[April-3-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides an exhaustive analysis of a series of cybersecurity incidents documented on April 3 and April 4, 2026. The threat landscape detailed in these events is characterized by highly active and organized threat actors, widespread data breaches, mass website defacements, the sale of initial access to critical infrastructure, and the distribution of massive credential combo lists. Major threat groups such as ShinyHunters have resumed operations with devastating effect, targeting global enterprise networks, while initial access brokers like ‘miyako’ are actively selling root access to government and corporate firewalls worldwide. Hacktivist activity remains high, with politically motivated defacements and SCADA system attacks affecting nations like Israel, Turkey, and South Korea. This report categorizes these incidents by threat actor, attack vector, and affected industries to provide a comprehensive overview of the current cyber threat environment.

2. Apex Threat Actors: The Return of ShinyHunters

The threat group ShinyHunters represents one of the most critical threats in this reporting period, demonstrating a resurgence in activity with new infrastructure and devastating breaches. They have deprecated previous PGP keys, issued a new public key for future communications, and established new contact channels via Telegram and Session, alongside an onion-based Data Leak Site (DLS). This operational security reset has been accompanied by a series of high-profile attacks.

2.1 Corporate and Enterprise Breaches

  • Cisco and Salesforce: ShinyHunters claims to have breached Cisco through a Trivy supply chain compromise. As a result, they allegedly obtained over 3 million Salesforce records containing personally identifiable information (PII), GitHub repositories, AWS storage, and internal corporate data. Furthermore, the group claims possession of source code for multiple Cisco AI products, including AI Assistants, AI Defense, AI Canvas, and AI Cisco Cloud Control. The threat group teased this release by publishing a GitHub Personal Access Token alongside an internal Cisco IT Splunk query targeting a ds-github index, demonstrating their internal access. The data was offered for sale on BreachForums for $2 million USD. The group also issued an extortion-style ultimatum to Cisco, threatening their partner relationships if demands were not met.
  • Santander Bank: The group claimed a massive data breach affecting Santander Bank customers in Spain, Chile, and Uruguay. The stolen data allegedly includes 30 million customer records, 6 million account numbers with balances, HR employee lists, and 28 million full credit card numbers including CVVs and expiration dates. The data was offered for $25,000, with an invitation for Santander to purchase it directly.
  • InterSystems TrakCare: A ShinyHunters affiliate named “extasehunters” claimed unauthorized access to TrakCare, a unified Electronic Health Record (EHR) system managing over 400 million patient records across 500+ hospitals globally.
  • IN Groupe (Imprimerie Nationale): ShinyHunters claimed a breach of IN Groupe, a 100% French government-owned entity responsible for manufacturing secure identity documents like biometric passports and national ID cards. This breach poses significant national security risks for France.
  • Mercer Advisors: An actor associated with ShinyHunters claimed to have exfiltrated over 5 million Salesforce records from Mercer Advisors, including over 1.3 million records containing PII.

2.2 Extortion and Taunting Tactics

ShinyHunters has employed aggressive extortion tactics, issuing “Pay or Leak” ultimatums against undisclosed victims. In a highly personalized attack, the group publicly taunted an executive named Jason Lish, claiming he is part of a private Signal group of approximately 300 Chief Information Security Officers (CISOs). ShinyHunters accused Lish of lying to the CISO community regarding a recent breach, using this as an intimidation tactic.

3. The Initial Access Broker Ecosystem

Initial Access Brokers (IABs) play a crucial role in the cybercrime supply chain. The actor known as “miyako” has been exceptionally prolific, selling root-level remote code execution (RCE) and shell access to Linux-based firewalls globally.

3.1 Global Firewall Compromises by “miyako”

  • United States Targets: Miyako offered access to a US manufacturing company with $5 billion in revenue for $400 ; a US brokerage and wealth management firm with $600 million in revenue for $400 ; a US government contractor working with the DoD, DoT, DoC, and DHS for $400 ; and a US-based Managed Services Provider offering private cloud hosting for $400.
  • Government Targets: Access was sold for the Palestine Government Foreign Aid Portal for $300; Thailand’s government visa program infrastructure for $300 ; an African government transaction engine for $300 ; the Iraq Higher Education Platform for $200 ; and two Saudi Government Ministry entities for $300.
  • Asian and European Corporate Targets: Miyako sold access to a leading UK marketing agency for $200 ; an Asian energy and power distribution company for $200; Chinese firewall infrastructure for $400 ; a Chinese jewelry company with $1 billion in revenue for $200 ; and an Asian point-of-sale systems provider for $300.

3.2 Other Initial Access Activity

  • An actor named “AckLine” shared admin panel credentials for easyshul.com and advertised RDWEB access to a Netherlands-based software solutions company.
  • The group “Islamic Hacker Army” offered admin login credentials for 5 million IP cameras globally.
  • The group “BABAYO EROR SYSTEM” advertised shell access to a subdomain featuring high Domain Authority and Google Search Console access.

4. Widespread Data Leaks and Brokers

A multitude of independent threat actors and data brokers successfully exfiltrated and leaked massive datasets spanning multiple industries.

4.1 Education Sector Leaks by “MagoSpeak”

The threat actor “MagoSpeak” systematically leaked highly sensitive student and applicant data from numerous Mexican educational institutions. The leaked datasets consistently included full names, landline and mobile phone numbers, dates of birth, Gmail addresses, CURP (Mexican national ID) numbers, school IDs, SIGED school keys, indigenous language status, disability status, and financial aid information.

  • Victim Institutions: Centenaria y Benemérita Escuela Normal para Profesores , Centenaria y Benemérita Escuela Normal del Estado de Querétaro Andrés , Centenaria Escuela Normal del Estado Ignacio Manuel Altamirano , Benemérita y Centenaria Escuela Normal Oficial de Guanajuato , Benemérito Instituto Normal del Estado General Juan Crisóstomo Bonilla , Benemérita y Centenaria Escuela Normal del Estado de San Luis Potosí , Benemérita y Centenaria Escuela Normal del Estado de Durango , Benemérita y Centenaria Escuela Normal de Jalisco , and Benemérita Universidad Autónoma de Puebla (BUAP).

4.2 Corporate and Tech Breaches by “xorcat”

The actor “xorcat” specialized in leaking data from technology platforms, AI services, and government databases:

  • Government: Vietnam Government Police Warnings System (21,018 records including police admin accounts); US Government Publishing Office (1,500 records including internal government emails).
  • AI and Tech Platforms: HumanizerPro.AI (65,000 records including API keys); Pares.AI (96,000 records); Remote3.co (46,000 crypto freelancer profiles); Cuties.AI (153,000 NSFW AI platform records).
  • Media and E-commerce: Success.com (207,000 records); TLDR.Tech newsletter (1.2 million LinkedIn-enriched subscriber records); 8tracks (18.6 million records with SHA-1 hashes); Powerlab.fr (15,000 gaming PC customer records); SongTrivia2.io (291,000 user records); Traedex.com (66,000 crypto traders’ data) ; and Calai.app (3 million users’ dietary and health data).

4.3 Data Sales by “undertaker” and “Grubder”

  • undertaker: Sold 53+ million professional leads from Mawsool.tech; 546,519 customer records from Australian scuba retailer Adreno; 4.7 million order records from Thailand’s Central.co.th; 1.6 million records from Vietnam’s CareerViet ; and 24.5 million records from Argentina’s national social security administration (ANSES).
  • Grubder: Targeted business directories and e-commerce, selling 527,000 records from Páginas Amarillas Venezuela; 423,000 records from the Venezuelan Ministry of Culture; 485,000 records from Replica Guns & Swords; 563,000 records from EcommerceTemplates.com; 312,000 records from Páginas Amarillas Uruguay ; and 537,000 records from the DealerTrack automotive platform.

4.4 Other Notable Data Breaches

  • Financial and Corporate: Kotowka sold 105,000 Ledger customer records breached via the Global-e gateway and 50,000 Coinbase customer records. Moneyistime sold a 10GB database dump from Vitag Retail Technologies and 160GB of infrastructure data from China’s Xiamen Tungsten Co., Ltd.. A database of 1.9 million Hong Leong Bank clients was sold by DDying.
  • Government and Law Enforcement: Actor “iym” offered an 8.3 million record database from USA/Canada police tiplines (P3Global/CrimeStoppers), including anonymous tips and SSNs. A leak of 17 million vehicle registration records from Ecuador’s National Traffic Agency was offered by GordonFreeman. A 10 million record database from Chile’s Civil Registry was also leaked. Hacktivists “Sadboy Cyber Team” breached Vietnamese telecommunications, obtaining 80 million phone records. The European Commission’s cloud infrastructure was breached by TeamPCP using a stolen API key, with data subsequently leaked by ShinyHunters.

5. Hacktivism, SCADA Attacks, and Political Cyber Warfare

A significant portion of the recorded events were driven by geopolitical motivations, targeting critical infrastructure and government entities.

5.1 Critical Infrastructure and SCADA Systems

  • South Korea Manufacturing: The “Z-Pentest Alliance” gained full HMI/PLC control over a South Korean automated manufacturing facility’s industrial control system under #OpSouthKorea. The actors obtained real-time access to conveyor controls, elevators, ventilation, and active sensors.
  • Turkish Water SCADA: The “Armenian code” group claimed to have disrupted the SCADA control system of a Turkish industrial pumping station. This was framed as retaliation against Turkey for its partnership with Azerbaijan.

5.2 Nation-State and Politically Motivated Actors

  • IRGC Navy Cyber Attack: The Islamic Revolutionary Guard Corps (IRGC) Navy Command claimed a cyber attack against an Oracle datacenter in Dubai and an Amazon datacenter in Bahrain. This was framed as retaliation for the killing of Iranians.
  • Hanzaleh (Hanthalah): This Iranian group claimed to have hacked the personal account of the FBI Director and leaked his information. The group also doxxed 20 staff members of the independent Persian-language news outlet IranWire, publishing their photos and personal details.
  • Anti-Israel Campaigns: The “Cyber Islamic Resistance” defaced Israeli educational site nativhaor.co.il and business site bniyat-atarim.co.il as part of their “Holy Response” operations regarding the Al-Aqsa Mosque. The group “#OpsShadowStrike” defaced royalinstitute.co.in collaborating with Malaysian and Indonesian hacktivists under pro-Palestine banners. “BD Anonymous” declared #OpProsecuteZionist, threatening Israeli government ministry servers.
  • Other Hacktivist Operations: “Morningstar” announced #OpFrance, targeting France due to political grievances against President Macron. The group “THE GARUDA EYE” issued ongoing threats against the Indonesian government. “Threat Market”, an Iranian actor, claimed to deploy a “Dead Mans Switch” against the FBI following intrusion attempts against their Onion domain.

6. Mass Defacement Campaigns

Website defacement remained a highly popular tactic, with specific threat actors and teams executing mass campaigns across thousands of global domains.

6.1 The “DimasHxR” Defacement Campaign

The threat actor “DimasHxR” executed an extraordinarily prolific, largely indiscriminate defacement campaign. They frequently targeted specific subdirectories, media folders, or customer address pages rather than root homepages. Their targets spanned across Europe, Australia, and Asia:

  • Germany & Netherlands: Eckwerk Shop , Kerashop , Kleintierladen , Cavallaro.
  • Scandinavia & UK: batlivetsdag.pgm.nu (Sweden) , kolborstar-gomes.se (Sweden) , damphuen.dk (Denmark) , UK Flooring Sale , bossu.co.uk.
  • Eastern Europe: Spawarki Magnum (Poland) , azan.com.pl (Poland) , karmybrit.pl (Poland) , infshop.hu (Hungary) , olvass.ro (Romania) , Leaderfins (Russia).
  • Asia & Middle East: VietAsia Foods (Vietnam) , shondo.vn (Vietnam) , thegioinano.com (Vietnam) , Apni Sabji Mandi (India) , The Lounge Kuwait.
  • Global/Unspecified: Security Warehouse , Casa Cuesta , David Hampton , KM Coating , TroutMagnet , TAG Motorsports , Product Components , ml.rocks , livephthings.com , FlashDrive Australia , FlexDev , Elms Marketing , Cavallaro Napoli , Gomes Carbon Brushes , British Live Steam , himla.com , lagarza.eu , Measurement Solutions Inc , meushot.com.br , pessere.com , brander.technology , Stack Systems , xero.online , elektropepi.eu , DVS Wines , rebelleftc.com.

6.2 The “Alpha wolf” (XYZ) Campaign

The “Alpha wolf” team, primarily operating under the alias “XYZ”, focused heavily on mass defacement campaigns, with a particular emphasis on Australian service businesses and Ukrainian platforms. Many of their attacks were classified as “redefacements,” indicating persistent access or poor victim remediation.

  • Australian Targets: 7 Days Garden Services , ASAP Landscape Concrete , E-Loyalty , Fix My Oven , Lockyer Valley Colonics , Mactek Telecom , MCSS , Mobile Repair Central , Multi Community Support Solutions , Pest Control First , Property Shine Cleaning , Top End Chill , Trinity Point Wellbeing Clinic , Triple S Cleaning Services.
  • Ukrainian Targets: bunchuk.com.ua , Regio Dialogue.
  • Global Targets: DP International Moving , EDI Digital (Colombia) , EDI Editing , Jyotshna Enterprises (India) , Bolivian Government Portal (Quipus) , [suspicious link removed] intranet , adulteducation.voloka.org , destin-project.info , tvoryty.com.

6.3 Other Defacement Groups

  • CYKOMNEPAL: Successfully targeted VN Storage (Vietnam) , Shuoletex (Bangladesh) , TrendyToys (Vietnam) , SD Fashions , Lucky Meow Home Pet , Nexa Logistics (Vietnam) , ZonaTech RD (Dominican Republic) , Vinh Barber Shop (Vietnam) , Vinal NK , and Extintores Campo Largo (Brazil).
  • Aptisme / Leviathan Perfect Hunter: Defaced gambling site 7789bet.io , avenbd.com (Bangladesh) , Luxtone Global , and Minh Khang Interior Design (Vietnam).
  • maw3six: Conducted mass defacements targeting Latvian sites including meraka.lv , strelnieku42.com , premier.estate , and estater.lv.
  • Babayo Eror System Affiliates: “Mr.XycanKing” defaced the Indonesian government open data portal opendata.kedirikab.go.id. “Mr.PIMZZZXploit” defaced misso.vn and trinityconstructionsolutions.com.

7. Combo Lists and Credential Harvesting

The distribution of “combo lists” (combinations of stolen email addresses/usernames and passwords) was rampant, facilitated through cybercrime forums and Telegram channels. These lists fuel credential stuffing attacks.

7.1 Massive Volume Distributors

  • CODER: This threat actor distributed an unparalleled volume of credentials for free via Telegram channels. Their releases included: a 12 million record IMAP/SMTP/Office list ; a 16 million record digital marketing list ; a 14 million record corporate credential list ; a 12 million mixed list ; a 14 million record social media/streaming list ; a 16 million business credential list ; an 11 million gaming platform list (Steam, PSN, Xbox, Epic Games) ; a crypto platform list ; banking/wallet combos ; a 9 million payment service list (PayPal, Stripe) ; a 7.8 million multi-provider list ; a 7.4 million email list ; and a 9.3 million mixed sector list.
  • HQcomboSpace: Specialized in geographic and domain-specific lists, including over 1 million German credential pairs; 404,722 Yahoo credentials; 735,987 German domain pairs; 1.88 million Yahoo crypto-user credentials; 187,175 educational credentials; 894,358 German credentials; 1.1 million Hotmail credentials; 591,792 German credentials ; and 617,266 German shopping credentials.
  • Leak Realm: Claimed massive but unverified leaks, including 8 million records , 175 million records , 33 million records , 22 million records , and an 8GB combolist.
  • BestCombo: Distributed millions of records, including 7,177 mixed credentials , 1.4 million mixed country credentials , 140,742 mail access credentials , 12,808 Outlook.com credentials , 14,151 SBCGlobal credentials , 6,536 Hotmail credentials , 5.375 million mixed domain credentials , 4.8 million gaming credentials , and 38,479 T-Online credentials.

7.2 The Focus on Microsoft Hotmail

Hotmail accounts were heavily targeted by multiple actors, indicating high demand for Microsoft ecosystem access.

  • UniqueCombo repeatedly posted lists of 11,000 Hotmail credentials.
  • ValidMail posted lists of 42,000 Hotmail credentials multiple times.
  • Jelooos leaked lists of 2,300 , 1,500 , 3,500 , and 2,200 Hotmail credentials.
  • alphaxdd shared lists of 2,938 , 1,227 , and 2,364 Hotmail credentials.
  • Other actors leaking Hotmail data included Akari21 (1,276 records) , MailAccesss (1,300 records) , WINGO (3,000 and 2,000 records) , MrCOMBOROBOA (290,000 records) , KiwiShio (625 records) , NotSellerxd (10,675 records) , HollowKnight07 (735 and 1,055 records) , Cl0ud0wner (1,300 and 1,900 records) , D4rkNetHub (959 records) , klyne05 , redcloud (2,500 records) , and erwinn91 (2,087 records).

7.3 Specific Targeting and Log Sales

  • Dataxlogs: This actor consistently advertised mail access, config files, and combolists specifically targeting users in France, Belgium, Australia, Canada, the UK, the US, Netherlands, Poland, Germany, and Japan.
  • Douglas: An actor identified as “Douglas” actively solicited the bulk purchase of credential combolists targeting Japan, Taiwan, Singapore, South Korea, the US, and the UK, with a daily budget of 5,000-10,000 USDT.
  • Stealer Logs: Actors like UP_DAISYCLOUD distributed 5,775 and 5,610 fresh stealer logs via cloud storage. “uhqboyz” leaked “cloud T6” stealer logs , and Matthiasxd17 distributed 140,000 U.L.P stealer logs. KazeFreak distributed 2,500 Vidar Stealer logs.

8. Malware, Phishing, and Infrastructure Abuse

Threat actors actively developed and traded tools to bypass security and conduct fraud.

  • Malware & Toolkits: The group Nullsec Philippines distributed a new bypass webshell (leisec-webshell). Actor “jinkusu” advertised the “NFC RIPPER” toolkit for conducting NFC relay attacks on ATMs and the “STARKILLER” Phishing-as-a-Service platform featuring 2FA bypass and session hijacking. “Starip” advertised automation suites and an “Insta User Checker”. ShinyHunters advertised tools named TIAMAT/GIR2. The “Incogniton” anti-detect browser was promoted for multi-account fraud.
  • Fake Claude Code Campaign: A sophisticated malware campaign was detected abusing the “Claude Code” brand. Actors created fake GitHub repositories that, when executed, installed the Vidar information-stealing malware.
  • Phishing & Smishing: Actor “Alice_sms6” advertised a bulk SMS smishing service specifically targeting Portugal and 200+ countries, offering spoofing routes for financial institutions like CGD, Santander, Binance, Netflix, and Microsoft.
  • DDoS & Carding: “XEON_x64” advertised a DDoS-for-hire service claiming to bypass Cloudflare and vShield. South African government portals experienced outages due to coordinated DDoS attacks. Carding forums were highly active, with actors like “CocoCheck” advertising bulk card validation , and users like “Coleman” and “vcxdcvx” spamming stolen high-balance credit card storefronts.

9. Conclusion

The cyber incidents documented in April 2026 illustrate a highly fragmented yet exceptionally dangerous threat landscape. The resurgence of ShinyHunters represents a severe threat to global enterprise, particularly given their successful supply-chain compromises (Trivy) and aggressive extortion tactics targeting CISOs directly. Simultaneously, the proliferation of Initial Access Brokers like “miyako” lowers the barrier to entry for ransomware gangs, effectively turning root-level access to government and corporate firewalls into a commoditized good.

The sheer volume of credential combo lists distributed freely by actors like “CODER” and “HQcomboSpace” ensures that credential stuffing attacks will remain a persistent threat against major platforms, particularly Microsoft’s Hotmail ecosystem. Furthermore, the activity of hacktivists gaining control over physical SCADA systems in South Korea and Turkey demonstrates that kinetic impact via cyber means is an active reality. Organizations must prioritize robust identity management, supply chain auditing, and stringent firewall access controls to defend against this multi-faceted barrage of attacks.

