[April-5-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This comprehensive threat intelligence report details a concentrated wave of cybersecurity incidents that occurred primarily between April 5 and April 6, 2026. The threat landscape during this period was characterized by a massive volume of website defacements, the distribution of billions of compromised credentials via combo lists, high-profile corporate and government data breaches, and the sale of sophisticated malware and initial access vectors.

The data indicates a highly active cybercriminal ecosystem operating across the open web and Telegram networks. The most prolific activity was driven by hacktivist and defacement groups, particularly the “Umbra Community,” which executed dozens of targeted defacements and redefacements across multiple global sectors. Simultaneously, notorious data breach groups such as “ShinyHunters” targeted major financial and governmental institutions, demanding ransoms and leaking terabytes of sensitive information. Furthermore, the underground economy thrived on the mass distribution of combo lists, with actors like “Leak Realm” and “VitVit” sharing lists containing hundreds of millions to billions of credential records.

This report provides a granular analysis of the threat actors involved, the attack vectors utilized, the targeted industries, and the geographical distribution of the victims, concluding with a summary of the evolving threat landscape based strictly on the detected incidents.


2. Scope and Methodology

This report is strictly based on a provided dataset of detected cyber incidents, encompassing raw intelligence drafts detailing events logged on April 5 and April 6, 2026. The methodology for this report involves the systematic categorization and analysis of these events based on several key indicators:

  • Threat Actor Profiling: Identifying and linking activities to specific threat actors and groups.
  • Attack Categorization: Classifying incidents into categories such as Defacement, Combo List distribution, Data Leaks, Data Breaches, Malware deployment, and Initial Access sales.
  • Victimology: Analyzing the targeted industries (e.g., Healthcare, Education, Financial Services) and the specific organizations affected.
  • Geographical Impact: Assessing the countries targeted by these cyber operations.
  • Network Intelligence: Documenting the platforms used for illicit activities, primarily dividing between the “openweb” (including cybercrime forums) and encrypted messaging applications like “telegram”.

3. Threat Actor Landscape and Profiling

The analyzed dataset reveals a diverse ecosystem of threat actors, ranging from script kiddies and defacement teams to sophisticated ransomware operators and initial access brokers.

3.1 The Defacement Collectives

A significant portion of the recorded incidents constitutes website defacements. These attacks were largely dominated by a few highly active collectives.

Umbra Community (Actor: Nicotine) The Umbra Community, specifically an actor using the alias “Nicotine,” was the most prolific entity in the dataset. Their operations heavily targeted WordPress installations and theme directories. A defining characteristic of Nicotine’s methodology is the “redefacement” of targets—compromising websites that had already been previously attacked, indicating either incomplete remediation by the victims or persistent backdoor access established by the threat actor. Nicotine’s targets were geographically and sectorally diverse, including:

  • Brazil: tiocaio.com.br (Defacement) , AMG Despachante (Professional Services) , Desentupidora Roto Master (Commercial Services) , jjacalhas.com.br , Loc Soluções , Reboque de Lima (Transportation) , Reinert SC.
  • India: dmkengwing.in , pharmaclowd.in (Healthcare) , skyartcgs.in , Agrawal Industries (Manufacturing) , Arpan Engineers (Engineering) , Discovery Lane Academy (Education) , Garg Ayurveda (Healthcare) , Mercury Lock India (Manufacturing) , QuickMark , Scintillate Playway School (Education) , The Creative School Aligarh , Vastu Vida Jaykhanna (Professional Services) , Sign Maker (Manufacturing) , Thanjavur Art Gallery (Arts and Culture).
  • United Arab Emirates: City Park Electronics (Retail) , Wilabs , Holistic OB/GYN Dubai (Healthcare) , Bosla Mortgage (Financial Services) , IT City (Technology) , IT Village (Technology) , Locksmith Dubai 24/7 (Professional Services) , jobsinabudhabi.com (Employment Services – though this was by VinzXploit, UAE was heavily targeted overall).
  • Pakistan: SpeedTech (Technology) , Greenway Healthcare , Lahore IT Solutions , Lahore Startups , Pakit Solutions , PropertyInfo (Real Estate) , Sasti Shop (E-commerce).
  • United Kingdom: myskyline.co.uk , RehabFinder (Healthcare) , ERP Solutions (Technology).
  • Other Notable Targets: Wings Wide Shipping (Transportation/Logistics) , Emynix , Alam Import Export , Red Mind Technologies (Technology) , Ekalaiva AI (Technology) , myrootstn.com (Tunisia) , Rayie Petrochemical , Skyreach Scaffolding (Construction) , I2 Real Estate , Blingua English Classes (Education) , Dhanwantari Central (Healthcare) , GK Institute , Hotel Silver Pearl (Hospitality) , Optrica Pharmaceutical , Pankaj Pharma , Rama Nursing Home , Statue Galleria , ZX Holding (Qatar, Business Services) , SchoolScaler (Education) , ATI Corporation (Bangladesh) , Insect Killer Services , HealVibe (Healthcare) , wania.com.bd (Bangladesh) , demowebsiteorganisasi.web.id (Indonesia) , energysep.com (Energy) , Sonex Branding (Marketing) , Fruit of Eden (US) , Fruit of the Spirit Cleaning , Toyinks Care Services (Healthcare) , elarashine.my.id (Malaysia) , AppTechCode (Technology) , Binzish Solutions (Technology) , DevTrixSol , Golden Wind FM (Media) , hertelaviv.com (Israel) , Jaimes Landscape Design , Kahale Properties (Real Estate) , OscarDeFi (Financial Services) , aspiredukyuan.com , Skinmed Academia (Healthcare) , Clinica Veterinaria Bylaardt , Aptive Environmental , Ecomhandler (E-commerce).

INDOHAXSEC (Actor: fidzxploit) The INDOHAXSEC group, primarily operating through the actor “fidzxploit,” engaged in widespread mass defacement campaigns. Their operations targeted Linux-based servers. Fidzxploit claimed responsibility for defacing multiple websites across different countries, often utilizing Zone-H mirrors (e.g., ID: 41673308) to archive proof of their attacks. Targets included:

  • Siva Advertising Company (boovikey.sivaadvertisingcompany.in, India).
  • heavydata.khurramumtaz.com (Pakistan).
  • Lampiao Solucoes (lp.lampiaosolucoes.com.br, Brazil).
  • hospital.spearas.com (Healthcare infrastructure).
  • heavydata.spearas.com.
  • school.spearas.com (Education).
  • BIET Bhadrak (Education, India).

Zod An actor or group identified simply as “Zod” executed extensive mass defacement campaigns, compromising multiple websites simultaneously rather than focusing on targeted, single-site breaches. These attacks largely impacted Linux-hosted platforms. Targets included:

  • skillerio.com (Technology/Education).
  • Infinia Clinic (Healthcare).
  • Housing Compare (Real Estate, India).
  • Faces by Madhuraa (Beauty/Cosmetics).
  • DigitizeLearn (Education, India).
  • digitalhackzone.com.
  • chanakyacp.com (India).
  • A Digital Galaxy (Technology).
  • sportmassage.hu (Healthcare/Wellness, Hungary).
  • Oznetshop (E-commerce).

jatengblekhet (Actor: tirz4sec) The jatengblekhet team, utilizing the actor name “tirz4sec,” focused heavily on defacing WordPress content and upload directories. Their victims included:

  • Meshkat Store (E-commerce).
  • Free-Find (Technology, UK).
  • GearOwl.
  • City of Neckarsulm (gv-neckarsulm.de, Government, Germany).
  • Mobilificio Solinas (Furniture Manufacturing, Italy).
  • niptuckpages.com.
  • Campiutti Esteves (Brazil).

CYBER ERROR SYSTEM (Actor: VinzXploit) VinzXploit from the CYBER ERROR SYSTEM team specifically targeted the “pwd.php” pages of various websites. Targets included:

  • Jobs in Abu Dhabi (Employment Services, UAE).
  • The Infopedia (Information/Media).
  • ittedi.com.
  • IT Team Corp (Information Technology).
  • Real Wealth Australia (Financial Services, Australia).

Alpha wolf (Actor: XYZ) The Alpha wolf team, via actor XYZ, targeted homepages and Linux/FreeBSD-based servers. Victims included:

  • Evervision (Technology, South Korea).
  • Aiello Engineering (Engineering).

Leviathan Perfect Hunter (Actor: Aptisme) Actor Aptisme executed targeted single-site defacements, often altering specific HTML or text files (e.g., art.txt, art.html). Targets included:

  • ALC Coaching (Professional Services).
  • Akademia Tip Top (Education, Poland).
  • Penosil (Construction/Manufacturing).
  • agentn.net.
  • World Meeting and Events.

DimasHxR Operating as a solo attacker, DimasHxR frequently targeted specific media and customer subdirectories rather than root homepages, executing numerous redefacements. Victims included:

  • HOM.
  • BusyB (UK).
  • Ragan and Massey.
  • Saucer Solutions.
  • Mardi Gras Beads For Less (Retail/E-commerce).
  • Gadget Parts (Electronics, Australia).
  • TimeToCart (E-commerce).
  • almandoos.com.
  • Venashop (E-commerce, Poland).
  • CanMedDirect (Healthcare, Canada).
  • bijurdelimon.com.
  • thisisfromroy.com.
  • BH Online Store (E-commerce).
  • Edumalls (Education).

Other Defacement Actors:

  • HackerSec.ID (Mr.Spongebob): Defaced Glicowings in Indonesia.
  • Alperen_216 (ALP): Defaced worldhorizon.cn (China), specifically targeting the wp-load.php file.
  • XSQDD PHILIPPINE (PredixorX): Defaced the Linux server of ELTS in the Philippines.
  • XmrAnonye.id (E.H.9): Defaced Vaughan Tamils, a Canadian community organization.
  • Maros Black Hat (Hiro-X): Defaced the German personal site gerhardthiel.com.
  • BABAYO EROR SYSTEM (Mr.PIMZZZXploit): Defaced multiple domains including jurnal.angkoso.my.id, ahadbinilyas.passionflip.pk, travel.skyrank.shop, shop.abbasgarments.com, thepicwall.com.pikesway.com, and marie.abbasgarments.com.
  • STORM BREAKER SECURITY (PH.BL4KE): Defaced telecommunications provider ProtonsCable.

3.2 Advanced Persistent Threats and High-Impact Breach Groups

ShinyHunters ShinyHunters operated as an advanced threat group focused on high-value data breaches, ransomware operations, and the subsequent sale or leaking of exfiltrated data. They aggressively solicited private contact via the encrypted Session messenger. Furthermore, they were heavily involved in the promotion of a new cybercrime forum, “PwnForums,” operating on both the clearnet and the Tor network, likely intended as a successor to BreachForums for hosting stolen data. ShinyHunters executed several massive corporate and government breaches, systematically leaking data when ransom demands were not met:

  • European Commission (europa.eu): Leaked over 350GB of uncompressed data, including mail server dumps, databases, contracts, and confidential documents, distributed via Tor and a direct IP.
  • Ameriprise Financial, Inc.: Exfiltrated 236GB of Salesforce records containing PII and corporate data after ransom negotiations failed, publishing the data on an onion site.
  • Infinite Campus, Inc.: Leaked 1.2GB of Salesforce records, indicating an unpaid ransom through their file naming conventions.
  • Berkadia Commercial Mortgage, LLC: Compromised and leaked 27GB of compressed Salesforce records, publishing archives explicitly named to mock the victim for not paying the ransom (e.g., “shouldve_paid_the_ransom_berkadia-shinyhunters.7z”).
  • French Ministry of Culture Subsidized Entity: Sold near-complete access to a French government entity, including Domain Admin rights with plain-text passwords, access to 1,250 Windows devices, 33 XEN servers, Google Workspace, Azure, EDR Security Center, and physical server iDRACs, exposing IDs, passports, and medical records.

