[April-29-2026] Daily Cybersecurity Threat Report

This report provides an in-depth analysis of a significant volume of cyber incidents, data breaches, vulnerability disclosures, and underground market activities recorded on April 28, 2026. The threat landscape demonstrates a high degree of organization among threat actors, with a heavy emphasis on credential harvesting, exploitation of government and educational infrastructure, and the monetization of initial access and stolen data.


1. Major Corporate & Financial Data Breaches

The financial and corporate sectors experienced severe compromises involving massive data exfiltration, extortion, and the sale of sensitive customer records.

The Polymarket Infrastructure Compromise

A highly sophisticated and multi-faceted attack campaign was executed against Polymarket, a decentralized prediction market platform.

  • A threat actor utilizing the aliases “xorcat” and “./xorcat~files” claimed responsibility for the breach.
  • The actor exploited a chain of vulnerabilities, including CVE-2025-62718 (an SSRF vulnerability in the Axios client allowing access to internal Kubernetes services) and CVE-2024-51479 (a Next.js middleware authorization bypass affecting affiliate and preprod deployments).
  • Additional attack vectors included unauthenticated API endpoints, CORS misconfigurations, and insufficient rate limiting.
  • The breach resulted in the exposure of an exposed production admin portal with Vercel SSO authentication credentials.
  • The threat actor exfiltrated a massive dataset; initial claims indicated a 1GB API dump containing over 10 million records, including full personally identifiable information (PII) for 10,000 unique profiles, Ethereum wallet addresses, and social graph data.
  • Further claims escalated the incident to an 800GB data exfiltration in JSON format, accompanied by extortion threats.
  • A comprehensive package containing 300,000 user records (750 MB of data), proof-of-concept exploits, automated extraction scripts, and red team analysis was subsequently uploaded by the actor.
  • The actor actively monetized the breach by selling specialized attack tools (CORS, SSRF, Next.js bypass) designed to exploit synchronization flaws between the Polymarket API and the blockchain, enabling DoS attacks against liquidity providers.

McDonald’s India Data Exfiltration

  • The “Everest group” claimed a massive 861 GB data breach targeting McDonald’s India, specifically its operators Connaught Plaza Restaurants and Hardcastle Restaurants.
  • The breach allegedly occurred earlier on January 20, 2026.
  • The compromised data included financial reports, pricing data, internal communications, investor contact databases across multiple countries (US, UK, Singapore, India), store-level manager information, customer PII, and ERP system access.
  • The actor published the full leak, noting this follows previous vulnerabilities identified in 2017 and 2024.

Wells Fargo Customer Data Sale

  • A threat actor operating as “RubiconH4ck” advertised a database containing 4.6 million records allegedly belonging to Wells Fargo customers.
  • The dataset reportedly contained full names, physical addresses, email addresses, phone numbers, and PINs, updated between 2024 and 2026.

Additional Corporate and Financial Breaches

  • Magic Labs: A vulnerability in the Magic Labs login service was reported, allowing attackers to intercept authentication tokens, bypass security procedures, and execute unauthorized fund withdrawals.
  • RealT: A threat actor named “lowiq” leaked a database from the blockchain real estate platform RealT (realt.co) containing 61,738 records dated April 18, 2026, exposing user IDs, names, bank accounts, and Plaid-linked financial details of investors and staff.
  • Ledger (Australia): The actor “aisdata” offered a database of Australian Ledger hardware wallet customers containing names, phone numbers, product types, and purchase amounts.
  • Qzaem (Russia): Threat actor “Tanaka” released a 7.6 million record SQL database from the Russian lending platform qzaem.ru, exposing SNILS, INN numbers, hashed passwords, and payment card tokens.
  • Fondo de Garantías Antioquia (Colombia): Actors “Petro_Escobar” and “NyxarGroup” offered 5,000 records from FGA containing credit obligation details, overdue amounts, and payment statuses.
  • IngressoLive (Brazil): A database of 106,000 records from the Brazilian ticketing platform was leaked by “mastermind,” detailing buyer names, payment forms, and transaction values.
  • Canadian Tire: Threat actor “ROCK01” made available a 105 MB CSV database dump containing approximately 10 million Canadian Tire customer records, including names, addresses, and phone numbers.

2. Government, Military, and Critical Infrastructure Compromises

State, local, and national government entities faced sustained targeting, resulting in severe data exposure and operational disruption.

The Indonesian Government and Education Sector Crisis

Indonesian infrastructure was disproportionately targeted by a multitude of threat actors, indicating a systemic vulnerability crisis within the region.

  • Mr. Hanz Xploit: This highly prolific actor leaked or claimed access to numerous databases, including the Bengkalis Regency Government , Mahkamah Konstitusi Republik Indonesia (mkri.id) , Badan Penghubung Pemerintah Jawa Tengah (1 million records) , Universitas Gadjah Mada (1.5 million records) , Majelis Permusyawaratan Rakyat Republik Indonesia (MPR RI) , SMKN 5 Batam , and SMK Negeri 3 Kota Tangerang Selatan.
  • Indonesian National Police (Polri): Actor “MrLucxy” leaked 417,000 personnel records from a year-old hack of polri.go.id, exposing ranks, IDs, addresses, and employment statuses across multiple units. A separate actor, “JAX7,” also claimed access to a police personnel database.
  • Badan Kepegawaian Negara (BKN): Actor “Xyph0rix” leaked a database of civil servants containing National Identity Numbers (NIK), employment ranks, and job titles, last synchronized in January 2025.
  • Ministry of Industry (Kemenperin): Two separate actors, “MrAnomali” and “wildhigt,” offered data from Kemenperin, with the latter selling specific internal extension numbers and floor locations of high-ranking officials for 0.4 LTC.
  • Education Targets: Actor “JAX7” leaked thousands of records from SMA Trensains Muhammadiyah Sragen. Actor “treixnox” leaked over 2,000 highly sensitive records from SMAN 1 Malang, including parental income and geolocation data.

United States Law Enforcement, Military, and Infrastructure

  • Law Enforcement Data: Threat actor “spider321” sold a database of 90,000 US police personnel records spanning Texas and Missouri agencies, exposing job titles, supervisor details, and IP addresses. The same actor sold a dataset of 110,000 plaintext credentials for FBI employees (fbi.gov and ic.fbi.gov domains).
  • Military Documentation: Actor “spider321” also offered unverified M1 Abrams tank technical manuals for sale in PDF format.
  • US Marines Surveillance Leak: The “Handala” threat actor leaked personal details of 2,379 U.S. Marines stationed in the Gulf region, exposing home addresses, daily patterns, and family details, framed as a demonstration for future military attacks.
  • CCTV Infrastructure: Actors “TheSweetNight” and “OpsShadowStrike” claimed to have compromised CCTV systems across the US using CVE-2017-7921, citing political motivations regarding Palestine and Iran.
  • Municipal Disruption: The Kent District Library in Michigan suffered a ransomware attack forcing the closure of its branches and an ongoing investigation into potential data compromise.

French Government and Infrastructure Attacks

  • National ID System Cyberattack: France experienced a major cyberattack targeting its online system for passports and national ID cards, exposing millions of users and forcing administrative centers to revert to manual processing amid high travel demand.
  • HexDex Arrest: French police arrested a 21-year-old hacker (“HexDex”) responsible for over 100 intrusions, notably breaching the French Ministry of Education to expose 243,000 employee records.
  • NEMEA Group Leak: Threat actor “ChimeraZ” leaked a 7.0 GB (or 66 GB in a separate post) database from NEMEA Group and its affiliates (GOELIA, COGEDIM), exposing 203,733 files including passports, lease agreements, and ID cards.

Other Global Government Breaches

  • South Korea: The “Infrastructure Destruction Squad” claimed ongoing breaches of the Jeollanam Provincial Police Agency, government offices, and national data centers via digital file storage vulnerabilities.
  • Guatemala: “GordonFreeman” breached the RENAP civil registry (18 million records) and SAT tax authority (5.6 million vehicle records), demanding a 2 BTC ransom to halt public sale and future attacks.
  • Mexico: Actor “Straightonumberone” leaked 11,000 legal documents and citizen PII from the Instituto Registral y Catastral del Estado de Puebla (IRCEP).
  • Brazil: The political party “Podemos” was breached by “m0z1ll4screw” via a PHP 7.4.33 vulnerability, exposing 958,000 pieces of information.

3. The Combolist and Credential Ecosystem

The distribution of combolists (email and password combinations used for credential stuffing and account takeover) represented the highest volume of activity on April 28. Microsoft services (Hotmail, Outlook, Live, MSN) were the primary targets.

Key Distributors and Operations

Threat ActorTarget Focus / Geographic RegionVolume / Operations
thejackal101Targeted geographic credential sets via “@Elite_Cloud1”1.2M Italy , 311K India , 273K Indonesia , 215K Japan , 167K Mexico , 158K Hungary , 61K Montenegro , 60K Latvia , 59K Malaysia , 32K Israel , 23K Ireland , 20K Kenya , 20K Micronesia , 17K Lithuania.
CODERMulti-million aggregated credential dumps via Telegram13M mixed platforms (Twitter, Fortnite, Etsy) , 12M SMTP/IMAP , 12M Corporate , 12M Gaming , 11M Social Media , 9M Hotmail , 9M Outlook , 7M t-online.de , 5M Amazon AWS , 5M German emails (GMX, T-Online) , 4.7M Gaming , Hotmail UK/AOL combo.
el_capitanRegional and platform-specific mass dumps7.2M mixed country , 625K Gmail , 450K Hotmail , 310K Poland , 130K Japan. Promotes spamming and cracking tools.
snowstormxdMonetized cloud storage & inbox-verified credentialsDistributed small, highly-verified batches (e.g., 146 UHQ Hotmail , 728 Hotmail , 1,457 mixed ). Promoted a paid cloud service with a built-in inboxer tool ranging from $3/24h to $120/lifetime via Telegram bot.
HQcomboSpaceHigh-volume sector-specific drops on Mega.nz1.6M Gmail/Shopping , 1.1M Yahoo , 952K Gmail , 916K German Shopping , 879K German Gaming/Casino , 394K Hotmail/Streaming , 127K European Education/Retail , 118K Business Corporate , 51K Corporate Mail.
Prince1001UHQ credentials for financial/gaming targeting350K PayPal/Gaming , 269K Mixed , 165K Banking-targeted , 125K Spotify , 210 Hotmail.
BestComboEuropean-focused and specific domain targeting41K Gmail EU , 40K Hotmail EU , 20K Mixed , 12.7K Outlook EU , 11.9K Outlook , 6.8K Mixed EU , 2.1K live.com , 2K live.com EU , 2.1K MSN EU , 1.8K Hotmail.fr.
WhiteMellyDaily Telegram distribution of stealer logs and combos4GB URL:Login:Password lines from stealer logs , 1.5GB mixed logs , 20K mixed Hotmail/Live/Outlook (EU regions) , 2K Hotmail. Operates @suphoodbot for paid offerings.

Specialized Credential Services

  • Keyword-Targeted Lists: Actors like “Hotmail Cloud” and “He_Cloud” distributed highly refined lists of Hotmail credentials sorted by victim country and specific keyword targets (e.g., banking or gaming keywords in the inbox), demonstrating a targeted approach to account takeover.
  • Unique/Private Cloud Sources: Actors such as “UniqueCombo” consistently leaked 5,000-line batches of Hotmail credentials, advertising a dedicated shop for custom country requests.
  • Corporate and Forum Targeting: Actor “zod” shared specialized lists, including 77,527 corporate domain credentials and WordPress credentials, distributing passwords via Telegram.
  • Robinhood Targeting: Actor “Kevinn” offered cleaned lists of Robinhood user emails for balance verification and KYC data harvesting, alongside a Telegram-based automated credential checking service (“RhScan Bot”) charging $0.0003 per line to validate accounts.

4. Vulnerability Disclosures and Initial Access Brokering

The landscape featured the trade of critical software vulnerabilities, malware, and remote access to enterprise environments.

Vulnerabilities and Exploits

  • ChatGPT Code Execution Runtime Exfiltration: Check Point Research disclosed a critical flaw where a single malicious prompt activated a covert exfiltration channel within ChatGPT’s sandboxed environment, allowing for the silent theft of user messages and uploaded files, and enabling remote shell access for backdoored GPTs.
  • Figma Zero-Click RCE: A security researcher disclosed a complex zero-click Remote Code Execution vulnerability chain in Figma’s desktop Electron application. The exploit chained prototype pollution, a race condition, and XSS to execute arbitrary code via an exposed IPC handler.
  • AI Code Generation RCE (CVE-2026-4137): A threat actor detailed a remote code execution vulnerability affecting AI/ML code generation endpoints, utilizing prompt injection and sandbox evasion to bypass input validation.
  • NPM Client Compromise: An actor named “./xorcat~files” claimed to expose unauthenticated access to a production app’s configuration (42 config keys) and identified two critical CVEs in an official NPM client package, mapping user biographical data and internal sports provider IDs.

Malware and Exploit Kits

  • DarkSword iOS Exploit Kit: Source code was leaked for “DarkSword,” an alleged nation-state-grade iOS exploit kit (also called Coruna/CryptoWaters). The kit claims to chain 6 vulnerabilities to compromise iOS 18.4-18.7 devices via a single Safari visit, delivering malware (GHOSTBLADE, GHOSTKNIFE) for device takeover and crypto wallet theft.
  • Yellow Stealer: Threat actor “Polaris Web” sold a C/C++ x64 information stealer capable of harvesting browser credentials, Discord/Telegram sessions, over 150 crypto wallets, and utilizing UAC bypasses.
  • WhatsApp Phishing Panel: A complete toolkit was sold for $300, providing source code for a phishing panel and software to hijack WhatsApp sessions and automate malicious message sending.

Initial Access and Infrastructure Services

  • Cloud RDP Access: Brokers like “Squad Chat Marketplace” and “PORTAL” rented RDP access to major cloud providers (Azure, AWS, DigitalOcean) for $200, bundling them with compromised domain emails and GitHub student accounts.
  • Bulletproof Hosting: “BitHosting” advertised offshore VPS hosting with 2 Gbps shared bandwidth and cryptocurrency payments, geared toward hosting malicious infrastructure.
  • South Korean Insurance Firm: “TunaFish” sold SYSTEM-level access to a South Korean insurance company with $10M-$25M revenue via a compromised VMware Horizon instance for $898 in Bitcoin.

5. Defacement and Hacktivism Campaigns

Ideological and opportunistic threat actors executed numerous website defacement campaigns.

The YIIX103 Defacement Campaign

An independent threat actor using the alias “YIIX103” executed a focused defacement campaign against Indian manufacturing, automotive, and industrial websites. The attacks generally targeted specific PHP files (e.g., yo.php) rather than homepage takeovers, and many were “redefacements,” indicating persistent vulnerabilities on the host servers.

  • Victims Included: DC Motor India , Ashwamegh Industries , Kuldevi Engineers , SK Weighbridge (mass defacement) , Advance Bird Net Services , Nutrack Modular System , and Royal Air Component.

Hacktivist Operations

  • OpsShadowStrike: In collaboration with groups like TengkorakCyberCrew and EagleCyberCrew, this actor defaced multiple US real estate and auction websites (eiumis.com, decaturrealtors.com), citing political motivations related to Palestine and Iran.
  • BABAYO ERROR SYSTEM: Actor “m4ul1337” targeted specific pages on the Indian e-commerce platform manavelex.com and the payment processor MyRoadPay.
  • Khaibar Tech Team & Fynix: These groups claimed a politically motivated breach of the Turkish law firm Küçükislamoğlu Partners, citing intentions to target digital infrastructure associated with Zionist and American affiliates.
  • Hanzalah: The Iranian group executed a mass cyber attack targeting Israeli civilian telecommunications, sending hundreds of thousands of SMS messages containing political warnings.

6. Fraud, Phishing, and Carding Operations

The underground economy for financial fraud, identity theft, and phishing infrastructure was highly active.

Financial and Identity Data

  • Identity Packages (Fullz): Actors like “Samguz766” and “parkeradam964” sold comprehensive identity records (SSNs, DOBs, W2 forms, passports, UK NINs, Canadian SINs). Another actor, “Tryrdf,” sold high-quality fraudulent documents including LLC records and bank details.
  • Payment Card Dumps: “preston45” (ColdApollo) sold freshly skimmed Track 1 and Track 2 dumps with PINs ($60-$80) and cloned credit cards preloaded with balances up to $9,500 for ATM cash-outs. “BigBoris” sold multi-country CVV data for $30-$45 per record in BTC/USDT.
  • EBT Fraud: A threat actor (“tecat39051”) actively solicited bulk Electronic Benefits Transfer (EBT) data from spammers to conduct cashout operations, highlighting ongoing government benefits fraud.
  • SEC Filing Fraud: An actor named “GetRenewed” offered a $25,000 service to register fraudulent shell companies in the US and file them with the SEC’s EDGAR system to create legitimate-looking entities for money laundering.

Phishing and Surveillance Infrastructure

  • Bulk SMS Services: “Alice_sms6” operated a bulk SMS phishing gateway targeting financial institutions (Binance, PayPal, BBVA) across Europe with claims of 75-95% validity rates. “Young Global Bulk sms” offered similar high-quality SMS routes across 20+ European nations.
  • VoIP Spoofing (GoyCall): Actor “Kevinn” sold a premium VoIP service enabling caller ID spoofing across 200 countries with voice changers and verified caller ID bypass capabilities for social engineering.
  • Telegram Surveillance: The “Funstat” bot was advertised as a massive global database allowing users to extract message histories, map group memberships, and execute global message searches, posing severe privacy risks. Another bot (“la_kabra_666”) offered instant doxxing by national ID numbers.

7. Conclusion

The cyber incident data from April 28, 2026, reveals a highly industrialized threat landscape. The volume of credential combolists distributed—amounting to hundreds of millions of records—indicates that credential stuffing remains a primary vector for initial access. The severe compromises of the Indonesian government sector, the French national ID infrastructure, and platforms like Polymarket highlight critical vulnerabilities in API security, authentication middleware, and legacy systems. Threat actors are increasingly utilizing automated Telegram bots to monetize stolen data, provide fraud-as-a-service infrastructure, and distribute exploit kits.