Detected Incidents Draft Data

  1. Alleged Dead Mans Switch Deployment and Warning to FBI by Iranian Threat Market Group
    Category: Cyber Attack
    Content: An Iranian threat actor operating under Threat Market has announced the implementation of a Dead Mans Switch that will automatically activate if the FBI attempts to seize or disrupt their domain again. The group claims to have repelled multiple intrusion attempts over the past week, including 0day exploitation attempts and DDoS attacks against their Onion domain. They issued a final warning to US law enforcement, drawing comparisons to the LockBit takedown and asserting their infrastructure cannot be identified or seized.
    Date: 2026-04-03T23:53:04Z
    Network: telegram
    Published URL: https://t.me/c/3575098403/86
    Screenshots:
    None
    Threat Actors: Threat Market
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: FBI / US Law Enforcement
    Victim Site: Unknown
  2. Alleged initial access or data sale offer by ShinyHunters via Session messenger
    Category: Initial Access
    Content: ShinyHunters threat actor is soliciting contact via the Session encrypted messaging app, sharing their Session ID (05108377c665c8b923d81fb3413658ea9fa893fa57ad185da91a0ceb5e4f5eeb58). This is consistent with threat actors advertising access, data, or services through encrypted channels to avoid detection.
    Date: 2026-04-03T23:44:06Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/735
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged sale of mail access, combolists, and hacking tools via Dataxlogs
    Category: Logs
    Content: A threat actor operating as @Dataxlogs is advertising mail access and related cybercrime tools including configs, scripts, tools, hits, and combolists targeting users across France, Belgium, Australia, Canada, UK, USA, Netherlands, Poland, Germany, and Japan. Custom requests are accepted.
    Date: 2026-04-03T23:42:32Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59108
    Screenshots:
    None
    Threat Actors: Dataxlogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,276 fresh Hotmail credentials via a file sharing service.
    Date: 2026-04-03T23:32:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-1276X-FRESH-HOTMAIL-Vyrixcl-txt
    Screenshots:
    None
    Threat Actors: Akari21
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  5. Alleged data leak or dump shared via perfexsaasmodule.com
    Category: Data Leak
    Content: A threat actor operating under the handle BABAYO EROR SYSTEM shared a link to a text file hosted on perfexsaasmodule.com. The file path suggests it may contain leaked or dumped data. The nature of the content is unverified.
    Date: 2026-04-03T23:32:40Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/438
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: perfexsaasmodule.com
    Victim Site: perfexsaasmodule.com
  6. Alleged leak of mixed domain credentials
    Category: Combo List
    Content: A combolist containing 7,177 credential entries from mixed domains has been made available for free download via a file sharing service.
    Date: 2026-04-03T23:31:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70996/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged data breach of ONCF employee credentials
    Category: Data Breach
    Content: Threat actor claims to be selling personal data of ONCF railway organization employees obtained through phishing operation targeting top hierarchy employees. Data allegedly includes emails, passwords, phone numbers, and home addresses for $200.
    Date: 2026-04-03T23:31:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70997/
    Screenshots:
    None
    Threat Actors: MahaZoldik998
    Victim Country: Morocco
    Victim Industry: Transportation
    Victim Organization: ONCF
    Victim Site: Unknown
  8. Alleged extortion threat by ShinyHunters with pay-or-leak demand
    Category: Data Leak
    Content: The ShinyHunters threat actor posted an extortion message stating Pay or leaks, linking to a restricted private Telegram channel. This suggests an active extortion campaign where victims are threatened with data leaks unless payment is made. The channel appears to be invite-only for select individuals.
    Date: 2026-04-03T23:20:58Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/717
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Alleged threat activity related to unknown documents
    Category: Combo List
    Content: A forum post titled Document was made in a combolists and dumps section, but no content is available to determine the nature or scope of the alleged threat activity.
    Date: 2026-04-03T23:11:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70988/
    Screenshots:
    None
    Threat Actors: john3938
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged doxxing of Italian individual
    Category: Combo List
    Content: Forum post containing personal identifying information of an Italian individual including full name, birth date, location, tax code, and social media profiles along with defamatory statements.
    Date: 2026-04-03T23:10:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70990/
    Screenshots:
    None
    Threat Actors: john3938
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged leak of stolen credential logs via cloud storage
    Category: Logs
    Content: Threat actor UP_DAISYCLOUD made available 5,775 fresh stealer logs from April 3rd via cloud storage platform Pixeldrain. The actor operates a Telegram channel for daily log distributions.
    Date: 2026-04-03T23:10:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5775-LOGS-CLOUD-%E2%98%81-03-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged defacement of opendata.kedirikab.go.id by Mr.XycanKing
    Category: Defacement
    Content: A threat actor using the handle Mr.XycanKing, affiliated with the group Babayo Error System, claims to have defaced the Indonesian government open data portal opendata.kedirikab.go.id. A proof file is linked on the target domain. Greetings are extended to all members and alliances of Babayo Error System.
    Date: 2026-04-03T23:09:27Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/437
    Screenshots:
    None
    Threat Actors: Mr.XycanKing
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Kediri Regency Government (Kedirikab)
    Victim Site: opendata.kedirikab.go.id
  13. Alleged data breach of Imprimerie Nationale Group (France) by ShinyHunters
    Category: Data Breach
    Content: ShinyHunters has posted a link to a BreachForums thread referencing Imprimerie Nationale Group, a French state-owned company responsible for producing official documents and secure printing services. The post suggests a data breach or data leak claim has been published on BreachForums.
    Date: 2026-04-03T22:50:32Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/709
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: France
    Victim Industry: Government / Secure Printing
    Victim Organization: Imprimerie Nationale Group
    Victim Site: Unknown
  14. Alleged Data Breach of IN Groupe (Imprimerie Nationale) by ShinyHunters
    Category: Data Breach
    Content: Threat actor breach3d (alias extasehunters), operating under the ShinyHunters group, claims to have breached IN Groupe (Imprimerie Nationale), a 100% French government-owned entity specializing in high-security identity documents including biometric passports and national ID cards. The post includes proof screenshots and is dedicated to the ShinyHunters collective. The breach of such an organization poses significant national security risks given its role in producing sovereign identity documents.
    Date: 2026-04-03T22:50:18Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/708
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: France
    Victim Industry: Government / Secure Identity & Document Manufacturing
    Victim Organization: IN Groupe (Imprimerie Nationale)
    Victim Site: ingroupe.com
  15. Website defacement of vnstorage.com by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL successfully defaced a page on vnstorage.com on April 4, 2026. The attack targeted a specific page rather than the main site and was documented with a mirror URL for evidence preservation.
    Date: 2026-04-03T22:44:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828628
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Vietnam
    Victim Industry: Technology
    Victim Organization: VN Storage
    Victim Site: vnstorage.com
  16. Alleged data breach of Besox financial services database
    Category: Data Breach
    Content: Threat actor claims to be selling a database from Besox.be, a Belgian financial services company that handles finances for approximately 2,000 businesses. The database allegedly contains 250,000 records and is being offered for 5,000 USD or admin panel access for 10,000 USD.
    Date: 2026-04-03T22:42:31Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-EU-BANK-DATABASE-FRESHLY-DUMPED
    Screenshots:
    None
    Threat Actors: catboyBF
    Victim Country: Belgium
    Victim Industry: Financial Services
    Victim Organization: Besox
    Victim Site: besox.be
  17. Threat: ShinyHunters
    Category: Cyber Attack
    Content: Messages contain media only with no text content to analyze for threat intelligence value.
    Date: 2026-04-03T22:39:12Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/703
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Website defacement of shuoletexbd.com by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the news section of Shuoletexbd.com on April 4, 2026. The attack targeted a specific page rather than the homepage and appears to be an isolated incident against the Bangladesh-based textile company.
    Date: 2026-04-03T22:32:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828627
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Bangladesh
    Victim Industry: Textile/Manufacturing
    Victim Organization: Shuoletex
    Victim Site: shuoletexbd.com
  19. Alleged leak of German mixed domain credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1 million credential pairs allegedly from various German domains. The data is being distributed for free via a file sharing service.
    Date: 2026-04-03T22:29:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70984/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged leak of high value credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 140,000 URL:LOG:PASS combinations described as high value targets. The data is being distributed for free to registered forum members.
    Date: 2026-04-03T22:29:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70985/
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged distribution of IMAP/SMTP/Office credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a 12 million record combolist containing IMAP, SMTP, and Office credentials through Telegram channels. The credentials are being shared for free rather than sold.
    Date: 2026-04-03T22:28:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70986/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Alleged data leak of Venezuelan raffle platform containing 26 million records
    Category: Data Leak
    Content: Actor malconguerra2 leaked confidential data from Venezuelan raffle platforms supported by CONAL, containing personal information including names, phone numbers, email addresses, payment details, and transaction records. The data appears to be from various raffle and prize drawing platforms operating in Venezuela.
    Date: 2026-04-03T22:28:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-RAFFLES-VENEZUELA-26-MILLIONS-CONFIDENTIAL-DATA-03-04-2026
    Screenshots:
    None
    Threat Actors: malconguerra2
    Victim Country: Venezuela
    Victim Industry: Gaming and Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged leak of AOL email credentials
    Category: Combo List
    Content: A threat actor named Kinglukeman allegedly shared freshly extracted AOL email and password combinations on a cybercriminal forum. The credential list appears to be made available for free download to registered forum users.
    Date: 2026-04-03T22:16:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70983/
    Screenshots:
    None
    Threat Actors: Kinglukeman
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: AOL
    Victim Site: aol.com
  24. Alleged distribution of credential combolist targeting digital marketing sector
    Category: Combo List
    Content: Threat actor CODER distributes a 16 million record credential combolist focused on digital marketing, social media, and email marketing sectors through Telegram channels. The combolist appears to be offered for free through designated Telegram groups.
    Date: 2026-04-03T22:05:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70981/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Digital Marketing
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged leak of Yahoo credentials
    Category: Combo List
    Content: Threat actor claims to have leaked Yahoo email credentials in email:password format, allegedly suitable for SMTP, webmail, and mail access. The content appears to be shared freely on a cybercriminal forum.
    Date: 2026-04-03T22:05:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70982/
    Screenshots:
    None
    Threat Actors: Kinglukeman
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  26. Alleged leak of cloud T6 credentials
    Category: Logs
    Content: Threat actor uhqboyz shared a link to what appears to be credential data labeled cloud T6 on a stealer logs forum, making the data freely available for download.
    Date: 2026-04-03T22:04:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-cloud-T6
    Screenshots:
    None
    Threat Actors: uhqboyz
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Alleged distribution of credential combolist containing 144,000 records
    Category: Logs
    Content: Threat actor distributes a free credential combolist containing 144,000 URL:LOGIN:PASS combinations described as fresh data from Cloudberry ULP stealer logs.
    Date: 2026-04-03T22:04:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-URL-LOGIN-PASS-03-04-26-Daily-Free-Lines-144-000-Fresh-Cloudberry-ULP
    Screenshots:
    None
    Threat Actors: 6666666666666666
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged advertisement of NFC relay attack toolkit for payment fraud
    Category: Initial Access
    Content: Threat actor advertising NFC RIPPER, an Android toolkit for conducting NFC relay attacks against payment terminals and ATMs. The tool enables PIN bypass through multiple methods and allows remote card emulation for fraudulent transactions.
    Date: 2026-04-03T22:04:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-NFCRIPPER
    Screenshots:
    None
    Threat Actors: jinkusu
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged distribution of stealer logs containing 140,000 records
    Category: Logs
    Content: Threat actor Matthiasxd17 allegedly distributed stealer logs containing 140,000 records dated April 4, 2026. The logs likely contain stolen credentials and personal information harvested by information-stealing malware.
    Date: 2026-04-03T22:04:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-U-L-P-STEALER-LOGS-04-04-2026-140k
    Screenshots:
    None
    Threat Actors: Matthiasxd17
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Alleged phishing-as-a-service platform offering credential theft capabilities
    Category: Initial Access
    Content: Threat actor advertises STARKILLER phishing platform with real-time browser rendering, 2FA bypass, credential capture, and session hijacking capabilities. The service targets multiple platforms including banks, social media, and crypto wallets.
    Date: 2026-04-03T22:04:00Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-STARKILLER-GOD-MODE
    Screenshots:
    None
    Threat Actors: jinkusu
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data breach of Mawsool.tech with sale of professional leads database
    Category: Data Breach
    Content: Threat actor undertaker is selling a database containing 53+ million professional leads from Mawsool.tech for $1,500. The data includes comprehensive professional information such as names, job titles, company details, education, skills, and experience data from this year.
    Date: 2026-04-03T22:03:54Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Mawsool-tech-Leads-53M
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Mawsool.tech
    Victim Site: mawsool.tech
  32. Alleged data breach of Nakamura Co database
    Category: Data Breach
    Content: Threat actor claims to be selling a 63GB+ database from Nakamura Co containing 1.8 million user, affiliate, partnership, and employee records. Sample data includes personal information such as names, emails, addresses, phone numbers, and business details of potential franchise partners.
    Date: 2026-04-03T22:03:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SELL-63GB-DATABASE-NAKAMURA-CO-ID
    Screenshots:
    None
    Threat Actors: Kyy
    Victim Country: Indonesia
    Victim Industry: Retail
    Victim Organization: Nakamura Co
    Victim Site: nakamura.co.id
  33. Alleged data leak of TotalEnergies customer database
    Category: Data Leak
    Content: A threat actor claims to have leaked a TotalEnergies database containing French customer information including names, addresses, phone numbers, and energy service details. The data appears to include residential customer records with detailed billing and service information.
    Date: 2026-04-03T22:03:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Data-France-gas-and-electricity-in-France
    Screenshots:
    None
    Threat Actors: icikevin_officiel
    Victim Country: France
    Victim Industry: Energy
    Victim Organization: TotalEnergies
    Victim Site: totalenergies.com
  34. Alleged sale of Hong Leong Bank customer database
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 1.9 million Hong Leong Bank stock investment client records from Malaysia. The data allegedly includes names, mobile numbers, gender, dates of birth, payment methods, and email addresses.
    Date: 2026-04-03T22:02:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Hong-Leong-Bank-s-stock-investment-clients-in-Malaysia-1900000–72222
    Screenshots:
    None
    Threat Actors: DDying
    Victim Country: Malaysia
    Victim Industry: Financial Services
    Victim Organization: Hong Leong Bank
    Victim Site: Unknown
  35. Alleged data leak of University of Georgia contact database
    Category: Data Leak
    Content: Threat actor XZeeoneOfc allegedly leaked a contact database from the University of Georgias Family and Consumer Sciences department containing team names, participation years, personal names, titles, affiliations, phone numbers, and email addresses.
    Date: 2026-04-03T22:02:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Contact-Database-Database-Kontak-Internal
    Screenshots:
    None
    Threat Actors: XZeeoneOfc
    Victim Country: United States
    Victim Industry: Education
    Victim Organization: University of Georgia
    Victim Site: fcs.uga.edu
  36. Alleged sale of Malaysian Chinese personal database
    Category: Data Breach
    Content: Threat actor DDying is allegedly selling a database containing 3.5 million records of Malaysian Chinese individuals including mobile phone numbers, names, gender, city, origin, marital status, and occupation information. Contact is being solicited via Telegram for pricing details.
    Date: 2026-04-03T22:02:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Malaysian-Chinese-3500K
    Screenshots:
    None
    Threat Actors: DDying
    Victim Country: Malaysia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Alleged data breach of ECI Indonesia electronics retailer
    Category: Data Breach
    Content: Threat actor claims to have compromised an Indonesian electronics retailers backend system on March 10, 2026, obtaining a database of 618,000+ customer records including personal information, contact details, addresses, and order history. The actor has shared 54,000 records for free and is offering the full database through private contact.
    Date: 2026-04-03T22:02:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-eci-id-Indonesia-electronic-city-website-customer-breach-database
    Screenshots:
    None
    Threat Actors: alwaysdata
    Victim Country: Indonesia
    Victim Industry: Electronics Retail
    Victim Organization: ECI
    Victim Site: eci.id
  38. Alleged sale of initial access to USA manufacturing company firewall
    Category: Initial Access
    Content: Threat actor miyako is selling root-level remote code execution access to a Linux firewall belonging to a US manufacturing company with $5 billion revenue for $400.
    Date: 2026-04-03T21:55:45Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-5Billion-Revenue-Manufacturing
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: United States
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Alleged sale of initial access to USA brokerage and wealth management firm
    Category: Initial Access
    Content: Threat actor miyako is selling root-level remote code execution access to a Linux firewall system at a USA-based brokerage and wealth management company with reported revenue of 600 million for $400.
    Date: 2026-04-03T21:55:03Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-600kkk-Bokerage-Wealth-Management
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged sale of initial access to Palestine Government Foreign Aid Portal
    Category: Initial Access
    Content: Threat actor is allegedly selling root-level remote code execution access to a Palestine Government Foreign Aid Portal system running on Linux with firewall device access for $300.
    Date: 2026-04-03T21:54:22Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Palestine-Government-Foreign-Aid-Portal
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Palestine
    Victim Industry: Government
    Victim Organization: Palestine Government
    Victim Site: Unknown
  41. Alleged sale of initial access to leading UK marketing agency
    Category: Initial Access
    Content: Threat actor miyako is selling root-level remote code execution access to a Linux firewall belonging to a leading UK marketing agency for $200.
    Date: 2026-04-03T21:53:41Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Leading-UK-Marketing-Agency
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: United Kingdom
    Victim Industry: Marketing
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Website defacement of TrendyToys by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Vietnamese toy retailer TrendyToys website on April 4, 2026, targeting a specific terms of service page rather than the homepage.
    Date: 2026-04-03T21:53:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828623
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Vietnam
    Victim Industry: Retail/E-commerce
    Victim Organization: TrendyToys
    Victim Site: trendytoys.com.vn
  43. Alleged sale of initial access to Asian energy company firewall
    Category: Initial Access
    Content: Threat actor miyako is selling root-level remote code execution access to a Linux firewall belonging to an Asian energy and power distribution company for $200.
    Date: 2026-04-03T21:52:58Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Asian-Energy-Power-Distribution
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Unknown
    Victim Industry: Energy
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Alleged sale of initial access to Thailand government visa system
    Category: Initial Access
    Content: Threat actor miyako is allegedly selling root-level remote code execution access to a Linux firewall system within Thailands government visa program infrastructure for $300.
    Date: 2026-04-03T21:52:17Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Thailand-Government-Visa-Program
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Thailand
    Victim Industry: Government
    Victim Organization: Thailand Government
    Victim Site: Unknown
  45. Alleged sale of access to TrakCare InterSystems medical system
    Category: Initial Access
    Content: Threat actor ShinyHunters shared a link to a BreachForums thread titled MEDICAL TrakCare InterSystems Access, suggesting the sale or leak of access credentials or data related to InterSystems TrakCare, a widely used healthcare information system. The post includes a photo, likely as proof of access or data.
    Date: 2026-04-03T21:49:51Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/699
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: InterSystems TrakCare
    Victim Site: Unknown
  46. Alleged data leak of EditGPT application
    Category: Data Leak
    Content: A threat actor claims to have leaked personal data from the EditGPT application and is offering it for free download on an underground forum.
    Date: 2026-04-03T21:49:11Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Com-Boss-PII-Data-editgpt-app-Leak-leaked-download
    Screenshots:
    None
    Threat Actors: Splashed
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: EditGPT
    Victim Site: editgpt.app
  47. Alleged Sale of Unauthorized Access to TrakCare/InterSystems EHR System Affecting 400M+ Patient Records
    Category: Initial Access
    Content: A threat actor operating under the ShinyHunters channel alias extasehunters is claiming to have unauthorized access to TrakCare, a unified Electronic Health Record (EHR) system by InterSystems. The actor claims TrakCare manages over 400 million patient records across 500+ hospitals worldwide and states they can retrieve medical records from virtually any country. The actor is soliciting private offers and offering technical proof of access via an image link. This represents a critical threat to global healthcare data privacy.
    Date: 2026-04-03T21:48:58Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/698
    Screenshots:
    None
    Threat Actors: extasehunters
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: InterSystems TrakCare
    Victim Site: Unknown
  48. Alleged sale of initial access to Chinese firewall infrastructure
    Category: Initial Access
    Content: Threat actor offering root-level remote code execution access to Chinese firewall infrastructure for $400, providing shell access to Linux-based firewall devices.
    Date: 2026-04-03T21:35:57Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Chinese-Agentic-AI-Communications-B2B
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged sale of initial access to Chinese jewelry company
    Category: Initial Access
    Content: Threat actor offering root-level remote code execution access to a Chinese jewelry companys Linux firewall system for $200. The victim organization reportedly has $1 billion in revenue.
    Date: 2026-04-03T21:35:17Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-200-Chinese-1Billion-Revenue-Jeweler
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: China
    Victim Industry: Jewelry/Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged sale of initial access to African government transaction engine
    Category: Initial Access
    Content: Threat actor miyako is selling root access to a Linux firewall system described as an African government transaction engine for $300. The access includes root remote code execution, shell access, and network admin panel privileges.
    Date: 2026-04-03T21:34:36Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-African-Government-Transaction-Engine
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Alleged sale of initial access to Iraq Higher Education Platform
    Category: Initial Access
    Content: Threat actor miyako is allegedly selling root-level remote code execution access to an Iraq government education platform firewall system for $200. The access reportedly includes shell capabilities on a Linux-based firewall device.
    Date: 2026-04-03T21:33:55Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-200-Iraq-Higher-Education-Platform-gov-iq
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Iraq
    Victim Industry: Education
    Victim Organization: Iraq Higher Education Platform
    Victim Site: *.gov.iq
  52. Alleged sale of initial access to Asian point-of-sale systems provider
    Category: Initial Access
    Content: Threat actor offering root-level remote code execution access to a Linux firewall system belonging to an Asian point-of-sale systems provider for $300. The access includes shell capabilities on the compromised firewall device.
    Date: 2026-04-03T21:33:09Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Asia-Leading-Point-of-Sale-Systems-Provider
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Unknown
    Victim Industry: Payment Processing
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Alleged sale of initial access to Saudi Government Ministry
    Category: Initial Access
    Content: Threat actor miyako is allegedly selling root-level remote code execution access to firewall infrastructure belonging to two Saudi Government Ministry entities for $300. The access includes shell capabilities on Linux-based firewall devices.
    Date: 2026-04-03T21:32:26Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Saudi-Government-Ministry-x2
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Saudi Arabia
    Victim Industry: Government
    Victim Organization: Saudi Government Ministry
    Victim Site: Unknown
  54. Alleged sale of passport images and contact information from multiple countries
    Category: Data Breach
    Content: A threat actor is selling passport images with associated contact information including phone numbers and emails from multiple countries including China, Japan, USA, UK, Canada, Russia, Italy, France, Australia, Spain, Mexico, Kuwait, and Qatar. The actor claims the data is fresh and not previously sold or made public.
    Date: 2026-04-03T21:30:51Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Passports-Pics-Contact-Info-Asian-Europ-UK-US
    Screenshots:
    None
    Threat Actors: sexybroker
    Victim Country: Multiple
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged distribution of business corporate credential combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a 14 million record combolist containing business corporate email and password combinations through Telegram channels. The credentials are being shared for free through designated Telegram groups.
    Date: 2026-04-03T21:28:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70975/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged leak of mixed email-password credential list
    Category: Combo List
    Content: A threat actor shared a combolist containing 190,000 email and password combinations described as fresh high quality credentials. The data is being made available for free download to registered forum users.
    Date: 2026-04-03T21:28:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70976/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,300 valid Hotmail email credentials on an underground forum. The credentials are described as full valid hits suggesting they are tested and functional.