ShadowByt3S This group executed a ransomware-style data breach against Starbucks, leaking 10GB of data sourced from an AWS S3 bucket after the corporation allegedly failed to meet ransom demands within a 72-hour window.

3.3 Hacktivism and Politically Motivated Groups

Handala Hack (حنظله) Handala Hack is a pro-Palestinian hacktivist group that launched severe politically motivated cyber attacks.

  • They claimed responsibility for attacking 27 Israeli companies, explicitly stating the operations were cyber retaliation for the killing of children in Minab.
  • They frequently utilized Telegram and shortened URLs to announce new leaks and operations against Israeli targets.
  • They issued formal, severe threats against the critical infrastructure (water, electricity, oil) of countries perceived as hostile to Iran or the “Resistance Axis,” claiming to have these infrastructures under complete surveillance and control, preparing for paralyzing attacks in response to actions against Iran’s energy sector.

Nasir Hacker Group (نصیر) This group claimed massive infiltration of Kuwaiti government and intelligence systems, specifically targeting the Ministry of Interior. They alleged possession of highly sensitive documents detailing Kuwait’s military and intelligence cooperation with foreign entities (including the US), threatening to publish data on officials and military personnel, and warned of further attacks on Kuwaiti infrastructure.

Z-Pentest Alliance Operating under the hashtag #OpUK, this group claimed unauthorized access to the CCTV surveillance systems of a UK hostel. They asserted control over all cameras (kitchen, entrance, hallways, exterior) and claimed access was achieved without brute force, framing the incident as a vulnerability demonstration to highlight weak security postures rather than an extortion attempt.

3.4 Data Brokers and Combolist Distributors

A vast underground economy revolved around the free distribution and sale of “Combo Lists” (combinations of usernames/emails and passwords) and “Stealer Logs” (data harvested by information-stealing malware).

Leak Realm Leak Realm was responsible for distributing astronomical volumes of credential data on cybercrime forums. Their releases included combolists of varying sizes: 7.9 million records , 11 million records , 25 million records , 60 million records , 70 million records , 129 million records , and a staggering 196 million URL:LOGIN:PASS combinations.

VitVit Actor VitVit shared the largest single credential leak in the dataset: a 100GB combolist containing 3 billion URL:Log:Pass combinations.

CODER CODER specialized in targeted combolists focusing on highly lucrative sectors, distributing them freely via Telegram channels. Their targeted lists included:

  • Gaming platforms and Spotify.
  • 12 million records targeting financial institutions like Starling Bank, Ally Bank, SoFi, Venmo, and Zelle.
  • 8 million records targeting Office 365, N26, Chime, Monzo, and cryptocurrency exchanges.
  • 15 million records targeting financial services like Stripe, Square, QuickBooks, and Xero.
  • 12 million records targeting PayPal, Wise, Revolut, Payoneer, and Cash App.
  • 17 million credentials targeting Discord, Stack Overflow, Medium, Binance, Coinbase, Trust Wallet, Reddit, GitHub, Quora, and e-commerce sites.
  • 7 million corporate credentials.
  • 12.3 million credentials for Alibaba, eBay, Lennar, CBRE, Brookfield, and Shopify.

HQcomboSpace

This actor focused on both platform-specific and geographically targeted credential leaks:

  • 1.3 million Yahoo credentials.
  • 179,363 mixed country Hotmail credentials.
  • 1.58 million mixed country Hotmail credentials.
  • 59,674 corporate email/SMTP combinations.
  • 136,052 entries targeting educational, social media, and shopping sites.
  • Massive country-specific lists targeting Germany: 1.1 million lines , 831,238 pairs , 566,368 lines , and 495,248 pairs specifically targeting German shopping websites.

CobraEgy CobraEgy operated the “Maxi_Leaks” operation, distributing high-quality, geographically targeted email:password combinations. Their leaks included:

  • New Zealand: 15,000 records.
  • Norway: 14,000 records.
  • Portugal: 45,000 records.
  • South Africa: 39,000 records.
  • Romania: 34,000 records.
  • Slovakia: 24,000 records.
  • Russia: 1.3 million records.
  • A massive 3.4 GB collection of stealer logs dated April 6, 2026.

MailAccesss

MailAccesss was a prolific distributor of fresh, verified email credentials across various jurisdictions:

  • 700,000 Hotmail credentials.
  • 1,700 fresh mixed email credentials.
  • 5,000 valid mixed email access credentials.
  • 1,700 valid Japanese email credentials.
  • 1,000 US-based email credentials.
  • 1,100 French email credentials.
  • 34,000 German email credentials with full mail access.
  • 19,000 valid corporate email credentials.
  • 1,000 valid Hotmail credentials.

Other Combolist and Log Distributors:

  • Kokos2846q: PandaCloud fresh email credentials , and 39,000 mixed email credentials via Telegram.
  • steeve75: 170,000 mixed email/password combinations.
  • Ra-Zi: 170,000 credentials targeting Netflix, Minecraft, Uplay, Steam, Hulu, Spotify; 124,000 targeted GMX email credentials.
  • tuzelity: Sold combolists and stealer logs for Hotmail, Gmail, Yahoo, Facebook, TikTok, Netflix, Amazon, etc., across the US, UK, DE, FR, CA, AU, and JP.
  • NUllSHop0X: 1,400 high-quality Hotmail credentials.
  • ValidMail: 82,000 valid forum credentials distributed multiple times.
  • FlashCloud2: 13,000 Hotmail combinations.
  • UP_DAISYCLOUD: 5,378 fresh stealer logs from April 5th.
  • WINGO: 3,000 fresh mixed credentials; 3,000 WEB.DE credentials; 9,000 mixed credentials.
  • Blackcloud: 1.1 million credential records.
  • RandomUpload: 20,000 mixed email credentials; 10,000 mixed credentials via Google Drive.
  • D4rkNetHub: Distributed Hotmail credentials across multiple dumps (2,186 , 2,408 , 1,210 ).
  • Jelooos: Hotmail lists with full verification status (600 , 2,400 mixed country , 3,400 fresh ).
  • Max_Leaks: 3.4 GB of high-quality stealer malware logs.
  • martcloud: Fresh Hotmail databases.
  • alphaxdd: Premium Hotmail credentials (3,886 , 1,421 from a private cloud , 1,220 valid ).
  • noir: Hotmail and mixed email combos via Telegram.
  • strelok639: Massive 1.3TB private database of URL/logins/passwords and browsing history.
  • erwinn91 / Steveee36: HQ Mix lists and 1,120 HQ Hotmail credentials.
  • Lexser: 4,000 mixed email credentials.
  • HollowKnight07: Sample Hotmail lists (484 , 650 ).
  • fatetraffic: 1,392 mixed stealer logs with browser data.
  • snowstormxd: Fresh Hotmail credentials via Telegram.
  • zod: WordPress-related combolists; 32,890 lines of mixed credentials via Telegram.
  • KiwiShio: 1,120 Hotmail combinations.
  • TeraCloud1: 3,000 valid mixed credentials with private cloud access via Telegram.
  • Akari21: Fresh, untouched Hotmail “drops”.
  • COYTO: 1,000 valid mixed combinations ; mixed access credentials via Pasteview.
  • NotSellerxd: 2,910 mixed email credentials.
  • klyne05: Private, fresh, checked Hotmail lists.
  • Admu: Selling themed Hotmail combolists (PayPal, eBay, Uber, Amazon, etc.) for UK, DE, JP, US, and NTLWorld webmails, with keyword inbox searching.
  • redcloud: 4,600 valid Hotmail credentials via MediaFire.
  • seainloq12: 604GB of fresh stealer logs with daily updates via Telegram.
  • Yìchén: Selling multi-platform (Hotmail, Amazon, PayPal, Netflix, PSN) lists across the US, UK, FR, DE, JP, etc., offering keyword inbox searching from a private cloud.
  • Dataxlogs: Selling mail access, configs, and scripts for France, Belgium, Australia, Canada, UK, US, etc., with custom requests.

3.5 Initial Access Brokers, Tool Developers, and Malware Operators

JINKUSU (jinkusu01)

JINKUSU operated as a sophisticated tool developer catering to financial fraud and identity theft.

  • They sold “NFC RIPPER,” an Android toolkit designed for NFC relay attacks against payment cards at POS terminals and ATMs, featuring PIN bypass, card limit bypass, and remote Python server operation.
  • They advertised deepfake and voice manipulation software (face swapping, voice changing, virtual cameras) specifically designed to bypass Know Your Customer (KYC) identity verification processes.
  • They sold the source code for “EvilNote,” a mass email sending tool for $500, enabling custom SMTP server usage, template management, and personalization.

xibulipali This actor advertised a “marketplace-as-a-service” platform—a complete infrastructure for cybercriminal activities. The platform included escrow systems, vendor management, automated verification, and listings for selling RDP/VPS access, credentials, and illegal digital products.

North Korean-linked Hackers

State-sponsored or affiliated hackers executed sophisticated campaigns:

  • They conducted a social engineering supply chain attack targeting a developer of the popular “Axios” npm package. By using fake meetings and fabricated Microsoft Teams errors, they tricked the developer into installing remote access malware, subsequently publishing malicious versions of Axios to infect downstream users and steal data.
  • They breached a cryptocurrency platform not solely via technical exploits, but through slow infiltration and social engineering to gain trust and exploit internal management processes.

NoVoice Malware Operators Actors distributed the “NoVoice” Android malware through over 50 applications on the Google Play Store, infecting an estimated 2.3 million devices. The malware exploited legacy vulnerabilities to gain root access without suspicious permissions, established persistent C2 communication, and infiltrated apps to steal data and accounts even after factory resets.