Detected Incidents Draft Data

  1. Alleged DDoS-as-a-Service Operation – Goofystress
    Category: Cyber Attack
    Content: Goofystress (goofystresse.st) is advertising DDoS attack services offering Layer 4 (TCP/UDP flood up to 2-10 million PPS) and Layer 7 (CAPTCHA, cache, UAM bypasses) capabilities. Service claims 3+ years of operation with 1000-1500 customers. Includes game-specific DDoS bypasses for Fortnite, Minecraft, Apex, COD, Roblox, and Battlefield. Auto-payment system available via website.
    Date: 2026-04-28T23:55:53Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/95967
    Screenshots:
    None
    Threat Actors: Goofystress
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Alleged Sale of Multiple Stolen Databases Including Financial, Aviation, and Entertainment Records
    Category: Services
    Content: A threat actor operating under the FACE OFF brand on a cybercrime forum is selling multiple stolen databases spanning financial platforms (Robinhood, Binance, OKX), aviation (LA Airport, 2.9M rows including names, emails, and CPA numbers), UK banking (full names, DOB, account numbers, sort codes), and Australian entertainment data (29M records including ticketing and passport data). The actor also offers SIP trunk and DID telephony access, fraudulent call center services with multilingual spea
    Date: 2026-04-28T23:45:00Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-%E2%AD%90-GLOBAL-SIP-DATA-MARKET-FACE-OFF%E2%AD%90
    Screenshots:
    None
    Threat Actors: Kevinn
    Victim Country: Unknown
    Victim Industry: Multiple Sectors (Financial, Aviation, Entertainment)
    Victim Organization: Robinhood, Binance, OKX, LA Airport, UK Banking Institutions, Australia Entertainment
    Victim Site: Unknown
  3. Alleged Data Breach of Caritas-Spes Humanitarian Organization in Odesa, Ukraine
    Category: Data Breach
    Content: A threat actor claims to have breached Caritas-Spes, a humanitarian aid organization in Odesa, Ukraine, exfiltrating sensitive data on thousands of vulnerable beneficiaries including internally displaced persons, refugees, disabled individuals, and other war-affected populations. The stolen data allegedly includes full names, national ID and tax numbers, IBAN bank account details, Ukrainian passport scans, residential addresses, phone numbers, and internal organizational documents. The actor is
    Date: 2026-04-28T23:34:03Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-The-Caritas-Spes-organization-in-Odesa-Data-Leak
    Screenshots:
    None
    Threat Actors: blacknet00
    Victim Country: Ukraine
    Victim Industry: Non-Profit / Humanitarian Aid
    Victim Organization: Caritas-Spes Odesa
    Victim Site: Unknown
  4. Alleged leak of email and password combolist
    Category: Combo List
    Content: A threat actor operating under the alias COYYYTOOOO on DemonForums has made available a combolist containing email and password combinations via a free download link hosted on pasteview.com. The post provides no additional context regarding the origin, targeted organization, or number of records included. The leak was shared freely with no price or conditions mentioned.
    Date: 2026-04-28T23:26:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-PRIVATE-ACCESS
    Screenshots:
    None
    Threat Actors: COYYYTOOOO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Alleged leak of private combolist or credential data
    Category: Combo List
    Content: A threat actor operating under the handle COYYYTO shared a download link on the CrackingX forum under a thread titled PRIVATE ACCESS, hosted on pasteview.com. The post appears to distribute a combolist or credential dump freely with no price mentioned. No specific victim organization, country, or record count could be determined from the available information.
    Date: 2026-04-28T23:25:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73601/
    Screenshots:
    None
    Threat Actors: COYYYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged leak of MSN.com credential combolist targeting European users
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has made available a combolist of 2,171 credential pairs associated with msn.com, purportedly targeting European users. The list was shared via a Mega.co.nz download link on the cracking forum CrackingX. The post is dated April 28, 2026, though this date may reflect a future-dated or mislabeled timestamp.
    Date: 2026-04-28T23:25:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73602/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft (MSN)
    Victim Site: msn.com
  7. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Sellerxd has shared a combolist of alleged Hotmail credentials on DemonForums, claiming to contain 1,070 valid email and password combinations. The content is hidden behind a registration or login requirement, suggesting it is available to forum members at no explicit monetary cost. The validity and origin of the credentials have not been independently verified.
    Date: 2026-04-28T23:25:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1070x-Valid-HQ-Hotmails
    Screenshots:
    None
    Threat Actors: Sellerxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  8. Alleged leak of Hotmail credentials via combolist distribution
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a combolist of 89 alleged UHQ (ultra-high quality) Hotmail credentials via a paste site and a Telegram channel. The post promotes a paid cloud service with a built-in inboxer tool, suggesting the credentials have been verified for inbox access. Pricing tiers for the cloud service range from $3 for 24 hours to $120 for lifetime access.
    Date: 2026-04-28T23:24:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73603/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  9. Alleged leak of Amazon AWS credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist allegedly containing 5 million Amazon AWS credentials via Telegram. The content is offered for free through Telegram channels and direct contact. The post does not include any sample data or verification of the claims.
    Date: 2026-04-28T22:46:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73596/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Cloud Computing
    Victim Organization: Amazon AWS
    Victim Site: aws.amazon.com
  10. Alleged leak of mixed country credential combolist
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared a mixed-country combolist containing approximately 17,000 credential pairs, made available to registered users. The post provides no details regarding the specific countries, services, or organizations from which the credentials originate. The content is gated behind a registration requirement on the forum.
    Date: 2026-04-28T22:45:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73597/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged leak of multi-platform credential combolist including Netflix, Steam, Spotify and others
    Category: Combo List
    Content: A threat actor known as Ra-Zi has shared a combolist containing approximately 120,000 email:password credential pairs allegedly valid for multiple streaming and gaming platforms including Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. The combolist is made available via a hidden download link on the forum, with registration or login required to access it. The same actor also advertises paid credential lists through a Telegram channel and a dedicated cracking website.
    Date: 2026-04-28T22:45:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-120k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–202119
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Netflix, Minecraft, Uplay, Steam, Hulu, Spotify
    Victim Site: Unknown
  12. Alleged leak of Gmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has shared an alleged combolist containing approximately 60,000 Gmail credentials on the cracking forum CrackingX. The post is categorized under Combolists & Dumps and appears to be a free release. Full content requires forum registration or sign-in to access.
    Date: 2026-04-28T22:45:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73598/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  13. Alleged leak of 20,000 email and password credentials on underground forum
    Category: Combo List
    Content: A threat actor operating under the alias wingoooW has made available a combolist containing approximately 20,000 claimed valid email and password credential pairs via a free download link hosted on pasteview.com. The post was shared on the DemonForums combolist section with no additional context regarding the origin or targeted organizations. The validity and source of the credentials remain unverified.
    Date: 2026-04-28T22:44:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-20K-VALID-ACCESS
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged Sale of USA, UK, and Canada Personal Data Including SSN, DOB, and Financial Records
    Category: Data Breach
    Content: A threat actor operating under the handle Samguz766 is selling verified personal data records for individuals in the USA, UK, and Canada. The offerings include full identity records (SSN, DOB, drivers license, address, employment details), tax-related data (W2 forms, 1040s, EIN leads), Medicare records, LLC documents, passports, and financial data including bank statements and CashApp details. The actor accepts Bitcoin and USDT payments and also offers hacking and spamming tools, scam pages, an
    Date: 2026-04-28T22:42:07Z
    Network: openweb
    Published URL: https://altenens.is/threads/valid-usa-uk-canada-database-get-sample-first.2931180/unread
    Screenshots:
    None
    Threat Actors: Samguz766
    Victim Country: United States, United Kingdom, Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged Data Leak of Canadian Tire Customer Records
    Category: Data Leak
    Content: A threat actor operating under the alias ROCK01 has made available an alleged database dump containing approximately 10 million Canadian Tire customer records. The leaked data reportedly includes names, addresses, cities, provinces, postal codes, and phone numbers, distributed in CSV format with a compressed size of 105 MB. The post requires forum engagement to access the download link, and a Telegram contact handle (@jamesdigga) is also provided.
    Date: 2026-04-28T22:41:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/canadian-tire-breach-2025-exposed-with-names-emails-etc.2931190/unread
    Screenshots:
    None
    Threat Actors: ROCK01
    Victim Country: Canada
    Victim Industry: Retail
    Victim Organization: Canadian Tire
    Victim Site: canadiantire.ca
  16. Alleged leak of mixed credential combolists including Hotmail, Live, and Outlook accounts
    Category: Data Leak
    Content: A threat actor operating under the alias WhiteMelly has made available a 4GB collection of URL:Login:Password credential lines sourced from stealer logs, shared via a Telegram channel. The combolist includes mixed credentials spanning multiple regions (EU, UK, FR, PL, DE, IT) with a focus on Microsoft email services including Hotmail, Live, Outlook, and MSN accounts. The actor promotes daily free distribution of logs, cookies, and credential lists through Telegram, while also offering items fo
    Date: 2026-04-28T22:41:40Z
    Network: openweb
    Published URL: https://altenens.is/threads/4gb-url-login-pass-lines-from-logs.2931184/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged leak of mixed credential logs including Hotmail, Live, and Outlook accounts
    Category: Data Leak
    Content: A threat actor operating under the alias WhiteMelly is distributing 1.5GB of mixed credential logs, cookies, and combolists via Telegram on a daily basis for free. The data includes email credentials from services such as Hotmail, Live, Outlook, and MSN, with geographic coverage spanning multiple European regions including the EU, UK, France, Poland, Germany, and Italy. The actor also advertises paid offerings through a Telegram bot (@suphoodbot), suggesting a dual free-and-paid distribution m
    Date: 2026-04-28T22:41:26Z
    Network: openweb
    Published URL: https://altenens.is/threads/1-5gb-full-logs.2931185/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged sale of credential combolists and account access across multiple countries
    Category: Combo List
    Content: Multiple vendors advertising the sale of credential combolists (email:password combinations) and private cloud database access containing Hotmail credentials and account data for various platforms (eBay, Walmart, Amazon, Kleinanzeigen, Poshmark, etc.) across multiple countries including UK, DE, JP, NL, BR, PL, ES, US, IT, FR, MX, CA, SG, and others. Vendors claim to have private cloud infrastructure with high-quality (HQ) credential datasets and offer keyword-specific searches.
    Date: 2026-04-28T22:40:05Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71718
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Multiple (United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy, France, Mexico, Canada, Singapore, Russia)
    Victim Industry: E-commerce, Email Services, Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged defacement of Küçükislamoğlu Partners website by Khaibar Tech Team and Fynix
    Category: Defacement
    Content: Khaibar Tech Team in collaboration with Fynix claims to have successfully breached the official website of Küçükislamoğlu Partners, a Turkish law and legal consultancy firm. The threat actors state this operation marks the beginning of joint offensive activities and cite political motivations related to Palestine. They claim intentions to continue targeting digital infrastructure of entities they describe as Zionist and American affiliates.
    Date: 2026-04-28T22:38:18Z
    Network: telegram
    Published URL: https://t.me/KHB313/15
    Screenshots:
    None
    Threat Actors: Khaibar Tech Team
    Victim Country: Turkey
    Victim Industry: Legal Services
    Victim Organization: Küçükislamoğlu Partners
    Victim Site: www.kucukislamoglu.av.tr
  20. Alleged leak of mixed email credentials and combolist data including Hotmail, Live, and Outlook accounts
    Category: Data Leak
    Content: A threat actor operating under the alias WhiteMelly has made available a mixed combolist of approximately 20,000 credential lines, including Hotmail, Live, Outlook, and MSN email accounts spanning multiple European regions (EU, UK, France, Poland, Germany, Italy). The post advertises free daily distributions of ULP (URL:Login:Password) combolists, logs, cookies, and leaked data via a Telegram channel. The actor also promotes a Telegram bot (@suphoodbot) for purchase inquiries, suggesting addit
    Date: 2026-04-28T22:37:53Z
    Network: openweb
    Published URL: https://altenens.is/threads/20k-mix-lines-mail-access.2931181/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged leak of Hotmail and mixed email credentials combolist
    Category: Data Leak
    Content: A threat actor operating under the alias WhiteMelly has shared a combolist containing approximately 2,000 Hotmail credential lines (email:password format) on a cybercrime forum. The post advertises daily free distributions of mixed credential lists, logs, cookies, and leaked data via a Telegram channel, covering multiple email providers including Hotmail, Live, Outlook, and MSN across various European regions. The actor also solicits buyers through a Telegram bot handle (@suphoodbot) for those
    Date: 2026-04-28T22:37:40Z
    Network: openweb
    Published URL: https://altenens.is/threads/2k-hotmail-lines-mail-access.2931182/unread
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  22. Alleged leak of 120,000 mixed email credentials combolist
    Category: Data Leak
    Content: A threat actor known as carlos080 has shared a free download of a combolist containing approximately 120,000 email:password credential pairs described as fresh and high quality. The combolist is mixed format, including credentials associated with major email providers such as AOL, Yahoo, Hotmail, and Outlook, spanning multiple countries including the USA, UK, France, Germany, Spain, Italy, Canada, and Australia. The actor also advertises paid combo services via Telegram handle @KOCsupport.
    Date: 2026-04-28T22:37:27Z
    Network: openweb
    Published URL: https://altenens.is/threads/120k-fresh-hq-combolist-email-pass-mixed.2931188/unread
    Screenshots:
    None
    Threat Actors: carlos080
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged leak of URL:Login:Password credential list containing 6.18 million records
    Category: Data Leak
    Content: A threat actor operating under the alias DaxusULP has made available a URL:Login:Password combolist containing approximately 6.18 million credential pairs on the XF forum. The post promotes the Daxus.pro platform and associated Telegram channels for access to the full dataset. No specific victim organization or targeted service has been identified, suggesting this is an aggregated credential list sourced from multiple origins.
    Date: 2026-04-28T22:32:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/url-log-pass-6-18-m-daxus-pro-uhq.611863/
    Screenshots:
    None
    Threat Actors: DaxusULP
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged Sale of Initial Access to South Korean Insurance Firm via VMware Horizon
    Category: Initial Access
    Content: A threat actor operating under the alias TunaFish is selling SYSTEM-level access to an unnamed South Korean insurance company via a compromised VMware Horizon instance. The target organization reportedly generates between $10M and $25M in annual revenue and operates a network of approximately 500 hosts protected by SentinelOne EDR. The access is listed for $898 in Bitcoin on a dark web forum.
    Date: 2026-04-28T22:28:06Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-VMware-Horizon-Insurance-South-Korea-10M-25M-revenue
    Screenshots:
    None
    Threat Actors: TunaFish
    Victim Country: South Korea
    Victim Industry: Insurance
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged Data Breach of USA Police Database with 90,000 Records
    Category: Data Breach
    Content: A threat actor operating under the alias spider321 is selling a database allegedly containing 90,000 records of US law enforcement personnel. The exposed data includes full names, email addresses, phone numbers, IP addresses, agency affiliations, job titles, zip codes, and supervisor contact details spanning multiple police departments and law enforcement agencies across Texas and Missouri. Sample records include personnel from agencies such as Dallas County Sheriffs Office, Frisco Police Dep
    Date: 2026-04-28T22:26:01Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-Police-Db-90k-records
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: United States
    Victim Industry: Law Enforcement / Public Safety
    Victim Organization: Multiple US Law Enforcement Agencies
    Victim Site: Unknown
  26. Alleged Sale of FBI Employee Credentials
    Category: Data Breach
    Content: A threat actor operating under the alias spider321 is allegedly selling a dataset of FBI employee credentials on the Sellers Place forum. The dataset, claimed to contain over 110,000 records, includes plaintext email and password combinations associated with fbi.gov and ic.fbi.gov domains. Interested buyers are directed to contact the seller via Telegram at @Gotham5599.
    Date: 2026-04-28T22:25:21Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-FBI-DATA
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Federal Bureau of Investigation (FBI)
    Victim Site: fbi.gov
  27. Alleged Sale of M1 Abrams Tank Military Manuals
    Category: Data Breach
    Content: A threat actor operating under the alias spider321 on the Sellers Place forum is claiming to possess M1 Abrams tank technical manuals in PDF format and is offering them for sale. Interested buyers are directed to contact the actor via Telegram at @Gotham5599. The origin and authenticity of the claimed military documents have not been verified.
    Date: 2026-04-28T22:24:43Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-M1-Abrams-tank-manuals
    Screenshots:
    None
    Threat Actors: spider321
    Victim Country: United States
    Victim Industry: Defense & Military
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged exposure of production app configuration and critical vulnerabilities in official NPM client
    Category: Vulnerability
    Content: Security researcher or threat actor claims to have discovered unauthenticated access to entire production application configuration containing 42 config keys (feature flags, promo banners, KYC settings, referral codes, UI layouts, chat assets). Additionally claims identification of two critical CVEs in the organizations official NPM client package and successful harvesting of user biographical data including political affiliations and social media links. Internal sports data provider IDs also reportedly mapped.
    Date: 2026-04-28T22:17:10Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3151
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: Unknown
    Victim Industry: Technology/Finance (inferred from KYC, referral, sports data references)
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged leak of Hotmail and streaming service credentials combolist
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available a combolist containing approximately 394,054 credential pairs targeting Hotmail accounts and streaming service users. The list is described as fresh and is being distributed freely via a Mega.nz file sharing link. The combolist appears to aggregate credentials potentially usable for account takeover attacks against streaming platforms.
    Date: 2026-04-28T22:01:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73591/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology / Streaming
    Victim Organization: Microsoft Hotmail / Multiple Streaming Services
    Victim Site: hotmail.com
  30. Alleged exposure of Polymarket admin portal with Vercel SSO access
    Category: Initial Access
    Content: Exposed Polymarket production admin portal (pmoo-admin-portal.prd.preview.polymarket.dev) with Vercel SSO authentication credentials made available.
    Date: 2026-04-28T22:01:24Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3148
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: United States
    Victim Industry: Cryptocurrency/Prediction Markets
    Victim Organization: Polymarket
    Victim Site: polymarket.dev
  31. Alleged leak of PSN credentials combolist
    Category: Combo List
    Content: A threat actor known as CODER is distributing a PlayStation Network (PSN) combolist referred to as PSN COMBO 12 ML via Telegram channels. The post directs users to a Telegram contact and two group channels for free access to the credential list and related tools. No further details regarding the number of records or data fields are provided in the post.
    Date: 2026-04-28T22:00:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73592/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: PlayStation Network
    Victim Site: playstation.com
  32. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias snowstormxd has made available a combolist containing 728 alleged Hotmail credentials via a public paste link and a Telegram channel. The post promotes a paid cloud service and inbox-checking tool, suggesting the credentials have been validated. The actor is also monetizing access to a broader credential cloud service with tiered pricing.
    Date: 2026-04-28T22:00:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73593/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  33. Alleged leak of Outlook.com mixed combolist credentials
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has made available a mixed combolist containing 12,773 lines of credentials targeting outlook.com accounts, dated April 28, 2026. The combolist, shared via a Mega.co.nz link on a cracking forum, appears to contain email and password combinations sourced from multiple origins. The post requires a reaction to access the download link.
    Date: 2026-04-28T21:59:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73594/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: outlook.com
  34. Alleged leak of 3.1 million URL-login-password credentials
    Category: Combo List
    Content: A threat actor operating under the alias RandomUpload has shared a combolist containing approximately 3.1 million URL, login, and password combinations on the cracking forum CrackingX. The post requires forum registration to access the hidden download content. No specific victim organization or country has been identified, suggesting this is an aggregated credential list compiled from multiple sources.
    Date: 2026-04-28T21:59:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73595/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged cyber attack on Arvan Cloud and Hamrah-e Aval infrastructure by Jujeh Ordak group
    Category: Cyber Attack
    Content: Post claims that Jujeh Ordak (Ugly Duckling) threat group conducted an attack against Arvan Cloud infrastructure and Hamrah-e Aval (Iranian telecom/infrastructure provider) systems.
    Date: 2026-04-28T21:41:08Z
    Network: telegram
    Published URL: https://t.me/c/3575098403/142
    Screenshots:
    None
    Threat Actors: Jujeh Ordak
    Victim Country: Iran
    Victim Industry: Cloud Infrastructure, Telecommunications
    Victim Organization: Arvan Cloud, Hamrah-e Aval
    Victim Site: Unknown
  36. Alleged data breach of pcd.com.sa
    Category: Data Leak
    Content: A threat actor known as lulzintel has made available an alleged database dump from pcd.com.sa, a Saudi Arabian organization. The breach reportedly occurred in April 2026 and exposed data belonging to approximately 72,558 customers. The database is being offered as a free download on a cybercrime forum, gated behind a points-based unlock system.
    Date: 2026-04-28T21:26:55Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-SA-pcd-com-sa-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: lulzintel
    Victim Country: Saudi Arabia
    Victim Industry: Unknown
    Victim Organization: PCD
    Victim Site: pcd.com.sa
  37. Alleged Multiple Vulnerabilities in Polymarket Platform Including SSRF, Authorization Bypass, and API Abuse
    Category: Vulnerability
    Content: Security researcher discloses multiple vulnerabilities in Polymarkets infrastructure: (1) Unauthenticated /reports endpoint exposing 100 moderation records with internal system metadata including admin authentication addresses; (2) CVE-2025-62718 – SSRF vulnerability in polymarket/clob-client axios 1.14.0 via hostname normalization and NO_PROXY bypass allowing access to 169.254.169.254 and internal Kubernetes services (CVSS 9.9); (3) CVE-2024-51479 – Next.js middleware authorization bypass affecting affiliate.polymarket.com and preprod deployments with potential admin dashboard access; (4) API abuse vectors including lack of input validation (limit=999999, offset=-1 accepted), insufficient rate limiting (112 req/10s unblocked), and CORS misconfiguration (wildcard + credentials=true).
    Date: 2026-04-28T21:26:49Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3143
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: United States
    Victim Industry: Cryptocurrency/Prediction Markets
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  38. Alleged leak of Hotmail.fr credential combolist targeting European users
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has made available a combolist containing approximately 1,846 email:password credential pairs associated with hotmail.fr accounts. The post is dated April 28, 2026, and targets European users. The combolist was shared freely via a Mega.co.nz link on the cracking forum CrackingX.
    Date: 2026-04-28T21:19:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73586/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: France
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.fr
  39. Alleged leak of Hotmail credential combolist with country-sorted hits
    Category: Combo List
    Content: A threat actor operating under the alias Hotmail Cloud has made available a combolist of 1,259 claimed high-quality Hotmail credential hits on the cracking forum CrackingX. The leak includes inbox-verified accounts sorted by country, along with associated keyword targets, suggesting the credentials have been tested and validated for active inbox access.
    Date: 2026-04-28T21:19:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73587/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Multiple Countries
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  40. Alleged leak of 12 million SMTP/IMAP credentials via combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist containing approximately 12 million SMTP and IMAP credentials via Telegram channels. The content appears to be freely shared through two Telegram groups, with the actor also offering additional combos upon direct contact. No specific victim organization or country has been identified.
    Date: 2026-04-28T21:18:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73588/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged leak of Hotmail and Outlook credentials combolist
    Category: Combo List
    Content: A threat actor known as karaokecloud has made available a combolist containing 810 email:password credential pairs for Hotmail and Outlook accounts on the cracking forum CrackingX. The combolist is offered as a free download. No specific breach source or victim country has been identified.
    Date: 2026-04-28T21:18:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73589/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  42. Alleged leak of Brazilian email and password combolist
    Category: Combo List
    Content: A threat actor known as ShroudX has shared an alleged high-quality Brazilian email and password combolist on a cybercrime forum. The credential list is being made available for free to users who reply to the thread. The origin and scope of the combolist are unknown, as the post content is hidden behind a reply gate.