    Date: 2026-04-03T21:27:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70977/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  58. Alleged sale of initial access to US government contractor firewall
    Category: Initial Access
    Content: Threat actor is selling root-level remote code execution access to a Linux firewall belonging to a US government contractor working with DoD, DoT, DoC, and DHS for $400.
    Date: 2026-04-03T21:20:31Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-DoD-DoT-DoC-DHS-Contractor-in-Industrial-Manufacturing
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: United States
    Victim Industry: Industrial Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged sale of initial access to USA Managed Services Provider
    Category: Initial Access
    Content: Threat actor miyako is selling root-level remote code execution access to a USA-based managed services providers firewall system for $400. The compromised organization provides private cloud hosting and network engineering services.
    Date: 2026-04-03T21:19:49Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-Managed-Services-Provider-Private-Cloud-Hosting-Network-Engineering
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged data breach of Ledger via Global-e payment gateway
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 105,000+ Ledger customer records allegedly obtained through a breach of the Global-e payment gateway on January 5, 2026. The data includes customer names, addresses, phone numbers, email addresses, and order information from late 2025 to early 2026.
    Date: 2026-04-03T21:18:07Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-EXCLUSIVE-Ledger-Global-e-CRM-Order-Database
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Unknown
    Victim Industry: Cryptocurrency/Hardware Wallets
    Victim Organization: Ledger
    Victim Site: Unknown
  61. Alleged sale of Coinbase customer data
    Category: Data Breach
    Content: Threat actor Kotowka is allegedly selling a dataset containing 50,000 Coinbase customer records including names, email addresses, phone numbers, account balances, banking information, and birth dates for $8,000. The data appears to include sensitive financial and personal information of cryptocurrency exchange users.
    Date: 2026-04-03T21:17:25Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Coinbase-inside-50k-data
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  62. Alleged sale of Coinbase customer database
    Category: Data Breach
    Content: Threat actor claims to be selling a Coinbase customer database containing 50,000 records with personal information, account balances, cryptocurrency holdings, and other sensitive financial data for $600.
    Date: 2026-04-03T21:16:42Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Coinbase-data-50k-rows
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  63. Alleged sale of Hotmail credential lists
    Category: Data Breach
    Content: Threat actor Kotowka is allegedly selling Hotmail email and password credential lists containing 1 million records for $300. The actor provides contact via Telegram and offers samples through a Telegram channel.
    Date: 2026-04-03T21:16:00Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-%E2%AD%90%EF%B8%8FSelling-hotmail-Mail-Pass-bases-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Kotowka
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  64. Alleged leak of multi-platform credential combolist targeting streaming and gaming services
    Category: Combo List
    Content: Threat actor Ra-Zi shared a combolist containing 190,000 email:password combinations allegedly targeting Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify accounts. The actor also advertises selling additional credential lists through Telegram contact.
    Date: 2026-04-03T21:13:58Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-190k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–199159
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Alleged bot traffic discussion
    Category: Initial Access
    Content: Forum thread discussing traffic to a bot with no additional content available for analysis.
    Date: 2026-04-03T21:12:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-traffic-to-the-bot
    Screenshots:
    None
    Threat Actors: Ayron
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Website defacement of SD Fashions by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL successfully defaced the homepage of SD Fashions website on April 4, 2026. This was a targeted single-site attack rather than part of a mass defacement campaign.
    Date: 2026-04-03T21:02:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828621
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Fashion/Retail
    Victim Organization: SD Fashions
    Victim Site: www.sd-fashions.com
  67. Alleged data leak of 8 million records
    Category: Combo List
    Content: A threat actor claiming to have leaked 8 million records, though specific details about the data type and victim organization are not visible due to access restrictions.
    Date: 2026-04-03T21:01:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70972/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged leak of USA credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 20,000 USA-based credentials on a cybercrime forum. The data appears to be made available for free download to registered forum users.
    Date: 2026-04-03T21:01:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70974/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Alleged data breach of Chiles Civil Registry and Identification Service
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 10 million records from Chiles Civil Registry and Identification Service. The data allegedly includes full names, dates of birth, RUT numbers, and ID card numbers, with records current as of 2026.
    Date: 2026-04-03T21:00:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-10M-Records-Leaked-From-Chile-s-Civil-Registry-and-Identification-Service-2026
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Chile
    Victim Industry: Government
    Victim Organization: Civil Registry and Identification Service of Chile
    Victim Site: Unknown
  70. Alleged Return of ShinyHunters Threat Actor with New PGP Key and Infrastructure
    Category: Cyber Attack
    Content: The threat actor known as ShinyHunters has announced their return to active operations. They have deprecated previous PGP keys and issued a new public key for future communications. The post includes new contact channels (Telegram, Session), references to associated groups (LAPSUS$), and an onion-based Data Leak Site (DLS). This appears to be an operational security reset and rebranding announcement.
    Date: 2026-04-03T20:45:14Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/693
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 25,000 allegedly valid German email and password combinations through a free download link on a cybercrime forum.
    Date: 2026-04-03T20:41:06Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-25K-GERMANY-VALID
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Website defacement of Lucky Meow Home Pet by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL conducted a website defacement attack against Lucky Meow Home Pets website on April 4, 2026. The attack targeted a specific page on the pet services website rather than the homepage.
    Date: 2026-04-03T20:39:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828620
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: Pet Services
    Victim Organization: Lucky Meow Home Pet
    Victim Site: luckymeowhomepet.com
  73. Website defacement of Nexa Logistics by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the Vietnamese logistics company Nexa Logistics website on April 4, 2026. The attack targeted a specific page on the nexalogistics.vn domain rather than the homepage.
    Date: 2026-04-03T20:33:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828619
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Vietnam
    Victim Industry: Logistics
    Victim Organization: Nexa Logistics
    Victim Site: nexalogistics.vn
  74. Alleged leak of credential combolist containing 5 million entries
    Category: Combo List
    Content: A threat actor shared a combolist containing 5 million URL:LOG:PASS credential combinations on a cybercriminal forum. The post requires registration to view the full content.
    Date: 2026-04-03T20:28:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70969/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Alleged data leak of Success.Events database
    Category: Data Leak
    Content: Threat actor claims to have leaked a Success.Events database containing over 53,000 user records including email addresses, IP addresses, user agents, and email campaign metadata. The actor states this is a sister website of Success.com which they have previously breached twice.
    Date: 2026-04-03T20:19:35Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-Success-Events-Database-Leaked-Download
    Screenshots:
    None
    Threat Actors: [Manager]punk
    Victim Country: Unknown
    Victim Industry: Personal Development
    Victim Organization: Success.Events
    Victim Site: success.events
  76. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,000 Hotmail email and password combinations through a free download link on a cybercriminal forum.
    Date: 2026-04-03T20:18:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3K-HQ-HOTMAIL–199154
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  77. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 404,722 Yahoo email and password combinations from mixed countries via a file sharing service.
    Date: 2026-04-03T20:16:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70968/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  78. Alleged sale of Ecuador National Traffic Agency vehicle registration database
    Category: Data Breach
    Content: A threat actor is allegedly selling a complete database dump from Ecuadors National Traffic Agency containing 17 million vehicle and motorcycle registration records. The database includes license plates, owner information, vehicle details, addresses, phone numbers, and email addresses spanning 2018-2026.
    Date: 2026-04-03T20:15:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-ANT-2026-National-Traffic-Agency-Ecuador-17M-Vehicle-and-Motorcycle-Registration
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Ecuador
    Victim Industry: Government
    Victim Organization: Agencia Nacional de Tránsito (ANT)
    Victim Site: Unknown
  79. Alleged sale of USA mixed credentials combolist
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling a combolist containing 339,000 USA mixed email:password credentials. The actor offers various pricing tiers including access to private combo groups and bulk credential purchases ranging from 100k to 10 million records.
    Date: 2026-04-03T20:06:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-339K-USA-MIX-VALID-COMBOLIST
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  80. Alleged sale of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor MrCOMBOROBOA is selling a combolist containing 290,000 unique Hotmail email and password combinations. The actor offers various pricing tiers for access to credential lists and operates through Telegram channels for distribution.
    Date: 2026-04-03T20:05:30Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-290K-HOTMAIL-MIX-UNIQUE-COMBOLIST
    Screenshots:
    None
    Threat Actors: MrCOMBOROBOA
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  81. Alleged leak of mixed email and password credentials
    Category: Combo List
    Content: Threat actor CODER is distributing a collection of 12 million mixed email and password credentials through Telegram channels. The actor provides free access to combolists and related programs through dedicated Telegram groups.
    Date: 2026-04-03T20:02:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70965/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged leak of credential combolist containing 8GB of data
    Category: Combo List
    Content: An 8GB credential combolist in URL:LOGIN:PASS format was allegedly shared on a cracking forum. The specific source and number of credentials is not specified in the available content.
    Date: 2026-04-03T20:02:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70966/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. Website defacement of Vinh Barber Shop by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced the introduction page of Vinh Barber Shops website on April 4, 2026. This was an isolated defacement incident targeting a Vietnamese barbershop business website.
    Date: 2026-04-03T19:48:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828617
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Vietnam
    Victim Industry: Personal Services
    Victim Organization: Vinh Barber Shop
    Victim Site: vinhbarbershop.com
  84. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: Actor NUllSHop0X shared a free download containing 5,000 high-quality mixed access credentials described as fresh and valid. The post provides a direct download link for the credential list on a cracking forum.
    Date: 2026-04-03T19:32:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70958/
    Screenshots:
    None
    Threat Actors: NUllSHop0X
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: A threat actor shared a combolist containing 42,000 Hotmail credentials on the CrackingX cybercrime forum. The post indicates these are valid credentials specifically for forum accounts.
    Date: 2026-04-03T19:32:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70959/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  86. Alleged leak of mixed country credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing over 1.4 million email and password combinations from mixed countries via a file sharing platform.
    Date: 2026-04-03T19:32:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70960/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Website defacement of Vinal NK laptop sales page by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL defaced a laptop sales page on the Vinal NK e-commerce website on April 4, 2026. The attack targeted a specific product page rather than the main website homepage.
    Date: 2026-04-03T19:30:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828616
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Unknown
    Victim Industry: E-commerce/Retail
    Victim Organization: Vinal NK
    Victim Site: vinalnk.com
  88. Alleged leak of credential combolist containing 175 million records
    Category: Combo List
    Content: A threat actor posted a credential combolist containing 175 million URL:LOGIN:PASS combinations on a cybercriminal forum. The post content is restricted to registered users only.
    Date: 2026-04-03T19:08:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70954/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 1,200 allegedly valid email credentials from mixed sources. The credentials are being distributed as a combolist for registered forum users.
    Date: 2026-04-03T19:08:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70955/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged Credit Card Checker Service Advertisement for CocoCheck
    Category: Malware
    Content: CocoCheck (cococheck.co) is advertised as a credit card validity checking service, offering bulk card checking at $0.01 per check, bulk card acquisition, and free daily key benefits. The platform claims over three years of operation and targets carders looking to validate stolen payment card data before uploading to carding stores.
    Date: 2026-04-03T19:08:14Z
    Network: telegram
    Published URL: https://t.me/COCOTransit/3
    Screenshots:
    None
    Threat Actors: CocoCheck
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: cococheck.co
  91. Alleged sale of mail access hits and combo lists across multiple countries
    Category: Logs
    Content: A threat actor operating as @Dataxlogs is advertising mail access hits, configs, scripts, tools, and combo lists targeting users in France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. Custom requests are also available.
    Date: 2026-04-03T19:07:26Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59081
    Screenshots:
    None
    Threat Actors: Dataxlogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Alleged leak of Hotmail credentials on underground forum
    Category: Combo List
    Content: Threat actor claims to have leaked 2,300 Hotmail email credentials from all countries, describing them as private access and high quality.
    Date: 2026-04-03T18:58:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70949/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  93. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to offer 1,500 valid Hotmail credentials. The actual content requires forum registration to view, making verification of the claims impossible.
    Date: 2026-04-03T18:57:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70950/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  94. Alleged leak of Spotify credentials
    Category: Combo List
    Content: Threat actor CODER claims to be distributing a 10 million Spotify credential combolist for free through Telegram channels. The actor is offering the credentials to users who contact them directly or join their Telegram groups.
    Date: 2026-04-03T18:57:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70951/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Spotify
    Victim Site: spotify.com
  95. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to offer 3,500 Hotmail email credentials described as Mail Access Full Private & Fresh. The actual content requires forum registration to view.
    Date: 2026-04-03T18:57:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70953/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  96. Website defacement of ZonaTech RD by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL successfully defaced the about page of ZonaTech RD, a Dominican Republic-based technology company, on April 4, 2026. The attack targeted a specific subpage rather than the main homepage.
    Date: 2026-04-03T18:50:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828614
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Dominican Republic
    Victim Industry: Technology
    Victim Organization: ZonaTech RD
    Victim Site: zonatechrd.com
  97. Alleged promotional content for HackForums registration
    Category: Alert
    Content: Forum post appears to be promotional content encouraging user registration on HackForums rather than actual threat activity or cybercriminal offering.
    Date: 2026-04-03T18:50:09Z
    Network: openweb
    Published URL: https://hackforums.net/showthread.php?tid=6323270
    Screenshots:
    None
    Threat Actors: mayaaaaaaaaaaaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  98. Alleged Cyber Operation #OpProsecuteZionist Declared by BD Anonymous Against Israeli Government Infrastructure
    Category: Cyber Attack
    Content: Hacktivist group BD Anonymous has issued an official statement declaring the activation of cyber operation #OpProsecuteZionist. The group explicitly threatens to target databases, ministry servers, and propaganda outlets associated with the Israeli government and its collaborators. The statement references attacks on digital infrastructure framed as retaliation for Israeli policies against Palestinians.
    Date: 2026-04-03T18:50:05Z
    Network: telegram
    Published URL: https://t.me/c/3728511806/290
    Screenshots:
    None
    Threat Actors: BD Anonymous
    Victim Country: Israel
    Victim Industry: Government
    Victim Organization: Israeli Government / Ministry Servers
    Victim Site: Unknown
  99. Alleged leak of credential combolist containing 33 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 33 million URL:LOGIN:PASS combinations on a cybercriminal forum. The post appears to offer free access to registered forum members.
    Date: 2026-04-03T18:45:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70946/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor allegedly shared a fresh combolist containing 2,200 Hotmail email credentials on a cybercrime forum.
    Date: 2026-04-03T18:44:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70947/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  101. Alleged leak of credential combolist containing 22 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 22 million URL:LOGIN:PASS combinations on a cybercriminal forum. The post appears to offer free access to the credential data after registration.
    Date: 2026-04-03T18:35:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70945/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Alleged distribution of automation tools and bots
    Category: Initial Access
    Content: Forum post advertising an automation suite containing bots, traffic generation tools, and data collection tools. No specific content details are available for analysis.
    Date: 2026-04-03T18:13:02Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Automation-Suite-Vol-1-%E2%80%93-Bots-Traffic-Data-Tools
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Alleged Cyber Attack Disrupting Multiple South African Government Services
    Category: Cyber Attack
    Content: Multiple South African government platforms are reportedly experiencing outages, including the Official Government Portal, Parliament of South Africa, Home Affairs (ID & Passport Services), and eHomeAffairs online services. The disruptions were reported via Dark Web Intelligence channels, suggesting a coordinated cyber attack or DDoS campaign targeting South African government infrastructure.
    Date: 2026-04-03T18:11:07Z
    Network: telegram
    Published URL: https://t.me/dailydarkweb/8841
    Screenshots:
    None
    Threat Actors: Dark Web Intelligence
    Victim Country: South Africa
    Victim Industry: Government
    Victim Organization: South African Government
    Victim Site: Unknown
  104. Alleged leak of German domain credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 735,987 credential pairs specifically targeting German (.de) domains through a file sharing service.
    Date: 2026-04-03T18:10:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70943/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged sale of insurance customer personal data
    Category: Data Breach
    Content: Threat actor sexybroker is selling insurance leads containing full names, addresses, emails, phone numbers, birthdates, SSNs, and marital status for $3 each. The actor claims the data is fresh and sourced from a law firm, targeting older married individuals.
    Date: 2026-04-03T18:02:44Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Insurance-Leads-Contact-Info-SSN-Gender-Relationship
    Screenshots:
    None
    Threat Actors: sexybroker
    Victim Country: United States
    Victim Industry: Legal Services
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 58,000 valid email credentials from mixed sources. The data is being distributed through a private Telegram channel.
    Date: 2026-04-03T18:00:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70942/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  107. Alleged sale of live high-balance credit cards via Telegram
    Category: Logs
    Content: A user named Coleman is repeatedly advertising credit cards (CC) described as 100% alive with high balances, directing buyers to a Telegram channel (t.me/fsdf12452). This is consistent with carding marketplace activity involving stolen financial credentials.
    Date: 2026-04-03T17:55:08Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59044
    Screenshots:
    None
    Threat Actors: Coleman
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Alleged sale of stolen credit cards via Telegram carding store
    Category: Cyber Attack
    Content: Multiple users in a marketplace channel are repeatedly advertising a Telegram-based carding store (@vcxdcvx) claiming to sell stolen credit cards. The store is promoted as the best CC store with repeated spam across the channel.
    Date: 2026-04-03T17:52:37Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59043
    Screenshots:
    None
    Threat Actors: vcxdcvx
    Victim Country: Unknown
    Victim Industry: Financial
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 2,938 allegedly valid Hotmail email credentials described as premium mix mail hits. The credentials are being distributed for free download via Telegram contact.
    Date: 2026-04-03T17:49:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70940/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  110. Alleged sale of mail access logs, configs, and combolists via Telegram
    Category: Logs
    Content: A threat actor operating via @Dataxlogs is advertising mail access for sale across multiple countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs, scripts, tools, hits, and combo lists, with custom requests available.
    Date: 2026-04-03T17:45:38Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59049
    Screenshots:
    None
    Threat Actors: .py
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  111. Alleged data breach of flight booking system exposing passport data
    Category: Data Breach
    Content: Threat actor claims to have breached a flight booking system and is selling passport images with contact information including phone numbers and emails from multiple countries. The actor provides sample images as proof and claims the data is fresh and not previously public.
    Date: 2026-04-03T17:37:30Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Passports-Pics-Contact-Info-Fresh-100-From-Flight-Booking-System
    Screenshots:
    None
    Threat Actors: sexybroker
    Victim Country: Unknown
    Victim Industry: Aviation
    Victim Organization: Unknown
    Victim Site: Unknown
  112. Alleged distribution of Instagram username checking tool
    Category: Initial Access
    Content: A threat actor shared a console-based tool called Insta User Checker designed to process username datasets against Instagram accounts with fast checking capabilities. The tool is distributed as a lightweight console application that can handle large username lists for account validation purposes.
    Date: 2026-04-03T17:35:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Insta-User-Checker
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Instagram
    Victim Site: instagram.com
  113. Alleged data breach of ClickIT Solutions Italy
    Category: Data Breach
    Content: Threat actor gtaviispeak is selling a database containing 243k records from Italian IT company ClickIT Solutions, including customer contacts, support tickets, and sales orders with personal and business information. The data is being offered through encrypted messaging channels with escrow services.
    Date: 2026-04-03T17:33:08Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-243k-Italy-https-www-clickitsolutions-it-User-contact-and-business-lead-record
    Screenshots:
    None
    Threat Actors: gtaviispeak
    Victim Country: Italy
    Victim Industry: Information Technology
    Victim Organization: ClickIT Solutions
    Victim Site: clickitsolutions.it
  114. Alleged leak of Gmail credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 4,987 lines targeting Gmail accounts via a file hosting service. The data appears to be made available as a free download rather than being sold.
    Date: 2026-04-03T17:23:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70937/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  115. Alleged leak of 14 million credentials from multiple social media and streaming platforms
    Category: Combo List
    Content: Threat actor CODER is distributing a combolist containing 14 million credentials allegedly from various social networks, messaging apps, video streaming, and content platforms through Telegram channels.
    Date: 2026-04-03T17:23:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70938/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged Data Breach of Santander Bank Affecting Spain, Chile, and Uruguay
    Category: Data Breach
    Content: Threat actor ShinyHunters is claiming to sell a large dataset allegedly stolen from Santander Bank. The data purportedly includes 30 million customer records, 6 million account numbers with balances, HR employee lists, consumer citizenship information, and 28 million full credit card numbers including CVV, AVS verification details, and expiration dates. The affected countries are Spain, Chile, and Uruguay. The actor is offering the data for $25,000 and has also invited Santander to purchase the data directly.
    Date: 2026-04-03T17:19:46Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/683
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Spain
    Victim Industry: Banking & Financial Services
    Victim Organization: Santander Bank
    Victim Site: Unknown
  117. C2K: School IT system targeted in a cyber attack ahead of exam season
    Category: Cyber Attack
    Content: Un système informatique utilisé par les écoles dIrlande du Nord a été ciblé par une cyberattaque, obligeant lAutorité de lÉducation (EA) à effectuer une réinitialisation des mots de passe pour tous les utilisateurs. Cette mesure de sécurité a entraîné la déconnexion de tous les établissements et élèves, privant ainsi les étudiants daccès aux ressources pédagogiques essentielles en pleine période de révision avant les examens. Bien que lEA ait engagé une enquête et présenté ses excuses, elle na pas encore confirmé si des données personnelles ont été compromises.
    Date: 2026-04-03T17:16:34Z
    Network: openweb
    Published URL: https://www.bbc.com/news/articles/cnv8mn91drlo
    Screenshots:
    None
    Threat Actors:
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Education Authority
    Victim Site: eani.org.uk
  118. Website defacement of asocialmediaagency.in by ALP/Alperen_216
    Category: Defacement
    Content: ALP threat actor operating under team Alperen_216 successfully defaced the homepage of A Social Media Agencys website on April 4, 2026. This appears to be a targeted single-site attack rather than part of a mass defacement campaign.
    Date: 2026-04-03T17:14:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828612
    Screenshots:
    None
    Threat Actors: ALP, Alperen_216
    Victim Country: India
    Victim Industry: Digital Marketing
    Victim Organization: A Social Media Agency
    Victim Site: asocialmediaagency.in
  119. Alleged Cyber Attack Campaign Against France by Morningstar (#OpFrance)
    Category: Cyber Attack
    Content: Threat actor group Morningstar announced a cyber attack campaign targeting France (#OpFrance), motivated by political grievances against French President Macrons formation of a coalition opposing the US and China. The post uses highly offensive language and implies attacks across multiple French targets, indicated by bomb/explosion emojis and the phrase decided to mess around a bit across their shitty country.