Other Initial Access Brokers and Tool Providers:

  • Threat Market: Offered comprehensive cookie/session management software for $199 via Telegram (@ThreatMarketBot) and Tor, used for account takeover, with new updates frequently announced.
  • NormalLeVrai: Sold a vulnerability for $600 affecting 38,575 website panels globally, including cPanels, SSH/WHM, SMTP, and government access points.
  • miyako: Sold an “Intermediate Cyber Operations Guide v2” for $1000, detailing methods for government access, botnets, ransomware deployment, and C2 setup, highlighting a breach of the Indonesian government.
  • Target777: Advertised lookup services on the CrackingX forum.
  • wh6ami: Sold administrative access to the Bangladesh Public Works Department’s HRIS system for $80, exposing employee, attendance, and salary data.
  • Jurak: Sold an active business PayPal account with a $30,000 balance and $19M transaction history.
  • Jax Plans Bot: Offered a security bypass tool targeting pbipsi.com.
  • NeZha CVV Support & Squad Chat Marketplace: Operated Telegram carding stores (PepeCard, AllCards, CocoCheck, @vcxdcvx, @cocococococococo1, t.me/fsdf12452) selling stolen credit cards globally starting at $1, with 75-95% validity rates and bulk CVV checking services.
  • GetRenewed: Rented virtual phone numbers from 40+ countries for SMS verification bypass, accepting Monero for anonymity.
  • lockbit: Offered US driver’s license counterfeiting services with worldwide shipping via the dark web.
  • DuperKinger123: Sold admin access to government email systems in Bulgaria, Angola, South Africa, and Nigeria, allowing unlimited account creation and intelligence access.
  • pstipwner: Sold admin access to the Brazilian Central Bank’s PSTI system for $5,000, exposing PIX certificates and internal files.
  • Nullsec Philippines: Sold web shells hosted on Brazilian government (.gov.br) domains.
  • MILNET Services: Advertised raw network infrastructure power for DDoS or offensive operations via Telegram.
  • Cyberban News: Reported on 36 malicious npm packages masquerading as Strapi plugins that executed remote access, established backdoors, and exfiltrated cryptocurrency data using Redis and PostgreSQL.

4. Specific Data Breaches and Leaks

Beyond the high-profile ShinyHunters breaches, numerous threat actors leaked or sold targeted databases.

Katarinka

This actor focused on comprehensive database dumps:

  • Consult2Bond: Leaked customer credentials, personal info, order details, passwords, and addresses.
  • vip.ithk.com: Leaked internal staff contacts, customer data, and pricing metadata across 136 records.
  • Gedeon (Poland): Leaked 489 records including user credentials and CMS content.
  • Indian Construction Industry: Leaked 26,562 records containing payment details, communications, and company profiles.
  • Tripeak Bearing: Leaked 265 records covering user credentials and activity logs.

crazyboy68

Focused on E-commerce and Education databases:

  • CustomKing (UK): Shared a 105MB SQL database dump of the online store.
  • Greenhandle.in (India): Leaked a B2B packaging customer database with business names, emails, and orders.
  • UNIFAP (Brazil): Sold a university student portal database containing MD5 password hashes, grades, and documents.
  • anhsangsoiduong.vn (Vietnam): Leaked an 800MB SQL database of user credentials.

Petro_Escobar

Targeted South American energy and financial sectors:

  • Endesa (Spain/Colombia) & EmergiaCC: Sold internal documents and 25 million records containing PII, IBAN numbers, and contact info for $200.
  • Gas Natural Vanti & GNP Grupo Nacional de Proyectos: Sold SQL databases with 10 million records covering back-office messaging and sales for $500.
  • Banco AV Villas & Conalcreditos (Colombia): Published internal databases with customer info, loan obligations, payment agreements, and collection management data.

Blastoize

  • XAM’s 316 Database Collection: Leaked 5.7 million records from gaming, automotive, and medical forums originating from RaidForums 2019.
  • Bank Pembangunan Daerah Banten (Indonesia): Claimed to possess 733,000 card details and 73,000 customer records (names, IDs, transaction details).
  • zyh365.com (China): Sold a massive 92.5 million record database from China’s national volunteer service platform, including IDs, political party affiliations, and organizational memberships.

Other Notable Breaches and Leaks:

  • Kyy: Sold 11,550 job applicant records and 478 partnership records from Nakamura Co (Indonesia).
  • ARPANET744: Shared alleged French UCAR data.
  • Angel_Batista: Doxxed a cybersecurity researcher named “Saxx”, publishing PII alongside personal attacks.
  • RainbowDF: Claimed to possess 700,000 Spanish customer records (CSV/SQL) from evolveyourenglish.com (2020-2026).
  • Databroker1: Sold 1.4 million CRM entries (PII, credentials, loyalty data) from Thai duty-free retailer King Power.
  • XZeeoneOfc: Leaked internal HR data (names, IDs, complete addresses) of 2,200 employees from Indonesian cigarette companies PT Putra Pacitan Indonesia Sejahtera and PT Tunas Mandiri.
  • Proculin: Distributed a leaked 64MB PDF of the “Internet Security Complete Manual 27th Edition 2026”.
  • phoenix_leads: Leaked a Canadian residential database with 10 million consumer records (names, addresses, phone numbers).
  • Перун Сварога: Leaked government administrative data related to the Center for Administrative Services in Ternopil, Ukraine (cnap.rada.te.ua).
  • AckLine: Sold a 21GB database from Botswana ISP PrimeTel/NConnect for $300, containing employee emails and data from 2014-2026.
  • PaskoCyberRexor / DanzNisMxst7: Distributed the TEEB Valuation Database via a Telegram channel.
  • GoRainCC: Repeatedly distributed pirated and cracked engineering software, including ConcreteBending 8.01 , CADValley InfraWizard Professional 2026 , Codemill IFC Export , CadPro Tools for AutoCAD 2026 , and CadPro Tools for Revit 2026.
  • marssepe: Leaked 640,000 personnel records from Puerto Inteligente Seguro Mexico, including CURP, RFC, social security numbers, and photos.
  • MONEYLINE: Distributed French identity documents (ID cards, passports, driver licenses) for free via Google Drive.
  • FANZIO: Operated a store selling OnlyFans account balances and adult content platform credentials.
  • Dumpsec: Sold 35 million records from French Regional Health Agencies (ARS) and over 130 hospitals (including APHP), containing detailed patient medical identifiers.
  • vexin: Sold 30.26 GB of corporate infrastructure data from Susinsumos.com for $500, including payroll, tax documents, and server backups.
  • uhqboyz: Leaked 3,312,785 records from the French entity BourseDesVols.
  • SnowSoul: Leaked 100GB of financial processing data from Summit USA, including ACH databases, payment settlements, and bank affiliate info.
  • AleDelRey: Leaked 85,000 customer records from an Italian tax and legal portal.
  • Rakyat Digital Crew: Leaked the Mitra Husada University (UPPM) database, exposing admin credentials (including an easily crackable MD5 hash for the password “admin”).
  • hannisonntag / LegioNLeakeRs: Shared URL, login, and password data on xforums.

5. Geographical Impact Analysis

The recorded incidents demonstrate a globally distributed attack surface, with distinct clusters of activity in several key regions.

  • United States: Experienced high-impact breaches affecting major corporations and financial institutions. ShinyHunters compromised Ameriprise Financial , Infinite Campus , and Berkadia Commercial Mortgage. ShadowByt3S successfully extorted Starbucks, leaking 10GB of AWS data. Furthermore, 100GB of Summit USA financial data was leaked , and malicious actors actively sold US driver’s license counterfeits and compromised US PayPal accounts. Defacements also impacted US domains like Fruit of Eden.
  • India: A major focal point for website defacements and data leaks. The Umbra Community and INDOHAXSEC heavily targeted Indian domains across manufacturing, education, and professional services (e.g., dmkengwing.in , Agrawal Industries , Discovery Lane Academy , Siva Advertising Company , BIET Bhadrak ). Additionally, a significant breach exposed 26,562 records from the Indian Construction Industry and B2B marketplace Greenhandle.in.
  • Brazil: Heavily targeted by the Umbra Community (Nicotine) and jatengblekhet (tirz4sec) for defacements, affecting tiocaio.com.br , AMG Despachante , Reboque de Lima , and Campiutti Esteves. More critically, high-level administrative access to the Central Bank of Brazil’s PSTI system was sold , alongside the sale of .gov.br web shells. A university database (UNIFAP) was also breached.
  • France: Suffered critical government and healthcare breaches. ShinyHunters compromised a Ministry of Culture subsidized entity, gaining domain admin access and exposing medical/passport data. A massive 35 million record healthcare breach impacted French Regional Health Agencies (ARS) and over 130 hospitals. French identity documents were leaked for free , along with 3.3 million BourseDesVols records.
  • Indonesia: Impacted by targeted data breaches including the sale of Bank Pembangunan Daerah Banten card details , Nakamura Co applicant records , and PT Putra Pacitan cigarette company HR data. The Mitra Husada University (UPPM) portal was breached exposing admin credentials. Defacements affected domains like demowebsiteorganisasi.web.id and Glicowings.
  • United Arab Emirates: Retail, technology, and service providers were targeted by Umbra Community defacements (City Park Electronics , Bosla Mortgage , IT City , Locksmith Dubai , Jobs in Abu Dhabi ).
  • Pakistan: Experienced targeted defacements by Nicotine against domestic IT and real estate sectors (SpeedTech , Lahore IT Solutions , PropertyInfo ).
  • Germany: Extensively targeted for credential harvesting, with HQcomboSpace and others distributing massive German-specific combolists (over 1.1 million , 831k , and 495k records). Defacements hit the City of Neckarsulm government site.
  • Colombia: Severe financial and utility breaches by Petro_Escobar, leaking millions of records from Banco AV Villas, Conalcreditos, Gas Natural Vanti, and GNP.
  • Israel: Targeted by political hacktivist groups (Handala) claiming attacks on 27 companies. Defacements hit hertelaviv.com.
  • China: A massive 92.5 million record breach hit the zyh365.com volunteer and political party database. Defacements affected Microsoft Store China.
  • United Kingdom: Z-Pentest Alliance compromised hostel CCTV systems. Defacements targeted RehabFinder and Free-Find.
  • Other Impacted Nations: Belgium (European Commission) , Mexico (Puerto Inteligente Seguro) , Canada (10 million residential records leaked ), Kuwait (Ministry of Interior targeted by Nasir) , Bangladesh (HRIS system access sold ), Thailand (King Power breach ), Ukraine (Ternopil admin services leak ), Spain (EvolveYourEnglish ), Poland (Gedeon ), Italy (Tax portal ), Botswana (PrimeTel ISP ), and Vietnam.

6. Victimology: Industry Sector Analysis

  • Financial Services & Cryptocurrency: A highly targeted sector for both ransomware and combo list distribution. ShinyHunters hit Ameriprise and Berkadia. Petro_Escobar breached Colombian banks. Access to the Brazilian Central Bank was sold. North Korean actors compromised a crypto platform via social engineering. Threat actor CODER circulated millions of credentials specifically targeting Stripe, Square, PayPal, Wise, Venmo, and Monzo.
  • Government & Public Sector: High-value targets suffered significant data loss. The European Commission was breached by ShinyHunters. Access to government emails across Bulgaria, Angola, South Africa, and Nigeria was sold. A French Ministry of Culture entity was deeply compromised. Hacktivists targeted the Kuwait Ministry of Interior. Web shells on Brazilian .gov.br sites were sold.
  • Healthcare & Pharmaceuticals: Suffered massive data loss and widespread defacements. A 35 million record breach hit French Regional Health Agencies and 130+ hospitals. Nicotine/Umbra Community persistently defaced healthcare sites including pharmaclowd.in , Dhanwantari Central , Garg Ayurveda , Optrica Pharmaceutical , Pankaj Pharma , Rama Nursing Home , HealVibe , Toyinks Care Services , and Holistic OB/GYN Dubai.
  • Technology & E-commerce: Highly targeted by combo list distributors (Amazon, eBay, Shopify, Alibaba). The Axios npm supply chain attack demonstrated sophisticated targeting of open-source infrastructure. E-commerce platforms like sastishop.pk and CustomKing were breached or defaced.
  • Education: Targeted for PII extraction. Infinite Campus was breached by ShinyHunters. UNIFAP (Brazil) and Mitra Husada University (Indonesia) suffered database leaks exposing student and admin records. EvolveYourEnglish lost 700k Spanish records. Nicotine defaced numerous academies (Blingua English Classes , Discovery Lane Academy ).