    Date: 2026-04-28T20:56:50Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-BRAZIL-EMAILPASS-COMBOLIST-txt–188734
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alleged leak of Canadian email and password combolist
    Category: Combo List
    Content: A threat actor operating under the alias ShroudX has shared an alleged high-quality Canadian email and password combolist on a cybercrime forum. The content is gated behind a reply requirement, suggesting it is being distributed freely to forum members. The post does not specify the source, number of records, or targeted organizations.
    Date: 2026-04-28T20:56:07Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-CANADA-EMAILPASS-COMBOLIST-txt–188735
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Alleged leak of France email and password combolist
    Category: Combo List
    Content: A threat actor known as ShroudX has shared an alleged high-quality French email and password combolist on a cybercrime forum. The content is gated behind a reply requirement, suggesting it is being distributed for free to forum members. The combolist appears to contain email address and password credential pairs targeting French users.
    Date: 2026-04-28T20:55:26Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-FRANCE-EMAILPASS-COMBOLIST-txt–188736
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Alleged leak of mixed email:password combolist on cybercrime forum
    Category: Combo List
    Content: A threat actor known as ShroudX has shared a mixed email:password combolist on a cybercrime forum, made available to users who reply to the thread. The combolist is described as high quality and contains credentials from multiple sources. No specific victim organization, country, or record count has been identified.
    Date: 2026-04-28T20:54:26Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-HQ-MIXED-EMAILPASS-COMBOLIST-txt–188738
    Screenshots:
    None
    Threat Actors: ShroudX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Alleged data breach of Creedx / MonsterGateway Brazilian white-label payment gateway
    Category: Data Breach
    Content: Threat actor ka1do claims a full compromise of Creedx Finance LTDAs Supabase CRM, a Brazilian white-label payment gateway operating under the brands Creedx and MonsterGateway. The breach allegedly exposed 43,000+ leads containing full PII (names, emails, WhatsApp numbers, CPFs), integration API keys, and financial configurations, while 27 admin backdoors were created across client tenants and unauthenticated payment webhooks were exploited to fraudulently mark transactions as paid. The actor
    Date: 2026-04-28T20:23:09Z
    Network: openweb
    Published URL: https://breached.st/threads/full-breach-creedx-monstergateway-brazilian-white-label-payment-gateway-supabase-crm-full-compromise.86434/unread
    Screenshots:
    None
    Threat Actors: ka1do
    Victim Country: Brazil
    Victim Industry: Financial Services
    Victim Organization: Creedx Finance LTDA
    Victim Site: creedx.com.br
  47. Alleged Sale of Hotmail Credential Combolist with Inboxer Tool
    Category: Combo List
    Content: A threat actor known as snowstormxd is selling a combolist of 728 Hotmail credentials on a cracking forum. The post includes a download link and promotes a paid cloud service ranging from $3 for 24 hours to $120 for lifetime access. A built-in inboxer tool is advertised alongside the credential list, suggesting the credentials have been validated for inbox access.
    Date: 2026-04-28T19:58:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73577/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  48. Alleged leak of mixed European credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has shared a mixed combolist on a cracking forum, reportedly containing 6,857 lines of credentials targeting European users. The combolist was made available as a free download via a Mega file-sharing link. No specific organization or industry has been identified as the source of the leaked credentials.
    Date: 2026-04-28T19:58:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73578/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Europe
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged Sale of Fullz, SSN, SIN, NIN and Financial Leads Across Multiple Countries
    Category: Combo List
    Content: A threat actor operating under the Telegram handle @Adamspeek is advertising the sale of fullz and personally identifiable information including US Social Security Numbers, Canadian Social Insurance Numbers, and UK National Insurance Numbers. The offering also includes credit card dumps, financial leads across multiple sectors such as mortgage, crypto, forex, and insurance, as well as drivers license images with selfies. The actor claims data is fresh and replaceable, with bulk discounts availa
    Date: 2026-04-28T19:57:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73580/
    Screenshots:
    None
    Threat Actors: parkeradam964
    Victim Country: Unknown
    Victim Industry: Multiple Sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged leak of Hotmail credential combolist
    Category: Data Leak
    Content: A threat actor known as Megacloud shared a combolist of 600 allegedly valid Hotmail credentials on the AE – Combo List forum. The post, dated April 28, is gated behind a reply requirement, suggesting it is a free leak rather than a sale. The credentials are described as high quality and freshly validated.
    Date: 2026-04-28T19:54:25Z
    Network: openweb
    Published URL: https://altenens.is/threads/600x-hotmail-just-valid-just-top-quality-28-04.2931156/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  51. Alleged sale of stolen account credentials and access logs for email, banking, and social media services
    Category: Logs
    Content: Threat actor offering for sale stolen credentials and account access logs for multiple services including Hotmail, Gmail, Comcast, ATT, AOL, Facebook, LinkedIn, iCloud, Uber, Reddit, and various dating/travel platforms. Post indicates availability of UHQ (ultra high quality) mailpass access and full account information.
    Date: 2026-04-28T19:23:34Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71641
    Screenshots:
    None
    Threat Actors: Yìchén
    Victim Country: Unknown
    Victim Industry: Multiple (Email, Social Media, Financial, Travel, Dating)
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Alleged leak of 130,000 Japanese email credentials
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has shared a combolist of approximately 130,000 email and password credential pairs allegedly associated with Japanese users on a cybercrime forum. The content is described as semi-private and high quality. The actor also advertises cracking, spamming, and dumping tools and services via Telegram.
    Date: 2026-04-28T19:20:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-130K-JAPAN-Semi-Private-HQ-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Alleged leak of 310,000 Polish credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has made available a combolist containing approximately 310,000 email and password credential pairs associated with Polish users. The content is hidden behind a registration or login requirement on the forum. The actor promotes additional services including spam tools, cracking tools, and lessons via Telegram channels.
    Date: 2026-04-28T19:19:54Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-310K-POLAND-Good-Quality-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as el_capitan has made available a combolist containing approximately 450,000 Hotmail email and password combinations on a cybercrime forum. The content is hidden behind a registration or login requirement. The actor also promotes services including combo sales, spamming, dumping, and cracking tools via Telegram channels.
    Date: 2026-04-28T19:19:38Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-450K-HOTMAIL-Good-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  55. Alleged leak of Outlook.com European credential combolist
    Category: Combo List
    Content: A threat actor on a cracking forum has made available a combolist containing 12,767 email and password combinations associated with outlook.com accounts, purportedly targeting European users. The credential list is dated April 28, 2026, and is being distributed for free via a Mega file-sharing link. The combolist may be used for account takeover attempts or credential stuffing attacks.
    Date: 2026-04-28T19:19:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73572/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: outlook.com
  56. Alleged leak of 625,000 Gmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has made available a combolist claiming to contain 625,000 Gmail email and password combinations. The post is hosted on a known cybercrime forum and the actor advertises additional services including spamming, dumping, and cracking tools. The actor promotes contact via Telegram channels for further engagement.
    Date: 2026-04-28T19:19:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-625K-GMAIL-High-Quality-Fresh-Combolist
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  57. Alleged leak of mixed combolist with 1,457 entries
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a mixed combolist containing 1,457 credential entries via a free download link on pasteview.com and a Telegram channel. The post also promotes a paid cloud service (snowstormxd Cloud) offering tiered subscription pricing, advertising features such as a built-in inboxer and private storage. No specific victim organization or country is identified, suggesting the combolist is aggregated from multiple sources.
    Date: 2026-04-28T19:19:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73575/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged leak of 7.2 million mixed-country credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias el_capitan has shared a combolist containing approximately 7.2 million email and password combinations sourced from multiple countries on a cybercrime forum. The credentials are described as suitable for a variety of malicious uses. The actor promotes additional services including spamming, dumping, and cracking tools via Telegram.
    Date: 2026-04-28T19:18:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-7-2M-Mix-Countries-Combolist-Good-For-All
    Screenshots:
    None
    Threat Actors: el_capitan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged leak of Business Corporate Email Credentials and SMTP Access
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 118,133 lines of business corporate email credentials paired with passwords and SMTP access details. The data was shared via a Mega.nz file link on the cracking forum CrackingX. The leak appears to target corporate email accounts across multiple organizations, potentially enabling unauthorized SMTP-based email abuse or account takeover.
    Date: 2026-04-28T19:18:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73576/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Multiple Sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged sale of mixed personal data including SSNs, driver licenses, passports, and corporate records
    Category: Data Breach
    Content: A threat actor operating under the alias jannat123 is advertising multiple categories of sensitive data for sale via Telegram (@jannat646500). The offered data includes full company databases, scanned identity documents (IDs, driver licenses, passports), consumer information, phone and email lists, credential lists, SSN/SIN databases, and dumps from large websites. The scope and origin of the data remain unverified, and no specific victim organizations or record counts have been disclosed.
    Date: 2026-04-28T19:07:14Z
    Network: openweb
    Published URL: https://xforums.st/threads/i-have-driver-license-ssn-passports-llc-ein-ltd.611861/
    Screenshots:
    None
    Threat Actors: jannat123
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged leak of cookies and credentials for multiple platforms including cPanel, GOG, and Epic Games
    Category: Data Leak
    Content: A threat actor operating under the alias bluestarcrack has made available what appears to be stolen session cookies and credentials for multiple platforms including cPanel, GOG, and Epic Games. The data is hosted on an external file hosting service (Uploadery). The exact number of affected accounts and geographic scope are unknown.
    Date: 2026-04-28T19:06:20Z
    Network: openweb
    Published URL: https://breached.st/threads/cookies-cpanel-gog-epicgames-more.86431/unread
    Screenshots:
    None
    Threat Actors: bluestarcrack
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Multiple (cPanel, GOG, Epic Games)
    Victim Site: Unknown
  62. Alleged data leak of Club Sportif Multisections (CSME)
    Category: Data Leak
    Content: A threat actor known as NormalLeVrai has freely leaked 1,272 confidential records allegedly belonging to Club Sportif Multisections (CSME), a French multi-sport association. The data was reportedly extracted directly from the organizations email inbox on 25/04/2026 and includes references to Postal Bank information. The actor also noted that the club manager used his work email to register on dating and adult websites.
    Date: 2026-04-28T19:00:32Z
    Network: openweb
    Published URL: https://spear.cx/Thread-FR-Club-Sportif-Multisections
    Screenshots:
    None
    Threat Actors: NormalLeVrai
    Victim Country: France
    Victim Industry: Sports & Recreation
    Victim Organization: Club Sportif Multisections
    Victim Site: Unknown
  63. Alleged leak of stealer logs and credential combolists
    Category: Logs
    Content: A threat actor operating under the alias watercloud has made available stealer logs and a ULP (URL:Login:Password) combolist via Pixeldrain file-sharing links. The files are password-protected and shared freely on a dark web forum. No specific victim organization or country has been identified, suggesting the data may span multiple targets harvested through infostealer malware.
    Date: 2026-04-28T18:58:59Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90%E2%AD%90%E2%AD%90-STEALER-LOGS-AND-U-L-P-28-04-2026
    Screenshots:
    None
    Threat Actors: watercloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Alleged leak of Tawjih.tn database
    Category: Data Leak
    Content: A database leak allegedly from Tawjih.tn has been reported and documented on hacknotice.com. Tawjih.tn appears to be a Tunisian educational or guidance platform. The leak details are referenced in the provided URL.
    Date: 2026-04-28T18:53:27Z
    Network: telegram
    Published URL: https://t.me/c/3008049195/316
    Screenshots:
    None
    Threat Actors: Mecrobyte
    Victim Country: Tunisia
    Victim Industry: Education
    Victim Organization: Tawjih.tn
    Victim Site: tawjih.tn
  65. Alleged data breach of Polymarket with 800GB of stolen data
    Category: Data Breach
    Content: A threat actor claims to possess 800GB of data from Polymarket and is threatening to share it unless contacted for negotiation. This suggests a data exfiltration incident with potential extortion.
    Date: 2026-04-28T18:47:06Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3110
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: United States
    Victim Industry: Cryptocurrency/Prediction Markets
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  66. ✪ [ 167 K++ ] Combo ✪ @Elite_Cloud1 ✪ { Mexico } ✪ [ 28/APR/2026 ] ✪
    Category: Combo List
    Content: New thread posted by thejackal101: ✪ [ 167 K++ ] Combo ✪ @Elite_Cloud1 ✪ { Mexico } ✪ [ 28/APR/2026 ] ✪
    Date: 2026-04-28T18:37:59Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-167-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Mexico-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged leak of Malaysian credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 59,000 email and password credential pairs allegedly associated with Malaysian users. The post, dated April 28, 2026, is marked as FRESH and HQ (high quality), suggesting recently obtained or validated credentials. The content is hosted behind a registration wall on a cybercrime forum, with additional credential logs promoted via a Telegram channel.
    Date: 2026-04-28T18:37:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-59-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Malaysia-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Malaysia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged leak of Montenegro credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 61,000+ email and password credentials associated with Montenegro. The list is described as FRESH and HQ (high quality), suggesting recently obtained or validated credentials. The post directs users to a Telegram channel (@elite_cloud1) for additional credential lists.
    Date: 2026-04-28T18:36:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-61-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Montenegro-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Montenegro
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Alleged leak of Latvian credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 60,000+ email and password credential pairs allegedly associated with Latvian users. The list is described as fresh and high quality and is being distributed via a hidden content link on the forum, with additional logs promoted through the Telegram channel @elite_cloud1.
    Date: 2026-04-28T18:36:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-60-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Latvia-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Latvia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Alleged leak of Kenyan email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of over 20,000 email address and password pairs purportedly sourced from Kenya, dated April 28, 2026. The credentials are described as fresh and high quality and are accessible via a hidden content mechanism requiring forum registration. The actor also promotes a Telegram channel (@elite_cloud1) for further credential distributions.
    Date: 2026-04-28T18:35:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-20-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Kenya-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Kenya
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged leak of Micronesia credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 20,000+ email and password credential pairs purportedly associated with Micronesia. The list is described as fresh and high quality and is shared via a hidden content link on the forum. The actor also promotes a Telegram channel (t.me/elite_cloud1) for additional credential logs.
    Date: 2026-04-28T18:35:15Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-20-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Micronesia-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Micronesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Alleged leak of 28,000 valid email access credentials
    Category: Combo List
    Content: A threat actor on CrackingX (TRLCD2) has shared what is claimed to be a list of 28,000 valid email access credentials. The content is gated behind registration on the forum, limiting full visibility. No specific victim organization, country, or industry has been identified based on available information.
    Date: 2026-04-28T18:35:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73567/
    Screenshots:
    None
    Threat Actors: TRLCD2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Alleged leak of Lithuanian credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 17,000+ email and password combinations allegedly associated with Lithuanian users. The credential list is described as fresh and high quality and is shared via a hidden download link on the forum. The actor also directs users to a Telegram channel (@elite_cloud1) for additional credential logs.
    Date: 2026-04-28T18:34:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-17-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Lithuania-%E2%9C%AA-28-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Lithuania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a mixed Hotmail credential combolist containing approximately 9 million entries. The combolist is being distributed for free via Telegram channels linked to the actor. The post directs interested parties to contact the actor via Telegram handle CODER5544 or join associated group channels.
    Date: 2026-04-28T18:34:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73571/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  75. Alleged leak of 500GB+ Indonesian eBook collection from iPusnas
    Category: Data Leak
    Content: A threat actor on Breached forums has made available a collection of over 500GB of Indonesian eBook PDFs allegedly sourced from iPusnas, Indonesias national digital library platform. The actor claims the collection includes high-quality text-based eBooks not available on other platforms such as Zlibrary or Annas Archive. The content is suggested for use in LLM training datasets, and a session token is included as a sample.
    Date: 2026-04-28T18:22:36Z
    Network: openweb
    Published URL: https://breached.st/threads/500gb-indonesian-ebook-from-ipusnas.86428/unread
    Screenshots:
    None
    Threat Actors: yugdab
    Victim Country: Indonesia
    Victim Industry: Digital Library / Publishing
    Victim Organization: iPusnas
    Victim Site: ipusnas.id
  76. Alleged Data Breach of SMK Negeri 3 Kota Tangerang Selatan
    Category: Data Breach
    Content: A threat actor known as Mr. Hanz Xploit has posted what appears to be a database allegedly belonging to SMK Negeri 3 Kota Tangerang Selatan, a vocational high school in South Tangerang City, Indonesia. The post was shared on the Breached forum under the databases section. No further details regarding the content, record count, or nature of the data are available.
    Date: 2026-04-28T18:21:27Z
    Network: openweb
    Published URL: https://breached.st/threads/database-smk-negeri-3-kota-tangerang-selatan.86429/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: SMK Negeri 3 Kota Tangerang Selatan
    Victim Site: Unknown
  77. Alleged distribution of Netflix email validation tool for credential stuffing preparation
    Category: Carding
    Content: A threat actor operating under the alias ARON-TN has made available a console-based email validation tool targeting Netflix, shared freely on a cracking forum. The tool is designed to filter and validate large email datasets in bulk, enabling users to identify valid accounts before launching credential stuffing or account takeover attacks. The post includes a VirusTotal link and advises users to disable antivirus software to run the tool, indicating likely malicious functionality.
    Date: 2026-04-28T17:55:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Netflix-Email-Valid-Checker-by-ARON-TN
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Entertainment / Streaming
    Victim Organization: Netflix
    Victim Site: netflix.com
  78. Alleged leak of gaming-related credential combolist containing 4.7 million records
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a gaming-themed combolist containing approximately 4.7 million credential pairs via Telegram channels. The content is being made available for free through two Telegram groups, with the actor also promoting additional free programs. The specific gaming platforms or organizations from which the credentials originated are not identified in the post.
    Date: 2026-04-28T17:55:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73561/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged distribution of Dork Searcher tool for bulk search query automation
    Category: Initial Access
    Content: A threat actor operating under the alias Mr Nexer has made available a console-based dork search tool via a cracking forum. The utility automates the loading and execution of bulk Google dork query lists from .txt files, enabling fast enumeration of potentially vulnerable or exposed targets. The tool is lightweight, requires minimal setup, and is designed for scraping and bulk search workflows, with antivirus evasion noted in the disclaimer.
    Date: 2026-04-28T17:55:12Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Dork-Searcher-by-Mr-Nexer
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged leak of mixed credential combolist targeting USA, UK, Poland, Italy, and Germany
    Category: Combo List
    Content: A threat actor using the handle karaokecloud has shared a combolist containing 3,840 email and password combinations on the cracking forum CrackingX. The credentials are described as verified (good) mail access combos sourced from users across the United States, United Kingdom, Poland, Italy, and Germany. The combolist is being made available as a free download.
    Date: 2026-04-28T17:54:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73562/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Multiple
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  81. Alleged leak of corporate email combolist with 12 million credentials
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist claimed to contain 12 million corporate email credentials. The content is accessible via registration or sign-in on the forum, and the actor also promotes free combolists and tools through Telegram channels. No specific victim organization or country has been identified.
    Date: 2026-04-28T17:54:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73563/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple Sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged leak of live.com mixed credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has shared a mixed combolist targeting live.com accounts, comprising approximately 2,066 lines of credentials. The combolist was made available as a free download via a Mega file-sharing link on the cracking forum CrackingX. The post is dated April 28, 2026, and the content is gated behind a reaction requirement.
    Date: 2026-04-28T17:54:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73564/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: live.com
  83. Alleged sale of Yahoo-targeted credential combolist containing 138,000 records
    Category: Combo List
    Content: A threat actor operating under the alias alex12 is selling a Yahoo-targeted combolist containing approximately 138,000 email and password credential pairs on the crackingx.com forum. The seller also claims to offer combolists targeting additional email providers including AOL, Hotmail, and Outlook, as well as region-specific lists for multiple countries. Contact is facilitated via Telegram handle @KOCsupport.
    Date: 2026-04-28T17:54:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73565/
    Screenshots:
    None
    Threat Actors: alex12
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  84. Alleged RCE Vulnerability Disclosure in AI-Powered Code Generation Endpoints (CVE-2026-4137)
    Category: Initial Access
    Content: A technical analysis post on a cybercrime forum details CVE-2026-4137, a remote code execution vulnerability affecting AI/ML code generation endpoints in web applications. The post describes an attack chain involving prompt injection, sandbox evasion, and arbitrary code execution by bypassing input validation in AI-assisted coding tools. Multiple exploitation techniques are shared including direct command injection, context escape, multi-step bypass, and template injection payloads targeting vul
    Date: 2026-04-28T17:47:03Z
    Network: openweb
    Published URL: https://tier1.life/thread/187
    Screenshots:
    None
    Threat Actors: hyflock
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Alleged sale of Yellow Stealer malware with credential and data harvesting capabilities
    Category: Initial Access
    Content: A threat actor operating under the alias Polaris Web is selling a C/C++ x64 information stealer dubbed Yellow Stealer on HackForums. The malware features extensive data exfiltration capabilities including browser credential and cookie theft, Discord and Telegram session harvesting, cryptocurrency wallet extraction (150+ wallets), gaming platform credential theft, messaging app session hijacking, and screenshot capture, with anti-analysis obfuscation and UAC bypass functionality. The stealer
    Date: 2026-04-28T17:42:17Z
    Network: openweb
    Published URL: https://hackforums.net/showthread.php?tid=6324545
    Screenshots:
    None
    Threat Actors: Polaris Web
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  86. SMS Gateway Service Advertisement – High-Quality Routes Across Europe
    Category: Phishing
    Content: User Vddstxwwo advertising SMS gateway sender services offering fast and reliable SMS delivery across multiple European countries including France, Spain, Italy, Malta, Sweden, Austria, Denmark, Luxembourg, Germany, Greece, Norway, Croatia, Poland, Romania, Belgium, Netherlands, UK, Portugal, Finland, Switzerland, Ireland. Service claims instant delivery and incredible rates with free test available.
    Date: 2026-04-28T17:42:07Z
    Network: telegram
    Published URL: https://t.me/YoungJNCrossBulksms0285/13
    Screenshots:
    None
    Threat Actors: Young Global Bulk sms
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Alleged Data Breach of RealT Blockchain Real Estate Platform
    Category: Data Breach
    Content: A threat actor known as lowiq has shared a database dump allegedly obtained from RealT (realt.co), a blockchain-based real estate investment platform. The exposed data, dated April 18, 2026, contains approximately 61,738 records including user IDs, names, email addresses, phone numbers, bank account numbers, account types, user roles, and Plaid-linked financial account details. The breach appears to expose both individual investors and internal staff accounts, including attorneys, managers, an