    Date: 2026-04-03T17:14:28Z
    Network: telegram
    Published URL: https://t.me/c/3584758467/662
    Screenshots:
    None
    Threat Actors: Morningstar
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  120. Alleged Sale of SalesForce and Cisco Source Code by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters is advertising the sale of source code allegedly belonging to SalesForce and Cisco on BreachForums. The post claims 3 million lines/records of source code are available for purchase.
    Date: 2026-04-03T17:07:43Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/682
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Salesforce, Cisco
    Victim Site: salesforce.com, cisco.com
  121. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 625 Hotmail email and password combinations on a cybercriminal forum. The credentials are described as fresh and high quality.
    Date: 2026-04-03T17:01:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70936/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  122. Alleged distribution of business credentials combolist
    Category: Combo List
    Content: Threat actor CODER distributes a 16 million record business credentials combolist through Telegram channels, offering free access to credential combinations targeting corporate entities.
    Date: 2026-04-03T16:50:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70934/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  123. Alleged leak of credential combolist containing 1 million login credentials
    Category: Combo List
    Content: A threat actor shared a link to download a combolist containing 1 million URL:login:password credentials via a file sharing service. The credentials appear to be distributed for free without any payment required.
    Date: 2026-04-03T16:50:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70935/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Website defacement of Extintores Campo Largo by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL threat actor conducted a website defacement attack against Extintores Campo Largo, a Brazilian fire extinguisher company, on April 3, 2026. The attack targeted the companys primary website and was mirrored on zone-xsec.com.
    Date: 2026-04-03T16:45:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828611
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Brazil
    Victim Industry: Fire Safety Equipment
    Victim Organization: Extintores Campo Largo
    Victim Site: www.extintorescampolargo.com.br
  125. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 1,227 allegedly valid Hotmail email credentials on a cybercrime forum. The credentials are described as premium hits with an expiration date of April 3, 2026.
    Date: 2026-04-03T16:39:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70933/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  126. Alleged defacement of misso.vn by Mr.PIMZZZXploit
    Category: Defacement
    Content: A threat actor identified as Mr.PIMZZZXploit, affiliated with the group Babayo Eror System, claims to have defaced the Vietnamese website misso.vn. A defacement page was uploaded to the sites WordPress uploads directory at the specified URL.
    Date: 2026-04-03T16:37:09Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/433
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Misso
    Victim Site: misso.vn
  127. Alleged defacement of Trinity Construction Solutions website
    Category: Defacement
    Content: A threat actor using the handle Mr.PIMZZZXploit claims to have defaced the website trinityconstructionsolutions.com, posting a photo as proof. The defacement message is associated with the Babayo Eror System group.
    Date: 2026-04-03T16:32:24Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/432
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Construction
    Victim Organization: Trinity Construction Solutions
    Victim Site: trinityconstructionsolutions.com
  128. Alleged sale of Hotmail email database access across multiple countries
    Category: Initial Access
    Content: A threat actor is selling access to Hotmail email databases spanning multiple countries (UK, DE, JP, NL, BR, PL, ES, US, IT) with inbox searching capabilities. The seller claims to own a private cloud and offers keyword-based filtering for major platforms including eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Also advertises valid ntlworld webmails. Contact via DM for custom requests.
    Date: 2026-04-03T16:23:01Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59054
    Screenshots:
    None
    Threat Actors: Admu
    Victim Country: Unknown
    Victim Industry: Technology / Email Services
    Victim Organization: Hotmail/Microsoft
    Victim Site: hotmail.com
  129. Alleged sale of multi-service credential combolist
    Category: Combo List
    Content: Threat actor Ra-Zi is allegedly selling a 119,000 record combolist containing email:password and username:password combinations targeting multiple email providers including AOL, Yahoo, Hotmail, and Outlook across various countries. The actor claims the credentials are live and high quality with guarantee.
    Date: 2026-04-03T16:17:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-119K-LIVE-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged DDoS-for-hire service advertisement with protection bypass capabilities
    Category: DDoS
    Content: Threat actor XEON_x64 advertises DDoS-for-hire services claiming to bypass multiple protection systems including Cloudflare, vShield, and others. The service offers Layer 7 attacks and explicitly mentions ability to disable competitors websites.
    Date: 2026-04-03T16:16:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70929/
    Screenshots:
    None
    Threat Actors: XEON_x64
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Alleged leak of Hotmail credentials on cybercrime forum
    Category: Combo List
    Content: A threat actor posted on a cybercrime forum offering fresh Hotmail credentials through a Telegram channel. The exact number of credentials and method of acquisition are not specified in the post.
    Date: 2026-04-03T16:06:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70927/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  132. Alleged distribution of gaming platform credential combolist
    Category: Combo List
    Content: Threat actor distributes an 11 million record credential combolist targeting gaming platforms including Steam, PlayStation Network, Xbox Live, Epic Games Store, Nintendo eShop, Battle.net, and other gaming services through Telegram channels.
    Date: 2026-04-03T16:05:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70928/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: Multiple gaming platforms
    Victim Site: Unknown
  133. Website defacement of eckwerk-shop by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Eckwerk Shop e-commerce website on April 3, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-03T15:55:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828499
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: E-commerce
    Victim Organization: Eckwerk Shop
    Victim Site: eckwerk-shop.ngd.de
  134. Alleged distribution of credential combolist targeting USA and Europe
    Category: Combo List
    Content: Threat actor gsmfix distributed an exclusive credential combolist containing email and password combinations targeting users from the United States and Europe on a cybercriminal forum.
    Date: 2026-04-03T15:54:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70923/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Website defacement of batlivetsdag.pgm.nu by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Swedish website batlivetsdag.pgm.nu on April 3, 2026. This was a single-site defacement with no apparent redefacement or mass campaign involvement.
    Date: 2026-04-03T15:54:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828507
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: batlivetsdag.pgm.nu
  136. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Forum user klyne05 distributed a mixed email credentials combolist described as private, fresh, and verified. The post offers the credential list as a free download without specifying the number of records or source organizations.
    Date: 2026-04-03T15:54:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70925/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  137. Website defacement of damphuen.dk by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a redefacement attack against the Danish website damphuen.dk on April 3, 2026. This appears to be a targeted defacement rather than part of a mass campaign.
    Date: 2026-04-03T15:54:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828515
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Denmark
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: damphuen.dk
  138. Alleged leak of Yahoo credential combolist targeting cryptocurrency users
    Category: Combo List
    Content: A threat actor shared a combolist containing 1.88 million Yahoo credentials allegedly targeting cryptocurrency users through a file sharing platform.
    Date: 2026-04-03T15:53:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70926/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  139. Website defacement of security-warehouse.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the security-warehouse.com website on April 3, 2026. The incident targeted a cybersecurity companys website, representing a single-site defacement attack.
    Date: 2026-04-03T15:53:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828599
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Cybersecurity
    Victim Organization: Security Warehouse
    Victim Site: security-warehouse.com
  140. Website defacement of VietAsia Foods by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a redefacement attack against VietAsia Foods company website on April 3, 2026. This represents a second defacement of the same target by the attacker.
    Date: 2026-04-03T15:52:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828600
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Vietnam
    Victim Industry: Food and Beverage
    Victim Organization: VietAsia Foods
    Victim Site: www.vietasiafoods.com
  141. Website defacement of Casa Cuesta by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a redefacement attack against casacuesta.com on April 3, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-03T15:52:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828609
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Casa Cuesta
    Victim Site: casacuesta.com
  142. Alleged Luxembourg B2B data incident
    Category: Data Breach
    Content: Thread referencing Luxembourg B2B data with no additional content available for analysis.
    Date: 2026-04-03T15:46:17Z
    Network: openweb
    Published URL: https://xforums.st/threads/0k_luxembour_b2b.604808/
    Screenshots:
    None
    Threat Actors: ziousss
    Victim Country: Luxembourg
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Website defacement of davidhampton.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR conducted a redefacement attack against davidhampton.com on April 3, 2026. This represents a repeat compromise of the same target website.
    Date: 2026-04-03T15:46:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828132
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: David Hampton
    Victim Site: davidhampton.com
  144. Alleged threat activity related to equipmentsellercanada.com
    Category: Alert
    Content: Forum thread referencing equipmentsellercanada.com domain with no available content details.
    Date: 2026-04-03T15:44:50Z
    Network: openweb
    Published URL: https://xforums.st/threads/equipmentsellercanada-com.604809/
    Screenshots:
    None
    Threat Actors: ziousss
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: equipmentsellercanada.com
  145. Alleged threat activity related to Teespring Canada
    Category: Alert
    Content: Forum thread titled teespring_CANADA posted by user ziousss with no visible content available for analysis.
    Date: 2026-04-03T15:43:23Z
    Network: openweb
    Published URL: https://xforums.st/threads/teespring_canada.604810/
    Screenshots:
    None
    Threat Actors: ziousss
    Victim Country: Canada
    Victim Industry: E-commerce
    Victim Organization: Teespring
    Victim Site: teespring.com
  146. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 2,059 allegedly valid high-quality mixed email and password combinations on a cybercriminal forum.
    Date: 2026-04-03T15:40:10Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X2059-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  147. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 10,675 Hotmail email credentials for free download on a cybercrime forum.
    Date: 2026-04-03T15:27:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70921/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  148. Alleged leak of fresh credential combolist
    Category: Combo List
    Content: A threat actor leaked a fresh mixed combolist containing 62,750 credential lines and promoted their Telegram channel for additional content.
    Date: 2026-04-03T15:27:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70922/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  149. Alleged bulk purchase solicitation for credential combolists targeting Asia-Pacific and Western countries
    Category: Combo List
    Content: A threat actor identified as Douglas is actively seeking to purchase credential combolists in email:password or phone:password format. Target countries include Japan, Taiwan, Singapore, South Korea, United States, and United Kingdom. The actor requests 10,000–50,000 test records and claims a daily purchase budget of 5,000–10,000 USDT, indicating a high-volume, financially motivated operation. Contact provided via Telegram @DouglasBrian.
    Date: 2026-04-03T15:21:39Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59051
    Screenshots:
    None
    Threat Actors: DouglasBrian
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Alleged distribution of cryptocurrency platform credential lists
    Category: Combo List
    Content: Threat actor distributing credential lists (combos) targeting cryptocurrency platforms including Bitcoin, Ethereum, Binance Smart Chain, and various DeFi platforms through Telegram channels. The actor offers free access to credential lists and programs through dedicated Telegram groups.
    Date: 2026-04-03T15:18:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70919/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Cryptocurrency
    Victim Organization: Unknown
    Victim Site: Unknown
  151. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample of 735 Hotmail credentials on a cybercrime forum as a free download. This appears to be a credential list or combolist containing email and password combinations.
    Date: 2026-04-03T15:18:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70920/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  152. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor distributed a combolist containing 30,000 valid email credentials on a cybercriminal forum. The credentials are being made available for free to registered users with additional private cloud access offered via Telegram.
    Date: 2026-04-03T15:07:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70918/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Website defacement of spotseedev.wpengine.com by Zod
    Category: Defacement
    Content: The threat actor known as Zod successfully defaced the development website of Spotsee hosted on WPEngine on April 3, 2026. The attack targeted a Linux-based server and resulted in the creation of a defacement page at the /zod.html endpoint.
    Date: 2026-04-03T15:00:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248237
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Spotsee
    Victim Site: spotseedev.wpengine.com
  154. Alleged Hack of FBI Directors Personal Account by Hanzala Group
    Category: Cyber Attack
    Content: Iranian cybersecurity news outlet Cyberban reports that the Hanzala (Hanthalah) group allegedly hacked the personal account of the FBI Director and leaked his information. The post, written by Mohammad Amin Aghamiri (head of Irans National Cyberspace Center), references the incident while addressing the US Secretary of Defense, suggesting awareness of the operation at an official Iranian government level.
    Date: 2026-04-03T14:58:41Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20942
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Federal Bureau of Investigation (FBI)
    Victim Site: Unknown
  155. Alleged leak of email credential combolist targeting mail access
    Category: Combo List
    Content: A threat actor shared a combolist containing 140,742 email credentials specifically targeting mail access. The data is being distributed for free via a file sharing platform.
    Date: 2026-04-03T14:57:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70917/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Alleged data leak of Vietnam Government Police Database
    Category: Data Leak
    Content: A threat actor leaked a database containing 21,018 records from the Vietnam Government Police Warnings System, including police admin accounts, government usernames, and role assignments. The breach allegedly occurred in January 2026 and contains sensitive government personnel data including contact information and system access details.
    Date: 2026-04-03T14:48:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Vietnam-Gov-Police-Database-21K-Government-Warnings-System-Jan-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Vietnam
    Victim Industry: Government
    Victim Organization: Vietnam Government Police
    Victim Site: Unknown
  157. Alleged data breach of Lit.it crypto video platform
    Category: Data Leak
    Content: User claims to have leaked a database from Lit.it crypto video platform containing over 300,000 user records with email addresses, usernames, and full names, allegedly breached in February 2026. The data is being distributed for free via Telegram channels.
    Date: 2026-04-03T14:47:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Lit-it-300K-Records-Crypto-Video-Platform-Full-Names-Emails-Feb-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Lit.it
    Victim Site: lit.it
  158. Alleged data breach of Saudi Chamber of Commerce
    Category: Data Breach
    Content: Alleged breach affecting the Saudi Chamber of Commerce website, involving approximately 478,000 active business contacts described as verified.
    Date: 2026-04-03T14:47:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-478k-Saudi-Arabia-https-www-chamber-sa-Active-business-contacts-with-verified
    Screenshots:
    None
    Threat Actors: gtaviispeak
    Victim Country: Saudi Arabia
    Victim Industry: Business Services
    Victim Organization: Saudi Chamber of Commerce
    Victim Site: chamber.sa
  159. Alleged cyber attack or defacement of gbrionline.org by Pharaohs Team
    Category: Defacement
    Content: Pharaohs Team has posted what appears to be a defacement or attack claim against https://www.gbrionline.org, sharing domain metrics (DA 64, PA 47). The post includes a photo likely showing proof of defacement or compromise.
    Date: 2026-04-03T14:47:16Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/452
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: GBR Online
    Victim Site: gbrionline.org
  160. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: Forum user shared a credential combolist titled X1522 HQ Mix containing mixed email and password combinations. The content is hidden behind registration requirements on the forum.
    Date: 2026-04-03T14:39:07Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1522-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,565 mixed email credentials for free download on an underground forum.
    Date: 2026-04-03T14:36:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70915/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged distribution of mixed credential combolist
    Category: Combo List
    Content: A threat actor distributed a combolist containing 29,840 mixed credentials on a cybercrime forum. The data is hosted on a cloud platform and appears to be offered as a free download to forum members.
    Date: 2026-04-03T14:36:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70916/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Alleged data breach of HumanizerPro.AI – 65K user records leaked
    Category: Data Leak
    Content: A threat actor leaked a database dump containing over 65,000 user records from HumanizerPro.AI, an AI text humanization platform. The leaked data includes user accounts, API keys, subscription information, and billing details from a breach allegedly occurring in March 2026.
    Date: 2026-04-03T14:35:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-HumanizerPro-AI-65K-Records-AI-Text-Humanization-Platform-API-Keys-Mar-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: HumanizerPro.AI
    Victim Site: HumanizerPro.AI
  164. Alleged data breach of Pares.AI real estate platform
    Category: Data Leak
    Content: Threat actor xorcat leaked a database containing 96,000+ records from Pares.AI, an AI-powered real estate platform. The compromised data includes contact information, company details, phone numbers, addresses, and email data allegedly breached in February 2026.
    Date: 2026-04-03T14:35:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Pares-AI-96K-Records-AI-Real-Estate-Platform-Company-Contacts-Addres-Feb-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Pares.AI
    Victim Site: pares.ai
  165. Alleged data breach of Remote3.co crypto freelancer platform
    Category: Data Breach
    Content: Threat actor xorcat claims to have leaked a database from Remote3.co containing over 46,000 user records including developer profiles, emails, social links, and work information from March 2026. The data includes usernames, contact details, skills, and professional information of crypto and Web3 freelancers.
    Date: 2026-04-03T14:35:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Remote3-co-46K-Records-Crypto-Web3-Freelancer-Platform-Dev-Emails-March-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Remote3
    Victim Site: remote3.co
  166. Alleged sale of mail access and credential tools across multiple countries
    Category: Initial Access
    Content: A threat actor operating as @Dataxlogs is advertising mail access for sale across multiple countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs, scripts, tools, hits, combos, and custom requests.
    Date: 2026-04-03T14:35:11Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59027
    Screenshots:
    None
    Threat Actors: Dataxlogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Website defacement of KM Coating by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a redefacement attack against KM Coatings website on April 3, 2026. The attack targeted a media subdirectory of the coating companys website.
    Date: 2026-04-03T14:32:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828028
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: KM Coating
    Victim Site: kmcoating.com
  168. Alleged data breach of Cuties.AI platform
    Category: Data Breach
    Content: Threat actor claims to have obtained 153K records from Cuties.AI, an NSFW AI generation platform, allegedly containing subscription data from March 2026.
    Date: 2026-04-03T14:23:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Cuties-AI-153K-Records-NSFW-AI-Generation-Platform-Subscription-Data-Mar-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Cuties.AI
    Victim Site: Unknown
  169. Alleged data breach of US Government Publishing Office
    Category: Data Breach
    Content: A threat actor claims to have compromised the US Government Publishing Office database containing over 1,500 records including 518 government email addresses and internal email communications. The alleged breach occurred in February 2026 and includes sensitive government data such as email logs, message content, and communication metadata.
    Date: 2026-04-03T14:22:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-GPO-Gov-1-5K-Records-US-Government-Publishing-Office-518-Gov-Emails-Feb-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: US Government Publishing Office
    Victim Site: gpo.gov
  170. Alleged distribution of banking credential combos targeting financial institutions
    Category: Combo List
    Content: Threat actor CODER distributing free email:password combination lists targeting core banking systems, online banking, mobile banking, digital wallets, and payment gateways through Telegram channels. The actor promotes free combos and programs related to financial fraud detection and risk management systems bypass.
    Date: 2026-04-03T14:14:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70914/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged data breach of Success.com database
    Category: Data Breach
    Content: Threat actor xorcat claims to have obtained a database from Success.com containing 207,000 user records including newsletter subscribers and store orders with billing and shipping data. The alleged breach reportedly occurred in March 2026 and includes 60,000 fresh email addresses.
    Date: 2026-04-03T14:13:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Success-com-207K-Records-60K-NEW-Fresh-Emails-Newsletter-Store-Order-Mar-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Media and Publishing
    Victim Organization: Success.com
    Victim Site: success.com
  172. Alleged data breach of Calai.app diet platform
    Category: Data Leak
    Content: Threat actor shared a database dump from Calai.app containing personal health data of 3 million users including weight history, dietary information, and payment details from a Firebase backend breach in April 2026.
    Date: 2026-04-03T14:13:19Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Calai-app-3M-Users-Diet-Platform-Breach-Weight-History-Purchases-Apr-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Health and Fitness
    Victim Organization: Calai.app
    Victim Site: calai.app
  173. Alleged distribution of bypass webshell by Nullsec Philippines
    Category: Malware
    Content: The threat actor group Nullsec Philippines is sharing a new bypass shell, likely a webshell designed to circumvent security controls. This tool could be used for unauthorized access to web servers.
    Date: 2026-04-03T14:11:34Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/891
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Alleged webshell tool shared by Nullsec Philippines
    Category: Malware
    Content: A GitHub repository named leisec-webshell was shared in the Nullsec Philippines channel, referencing a webshell tool. Webshells are malicious scripts used to maintain persistent unauthorized access to compromised web servers and execute remote commands.
    Date: 2026-04-03T14:11:23Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/890
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: github.com/lei-sudo/leisec-webshell
  175. Alleged sale of multi-platform combolists, cookies, and logs including Hotmail, Gmail, Netflix, PayPal and more
    Category: Logs
    Content: A threat actor is offering for sale a wide range of credential combolists, cookies, and logs covering major platforms including Hotmail, Comcast, Gmail, Yahoo, AOL, Facebook, Instagram, Netflix, PayPal, Amazon, Steam, iCloud, LinkedIn, and many others. The offer includes account cookies and logs for social media, dating, gaming, streaming, and e-commerce services.
    Date: 2026-04-03T14:06:13Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59036
    Screenshots:
    None
    Threat Actors: tuzelity
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Alleged sale of subdomain shell access with high DA and Google Search Console
    Category: Initial Access
    Content: Threat actor is selling access to a subdomain featuring shell access, high Domain Authority (DA), active Google Search Console (GSC), and Google indexing enabled. Contact via @yatimluajg with escrow (rekber) payment method. Post is in Indonesian.
    Date: 2026-04-03T14:04:58Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/431
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Alleged sale of admin credentials for 5 million cameras worldwide
    Category: Initial Access
    Content: A threat actor operating under the Islamic Hacker Army handle is offering for sale admin login credentials for 5 million cameras across all countries. Contact is provided via Telegram handle @ALkNsOle_SY. The scale and global scope suggests a large-scale credential harvesting operation targeting IP cameras or surveillance systems.
    Date: 2026-04-03T14:02:32Z
    Network: telegram
    Published URL: https://t.me/c/2848792934/51
    Screenshots:
    None
    Threat Actors: Islamic Hacker Army
    Victim Country: Unknown
    Victim Industry: Multiple / Global Surveillance Infrastructure
    Victim Organization: Unknown
    Victim Site: Unknown
  178. Alleged data breach of Traedex crypto trading platform
    Category: Data Leak
    Content: Forum user claims to have leaked a database from Traedex.com crypto trading platform containing 66,000+ user records allegedly breached in March 2026. The data reportedly includes trading information and Vertex API access details.
    Date: 2026-04-03T14:01:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Traedex-com-66K-Crypto-Traders-Vertex-API-Access-Trading-Data-Mar-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Traedex
    Victim Site: traedex.com
  179. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor shared a collection of 13,000 allegedly valid email credentials described as top quality mixed email access accounts. The content is made available to registered forum users without apparent cost.
    Date: 2026-04-03T13:51:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70913/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  180. Alleged leak of educational institution credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 187,175 email and password combinations targeting educational institutions. The data is being distributed for free via a file sharing service.
    Date: 2026-04-03T13:41:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70912/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged data breach of Adreno customer database
    Category: Data Breach
    Content: Threat actor claims to be selling an Australian retail database containing 546,519 customer records from Adreno, a scuba diving gear retailer. The database allegedly includes comprehensive customer information including personal details, contact information, billing and delivery addresses, and loyalty program data for $1000.
    Date: 2026-04-03T13:41:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Adreno-com-au-550K
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Australia
    Victim Industry: Retail
    Victim Organization: Adreno