7. Conclusion

The cybersecurity intelligence from April 5-6, 2026, illustrates a highly volatile threat landscape dominated by two primary methodologies: the overwhelming volume of automated/semi-automated website defacements (led by the Umbra Community and INDOHAXSEC) and the mass aggregation and distribution of compromised credentials (led by data brokers like Leak Realm, CODER, and VitVit).

The activities of advanced persistent threats like ShinyHunters and North Korean-affiliated hackers demonstrate that high-value targets (financial institutions, government entities, and software supply chains) remain highly vulnerable to sophisticated extortion and social engineering tactics. The sale of administrative access to critical infrastructure, such as the Central Bank of Brazil and global government email systems, indicates a thriving “Access-as-a-Service” economy that lowers the barrier to entry for devastating cyber attacks.

The continuous “redefacement” of websites points to a systemic failure in incident response and vulnerability patching among small-to-medium enterprises, allowing threat actors to maintain persistent access. Furthermore, the availability of specialized tools for NFC fraud, KYC bypass, and bulk credential checking exacerbates the threat posed by the billions of leaked credentials, ensuring that identity theft and financial fraud will remain critical risks in the near term. Organizations must prioritize immediate remediation of known vulnerabilities, enforce multi-factor authentication to combat credential stuffing, and enhance monitoring of both technical boundaries and social engineering vectors to mitigate these converging threats.

