributed through Telegram channel.
    Date: 2026-04-14T01:31:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72016/
    Screenshots:
    None
    Threat Actors: maicolpg19
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  290. Alleged leak of Hotmail credential combolist targeting cryptocurrency users
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 1.8 million Hotmail credentials specifically targeting cryptocurrency users. The data was made available as a free download via a file sharing platform.
    Date: 2026-04-14T01:08:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72015/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  291. Website defacement of a3h.com.br by Aptisme (Leviathan Perfect Hunter team)
    Category: Defacement
    Content: The website a3h.com.br was defaced by attacker Aptisme, associated with the Leviathan Perfect Hunter team, on April 14, 2026. This was a targeted single-site defacement rather than a mass attack.
    Date: 2026-04-14T00:49:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832570
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: a3h.com.br
  292. Alleged leak of Facebook and Instagram credentials
    Category: Combo List
    Content: A threat actor shared what appears to be a combolist containing Facebook and Instagram email and password combinations with access logs dated April 13, 2026. The content is hidden and available only to registered forum users.
    Date: 2026-04-14T00:45:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72014/
    Screenshots:
    None
    Threat Actors: Kinglukeman
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Facebook/Instagram
    Victim Site: facebook.com
  293. Alleged leak of credentials via private cloud logs
    Category: Combo List
    Content: Threat actor vultapower is distributing a fresh credential dump in URL:LOG:PASS format, allegedly obtained from private cloud logs via their Telegram channel vultanetworks.
    Date: 2026-04-14T00:21:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72012/
    Screenshots:
    None
    Threat Actors: vultapower
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  294. Alleged distribution of credential combolist containing 9 million email:password combinations
    Category: Combo List
    Content: A threat actor is distributing a credential combolist containing 9 million email and password combinations from various countries including USA, Italy, France, Germany, and Poland through Telegram channels.
    Date: 2026-04-14T00:20:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/72013/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  295. Alleged Planned Cyber Attack Against South Carolina Attorney General by ShinyHunters
    Category: Cyber Attack
    Content: Threat actor ShinyHunters posted a threat indicating they plan to target the South Carolina Attorney Generals official website (scag.gov) following their alleged attack on Rockstar, citing corruption in North Carolina as justification. The post includes a direct link to the target domain.
    Date: 2026-04-14T00:14:53Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/1161
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: South Carolina Attorney General
    Victim Site: scag.gov
  296. Alleged defacement of multiple Israeli websites by Cyber Islamic Resistance
    Category: Defacement
    Content: The Cyber Islamic Resistance group claims to have defaced four Israeli websites in support of Lebanese resistance. Targeted sites include a leadership training center (tao-center.co.il), a construction/renovation company (reuvenyoffe.co.il), an industrial refrigeration/climate control company (drycor.co.il), and a fourth site (vilatoptouch.co.il). A Zone-H mirror proof is provided (ID: 41689266).
    Date: 2026-04-14T00:05:12Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1878
    Screenshots:
    None
    Threat Actors: Cyber Islamic Resistance
    Victim Country: Israel
    Victim Industry: Multiple (Training/Consulting, Construction, Industrial/HVAC, Unknown)
    Victim Organization: Multiple Israeli organizations (TAO Center, Reuven Yoffe Construction, Drycor, Vila Top Touch)
    Victim Site: tao-center.co.il, reuvenyoffe.co.il, drycor.co.il, vilatoptouch.co.il