    Victim Site: adreno.com.au
  182. Alleged leak of stealer logs by U.L.P
    Category: Logs
    Content: Threat actor Matthiasxd17 shared stealer logs from U.L.P dated March 4, 2026 on a cybercriminal forum. The content is hidden behind registration requirements, making specific details unavailable.
    Date: 2026-04-03T13:41:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-U-L-P-STEALER-LOGS-03-04-2026
    Screenshots:
    None
    Threat Actors: Matthiasxd17
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  183. Alleged data breach of Central.co.th order database
    Category: Data Breach
    Content: Threat actor undertaker is selling 4.7 million order records from Central.co.th containing 1.64 million unique emails and personal information including names, addresses, phone numbers, and order details for $1000.
    Date: 2026-04-03T13:40:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Central-co-th-4-8m
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Thailand
    Victim Industry: Retail
    Victim Organization: Central
    Victim Site: central.co.th
  184. Alleged sale of CareerViet job portal database
    Category: Data Breach
    Content: Threat actor undertaker is allegedly selling a database from Vietnams job portal CareerViet containing 1,665,138 records with comprehensive personal information including names, emails, phone numbers, addresses, education details, and resume data for $800.
    Date: 2026-04-03T13:40:30Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Careerviet-vn
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Vietnam
    Victim Industry: Employment Services
    Victim Organization: CareerViet
    Victim Site: careerviet.vn
  185. Alleged data leak of IMSS Tlaxcala medical records
    Category: Data Leak
    Content: A threat actor claiming to be Brazilian has leaked medical records from IMSS Tlaxcala containing personal information including full names, blood types, phone numbers, family members, and email addresses. The actor indicates plans for future attacks on banking institutions and additional IMSS facilities.
    Date: 2026-04-03T13:40:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DATA-LEAK-IMMS-TLAXCALA
    Screenshots:
    None
    Threat Actors: gersonfdp
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: IMSS Tlaxcala
    Victim Site: Unknown
  186. Alleged compromise of easyshul.com admin panel credentials
    Category: Initial Access
    Content: A threat actor shared admin panel credentials for easyshul.com, providing administrative access to the website. The leaked credentials include a username and password for the admin interface at admin.easyshul.com.
    Date: 2026-04-03T13:32:38Z
    Network: openweb
    Published URL: https://spear.cx/Thread-ADMIN-easyshul-com
    Screenshots:
    None
    Threat Actors: AckLine
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Easyshul
    Victim Site: easyshul.com
  187. Alleged data leak of GladSounds customer database
    Category: Data Leak
    Content: User AckLine leaked a customer database from gladsounds.com.my containing 3,000 customer records in XLSX format. The file is 707KB in size and was made available for free download on a cybercrime forum.
    Date: 2026-04-03T13:31:55Z
    Network: openweb
    Published URL: https://spear.cx/Thread-gladsounds-com-my
    Screenshots:
    None
    Threat Actors: AckLine
    Victim Country: Malaysia
    Victim Industry: Unknown
    Victim Organization: GladSounds
    Victim Site: gladsounds.com.my
  188. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 28,000 mixed email and password combinations through a free download link on a cybercrime forum.
    Date: 2026-04-03T13:30:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-28K-MIXED-ACCESS
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. Alleged promotion of anti-detect browser tool for multi-account fraud
    Category: Initial Access
    Content: Cybercriminal promoting Incogniton anti-detect browser software designed to bypass platform security measures and enable fraudulent multi-account operations across Facebook, Google, TikTok, Amazon and other platforms. The tool provides fingerprint spoofing and profile isolation to avoid detection while conducting potentially fraudulent activities.
    Date: 2026-04-03T13:28:16Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70911/
    Screenshots:
    None
    Threat Actors: Incogniton
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Alleged data breach of Powerlab.fr French gaming PC retailer
    Category: Data Breach
    Content: Threat actor xorcat claims to have obtained and shared a database from Powerlab.fr, a French custom PC and gaming hardware retailer, containing 15,000 customer account records allegedly breached in February 2026.
    Date: 2026-04-03T13:27:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Powerlab-fr-15K-Records-French-Gaming-PC-Retailer-Customer-Database-Feb-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: France
    Victim Industry: Technology/Retail
    Victim Organization: Powerlab
    Victim Site: powerlab.fr
  191. Alleged data breach of SongTrivia2.io music trivia platform
    Category: Data Leak
    Content: Threat actor xorcat has leaked a database from SongTrivia2.io music quiz platform containing over 291,000 user records including user accounts, API keys, authentication tokens, and quiz data from an alleged April 2026 breach.
    Date: 2026-04-03T13:27:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-SongTrivia2-io-291K-Database-Music-Trivia-Site-Fresh-April-2026-Breach
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Entertainment/Gaming
    Victim Organization: SongTrivia2.io
    Victim Site: SongTrivia2.io
  192. Alleged extortion ultimatum issued by ShinyHunters threat actor
    Category: Data Breach
    Content: The ShinyHunters threat actor has posted a Pay or Leak ultimatum, suggesting they are holding stolen data and threatening to publicly leak it unless the victim organization pays a ransom. The victim has not yet responded or negotiated, prompting the public warning.
    Date: 2026-04-03T13:23:40Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/678
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Alleged Extortion Threat Against Cisco by ShinyHunters
    Category: Cyber Attack
    Content: Threat actor ShinyHunters (alias speedboat67) is publicly claiming they had prior access or knowledge of a Cisco security incident before communications were deleted. They are issuing an extortion-style ultimatum to Cisco, demanding negotiation to solve their problems before the situation escalates further, implying threats to Ciscos partner relationships if demands are not met.
    Date: 2026-04-03T13:22:12Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/677
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology / Networking
    Victim Organization: Cisco
    Victim Site: cisco.com
  194. Alleged source code theft of AI products by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have obtained source code for multiple AI products including AI Assistants, AI Defense, AI Canvas, and AI Cisco Cloud Control, allegedly exposed via public repositories by an individual named Jinzhao Feng. The group is threatening to publicly release all source code.
    Date: 2026-04-03T13:18:17Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/676
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Cisco (AI Cisco Cloud Control referenced)
    Victim Site: Unknown
  195. Alleged malware/hacking tools TIAMAT/GIR2 shared by ShinyHunters
    Category: Malware
    Content: Threat actor ShinyHunters posted about tools identified as TIAMAT/GIR2, described as the simplest tools, accompanied by a media file. This likely refers to hacking, exploitation, or malware tools being shared or advertised by the group.
    Date: 2026-04-03T13:17:10Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/674
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor has allegedly made available a combolist containing 11,000 Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-03T13:16:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70909/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  197. Alleged distribution of payment service credential lists
    Category: Combo List
    Content: Threat actor distributes a 9 million record combolist containing email and password combinations allegedly targeting multiple payment services including PayPal, Stripe, and various credit card providers. The credentials are being shared through Telegram channels offering free access to combos and related programs.
    Date: 2026-04-03T13:16:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70910/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Alleged data leak of TLDR.Tech newsletter database
    Category: Data Leak
    Content: A threat actor leaked a database allegedly containing 1.2 million user records from TLDR.Tech, a popular technology newsletter. The data was reportedly obtained through Apollo enrichment API endpoint and includes LinkedIn-enriched subscriber information.
    Date: 2026-04-03T13:15:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-TLDR-Tech-1-2M-Records-Full-LinkedIn-Apollo-Enrichment-DB-Fresh-March-2026
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Media and Publishing
    Victim Organization: TLDR.Tech
    Victim Site: Unknown
  199. Alleged data leak of 8tracks music streaming database
    Category: Data Leak
    Content: Threat actor shared a database dump from defunct music streaming service 8tracks containing 18.6 million records with usernames, emails, and salted SHA-1 password hashes. The breach allegedly occurred in June 2017 through compromise of an employees GitHub account lacking two-factor authentication.
    Date: 2026-04-03T13:15:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-8tracks-com-18-6M-Records-Music-Streaming-Database-Salted-SHA-1-Passwords
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Entertainment/Media
    Victim Organization: 8tracks
    Victim Site: 8tracks.com
  200. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Threat actor WINGO shared a free download link to a mixed email credentials combolist via pasteview.com on DemonForums. The post provides access to email and password combinations without requiring payment.
    Date: 2026-04-03T13:06:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-MIX-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  201. Alleged Full HMI/PLC Control Acquired Over South Korean Industrial Control System by Z-Pentest Alliance
    Category: Cyber Attack
    Content: The threat actor group Z-Pentest Alliance claims to have gained full control over a South Korean automated manufacturing facilitys industrial control system. The compromised system includes conveyor and lift controls, fans, pumps, LED indicators, and sensors across floors 1F–4F. The actors claim real-time access to HMI panels and PLC logic, with the ability to start/stop processes, change conveyor directions (CW/CCW), control elevator movements, toggle ventilation and pumps, clear operation logs, and reset alarms. Active sensors (X20–X5F) and cycle counters are reportedly accessible. The intrusion date is recorded as 2026-04-03. The post is tagged with #OpSouthKorea, suggesting a politically motivated campaign.
    Date: 2026-04-03T13:02:42Z
    Network: telegram
    Published URL: https://t.me/c/2729466495/919
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: South Korea
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Alleged leak of Outlook.com credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 12,808 credential entries targeting Outlook.com email accounts through a file-sharing platform.
    Date: 2026-04-03T12:44:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70908/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: outlook.com
  203. Alleged data leak of Guidely.in user database
    Category: Data Leak
    Content: A database dump from guidely.in containing 1,435,645 user records was leaked, including names, email addresses, hashed passwords, phone numbers, and personal details of students and staff members. The data appears to be from 2017 based on registration timestamps in the sample records provided.
    Date: 2026-04-03T12:33:23Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-guidely-in
    Screenshots:
    None
    Threat Actors: [Mod] Tanaka
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Guidely
    Victim Site: guidely.in
  204. Alleged leak of Asia-based email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,700 email and password combinations targeting Asian users on a cybercrime forum.
    Date: 2026-04-03T12:32:03Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-6-7K-Full-Valid-ASIA-Fresh-Mail-Acccess-03-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  205. Alleged leak of Asian email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 6.7K valid email credentials allegedly from Asian users, dated March 4th.
    Date: 2026-04-03T12:31:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70905/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  206. Alleged leak of multi-provider email credentials combolist
    Category: Combo List
    Content: Threat actor distributes a 7.8 million credential combolist containing email and password combinations from multiple providers including PayPal, Hotmail, AOL, GMX and others through Telegram channels.
    Date: 2026-04-03T12:31:08Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70906/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple email providers
    Victim Site: Unknown
  207. Alleged leak of credential combolist in URL:LOGIN:PASS format
    Category: Combo List
    Content: A threat actor shared a credential combolist in URL:LOGIN:PASS format, marketed as high quality and private. The post contains minimal details about the source or scope of the compromised credentials.
    Date: 2026-04-03T12:30:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70907/
    Screenshots:
    None
    Threat Actors: gsmfix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged Data Breach of Cisco/Salesforce by ShinyHunters via Trivy Supply Chain Compromise
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have breached Cisco through a Trivy supply chain compromise, allegedly obtaining 3 million Salesforce records. The claim is referenced via a news article from Technadu covering the incident.
    Date: 2026-04-03T12:26:40Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/671
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco / Salesforce
    Victim Site: cisco.com
  209. Alleged leak of Hotmail credentials on underground forum
    Category: Combo List
    Content: A threat actor named ValidMail allegedly shared a combolist containing 42,000 Hotmail credentials on an underground forum. The post indicates these are valid credentials from forums.
    Date: 2026-04-03T12:19:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70904/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  210. Alleged defacement of royalinstitute.co.in by #OpsShadowStrike
    Category: Defacement
    Content: Hacktivist group #OpsShadowStrike claimed responsibility for defacing royalinstitute.co.in, an Indian website. The defacement includes collaboration credits from multiple hacktivist groups including TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, and others. The operation appears politically motivated, referencing pro-Palestine and anti-Israel sentiments under the #AllMuslimHackers banner.
    Date: 2026-04-03T12:13:12Z
    Network: telegram
    Published URL: https://t.me/c/3844432135/233
    Screenshots:
    None
    Threat Actors: #OpsShadowStrike
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Royal Institute
    Victim Site: royalinstitute.co.in
  211. Alleged ShinyHunters Taunt Targeting Executive Jason Lish Over Breach Disclosure
    Category: Cyber Attack
    Content: The ShinyHunters threat actor group posted a public taunt directed at an individual named Jason Lish, claiming he is a member of a private Signal group containing approximately 300 CISOs. ShinyHunters alleges Lish has been vocal about a recent breach in this group and accuses him of lying to the CISO community. The post uses hashtags #shinyaegis, #shinycorp, and #hunters, suggesting this may relate to an ongoing breach campaign or victim. This appears to be an intimidation or pressure tactic commonly used by ransomware/extortion groups to coerce victims or discredit security personnel.
    Date: 2026-04-03T12:03:15Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/668
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  212. Alleged ShinyHunters Taunt of CISO Jason Lish Over Undisclosed Breach
    Category: Data Breach
    Content: ShinyHunters posted a message taunting Jason Lish, a CISO, accusing him of lying to approximately 300 CISOs in a private Signal group about a recent breach. The post implies ShinyHunters has knowledge of or access to communications within this private group, and that the breach details are being misrepresented internally. The hashtag #shinyaegis may reference a specific operation or target.
    Date: 2026-04-03T12:02:20Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/667
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  213. Alleged data breach of Cisco by ShinyHunters – GitHub Token and Internal Splunk Query Leaked
    Category: Data Breach
    Content: The ShinyHunters threat group is teasing an upcoming Cisco data release. They have shared what appears to be a GitHub Personal Access Token (ghp_798fnSquvZ4IrZUiTPoin61nsbDL0x2cxpJ1) along with its base64-hashed equivalent and an internal Cisco IT Splunk query targeting a ds-github index, filtering for non-US actor locations across GitHub repositories. This strongly suggests ShinyHunters has obtained access to Ciscos internal GitHub environment and is preparing to release stolen data. The tag #SH#speedboat67 appears to be an internal operation identifier.
    Date: 2026-04-03T11:53:26Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/661
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology / Networking
    Victim Organization: Cisco
    Victim Site: cisco.com
  214. Alleged sale of high-balance credit card data via Telegram
    Category: Logs
    Content: A user in the Squad Chat Marketplace channel is advertising credit card (CC) data claimed to be 100% alive with high balances, directing buyers to a Telegram channel (t.me/fsdf12452).
    Date: 2026-04-03T11:52:48Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59025
    Screenshots:
    None
    Threat Actors: Coleman
    Victim Country: Unknown
    Victim Industry: Financial
    Victim Organization: Unknown
    Victim Site: Unknown
  215. Alleged Data Breach and Source Code Sale of Cisco by ShinyHunters
    Category: Data Breach
    Content: The ShinyHunters threat group claims to have compromised Cisco, obtaining over 3 million Salesforce records containing PII, GitHub repositories, AWS storage, and internal corporate data. The group also claims possession of source code for multiple Cisco AI products including AI Assistants, AI Defense, AI Canvas, and AI Cisco Cloud Control. The post taunts Cisco security staff and references an employee named Jinzhao Feng allegedly storing secrets in public repositories. The data is being offered for sale at $2M USD on BreachForums. Contact via Tox and Session IDs provided.
    Date: 2026-04-03T11:52:25Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/655
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco
    Victim Site: cisco.com
  216. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 11,000 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-03T11:45:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70901/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  217. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 11,000 Hotmail email and password combinations on a cybercrime forum. The actor also advertises a shop selling credential combinations from various countries.
    Date: 2026-04-03T11:45:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-3-11000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  218. Alleged distribution of email credential combolist containing 7.4 million records
    Category: Combo List
    Content: Threat actor CODER is distributing a combolist containing 7.4 million email and password combinations through Telegram channels. The actor operates multiple Telegram groups offering free credential lists and related tools.
    Date: 2026-04-03T11:44:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70902/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  219. Website defacement of TroutMagnet by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a specific page on the TroutMagnet fishing equipment retailer website on April 3, 2026.
    Date: 2026-04-03T11:38:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827893
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: TroutMagnet
    Victim Site: troutmagnet.com
  220. Website defacement of TAG Motorsports by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced a subdirectory of TAG Motorsports website on April 3, 2026. The attack targeted a specific media/custom path rather than the main homepage, indicating a targeted partial defacement of the motorsports companys web presence.
    Date: 2026-04-03T11:37:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827898
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Automotive/Sports
    Victim Organization: TAG Motorsports
    Victim Site: tagmotorsports.com
  221. Website defacement of Spawarki Magnum by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the website of Polish welding equipment company Spawarki Magnum on April 3, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-03T11:37:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827913
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Manufacturing
    Victim Organization: Spawarki Magnum
    Victim Site: spawarki-magnum.pl
  222. Website defacement of SoFast Cart by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the SoFast Cart e-commerce website on April 3, 2026. The defacement targeted a customer media subdirectory rather than the main homepage.
    Date: 2026-04-03T11:36:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827914
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: SoFast Cart
    Victim Site: sofastcart.com
  223. Website defacement of product-components.com by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the product-components.com website on April 3, 2026. The attack targeted a subdirectory of the manufacturing/technology companys website and was documented on the zone-xsec mirror platform.
    Date: 2026-04-03T11:36:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827938
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing/Technology
    Victim Organization: Product Components
    Victim Site: product-components.com
  224. Website defacement of olvass.ro by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a specific page on the Romanian website olvass.ro on April 3, 2026. The defacement targeted a customer address page within the media directory of the site.
    Date: 2026-04-03T11:35:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827939
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: olvass.ro
  225. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a German credential combolist containing 894,358 lines of mixed target credentials via file sharing service. The data is being distributed for free download.
    Date: 2026-04-03T11:35:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70899/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  226. Website defacement of ml.rocks by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against ml.rocks on April 3, 2026. The attack targeted a customer address page on the domain.
    Date: 2026-04-03T11:35:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827941
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ml.rocks
  227. Alleged leak of mixed email credentials including corporate accounts
    Category: Combo List
    Content: A threat actor shared a collection of 22,000 valid email access credentials containing a mix of personal and corporate accounts dated April 3rd. The credentials are being distributed as hidden content requiring forum registration to access.
    Date: 2026-04-03T11:34:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70900/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  228. Website defacement of livephthings.com by DimasHxR
    Category: Defacement
    Content: Individual threat actor DimasHxR defaced a subdirectory of livephthings.com on April 3, 2026. The attack was recorded as a single defacement incident with limited technical details available.
    Date: 2026-04-03T11:34:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827974
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: livephthings.com
  229. Website defacement of FlashDrive Australia by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against FlashDrive Australias e-commerce platform on April 3, 2026. The attack targeted a specific media directory on the companys website rather than the main homepage.
    Date: 2026-04-03T11:33:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827985
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Technology/Electronics
    Victim Organization: FlashDrive Australia
    Victim Site: flashdrive.com.au
  230. Website defacement of FlexDev by DimasHxR
    Category: Defacement
    Content: On April 3, 2026, threat actor DimasHxR successfully defaced a subdirectory of the Turkish technology company FlexDevs website. The attack targeted a specific customer media section rather than the main homepage.
    Date: 2026-04-03T11:33:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827986
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Turkey
    Victim Industry: Technology
    Victim Organization: FlexDev
    Victim Site: flexdev.com.tr
  231. Alleged distribution of Vidar Stealer logs containing credentials
    Category: Logs
    Content: Threat actor KazeFreak allegedly distributed 2,500 credential logs obtained via Vidar Stealer malware in URL:LOGIN:PASS format on a cybercriminal forum.
    Date: 2026-04-03T11:32:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-URL-LOGIN-PASS-Vidar-Stealer-2500-logs
    Screenshots:
    None
    Threat Actors: KazeFreak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  232. Website defacement of Elms Marketing by DimasHxR
    Category: Defacement
    Content: On April 3, 2026, threat actor DimasHxR successfully defaced the Elms Marketing website, targeting a specific media directory on the Irish marketing companys domain. The incident was classified as a single-target defacement rather than part of a mass campaign.
    Date: 2026-04-03T11:32:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827992
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ireland
    Victim Industry: Marketing/Advertising
    Victim Organization: Elms Marketing
    Victim Site: elmsmarketing.ie
  233. Alleged data breach of Vitag Retail Technologies database dump
    Category: Data Breach
    Content: Threat actor is selling a comprehensive database dump of Vitag Retail Technologies containing financial transactions, customer records, supplier contracts, user credentials, audit logs, and system configurations for 0.3 BTC. The dump includes multiple database backups totaling over 10GB of data from their SAP environment and SQL servers.
    Date: 2026-04-03T11:32:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Vitag-Retail-Technologies-NZ-vitag-nz-Full-dump-2026
    Screenshots:
    None
    Threat Actors: Moneyistime
    Victim Country: New Zealand
    Victim Industry: Retail Technology
    Victim Organization: Vitag Retail Technologies
    Victim Site: vitag.nz
  234. Alleged sale of ANSES Argentina government database
    Category: Data Breach
    Content: Threat actor undertaker is allegedly selling a database containing 24.5 million records from Argentinas national social security administration (ANSES) for $1500. The data includes personal information, social security numbers (CUILs), salary data, and contact details of Argentine citizens.
    Date: 2026-04-03T11:32:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-anses-gob-ar-24m
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Argentina
    Victim Industry: Government
    Victim Organization: ANSES (Administración Nacional de la Seguridad Social)
    Victim Site: anses.gob.ar
  235. Website defacement of Cavallaro Napoli by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the cavallaronapoli.com website on April 3, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-03T11:32:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828004
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Cavallaro Napoli
    Victim Site: cavallaronapoli.com
  236. Website defacement of carbon-brushes-gomes.com by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the carbon-brushes-gomes.com website on April 3, 2026. The attack targeted a manufacturing companys website, appearing to be an isolated defacement rather than part of a mass campaign.
    Date: 2026-04-03T11:31:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828005
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Gomes Carbon Brushes
    Victim Site: carbon-brushes-gomes.com
  237. Website defacement of balais-de-charbon.fr by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the French website balais-de-charbon.fr on April 3, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-03T11:30:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828010
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: balais-de-charbon.fr
  238. Website defacement of British Live Steam by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the British Live Steam website, targeting what appears to be a steam locomotive enthusiast organization based in Australia. The incident occurred on April 3, 2026, affecting the media section of the site.
    Date: 2026-04-03T11:29:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828011
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Entertainment/Hobby
    Victim Organization: British Live Steam
    Victim Site: britishlivesteam.com.au
  239. Website defacement of azan.com.pl by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced azan.com.pl on April 3, 2026, targeting a specific page within the media/customer section of the website. This was an isolated defacement incident rather than part of a mass campaign.
    Date: 2026-04-03T11:28:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828015
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: azan.com.pl
  240. Website defacement of apnisabjimandi.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a subdirectory of apnisabjimandi.com, an Indian vegetable/produce marketplace website, on April 3, 2026.
    Date: 2026-04-03T11:28:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/828016
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: India
    Victim Industry: Agriculture/Food
    Victim Organization: Apni Sabji Mandi
    Victim Site: apnisabjimandi.com