    Date: 2026-04-28T17:37:19Z
    Network: openweb
    Published URL: https://breached.st/threads/realt-61-7k.86427/unread
    Screenshots:
    None
    Threat Actors: lowiq
    Victim Country: United States
    Victim Industry: Financial Technology (FinTech) / Cryptocurrency
    Victim Organization: RealT
    Victim Site: realt.co
  88. Alleged leak of Gmail credentials combolist targeting European users
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has made available a combolist of approximately 41,069 Gmail credentials on the cracking forum CrackingX. The combolist is described as targeting European users and was shared via a Mega.co.nz download link. The post does not mention a price, indicating this is a free distribution of the credential list.
    Date: 2026-04-28T17:09:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73555/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  89. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor on DemonForums shared an alleged combolist containing 20,805 Hotmail email and password combinations. The content is hidden behind a registration or login requirement, suggesting it is being made available to forum members for free. No further details about the origin or collection method of the credentials are provided.
    Date: 2026-04-28T17:09:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-20805x-HOTMAIL
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  90. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias COYYYTOOOO has freely shared a combolist of approximately 2,000 alleged valid Hotmail email and password combinations on a cybercriminal forum. The credential list was made available via an external paste site link. The validity of the credentials has not been independently verified.
    Date: 2026-04-28T17:09:05Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2K-VALID-HOTMAIL
    Screenshots:
    None
    Threat Actors: COYYYTOOOO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  91. Alleged leak of gaming and casino credential combolist targeting Germany
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist of approximately 879,005 lines targeting gaming and casino platforms in Germany. The credential list was shared via a Mega.nz file link on the cracking forum CrackingX. The post does not specify a particular organization, suggesting the combolist may aggregate credentials from multiple gaming and casino services.
    Date: 2026-04-28T17:08:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73557/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Gaming and Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Alleged leak of mixed email credential combolist including Hotmail accounts
    Category: Combo List
    Content: A threat actor operating under the alias alphaxdd has made available a combolist of 5,445 mixed email credentials on DemonForums, claiming the entries are premium and valid. The dataset reportedly includes Hotmail accounts alongside other mail providers, described as private cloud hits. The actor promotes their Telegram handle alphaaxd and the content is gated behind forum registration or login.
    Date: 2026-04-28T17:08:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-5445x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged leak of mixed email credentials including Hotmail
    Category: Combo List
    Content: A threat actor operating under the alias alphaxdd has made available a combolist of 5,445 mixed email credentials, including verified Hotmail hits, described as premium and sourced from a private cloud. The list is offered as a free download via the cracking forum CrackingX. The actor can also be contacted via Telegram at alphaaxd.
    Date: 2026-04-28T17:08:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73558/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Alleged Data Leak of Facebook 533 Million User Records (2021 Scrape)
    Category: Data Leak
    Content: A threat actor on the AE forum has made available a structured database dump containing approximately 533 million Facebook user records allegedly scraped in 2021. The dataset includes fields such as mobile number, user ID, full name, gender, location, relationship status, workplace, email address, and birth date. The post does not claim ownership of the files and directs users to HaveIBeenPwned to verify exposure; no passwords are included in the dataset.
    Date: 2026-04-28T17:03:13Z
    Network: openweb
    Published URL: https://altenens.is/threads/smiling-face-with-heart-eyessee-no-evil-monkey-facebook-533m-records-leak-2021-scrape-see-no-evil-monkeysmiling-face-with-heart-eyes.2931104/unread
    Screenshots:
    None
    Threat Actors: ROCK01
    Victim Country: United States
    Victim Industry: Social Media / Technology
    Victim Organization: Facebook
    Victim Site: facebook.com
  95. Alleged Data Leak of fw-wizard.com Database Dump
    Category: Data Leak
    Content: A threat actor known as pressplay22 has made available a full database dump allegedly sourced from fw-wizard.com on the Breached forum. The post offers a free download of the data. The victim organizations country and industry sector have not been confirmed.
    Date: 2026-04-28T16:55:44Z
    Network: openweb
    Published URL: https://breached.st/threads/db-fw-wizard-com-com-full-dump-game.86426/unread
    Screenshots:
    None
    Threat Actors: pressplay22
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: FW Wizard
    Victim Site: fw-wizard.com
  96. Alleged sale of RDP access and compromised email accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to cloud platforms (Azure, AWS, DigitalOcean) at $200, along with compromised domain email accounts, Gmail, Yahoo accounts, and GitHub student accounts. Services advertised for inbox operations with escrow payment option.
    Date: 2026-04-28T16:36:30Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71556
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged website defacement by Mr.PIMZZZXploit
    Category: Defacement
    Content: Threat actor Mr.PIMZZZXploit claims responsibility for defacing multiple websites including performancemanagementsystem.net and associated domains. Defacement message posted with list of compromised URLs across multiple hosting providers.
    Date: 2026-04-28T16:28:39Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/660
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: performancemanagementsystem.net
  98. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has shared an alleged combolist containing 100,000 mixed credentials described as valid for forum accounts. The post was made on the cracking forum CrackingX under the Combolists & Dumps section. Full content of the post is restricted to registered members, limiting further detail on the origin or specific targets of the credential list.
    Date: 2026-04-28T16:28:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73546/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Alleged leak of Mixed Outlook credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a mixed-target Outlook combolist containing approximately 9 million credential pairs via Telegram channels. The combolist is being made available for free through two Telegram groups. Users are directed to contact the actor via Telegram handle CODER5544 or join the group channels to obtain the credential list.
    Date: 2026-04-28T16:28:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73547/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Microsoft Outlook
    Victim Site: outlook.com
  100. Alleged leak of mixed email credential lists via PandaCloud Telegram channel
    Category: Combo List
    Content: A threat actor operating under the alias Kokos2846q is distributing free mixed email combolists via a Telegram channel (PandaCloud04) and a file-sharing link. The actor claims the lists are fully valid and updated daily, and also advertises private, unused credential lists available for purchase. No specific victim organization or record count has been identified.
    Date: 2026-04-28T16:27:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73548/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias alphaxdd has made available a combolist of 1,455 alleged valid Hotmail credentials described as premium hits on a cybercriminal forum. The post indicates the content is hidden behind a registration or login requirement and references a Telegram contact for further distribution. The combolist is described as sourced from a private cloud with mixed email formats.
    Date: 2026-04-28T16:27:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1455x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–202082
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  102. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as alphaxdd has made available a combolist containing 1,455 alleged valid Hotmail credentials on a cracking forum. The post claims the credentials are premium hits with access to private cloud storage. The actor also promotes a Telegram contact for further engagement.
    Date: 2026-04-28T16:27:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73549/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  103. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor known as wingoooW has freely shared a mixed combolist containing approximately 20,000 email and password combinations on DemonForums. The combolist is described as high quality and is available for free download via an external paste site. No specific victim organization or country has been identified, suggesting the credentials originate from multiple sources.
    Date: 2026-04-28T16:26:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-20K-HQ-MIXED-MAIL
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  104. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias KiwiShio has made available a combolist containing 720 alleged Hotmail credentials on the cracking forum CrackingX. The post offers a free download of what is described as fresh, high-quality email and password combinations targeting Hotmail accounts. No additional victim details or data fields beyond credentials were specified.
    Date: 2026-04-28T16:26:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73550/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  105. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor known as klyne05 has made available a mixed email combolist on the cracking forum CrackingX, described as private and freshly verified. The post offers a free download of the credential list, which reportedly contains checked email and password combinations from various providers. No specific victim organization or record count was disclosed.
    Date: 2026-04-28T16:26:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73551/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Alleged Bulletproof Hosting Service Advertised on Cybercrime Forum by BitHosting
    Category: Initial Access
    Content: A threat actor operating as BitHosting is advertising VPS hosting services on the cybercrime forum CrackingX, offering plans ranging from $5 to $155 per month with servers located in the Netherlands, Germany, and the United States. The service accepts cryptocurrency alongside traditional payment methods, features full root access, and provides 2 Gbps shared bandwidth, characteristics commonly associated with bulletproof hosting used to support malicious infrastructure. The advertisement target
    Date: 2026-04-28T16:26:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73545/
    Screenshots:
    None
    Threat Actors: BitHosting
    Victim Country: Unknown
    Victim Industry: Cybercrime Infrastructure
    Victim Organization: Unknown
    Victim Site: bit.hosting
  107. Alleged leak of Mystic Stealer logs targeting India-based Windows users
    Category: Data Leak
    Content: A threat actor known as HighWayToShell has made available 250 stealer logs collected via Mystic Stealer from India-based victims running Windows 10 Home (22H2). The logs contain credentials, cookies, and crypto wallet data harvested from Chrome 122.x browsers. The data is being distributed for free via a password-protected archive on a cybercrime forum.
    Date: 2026-04-28T16:22:30Z
    Network: openweb
    Published URL: https://xforums.st/threads/ulp-mystic-stealer-250-logs-in-windows-10-home.611858/
    Screenshots:
    None
    Threat Actors: HighWayToShell
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Alleged leak of European stealer logs and credentials
    Category: Data Leak
    Content: A threat actor on the Breached forum has made available a collection of approximately 3,000 allegedly valid stealer logs targeting European victims. The post, authored by pressplay22, includes a link to download the logs, which likely contain harvested credentials and related data. No specific organizations or industries have been identified as victims.
    Date: 2026-04-28T16:13:48Z
    Network: openweb
    Published URL: https://breached.st/threads/fire-x-3000-valid-full-europe-fire.86424/unread
    Screenshots:
    None
    Threat Actors: pressplay22
    Victim Country: Europe
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged Data Breach of Indonesian National Police (Polri) Personnel Records
    Category: Data Leak
    Content: A threat actor identified as MrLucxy claims to have hacked polri.go.id approximately one year ago and has made available a database containing 417,000 records of Indonesian National Police personnel. The leaked data reportedly includes officer IDs, NRP numbers, ranks, full names, positions, addresses, phone numbers, and employment status. The dataset spans multiple police units including Criminal Investigation, Community Development, and various sector offices, with personnel ranging from active
    Date: 2026-04-28T16:12:20Z
    Network: openweb
    Published URL: https://breached.st/threads/data-polri-go-id.86421/unread
    Screenshots:
    None
    Threat Actors: MrLucxy
    Victim Country: Indonesia
    Victim Industry: Government – Law Enforcement
    Victim Organization: Indonesian National Police (Polri)
    Victim Site: polri.go.id
  110. Alleged Data Breach of Bengkalis Regency Government Website
    Category: Data Breach
    Content: A threat actor known as Mr. Hanz Xploit has allegedly posted a database associated with the Bengkalis Regency Government of Indonesia on the Breached forum. No further details regarding the content, size, or nature of the data are available from the post.
    Date: 2026-04-28T16:11:46Z
    Network: openweb
    Published URL: https://breached.st/threads/database-pemerintah-kabupaten-bengkalis-go-id.86422/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Bengkalis Regency Government
    Victim Site: bengkalis.go.id
  111. Alleged Data Breach of car.insurance.net Exposing 10 Million US Car Insurance Records
    Category: Data Breach
    Content: A threat actor known as MDGhost (also identified as The BlackH4t MD-Ghost) has made available an alleged database containing 10 million US car insurance records from car.insurance.net. The dataset is in XLSX format and includes sensitive personal and vehicle information such as names, addresses, phone numbers, VINs, gender, car details, and claim amounts. The actor provided a Telegram contact for further communication, suggesting potential sale or distribution of the data.
    Date: 2026-04-28T16:11:12Z
    Network: openweb
    Published URL: https://breached.st/threads/10-million-database-car-insurance-net-usa-car-insurance-usa.86423/unread
    Screenshots:
    None
    Threat Actors: MDGhost
    Victim Country: United States
    Victim Industry: Insurance
    Victim Organization: car.insurance.net
    Victim Site: car.insurance.net
  112. Alleged Data Leak of mkri.id Database
    Category: Data Leak
    Content: A threat actor known as Mr. Hanz Xploit has allegedly leaked a database associated with mkri.id, the official website of the Constitutional Court of the Republic of Indonesia (Mahkamah Konstitusi). The post was shared on the Breached forum under the databases section, though no additional details regarding the contents or record count are available. The nature and scope of the exposed data remain unverified.
    Date: 2026-04-28T16:10:39Z
    Network: openweb
    Published URL: https://breached.st/threads/leak-database-mkri-id.86425/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Mahkamah Konstitusi Republik Indonesia
    Victim Site: mkri.id
  113. Alleged defacement of vvnputki.com by Mr.PIMZZZXploit
    Category: Defacement
    Content: Website defacement claimed by threat actor Mr.PIMZZZXploit. Defacement message posted with site URL https://vvnputki.com and hacker signature.
    Date: 2026-04-28T16:09:13Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/658
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: vvnputki.com
    Victim Site: vvnputki.com
  114. Alleged Data Breach of RENAP and SAT Guatemala Government Databases with Ransom Demand
    Category: Data Breach
    Content: Threat actor GordonFreeman, operating in coordination with group Team L4TAMFUCKERS, claims to have breached Guatemalas RENAP civil registry system obtaining 18 million records including birth, marriage, and death certificates, and the SAT tax authority acquiring 5.6 million vehicle records containing detailed ownership, tax, and vehicle identification data. The actor is demanding 2 BTC in ransom, threatening to publicly sell the entire dataset and launch sustained cyberattacks against Guatemala
    Date: 2026-04-28T16:03:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Full-RENAP-DB-18M-Records-and-SAT-5-6M-Vehicles-GUATEMALA-2026
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Guatemala
    Victim Industry: Government
    Victim Organization: RENAP (Registro Nacional de las Personas) and SAT (Superintendencia de Administración Tributaria)
    Victim Site: Unknown
  115. Alleged leak of mixed fresh combolist with 1,457 credentials
    Category: Combo List
    Content: A threat actor operating under the alias snowstormxd has made available a combolist of 1,457 mixed fresh credentials via a paste sharing site and a Telegram channel. The post promotes a paid cloud service offering private access to additional credential lists, with subscription tiers ranging from $3 for 24 hours to $120 for lifetime access. Payments are handled through a dedicated Telegram bot, suggesting an ongoing credential distribution operation.
    Date: 2026-04-28T15:44:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73539/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged leak of mixed credential combolist containing 55,112 lines
    Category: Combo List
    Content: A threat actor operating under the alias Browzchel has made available a mixed combolist containing 55,112 lines on the cracking forum CrackingX. The combolist appears to be a compilation of credentials from various sources. The actor promotes distribution via a Telegram channel and personal handle @BossBrowz.
    Date: 2026-04-28T15:43:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73540/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of mixed email access combolist with 31,000 credentials
    Category: Combo List
    Content: A threat actor known as MarkVesto has shared a mixed mail access combolist containing approximately 31,000 credential pairs on the CrackingX forum. The content appears to be freely distributed to registered users of the forum. The actor also promotes a Telegram channel (t.me/DuffyDataCloud) likely used to distribute similar combolists.
    Date: 2026-04-28T15:43:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73541/
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Alleged leak of mixed Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias noir on the cracking forum CrackingX has made available a combolist containing 1,666 claimed valid credentials, including Hotmail accounts and a mixed set of private cloud service logins. The content is offered as a free download and the actor promotes their Telegram channel (@noiraccesss) for further contact.
    Date: 2026-04-28T15:42:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73542/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  119. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist purportedly containing 5,000 unique Hotmail credentials on the cracking forum CX. The post is gated behind registration or sign-in, limiting full visibility into the content. The combolist likely contains email and password pairs associated with Hotmail accounts.
    Date: 2026-04-28T15:42:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73543/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  120. Alleged leak of live.com credentials targeting European users
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has shared a combolist of approximately 2,058 live.com credential pairs via a Mega file-sharing link on the CrackingX forum. The combolist is described as a European mix and is dated April 28, 2026. The credentials are made available as a free download behind a reaction gate.
    Date: 2026-04-28T15:41:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73544/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: live.com
  121. Alleged Data Leak of SMKN 5 Batam Educational Institution Database
    Category: Data Leak
    Content: A threat actor operating under the alias Mr. Hanz Xploit claims to have leaked a database belonging to SMKN 5 Batam, a vocational high school located in Batam, Indonesia. The post was shared on the Breached forum under the databases section. No further details regarding the contents, record count, or nature of the data are available from the post.
    Date: 2026-04-28T15:28:05Z
    Network: openweb
    Published URL: https://breached.st/threads/leak-database-smkn-5-batam.86420/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: SMKN 5 Batam
    Victim Site: Unknown
  122. Alleged defacement of multiple websites by OpsShadowStrike
    Category: Defacement
    Content: OpsShadowStrike claims to have defaced multiple websites across eiumis.com, cibrmls.com, corrierentals.com, decaturrealtors.com, normauctions.com, and ajbrowns.com domains. The group lists collaboration with multiple other hacktivist groups (TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, and others) and cites political/activist motivations related to Palestine and Iran. Over 30 compromised URLs are provided as evidence.
    Date: 2026-04-28T15:23:39Z
    Network: telegram
    Published URL: https://t.me/c/3844432135/409
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: United States
    Victim Industry: Real estate, property management, auctions
    Victim Organization: Multiple organizations (eiumis.com, cibrmls.com, corrierentals.com, decaturrealtors.com, normauctions.com, ajbrowns.com)
    Victim Site: eiumis.com, cibrmls.com, corrierentals.com, decaturrealtors.com, normauctions.com, ajbrowns.com
  123. Alleged leak of social media combolist with 11 million credentials
    Category: Combo List
    Content: A threat actor known as CODER is distributing a social media combolist containing approximately 11 million credential pairs via Telegram channels. The combolist is being made available for free through two Telegram groups, with the actor also offering additional combos via direct Telegram contact. No specific victim organization or platform has been identified.
    Date: 2026-04-28T15:00:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73532/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has freely shared a mixed combolist containing approximately 20,975 lines of credentials on the cracking forum CrackingX. The combolist, dated April 28, 2026, is described as fresh and good quality. The file is hosted on Mega.co.nz and made available via a hidden reaction link.
    Date: 2026-04-28T15:00:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73533/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  125. Alleged leak of 10 million credential combos from stealer logs
    Category: Combo List
    Content: A threat actor operating under the alias mr_daadaa has made available a combolist containing approximately 10 million URL:login:password (ULP) credentials via a public file-sharing link on MediaFire. The data is attributed to DADAZONE V2 stealer logs and is claimed to be fresh as of April 28, 2026. No specific victim organization or country has been identified, as stealer logs typically aggregate credentials from multiple sources.
    Date: 2026-04-28T14:59:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73534/
    Screenshots:
    None
    Threat Actors: mr_daadaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  126. Alleged leak of Yahoo credential combolist
    Category: Combo List
    Content: A threat actor operating under the handle HQcomboSpace has made available a combolist purportedly containing 1,141,000 lines of Yahoo credentials on the cracking forum CrackingX. The file is hosted on Mega.nz and is offered as a free download. The post is labeled as Good Leaks Yahoo 2026, suggesting the credentials may be currently valid.
    Date: 2026-04-28T14:59:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73536/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  127. Alleged leak of mixed email:password combolist (X2007 HQ Mix)
    Category: Combo List
    Content: A threat actor operating under the alias @Steveee36 has shared a combolist titled X2007 HQ Mix on the DemonForums cybercrime forum. The post contains hidden content requiring registration or login to access, suggesting the credential list is being freely distributed to forum members. The combolist likely contains email and password combinations, though the specific sources and targets remain unknown.
    Date: 2026-04-28T14:59:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2007-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Alleged leak of 12 million gaming-related credentials via combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist containing approximately 12 million credential pairs targeting the gaming sector. The content is distributed freely via Telegram channels and groups associated with the actor. The post requires forum registration to access the download, with additional contact provided via Telegram handle CODER5544.
    Date: 2026-04-28T14:59:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73537/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HollowKnight has made available a sample combolist containing approximately 1,750 Hotmail email and password credential pairs on the DemonForums cybercrime forum. The post is gated behind registration or login, suggesting it may serve as a promotional sample for a larger dataset. No price or payment terms are mentioned, indicating the sample is being freely distributed.
    Date: 2026-04-28T14:59:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-1750x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: HollowKnight
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  130. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HollowKnight07 has made available a sample combolist containing approximately 1,750 Hotmail credentials on a cracking forum. The post offers a free download of the credential list, which likely consists of email and password combinations. This appears to be a sample release, potentially used to advertise a larger dataset.
    Date: 2026-04-28T14:58:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73538/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  131. Alleged sale of WhatsApp phishing panel and session hijacking toolkit
    Category: Initial Access
    Content: A threat actor is selling a WhatsApp phishing toolkit for $300, consisting of a phishing panel with source code and accompanying software designed to hijack WhatsApp sessions. The panel facilitates credential and session theft, while the bundled software enables automated WhatsApp message sending using the harvested sessions. The sale includes full source code of the phishing panel, enabling buyers to deploy and modify the infrastructure independently.
    Date: 2026-04-28T14:47:08Z
    Network: openweb
    Published URL: https://breached.st/threads/whatsapp-phishing-panel-soft.86419/unread
    Screenshots:
    None
    Threat Actors: 3ryblya
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: whatsapp.com
  132. Alleged Data Leak of Israeli Business and Personal Contact Database
    Category: Data Leak
    Content: A threat actor operating under the alias JAX7 has made available a structured database containing Israeli business and personal contact information via a free MediaFire download. The dataset includes names, email addresses, phone/WhatsApp numbers, company names, full addresses, fax numbers, and web URLs spanning multiple industries including real estate, restaurants, and education. The data appears to cover thousands of records across various business and personal categories within Israel.
    Date: 2026-04-28T14:46:17Z
    Network: openweb
    Published URL: https://breached.st/threads/database-contacts-israel-email-phone.86418/unread
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Israel
    Victim Industry: Multiple Sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared a combolist of approximately 5,000 Hotmail email and password combinations on a cybercrime forum. The content is hidden behind a registration or login requirement, suggesting it is available to forum members. The actor also promotes a shop (unique-combo.shop) offering combolists for various countries and custom requests.
    Date: 2026-04-28T14:19:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-4-5000–202069
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  134. Alleged leak of 23,000 valid email access credentials
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has shared a list of 23,000 allegedly valid email access credentials. The content is available to registered users of the forum. No specific victim organization, country, or email provider has been identified from the available post metadata.
    Date: 2026-04-28T14:19:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73526/
    Screenshots:
    None