Detected Incidents Draft Data

  1. Website defacement of tiocaio.com.br by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website tiocaio.com.br was defaced by attacker Nicotine affiliated with the Umbra Community team on April 6, 2026. This appears to be a single site defacement targeting a Brazilian domain.
    Date: 2026-04-05T23:32:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830237
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tiocaio.com.br
  2. Alleged distribution of fresh email credential lists via PandaCloud service
    Category: Combo List
    Content: Threat actor is distributing fresh email credential lists through a Telegram channel called PandaCloud, claiming to add new databases daily with only relevant and latest data.
    Date: 2026-04-05T23:28:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71256/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Website defacement of Wings Wide Shipping by Nicotine/Umbra Community
    Category: Defacement
    Content: Umbra Community member Nicotine defaced the Wings Wide Shipping website on April 6, 2026. This incident was marked as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T23:26:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830233
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Transportation/Logistics
    Victim Organization: Wings Wide Shipping
    Victim Site: wingswideshipping.com
  4. Website defacement of emynix.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the attacker Nicotine from the Umbra Community team successfully defaced the emynix.com website, targeting the WordPress themes directory. This was an isolated defacement incident rather than part of a mass campaign.
    Date: 2026-04-05T23:20:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830232
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Emynix
    Victim Site: emynix.com
  5. Website defacement of Alam Import Export by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website alamimportexport.com was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. The defacement targeted an import/export business website.
    Date: 2026-04-05T22:57:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830197
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Import/Export
    Victim Organization: Alam Import Export
    Victim Site: alamimportexport.com
  6. Alleged ShinyHunters Threat Actor Soliciting Private Contact via Session Messenger
    Category: Data Breach
    Content: The ShinyHunters threat actor group is soliciting private contact through the Session encrypted messenger, providing their Session ID for secure communications. This is consistent with their known pattern of selling stolen databases and breached data through encrypted channels.
    Date: 2026-04-05T22:54:16Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/812
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged leak of mixed email and password credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 170,000 email and password combinations for free download on a cybercriminal forum.
    Date: 2026-04-05T22:53:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71252/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Website defacement of Red Mind Technologies by Nicotine (Umbra Community)
    Category: Defacement
    Content: Red Mind Technologies website was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This incident represents a redefacement of a previously compromised target.
    Date: 2026-04-05T22:45:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830168
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Red Mind Technologies
    Victim Site: redmindtechnologies.ai
  9. Alleged leak of credential combolist targeting multiple streaming and gaming platforms
    Category: Combo List
    Content: A threat actor shared a combolist containing 170,000 email and password combinations allegedly targeting Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify accounts. The actor also advertises additional credential lists for sale via Telegram.
    Date: 2026-04-05T22:45:23Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-170k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–199463
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Entertainment and Gaming
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Website defacement of City Park Electronics by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group defaced the City Park Electronics website on April 6, 2026. This was identified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T22:45:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830173
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Electronics/Retail
    Victim Organization: City Park Electronics
    Victim Site: cityparkelectronics.ae
  11. Website defacement of dmkengwing.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine successfully defaced dmkengwing.in on April 6, 2026. This incident represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-05T22:44:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830175
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dmkengwing.in
  12. Website defacement of ekalaiva-ai.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website ekalaiva-ai.com was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This appears to be a redefacement of a previously compromised AI technology company website.
    Date: 2026-04-05T22:44:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830176
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Ekalaiva AI
    Victim Site: ekalaiva-ai.com
  13. Website defacement of myrootstn.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website myrootstn.com was defaced by the attacker Nicotine associated with the Umbra Community team on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T22:43:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830179
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Tunisia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: myrootstn.com
  14. Website defacement of pharmaclowd.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community conducted a redefacement of the Indian pharmaceutical website pharmaclowd.in on April 6, 2026. This represents a repeat attack against the same target, indicating persistent targeting of the healthcare sector.
    Date: 2026-04-05T22:42:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830181
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: Unknown
    Victim Site: pharmaclowd.in
  15. Website defacement of Rayie Petrochemical by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community group conducted a redefacement of rayiepetrochem.com on April 6, 2026. This marks a repeat compromise of the petrochemical companys website.
    Date: 2026-04-05T22:42:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830183
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Petrochemical
    Victim Organization: Rayie Petrochemical
    Victim Site: rayiepetrochem.com
  16. Website defacement of Red Mind Technologies by Nicotine from Umbra Community
    Category: Defacement
    Content: The technology company Red Mind Technologies was targeted in a redefacement attack by the attacker Nicotine associated with the Umbra Community group on April 6, 2026. This represents a secondary compromise of the website, indicating either incomplete remediation from a previous incident or persistent threat actor access.
    Date: 2026-04-05T22:41:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830184
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Red Mind Technologies
    Victim Site: redmindtechnologies.com
  17. Website defacement of skpkaruna.com by Nicotine of Umbra Community
    Category: Defacement
    Content: The website skpkaruna.com was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T22:41:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830186
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: skpkaruna.com
  18. Website defacement of Skyreach Scaffolding by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Skyreach Scaffolding was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This was identified as a redefacement incident targeting the construction companys website.
    Date: 2026-04-05T22:40:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830187
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Construction
    Victim Organization: Skyreach Scaffolding
    Victim Site: skyreachscaffolding.com
  19. Website defacement of thei2realestate.com by Nicotine/Umbra Community
    Category: Defacement
    Content: The Umbra Community threat group, specifically actor Nicotine, conducted a redefacement attack against I2 Real Estates website on April 6, 2026. This represents a repeat compromise of the real estate companys web presence.
    Date: 2026-04-05T22:39:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830189
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: I2 Real Estate
    Victim Site: thei2realestate.com
  20. Website defacement of thinkitstampit.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website thinkitstampit.com was defaced by attacker Nicotine associated with the Umbra Community team on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-05T22:39:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830190
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thinkitstampit.com
  21. Website defacement of zspeciality.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from Umbra Community conducted a redefacement of zspeciality.com on April 6, 2026. This was identified as a redefacement rather than an initial compromise, suggesting the site had been previously targeted.
    Date: 2026-04-05T22:38:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830194
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: zspeciality.com
  22. Website defacement of skyartcgs.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against skyartcgs.in on April 6, 2026. The attack targeted a WordPress theme directory on the Indian domain.
    Date: 2026-04-05T22:32:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830103
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: skyartcgs.in
  23. Website defacement of Agrawal Industries by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community conducted a redefacement of Agrawal Industries website on April 6, 2026. This represents a repeat attack against the Indian manufacturing companys web presence.
    Date: 2026-04-05T22:31:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830104
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: Agrawal Industries
    Victim Site: agrawalindustries.in
  24. Website defacement of Arpan Engineers by Nicotine from Umbra Community
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group defaced the Arpan Engineers website on April 6, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-05T22:31:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830106
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Engineering/Construction
    Victim Organization: Arpan Engineers
    Victim Site: arpanengineers.com
  25. Website defacement of Blingua English Classes by Nicotine (Umbra Community)
    Category: Defacement
    Content: The educational website blinguaenglishclasses.com was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-05T22:30:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830107
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Blingua English Classes
    Victim Site: blinguaenglishclasses.com
  26. Website defacement of Dhanwantari Central by Nicotine (Umbra Community)
    Category: Defacement
    Content: The healthcare website dhanwantaricentral.com was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-05T22:30:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830108
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Dhanwantari Central
    Victim Site: dhanwantaricentral.com
  27. Website defacement of Discovery Lane Academy by Nicotine (Umbra Community)
    Category: Defacement
    Content: The educational institution Discovery Lane Academys website was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-05T22:29:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830109
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Discovery Lane Academy
    Victim Site: discoverylaneacademy.in
  28. Website defacement of Garg Ayurveda by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against Garg Ayurvedas website on April 6, 2026. This represents a repeat compromise of the Indian ayurvedic healthcare organizations web presence.
    Date: 2026-04-05T22:29:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830110
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Healthcare
    Victim Organization: Garg Ayurveda
    Victim Site: gargayurveda.in
  29. Website defacement of GK Institute by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine conducted a redefacement attack against GK Institutes website on April 6, 2026. This marks a repeated compromise of the educational institutions web infrastructure.
    Date: 2026-04-05T22:28:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830111
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: GK Institute
    Victim Site: gkinstitute.net
  30. Alleged distribution of gaming and streaming service credential lists
    Category: Combo List
    Content: Threat actor distributes credential lists targeting gaming platforms and Spotify accounts through Telegram channels. The actor offers free access to credential combinations and related tools through multiple Telegram groups.
    Date: 2026-04-05T22:28:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71251/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Entertainment
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Website defacement of goldinleaf.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group conducted a redefacement of goldinleaf.com on April 6, 2026. This represents a repeat compromise of the same target website.
    Date: 2026-04-05T22:27:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830112
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: goldinleaf.com
  32. Website defacement of hemitlocks.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website hemitlocks.com was defaced by the attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T22:27:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830113
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hemitlocks.com
  33. Website defacement of Hotel Silver Pearl by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor known as Nicotine conducted a redefacement attack against Hotel Silver Pearls website on April 6, 2026. This incident represents a repeated compromise of the hospitality organizations web infrastructure.
    Date: 2026-04-05T22:26:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830114
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Hospitality
    Victim Organization: Hotel Silver Pearl
    Victim Site: hotelsilverpearl.com
  34. Website defacement of Mercury Lock India by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine conducted a redefacement attack against Mercury Lock Indias website on April 6, 2026. This marks a repeat compromise of the Indian lock manufacturing companys web presence.
    Date: 2026-04-05T22:26:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830115
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: Mercury Lock India
    Victim Site: mercurylockindia.com
  35. Website defacement of Optrica Pharmaceutical by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community group defaced the Optrica Pharmaceutical website on April 6, 2026. This was identified as a redefacement incident, indicating the site had been previously compromised.
    Date: 2026-04-05T22:25:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830116
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: Optrica Pharmaceutical
    Victim Site: optricapharmaceutical.com
  36. Website defacement of Pankaj Pharma by Nicotine (Umbra Community)
    Category: Defacement
    Content: The pharmaceutical company Pankaj Pharmas website was defaced by threat actor Nicotine from the Umbra Community group on April 6, 2026. This appears to be a redefacement of a previously compromised target.
    Date: 2026-04-05T22:25:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830117
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Pharmaceutical
    Victim Organization: Pankaj Pharma
    Victim Site: pankajpharma.com
  37. Website defacement of QuickMark by Nicotine (Umbra Community)
    Category: Defacement
    Content: Threat actor Nicotine from Umbra Community conducted a redefacement attack against quickmark.co.in on April 6, 2026. This appears to be a targeted attack against an Indian commercial website.
    Date: 2026-04-05T22:24:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830118
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: QuickMark
    Victim Site: quickmark.co.in
  38. Website defacement of Rama Nursing Home by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community group defaced the website of Rama Nursing Home on April 6, 2026. This appears to be a redefacement of a previously compromised healthcare facility website.
    Date: 2026-04-05T22:23:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830119
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Rama Nursing Home
    Victim Site: ramanursinghome.com
  39. Website defacement of Scintillate Playway School by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group conducted a redefacement attack against the Scintillate Playway School website on April 6, 2026. This marks a repeat compromise of the educational institutions web presence.
    Date: 2026-04-05T22:23:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830121
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Education
    Victim Organization: Scintillate Playway School
    Victim Site: scintillateplaywayschool.in
  40. Website defacement of Statue Galleria by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community defaced the Statue Galleria website on April 6, 2026. This incident represents a redefacement of the target site rather than an initial compromise.
    Date: 2026-04-05T22:22:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830122
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Arts and Culture
    Victim Organization: Statue Galleria
    Victim Site: statuegalleria.com
  41. Website defacement of The Creative School Aligarh by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine conducted a redefacement attack against The Creative School Aligarhs website on April 6, 2026. This appears to be a targeted attack against an educational institution in Aligarh, India.
    Date: 2026-04-05T22:22:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830123
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Education