  241. Alleged Bulk SMS Phishing Service Targeting Financial Institutions Including CGD, Binance, and Santander
    Category: Phishing
    Content: A threat actor operating as @Alice_sms6 is advertising a bulk SMS (smishing) service with routes specifically targeting Portugal and 200+ countries. The service explicitly offers SMS spoofing/routing for CGD (Caixa Geral de Depósitos), Binance, CMD, Santander, Netflix, and Microsoft — all high-value phishing targets. The service supports custom content delivery, indicating it is designed to facilitate smishing campaigns for credential harvesting and financial fraud. Contact is via Telegram handle @Alice_sms6 and bot @Alice_global_SMS_bot.
    Date: 2026-04-03T11:18:47Z
    Network: telegram
    Published URL: https://t.me/global_bulksms_Alice/146
    Screenshots:
    None
    Threat Actors: Alice_sms6
    Victim Country: Portugal
    Victim Industry: Financial Services / Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  242. Alleged Data Leak of Chilean Male Gender Database
    Category: Data Leak
    Content: A threat actor is claiming to possess or share a database containing records of Chilean males, suggesting a data breach or leak of personal information from Chile.
    Date: 2026-04-03T11:02:43Z
    Network: telegram
    Published URL: https://t.me/c/1887244124/1620
    Screenshots:
    None
    Threat Actors: Joker
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  243. Alleged Data Breach of Japan Aerospace Exploration Agency (JAXA)
    Category: Data Breach
    Content: A threat actor operating under Jokers world of Database claims to have breached the Japan Aerospace Exploration Agency (JAXA), Japans national space agency. The stolen data is being made available for free download via a Mega.nz link. The breach is claimed to have occurred on 27/03/2026. JAXA is responsible for aerospace research, satellite technology, planetary exploration, and rocket development including the H3 rocket.
    Date: 2026-04-03T11:00:48Z
    Network: telegram
    Published URL: https://t.me/c/1887244124/1619
    Screenshots:
    None
    Threat Actors: Jokers world of Database
    Victim Country: Japan
    Victim Industry: Aerospace & Defense / Government
    Victim Organization: Japan Aerospace Exploration Agency (JAXA)
    Victim Site: jaxa.jp
  244. Alleged data leak of schmuckladen.de customer database
    Category: Data Leak
    Content: A customer database from German jewelry retailer schmuckladen.de containing 47,000 records was allegedly leaked in CSV format. The database includes personal information such as names, email addresses, phone numbers, postal codes, and customer registration dates from 2024.
    Date: 2026-04-03T10:51:43Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-schmuckladen-de
    Screenshots:
    None
    Threat Actors: [Mod] Tanaka
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Schmuckladen
    Victim Site: schmuckladen.de
  245. Alleged leak of 3,000 valid credentials
    Category: Combo List
    Content: Threat actor COYTO shared a free download link containing 3,000 allegedly fresh and valid credential combinations on DemonForums combolist section.
    Date: 2026-04-03T10:50:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3K-FRESH-FULL-VALID-ACCESS
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  246. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample containing 1,055 Hotmail credentials on a cybercrime forum as a free download.
    Date: 2026-04-03T10:49:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70898/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  247. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Actor WINGO shared a combolist containing 2,000 Hotmail email and password combinations on cybercriminal forum. The credentials are being distributed for free download via a paste site link.
    Date: 2026-04-03T10:39:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-2K-HQ-HOTMAIL-PRIVAT
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  248. Alleged Data Breach of European Commission Cloud Infrastructure by TeamPCP and ShinyHunters
    Category: Data Breach
    Content: A cyber attack attributed to the group TeamPCP targeted the European Commissions cloud infrastructure by exploiting a stolen API key, resulting in unauthorized access to data belonging to dozens of EU institutions. A portion of the exfiltrated data, including emails and user credentials, was subsequently published on the dark web by the group ShinyHunters. Investigations are ongoing; no website disruptions have been reported.
    Date: 2026-04-03T10:33:52Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20940
    Screenshots:
    None
    Threat Actors: TeamPCP
    Victim Country: Belgium
    Victim Industry: Government
    Victim Organization: European Commission
    Victim Site: ec.europa.eu
  249. Alleged leak of SBCGlobal credentials
    Category: Combo List
    Content: Threat actor BestCombo shared a combolist containing 14,151 credential entries targeting the sbcglobal.net domain via a Mega.nz file sharing link on the CrackingX forum.
    Date: 2026-04-03T10:28:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70897/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: United States
    Victim Industry: Telecommunications
    Victim Organization: AT&T
    Victim Site: sbcglobal.net
  250. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 5.8k mixed email credentials through a MediaFire download link on a cybercriminal forum.
    Date: 2026-04-03T10:17:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70895/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  251. Alleged leak of Gmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 451,309 Gmail email and password combinations on a cybercrime forum. The credentials are allegedly valid through March 4, 2026.
    Date: 2026-04-03T10:16:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70896/
    Screenshots:
    None
    Threat Actors: Kinglukeman
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google
    Victim Site: gmail.com
  252. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a file containing approximately 1,300 Hotmail email credentials through a MediaFire download link on a cybercrime forum.
    Date: 2026-04-03T10:05:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70892/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  253. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a file containing approximately 1,900 Hotmail email account credentials on a cybercrime forum. The credentials appear to be distributed as a free download via a file-sharing service.
    Date: 2026-04-03T10:04:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70893/
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  254. Alleged Cyber Attack on Turkish Water Supply SCADA System by Armenian Code
    Category: Cyber Attack
    Content: A threat actor operating under the name Armenian code claims to have disrupted the SCADA control system of a Turkish industrial pumping station responsible for regional water supply. The attack is framed as retaliation against Turkey for its partnership with Azerbaijan and alleged geopolitical maneuvering against Armenia. The group states their intent is to inflict maximum damage on participants in what they describe as a detrimental regional process.
    Date: 2026-04-03T09:44:46Z
    Network: telegram
    Published URL: https://t.me/c/3628793212/116
    Screenshots:
    None
    Threat Actors: Armenian code
    Victim Country: Turkey
    Victim Industry: Water & Utilities
    Victim Organization: Unknown
    Victim Site: Unknown
  255. Alleged sale of LARP tools, stealer logs, databases, and government IDs
    Category: Data Breach
    Content: Threat actor larp is selling LARP tools for CashApp/Ledger/Exodus, stealer logs, databases, and government identification documents. Contact is facilitated through Telegram channel @kashpill for previews and purchasing information.
    Date: 2026-04-03T09:24:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70891/
    Screenshots:
    None
    Threat Actors: larp
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  256. Alleged Sale of Hotmail Credential Databases and Combolists Across Multiple Countries
    Category: Combo List
    Content: A threat actor is selling access to Hotmail/webmail credential databases and combolists covering multiple countries including UK, DE, JP, NL, BR, PL, ES, US, IT, and others. The seller claims to operate a private cloud with UHQ (ultra-high quality) data and offers keyword-based inbox searching tied to major platforms such as eBay, Amazon, Walmart, PSN, Uber, Booking, Poshmark, Alibaba, Mercari, Kleinanzeigen, and Neosurf. Valid ntlworld webmails are also mentioned. Buyers are directed to DM for custom requests.
    Date: 2026-04-03T09:21:59Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59006
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Unknown
    Victim Industry: Technology / Email Services
    Victim Organization: Hotmail / Microsoft
    Victim Site: hotmail.com
  257. Alleged leak of German credential combolist
    Category: Combo List
    Content: A combolist containing 274,313 credential combinations targeting German users has been made available for download via file sharing service.
    Date: 2026-04-03T09:14:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70890/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  258. Alleged defacement of Israeli educational website nativhaor.co.il by Cyber Islamic Resistance
    Category: Defacement
    Content: The Cyber Islamic Resistance group claims to have defaced the Israeli website nativhaor.co.il as part of their Holy Response (الرد المقدس) operations. The targeted site appears to be an educational program called Netiv HaOr focused on electrical safety. The group framed the attack as a response to the blockade on Al-Aqsa Mosque and announced further operations to follow.
    Date: 2026-04-03T09:11:20Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1841
    Screenshots:
    None
    Threat Actors: Cyber Islamic Resistance
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: Netiv HaOr
    Victim Site: nativhaor.co.il
  259. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 11,000 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-03T09:04:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70888/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  260. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Threat actor snowstormxd shared a fresh mixed email credential combolist for free download via Telegram channel on CrackingX forum.
    Date: 2026-04-03T09:03:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70889/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Website defacement of 7789bet.io by Aptisme/Leviathan Perfect Hunter
    Category: Defacement
    Content: The gambling website 7789bet.io was defaced by attacker Aptisme from the Leviathan Perfect Hunter team on April 3, 2026. The attack targeted a specific page on the betting platforms domain.
    Date: 2026-04-03T08:58:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827883
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Online Gambling
    Victim Organization: 7789bet
    Victim Site: 7789bet.io
  262. Website defacement of avenbd.com by Aptisme/Leviathan Perfect Hunter
    Category: Defacement
    Content: The website avenbd.com was defaced by the attacker Aptisme, affiliated with the team Leviathan Perfect Hunter, on April 3, 2026. This was a home page defacement targeting a single site rather than a mass defacement campaign.
    Date: 2026-04-03T08:57:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827884
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: avenbd.com
  263. Website defacement of Luxtone Global by Aptisme/Leviathan Perfect Hunter
    Category: Defacement
    Content: The Leviathan Perfect Hunter team, specifically attacker Aptisme, successfully defaced the homepage of luxtone-global.com on April 3, 2026. This was a targeted single-site attack rather than a mass defacement campaign.
    Date: 2026-04-03T08:57:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827885
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Luxtone Global
    Victim Site: luxtone-global.com
  264. Website defacement of Vietnamese furniture company by Aptisme/Leviathan Perfect Hunter
    Category: Defacement
    Content: Vietnamese interior design company website defaced by attacker Aptisme affiliated with Leviathan Perfect Hunter team on April 3, 2026. This was an individual defacement targeting a single commercial website.
    Date: 2026-04-03T08:56:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827886
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Vietnam
    Victim Industry: Furniture/Interior Design
    Victim Organization: Minh Khang Interior Design
    Victim Site: trangtrinoingoaithatminhkhang….
  265. Alleged sale of initial access to Netherlands software company
    Category: Initial Access
    Content: Threat actor AckLine is allegedly selling RDWEB access to a Netherlands-based software solutions company. The actor is soliciting offers through encrypted communication channels.
    Date: 2026-04-03T08:45:53Z
    Network: openweb
    Published URL: https://spear.cx/Thread-RDWEB-Netherlands-company
    Screenshots:
    None
    Threat Actors: AckLine
    Victim Country: Netherlands
    Victim Industry: Software Solutions
    Victim Organization: Unknown
    Victim Site: Unknown
  266. Website defacement of meraka.lv by maw3six
    Category: Defacement
    Content: The attacker maw3six successfully defaced the website meraka.lv on April 3, 2026. This was an individual defacement targeting a single Latvian website rather than a mass or coordinated attack.
    Date: 2026-04-03T08:33:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248233
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Latvia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: meraka.lv
  267. Mass website defacement campaign by maw3six targeting strelnieku42.com
    Category: Defacement
    Content: Attacker maw3six conducted a mass defacement campaign targeting multiple websites including strelnieku42.com on April 3, 2026. The attack was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-03T08:33:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248234
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Latvia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: strelnieku42.com
  268. Mass defacement targeting premier.estate by maw3six
    Category: Defacement
    Content: Mass defacement attack conducted by attacker maw3six against premier.estate on April 3, 2026. The attack targeted a real estate website as part of a broader mass defacement campaign.
    Date: 2026-04-03T08:32:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248235
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Premier Estate
    Victim Site: premier.estate
  269. Mass defacement targeting real estate websites by maw3six
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor maw3six targeting multiple websites including Latvian real estate platform estater.lv. The attack was part of a broader mass defacement campaign rather than targeting a specific organization.
    Date: 2026-04-03T08:32:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248236
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Latvia
    Victim Industry: Real Estate
    Victim Organization: Estater
    Victim Site: estater.lv
  270. Alleged data leak of IranWire News Agency staff personal information by Hanzaleh hacker group
    Category: Data Leak
    Content: The hacker group Hanzaleh (حنظله) has reportedly published photos and personal details of 20 members of IranWire news agency. The leaked information includes names and personal details of journalists and staff including Maryam Dehkordi, Maziar Bahari, and 18 others associated with the outlet.
    Date: 2026-04-03T08:31:47Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20924
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Iran
    Victim Industry: Media & Journalism
    Victim Organization: IranWire
    Victim Site: Unknown
  271. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 2,364 Hotmail email and password combinations, claiming the credentials are valid and from a private cloud source.
    Date: 2026-04-03T08:31:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70887/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  272. Alleged cyber threat against Indonesian Government by The Garuda Eye
    Category: Cyber Attack
    Content: A threat actor operating under the handle THE GARUDA EYE posted a warning message directed at the Indonesian government, stating See you Indonesia Government, Our mission is not finished yet, suggesting an ongoing or planned cyber attack campaign against Indonesian government entities.
    Date: 2026-04-03T08:30:53Z
    Network: telegram
    Published URL: https://t.me/c/2738395378/1412
    Screenshots:
    None
    Threat Actors: THE GARUDA EYE
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Indonesian Government
    Victim Site: Unknown
  273. Alleged data leak of IranWire News Agency staff personal information by Hanzaleh hacker group
    Category: Data Leak
    Content: The Hanzaleh (Hanzala) hacker group has published personal images and details of 20 members of IranWire news agency. The leaked information includes full names of journalists and staff, potentially including photos and personal details. IranWire is a Persian-language independent news outlet. This appears to be a targeted doxxing operation against media personnel.
    Date: 2026-04-03T08:28:08Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20923
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Iran
    Victim Industry: Media & Journalism
    Victim Organization: IranWire
    Victim Site: Unknown
  274. Alleged Data Breach of Mercer Advisors Exposing 5M+ Salesforce Records
    Category: Data Breach
    Content: Threat actor @shinyc0rpsss, associated with ShinyHunters, claims to have compromised Mercer Advisors, exfiltrating over 5 million Salesforce records. Of these, more than 1.3 million reportedly contain personally identifiable information (PII) along with other internal corporate data.
    Date: 2026-04-03T08:16:49Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/641
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Mercer Advisors
    Victim Site: Unknown
  275. Website defacement of Kleintierladen pet store by DimasHxR
    Category: Defacement
    Content: German pet store website kleintierladen.de was defaced by attacker DimasHxR on April 3, 2026. The defacement targeted a specific media directory rather than the homepage.
    Date: 2026-04-03T08:16:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827783
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Kleintierladen
    Victim Site: kleintierladen.de
  276. Website defacement of klifora.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a customer management page on klifora.com on April 3, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-03T08:15:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827784
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Klifora
    Victim Site: klifora.com
  277. Alleged Cyber Attack on Oracle and Amazon Datacenters by IRGC Navy
    Category: Cyber Attack
    Content: The Islamic Revolutionary Guard Corps (IRGC) Navy Command claims to have targeted the datacenter of US company Oracle in Dubai and Amazon in Bahrain. The statement frames the attack as retaliation for the killing of Iranians, warning that their response is to disable the assassination machine. The post references Trumps actions as costly for the US military.
    Date: 2026-04-03T08:15:10Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20922
    Screenshots:
    None
    Threat Actors: IRGC Navy
    Victim Country: United Arab Emirates, Bahrain
    Victim Industry: Cloud Infrastructure / Technology
    Victim Organization: Oracle, Amazon
    Victim Site: Unknown
  278. Website defacement of OFashion by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Australian fashion retailer OFashions website on April 3, 2026. The incident targeted a specific media subdirectory rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-03T08:14:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827793
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Fashion/Retail
    Victim Organization: OFashion
    Victim Site: www.ofashion.com.au
  279. Alleged leak of credential combolist containing 21,000 records
    Category: Combo List
    Content: A threat actor shared a free download link to a combolist containing 21,000 email and password combinations on an underground forum.
    Date: 2026-04-03T08:12:07Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-21K-VALID-GOODS
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  280. Alleged leak of mixed domain credential combolist
    Category: Combo List
    Content: A credential combolist containing 5.375 million lines targeting mixed domains has been shared for free download via a file sharing service.
    Date: 2026-04-03T08:10:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70884/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  281. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor D4rkNetHub shared a combolist containing 959 Hotmail credentials on a cybercrime forum. The credentials are described as good suggesting they may be valid or recently tested.
    Date: 2026-04-03T08:10:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70886/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  282. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: User klyne05 allegedly leaked fresh Hotmail credentials on the CrackingX forum. The post offers free download of what appears to be a combolist targeting Hotmail email accounts.
    Date: 2026-04-03T08:01:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70883/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  283. Alleged request for French government databases including Ameli and ANTS
    Category: Data Breach
    Content: Threat actor requests access to French government databases including Ameli (French health insurance system) and ANTS (National Agency for Secure Documents) along with other unspecified French databases.
    Date: 2026-04-03T08:01:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-REQUEST-Ameli-ANTS-and-others-french-DB
    Screenshots:
    None
    Threat Actors: testhack9090
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Government Services
    Victim Site: Unknown
  284. Alleged leak of Greek credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 38,000 email and password combinations targeting Greek users. The credentials are claimed to be fresh and dated for April 3, 2026.
    Date: 2026-04-03T07:51:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-38-K-%E2%9C%A6-Greece-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-3-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Greece
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  285. Alleged leak of Israeli credential combolist
    Category: Combo List
    Content: Threat actor CobraEgy allegedly shared a fresh combolist containing over 17,000 Israeli email and password combinations on DemonForums. The credential list is claimed to be from Maxi_Leaks and dated for April 3, 2026.
    Date: 2026-04-03T07:49:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-17-K-%E2%9C%A6-Israel-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-3-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  286. Alleged leak of mixed email credentials by Kommander0
    Category: Combo List
    Content: Threat actor Kommander0 shared a combolist containing 1,900 mixed email credentials through a file hosting service. The credentials appear to be from various sources and are being distributed for free.
    Date: 2026-04-03T07:26:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70882/
    Screenshots:
    None
    Threat Actors: Kommander0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  287. Alleged defacement of Israeli home organization service website bniyat-atarim.co.il
    Category: Defacement
    Content: The Cyber Islamic Resistance group claims to have defaced the Israeli website bniyat-atarim.co.il, a home and business organization/arrangement services and products store. The attack is framed as part of their Holy Response (الرد المقدس) operations in response to the siege on Al-Aqsa Mosque, attributed to their Algerian-Lebanese Front unit.
    Date: 2026-04-03T07:17:13Z
    Network: telegram
    Published URL: https://t.me/c/1651470668/1840
    Screenshots:
    None
    Threat Actors: Cyber Islamic Resistance
    Victim Country: Israel
    Victim Industry: Retail/E-commerce
    Victim Organization: Bniyat Atarim
    Victim Site: bniyat-atarim.co.il
  288. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,976 allegedly valid Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-03T07:15:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70881/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  289. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,087 alleged high-quality Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-03T07:06:12Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X2087-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  290. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing over 1.1 million credential pairs specifically targeting Hotmail domain accounts. The credentials were made available for free download via a file sharing service.
    Date: 2026-04-03T07:03:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70880/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  291. Website defacement of OPL by NUCLIER-Y-C-C-M
    Category: Defacement
    Content: The threat actor NUCLIER-Y-C-C-M successfully defaced the website opl.com.np on April 3rd, 2026. This appears to be an isolated defacement incident targeting a Nepali organization.
    Date: 2026-04-03T07:01:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827763
    Screenshots:
    None
    Threat Actors: NUCLIER-Y-C-C-M, NUCLIER-Y-C-C-M
    Victim Country: Nepal
    Victim Industry: Unknown
    Victim Organization: OPL
    Victim Site: opl.com.np
  292. Alleged data leak from Maxi_Leaks containing 4.1 GB of logs
    Category: Data Leak
    Content: Forum post advertises a 4.1 GB collection of logs from Maxi_Leaks dated March 4, 2026, though no post content is available to verify details or determine the nature of the data.
    Date: 2026-04-03T06:52:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Request-%E2%9C%A6%E2%9C%A6-LOG-S-%E2%9C%A6%E2%9C%A6-Maxi-Leaks-%E2%9C%A6%E2%9C%A6-3-4-2026-%E2%9C%A6%E2%9C%A6-4-1-GB-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  293. Alleged social media account manipulation services offered on cybercrime forum
    Category: Initial Access
    Content: Threat actor offers social media manipulation services including account unbans, verification bypasses, and shadowban removals across Instagram, Facebook, WhatsApp, TikTok, and Snapchat platforms. Services appear to involve unauthorized access or manipulation of social media platform systems.
    Date: 2026-04-03T06:40:11Z
    Network: openweb
    Published URL: https://spear.cx/Thread-%E2%AD%90Social-media-services-%E2%AD%90
    Screenshots:
    None
    Threat Actors: Slowredd
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Multiple social media platforms
    Victim Site: Unknown
  294. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A forum user is sharing a combolist containing 11,000 unique Hotmail email and password combinations. The content is restricted to registered forum members only.
    Date: 2026-04-03T06:38:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70879/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  295. Website defacement of bintangkmedia.my.id by Boss Ranzen (D704T team)
    Category: Defacement
    Content: Boss Ranzen from the D704T team successfully defaced the Malaysian media website bintangkmedia.my.id on April 3rd, 2026. The attack targeted the sites 403 error page and represents a single website defacement rather than mass or redefacement activity.
    Date: 2026-04-03T06:27:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827761
    Screenshots:
    None
    Threat Actors: Boss Ranzen, D704T
    Victim Country: Malaysia
    Victim Industry: Media
    Victim Organization: Bintang K Media
    Victim Site: bintangkmedia.my.id
  296. Alleged data breach of Páginas Amarillas Venezuela business directory
    Category: Data Breach
    Content: Threat actor claims to have obtained a database containing 527,000 business contacts and service records from Venezuelan business directory Páginas Amarillas.
    Date: 2026-04-03T06:19:05Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-527k-Venezuela-https-www-paginasamarillas-com-ve-Business-contacts-and-service
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Venezuela
    Victim Industry: Business Directory Services
    Victim Organization: Páginas Amarillas Venezuela
    Victim Site: paginasamarillas.com.ve
  297. Alleged data breach of Venezuelan Ministry of Culture database
    Category: Data Breach
    Content: A threat actor is selling a database containing 423,000 records from Venezuelas Ministry of Culture website, including contact details, cultural event inquiries, and grant applications for $1400.
    Date: 2026-04-03T06:18:44Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-423k-Venezuela-www-mincultura-gob-ve-Cultural-event-contacts-and-sponsorship-lead
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Venezuela
    Victim Industry: Government
    Victim Organization: Ministry of Culture
    Victim Site: mincultura.gob.ve
  298. Alleged data breach of Replica Guns & Swords website
    Category: Data Breach
    Content: A threat actor claims to have obtained user data from the Replica Guns & Swords website, allegedly containing approximately 485,000 records including email addresses and phone numbers.
    Date: 2026-04-03T06:10:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-485k-United-States-www-replicaguns-swords-com-User-data-including-emails-phones
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: United States
    Victim Industry: Retail
    Victim Organization: Replica Guns & Swords
    Victim Site: replicaguns-swords.com
  299. Alleged data breach of EcommerceTemplates.com customer database
    Category: Data Breach
    Content: Threat actor is selling a database from EcommerceTemplates.com containing 563,000 records with customer contact information, order transactions, and shipping details for $1,000. The data includes personal information, payment details, and shipping addresses organized into three main sections.
    Date: 2026-04-03T06:10:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-563k-United-States-https-www-ecommercetemplates-com-Customer-contact-info-inclu
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: EcommerceTemplates.com
    Victim Site: ecommercetemplates.com
  300. Alleged data breach of Páginas Amarillas Uruguay
    Category: Data Breach
    Content: Threat actor claims to have obtained a database containing 312,000 business contacts from Uruguays Páginas Amarillas directory, allegedly including email addresses, phone numbers, and physical addresses.