    Threat Actors: TRLCD2
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Website Defacement of Manavelex by m4ul1337 (BABAYO ERROR SYSTEM)
    Category: Defacement
    Content: On April 28, 2026, threat actor m4ul1337, affiliated with the group BABAYO ERROR SYSTEM, defaced a page on manavelex.com. The attack targeted a specific subpage (jm.html) rather than the sites homepage, indicating a targeted single-page defacement. No specific motive or server details were disclosed in connection with this incident.
    Date: 2026-04-28T14:19:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915606
    Screenshots:
    None
    Threat Actors: m4ul1337, BABAYO ERROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Manavelex
    Victim Site: manavelex.com
  136. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared an alleged combolist containing approximately 5,000 Hotmail credentials on a cracking forum. The post is behind a registration wall, limiting full visibility into the content. The list appears to consist of unique email and password combinations targeting Hotmail accounts.
    Date: 2026-04-28T14:19:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73527/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  137. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor known as StrawHatBase has shared a combolist containing approximately 26,000 mixed email address and password credential pairs on a cybercrime forum. The content is hidden behind registration or login, suggesting it is available to forum members at no monetary cost. The credentials appear to span multiple mail providers, though specific targeted organizations or countries are not identified.
    Date: 2026-04-28T14:18:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-26K-GOOD-MIXED-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Alleged leak of mixed email access credentials (26,000 records)
    Category: Combo List
    Content: A threat actor operating under the alias FAITHINUS shared a combolist of approximately 26,000 mixed email access credentials on a cracking forum. The post is gated behind registration, limiting full visibility into the datas origin or targeted mail providers. The credentials are described as good and mixed, suggesting they span multiple email services and have been verified for validity.
    Date: 2026-04-28T14:18:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73528/
    Screenshots:
    None
    Threat Actors: FAITHINUS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  139. Alleged leak of WordPress credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias zod has shared what is claimed to be a WordPress credentials combolist on the crackingx.com forum. The content is gated behind registration or sign-in, with the password and additional details distributed via a Telegram channel. No specific victim organization, record count, or data volume has been disclosed.
    Date: 2026-04-28T14:18:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73529/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  140. Alleged data breach of Indonesian Police Personnel Database
    Category: Data Breach
    Content: A user (JAX7) posted on Breachforums claiming access to an Indonesian Police Personnel Database. The breach appears to include sensitive personnel records from Indonesian law enforcement.
    Date: 2026-04-28T14:18:15Z
    Network: telegram
    Published URL: https://t.me/byjax7/177
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Indonesia
    Victim Industry: Government/Law Enforcement
    Victim Organization: Indonesian National Police
    Victim Site: Unknown
  141. Alleged leak of mixed email access combolist (57K credentials)
    Category: Data Leak
    Content: A threat actor operating under the alias Megacloud has made available a mixed email access combolist containing approximately 57,000 allegedly valid credentials. The 1.93 MB file is hosted on MEGA and was shared freely on the AE – Combo List forum. The combolist appears to aggregate credentials from multiple email providers, with no specific targeted organization or country identified.
    Date: 2026-04-28T14:11:50Z
    Network: openweb
    Published URL: https://altenens.is/threads/57k-full-valid-mail-access-mix-28-04.2931062/unread
    Screenshots:
    None
    Threat Actors: Megacloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Alleged Sale of Forex and Crypto FTD Depositor Leads Including Personal and Financial Data
    Category: Data Breach
    Content: A threat actor on BreachForums is selling structured lead databases containing personally identifiable and financial information of individuals who have made first-time deposits on Forex and cryptocurrency trading platforms. The sample data includes full names, email addresses, phone numbers, geographic location, deposit dates, deposit amounts, broker names, and traffic source details for victims across multiple countries including Mexico, the United Kingdom, South Africa, Australia, Canada, and
    Date: 2026-04-28T14:11:04Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Forex-Crypto-FTD-Depositors-Recovery-leads–187859
    Screenshots:
    None
    Threat Actors: aisdata
    Victim Country: Multiple
    Victim Industry: Financial Services / Cryptocurrency Trading
    Victim Organization: Multiple (BitiCodes, FXMundo, XproMarkets, QuantumAI, and others)
    Victim Site: Unknown
  143. Alleged Sale of Large Volume Email Database from Multiple Sources
    Category: Data Breach
    Content: A threat actor operating under the alias aisdata is allegedly selling a large volume of email databases sourced from multiple origins on BreachForums. The post lacks specific details regarding the targeted organizations, countries, or record counts. The nature and origin of the data remain unverified due to limited post content.
    Date: 2026-04-28T14:07:18Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Large-volume-of-email-database-with-these-source
    Screenshots:
    None
    Threat Actors: aisdata
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Alleged Data Breach of Ledger Hardware Wallet Customer Records – Australia
    Category: Data Breach
    Content: A threat actor operating under the alias aisdata is selling an alleged database of Australian Ledger hardware wallet customers on BreachForums. The dataset includes full names, phone numbers, order IDs, product types, purchase amounts, and email addresses. The actor provides contact details via Telegram and Skype for purchase inquiries.
    Date: 2026-04-28T14:05:56Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-2026-Ledger-hardware-wallet-customer-leak-Australia
    Screenshots:
    None
    Threat Actors: aisdata
    Victim Country: Australia
    Victim Industry: Cryptocurrency / Financial Technology
    Victim Organization: Ledger
    Victim Site: ledger.com
  145. Alleged Data Leak of Polymarket.com API Dump Including User PII and Market Data
    Category: Data Leak
    Content: A threat actor known as xorcat claims to have extracted over 10 million records from Polymarket.com by exploiting multiple vulnerabilities including unauthenticated API endpoints, a CORS misconfiguration, CVE-2025-62718 (Axios SSRF), and CVE-2024-51479 (Next.js auth bypass). The leaked data allegedly includes full user PII for approximately 10,000 unique profiles, ETH wallet addresses, market metadata, social graph data, and admin indicators, totaling approximately 1GB. The actor has made dump
    Date: 2026-04-28T13:55:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Polymarket-com-FULL-API-BREACH-10M-Records-300k-Real-Identities-Admin-2026-04
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  146. Alleged sale of attack tools by xorcat targeting Polymarket infrastructure
    Category: Malware
    Content: Threat actor xorcat is selling specialized attack tools including CORS, SSRF, Next.js bypass, and WebSocket attack capabilities. These tools are being actively exploited against Polymarkets infrastructure, specifically targeting a synchronization flaw between the Polymarket API and blockchain to launch DoS attacks against liquidity providers. Reported attack costs are under $0.10 with potential profits of $16,427 per successful account compromise.
    Date: 2026-04-28T13:53:49Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3106
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Cryptocurrency/DeFi
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  147. Alleged vulnerability in Magic Labs login service enabling unauthorized account access and fund theft
    Category: Vulnerability
    Content: A vulnerability in Magic Labs login service allows attackers to intercept user authentication tokens and gain unauthorized account access. Reported cases include unauthorized fund withdrawals despite standard security procedures. Users have reported receiving login alerts followed by unauthorized withdrawal activity.
    Date: 2026-04-28T13:51:36Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3102
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: Unknown
    Victim Industry: Financial/Cryptocurrency
    Victim Organization: Magic Labs
    Victim Site: Unknown
  148. Alleged Data Leak of Talentely Student Database
    Category: Data Leak
    Content: A threat actor operating under the alias Spirigatito has leaked a database allegedly belonging to Talentely, a career-focused EdTech platform under Veranda Learning Solutions. The leak contains records for approximately 514,412 students and 35,565 profile pictures, including fields such as full name, email address, phone number, institution, roll number, degree details, skills, course enrollment data, and profile images. The data has been made available for free download on a cybercrime forum,
    Date: 2026-04-28T13:41:13Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Talentely-Database-Pajeet-Edition-Leaked-Download
    Screenshots:
    None
    Threat Actors: Spirigatito
    Victim Country: India
    Victim Industry: Education / EdTech
    Victim Organization: Talentely
    Victim Site: talentely.com
  149. Alleged leak of mixed UHQ combolist with 1,457 credentials
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a mixed UHQ (Ultra High Quality) combolist containing 1,457 credential entries via a free download link on Pasteview and a Telegram channel. The post also advertises a paid private cloud service starting at $3 for 24 hours, with a built-in inboxer tool, suggesting the credentials may be intended for account takeover use. No specific victim organization or country has been identified, indicating the combolist is likely aggregated from multi
    Date: 2026-04-28T13:35:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73520/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Alleged leak of mixed combolist targeting Twitter, Fortnite, Etsy and other platforms
    Category: Combo List
    Content: A threat actor using the handle CODER has made available a mixed combolist of approximately 13 million credential pairs, claimed to be fresh and high-quality, targeting platforms including Twitter, Fortnite, and Etsy among others. The actor is distributing the combolist via Telegram channels and directing interested parties to contact them directly. The post is hosted on the cracking forum CrackingX and requires registration to view full content.
    Date: 2026-04-28T13:34:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73523/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Twitter, Fortnite, Etsy
    Victim Site: twitter.com, etsy.com
  151. Alleged leak of Outlook.com credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has made available a combolist of approximately 11,986 Outlook.com credential pairs via a Mega.nz link on the cracking forum CrackingX. The post, dated April 28, 2026, is described as fresh and containing good lines, suggesting recently verified or active credentials. The combolist is shared freely, gated only by a forum reaction requirement.
    Date: 2026-04-28T13:34:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73524/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: outlook.com
  152. Alleged sale of RDP access to cloud infrastructure and email accounts
    Category: Initial Access
    Content: Threat actor offering rental of RDP access to Azure, AWS, and DigitalOcean infrastructure on daily/monthly basis for $200. Also offering domain email accounts (Gmail, Yahoo), GitHub student accounts, and domain access. Claims fresh RDP with good IP reputation and escrow payment option available.
    Date: 2026-04-28T13:32:12Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71466
    Screenshots:
    None
    Threat Actors: PORTAL
    Victim Country: Unknown
    Victim Industry: Cloud Infrastructure / Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Alleged leak of Hotmail credential combolist targeting multiple regions
    Category: Data Leak
    Content: A threat actor operating under the alias Larry_Uchiha has shared a Hotmail credential combolist on the AE forum, allegedly containing approximately 1,300 email and password combinations. The combolist purportedly includes accounts from users across the United States, Europe, Asia, and Russia. The content is gated behind a forum reply requirement, suggesting free access upon engagement.
    Date: 2026-04-28T13:32:04Z
    Network: openweb
    Published URL: https://altenens.is/threads/1-300x-hotmail-access-combo-usa-europe-asia-russian.2931054/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  154. Alleged leak of mixed email service credentials combolist
    Category: Data Leak
    Content: A threat actor known as Larry_Uchiha shared a mixed email combolist on the AE forum, containing credentials for multiple email providers including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live. The combolist was made available for free to registered forum members who reply to the thread. The actual content is hidden behind a reply-gate, with additional distribution reportedly via Telegram.
    Date: 2026-04-28T13:31:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-mail-combo-hotmail-outlook-aol-gmx-inbox-icloud-live-2026-4-25.2931055/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Hotmail, Outlook, AOL, GMX, Inbox, iCloud, Live)
    Victim Site: Unknown
  155. Alleged leak of mixed platform credential combolist including Netflix, OnlyFans, ChatGPT, Xbox, Sony, Discord, and Facebook
    Category: Data Leak
    Content: A threat actor operating under the alias Larry_Uchiha has shared a mixed-platform combolist on the forum AE – Combo List, containing credentials for multiple services including Netflix, OnlyFans, ChatGPT, Xbox, Sony, Discord, and Facebook. The combolist is being made available for free to forum members who reply to the thread. The actual credential content is hidden behind a reply gate and distributed via Telegram.
    Date: 2026-04-28T13:31:39Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-account-combo-netflix-onlyfans-chatgpt-xbox-sony-discord-facebook-2026-4-25.2931056/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Netflix, OnlyFans, OpenAI, Xbox, Sony, Discord, Facebook
    Victim Site: Unknown
  156. Alleged Sale of Multi-Country CVV Financial Data by Threat Actor BigBoris
    Category: Carding
    Content: A threat actor operating under the alias BigBoris is selling stolen CVV payment card data covering multiple countries including the United States, United Kingdom, Canada, Australia, and EU nations. Card data is offered in a structured format including card number, expiration date, CVV2, cardholder name, billing address, and bank details, with prices ranging from $30 to $45 per record depending on country of origin. Payment is accepted via Bitcoin (BTC) and USDT, with contact facilitated throug
    Date: 2026-04-28T13:24:05Z
    Network: openweb
    Published URL: https://altenens.is/threads/hello-all-buyer-my-nickname-is-bigboris-i-sell-all-cvv-all-country-us-uk-ca-au-eu-fr-mx-all-cvv-is-updated-every-day.2931049/unread
    Screenshots:
    None
    Threat Actors: Decor
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor operating under the alias D4rkNetHub has made available a combolist allegedly containing 3,253 valid Hotmail credentials on the XF forum. The post references a hosted file via D4RKNETHUB CLOUD, suggesting the credential list is being freely distributed. The origin and collection method of the credentials are unknown.
    Date: 2026-04-28T13:23:33Z
    Network: openweb
    Published URL: https://xforums.st/threads/3-253-good-hotmail-goods-d4rknethub-cloud.611856/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  158. Alleged ongoing data dump of 800GB+ in JSON format
    Category: Data Leak
    Content: Threat actor claims to have exfiltrated over 800GB of data in JSON format with the dump still in progress. The actor suggests the victims are unaware (fools are sleeping), indicating an active, ongoing data theft operation.
    Date: 2026-04-28T13:21:39Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3095
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Alleged Data Breach of Universitas Gadjah Mada
    Category: Data Breach
    Content: A threat actor known as Mr. Hanz Xploit has posted on a cybercrime forum claiming to possess a database allegedly belonging to Universitas Gadjah Mada, one of Indonesias largest public universities, purportedly containing 1.5 million records. No further details regarding the content of the database or the terms of access are available due to absent post content. The authenticity and full scope of the claimed breach remain unverified.
    Date: 2026-04-28T13:18:14Z
    Network: openweb
    Published URL: https://breached.st/threads/1-5-milliond-database-universitas-gadjah-mada.86415/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Universitas Gadjah Mada
    Victim Site: ugm.ac.id
  160. Alleged Data Leak of MPR RI Member Database
    Category: Data Leak
    Content: A threat actor operating under the alias Mr. Hanz Xploit has allegedly leaked a database containing information on members of the Peoples Consultative Assembly of Indonesia (MPR RI). The post was shared on a known cybercrime forum, though no further details regarding the data contents or record count are available. The authenticity and scope of the leak have not been independently verified.
    Date: 2026-04-28T13:17:42Z
    Network: openweb
    Published URL: https://breached.st/threads/leak-database-anggota-mpr-ri.86416/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Majelis Permusyawaratan Rakyat Republik Indonesia (MPR RI)
    Victim Site: mpr.go.id
  161. Alleged data leak of Polymarket – 1GB dataset
    Category: Data Leak
    Content: Threat actor announced the imminent release of approximately 1GB of data allegedly from Polymarket. The actor stated the data would be dropped within minutes of the message.
    Date: 2026-04-28T13:15:29Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3092
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Cryptocurrency/Prediction Markets
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  162. Alleged leak of ULP combolist distributed via Telegram
    Category: Combo List
    Content: A threat actor operating under the alias zod has shared a ULP (URL:Login:Password) combolist labeled VIP ULP 13 on the cracking forum CrackingX. The content is gated behind registration or sign-in, with the password distributed via a Telegram channel (t.me/zoooddddd). No specific victim organization or record count has been identified.
    Date: 2026-04-28T12:48:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73517/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged Leak of Hotmail Credential Combolist Targeting European Users
    Category: Combo List
    Content: A threat actor operating under the alias BestCombo has made available a combolist of approximately 40,631 Hotmail credential pairs on the cracking forum CrackingX. The list is described as a European mix combo, suggesting the credentials belong to users across European regions. The combolist is being distributed for free via a Mega file-sharing link, gated behind a reaction requirement.
    Date: 2026-04-28T12:47:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73518/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  164. Alleged leak of Gmail and Shopping credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 1.6 million credential pairs via a Mega.nz link. The list is described as fresh and targets shopping platforms and Gmail accounts. The credentials were shared freely on the cracking forum CrackingX.
    Date: 2026-04-28T12:47:21Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73519/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: E-Commerce
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged leak of Hotmail credential combolist with keyword targets and country sorting
    Category: Combo List
    Content: A threat actor operating under the alias He_Cloud has made available a combolist of approximately 700 allegedly valid Hotmail email and password credentials. The list is described as high quality, includes keyword-targeted accounts, and has been sorted by country. The credentials are being freely distributed via download links on the forum.
    Date: 2026-04-28T12:46:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-700x-HQ-Hotmail-Full-Valid-Keyword-Targets-sorted-countries-28-04
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  166. Alleged leak of Hotmail credential combolist
    Category: Data Leak
    Content: A threat actor on the AE forum has shared an alleged combolist containing 350 fresh, valid Hotmail credentials. The content is hidden behind a reply-gate, requiring forum users to respond before accessing the credential list. The combolist appears to be made available for free to forum members.
    Date: 2026-04-28T12:36:23Z
    Network: openweb
    Published URL: https://altenens.is/threads/sparkles-350x-fresh-hotmail-valid-sparkles.2931041/unread
    Screenshots:
    None
    Threat Actors: Sellix
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  167. Alleged Data Leak of Student Database from SMA Trensains Muhammadiyah Sragen
    Category: Data Leak
    Content: A threat actor operating under the alias JAX7 has freely distributed a JSON database dump containing personal records of students from SMA Trensains Muhammadiyah Sragen, an Islamic high school in Indonesia. The leaked data includes full names, gender, dates of birth, mothers names, national identification numbers (NIK), student identification numbers (NISN), class/homeroom assignments, and system IDs. The database reportedly covers students across all grade levels and contains thousands of reco
    Date: 2026-04-28T12:33:31Z
    Network: openweb
    Published URL: https://breached.st/threads/database-sma-trensains-muhammadiyah-sragen.86414/unread
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: SMA Trensains Muhammadiyah Sragen
    Victim Site: Unknown
  168. Alleged database breach of SMA Trensains Muhammadiyah Sragen
    Category: Data Breach
    Content: A database breach affecting SMA Trensains Muhammadiyah Sragen (an Indonesian secondary school) has been disclosed on Breachforums by user JAX7. The breach details and database are publicly available on the breach forum.
    Date: 2026-04-28T12:20:08Z
    Network: telegram
    Published URL: https://t.me/byjax7/162
    Screenshots:
    None
    Threat Actors: JAX7
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: SMA Trensains Muhammadiyah Sragen
    Victim Site: Unknown
  169. Alleged data breach of Nemea Group
    Category: Data Breach
    Content: A threat actor known as ChimeraZ is selling 66 GB of data allegedly exfiltrated from Nemea Group, a French hospitality and student residence company. The dataset reportedly contains 203,733 files including ID cards, passports, health insurance cards, invoices, and other documents in PDF and image formats. Multiple Nemea-affiliated domains are listed as compromised, including nemea-groupe.com, residence-nemea.com, nemea-appart-hotel.com, nemea-residence-etudiante.com, and mygestion.nemea-serveur6
    Date: 2026-04-28T12:16:06Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-66-GB-of-NEMEA-GROUP
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Hospitality & Real Estate
    Victim Organization: Nemea Group
    Victim Site: nemea-groupe.com
  170. Alleged bulk SMS phishing service targeting financial institutions across multiple countries
    Category: Phishing
    Content: Threat actor operating bulk SMS phishing service offering campaigns targeting major financial institutions including Binance, PayPal, BBVA, TradeRepublic, and banking platforms across Spain, Portugal, and 200+ countries. Service advertises high click rates, lowest prices, and operates with contact handles @Alice_sms6, @Alice_global_SMS_bot, and @Youngjn123. Infrastructure includes multiple messaging routes and claims of 75-95% validity rates.
    Date: 2026-04-28T12:15:56Z
    Network: telegram
    Published URL: https://t.me/global_bulksms_Alice/138
    Screenshots:
    None
    Threat Actors: Alice_sms6
    Victim Country: Unknown
    Victim Industry: Financial Services, Banking, Payment Processing
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias FlashCloud2 has made available an alleged combolist of approximately 2,000 Hotmail credentials on the cracking forum CrackingX. The post is categorized under Combolists & Dumps and is described as UHQ (ultra-high quality), suggesting the credentials may be fresh or previously unverified. The full content of the post is restricted to registered or signed-in forum members.
    Date: 2026-04-28T12:06:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73510/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  172. Alleged Leak of Hotmail Credential Hits with Keyword Targets and Country Sort
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available 163 alleged high-quality Hotmail credential hits, described as verified account accesses. The post includes associated keyword targets and credentials sorted by country, suggesting organized collection and categorization for account takeover purposes.
    Date: 2026-04-28T12:06:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73511/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  173. Alleged leak of t-online.de credential combolist (7 million records)
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist of approximately 7 million t-online.de credentials via Telegram channels. The post directs users to two free Telegram groups for access to the combolist and related tools. No price is mentioned, indicating the content is being freely distributed.
    Date: 2026-04-28T12:05:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73512/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Germany
    Victim Industry: Telecommunications / Internet Services
    Victim Organization: T-Online (Deutsche Telekom)
    Victim Site: t-online.de
  174. Alleged leak of Hotmail credential combolist with inbox access and country sorting
    Category: Combo List
    Content: A threat actor on DemonForums has made available a combolist of 1,547 alleged Hotmail email and password pairs, described as high-quality hits. The post includes separate downloads for inbox-accessible accounts and a version sorted by country. The credentials are being freely distributed with no price indicated.
    Date: 2026-04-28T12:04:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1547x-HQ-HOTMAIL-HITS-INBOXES-TARGETS-SORTED-COUNTRIES–202059
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  175. Alleged leak of corporate domain combolist
    Category: Combo List
    Content: A threat actor operating under the alias zod has made available a combolist containing 77,527 lines of corporate domain credentials on the cracking forum CX. The content is gated behind registration or sign-in, with a password distributed via a Telegram channel linked to the actor. No specific victim organization or country has been identified.
    Date: 2026-04-28T12:04:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73515/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist containing approximately 5,000 Hotmail email and password combinations on a cybercrime forum. The content is hidden behind a registration or login requirement. The actor also advertises a shop (unique-combo.shop) offering credential combolists for various countries upon request.
    Date: 2026-04-28T12:04:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-3-5000–202060
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  177. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias NotSellerXd has shared a combolist containing approximately 3,210 mixed email and password combinations on a cybercrime forum. The content is hidden behind a registration or login requirement, suggesting it is being made available to forum members at no explicit cost. No specific victim organization or country has been identified, as the list appears to aggregate credentials from multiple sources.
    Date: 2026-04-28T12:04:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3210x-MIX-MAIL
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  178. Alleged Fraud Warning Against Altenens ATN ESCROW Trading Platform
    Category: Carding
    Content: A forum post on Altenens warns that the Altenens ATN ESCROW trading platform is allegedly a fraudulent scheme. According to the post, the platform falsifies guarantees and retains all Bitcoin transferred by users. Victims are urged to report the platforms activities to law enforcement.
    Date: 2026-04-28T12:01:16Z
    Network: openweb
    Published URL: https://altenens.is/threads/la-plataforma-de-trading-altenens-atn-escorw-es-una-estafa.2931002/unread
    Screenshots:
    None
    Threat Actors: Exhibit5
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Altenens ATN ESCROW
    Victim Site: Unknown
  179. Alleged breach of South Korean government institutions including Jeollanam Provincial Police and national data centers
    Category: Data Breach