    Victim Organization: The Creative School Aligarh
    Victim Site: thecreativeschoolaligarh.com
  42. Alleged sale of multi-platform combolists, logs, and account credentials
    Category: Logs
    Content: A threat actor is offering for sale combolists and stealer logs covering multiple email providers (Hotmail, Gmail, Yahoo, AOL, Comcast, etc.), social media accounts (Facebook, Instagram, TikTok), streaming services (Netflix, Disney), e-commerce platforms (Amazon, eBay, Walmart), and more. Coverage spans numerous countries including US, UK, DE, FR, CA, AU, JP, and others. Also includes cookies, configs, scripts, and tools.
    Date: 2026-04-05T22:21:44Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59496
    Screenshots:
    None
    Threat Actors: tuzelity
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Website defacement of Vastu Vida Jaykhanna by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community, specifically attacker Nicotine, conducted a redefacement of the Vastu Vida Jaykhanna website on April 6, 2026. This appears to be a targeted attack against an Indian professional services website specializing in Vastu consulting.
    Date: 2026-04-05T22:21:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830124
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Professional Services
    Victim Organization: Vastu Vida Jaykhanna
    Victim Site: vastuvidajaykhanna.in
  44. Alleged leak of credential combolist containing 7.9 million records
    Category: Combo List
    Content: A threat actor shared a combolist containing 7.9 million URL:LOGIN:PASS combinations on a cybercrime forum. The post requires registration to view the full content and download links.
    Date: 2026-04-05T22:17:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71249/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,400 allegedly valid Hotmail email credentials on a cybercriminal forum. The credentials are described as high quality, fresh, and validated.
    Date: 2026-04-05T22:16:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71250/
    Screenshots:
    None
    Threat Actors: NUllSHop0X
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  46. Website defacement of ZX Holding by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine successfully defaced the ZX Holding website on April 6, 2026. The attack targeted the companys main index page, compromising their web presence.
    Date: 2026-04-05T22:15:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830052
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Qatar
    Victim Industry: Business Services
    Victim Organization: ZX Holding
    Victim Site: zxholding.qa
  47. Website defacement of SchoolScaler by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the SchoolScaler educational platform website on April 6, 2026. The defacement targeted a specific subdirectory rather than the main homepage of the educational service provider.
    Date: 2026-04-05T22:15:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830055
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: SchoolScaler
    Victim Site: schoolscaler.com
  48. Website defacement of Wilabs by Nicotine (Umbra Community)
    Category: Defacement
    Content: Nicotine from Umbra Community successfully defaced the Wilabs website on April 6, 2026. The attack targeted a WordPress theme file on the UAE-based organizations website.
    Date: 2026-04-05T22:14:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830056
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Unknown
    Victim Organization: Wilabs
    Victim Site: wilabs.ae
  49. Website defacement of ATI Corporation by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced the ATI Corporation website on April 6, 2026. This appears to be a redefacement of the same target, indicating the site was previously compromised.
    Date: 2026-04-05T22:14:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830057
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Bangladesh
    Victim Industry: Corporate
    Victim Organization: ATI Corporation
    Victim Site: aticorporationbd.net
  50. Website defacement of signmaker.in by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community group conducted a redefacement of the Indian sign manufacturing companys website on April 6, 2026. This represents a repeat attack against the same target, indicating persistent threat actor interest in the victim organization.
    Date: 2026-04-05T22:13:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830072
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: Sign Maker
    Victim Site: signmaker.in
  51. Website defacement of insectkillerservices.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The pest control services website insectkillerservices.com was defaced by threat actor Nicotine affiliated with the Umbra Community group on April 6, 2026. This appears to be a targeted single-site defacement rather than a mass or repeat attack.
    Date: 2026-04-05T22:07:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830023
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Pest Control Services
    Victim Organization: Insect Killer Services
    Victim Site: insectkillerservices.com
  52. Website defacement of shivachin.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website shivachin.com was defaced by threat actor Nicotine affiliated with the Umbra Community group on April 6, 2026. The attack specifically targeted the WordPress theme directory of the site.
    Date: 2026-04-05T22:06:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830025
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: shivachin.com
  53. Website defacement of healvibe.me by Nicotine (Umbra Community)
    Category: Defacement
    Content: The healthcare website healvibe.me was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T22:06:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830027
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: HealVibe
    Victim Site: healvibe.me
  54. Website defacement of turbonest.me by Nicotine (Umbra Community)
    Category: Defacement
    Content: Redefacement attack conducted by attacker Nicotine affiliated with Umbra Community targeting turbonest.me website on April 6, 2026. This represents a repeated compromise of the same target.
    Date: 2026-04-05T22:05:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830029
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: turbonest.me
  55. Website defacement of amahenna.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website amahenna.com was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. The defacement targeted the index.txt file of the domain.
    Date: 2026-04-05T22:05:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830031
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: amahenna.com
  56. Website defacement of wania.com.bd by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website wania.com.bd was defaced by the attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. The defacement targeted the WordPress themes directory of the Bangladesh-based website.
    Date: 2026-04-05T22:04:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830032
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: wania.com.bd
  57. Website defacement of demowebsiteorganisasi.web.id by Nicotine from Umbra Community
    Category: Defacement
    Content: On April 6, 2026, the website demowebsiteorganisasi.web.id was defaced by an attacker named Nicotine, affiliated with the Umbra Community group. This appears to be a single-target defacement incident rather than a mass or repeat attack.
    Date: 2026-04-05T22:04:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830033
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: demowebsiteorganisasi.web.id
  58. Website defacement of energysep.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the energysep.com website on April 6, 2026. The defacement targeted what appears to be an energy sector related website.
    Date: 2026-04-05T22:03:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830034
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Energy
    Victim Organization: Unknown
    Victim Site: energysep.com
  59. Website defacement of Sonex Branding by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team defaced the Sonex Branding company website on April 6, 2026. The defacement targeted a specific page within the WordPress content directory of the branding companys site.
    Date: 2026-04-05T22:02:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830037
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Marketing/Branding
    Victim Organization: Sonex Branding
    Victim Site: sonexbranding.com
  60. Website defacement of Fruit of Eden by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website fruitofedenmn.com was defaced by attacker Nicotine affiliated with the Umbra Community team on April 6, 2026. This appears to be a single-target defacement incident rather than part of a mass campaign.
    Date: 2026-04-05T22:02:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830038
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Fruit of Eden
    Victim Site: fruitofedenmn.com
  61. Website defacement of Fruit of the Spirit Cleaning by Nicotine (Umbra Community)
    Category: Defacement
    Content: The cleaning services company Fruit of the Spirit Cleanings website was defaced by attacker Nicotine affiliated with the Umbra Community team on April 6, 2026. This appears to be an isolated defacement targeting a single commercial website rather than a mass attack campaign.
    Date: 2026-04-05T22:01:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830039
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Cleaning Services
    Victim Organization: Fruit of the Spirit Cleaning
    Victim Site: fruitofthespiritcleaning.com
  62. Website defacement of Toyinks Care Services by Nicotine (Umbra Community)
    Category: Defacement
    Content: Umbra Community member Nicotine defaced the Toyinks Care Services website on April 6, 2026. The attack targeted a WordPress installation and was archived as a single defacement incident.
    Date: 2026-04-05T22:01:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830040
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Toyinks Care Services
    Victim Site: toyinkscareservices.com
  63. Alleged sale of comprehensive cookie/session data package on Threat Market
    Category: Logs
    Content: A threat actor on the Threat Market channel is offering a Comprehensive cookie management package for sale at $199 for a limited time. The package is available via an onion site and a Telegram bot (@ThreatMarketBot), suggesting it contains stolen browser cookies or session tokens used for account takeover or credential access.
    Date: 2026-04-05T22:01:15Z
    Network: telegram
    Published URL: https://t.me/c/3881618514/30
    Screenshots:
    None
    Threat Actors: Threat Market
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Website defacement of elarashine.my.id by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website elarashine.my.id was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident represents a redefacement of the target site.
    Date: 2026-04-05T22:00:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830041
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Malaysia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: elarashine.my.id
  65. Alleged leak of mixed forum credentials
    Category: Combo List
    Content: A threat actor shared a mixed collection of 82,000 valid forum credentials on a cybercriminal forum. The combolist appears to contain credentials from various forum platforms.
    Date: 2026-04-05T21:56:41Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71246/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Alleged marketplace-as-a-service platform for cybercriminal activities
    Category: Combo List
    Content: Threat actor advertising a complete marketplace platform designed for cybercriminal activities, featuring escrow systems, vendor management, and infrastructure for selling illegal digital products and services. The platform includes capabilities for RDP/VPS sales, credential trading, and automated vendor verification systems.
    Date: 2026-04-05T21:56:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71247/
    Screenshots:
    None
    Threat Actors: xibulipali
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged marketplace platform offering cybercriminal services infrastructure
    Category: Initial Access
    Content: Threat actor advertising a complete cybercriminal marketplace platform infrastructure offering digital product sales, server listings, vendor management, escrow protection, and administrative controls for illegal marketplaces.
    Date: 2026-04-05T21:56:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71245/
    Screenshots:
    None
    Threat Actors: xibulipali
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Website defacement of apptechcode.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website apptechcode.com was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident was marked as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T21:54:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829979
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: AppTechCode
    Victim Site: apptechcode.com
  69. Website defacement of Binzish Solutions by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Binzish Solutions was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. This represents a redefacement of the target rather than an initial compromise.
    Date: 2026-04-05T21:54:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829981
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology/IT Services
    Victim Organization: Binzish Solutions
    Victim Site: binzishsolutions.com
  70. Website defacement of DevTrixSol by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community successfully defaced the DevTrixSol website on April 6, 2026. This incident represents a redefacement of the target, indicating the site may have been compromised previously.
    Date: 2026-04-05T21:53:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829983
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: DevTrixSol
    Victim Site: devtrixsol.com
  71. Website defacement of gmmarmi.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website gmmarmi.com was defaced by attacker Nicotine affiliated with Umbra Community on April 6, 2026. This incident was classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T21:52:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829985
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: gmmarmi.com
  72. Website defacement of Golden Wind FM by Umbra Community (Nicotine)
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against Golden Wind FMs website on April 6, 2026. This appears to be a targeted attack against the radio stations web presence.
    Date: 2026-04-05T21:52:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829986
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Media/Broadcasting
    Victim Organization: Golden Wind FM
    Victim Site: goldenwindfm.com
  73. Website defacement of hertelaviv.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team conducted a redefacement of hertelaviv.com on April 6, 2026. This was not a mass defacement campaign but rather a targeted single-site attack.
    Date: 2026-04-05T21:51:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829987
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: hertelaviv.com
  74. Website defacement of Holistic OB/GYN Dubai by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the website of a Dubai-based obstetrics and gynecology healthcare provider. This incident represents a redefacement of the target site, indicating the vulnerability may have been previously exploited.
    Date: 2026-04-05T21:51:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829988
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Healthcare
    Victim Organization: Holistic OB/GYN Dubai
    Victim Site: holisticobgyndubai.com
  75. Website defacement of Jaimes Landscape Design by Nicotine/Umbra Community
    Category: Defacement
    Content: Umbra Community member Nicotine conducted a redefacement attack against Jaimes Landscape Design website on April 6, 2026. This appears to be a repeat defacement of the landscaping companys website rather than an initial compromise.
    Date: 2026-04-05T21:50:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829989
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Landscaping/Construction
    Victim Organization: Jaimes Landscape Design
    Victim Site: jaimeslandscapedesign.com
  76. Website defacement of Kahale Properties by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team conducted a redefacement of the Kahale Properties real estate website on April 6, 2026. This incident represents a repeat targeting of the same victim organization.
    Date: 2026-04-05T21:49:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829991
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Kahale Properties
    Victim Site: kahaleproperties.com
  77. Website defacement of myskyline.co.uk by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website myskyline.co.uk was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised.
    Date: 2026-04-05T21:49:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829998
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: myskyline.co.uk
  78. Website defacement of oscardefi.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The DeFi platform oscardefi.com was defaced by attacker Nicotine from the Umbra Community group on April 6, 2026. This incident represents a redefacement of the target website.
    Date: 2026-04-05T21:48:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830001
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: OscarDeFi
    Victim Site: oscardefi.com
  79. Website defacement of SpeedTech by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Pakistani technology company SpeedTech was defaced by attacker Nicotine from the Umbra Community group. This incident represents a redefacement of the target site, indicating previous compromise activity.
    Date: 2026-04-05T21:48:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/830006
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Technology
    Victim Organization: SpeedTech
    Victim Site: speedtech.com.pk
  80. Website defacement of Thanjavur Art Gallery by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the Thanjavur Art Gallery website was defaced by an attacker identified as Nicotine from the Umbra Community team. The incident affected the main index page of the art gallerys website.
    Date: 2026-04-05T21:41:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829888
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Arts and Culture