    Date: 2026-04-03T06:09:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-312k-Uruguay-www-paginasamarillas-com-uy-Business-contacts-with-emails-phones-add
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: Uruguay
    Victim Industry: Business Directory Services
    Victim Organization: Páginas Amarillas Uruguay
    Victim Site: paginasamarillas.com.uy
  301. Alleged data breach of DealerTrack automotive platform
    Category: Data Breach
    Content: Threat actor is selling a database allegedly containing 537,000 records from DealerTrack automotive platform for $1,400. The data includes contacts, payment methods, and shipping addresses with detailed personal and financial information.
    Date: 2026-04-03T05:59:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-537k-United-States-https-www-dealertrack-com-Auto-sales-contacts-including-ema
    Screenshots:
    None
    Threat Actors: Grubder
    Victim Country: United States
    Victim Industry: Automotive
    Victim Organization: DealerTrack
    Victim Site: dealertrack.com
  302. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,536 credentials specifically targeting Hotmail.com domain users through a file sharing platform.
    Date: 2026-04-03T05:51:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70877/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  303. Alleged sale of stolen credit cards and CVV data via Telegram storefronts
    Category: Logs
    Content: Multiple users in a Telegram marketplace channel are advertising stolen credit card (CC) stores and CVV data services. Actors promote storefronts claiming 100% alive, high balance cards and cheapest checker services, referencing Telegram handles @vcxdcvx, @cocococococococo1, t.me/fsdf12452, and @nzccg001. The NeZha CVV Support channel is also being forwarded, indicating an organized carding operation with multiple fronts.
    Date: 2026-04-03T05:16:15Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/58959
    Screenshots:
    None
    Threat Actors: NeZha CVV Support
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  304. Alleged sale of mail access logs and combo hits targeting multiple countries
    Category: Logs
    Content: A threat actor operating via @Dataxlogs is advertising mail access logs, configs, scripts, tools, hits, and combo lists targeting users in France, Belgium, Australia, Canada, United Kingdom, United States, Netherlands, Poland, Germany, and Japan. Custom requests are available, indicating an active logs/credential marketplace operation.
    Date: 2026-04-03T05:13:03Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/58963
    Screenshots:
    None
    Threat Actors: Dataxlogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  305. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 42,000 Hotmail email credentials allegedly validated against forums. The credentials are being distributed on a cybercriminal forum.
    Date: 2026-04-03T04:59:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70876/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  306. Alleged leak of German mixed target combolist
    Category: Combo List
    Content: A combolist containing 591,792 credential pairs targeting German users has been leaked on a cybercrime forum. The data appears to be sourced from mixed targets and is being distributed for free via a Mega.nz file sharing link.
    Date: 2026-04-03T04:50:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70875/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  307. Website defacement of 7 Days Garden Services by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team conducted a redefacement attack against Australian garden services company 7 Days Garden Services on April 3, 2026. The attack targeted the companys primary website domain and represents a repeat compromise of the same target.
    Date: 2026-04-03T04:41:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827715
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Landscaping/Garden Services
    Victim Organization: 7 Days Garden Services
    Victim Site: 7daysgardenservices.com.au
  308. Website defacement of ASAP Landscape Concrete by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, identified by attacker XYZ, successfully defaced the website of ASAP Landscape Concrete, an Australian landscaping and concrete services company. This incident represents a redefacement targeting the companys homepage.
    Date: 2026-04-03T04:41:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827716
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Construction/Landscaping
    Victim Organization: ASAP Landscape Concrete
    Victim Site: asaplandscapeconcrete.com.au
  309. Alleged leak of US government identity documents and financial records
    Category: Data Leak
    Content: A threat actor claims to have leaked 145 GB of US driver licenses, passport data, ID cards with SSN, W9 forms, utility bills, and bank statements. The post contains no visible content but the thread title suggests a large-scale leak of sensitive US identity and financial documents.
    Date: 2026-04-03T04:40:41Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-145-GB-USA-DRIVER-LICENSE-PASSPORT-ID-CARD-WITH-SSN-W9-BILL-UTINITY-BANK-STATEME
    Screenshots:
    None
    Threat Actors: MONEYLINE
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  310. Website defacement of DP International Moving by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, with attacker XYZ, conducted a redefacement attack against DP International Movings website on April 3, 2026. This was a targeted home page defacement rather than a mass defacement campaign.
    Date: 2026-04-03T04:40:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827717
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Transportation and Logistics
    Victim Organization: DP International Moving
    Victim Site: dpintlmoving.com
  311. Website defacement of e-loyalty.com.au by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team successfully defaced the e-loyalty.com.au website on April 3, 2026. This appears to be a redefacement incident targeting the Australian loyalty services companys homepage.
    Date: 2026-04-03T04:39:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827718
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Technology
    Victim Organization: E-Loyalty
    Victim Site: e-loyalty.com.au
  312. Website defacement of edidigital.co by XYZ/Alpha wolf team
    Category: Defacement
    Content: XYZ attacker and Alpha wolf team conducted a redefacement attack against EDI Digitals website on April 3, 2026. This represents a repeated compromise of the same target rather than an initial breach.
    Date: 2026-04-03T04:39:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827719
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Colombia
    Victim Industry: Technology/Digital Services
    Victim Organization: EDI Digital
    Victim Site: edidigital.co
  313. Website defacement of ediediting.com by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker group working with Alpha wolf team successfully defaced the EDI Editing website on April 3, 2026. This incident represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-03T04:38:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827720
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Professional Services
    Victim Organization: EDI Editing
    Victim Site: ediediting.com
  314. Website defacement of Fix My Oven by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team, attributed to attacker XYZ, conducted a redefacement attack against Australian home appliance repair service Fix My Oven on April 3, 2026. This represents a targeted single-site defacement rather than a mass campaign.
    Date: 2026-04-03T04:38:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827721
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Home Services
    Victim Organization: Fix My Oven
    Victim Site: fixmyoven.com.au
  315. Website defacement of Jyotshna Enterprises by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team successfully defaced the Jyotshna Enterprises website on April 3, 2026. This appears to be a redefacement of a previously compromised site targeting the Indian companys web presence.
    Date: 2026-04-03T04:37:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827722
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Jyotshna Enterprises
    Victim Site: jyotshnaenterprises.co.in
  316. Website defacement of Lockyer Valley Colonics by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team, with attacker XYZ, conducted a redefacement attack against Lockyer Valley Colonics healthcare website on April 3, 2026. This was a targeted single-site defacement rather than a mass attack campaign.
    Date: 2026-04-03T04:36:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827723
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Healthcare
    Victim Organization: Lockyer Valley Colonics
    Victim Site: lockyervalleycolonics.com
  317. Website defacement of Mactek Telecom by XYZ/Alpha wolf team
    Category: Defacement
    Content: XYZ attacker from Alpha wolf team successfully defaced the Mactek Telecom website on April 3, 2026. This incident was classified as a redefacement targeting the telecommunications companys homepage.
    Date: 2026-04-03T04:36:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827724
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Telecommunications
    Victim Organization: Mactek Telecom
    Victim Site: mactektelecom.com.au
  318. Website defacement of mcss.org.au by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the MCSS website on April 3, 2026. This was identified as a redefacement incident targeting the organizations homepage.
    Date: 2026-04-03T04:35:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827725
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: MCSS
    Victim Site: mcss.org.au
  319. Website defacement of Mobile Repair Central by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker group, operating as part of the Alpha wolf team, successfully defaced the Mobile Repair Central website on April 3, 2026. This incident represents a redefacement of the target, indicating the attackers either regained access or the initial compromise was not fully remediated.
    Date: 2026-04-03T04:34:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827726
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Technology/Electronics Repair
    Victim Organization: Mobile Repair Central
    Victim Site: mobilerepaircentral.com.au
  320. Website defacement of Multi Community Support Solutions by XYZ/Alpha wolf
    Category: Defacement
    Content: XYZ attacker affiliated with Alpha wolf team conducted a redefacement attack against Multi Community Support Solutions website on April 3, 2026. This was identified as a targeted home page defacement rather than a mass defacement campaign.
    Date: 2026-04-03T04:34:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827727
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Social Services
    Victim Organization: Multi Community Support Solutions
    Victim Site: multicommunitysupportsolutions…
  321. Website defacement of Pest Control First by XYZ/Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, operating under the XYZ attacker identity, successfully defaced the Pest Control First website on April 3, 2026. This appears to be a redefacement of a previously compromised target rather than an initial attack.
    Date: 2026-04-03T04:33:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827728
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Pest Control Services
    Victim Organization: Pest Control First
    Victim Site: pestcontrolfirst.com.au
  322. Website defacement of Property Shine Cleaning by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team conducted a redefacement attack against Property Shine Cleanings website on April 3rd, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-03T04:32:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827729
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Commercial Services
    Victim Organization: Property Shine Cleaning
    Victim Site: propertyshinecleaning.com.au
  323. Website defacement of topendchill.com.au by XYZ/Alpha wolf team
    Category: Defacement
    Content: The Australian website topendchill.com.au was defaced by attacker XYZ associated with the Alpha wolf team on April 3, 2026. This was identified as a redefacement targeting the sites home page.
    Date: 2026-04-03T04:32:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827730
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: topendchill.com.au
  324. Website defacement of Trinity Point Wellbeing Clinic by XYZ/Alpha wolf team
    Category: Defacement
    Content: XYZ attacker from Alpha wolf team conducted a redefacement attack against Trinity Point Wellbeing Clinics website on April 3, 2026. This was a targeted home page defacement rather than part of a mass defacement campaign.
    Date: 2026-04-03T04:31:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827731
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Trinity Point Wellbeing Clinic
    Victim Site: trinitypointwellbeingclinic.co…
  325. Website defacement of Triple S Cleaning Services by XYZ/Alpha wolf team
    Category: Defacement
    Content: XYZ attacker from Alpha wolf team conducted a redefacement of Triple S Cleaning Services website on April 3, 2026. This was a targeted home defacement rather than part of a mass defacement campaign.
    Date: 2026-04-03T04:31:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827732
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Cleaning Services
    Victim Organization: Triple S Cleaning Services
    Victim Site: triplesrcleaningservices.com.au
  326. Website defacement of Bolivian government portal by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, represented by attacker XYZ, successfully defaced the Bolivian governments Quipus portal on April 3, 2026. The incident targeted a Linux-based government website and was archived as a single defacement rather than part of a mass campaign.
    Date: 2026-04-03T04:30:03Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248208
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Bolivia
    Victim Industry: Government
    Victim Organization: Government of Bolivia
    Victim Site: quipus.gob.bo
  327. Website defacement of hyhysmile.com intranet by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker from Alpha wolf team successfully defaced the internal intranet portal of hyhysmile organization on April 3, 2026. The attack targeted a Linux-based server hosting the companys intranet infrastructure.
    Date: 2026-04-03T04:29:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248209
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: hyhysmile
    Victim Site: intranet.hyhysmile.com
  328. Mass defacement campaign by Alpha wolf team targeting Australian garden services website
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, conducted a mass defacement campaign targeting multiple websites including an Australian garden services company. This incident was part of a broader mass defacement operation rather than a targeted attack on the specific organization.
    Date: 2026-04-03T04:29:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248210
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Professional Services
    Victim Organization: 7 Days Garden Services
    Victim Site: 7daysgardenservices.com.au
  329. Mass website defacement targeting Australian landscaping company by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement campaign targeting multiple websites including an Australian landscaping and concrete services company. The attack was executed by attacker XYZ as part of a broader mass defacement operation on April 3, 2026.
    Date: 2026-04-03T04:28:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248211
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Construction/Landscaping
    Victim Organization: ASAP Landscape Concrete
    Victim Site: asaplandscapeconcrete.com.au
  330. Mass website defacement by Alpha wolf team targeting dpintlmoving.com
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting multiple websites including DP International Movings website. The attack was carried out by attacker XYZ as part of a broader mass defacement operation on April 3, 2026.
    Date: 2026-04-03T04:28:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248212
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Transportation/Moving Services
    Victim Organization: DP International Moving
    Victim Site: dpintlmoving.com
  331. Mass defacement targeting e-loyalty.com.au by XYZ/Alpha wolf team
    Category: Defacement
    Content: Mass defacement attack conducted by XYZ attacker from Alpha wolf team targeting e-loyalty.com.au on April 3, 2026. The incident was part of a broader mass defacement campaign rather than a targeted single-site attack.
    Date: 2026-04-03T04:28:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248213
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Technology/Marketing
    Victim Organization: E-Loyalty
    Victim Site: e-loyalty.com.au
  332. Website defacement of edidigital.co by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker from Alpha wolf team successfully defaced the EDI Digital website on April 3, 2026. The incident was archived and mirrors are available showing evidence of the compromise.
    Date: 2026-04-03T04:27:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248214
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Colombia
    Victim Industry: Technology
    Victim Organization: EDI Digital
    Victim Site: edidigital.co
  333. Mass defacement by Alpha wolf group targeting ediediting.com
    Category: Defacement
    Content: Alpha wolf group conducted a mass defacement campaign targeting ediediting.com and potentially other websites. The attack was part of a broader defacement operation rather than targeting this specific editing services company.
    Date: 2026-04-03T04:27:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248215
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Professional Services
    Victim Organization: EDI Editing
    Victim Site: ediediting.com
  334. Mass defacement campaign by Alpha wolf team targeting fixmyoven.com.au
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting the Fix My Oven website as part of a broader attack affecting multiple sites. The incident occurred on April 3, 2026, with the attacker identified as XYZ from the Alpha wolf group.
    Date: 2026-04-03T04:27:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248216
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Consumer Services
    Victim Organization: Fix My Oven
    Victim Site: fixmyoven.com.au
  335. Mass defacement campaign by Alpha wolf team targeting Jyotshna Enterprises
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting multiple websites including Jyotshna Enterprises. The attack was executed by attacker XYZ on April 3, 2026, affecting a Linux-based web server.
    Date: 2026-04-03T04:26:50Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248217
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Jyotshna Enterprises
    Victim Site: jyotshnaenterprises.co.in
  336. Mass defacement campaign by Alpha wolf team targeting lockyervalleycolonics.com
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting multiple websites including lockyervalleycolonics.com on April 3, 2026. The attack was attributed to attacker XYZ as part of a broader mass defacement operation rather than a targeted attack on the specific healthcare organization.
    Date: 2026-04-03T04:26:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248218
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Healthcare
    Victim Organization: Lockyer Valley Colonics
    Victim Site: lockyervalleycolonics.com
  337. Mass website defacement of Mactek Telecom by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, conducted a mass defacement campaign targeting multiple websites including Australian telecommunications company Mactek Telecom on April 3, 2026.
    Date: 2026-04-03T04:26:06Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248219
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Telecommunications
    Victim Organization: Mactek Telecom
    Victim Site: mactektelecom.com.au
  338. Mass defacement campaign by Alpha wolf team targeting mcss.org.au
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement campaign targeting mcss.org.au on April 3rd, 2026. This was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-03T04:25:45Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248220
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mcss.org.au
  339. Mass defacement targeting mobile repair services by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team, attributed to attacker XYZ, conducted a mass defacement campaign targeting multiple websites including Mobile Repair Centrals Australian website on April 3, 2026. This attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-03T04:25:25Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248221
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Technology Services
    Victim Organization: Mobile Repair Central
    Victim Site: mobilerepaircentral.com.au
  340. Mass defacement targeting Australian community support organization by Alpha wolf team
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting Multi Community Support Solutions, an Australian social services organization. The attack was part of a broader mass defacement operation rather than a targeted attack on this specific organization.
    Date: 2026-04-03T04:25:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248222
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Social Services
    Victim Organization: Multi Community Support Solutions
    Victim Site: multicommunitysupportsolutions.com.au
  341. Mass defacement campaign by Alpha wolf team targeting Australian pest control website
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, conducted a mass defacement campaign targeting pestcontrolfirst.com.au on April 3, 2026. This incident was part of a broader mass defacement operation rather than a targeted attack on the specific organization.
    Date: 2026-04-03T04:24:40Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248223
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Pest Control Services
    Victim Organization: Pest Control First
    Victim Site: pestcontrolfirst.com.au
  342. Mass website defacement targeting Australian cleaning company by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement attack targeting Property Shine Cleanings website in Australia. The incident was part of a broader mass defacement campaign rather than a targeted attack on the specific organization.
    Date: 2026-04-03T04:24:20Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248224
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Cleaning Services
    Victim Organization: Property Shine Cleaning
    Victim Site: propertyshinecleaning.com.au
  343. Mass website defacement campaign by Alpha wolf team targeting topendchill.com.au
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, conducted a mass defacement campaign on April 3, 2026, targeting topendchill.com.au among other websites. This incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-03T04:24:01Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248225
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Top End Chill
    Victim Site: topendchill.com.au
  344. Alleged sale of USA Police Tipline Database containing 8.3 million records
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 8.3 million records from USA/Canada police tiplines, including anonymous crime tips, personal identifiers like SSNs, addresses, and phone numbers. The data is allegedly from P3Global/CrimeStoppers and being offered for $10,000 in cryptocurrency.
    Date: 2026-04-03T04:23:55Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-USA-Police-Tipline-Database-8mil
    Screenshots:
    None
    Threat Actors: iym
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: P3Global / CrimeStoppers
    Victim Site: Unknown
  345. Mass website defacement campaign by Alpha wolf team targeting Trinity Point Wellbeing Clinic
    Category: Defacement
    Content: Alpha wolf team conducted a mass defacement campaign targeting multiple websites including Trinity Point Wellbeing Clinics website on April 3, 2026. The attack was attributed to attacker XYZ and affected the Australian healthcare providers online presence.
    Date: 2026-04-03T04:23:36Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248226
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Healthcare
    Victim Organization: Trinity Point Wellbeing Clinic
    Victim Site: trinitypointwellbeingclinic.com.au
  346. Mass defacement targeting cleaning services website by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement attack targeting multiple websites including Triple SR Cleaning Services website in Australia. The attack was attributed to attacker XYZ and occurred as part of a broader mass defacement campaign rather than a targeted attack on the specific organization.
    Date: 2026-04-03T04:23:15Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248227
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Australia
    Victim Industry: Cleaning Services
    Victim Organization: Triple SR Cleaning Services
    Victim Site: triplesrcleaningservices.com.au
  347. Website defacement of adulteducation.voloka.org by XYZ/Alpha wolf team
    Category: Defacement
    Content: The threat actor XYZ from the Alpha wolf team successfully defaced the adult education website adulteducation.voloka.org on April 3, 2026. The attack targeted a Linux-hosted educational platform.
    Date: 2026-04-03T04:22:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248228
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: adulteducation.voloka.org
  348. Mass defacement campaign by Alpha wolf team targeting Ukrainian websites
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement campaign targeting multiple Ukrainian websites including bunchuk.com.ua on April 3, 2026. The attack was part of a coordinated mass defacement operation rather than targeting a single site.
    Date: 2026-04-03T04:22:34Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248229
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bunchuk.com.ua
  349. Mass defacement campaign by Alpha wolf (XYZ) targeting destin-project.info
    Category: Defacement
    Content: The Alpha wolf team conducted a mass defacement campaign on April 3, 2026, compromising destin-project.info along with multiple other websites. The attack targeted a Linux-based server as part of a broader coordinated defacement operation.
    Date: 2026-04-03T04:22:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248230
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Destin Project
    Victim Site: destin-project.info
  350. Mass defacement targeting Ukrainian organization by Alpha wolf (XYZ)
    Category: Defacement
    Content: The Alpha wolf team (attacker XYZ) conducted a mass defacement campaign targeting the Ukrainian regional dialogue organizations website. This incident was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-03T04:21:47Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248231
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Ukraine
    Victim Industry: Non-profit/Civil Society
    Victim Organization: Regio Dialogue
    Victim Site: www.regiodialogue.org.ua
  351. Mass defacement campaign by Alpha wolf team member XYZ targeting tvoryty.com
    Category: Defacement
    Content: A mass defacement attack was conducted by attacker XYZ from the Alpha wolf team against tvoryty.com on April 3, 2026. The incident was part of a larger mass defacement campaign targeting multiple websites simultaneously.
    Date: 2026-04-03T04:21:23Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248232
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tvoryty.com
  352. Alleged Data Leak of Centenaria y Benemérita Escuela Normal para Profesores Student/Applicant Records
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked personal data from the Centenaria y Benemérita Escuela Normal para Profesores, a Mexican teachers college. The leaked data allegedly includes full names, paternal and maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, sex, age, CURP (Clave Única de Registro de Población — Mexican national ID), UID, application folio and status, birth entity, nationality, school ID, SIGED school key, school record key, school name, indigenous language status, disability status, and financial aid amounts received.
    Date: 2026-04-03T04:02:30Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/90
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Centenaria y Benemérita Escuela Normal para Profesores
    Victim Site: Unknown
  353. Alleged Data Leak of Escuela Normal del Estado de Querétaro Andrés Student Records
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from the Centenaria y Benemérita Escuela Normal del Estado de Querétaro Andrés, a Mexican teacher training institution. The leaked data allegedly contains full names (paternal and maternal surnames), landline and mobile phone numbers, dates of birth, Gmail addresses, gender, age, CURP (unique population registry code), UID, application folio, application status, birth entity, nationality, school ID, SIGED school key, school record key, school name, indigenous language status, disability status, and financial aid information.
    Date: 2026-04-03T03:58:37Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/88
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Centenaria y Benemérita Escuela Normal del Estado de Querétaro Andrés
    Victim Site: Unknown
  354. Alleged Data Leak of Centenaria Escuela Normal del Estado Ignacio Manuel Altamirano by MagoSpeak
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from Centenaria Escuela Normal del Estado Ignacio Manuel Altamirano, a Mexican state normal school. The leaked data allegedly contains extensive PII including full names, paternal and maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, sex, age, CURP (Clave Única de Registro de Población), UID, application folio and status, birth entity, nationality, school ID, SIGED school key, school record key, school name, indigenous language status, disability status, and financial information.
    Date: 2026-04-03T03:56:20Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/86
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Centenaria Escuela Normal del Estado Ignacio Manuel Altamirano
    Victim Site: Unknown
  355. Alleged Data Leak of Benemérita y Centenaria Escuela Normal Oficial de Guanajuato (Mexico)
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from the Benemérita y Centenaria Escuela Normal Oficial de Guanajuato, a teacher training institution in Guanajuato, Mexico. The leaked data allegedly includes full names, paternal and maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, gender, age, CURP (national ID), UID, application folio and status, birth entity, nationality, school ID, SIGED school key, academic record key, school name, indigenous language status, disability status, and financial information.