    Content: Infrastructure Destruction Squad claims to have breached multiple South Korean government entities including Jeollanam do Provincial Police Agency, Jeollanam do Police Headquarters, various government offices, and national-level data centers. The threat actor alleges exploitation of vulnerabilities in digital file storage, corporate email, and government cloud storage systems. The breach is claimed to be active and ongoing with data being leaked and uploaded to dark web infrastructure.
    Date: 2026-04-28T11:55:03Z
    Network: telegram
    Published URL: https://t.me/c/2735908986/4077
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: South Korea
    Victim Industry: Government/Law Enforcement
    Victim Organization: South Korean Government (Jeollanam do Provincial Police Agency, Jeollanam do Police Headquarters, national data centers)
    Victim Site: Unknown
  180. Alleged Sale of Phishing Package Including Scampages, Email Senders, and SMTPs
    Category: Initial Access
    Content: A threat actor operating under the alias Skybat is advertising a phishing package for sale on the Breached forum. The package allegedly includes scam pages, phishing letters, an email sender tool, and SMTP credentials. Contact is facilitated via a Telegram handle (@crocsub).
    Date: 2026-04-28T11:51:23Z
    Network: openweb
    Published URL: https://breached.st/threads/phishing-package-scampages-letters-email-sender-smtps.86412/unread
    Screenshots:
    None
    Threat Actors: Skybat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged Data Leak of Indonesian Civil Servant (BKN) Employee Database
    Category: Data Leak
    Content: A threat actor using the alias Xyph0rix has leaked a structured database dump allegedly belonging to Badan Kepegawaian Negara (BKN), Indonesias National Civil Service Agency. The leaked data includes sensitive personal and employment records of civil servants such as full names, National Identity Numbers (NIK), civil servant ID numbers (NIP), dates of birth, employment ranks, job titles, and employment tenure dates. The data appears to have been last synchronized in January 2025, suggesting it
    Date: 2026-04-28T11:50:29Z
    Network: openweb
    Published URL: https://breached.st/threads/database-badan-pegawai-negara.86413/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Badan Kepegawaian Negara (BKN)
    Victim Site: Unknown
  182. Alleged data breach of Badan Pegawai Negara (Indonesian Civil Service)
    Category: Data Breach
    Content: A user named Xyph0rix has posted on Breachforums claiming access to a database from Badan Pegawai Negara (Indonesian State Personnel Board). The breach appears to involve government employee records.
    Date: 2026-04-28T11:38:04Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix/224
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Badan Pegawai Negara
    Victim Site: Unknown
  183. Website Redefacement of KCF.vn by Irene of XmrAnonye.id
    Category: Defacement
    Content: A threat actor known as Irene, affiliated with the group XmrAnonye.id, defaced a subdirectory of the Vietnamese website kcf.vn on April 28, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised by the same or another attacker. The defacement was not a mass or homepage defacement, targeting a specific image directory path within the site.
    Date: 2026-04-28T11:37:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915604
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: KCF Vietnam
    Victim Site: www.kcf.vn
  184. Alleged Data Leak of NEMEA Group Affecting Multiple French Real Estate and Services Companies
    Category: Data Leak
    Content: A threat actor known as ChimeraZ has leaked a 7.0 GB database allegedly stolen from NEMEA Group, a French real estate and hospitality company. The leak impacts multiple affiliated entities including GOELIA, COGEDIM, VIVERIS, RHONE HABITAT, and EUROTELEPORT, and contains structured personal data such as lease agreements, SEPA mandates, parking rental contracts, and legal declarations, as well as approximately 1,000 identity documents including national ID cards and passports. The actor claims to
    Date: 2026-04-28T11:30:35Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-330K-NEMEA-GROUP-7-0-GB
    Screenshots:
    None
    Threat Actors: ChimeraZ
    Victim Country: France
    Victim Industry: Real Estate
    Victim Organization: NEMEA Group
    Victim Site: nemea-groupe.com
  185. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HollowKnight07 has made available a sample combolist containing 2,240 Hotmail credentials on the cracking forum CrackingX. The post offers a free download link, suggesting this is a sample release likely intended to demonstrate data quality. The targeted accounts are associated with Microsofts Hotmail email service.
    Date: 2026-04-28T11:24:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73506/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  186. Alleged leak of German email credentials including GMX and T-Online combolists
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing a combolist of approximately 5 million credentials allegedly belonging to German email and internet service provider users, including GMX and T-Online accounts. The combolists are being made available for free via Telegram channels linked in the post. The actor also promotes additional free tools and combo resources through associated Telegram groups.
    Date: 2026-04-28T11:23:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73507/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Germany
    Victim Industry: Telecommunications / Email Services
    Victim Organization: GMX, T-Online
    Victim Site: gmx.de, t-online.de
  187. Alleged leak of mixed credential combolist batch
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a mixed batch of 1,457 credential combos via a free download link on pasteview.com. The post also promotes a paid Telegram cloud service offering access to additional combolists, priced between $3 for 24 hours and $120 for lifetime access. The batch is described as including built-in inboxer functionality, suggesting the credentials have been pre-validated for inbox access.
    Date: 2026-04-28T11:23:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73508/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. Alleged leak of 165,000 email and password credentials on cybercrime forum
    Category: Data Leak
    Content: A threat actor operating under the alias Prince1001 has shared a combolist of approximately 165,000 email and password credential pairs on the cybercrime forum Altenens. The post claims the credentials are of high quality and suitable for banking-related account takeover activity. Access to the hidden content requires forum interaction, suggesting the data is being freely distributed to active members.
    Date: 2026-04-28T11:19:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-165-000-star-mailpass-high-voltageuhq-database-good-for-bankinghigh-voltage-fresh-data.2930986/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. Alleged leak of Spotify credential combolist with 125,000 records
    Category: Data Leak
    Content: A threat actor on the AE – Combo List forum has made available a combolist of approximately 125,000 email and password combinations claimed to be valid for Spotify accounts. The post describes the data as UHQ (ultra-high quality) and fresh, suggesting recently harvested or verified credentials. The content is hidden behind a reply-gate, a common forum tactic to boost engagement before granting access to the download.
    Date: 2026-04-28T11:19:39Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-125-000-star-mailpass-high-voltageuhq-database-good-for-spotify-high-voltage-fresh-data.2930987/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Spotify
    Victim Site: spotify.com
  190. Alleged leak of 269,000 email and password credentials on hacking forum
    Category: Data Leak
    Content: A threat actor using the alias Prince1001 has made available a combolist containing approximately 269,000 email and password pairs on the AE hacking forum. The post claims the credential list is UHQ (ultra-high quality) and suitable for use against multiple targets. The data appears to be shared freely, requiring only a reply to access the hidden download link.
    Date: 2026-04-28T11:19:26Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-269-000-star-mailpass-high-voltageuhq-database-good-for-all-target-high-voltage-fresh-data.2930988/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  191. Alleged leak of 350,000 email and password credentials for PayPal and gaming platforms
    Category: Data Leak
    Content: A threat actor known as Prince1001 has made available a combolist of approximately 350,000 email and password credentials on the AE forum. The credentials are claimed to be fresh and of high quality, reportedly suitable for credential stuffing attacks against PayPal and gaming platforms. The post requires forum engagement to access the hidden download link.
    Date: 2026-04-28T11:19:13Z
    Network: openweb
    Published URL: https://altenens.is/threads/star-350-000-star-mailpass-high-voltageuhq-database-good-for-paypal-and-gaming-high-voltage-fresh-data.2930990/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Alleged leak of Hotmail credentials combolist
    Category: Data Leak
    Content: A threat actor operating under the alias Prince1001 shared a combolist containing 210 Hotmail credentials on the cybercrime forum AE (altenens.is). The post requires forum members to reply in order to access the hidden credential data. The content appears to be a free leak of email and password combinations associated with Hotmail accounts.
    Date: 2026-04-28T11:19:00Z
    Network: openweb
    Published URL: https://altenens.is/threads/210-hotmails.2930989/unread
    Screenshots:
    None
    Threat Actors: Prince1001
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft Hotmail
    Victim Site: hotmail.com
  193. Website Defacement of Espare.com by DimasHxR
    Category: Defacement
    Content: On April 28, 2026, threat actor DimasHxR defaced a specific media/customer address page on espare.com, a likely e-commerce or automotive parts platform. The attack was a targeted single-page defacement rather than a mass or home page defacement. The attacker operated independently without affiliation to a known hacking team.
    Date: 2026-04-28T11:09:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915593
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-Commerce / Automotive Parts
    Victim Organization: Espare
    Victim Site: espare.com
  194. Alleged sale of compromised PayPal accounts with balances
    Category: Carding
    Content: A threat actor operating under the alias preston45 on Breached forums is selling verified PayPal accounts with associated balances ranging from $2,000 to $10,000. Each account listing includes the email address, PayPal password, and a SOCKS proxy IP, priced between $150 and $600 depending on the account balance. The seller, reportedly verified by the forum admin, can be contacted via Telegram handle @ColdApollo.
    Date: 2026-04-28T11:09:01Z
    Network: openweb
    Published URL: https://breached.st/threads/paypal-instant-transfer-verified-paypal-accounts-with-funds.86406/unread
    Screenshots:
    None
    Threat Actors: preston45
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: PayPal
    Victim Site: paypal.com
  195. Alleged sale of skimmed payment card dumps with PINs across multiple countries
    Category: Carding
    Content: A threat actor operating under the alias ColdApollo is selling freshly skimmed payment card dumps including Track 1 and Track 2 data with PINs (201 and 101 format) sourced from the United States, United Kingdom, Canada, Australia, and Europe. Prices range from $60 to $80 per card depending on the country of origin. The actor claims the data is firsthand and fresh, and can be contacted via Telegram at @ColdApollo.
    Date: 2026-04-28T11:08:19Z
    Network: openweb
    Published URL: https://breached.st/threads/freshly-skimmed-dumps-pins-201-hq-track-101-201-firsthand.86407/unread
    Screenshots:
    None
    Threat Actors: preston45
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Alleged sale of cloned payment cards for ATM cash-out and online fraud
    Category: Carding
    Content: A threat actor operating under the alias preston45 and Telegram handle ColdApollo is selling cloned credit cards with preloaded balances ranging from $2,000 to $9,500, priced between $100 and $500. The cloned cards are advertised as usable at ATMs, gas stations, and for online purchases, and come with associated ATM PINs for cash-out operations. The seller claims to be verified by the forum administration on the Breached cybercrime forum.
    Date: 2026-04-28T11:07:05Z
    Network: openweb
    Published URL: https://breached.st/threads/cloned-cards-available-with-tracking-cloned-cards-for-quick-withdrawals-at-atms.86409/unread
    Screenshots:
    None
    Threat Actors: preston45
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Alleged sale of credential logs and account access across multiple platforms
    Category: Logs
    Content: Threat actor offering for sale private cloud hotmail credentials, Comcast, AT&T, GMX-DE, AOL, Gmail UHQ mailpass access, Facebook Ads accounts with spend, dating app accounts (Bumble, Zoosk, Match, EliteSingle, eHarmony), LinkedIn, Roblox RDP, OkCupid, StubHub, Ticketmaster, IHG, Marriott, JetBlue, Alaska Airlines account logs, iCloud fullz, Doordarsh, Verizon+PIN, Giffgaff, Uber, and Reddit credentials.
    Date: 2026-04-28T10:58:35Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71402
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: United States
    Victim Industry: Multiple (email, social media, travel, financial services, telecommunications)
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Alleged takedown of major platform by threat actor team
    Category: Cyber Attack
    Content: Threat actor claims their team has taken down one of the largest platforms. Limited technical details provided in the message.
    Date: 2026-04-28T10:46:34Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3089
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Alleged sale of unpublished critical vulnerabilities by XORCat
    Category: Vulnerability
    Content: Threat actor claiming to possess unpublished critical vulnerabilities and offering them for sale at $5,000 per vulnerability. Contact provided via support@xorcat email address.
    Date: 2026-04-28T10:42:27Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3088
    Screenshots:
    None
    Threat Actors: XORCat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Alleged leak of Hotmail, AOL, and Streaming service credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias CODER has made available a combolist containing credentials for Hotmail UK, AOL, and various streaming services via Telegram channels. The post directs users to two Telegram groups (t.me/Combo445544 and t.me/Coder554455) where free combolists and tools are distributed. No specific record count or pricing was mentioned, suggesting this is a free distribution of credential lists.
    Date: 2026-04-28T10:38:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73501/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology / Media & Entertainment
    Victim Organization: Hotmail, AOL, Streaming Services
    Victim Site: hotmail.co.uk
  201. Alleged solicitation of address lists on cybercrime forum
    Category: Combo List
    Content: A threat actor using the handle Lilmike1176 on the cracking forum CrackingX posted a request soliciting address lists (addys) to be sent via private message to the user BigDevvy. The post suggests the actor is seeking personally identifiable information, likely physical or email addresses, possibly for use in fraud or spam campaigns. No specific victim organization, country, or record count was disclosed in the post.
    Date: 2026-04-28T10:38:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73502/
    Screenshots:
    None
    Threat Actors: Lilmike1176
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Alleged leak of mixed email and password combolist
    Category: Combo List
    Content: A threat actor known as wingoooW has made available a mixed combolist containing approximately 32,000 email and password credential pairs via a free download link on pasteview.com. The post was shared on DemonForums in the combolists section. The origin of the credentials and the affected organizations or individuals are unknown.
    Date: 2026-04-28T10:38:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-32K-VALID-MIXED
    Screenshots:
    None
    Threat Actors: wingoooW
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Alleged leak of Gaming and Shopping credentials targeting Yahoo users
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing over 1 million credential entries on the cracking forum CrackingX. The combolist is described as targeting gaming and shopping platforms, with a focus on Yahoo-associated accounts. The file has been shared freely via a Mega.nz link.
    Date: 2026-04-28T10:38:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73504/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: E-commerce and Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  204. Alleged leak of T-Online.de credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias COYYYTO has made available a combolist of approximately 18,000 T-Online.de credentials on the cracking forum CrackingX. The data was shared as a free download via an external paste site. T-Online is a major German internet service provider and email platform operated by Deutsche Telekom.
    Date: 2026-04-28T10:37:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73505/
    Screenshots:
    None
    Threat Actors: COYYYTO
    Victim Country: Germany
    Victim Industry: Telecommunications
    Victim Organization: T-Online
    Victim Site: t-online.de
  205. Alleged sale of stolen financial data including credit cards and bank logs
    Category: Carding
    Content: A threat actor operating under the alias Lilmike1176 is advertising stolen financial data on the crackingx.com forum. The offerings include linkable credit cards, bank logs, slips, and booking-related data. The actor directs potential buyers to a Telegram channel at t.me/Official1dae to conduct transactions.
    Date: 2026-04-28T10:37:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73503/
    Screenshots:
    None
    Threat Actors: Lilmike1176
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  206. Alleged Zero-Click RCE Vulnerability Chain Disclosed in Figma Desktop Application
    Category: Initial Access
    Content: A security researcher (Benjamin Mamoud / DavenSec) disclosed a zero-click remote code execution vulnerability chain in Figmas desktop Electron application. The exploit chain combined prototype pollution in the variant processing function (eG), a race condition against an internal plugin re-run mechanism, and a second prototype pollution in figma.jsx.deserialize to manipulate feature flags, ultimately achieving XSS via a polluted errorHandler gadget and RCE via an exposed IPC handler (writeFileT
    Date: 2026-04-28T10:28:44Z
    Network: openweb
    Published URL: https://tier1.life/thread/186
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Software / Technology
    Victim Organization: Figma
    Victim Site: figma.com
  207. Alleged leak of private IP camera credentials
    Category: Data Leak
    Content: A threat actor using the alias Big_Meeper publicly shared a list of 44 compromised IP security cameras on a known cybercrime forum. The post includes IP addresses, ports, usernames, and plaintext passwords for each device. The cameras appear to belong to private individuals across multiple countries, based on the diversity of IP ranges and personal usernames observed.
    Date: 2026-04-28T10:24:37Z
    Network: openweb
    Published URL: https://breached.st/threads/private-security-cameras-list.86404/unread
    Screenshots:
    None
    Threat Actors: Big_Meeper
    Victim Country: Unknown
    Victim Industry: Private Individuals / Residential
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged data breach of Polymarket.com – Full API dump with 300K+ records, PII, and exploit kit
    Category: Data Breach
    Content: Threat actor uploaded a comprehensive data breach package for Polymarket.com (decentralized prediction market platform) containing approximately 300,000+ user records (~750 MB extracted data) including full user PII, market data, and internal API access. The breach exploited multiple vulnerabilities including unauthenticated API endpoints, CORS misconfiguration, pagination bypass, and known CVEs (CVE-2025-62718, CVE-2024-51479). Package includes working proof-of-concept exploits, automated data extraction scripts, and detailed red team analysis with MITRE ATT&CK mapping.
    Date: 2026-04-28T10:19:09Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3086
    Screenshots:
    None
    Threat Actors: ./xorcat~files
    Victim Country: Unknown
    Victim Industry: Financial Technology / Cryptocurrency
    Victim Organization: Polymarket.com
    Victim Site: polymarket.com
  209. Alleged Data Breach of Polymarket.com via API Vulnerabilities Exposing 300K+ Records
    Category: Data Leak
    Content: A threat actor known as xorcat claims to have extracted over 300,000 records from Polymarket.com, a decentralized prediction market platform, by exploiting multiple vulnerabilities including unauthenticated API endpoints, a CORS misconfiguration, CVE-2025-62718 (Axios SSRF), and CVE-2024-51479 (Next.js auth bypass). The leaked data allegedly includes 10,000 unique user profiles with full PII, Ethereum wallet addresses, social graph data, internal user IDs, and market metadata totaling approxim
    Date: 2026-04-28T10:17:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Polymarket-com-FULL-API-BREACH-300K-Records-10k-Real-Identities-Admin
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  210. Alleged solicitation for bulk SMS sending infrastructure or SIM cards
    Category: Combo List
    Content: A threat actor posted on the cracking forum CrackingX requesting assistance in obtaining bulk SMS sending capabilities or SIM cards capable of sending messages at high volume. The request suggests potential intent to conduct SMS spam, phishing (smishing), or other mass messaging campaigns. No specific victim, price, or data type was mentioned.
    Date: 2026-04-28T09:58:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73498/
    Screenshots:
    None
    Threat Actors: Clifford
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  211. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has shared an alleged combolist of approximately 100,000 mixed credentials described as valid and sourced from various forums. The post is gated behind registration or sign-in on the crackingx.com forum, limiting full content visibility. The specific origin, targeted organizations, and affected countries of the credential list remain unknown.
    Date: 2026-04-28T09:57:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73500/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  212. Alleged Telegram User Surveillance and Data Aggregation Service Advertised via Funstat Bot
    Category: Data Breach
    Content: A threat actor is advertising Funstat, claimed to be the largest database of Telegram users and chats globally, accessible via a Telegram bot at telelog.bot. The service allegedly allows users to export message histories, view group and channel memberships, analyze user interactions, and search messages globally. This tool poses significant privacy and surveillance risks to Telegram users worldwide.
    Date: 2026-04-28T09:57:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73496/
    Screenshots:
    None
    Threat Actors: funstat
    Victim Country: Unknown
    Victim Industry: Telecommunications / Messaging
    Victim Organization: Telegram
    Victim Site: telegram.org
  213. Kent District Library blames ‘ransomware’ for closures
    Category: Cyber Attack
    Content: The Kent County Library has closed following a ransomware attack that affected all of its branches. The organization is currently investigating the incident with external specialists to determine its full scope and intends to notify users if their personal data has been compromised. To address the closure, some branches remain open with limited services for users.
    Date: 2026-04-28T09:54:42Z
    Network: openweb
    Published URL: https://www.woodtv.com/news/kent-county/kent-district-library-blames-ransomware-for-closures/
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Kent District Library
    Victim Site: kdl.org
  214. Alleged breach of colprecentro.edu.co
    Category: Data Breach
    Content: A domain associated with an educational institution (colprecentro.edu.co) has been posted in a market channel with a #sold hashtag, indicating potential sale of compromised access, credentials, or stolen data related to this organization.
    Date: 2026-04-28T09:51:51Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/520
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Colombia
    Victim Industry: Education
    Victim Organization: Colprecentro
    Victim Site: colprecentro.edu.co
  215. Alleged leak of Hotmail credential combolist
    Category: Logs
    Content: A threat actor operating under the alias UniqueCombo has made available a combolist allegedly containing 5,000 unique Hotmail credentials on a cybercrime forum. The post is categorized under Mail Access & Combolists, suggesting the list contains email and password pairs. No price or payment terms were mentioned, indicating the combolist was freely shared.
    Date: 2026-04-28T09:47:35Z
    Network: openweb
    Published URL: https://xforums.st/threads/hotmail-unique-combo_2_5000.611825/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  216. Alleged sale of fresh credential databases across multiple countries
    Category: Combo List
    Content: Threat actor offering fresh database dumps containing credentials from UK, DE, JP, NL, BR, PL, ES, US, IT and other countries. Specifically targeting popular platforms including eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, and Kleinanzeigen. Seller claims to have private cloud access and valid webmail credentials (ntlworld). Offering to check credentials against specific keywords upon request.
    Date: 2026-04-28T09:41:05Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71345
    Screenshots:
    None
    Threat Actors: mu
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy
    Victim Industry: Multiple (e-commerce, payment, gaming, travel, email)
    Victim Organization: Unknown
    Victim Site: Unknown
  217. Alleged cyberattack causing widespread disruption to French passport and national ID system
    Category: Cyber Attack
    Content: A cyberattack targeted Frances online system for issuing passports, national ID cards, and drivers licenses, causing significant service disruption. According to Frances Interior Ministry, millions of users personal information was exposed. The system was taken offline for emergency maintenance and repairs. Citizens are unable to submit new requests or track existing applications, forcing administrative centers to revert to manual paper-based processes. The attack coincided with increased demand for travel document renewals, causing delays in travel and migration plans.
    Date: 2026-04-28T09:32:59Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21444
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Ministry of Interior / French Government
    Victim Site: Unknown
  218. Alleged Data Leak of qzaem.ru User Database with 7.6 Million Records
    Category: Data Leak
    Content: A threat actor known as Tanaka has made available a database dump from qzaem.ru, a Russian online lending/microfinance platform, containing approximately 7.6 million user records dated February 2024. The leaked SQL database includes sensitive personal and financial data such as full names, email addresses, phone numbers, hashed passwords, IP addresses, birth dates, physical addresses, SNILS (Russian social security numbers), INN (tax identification numbers), payment card tokens, card metadata, a
    Date: 2026-04-28T09:24:48Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-qzaem-ru-7-6M-2024-02-Repost
    Screenshots:
    None
    Threat Actors: Tanaka
    Victim Country: Russia
    Victim Industry: Financial Services
    Victim Organization: Qzaem
    Victim Site: qzaem.ru
  219. Alleged cyber attacks by French hacker HexDex – 100 intrusions including French Ministry of Education breach
    Category: Cyber Attack
    Content: French police arrested a 21-year-old hacker using the alias HexDex for approximately 100 cyber intrusions since late 2025. The most significant attributed attack involved unauthorized access to the French Ministry of Educations systems, resulting in exposure of personal and contact information of approximately 243,000 employees. The suspect is charged with six offenses including organized criminal activity. Authorities indicate the attacker also targeted multiple government institutions, sports organizations, and professional bodies. Financial motivation was identified as the primary driver.
    Date: 2026-04-28T09:19:29Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21443
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Government/Education
    Victim Organization: French Ministry of Education (Ministère de lÉducation)
    Victim Site: Unknown
  220. Alleged Data Leak of Netflix Email Dump
    Category: Data Leak
    Content: A threat actor known as CC-GuRu has allegedly shared or made available an email dump associated with Netflix.com on a darknet forum. The post is restricted to registered or signed-in members, limiting visibility into the full scope and nature of the leaked data. The specific record count and exact data fields included remain unknown.
    Date: 2026-04-28T09:18:32Z
    Network: openweb
    Published URL: https://darkpro.net/threads/netflix-com-email-dump-by-carding-forum.22902/
    Screenshots:
    None
    Threat Actors: CC-GuRu
    Victim Country: United States
    Victim Industry: Streaming / Entertainment