    Victim Organization: Thanjavur Art Gallery
    Victim Site: thanjavurartgallery.com
  81. Website defacement of aspiredukyuan.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine, affiliated with Umbra Community, successfully defaced aspiredukyuan.com on April 6, 2026. The defacement targeted a specific path within the WordPress content directory of the website.
    Date: 2026-04-05T21:41:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829891
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: aspiredukyuan.com
  82. Website defacement of RehabFinder by Nicotine (Umbra Community)
    Category: Defacement
    Content: On April 6, 2026, the RehabFinder healthcare website was defaced by an attacker known as Nicotine associated with the Umbra Community group. The defacement targeted a specific page within the WordPress content directory of the rehabilitation service finder platform.
    Date: 2026-04-05T21:40:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829892
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Kingdom
    Victim Industry: Healthcare
    Victim Organization: RehabFinder
    Victim Site: rehabfinder.co.uk
  83. Website defacement of skinmedacademia.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat actor Nicotine successfully defaced the skinmedacademia.com website on April 6, 2026. The attack targeted what appears to be a medical education or dermatology-related organizations web presence.
    Date: 2026-04-05T21:40:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829893
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare/Medical Education
    Victim Organization: Skinmed Academia
    Victim Site: skinmedacademia.com
  84. Website defacement of gillandgills.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website gillandgills.com was defaced on April 6, 2026 by an attacker identified as Nicotine affiliated with the Umbra Community group. The defacement targeted a specific subdirectory of the WordPress installation.
    Date: 2026-04-05T21:39:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829894
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Gill and Gills
    Victim Site: gillandgills.com
  85. Website defacement of AMG Despachante by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced the website of AMG Despachante, a Brazilian professional services company. The defacement targeted the WordPress content directory of the organizations website.
    Date: 2026-04-05T21:38:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829897
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Professional Services
    Victim Organization: AMG Despachante
    Victim Site: amgdespachante.com
  86. Website defacement of Clinica Veterinaria Bylaardt by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat group, specifically attacker Nicotine, successfully defaced the website of Clinica Veterinaria Bylaardt on April 6, 2026. The incident targeted a veterinary clinics website and was documented with a mirror URL for analysis.
    Date: 2026-04-05T21:38:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829898
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Clinica Veterinaria Bylaardt
    Victim Site: clinicaveterinariabylaardt.com
  87. Website defacement of desentupidorarotomaster.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community group, through member Nicotine, successfully defaced the website of Desentupidora Roto Master, a Brazilian plumbing/drain cleaning service company on April 6, 2026.
    Date: 2026-04-05T21:37:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829900
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Commercial Services
    Victim Organization: Desentupidora Roto Master
    Victim Site: desentupidorarotomaster.com
  88. Website defacement of jjacalhas.com.br by Nicotine from Umbra Community
    Category: Defacement
    Content: The website jjacalhas.com.br was defaced by an attacker known as Nicotine associated with the Umbra Community group on April 6, 2026. The defacement targeted a specific path within the WordPress content directory of the Brazilian website.
    Date: 2026-04-05T21:37:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829906
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jjacalhas.com.br
  89. Website defacement of Loc Soluções by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Brazilian website locsolucoes.com.br was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. The attack targeted the WordPress content directory of the site.
    Date: 2026-04-05T21:36:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829908
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Loc Soluções
    Victim Site: locsolucoes.com.br
  90. Website defacement of Reboque de Lima by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website of Reboque de Lima, a Brazilian towing/automotive service company, was defaced by the attacker Nicotine associated with the Umbra Community group on April 6, 2026. The defacement targeted the WordPress content directory of the companys website.
    Date: 2026-04-05T21:35:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829909
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Transportation/Automotive Services
    Victim Organization: Reboque de Lima
    Victim Site: reboquedelima.com.br
  91. Website defacement of reinertsc.com.br by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Brazilian website reinertsc.com.br was defaced by the attacker Nicotine associated with the Umbra Community team on April 6, 2026. The defacement targeted a specific path within the WordPress content directory of the site.
    Date: 2026-04-05T21:35:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829910
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Reinert SC
    Victim Site: reinertsc.com.br
  92. Website defacement of Aptive Environmental by Nicotine (Umbra Community)
    Category: Defacement
    Content: The environmental services company Aptive Environmentals website was defaced by the attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. The defacement targeted the WordPress theme directory of the companys website.
    Date: 2026-04-05T21:28:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829709
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Environmental Services
    Victim Organization: Aptive Environmental
    Victim Site: aptiveeco.com
  93. Website defacement of Bosla Mortgage by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from Umbra Community defaced the Bosla Mortgage website on April 6, 2026. This was a single-site defacement targeting a UAE-based mortgage company.
    Date: 2026-04-05T21:28:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829710
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Financial Services
    Victim Organization: Bosla Mortgage
    Victim Site: boslamortgage.ae
  94. Alleged leak of credential combolist containing 129 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 129 million URL:LOGIN:PASS combinations on a cybercrime forum. The post content is restricted and requires forum registration to view details.
    Date: 2026-04-05T21:28:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71238/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  95. Website defacement of ecomhandler.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the ecomhandler.com website on April 6, 2026. The incident targeted what appears to be an e-commerce platform or service provider.
    Date: 2026-04-05T21:27:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829712
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Ecomhandler
    Victim Site: ecomhandler.com
  96. Website defacement of ERP Solutions by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team defaced the ERP Solutions website on April 6, 2026. The defacement targeted a WordPress theme directory on the UK-based technology companys website.
    Date: 2026-04-05T21:26:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829715
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Kingdom
    Victim Industry: Technology
    Victim Organization: ERP Solutions
    Victim Site: erpsol.co.uk
  97. Website defacement of Greenway Healthcare by Nicotine (Umbra Community)
    Category: Defacement
    Content: The attacker Nicotine from the Umbra Community team successfully defaced the Greenway Healthcare website on April 6, 2026. This represents a targeted attack against a Pakistani healthcare organizations web presence.
    Date: 2026-04-05T21:26:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829716
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Healthcare
    Victim Organization: Greenway Healthcare
    Victim Site: greenwayhealthcare.pk
  98. Website defacement of IT City by Nicotine (Umbra Community)
    Category: Defacement
    Content: The website itcity.ae was defaced by threat actor Nicotine associated with the Umbra Community group on April 6, 2026. The attack targeted the WordPress theme directory of the technology companys website.
    Date: 2026-04-05T21:25:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829719
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Technology
    Victim Organization: IT City
    Victim Site: itcity.ae
  99. Website defacement of IT Village by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community defaced the IT Village website on April 6, 2026. The defacement targeted the WordPress themes directory of the UAE-based technology companys website.
    Date: 2026-04-05T21:25:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829720
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Technology
    Victim Organization: IT Village
    Victim Site: itvillage.ae
  100. Website defacement of Lahore IT Solutions by Nicotine from Umbra Community
    Category: Defacement
    Content: Cybercriminal Nicotine from the Umbra Community hacker group defaced the website of Lahore IT Solutions on April 6, 2026. The attack targeted a specific page within the WordPress content directory of the Pakistani IT companys website.
    Date: 2026-04-05T21:24:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829721
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Information Technology
    Victim Organization: Lahore IT Solutions
    Victim Site: lahoreitsol.com
  101. Website defacement of Lahore Startups by Nicotine (Umbra Community)
    Category: Defacement
    Content: The lahorestartups.com website was defaced by attacker Nicotine associated with the Umbra Community team on April 6, 2026. The attack targeted a startup-focused platform based in Lahore, Pakistan.
    Date: 2026-04-05T21:24:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829722
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Technology/Startups
    Victim Organization: Lahore Startups
    Victim Site: lahorestartups.com
  102. Website defacement of locksmith service provider by Nicotine (Umbra Community)
    Category: Defacement
    Content: The Umbra Community threat group, specifically attacker Nicotine, successfully defaced the website of a Dubai-based locksmith service provider on April 6, 2026. The attack targeted the WordPress content directory of the commercial locksmith business.
    Date: 2026-04-05T21:23:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829723
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United Arab Emirates
    Victim Industry: Professional Services
    Victim Organization: Locksmith Dubai 24/7
    Victim Site: locksmithdubai247.ae
  103. Website defacement of pakitsol.com by Nicotine (Umbra Community)
    Category: Defacement
    Content: Attacker Nicotine from the Umbra Community team defaced the pakitsol.com website on April 6, 2026. The attack targeted the WordPress theme directory of the Pakistani technology companys website.
    Date: 2026-04-05T21:23:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829725
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Technology
    Victim Organization: Pakit Solutions
    Victim Site: pakitsol.com
  104. Website defacement of PropertyInfo by Nicotine from Umbra Community
    Category: Defacement
    Content: The real estate website PropertyInfo was defaced by attacker Nicotine affiliated with the Umbra Community group on April 6, 2026. The defacement targeted the WordPress content directory of the Pakistani property information portal.
    Date: 2026-04-05T21:21:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829726
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: Real Estate
    Victim Organization: PropertyInfo
    Victim Site: propertyinfo.pk
  105. Website defacement of sastishop.pk by Nicotine (Umbra Community)
    Category: Defacement
    Content: Pakistani e-commerce website sastishop.pk was defaced by attacker Nicotine associated with the Umbra Community group on April 6, 2026. The defacement targeted the WordPress themes directory of the online shopping platform.
    Date: 2026-04-05T21:21:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829727
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Pakistan
    Victim Industry: E-commerce
    Victim Organization: Sasti Shop
    Victim Site: sastishop.pk
  106. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 13,000 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-05T21:17:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71236/
    Screenshots:
    None
    Threat Actors: FlashCloud2
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  107. Alleged distribution of stealer logs collection
    Category: Logs
    Content: Threat actor UP_DAISYCLOUD distributed a collection of 5,378 stealer logs from April 5th via file sharing platform. The actor operates a Telegram channel for regular distribution of fresh credential data harvested by information stealing malware.
    Date: 2026-04-05T21:16:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5378-LOGS-CLOUD-%E2%98%81-05-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  108. Alleged data breach of Consult2Bond
    Category: Data Leak
    Content: Database dump from consult2bond.com containing customer credentials, personal information, order details, and administrative data across multiple tables. The leak includes passwords, emails, phone numbers, addresses, and authentication codes for customers and administrators.
    Date: 2026-04-05T21:16:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-consult2bond-com
    Screenshots:
    None
    Threat Actors: Katarinka
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Consult2Bond
    Victim Site: consult2bond.com
  109. Alleged data leak of vip.ithk.com database
    Category: Data Leak
    Content: A database containing 136 records from vip.ithk.com was allegedly leaked, including internal staff contact information, customer data, and product/pricing metadata across multiple tables.
    Date: 2026-04-05T21:16:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-vip-ithk-com
    Screenshots:
    None
    Threat Actors: Katarinka
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: vip.ithk.com
  110. Alleged data leak of Gedeon database
    Category: Data Leak
    Content: A database dump from gedeon.pl containing 489 records across 4 tables was leaked, including user credentials, product catalog data, and CMS content. The dataset includes 6 user accounts with authentication data including login credentials and email addresses.
    Date: 2026-04-05T21:15:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-www-gedeon-pl
    Screenshots:
    None
    Threat Actors: Katarinka
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Gedeon
    Victim Site: gedeon.pl
  111. Alleged data breach of Nakamura Co
    Category: Data Breach
    Content: Threat actor allegedly selling database containing over 11,550 job applicant records and 478 partnership records from Indonesian company Nakamura Co. The data is being offered for sale via Telegram contact.
    Date: 2026-04-05T21:15:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-12K-DATA-CALON-PEGAWAI-PARTNERSHIP-NAKAMURA-CO-ID
    Screenshots:
    None
    Threat Actors: Kyy
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Nakamura Co
    Victim Site: nakamura.co.id
  112. Alleged data leak of Indian Construction Industry database
    Category: Data Leak
    Content: Threat actor Katarinka leaked a database dump from indianconstructionindustry.com containing 26,562 records across 26 tables. The database includes sensitive payment details, user communication records, construction listings, and company profiles.
    Date: 2026-04-05T21:15:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-www-indianconstructionindustry-com
    Screenshots:
    None
    Threat Actors: Katarinka
    Victim Country: India
    Victim Industry: Construction
    Victim Organization: Indian Construction Industry
    Victim Site: indianconstructionindustry.com
  113. Alleged data leak of Tripeak Bearing database
    Category: Data Leak
    Content: Database dump from tripeakbearing.com containing 265 records across 19 tables, including sensitive data such as user credentials, contact information, and activity logs. The dump appears to be made available for free download on a cybercrime forum.
    Date: 2026-04-05T21:15:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-www-tripeakbearing-com
    Screenshots:
    None
    Threat Actors: Katarinka
    Victim Country: Unknown
    Victim Industry: Manufacturing
    Victim Organization: Tripeak Bearing
    Victim Site: tripeakbearing.com
  114. Alleged sale of vulnerability affecting 38,575 website panels globally
    Category: Initial Access
    Content: Threat actor selling a vulnerability allegedly affecting 38,575 website panels worldwide for $600, including government access points, cPanels, shells, SSH/WHM, SMTP, mailers, and webmail systems.
    Date: 2026-04-05T21:15:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Vulnerability-affecting-38%E2%80%AF575-website-panel–72439
    Screenshots:
    None
    Threat Actors: NormalLeVrai
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Alleged leak of UCAR French data
    Category: Data Leak
    Content: Threat actor ARPANET744 shared a link to alleged UCAR French data via file hosting service. The specific nature and scope of the data remains unclear from the brief forum post.
    Date: 2026-04-05T21:14:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-UCAR-DATA-FRENCH
    Screenshots:
    None
    Threat Actors: ARPANET744
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: UCAR
    Victim Site: Unknown
  116. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a fresh mixed combolist containing 3,000 email and password combinations via a free download link on a cybercriminal forum.
    Date: 2026-04-05T21:12:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3K-FRESH-MIXED
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of Yahoo credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 1.3 million Yahoo credentials through a file sharing service. The credentials appear to be targeted for social engineering purposes.