    Date: 2026-04-03T03:53:47Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/84
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Benemérita y Centenaria Escuela Normal Oficial de Guanajuato
    Victim Site: Unknown
  356. Alleged Data Leak of Benemérito Instituto Normal del Estado General Juan Crisóstomo Bonilla by MagoSpeak
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from the Benemérito Instituto Normal del Estado General Juan Crisóstomo Bonilla, a Mexican state normal school. The leaked data allegedly contains full names (paternal and maternal surnames), fixed and mobile phone numbers, dates of birth, Gmail addresses, gender, age, CURP (Clave Única de Registro de Población – Mexican national ID), UID, application folio and status, birth entity, nationality, school campus identifiers (ID Plantel, Clave SIGED), school record keys, indigenous language status, disability status, and financial aid information.
    Date: 2026-04-03T03:49:35Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/82
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Benemérito Instituto Normal del Estado General Juan Crisóstomo Bonilla
    Victim Site: Unknown
  357. Alleged leak of gaming and streaming platform credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 4.8 million credentials allegedly targeting gaming and streaming platforms. The data is being distributed via a Mega file sharing link.
    Date: 2026-04-03T03:34:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70874/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Unknown
    Victim Industry: Gaming and Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  358. Alleged data breach of Vietnamese telecommunications infrastructure
    Category: Data Breach
    Content: Indonesian hacktivist group Sadboy Cyber Team claims to have breached Vietnamese telephone infrastructure, allegedly obtaining 80 million phone records and 70 million voice recordings totaling 34GB. The group is selling the database for $160 and threatening further leaks if the Vietnamese government does not address their demands regarding Vietnamese citizens in Indonesia.
    Date: 2026-04-03T03:23:09Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-80-Million-Vietnamese-Telephone-Line-Database–72135
    Screenshots:
    None
    Threat Actors: SCTH
    Victim Country: Vietnam
    Victim Industry: Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown
  359. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor leaked 2,500 alleged valid Hotmail credentials through a free MediaFire download link.
    Date: 2026-04-03T03:02:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70873/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  360. Alleged leak of Yahoo credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 416,208 credentials allegedly from Yahoo users across mixed countries via a file sharing platform.
    Date: 2026-04-03T02:42:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70872/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  361. Alleged defacement of hehindia.in by MANGSZXPLOIT
    Category: Defacement
    Content: A threat actor operating under the handle MANGSZXPLOIT claims to have defaced the website hehindia.in. The defacement message credits multiple groups including DREAM HACK, SILENT ERROR SYSTEM, ORDER 403, DEFACER INDONESIA TEAM, BABAYO ERROR SYSTEM, AN0NM_GH0ST_TR4CK, and PASKO CYBER REXOR, suggesting a coordinated or affiliated Indonesian hacktivist operation.
    Date: 2026-04-03T02:41:39Z
    Network: telegram
    Published URL: https://t.me/c/3841736872/247
    Screenshots:
    None
    Threat Actors: MANGSZXPLOIT
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: HEH India
    Victim Site: hehindia.in
  362. Website defacement of Pertamina by redayourfav
    Category: Defacement
    Content: Indonesian state-owned oil and gas company Pertaminas website was defaced by threat actor redayourfav on April 3, 2026. The attack targeted a search page on the companys primary domain.
    Date: 2026-04-03T02:36:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827709
    Screenshots:
    None
    Threat Actors: redayourfav
    Victim Country: Indonesia
    Victim Industry: Energy
    Victim Organization: Pertamina
    Victim Site: pertamina.com
  363. Website defacement of himla.com by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR successfully defaced himla.com on April 3, 2026, targeting a customer address page on the website. The defacement was documented and archived on zone-xsec.com mirror service.
    Date: 2026-04-03T02:30:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827609
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Himla
    Victim Site: himla.com
  364. Website defacement of infshop.hu by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the Hungarian e-commerce website infshop.hu on April 3, 2026, targeting what appears to be a customer address page within the sites media directory.
    Date: 2026-04-03T02:29:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827618
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Hungary
    Victim Industry: E-commerce
    Victim Organization: Infshop
    Victim Site: infshop.hu
  365. Website defacement of kolborstar-gomes.se by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Swedish website kolborstar-gomes.se on April 3, 2026. The incident was documented as a single-target defacement with no apparent political motivation or mass campaign involvement.
    Date: 2026-04-03T02:28:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827625
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kolborstar-gomes.se
  366. Website defacement of karmybrit.pl by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of karmybrit.pl on April 3, 2026. This was an isolated defacement incident targeting a single page rather than a mass or home page defacement.
    Date: 2026-04-03T02:28:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827628
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: karmybrit.pl
  367. Website defacement of Kerashop by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the Kerashop e-commerce website on April 3, 2026, targeting a customer management section of the Dutch online retailers platform.
    Date: 2026-04-03T02:27:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827629
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: E-commerce
    Victim Organization: Kerashop
    Victim Site: kerashop.nl
  368. Website defacement of lagarza.eu by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against lagarza.eu on April 3, 2026. The attack targeted a specific subdirectory containing customer address data.
    Date: 2026-04-03T02:27:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827631
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: lagarza.eu
  369. Website defacement of Measurement Solutions Inc by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the website of Measurement Solutions Inc on April 3rd, 2026. The defacement targeted a single page rather than the homepage and was not part of a mass campaign.
    Date: 2026-04-03T02:26:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827643
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology/Engineering Services
    Victim Organization: Measurement Solutions Inc
    Victim Site: measurementsolutionsinc.com
  370. Website defacement of meushot.com.br by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Brazilian website meushot.com.br on April 3, 2026. The attack targeted a specific page within the media/customer directory rather than the homepage.
    Date: 2026-04-03T02:26:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827648
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: meushot.com.br
  371. Website defacement of pessere.com by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the pessere.com website on April 3, 2026, targeting a specific customer management page within the sites media directory.
    Date: 2026-04-03T02:25:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827660
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Pessere
    Victim Site: pessere.com
  372. Website defacement of brander.technology subdomain by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdomain of brander.technology on April 3, 2026. The attack targeted a specific page rather than the main website and was not part of a mass defacement campaign.
    Date: 2026-04-03T02:24:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827676
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Brander Technology
    Victim Site: rost.m2.brander.technology
  373. Website defacement of shondo.vn by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the shondo.vn website on April 3, 2026, targeting a customer address page. This was an individual defacement incident rather than a mass defacement campaign.
    Date: 2026-04-03T02:24:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827681
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: shondo.vn
  374. Website defacement of Stack Systems by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the Stack Systems website on April 3, 2026. This was a targeted single-site defacement rather than a mass attack or redefacement.
    Date: 2026-04-03T02:23:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827682
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Technology
    Victim Organization: Stack Systems
    Victim Site: stack-systems.fr
  375. Website defacement of thegioinano.com by DimasHxR
    Category: Defacement
    Content: Vietnamese website thegioinano.com was defaced by attacker DimasHxR on April 3, 2026. The defacement targeted a specific media/customer directory rather than the main homepage.
    Date: 2026-04-03T02:23:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827700
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thegioinano.com
  376. Website defacement of xero.online by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the xero.online website on April 3, 2026, targeting a customer management section of the site. This appears to be an individual attack rather than part of a coordinated campaign.
    Date: 2026-04-03T02:22:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827706
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology/Software
    Victim Organization: Xero Online
    Victim Site: xero.online
  377. Website defacement of Cavallaro by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdirectory of the Cavallaro fashion retailer website on April 3, 2026. The attack targeted a media/customer advertisement section of the Dutch companys website.
    Date: 2026-04-03T02:16:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827531
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Fashion/Retail
    Victim Organization: Cavallaro
    Victim Site: cavallaro.nl
  378. Website defacement of elektropepi.eu by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of elektropepi.eu on April 3, 2026. This was an isolated defacement incident targeting the organizations media customer section.
    Date: 2026-04-03T02:16:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827532
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Elektropepi
    Victim Site: elektropepi.eu
  379. Website defacement of bossu.co.uk by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of bossu.co.uk on April 3, 2026. This was a single-site defacement targeting the customer media section of the website.
    Date: 2026-04-03T02:15:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827533
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bossu.co.uk
  380. Website defacement of DVS Wines by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the DVS Wines website on April 3, 2026, targeting the companys media section. This appears to be an isolated defacement incident rather than part of a broader campaign.
    Date: 2026-04-03T02:15:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827534
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Food and Beverage
    Victim Organization: DVS Wines
    Victim Site: dvswines.com
  381. Website defacement of Leaderfins Russia by DimasHxR
    Category: Defacement
    Content: Individual threat actor DimasHxR defaced the Russian diving equipment manufacturer Leaderfins website on April 3, 2026. The attack targeted a specific media subdirectory rather than the main homepage.
    Date: 2026-04-03T02:14:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827535
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Russia
    Victim Industry: Manufacturing
    Victim Organization: Leaderfins Russia
    Victim Site: leaderfins-russia.ru
  382. Website defacement of rebelleftc.com by DimasHxR
    Category: Defacement
    Content: On April 3, 2026, threat actor DimasHxR successfully defaced the rebelleftc.com website, targeting a specific media customer page. The attack was carried out by a single individual rather than an organized group.
    Date: 2026-04-03T02:13:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827538
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: rebelleftc.com
  383. Website defacement of The Lounge Kuwait by DimasHxR
    Category: Defacement
    Content: On April 3, 2026, attacker DimasHxR successfully defaced theloungekwt.com, targeting what appears to be a hospitality business in Kuwait. The defacement was a single-target attack rather than part of a mass defacement campaign.
    Date: 2026-04-03T02:13:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827540
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Kuwait
    Victim Industry: Hospitality
    Victim Organization: The Lounge Kuwait
    Victim Site: theloungekwt.com
  384. Website defacement of UK Flooring Sale by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the UK Flooring Sale e-commerce website on April 3, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-03T02:12:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827542
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: UK Flooring Sale
    Victim Site: ukflooringsale.co.uk
  385. Alleged Data Leak of Benemérita y Centenaria Escuela Normal del Estado de San Luis Potosí
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from the Benemérita y Centenaria Escuela Normal del Estado de San Luis Potosí (a teacher training institution in San Luis Potosí, Mexico). The leaked data allegedly includes full names, paternal and maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, sex, age, CURP (unique population registry code), UID, application folio, application status, birth entity, nationality, school ID, SIGED school key, school enrollment key, school name, indigenous language status, disability status, and financial aid information.
    Date: 2026-04-03T02:10:24Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/80
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Benemérita y Centenaria Escuela Normal del Estado de San Luis Potosí
    Victim Site: Unknown
  386. Alleged malware campaign abusing Claude Code leak to distribute Vidar infostealer via fake GitHub repositories
    Category: Malware
    Content: Threat actors are creating fake GitHub repositories impersonating Claude Code to lure users into downloading malicious files. Once executed, the files install the Vidar information-stealing malware. The campaign continuously changes tactics and appears in search results to maximize victim reach, highlighting risks of downloading from unofficial sources.
    Date: 2026-04-03T02:08:18Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20919
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  387. Alleged Data Leak of Benemérita y Centenaria Escuela Normal del Estado de Durango
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from the Benemérita y Centenaria Escuela Normal del Estado de Durango (a teacher training institution in Durango, Mexico). The leaked data allegedly includes full names, paternal and maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, sex, age, CURP (national ID), UID, application folio and status, birth entity, nationality, school ID, SIGED school key, school record key, institution name, indigenous language status, disability status, and financial aid information.
    Date: 2026-04-03T02:06:35Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/78
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Benemérita y Centenaria Escuela Normal del Estado de Durango
    Victim Site: Unknown
  388. Alleged data breach of Xiamen Tungsten Co., Ltd.
    Category: Data Breach
    Content: Threat actor claims to have compromised Xiamen Tungsten Co., Ltd. infrastructure and is distributing over 160GB of SQL database backups containing R&D data, ERP systems, HR records, financial information, manufacturing data, and government relations records.
    Date: 2026-04-03T02:05:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Xiamen-Tungsten-Co-XTC-Full-Infrastructure-Dump-2026–72130
    Screenshots:
    None
    Threat Actors: Moneyistime
    Victim Country: China
    Victim Industry: Mining and Manufacturing
    Victim Organization: Xiamen Tungsten Co., Ltd.
    Victim Site: Unknown
  389. Alleged data breach of JPMorgan Securities Thailand
    Category: Data Breach
    Content: Threat actor claims to possess a database containing 2.1 million records from JPMorgan Securities Thailand, including customer names, mobile numbers, gender, ID numbers, and securities firm information. The actor is soliciting buyers through Telegram contact.
    Date: 2026-04-03T02:05:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-JPMorgan-Securities-Thailand-Stocks-2100000
    Screenshots:
    None
    Threat Actors: globalData1
    Victim Country: Thailand
    Victim Industry: Financial Services
    Victim Organization: JPMorgan Securities Thailand
    Victim Site: Unknown
  390. Alleged sale of US car owner database containing drivers license and personal information
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 4.8 million US car owner records with drivers license information, personal details including names, emails, phone numbers, SSNs, dates of birth, addresses, and IP addresses. Sample data from North Carolina residents is provided as verification.
    Date: 2026-04-03T02:05:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-USA-car-owner-driver-s-license-and-ID-card-4800000
    Screenshots:
    None
    Threat Actors: dataPenetrationA
    Victim Country: United States
    Victim Industry: Government/Motor Vehicle Department
    Victim Organization: Unknown
    Victim Site: Unknown
  391. Alleged leak of National Public Data (NPD) database
    Category: Data Leak
    Content: Threat actor shared a magnet link providing free access to the NPD (National Public Data) database, criticizing others who were charging for the same data. The leak appears to be distributed via torrent with password protection.
    Date: 2026-04-03T02:05:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Full-NPD
    Screenshots:
    None
    Threat Actors: randomddos
    Victim Country: United States
    Victim Industry: Data Services
    Victim Organization: National Public Data
    Victim Site: Unknown
  392. Alleged data breach involving Indian stock market investors
    Category: Data Breach
    Content: Thread indicates potential compromise of Indian stock market investor data affecting 2.4 million records. No post content available for verification of claims or additional details.
    Date: 2026-04-03T02:04:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Indian-stock-market-investors-securities-2400K
    Screenshots:
    None
    Threat Actors: globalData1
    Victim Country: India
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  393. Alleged leak of Stripe payment processing data
    Category: Data Leak
    Content: A threat actor shared what appears to be a Stripe live API key along with payment transaction data including customer billing details, payment methods, and transaction histories. The leaked data contains information for transactions processed through ZAYON WOODEN WATCHES merchant account.
    Date: 2026-04-03T02:03:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-stripe-key-and-partial-info
    Screenshots:
    None
    Threat Actors: polrbearagainblud
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Stripe
    Victim Site: stripe.com
  394. Alleged promotion of HellsKey OSINT framework for dark web intelligence gathering
    Category: Initial Access
    Content: Threat actor promotes HellsKey Breach, an advanced OSINT tool for gathering intelligence from dark web sources including domains, credentials, and network reconnaissance. The tool offers subscription-based access to unobfuscated sensitive data through Telegram channels and dark web sites.
    Date: 2026-04-03T02:03:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-HellsKey-Breach-%E2%80%93-Elite-OSINT-Framework
    Screenshots:
    None
    Threat Actors: hellskeybreach
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  395. Alleged Data Leak of Benemérita y Centenaria Escuela Normal de Jalisco by MagoSpeak
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked personal data from the Benemérita y Centenaria Escuela Normal de Jalisco, a teacher training institution in Jalisco, Mexico. The leaked data allegedly includes full names, paternal and maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, gender, age, CURP (Clave Única de Registro de Población), UID, application folio and status, birth entity, nationality, school ID, SIGED school key, school record key, school name, indigenous language status, disability status, and financial aid information.
    Date: 2026-04-03T01:49:18Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/75
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Benemérita y Centenaria Escuela Normal de Jalisco
    Victim Site: Unknown
  396. Website defacement of levelinaja.com by ARJUN-X001/KEJE ARMY
    Category: Defacement
    Content: ARJUN-X001 from the KEJE ARMY group successfully defaced the levelinaja.com website on April 3, 2026. This was a single home page defacement rather than a mass attack.
    Date: 2026-04-03T01:44:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827530
    Screenshots:
    None
    Threat Actors: ARJUN-X001, KEJE ARMY
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: levelinaja.com
  397. Alleged data leak of Benemérita Universidad Autónoma de Puebla (BUAP) student records
    Category: Data Leak
    Content: Threat actor MagoSpeak claims to have leaked data from the Benemérita Universidad Autónoma de Puebla (BUAP), a major Mexican public university. The leaked dataset allegedly contains extensive PII including full names, paternal/maternal surnames, landline and mobile phone numbers, dates of birth, Gmail addresses, gender, age, CURP (Clave Única de Registro de Población – Mexican national ID), UID, application folio and status, birth entity, nationality, school campus identifiers (ID Plantel, Clave SIGED), academic enrollment keys, indigenous language status, disability status, and financial aid information.
    Date: 2026-04-03T01:41:55Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/74
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Benemérita Universidad Autónoma de Puebla (BUAP)
    Victim Site: buap.mx
  398. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,993 allegedly valid Hotmail email and password combinations on a cybercrime forum. The credentials are being distributed through a Telegram channel.
    Date: 2026-04-03T01:41:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1993-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  399. North Attleboro schools hit by suspected cyberattack
    Category: Cyber Attack
    Content: According to Superintendent John Antonucci, North Attleboro schools are facing a cybersecurity incident involving unauthorized activities on its network. The nature of the activities has not been specified.
    Date: 2026-04-03T01:29:57Z
    Network: openweb
    Published URL: https://www.thesunchronicle.com/news/local_news/north-attleboro-schools-hit-by-suspected-cyberattack/article_be4c41b0-57ef-4516-9234-b03a45b08d29.html
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: North Attleboro schools
    Victim Site: naschools.net
  400. Patriot Regional Emergency Communications Center in Pepperell hit by cyberattack, affecting multiple towns
    Category: Cyber Attack
    Content: A cyberattack occurring on March 31, 2026 disrupted non-priority and commercial phone lines at the Patriot Regional Emergency Communications Center (PRECC) and public safety services of several Massachusetts municipalities. Although the 911 emergency system remained operational and no personal data breach was confirmed, authorities engaged cybersecurity experts and federal partners to contain the incident and restore services. The cities of Pepperell, Dunstable, Townsend and Groton asked citizens to use an alternative phone number for non-priority lines pending resolution of the crisis.
    Date: 2026-04-03T01:29:54Z
    Network: openweb
    Published URL: https://www.sentinelandenterprise.com/2026/04/01/patriot-regional-emergency-communications-center-in-pepperell-hit-by-cyberattack-affecting-multiple-towns/
    Screenshots:
    None
    Threat Actors:
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Patriot Regional Emergency Communications Center
    Victim Site: pepperell.ma.us
  401. Alleged sale of Hotmail combolists with inbox access across multiple countries
    Category: Combo List
    Content: A threat actor is offering Hotmail credential lists spanning multiple countries including UK, DE, JP, NL, BR, PL, ES, US, and IT. The seller claims to provide inbox searching by keyword (e.g., eBay, PSN, Amazon, Walmart, Uber, Booking, Poshmark, Alibaba, Mercari, Neosurf), and also offers valid ntlworld webmails via a private cloud infrastructure. Buyers are directed to DM for custom requests.
    Date: 2026-04-03T01:23:15Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/58954
    Screenshots:
    None
    Threat Actors: Admu
    Victim Country: Unknown
    Victim Industry: Technology / Email Services
    Victim Organization: Hotmail
    Victim Site: hotmail.com
  402. Alleged leak of private credential mix pack
    Category: Combo List
    Content: Threat actor maicolpg19 shared a private mix pack of credential logs via Mega file hosting service. The content is distributed for free with password available through a Telegram channel.
    Date: 2026-04-03T01:10:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70869/
    Screenshots:
    None
    Threat Actors: maicolpg19
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  403. Alleged leak of T-Online credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 38,479 credential lines specifically targeting the t-online.de domain. The data was shared for free download via a file hosting service.
    Date: 2026-04-03T01:10:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70870/
    Screenshots:
    None
    Threat Actors: BestCombo
    Victim Country: Germany
    Victim Industry: Telecommunications
    Victim Organization: T-Online
    Victim Site: t-online.de
  404. Website defacement of Salameh Beauty by ARJUN-X001 (KEJE ARMY)
    Category: Defacement
    Content: ARJUN-X001 from the KEJE ARMY group defaced the homepage of salamehbeauty.com on April 3, 2026. This was a single home page defacement targeting a beauty/cosmetics business website.
    Date: 2026-04-03T01:05:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/827529
    Screenshots:
    None
    Threat Actors: ARJUN-X001, KEJE ARMY
    Victim Country: Unknown
    Victim Industry: Beauty/Cosmetics
    Victim Organization: Salameh Beauty
    Victim Site: salamehbeauty.com
  405. Alleged sale of non-VBV credit card data
    Category: Data Breach
    Content: Threat actor WongL is allegedly selling fresh credit card data without VBV (Verified by Visa) protection with replacement guarantee. The actor claims 100% validity and does not offer free testing.
    Date: 2026-04-03T00:59:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70868/
    Screenshots:
    None
    Threat Actors: WongL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  406. Alleged leak of German shopping credentials
    Category: Combo List
    Content: A threat actor leaked a combolist containing 617,266 credential entries allegedly targeting German shopping websites. The data was shared as a free download via a file-sharing platform.
    Date: 2026-04-03T00:27:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70867/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  407. Alleged distribution of stolen credentials via stealer logs
    Category: Logs
    Content: Threat actor UP_DAISYCLOUD distributed 5,610 stealer logs containing stolen credentials for free download via cloud storage, claiming daily uploads of fresh stolen data.
    Date: 2026-04-03T00:16:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5610-LOGS-CLOUD-%E2%98%81-01-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  408. Alleged account compromise and data exfiltration targeting Telegram user @Songokukakarotooficiall
    Category: Cyber Attack
    Content: Threat groups CASH COL and IRON ATLAS NEW GENERATION claim to have jointly compromised the Telegram account of user @Songokukakarotooficiall, allegedly due to their use of Henxx tools. The actors claim to have exfiltrated all messages, files, photos, hidden documents, and contact/network data. The post is written in Spanish and signed by @IMPORT_404. The stolen data is described as being archived and publicly exposed.
    Date: 2026-04-03T00:10:39Z
    Network: telegram
    Published URL: https://t.me/c/3518294966/58
    Screenshots:
    None
    Threat Actors: CASH COL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  409. Alleged leak of 9.3 million credential combinations targeting multiple sectors
    Category: Combo List
    Content: Threat actor distributes a combolist containing 9.3 million email and password combinations through Telegram channels, targeting government services, social networks, streaming platforms, gaming services, and other online platforms.
    Date: 2026-04-03T00:07:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/70865/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple sectors
    Victim Organization: Unknown
    Victim Site: Unknown
  410. Alleged Leak of GitHub Personal Access Token and Cisco IT Splunk Query by ShinyHunters
    Category: Data Breach
    Content: ShinyHunters posted a GitHub Personal Access Token (ghp_798fnSquvZ4IrZUiTPoin61nsbDL0x2cxpJ1) along with its base64-hashed equivalent and a Splunk query targeting a Cisco IT GitHub audit log index (ds-github). The query filters for non-US actor locations and extracts IP addresses, actions, repository names, user agents, and hashed tokens. The tag #speedboat67 may indicate an internal operation or campaign identifier. This suggests potential compromise of Ciscos GitHub environment or insider access being leveraged for reconnaissance.
    Date: 2026-04-03T00:02:33Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/639
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco
    Victim Site: Unknown