    Victim Organization: Netflix
    Victim Site: netflix.com
  221. Alleged Sale of Fraudulent Identity Documents Including SSNs, Passports, and Financial Records
    Category: Carding
    Content: A threat actor operating under the alias Tryrdf is selling allegedly authentic identity and financial documents on DemonForums, including SSNs, drivers licenses, passports, utility bills, bank details with cards, LLC documents, tax IDs, and address verifications. The seller claims the documents are freshly acquired and of high quality, pricing them at elevated rates. Contact is facilitated via Telegram handle @DroneBott2.
    Date: 2026-04-28T09:18:27Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Buy-fully-fresh-working-Doucuments-Bills-Detailes-Licenses-Aged-Fresh–202037
    Screenshots:
    None
    Threat Actors: Tryrdf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  222. Alleged leak of mixed combolist credentials distributed via cracking forum
    Category: Combo List
    Content: A threat actor operating under the alias snowstormxd has made available a mixed combolist containing 1,457 credential pairs via a cracking forum and Telegram channel. The post includes a free download link alongside a paid private cloud service offering tiered subscription access starting at $3 for 24 hours. The combolist is described as mixed, indicating credentials aggregated from multiple sources, with a built-in inboxer tool included.
    Date: 2026-04-28T09:18:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73495/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  223. Alleged data breach of Modern Cleaning Methods Co. (Chem-Dry Kuwait)
    Category: Data Breach
    Content: A threat actor known as fent888 is selling an alleged database dump from chemdry.com.kw, the official website of Modern Cleaning Methods Co., a Kuwait-based Chem-Dry franchise. The dataset contains approximately 121,836 records with fields including personal identifiers, contact details, geolocation data, password hashes, device information, and booking details. The breach is claimed to have occurred on April 28, 2026, and is being offered for $120 via a Telegram channel.
    Date: 2026-04-28T09:06:01Z
    Network: openweb
    Published URL: https://breached.st/threads/chemdry-com-kw-121-8k.86403/unread
    Screenshots:
    None
    Threat Actors: fent888
    Victim Country: Kuwait
    Victim Industry: Cleaning Services
    Victim Organization: Modern Cleaning Methods Co. (Chem-Dry)
    Victim Site: chemdry.com.kw
  224. Alleged Data Leak of Modular Construction Co. ID Customer Database
    Category: Data Leak
    Content: A threat actor known as Kyyzo has leaked a partial customer database belonging to modularconstruction.co.id, an Indonesian construction company. The leaked data includes customer names and phone numbers in JSON format. The actor indicated additional data will be posted incrementally and can be contacted via Telegram.
    Date: 2026-04-28T09:05:06Z
    Network: openweb
    Published URL: https://breached.st/threads/database-modularconstruction-co-id.86402/unread
    Screenshots:
    None
    Threat Actors: Kyyzo
    Victim Country: Indonesia
    Victim Industry: Construction
    Victim Organization: Modular Construction Co.
    Victim Site: modularconstruction.co.id
  225. Alleged Data Breach of Badan Penghubung Pemerintah Jawa Tengah Government Portal
    Category: Data Breach
    Content: A threat actor known as Mr. Hanz Xploit has alleged a data breach of the Badan Penghubung Pemerintah Jawa Tengah, an Indonesian regional government liaison body. The post claims to involve approximately 1 million records from the organizations database. No further details regarding the nature of the data or the method of compromise are available from the post content.
    Date: 2026-04-28T09:04:30Z
    Network: openweb
    Published URL: https://breached.st/threads/1-milliond-database-badan-penghubung-pemerintah-jawa-tengah-go-id.86401/unread
    Screenshots:
    None
    Threat Actors: Mr. Hanz Xploit
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Badan Penghubung Pemerintah Jawa Tengah
    Victim Site: badan-penghubung-pemerintah-jawa-tengah.go.id
  226. Alleged Data Breach of UniversityKart Indian Education Platform Exposing 1 Million Student Records
    Category: Data Breach
    Content: A threat actor operating under the alias Sensitive2025 is selling an alleged database dump from UniversityKart, an Indian education platform, containing approximately 1 million records. The exposed data includes full names, mobile numbers, email addresses, gender, geographic details (city, state, country), interested universities and courses, lead source information, and timestamps. Sample records suggest the data originates from a leads management system and pertains to Indian students seekin
    Date: 2026-04-28T08:48:49Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Full-Database-1M-lines-universitykart-com-India
    Screenshots:
    None
    Threat Actors: Sensitive2025
    Victim Country: India
    Victim Industry: Education
    Victim Organization: UniversityKart
    Victim Site: universitykart.com
  227. Alleged leak of mixed premium credential combolists
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available a collection of approximately 4,763 alleged high quality mixed premium credential hits. The post offers a free download of the combolist with no additional context regarding the origin or targeted services. The credentials are described as mixed, suggesting they span multiple platforms or services.
    Date: 2026-04-28T08:39:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73491/
    Screenshots:
    None
    Threat Actors: anonymous_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  228. Alleged leak of mixed credential combolist with keyword targets
    Category: Combo List
    Content: A threat actor on the cracking forum CrackingX has made available a mixed combolist containing 3,547 alleged fully valid credential entries. The post includes separate downloads for validated hits and keyword-targeted credential lists, suggesting the combolists are organized by specific service or platform targets.
    Date: 2026-04-28T08:39:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73492/
    Screenshots:
    None
    Threat Actors: Hotmail Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  229. Alleged leak of mixed credential combolist with keyword targets
    Category: Combo List
    Content: A threat actor known as He_Cloud has made available on DemonForums a combolist containing 3,547 claimed valid email:password credential pairs described as a private full valid mix access collection. The post also includes a separate download of keyword-targeted credentials. The content is being distributed for free with no price mentioned.
    Date: 2026-04-28T08:38:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-3547x-Private-Full-Valid-Mix-Access-%E2%9D%84%E2%9D%84-KEYWORD-TARGETS
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  230. Alleged leak of mixed email credential combolist with inbox targets
    Category: Combo List
    Content: A threat actor operating under the alias He_Cloud on DemonForums has made available a mixed combolist containing 4,259 alleged valid email:password credential pairs. The post includes free download links for the full combolist, a filtered hits subset claimed to be 100% valid, and a separate list of keyword-based inbox targets. No specific victim organization or country has been identified.
    Date: 2026-04-28T08:38:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-4259x-HQ-MIX-FRESH-VALIDS-%E2%9A%A1%E2%9A%A1-INBOXES-TARGETS–202036
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  231. Alleged leak of Gmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 952,789 Gmail credential pairs (email:password) via a Mega.nz file link. The list is described as high quality (HQ) and is being freely distributed on the cracking forum CrackingX. This type of combolist is typically compiled from multiple prior data breaches and used for credential stuffing attacks.
    Date: 2026-04-28T08:38:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73494/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  232. Alleged data breach of McDonalds India – 861 GB leaked by Everest group
    Category: Data Breach
    Content: Everest group claims to have breached McDonalds India (operating through Connaught Plaza Restaurants and Hardcastle Restaurants) on January 20, 2026. Alleged leaked data includes 861 GB of financial reports, audit trails, pricing data, internal communications, investor/partner contact databases (US, UK, Singapore, India), store-level data with manager information, customer personal data, and access to accounting/ERP systems. The full leak has been published. This follows previous incidents in 2017 (2.2M customer records via McDelivery app) and 2024 (API vulnerabilities in delivery system).
    Date: 2026-04-28T08:26:37Z
    Network: telegram
    Published URL: https://t.me/c/1861685334/268
    Screenshots:
    None
    Threat Actors: Everest group
    Victim Country: India
    Victim Industry: Food & Beverage / Quick Service Restaurants
    Victim Organization: McDonalds India
    Victim Site: Unknown
  233. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias UniqueCombo has shared an alleged combolist containing approximately 5,000 Hotmail credentials on the cracking forum CX. The post is titled Hotmail Unique Combo_1_5000, suggesting the list contains unique email and password combinations targeting Hotmail accounts. The full content of the post is restricted to registered or signed-in forum members.
    Date: 2026-04-28T07:59:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73490/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  234. Alleged leak of Hotmail credentials combolist
    Category: Data Leak
    Content: A threat actor known as alphacloud has shared a combolist containing 1,520 alleged valid Hotmail credentials on the forum AE – Combo List. The post claims the credentials are premium hits from a private cloud source. The actor can be contacted via Telegram at alphaaxd, and the content is gated behind a reply requirement.
    Date: 2026-04-28T07:57:21Z
    Network: openweb
    Published URL: https://altenens.is/threads/snowflakesnowflake-1520x-premium-hotmail-hits-snowflakesnowflake.2930944/unread
    Screenshots:
    None
    Threat Actors: alphacloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  235. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias snowstormxd has made available a combolist of 146 allegedly ultra-high-quality (UHQ) Hotmail credentials via a public download link and a Telegram channel. The post advertises a built-in inboxer tool and promotes a paid private cloud service for additional credential access, priced between $3 and $120 depending on subscription tier. Payments are processed through a dedicated Telegram payment bot.
    Date: 2026-04-28T07:21:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73487/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  236. Alleged leak of 2,379 U.S. Marines personal details by Handala threat actor
    Category: Data Leak
    Content: Handala threat actor claims to have leaked personal information on 2,379 U.S. Marines stationed in the Gulf region, including names, identities, family details, home addresses, base locations, and daily patterns. The post frames this as a demonstration of surveillance capabilities and includes explicit threats of future military attacks using missiles and drones. A shortened URL link is provided to access the alleged leaked data.
    Date: 2026-04-28T07:05:15Z
    Network: telegram
    Published URL: https://t.me/c/3686754935/39
    Screenshots:
    None
    Threat Actors: Handala
    Victim Country: United States
    Victim Industry: Military/Defense
    Victim Organization: United States Marine Corps
    Victim Site: Unknown
  237. Alleged leak of Italian credential combolist with 1.2 million records
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist containing approximately 1.245 million email and password credential pairs allegedly targeting Italian users. The list is described as fresh and high quality, suggesting recently validated credentials. The post directs users to a Telegram channel (@elite_cloud1) for additional credential logs.
    Date: 2026-04-28T06:42:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-1-245-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Italy-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  238. Alleged leak of Indian email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 311,000 email:password credential pairs allegedly originating from India. The list is described as fresh and high quality and is shared via a hidden download link on the forum. The actor promotes additional credential logs through a Telegram channel at t.me/elite_cloud1.
    Date: 2026-04-28T06:42:01Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-311-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-India-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  239. Alleged leak of Indonesian email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 273,000+ email and password credential pairs allegedly sourced from Indonesia. The list is described as FRESH and HQ (high quality), suggesting recently obtained or validated credentials. The post directs users to a Telegram channel (@elite_cloud1) for additional credential logs.
    Date: 2026-04-28T06:41:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-273-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Indonesia-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  240. Alleged leak of Japanese email credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 215,000+ email:password credential pairs allegedly associated with Japanese users. The list is described as fresh and high quality and is shared via a hidden content mechanism on the forum. The actor promotes an associated Telegram channel (@elite_cloud1) for additional credential logs.
    Date: 2026-04-28T06:41:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-215-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Japan-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  241. Alleged leak of Hungarian credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist containing approximately 158,000 email and password combinations purportedly associated with Hungarian users. The credential list is described as fresh and high quality and is shared via a hidden content gate on the forum. The actor also promotes a Telegram channel (t.me/elite_cloud1) for additional credential dumps.
    Date: 2026-04-28T06:41:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-158-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Hungary-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Hungary
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  242. Alleged leak of Israeli credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias thejackal101 has made available a combolist of approximately 32,000+ email and password credential pairs allegedly sourced from Israeli accounts. The combolist is described as fresh and high quality and is offered as hidden content on the forum. The actor also promotes an associated Telegram channel (@elite_cloud1) for further credential distributions.
    Date: 2026-04-28T06:40:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-32-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Israel-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  243. Alleged leak of Irish email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias Elite_Cloud1 has made available a combolist containing approximately 23,000+ email address and password credential pairs purportedly associated with Irish users. The list is described as fresh and high quality and is shared via a hidden content gate on a cybercrime forum. The actor also maintains a Telegram channel at t.me/elite_cloud1 for further distribution of credential lists.
    Date: 2026-04-28T06:40:28Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-23-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Ireland-%E2%9C%AA-27-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Ireland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  244. Alleged sale of fresh mixed credential combolist via MTX Cloud private service
    Category: Combo List
    Content: A threat actor operating under the alias Haydayx and associated with MTX CLOUD PRIVATE is selling subscription-based access to fresh mixed combolists, including Hotmail and other email credentials. The service offers between 5,000 to 100,000 credential lines daily, priced from $5 for a 3-day trial up to $40 for three months, with payments accepted in cryptocurrency. The combolists are claimed to be clean, verified, and updated daily with no duplicate entries.
    Date: 2026-04-28T06:40:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73484/
    Screenshots:
    None
    Threat Actors: Haydayx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  245. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias @Steveee36 has made available a combolist purportedly containing 539 Hotmail email and password credential pairs. The content is shared for free on the DemonForums combolists section. The post requires forum registration or login to access the hidden content.
    Date: 2026-04-28T06:40:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X539-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  246. Alleged leak of European Education and Shopping Sector Combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist of approximately 127,760 credential lines via a Mega.nz link. The list is described as targeting European education and shopping sectors. The credentials were shared freely without any stated price on the crackingx.com forum.
    Date: 2026-04-28T06:39:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73485/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Europe
    Victim Industry: Education, Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  247. Alleged CCTV Infrastructure Attack on United States by TheSweetNight and OpsShadowStrike
    Category: Cyber Attack
    Content: TheSweetNight and OpsShadowStrike claim to have compromised CCTV systems across the United States using CVE-2017-7921. The attack is attributed to a collaboration of multiple threat actors including TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, and others. The post includes political messaging related to Palestine and Iran.
    Date: 2026-04-28T06:32:51Z
    Network: telegram
    Published URL: https://t.me/TheSweetNightPublic/79
    Screenshots:
    None
    Threat Actors: TheSweetNight
    Victim Country: United States
    Victim Industry: Critical Infrastructure (CCTV/Surveillance)
    Victim Organization: Unknown
    Victim Site: Unknown
  248. Alleged Data Leak of India Aadhaar Card Data Offered Free to Pakistani Law Enforcement
    Category: Data Leak
    Content: A threat actor using the alias anon 23 has claimed to possess Aadhaar card data belonging to Indian citizens and is making it available for free exclusively to Pakistani law enforcement agencies. The actor provided a Session app contact ID for communication and shared a file link, though the scope and authenticity of the alleged data remain unverified. The post carries a politically motivated tone, targeting Indian government identity data and offering it selectively to a rival nations law en
    Date: 2026-04-28T06:31:34Z
    Network: openweb
    Published URL: https://xforums.st/threads/india-aadhaar-card-data.610786/
    Screenshots:
    None
    Threat Actors: anon 23
    Victim Country: India
    Victim Industry: Government
    Victim Organization: Unique Identification Authority of India (UIDAI)
    Victim Site: uidai.gov.in
  249. Alleged Data Breach of Paraguayan Insurance Database Exposing 288,394 Persons
    Category: Data Breach
    Content: A threat actor on BreachForums is sharing a database allegedly sourced from a Paraguayan insurance company, containing records on approximately 288,394 individuals. The dataset includes national ID numbers, full names, dates of birth, policy status, record type, and country codes. The content is gated behind registration or login, suggesting controlled distribution rather than a fully public free leak.
    Date: 2026-04-28T06:29:28Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-Paraguay-288394-persons
    Screenshots:
    None
    Threat Actors: dbrick84
    Victim Country: Paraguay
    Victim Industry: Insurance
    Victim Organization: Unknown
    Victim Site: Unknown
  250. Alleged leak of DarkSword iOS exploit kit source code targeting multiple countries
    Category: Data Leak
    Content: A threat actor known as Alexmipula has leaked alleged source code for DarkSword, a purported iOS exploit kit claiming to chain 6 vulnerabilities to silently compromise iPhones running iOS 18.4-18.7 via a single Safari visit. The kit allegedly delivers three malware families — GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER — enabling device takeover, data theft, and surveillance. The post claims prior deployment by surveillance vendors and state actors across Saudi Arabia, Turkey, Malaysia, and Ukraine
    Date: 2026-04-28T06:26:03Z
    Network: openweb
    Published URL: https://breached.st/threads/2026-new-ios-exploit-source-code-leakedfire.86398/unread
    Screenshots:
    None
    Threat Actors: Alexmipula
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Alleged Data Breach of Indonesia Ministry of Industry (Kemenperin)
    Category: Data Breach
    Content: A threat actor operating under the alias MrAnomali is allegedly selling data associated with Indonesias Ministry of Industry (Kemenperin) on the Breached forum. The post provides minimal details regarding the nature or volume of the data involved. The claim remains unverified and further details are unavailable from the post content.
    Date: 2026-04-28T06:25:01Z
    Network: openweb
    Published URL: https://breached.st/threads/for-sale-indonesia-ministry-of-industry-kemenperin.86397/unread
    Screenshots:
    None
    Threat Actors: MrAnomali
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Ministry of Industry (Kemenperin)
    Victim Site: kemenperin.go.id
  252. Alleged Data Leak of ZAMECO Customer Database Including Personal Information
    Category: Data Leak
    Content: A threat actor operating under the alias Z4ne0days has leaked a database dump allegedly belonging to ZAMECO, a Philippine electric cooperative. The leaked data contains customer records including full names, email addresses, and account numbers. The data was freely shared on the Breached forum with no indication of a sale price.
    Date: 2026-04-28T06:24:06Z
    Network: openweb
    Published URL: https://breached.st/threads/zameco-databse-user-phone-number-and-email.86399/unread
    Screenshots:
    None
    Threat Actors: Z4ne0days
    Victim Country: Philippines
    Victim Industry: Electric Utility / Energy
    Victim Organization: ZAMECO (Zambales II Electric Cooperative)
    Victim Site: Unknown
  253. Alleged cyber attack by Hanzalah hacker group targeting Israeli mobile phones with mass SMS campaign
    Category: Cyber Attack
    Content: Iranian hacker group Hanzalah claimed responsibility for sending hundreds of thousands of warning SMS messages to Israeli citizens mobile phones. The messages contained political messaging and warnings attributed to the group, claiming to be in response to Israeli government policies. This represents a claimed cyber attack campaign targeting civilian infrastructure.
    Date: 2026-04-28T05:58:56Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21432
    Screenshots:
    None
    Threat Actors: Hanzalah
    Victim Country: Israel
    Victim Industry: telecommunications/civilian
    Victim Organization: Unknown
    Victim Site: Unknown
  254. Alleged sale of breached Indonesia Ministry of Industry (KEMENPERIN) database with 130+ official records
    Category: Data Breach
    Content: Threat actor offering for sale a dataset allegedly containing 130+ records from Indonesias Ministry of Industry (KEMENPERIN), including internal extension numbers, floor details, and direct room locations of high-ranking officials. Seller provided proof of validity with sample data including names, addresses, and phone numbers of government officials. Price: 0.4 LTC. Contact via @wildhigt on Litecoin.
    Date: 2026-04-28T05:57:39Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/648
    Screenshots:
    None
    Threat Actors: wildhigt
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Indonesia Ministry of Industry (KEMENPERIN)
    Victim Site: Unknown
  255. Alleged data exfiltration vulnerability in ChatGPT code execution runtime via hidden outbound channel
    Category: Data Leak
    Content: Check Point Research disclosed a hidden outbound communication channel within ChatGPTs sandboxed code execution environment, bypassing OpenAIs stated data protection mechanisms. A single malicious prompt was sufficient to activate a covert exfiltration channel capable of leaking user messages, uploaded files, and other sensitive content without user knowledge or consent. The same channel could reportedly be abused by backdoored GPTs to establish remote shell access within the Linux runtime use
    Date: 2026-04-28T05:52:11Z
    Network: openweb
    Published URL: https://tier1.life/thread/184
    Screenshots:
    None
    Threat Actors: RedQueen
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: OpenAI
    Victim Site: openai.com
  256. Alleged leak of stealer logs archive (2GB, April 2026)
    Category: Data Leak
    Content: A threat actor known as blackcloud has made available a 2GB archive of stealer logs dated April 28, 2026 on the XF forum. The logs likely contain harvested credentials, cookies, and other sensitive data exfiltrated from victim machines via infostealer malware. No specific victim organization or country has been identified.
    Date: 2026-04-28T05:46:43Z
    Network: openweb
    Published URL: https://xforums.st/threads/logs-fresh-2-gb-from-28-04-2026.610785/
    Screenshots:
    None
    Threat Actors: blackcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  257. Alleged free distribution of Coruna iOS Exploit Kit (CryptoWaters) targeting iOS 13.0–17.2.1
    Category: Data Leak
    Content: A threat actor on Breached forums has made available an alleged iOS exploitation framework dubbed Coruna (also known as CryptoWaters), claimed to be a nation-state-grade modular toolkit comprising 23 exploits across 5 exploit chains targeting iOS versions 13.0 through 17.2.1. The framework purportedly delivers a 6-stage attack chain culminating in a payload called PlasmaLoader, designed for cryptocurrency wallet theft, seed phrase extraction, and financial data exfiltration from 18 wallet appl
    Date: 2026-04-28T05:42:55Z
    Network: openweb
    Published URL: https://breached.st/threads/coruna-latest-version-ios-exploit-download-free-fire.86396/unread
    Screenshots:
    None
    Threat Actors: Alexmipula
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  258. Alleged data breach of Voney pharmacy loyalty platform affecting Indian pharmacists
    Category: Data Breach
    Content: Anonymous Switzerland claims to have gained unauthorized access to Voneys databases, a loyalty program platform serving Indian pharmacists. The threat actor claims to have extracted approximately 560MB of sensitive data including complete personal information (names, phone numbers, email addresses), banking details, financial transaction records, login credentials, contact lists, and behavioral data of pharmacists. The actor threatens to leak this data as a compressed file and uses the phrase We neither forget nor forgive.
    Date: 2026-04-28T05:26:46Z
    Network: telegram
    Published URL: https://t.me/Anonymous_Switzerland/174
    Screenshots:
    None
    Threat Actors: Anonymous Switzerland
    Victim Country: India
    Victim Industry: Pharmaceutical/Healthcare
    Victim Organization: Voney
    Victim Site: Unknown
  259. Alleged sale of webshells
    Category: Initial Access
    Content: Threat actor advertising webshell sales via direct message contact (@Lei_BF). Webshells are initial access tools used for unauthorized server compromise.
    Date: 2026-04-28T05:22:26Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/950
    Screenshots:
    None
    Threat Actors: Lei_BF
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a combolist of 146 alleged fresh Hotmail credentials via a free download link on pasteview.com. The post also promotes a Telegram-based private cloud storage service for credential lists, offered at tiered pricing. The actor appears to be actively distributing stolen Hotmail email credentials alongside monetizing a credential storage and inboxing service.
    Date: 2026-04-28T05:17:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73482/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  261. Alleged leak of corporate email credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist containing approximately 51,360 corporate email and password credential pairs via a Mega.nz file sharing link. The post, shared on the cracking forum CrackingX, is titled as a 2026 corporate mail credential leak. No specific victim organization, industry, or country has been identified.
    Date: 2026-04-28T04:38:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73481/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  262. Alleged leak of Hotmail credentials combolist
    Category: Data Leak
    Content: A threat actor known as redcloud has made available a combolist of approximately 4,900 alleged valid Hotmail credentials on the AE – Combo List forum. The post, dated April 28, 2026, is described as private and ultra-high quality (UHQ), suggesting the credentials have been validated for active mail access. The actor provides a Telegram contact handle (@tutuba5m) and requires forum replies to access the hidden download link.
    Date: 2026-04-28T04:37:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/4-9k-high-voltagehotmailhigh-voltagevalid-mail-access-28-04.2930881/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  263. Alleged data leak of Podemos Brazilian political party
    Category: Data Leak
    Content: A threat actor operating under the alias m0z1ll4screw, along with their crew m0z1ll4s, claims to have exploited a vulnerability in PHP 7.4.33 to gain unauthorized access to the systems of Podemos, a Brazilian political party. The attacker allegedly extracted over 958,000 pieces of sensitive information and has made the data available for free download via a Gofile link. Contact was provided via a Telegram handle.
    Date: 2026-04-28T04:27:57Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DOCUMENTS-%E2%AD%90podemos-org-br-Brazilian-political-party
    Screenshots:
    None
    Threat Actors: m0z1ll4screw
    Victim Country: Brazil
    Victim Industry: Political Party
    Victim Organization: Podemos
    Victim Site: podemos.org.br
  264. Alleged Data Breach of Movistar Peru Business Portal (empresas.movistar.com.pe)
    Category: Data Breach
    Content: A threat actor known as MDGhost claims to be offering a database allegedly sourced from empresas.movistar.com.pe, the B2B portal of Movistar Peru operated by Telefónica. The database purportedly contains approximately 4 million records in XLSX format, including full names, ID documents, dates of birth, phone numbers, payment types, service descriptions, city, and plan product details. The actor has provided a contact via Telegram under the handle The BlackH4t MD-Ghost.
    Date: 2026-04-28T04:23:47Z
    Network: openweb
    Published URL: https://breached.st/threads/4-million-database-empresas-movistar-com-pe-telecom-company-in-peru.86395/unread
    Screenshots:
    None
    Threat Actors: MDGhost
    Victim Country: Peru
    Victim Industry: Telecommunications
    Victim Organization: Movistar Peru (Telefónica)
    Victim Site: empresas.movistar.com.pe
  265. Alleged Data Leak of Instituto Registral y Catastral del Estado de Puebla (IRCEP) Documents
    Category: Data Leak
    Content: A threat actor known as Straightonumberone has leaked over 11,000 documents belonging to the Instituto Registral y Catastral del Estado de Puebla (IRCEP), a Mexican government property registry agency. The leaked files, spanning 2018 to 2025, include legal documents, property records, payment receipts, and citizen PII such as scanned IDs, predial account numbers, and property ownership details. Half of the documents were made available freely on the forum, with the remainder offered for sale v
    Date: 2026-04-28T04:17:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-Mexico-Instituto-Registral-y-Catastral-del-Estado-de-Puebla-IRCEP-11-269-files
    Screenshots:
    None
    Threat Actors: Straightonumberone
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Instituto Registral y Catastral del Estado de Puebla (IRCEP)
    Victim Site: Unknown
  266. Alleged Credential Checker Service for RobinHood Accounts via Telegram Bot
    Category: Services
    Content: A threat actor is advertising a Telegram-based automated credential checking service targeting RobinHood brokerage accounts, operated via the bot @goycaller_bot. The service offers fast scanning of credential lists at $0.0003 per line, with multiple scan modes, job control commands, and a referral bonus program. This tool is designed to validate stolen credentials against RobinHood accounts at scale.
    Date: 2026-04-28T04:13:54Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-%E2%9C%85RobinHood-Checker-Fast-Scans-Telegram-Control-Drop-File-to-Scan
    Screenshots:
    None
    Threat Actors: Kevinn
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: RobinHood
    Victim Site: robinhood.com
  267. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias ValidMail has shared an alleged combolist containing 100,000 mixed credentials described as valid forum accounts. The post is hosted on the cracking forum CrackingX and requires registration or login to access the content. The specific targeted platforms or victim organizations cannot be determined due to restricted access to the post content.
    Date: 2026-04-28T03:55:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73479/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Alleged leak of mixed valid email access credentials (69,400 records)
    Category: Data Leak
    Content: A threat actor known as redcloud has made available a combolist of approximately 69,400 mixed valid email credentials, described as private and ultra-high quality (UHQ). The list was shared for free on the AE forum with a reply-to-unlock mechanism, and the actor also references a Telegram contact (@tutuba5m). No specific victim organization or targeted domain has been identified, suggesting credentials may be aggregated from multiple sources.
    Date: 2026-04-28T03:52:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/69-4k-sparkles-mix-sparkles-valid-mail-access-28-04.2930877/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Alleged doxxing bot service offering personal data lookup by national ID
    Category: Malware
    Content: Advertisement for an automated doxxing bot service that claims to provide instant access to personal information including full names, phone numbers, addresses, and locations using only a national ID number (cédula). The service is marketed as anonymous, available 24/7, and operating with a constantly updated database. Contact information provided via Telegram handle @la_kabra_666.
    Date: 2026-04-28T03:44:08Z
    Network: telegram
    Published URL: https://t.me/ironatlas_organization/132
    Screenshots:
    None
    Threat Actors: la_kabra_666
    Victim Country: Philippines
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Alleged Data Breach of Wells Fargo Bank with 4.6 Million Customer Records
    Category: Data Breach
    Content: A threat actor operating under the alias RubiconH4ck is claiming to sell a database containing 4.6 million records allegedly belonging to Wells Fargo customers. The data reportedly includes full names, email addresses, physical addresses, PINs, and phone numbers, purportedly updated between 2024 and 2026. The actor is offering samples via Telegram and is open to negotiations to withhold the data from further distribution in exchange for payment.
    Date: 2026-04-28T03:43:18Z
    Network: openweb
    Published URL: https://breached.st/threads/4-6-million-wels-fargo-bank-data.86394/unread
    Screenshots:
    None
    Threat Actors: RubiconH4ck
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Wells Fargo
    Victim Site: wellsfargo.com
  271. Alleged leak of stealer logs distributed via file hosting platform
    Category: Logs
    Content: A threat actor known as MrKordy has made available a collection of stealer logs on a dark web forum, claiming the data is fresh and of ultra-high quality (UHQ) as of April 27, 2026. The logs are being distributed for free via a Gofile link. Stealer logs typically contain credentials, browser-saved passwords, cookies, and other sensitive data harvested by information-stealing malware.
    Date: 2026-04-28T03:38:31Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-STEALER-LOGS-%E2%AD%90%EF%B8%8FUHQ-FRESH-%E2%AD%90%EF%B8%8FFROM-27-4-2026%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: MrKordy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  272. Alleged fraudulent SEC company registration and filing service offered on dark web forum
    Category: Initial Access
    Content: A threat actor operating under the alias GetRenewed is selling a fraudulent company registration and SEC filing service for $25,000. The service includes registering a shell company in the U.S. and filing it with the SECs EDGAR system, creating a legitimate-looking regulated business entity. The actor also offers company registration in 60+ countries and EU nominee accounts starting at $4,500, suggesting a broader financial fraud and money laundering operation.
    Date: 2026-04-28T03:36:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-%F0%9F%87%BA%F0%9F%87%B8-Company-Registration-and-Filing-with-the-SEC-USA
    Screenshots:
    None
    Threat Actors: GetRenewed
    Victim Country: United States
    Victim Industry: Financial Services / Regulatory
    Victim Organization: U.S. Securities and Exchange Commission (SEC/EDGAR)
    Victim Site: sec.gov
  273. Alleged Data Breach of FGA – Fondo de Garantías Antioquia (EmergiaCC)
    Category: Data Breach
    Content: Threat actors Petro_Escobar and NyxarGroup are selling a database allegedly obtained from FGA (Fondo de Garantías Antioquia), a Colombian credit guarantee fund supporting individuals and microentrepreneurs. The dataset contains approximately 5,000 records including full names, national ID numbers, phone numbers, addresses, credit obligation details, overdue amounts, payment statuses, and days in arrears. The data appears to originate from a debt management or collections system used by FGA.
    Date: 2026-04-28T03:36:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-EmergiaCC-FONDO-DE-GARANTIAS-ANTIOQUIA
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Financial Services
    Victim Organization: Fondo de Garantías Antioquia (FGA)
    Victim Site: fga.com.co
  274. Alleged Ransomware Data Leak by Nova Ransomware Group Targeting Multiple Organizations Across Multiple Countries
    Category: Data Leak
    Content: Nova Ransomwares Leak Spread Department (BlackAds), operated under the alias ShameLeak, has publicly leaked data from at least five organizations across Brazil, the United States, Indonesia, and Poland as retaliation for refusing to comply with ransom demands. Victims include VX Case (vxcase.com.br, 1TB), Wolf Technology Group (100GB), Electrical Resource International (15GB), Pemkab Bojonegoro (4GB), and M&K Foam Koło (mkfoam.pl, 60GB). The group also advertises an affiliate program, invitin
    Date: 2026-04-28T03:35:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-Nova-Ransomware-Leakspread-Department-BlackAds
    Screenshots:
    None
    Threat Actors: ShameLeak
    Victim Country: Multiple
    Victim Industry: Multiple
    Victim Organization: Multiple
    Victim Site: Multiple
  275. Alleged leak of approximately 4,000 compromised camera access credentials
    Category: Data Leak
    Content: A threat actor known as NearLeVrai claims to have hacked approximately 4,000 cameras and made access details freely available via a file-sharing link. The actor acknowledges that not all camera accesses may still be active. No specific geographic region, organization, or industry has been identified as the victim.
    Date: 2026-04-28T03:34:35Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-cameras-acces
    Screenshots:
    None
    Threat Actors: NearLeVrai
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Alleged Data Breach of IngressoLive Brazilian Ticketing Platform
    Category: Data Breach
    Content: A threat actor known as mastermind has made available an alleged database dump from IngressoLive, a Brazilian online ticketing platform. The exposed data reportedly contains approximately 106,000 records including buyer names, email addresses, payment form details, payment status, order values, commissions, and transaction-related financial data. The database appears to contain structured financial and transactional records tied to event ticket purchases made through the platform.
    Date: 2026-04-28T03:33:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-ingressolive-com-106k
    Screenshots:
    None
    Threat Actors: mastermind
    Victim Country: Brazil
    Victim Industry: Entertainment & Ticketing
    Victim Organization: IngressoLive
    Victim Site: ingressolive.com
  277. Alleged Data Leak of Student Database from SMAN 1 Malang (sman1-mlg.sch.id)
    Category: Data Leak
    Content: A threat actor operating under the alias treixnox has freely distributed a database dump containing over 2,000 records belonging to students of SMAN 1 Malang, an Indonesian public high school. The leaked data is highly sensitive and includes full names, national identification numbers (NIK), national student IDs (NISN), dates and places of birth, home addresses with geolocation coordinates, contact numbers, family card numbers, parental information including income levels, and financial detail
    Date: 2026-04-28T03:33:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-leak-database-from-sman1-mlg-sch-id-All-Document-infromation
    Screenshots:
    None
    Threat Actors: treixnox
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: SMAN 1 Malang
    Victim Site: sman1-mlg.sch.id
  278. Alleged leak of Robinhood user email list
    Category: Data Leak
    Content: A threat actor on a cybercrime forum made available a claimed list of over 300 cleaned and verified email addresses associated with Robinhood accounts. The data is described as targeting financial and crypto accounts and is intended for use in credential checking, balance verification, or KYC data harvesting. The list includes emails from Gmail, Yahoo, Outlook, and custom domains.
    Date: 2026-04-28T03:19:58Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-COLLECTION-LEAK-HQ-CLEANED-ROBINHOOD-EMAILS-FRESH-DUMP
    Screenshots:
    None
    Threat Actors: Kevinn
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Robinhood
    Victim Site: robinhood.com
  279. Alleged leak of Hotmail credential combolist with inboxer tool
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a combolist containing 146 Hotmail credentials via a public paste site and a Telegram channel. The post claims the credentials have been validated with a built-in inboxer, suggesting the accounts are active. The actor also advertises a paid private cloud service offering additional combolists at tiered pricing.
    Date: 2026-04-28T03:12:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73477/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  280. Website Defacement of MyRoadPay by m4ul1337 (BABAYO ERROR SYSTEM)
    Category: Defacement
    Content: On April 28, 2026, the website www.myroadpay.com, a road payment or toll processing service, was defaced by threat actor m4ul1337 operating under the group BABAYO ERROR SYSTEM. The attack targeted the homepage in a single-site defacement operation. No specific motivation or technical details were disclosed.
    Date: 2026-04-28T03:04:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915351
    Screenshots:
    None
    Threat Actors: m4ul1337, BABAYO ERROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Financial Services / Payment Processing
    Victim Organization: MyRoadPay
    Victim Site: www.myroadpay.com
  281. Alleged Credential Scanning Service RhScan Bot Advertised via Telegram
    Category: Services
    Content: A threat actor operating as Kevinn is advertising a Telegram-based credential checking service called RhScan Bot (via @goycaller_bot), marketed as RobinHood VM Checker. The service offers automated credential list scanning with multiple speed tiers, priced at $0.0003 per line, controlled entirely through Telegram bot commands. The tool is designed to validate credential lists at scale, supporting file uploads, reruns for accuracy, and a referral credit system.
    Date: 2026-04-28T02:49:31Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-RhScan-Bot-Fast-Scans-Telegram-Control-Drop-File-to-Scan
    Screenshots:
    None
    Threat Actors: Kevinn
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Alleged Sale of VoIP Spoofing and Caller ID Fraud Service (GoyCall)
    Category: Initial Access
    Content: A threat actor operating under the alias Kevinn is selling a premium VoIP spoofing service called GoyCall, which offers caller ID spoofing across 200+ countries, voice changing capabilities, and verified caller ID bypass for banks, exchanges, and Google. The service supports multiple dialer types including web, P1, and auto-dialers with 3CX/Asterisk/FreePBX PBX integration, and accepts cryptocurrency payments. This infrastructure is consistent with tools used in vishing campaigns, social engin
    Date: 2026-04-28T02:41:39Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-GoyCall-Routes-Web-Dialer-Voice-Changer-Crypto-Top-Up
    Screenshots:
    None
    Threat Actors: Kevinn
    Victim Country: Unknown
    Victim Industry: Telecommunications
    Victim Organization: Unknown
    Victim Site: goycall.com
  283. Alleged leak of UK Yahoo credential combolist
    Category: Data Leak
    Content: A threat actor on PwnForums has made available a combolist of alleged high-quality UK Yahoo email and password credentials targeting yahoo.co.uk accounts. The post describes the combos as freshly dumped and verified, suitable for credential stuffing or account takeover campaigns. The actual sample data is locked behind a points paywall, and the total record count is not disclosed.
    Date: 2026-04-28T02:40:08Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-COLLECTION-HQ-UK-YAHOO-COMBOS-FRESH-DUMP
    Screenshots:
    None
    Threat Actors: Kevinn
    Victim Country: United Kingdom
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.co.uk
  284. Alleged Data Leak of Brazilian Civil Defense Agency Database (defesacivil.am.gov.br)
    Category: Data Leak
    Content: A threat actor has publicly shared a database allegedly exported from defesacivil.am.gov.br, the civil defense agency of Amazonas state, Brazil. The leaked data reportedly contains SSNs, email addresses, and other personal information, which was accessible in plaintext via a publicly exposed endpoint. The actor claims the data was obtained opportunistically and is being distributed for free with no financial motive.
    Date: 2026-04-28T02:38:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-defesacivil-am-gov-br-database
    Screenshots:
    None
    Threat Actors: unico
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: Defesa Civil do Amazonas
    Victim Site: defesacivil.am.gov.br
  285. Alleged EBT Cashout Scheme Seeking Bulk Stolen Benefits Data
    Category: Carding
    Content: A threat actor operating under the alias tecat39051 is soliciting bulk Electronic Benefits Transfer (EBT) data for cashout purposes, directing interested parties to contact them via Telegram at @ebtpundit. This activity is indicative of government benefits fraud, where stolen EBT credentials or account data are monetized through unauthorized cash withdrawals. The post suggests coordination with spammers who likely obtain EBT account data through phishing or credential theft campaigns.
    Date: 2026-04-28T02:26:45Z
    Network: openweb
    Published URL: https://altenens.is/threads/i-need-bulk-ebt-for-cashout-any-spammer-here-reach-me-on-tele-ebtpundit.2930866/unread
    Screenshots:
    None
    Threat Actors: tecat39051
    Victim Country: United States
    Victim Industry: Government Benefits / Social Services
    Victim Organization: Unknown
    Victim Site: Unknown
  286. Alleged leak of 1.3 million URL:login:password credentials
    Category: Combo List
    Content: A threat actor known as WashingtonDC has made available a combolist containing approximately 1.3 million URL, login, and password combinations via a MediaFire download link. The post was shared on the cracking forum CrackingX on April 28th. No specific victim organization or country is identified, suggesting the credentials may be aggregated from multiple sources.
    Date: 2026-04-28T01:55:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73473/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  287. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor operating under the alias noir has made available a combolist containing 1,410 allegedly valid Hotmail credentials on a cracking forum. The post claims the credentials are UHQ (ultra high quality) and valid, with references to private cloud storage. The actor is promoting their Telegram handle (@noiraccesss) alongside the free download.
    Date: 2026-04-28T01:54:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73474/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  288. Alleged leak of German shopping-targeted credential combolist
    Category: Combo List
    Content: A threat actor operating under the alias HQcomboSpace has made available a combolist of approximately 916,737 lines on a cracking forum, targeting German shopping platforms. The credential list is described as high-quality (HQ) and is being distributed for free via a Mega.nz link. No specific victim organization or domain has been identified.
    Date: 2026-04-28T01:54:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73475/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  289. Alleged sale of stolen payment cards, dumps, EBT cards, checks, and carding methods
    Category: Carding
    Content: A threat actor operating under the alias iumyk5 is advertising stolen credit cards with high balances, magnetic stripe dumps (Track 1/Track 2, with and without PINs), EBT card dumps, clone cards, checks, and bank logs across multiple contact channels including Telegram, Signal, WhatsApp, and Gmail. The actor claims to offer both 101 (non-EMV) and 201 (EMV) dump types suitable for online shopping, payment fraud, and cashout operations. Contact details provided include a Telegram handle (@kaiotp
    Date: 2026-04-28T01:53:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-BEST-CC-DUMPS-EBT-CHECKS-METHOD–202007
    Screenshots:
    None
    Threat Actors: iumyk5
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  290. Alleged Leak of Hotmail Credential Combolist
    Category: Combo List
    Content: A threat actor known as snowstormxd has made available a combolist containing 146 alleged Hotmail credentials described as Ultra High Quality (UHQ). The post includes a free download link and claims the accounts have been pre-verified via a built-in inboxer tool. The actor also advertises a paid private cloud service offering additional credential drops.
    Date: 2026-04-28T01:16:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/73472/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  291. Alleged leak of approximately 4,000 compromised camera feeds
    Category: Data Leak
    Content: A threat actor on Breached forums claims to have hacked approximately 4,000 cameras and made access details freely available via an external file-sharing link. The actor acknowledges that not all camera feeds may still be active. No specific organizations, regions, or industries have been identified as victims.
    Date: 2026-04-28T01:04:19Z
    Network: openweb
    Published URL: https://breached.st/threads/camera-acces.86393/unread
    Screenshots:
    None
    Threat Actors: nearlevrai
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  292. Alleged sale of secret documents collection by threat actor klodi666
    Category: Data Breach
    Content: A threat actor operating under the alias klodi666 is selling a self-described complete collection of secret documents on the AE – Leaked Databases forum for a fixed price of $1,000 USD. The seller accepts PayPal and Bitcoin as payment methods and can be contacted via WhatsApp (+355 699 149 691) or email ([email protected]). No details regarding the origin, volume, or specific nature of the documents have been disclosed, making victim attribution and data classification unclear.
    Date: 2026-04-28T00:29:45Z
    Network: openweb
    Published URL: https://altenens.is/threads/document-collection-for-sale.2930843/unread
    Screenshots:
    None
    Threat Actors: klodi666
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  293. Website Redefacement of DC Motor India by Threat Actor YIIX103
    Category: Defacement
    Content: Threat actor YIIX103, operating independently without a team affiliation, carried out a redefacement of the Indian motor manufacturing website dcmotorindia.com, targeting a specific PHP file (yo.php). This marks at least a second defacement of the same target, indicating persistent interest or opportunistic exploitation of an unpatched vulnerability. No specific motive or proof-of-concept details were disclosed for this incident.
    Date: 2026-04-28T00:18:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915324
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: India
    Victim Industry: Manufacturing / Automotive Parts
    Victim Organization: DC Motor India
    Victim Site: www.dcmotorindia.com
  294. Alleged doxxing bot service offering personal data extraction
    Category: Malware
    Content: Threat actor advertising an automated doxxing bot that claims to extract personal information including full names, phone numbers, addresses, and locations using only a national ID number (cédula). The service is marketed as anonymous, available 24/7, and operating on a constantly updated database. Contact information provided via Telegram handle @la_kabra_666.
    Date: 2026-04-28T00:17:45Z
    Network: telegram
    Published URL: https://t.me/c/3518294966/132
    Screenshots:
    None
    Threat Actors: la_kabra_666
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  295. Website Redefacement of Ashwamegh Industries by YIIX103
    Category: Defacement
    Content: The threat actor YIIX103, operating independently without a known team affiliation, conducted a redefacement of the Ashwamegh Industries website on April 28, 2026. This incident marks a repeated compromise of the target, indicating persistent or recurring access to the web infrastructure. The defacement was not classified as a mass or homepage defacement, suggesting a targeted sub-page was altered.
    Date: 2026-04-28T00:16:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915331
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: India
    Victim Industry: Manufacturing / Industrial
    Victim Organization: Ashwamegh Industries
    Victim Site: www.ashwameghindustries.com
  296. Website Redefacement of Kuldevi Engineers by Threat Actor YIIX103
    Category: Defacement
    Content: Threat actor YIIX103, operating without a team affiliation, conducted a redefacement of the Kuldevi Engineers website on April 28, 2026. This incident marks at least a second compromise of the target domain, indicating persistent targeting or inadequate remediation following a prior defacement. The attack was not classified as a mass or homepage defacement, suggesting a targeted intrusion of a specific web path.
    Date: 2026-04-28T00:15:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915317
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: India
    Victim Industry: Engineering / Manufacturing
    Victim Organization: Kuldevi Engineers
    Victim Site: www.kuldeviengineers.com
  297. Mass Defacement of SK Weighbridge by Threat Actor YIIX103
    Category: Defacement
    Content: Threat actor YIIX103 conducted a mass defacement campaign targeting www.skweighbridge.in, compromising a specific page (yo.php) on the Indian weighbridge companys website. The incident, recorded on April 28, 2026, is classified as a mass defacement, suggesting multiple sites were targeted simultaneously. No specific motivation or proof of concept was disclosed by the attacker.
    Date: 2026-04-28T00:14:16Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248706
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: India
    Victim Industry: Manufacturing / Industrial Equipment
    Victim Organization: SK Weighbridge
    Victim Site: www.skweighbridge.in
  298. Website Redefacement of Advance Bird Net Services by YIIX103
    Category: Defacement
    Content: The website of Advance Bird Net Services was defaced by threat actor YIIX103 operating independently without a team affiliation. This incident is classified as a redefacement, indicating the site had been previously compromised and defaced before. No specific motive, proof of concept, or server details were disclosed in connection with this attack.
    Date: 2026-04-28T00:13:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915333
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: Unknown
    Victim Industry: Agriculture / Wildlife Services
    Victim Organization: Advance Bird Net Services
    Victim Site: www.advancebirdnetservices.com
  299. Website Defacement of Nutrack Modular System by YIIX103
    Category: Defacement
    Content: On April 28, 2026, a threat actor identified as YIIX103 defaced the website of Nutrack Modular System, an Indian modular systems company, targeting the file yo.php. The incident was a single-target, non-mass defacement with no stated motivation recorded. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-04-28T00:07:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915308
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: India
    Victim Industry: Manufacturing / Modular Systems
    Victim Organization: Nutrack Modular System
    Victim Site: nutrackmodularsystem.in
  300. Website Defacement of Royal Air Component by YIIX103
    Category: Defacement
    Content: On April 28, 2026, threat actor YIIX103 defaced the website royalaircomponent.com by compromising the file yo.php. The attack was a targeted, non-mass defacement conducted by an individual acting without an affiliated team. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-04-28T00:04:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/915306
    Screenshots:
    None
    Threat Actors: YIIX103
    Victim Country: Unknown
    Victim Industry: Aviation / Aerospace
    Victim Organization: Royal Air Component
    Victim Site: royalaircomponent.com
  301. Alleged sale of Hotmail and multi-platform credential combolists across multiple countries
    Category: Combo List
    Content: Seller offering private cloud Hotmail UHQ (ultra high quality) combolists and credentials for multiple countries (DE, FR, IT, BR, UK, US, JP, PL, RU, ES, NL, MX, CA, SG). Also advertising access to credentials for kleinanzeigen, eBay, Reddit, Poshmark, Depop, Walmart, and Amazon. Seller claims ability to verify credentials against buyer keywords. Targeting serious buyers only.
    Date: 2026-04-28T00:01:07Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/71066
    Screenshots:
    None
    Threat Actors: Wěilóng
    Victim Country: Unknown
    Victim Industry: Technology/E-commerce/Email Services
    Victim Organization: Unknown
    Victim Site: Unknown