    Date: 2026-04-05T21:01:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71235/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Yahoo
    Victim Site: yahoo.com
  118. Alleged sale of cyber operations guide with government access methods
    Category: Initial Access
    Content: Threat actor miyako is selling an Intermediate Cyber Operations Guide v2 for $1000 that allegedly contains methods for gaining government access, establishing botnets, and includes case studies of breaching various organizations including the Indonesian government. The guide covers tactics for ransomware deployment, command and control setup, persistence methods, and selling access to compromised systems.
    Date: 2026-04-05T20:59:56Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Intermediate-Cyber-Operations-Guide-v2
    Screenshots:
    None
    Threat Actors: miyako
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Indonesian Government
    Victim Site: Unknown
  119. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 700,000 Hotmail email credentials on a cybercriminal forum. The data is reportedly for mail access only and was made available on April 5th.
    Date: 2026-04-05T20:47:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71234/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  120. Website defacement of Glicowings by Mr.Spongebob (HackerSec.ID)
    Category: Defacement
    Content: HackerSec.ID team member Mr.Spongebob defaced the Glicowings website on April 6, 2026. The incident targeted the Indonesian companys main website domain.
    Date: 2026-04-05T20:42:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829708
    Screenshots:
    None
    Threat Actors: Mr.Spongebob, HackerSec.ID
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Glicowings
    Victim Site: glicowings.co.id
  121. Alleged doxxing and personal information disclosure of cybersecurity researcher
    Category: Data Leak
    Content: Forum user Angel_Batista claims to have obtained and shared personal identifying information about an individual known as Saxx described as a cybersecurity expert. The post includes derogatory personal attacks and references to previous social media interactions between the parties.
    Date: 2026-04-05T20:10:22Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Clement-Saxx-Domingo-ID
    Screenshots:
    None
    Threat Actors: Angel_Batista
    Victim Country: Unknown
    Victim Industry: Cybersecurity
    Victim Organization: Unknown
    Victim Site: Unknown
  122. Alleged leak of credential combolist containing 1.1 million records
    Category: Combo List
    Content: Threat actor shared a fresh credential combolist containing 1.1 million records for free download on underground forum.
    Date: 2026-04-05T19:32:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71231/
    Screenshots:
    None
    Threat Actors: Blackcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  123. Alleged leak of credential combolist containing 25 million records
    Category: Combo List
    Content: A threat actor shared a combolist containing 25 million URL:LOGIN:PASS credentials on a cybercriminal forum. The post appears to offer free access to the credential list through the forums registration system.
    Date: 2026-04-05T19:18:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71230/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Alleged leak of corporate email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 59,674 email and password combinations, reportedly with hits against SMTP services and corporate mail systems.
    Date: 2026-04-05T18:49:56Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71227/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  125. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 20,000 mixed email credentials on a cybercrime forum. The content is hidden and only available to registered users of the platform.
    Date: 2026-04-05T18:36:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71226/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  126. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor distributed a combolist containing 2,186 Hotmail email credentials on a cybercriminal forum.
    Date: 2026-04-05T18:23:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71225/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  127. Alleged lookup service offering on CrackingX forum
    Category: Initial Access
    Content: Actor Target777 advertises a lookup service on CrackingX forum, directing potential customers to contact store support with research details. The specific nature of the lookup service and target data is not specified in the post.
    Date: 2026-04-05T18:23:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71224/
    Screenshots:
    None
    Threat Actors: Target777
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  128. Website defacement of worldhorizon.cn by ALP/Alperen_216
    Category: Defacement
    Content: The attacker ALP from team Alperen_216 defaced the worldhorizon.cn website on April 6, 2026. The defacement targeted a specific WordPress file (wp-load.php) rather than the homepage.
    Date: 2026-04-05T18:22:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829707
    Screenshots:
    None
    Threat Actors: ALP, Alperen_216
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: World Horizon
    Victim Site: worldhorizon.cn
  129. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Forum post claims to share a Hotmail credential combolist containing 600 entries with country-specific information and full verification status.
    Date: 2026-04-05T18:00:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71222/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  130. Alleged leak of financial services credentials targeting multiple banks
    Category: Combo List
    Content: Threat actor CODER is distributing a 12 million record credential list (combolist) targeting multiple financial institutions including Starling Bank, Ally Bank, SoFi, Venmo, and Zelle through Telegram channels.
    Date: 2026-04-05T17:59:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71223/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Multiple (Starling Bank, Ally Bank, SoFi, Venmo, Zelle)
    Victim Site: Unknown
  131. Alleged sale of NFC relay toolkit for payment card fraud
    Category: Initial Access
    Content: Threat actor JINKUSU is selling NFC RIPPER, an Android toolkit designed to perform NFC relay attacks against payment cards at POS terminals and ATMs. The tool includes multiple PIN bypass methods and can be used to clone and replay NFC payment card transactions.
    Date: 2026-04-05T17:57:02Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-NFCRIPPER
    Screenshots:
    None
    Threat Actors: JINKUSU
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  132. Alleged sale of EvilNote email sending tool source code
    Category: Initial Access
    Content: Threat actor JINKUSU is selling the source code for EvilNote, a bulk email sending tool, for $500. The tool allows users to send mass emails using their own SMTP servers with features like recipient list management, email templates, and personalization capabilities.
    Date: 2026-04-05T17:56:37Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-EVILNOTE
    Screenshots:
    None
    Threat Actors: JINKUSU
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 1,700 mixed email credentials described as fresh mail access data from April 5th. The credentials appear to be distributed as a combolist for registered forum users.
    Date: 2026-04-05T17:46:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71220/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  134. Alleged leak of credential data by Max_Leaks threat actor
    Category: Logs
    Content: Threat actor Max_Leaks shared a 3.4 GB collection of credential logs on a cybercrime forum, claiming the data is fresh and high quality. The logs appear to be stealer malware output containing username and password combinations.
    Date: 2026-04-05T17:45:08Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-%E2%9C%A6%E2%9C%A6-LOG-S-%E2%9C%A6%E2%9C%A6-Maxi-Leaks-%E2%9C%A6%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6-3-4-GB-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: Max_Leaks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Alleged offering of KYC bypass tools and deepfake technology
    Category: Initial Access
    Content: Actor jinkusu advertises sophisticated deepfake and voice manipulation software designed to bypass Know Your Customer (KYC) verification processes. The tool features real-time face swapping, voice changing, and virtual camera capabilities for use in identity verification systems.
    Date: 2026-04-05T17:45:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-JINKUSU-CAM-BYPASS-KYC
    Screenshots:
    None
    Threat Actors: jinkusu
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  136. Alleged data breach of EvolveYourEnglish database containing Spanish customer records
    Category: Data Breach
    Content: Threat actor claims to have obtained a database from evolveyourenglish.com containing 700,000 Spanish customer records from 2020-2026. The database includes names, phone numbers, cities, and other customer information in CSV/SQL format.
    Date: 2026-04-05T17:44:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-evolveyourenglish-com-Database-Spain-700K%C2%A0-CVS-SQL-Format
    Screenshots:
    None
    Threat Actors: RainbowDF
    Victim Country: Spain
    Victim Industry: Education
    Victim Organization: EvolveYourEnglish
    Victim Site: evolveyourenglish.com
  137. Alleged sale of admin access to Bangladesh PWD HRIS system
    Category: Initial Access
    Content: Threat actor is selling administrative access to the Bangladesh Public Works Departments Human Resources Information System (HRIS) for $80. The system manages employee data, attendance, salary records, and other HR functions for PWD staff.
    Date: 2026-04-05T17:44:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Government-of-Bangladesh-HRIS-PWD-Access-to-admin-panel
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Bangladesh
    Victim Industry: Government
    Victim Organization: Public Works Department (PWD) of Bangladesh
    Victim Site: hris.pwd.gov.bd
  138. Alleged data breach of King Power duty-free retailer
    Category: Data Breach
    Content: Threat actor claims to possess a recently breached database from King Power containing 1.4 million customer CRM entries with personal information, credentials, and loyalty program data. The actor is offering the database through encrypted messaging channels.
    Date: 2026-04-05T17:44:12Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-1-4m-data-kingpower-com-once-deleted-duplicate-unique-lines-are-520k
    Screenshots:
    None
    Threat Actors: Databroker1
    Victim Country: Thailand
    Victim Industry: Retail
    Victim Organization: King Power
    Victim Site: kingpower.com
  139. Alleged data leak of PT Putra Pacitan Indonesia Sejahtera and PT Tunas Mandiri employee records
    Category: Data Leak
    Content: Threat actor XZeeoneOfc shared internal employee data from two Indonesian cigarette companies containing full names, national identification numbers, complete addresses, and job positions of approximately 2,200 workers. The data is being distributed for free via download link.
    Date: 2026-04-05T17:44:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-internal-data-of-cigarette-companies-PT-Putra-Pacitan-Indonesia-Sejahtera-and-PT-Tun
    Screenshots:
    None
    Threat Actors: XZeeoneOfc
    Victim Country: Indonesia
    Victim Industry: Tobacco Manufacturing
    Victim Organization: PT Putra Pacitan Indonesia Sejahtera and PT Tunas Mandiri
    Victim Site: Unknown
  140. Alleged leak of Hotmail credentials
    Category: Data Leak
    Content: Forum user martcloud shared a download link for what they claim to be fresh Hotmail credentials. The post appears to offer free access to the credential list rather than selling it.
    Date: 2026-04-05T17:43:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FULL-FRESH-HOTMAILS-unrapped–72386
    Screenshots:
    None
    Threat Actors: martcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  141. Alleged leak of Internet Security Complete Manual publication
    Category: Data Leak
    Content: A threat actor shared download links for the Internet Security Complete Manual 27th Edition 2026, a 64MB PDF document in English, making it freely available through multiple file hosting services.
    Date: 2026-04-05T17:43:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Tech-magazine-collection
    Screenshots:
    None
    Threat Actors: Proculin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Alleged leak of Canadian residential database containing 10 million records
    Category: Data Leak
    Content: A threat actor shared a Canadian residential database containing 10 million consumer records with personal information including names, addresses, phone numbers, and location data for free download on a cybercrime forum.
    Date: 2026-04-05T17:43:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-2025-Canada-Residential-Data-10-Million
    Screenshots:
    None
    Threat Actors: phoenix_leads
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Alleged sale of NFC RIPPER toolkit for payment card fraud
    Category: Initial Access
    Content: Threat actor jinkusu01 is advertising NFC RIPPER, an Android NFC relay toolkit designed to bypass payment card security measures at POS terminals and ATMs. The toolkit includes multiple PIN bypass methods, card limit bypass capabilities, and supports remote operation through a Python server with web admin panel.
    Date: 2026-04-05T17:43:15Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-NFCRIPPER
    Screenshots:
    None
    Threat Actors: jinkusu01
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Forum post claims to offer free download of 3,886 premium Hotmail email credentials described as valid hits from a mixed email list.
    Date: 2026-04-05T17:33:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71219/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  145. Alleged launch of new cybercrime forum PwnForums on clearnet and dark web
    Category: Cyber Attack
    Content: A new BreachForums-style cybercrime forum has been advertised, accessible via clearnet at pwnforums[.]st and via Tor at pwnfrm7rbf6kyerigxi677lcz5ifmoagdbqqknwdu2by27wfdst5qmqd[.]onion. The forum appears to be positioned as a replacement or clone of BreachForums, likely intended to host stolen data, credential leaks, and other cybercriminal activity.
    Date: 2026-04-05T17:14:04Z
    Network: telegram
    Published URL: https://t.me/SliceForLife/5088
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  146. Alleged leak of credential combolist containing 196 million records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 196 million URL:LOGIN:PASS combinations on a cybercrime forum. The specific source or target organizations of these credentials are not specified in the post.
    Date: 2026-04-05T17:10:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71218/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  147. Alleged data breach of Starbucks by ShadowByt3S group
    Category: Data Breach
    Content: The ShadowByt3S group claims to have breached Starbucks and leaked 10GB of data after the company allegedly failed to respond to ransom demands within 72 hours. The threat actors claim to have accessed data from an AWS S3 bucket and are distributing the stolen information through Tor onion sites.
    Date: 2026-04-05T17:09:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-StarBucks-10gb-gets-leaked
    Screenshots:
    None
    Threat Actors: ShadowByt3S
    Victim Country: United States
    Victim Industry: Food and Beverage
    Victim Organization: Starbucks
    Victim Site: starbucks.com
  148. Alleged distribution of Office 365 credential combolist targeting multiple financial platforms
    Category: Combo List
    Content: Threat actor distributes an 8 million record credential combolist targeting Office 365 accounts and various financial platforms including N26, Chime, Monzo, and cryptocurrency exchanges. The credentials are being shared through Telegram channels for free distribution.
    Date: 2026-04-05T17:00:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71217/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Multiple
    Victim Site: Unknown
  149. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor alphaxdd allegedly leaked 1,421 premium Hotmail email credentials as a free download on CrackingX forum. The actor claims the credentials are valid and from a private cloud source.
    Date: 2026-04-05T16:42:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71215/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  150. Website defacement of Microsoft Store China by Blasphemy (Singularity team)
    Category: Defacement
    Content: The Singularity team, specifically attacker Blasphemy:), defaced Microsofts Chinese online store website on April 5, 2026. This appears to be a redefacement of a previously compromised site.
    Date: 2026-04-05T16:41:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829701
    Screenshots:
    None
    Threat Actors: Blasphemy:), Singularity
    Victim Country: China
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: www.microsoftstore.com.cn
  151. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing over 1.1 million lines of mixed German domain email and password combinations via a Mega.nz download link.
    Date: 2026-04-05T16:32:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71214/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Alleged leak of massive credential combolist containing 3 billion records
    Category: Combo List
    Content: A threat actor shared a massive credential combolist containing 3 billion URL:Log:Pass combinations totaling 100GB in size on a cybercrime forum.
    Date: 2026-04-05T16:11:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71210/
    Screenshots:
    None
    Threat Actors: VitVit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: A threat actor shared a collection of 2,408 Hotmail credentials on the CrackingX forum. The post appears to offer free access to the credential list for registered forum users.
    Date: 2026-04-05T16:02:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71207/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  154. Alleged leak of email credentials combolist
    Category: Combo List
    Content: Threat actor noir shared a combolist containing valid email credentials including Hotmail accounts and other mixed email providers through their Telegram channel.
    Date: 2026-04-05T16:02:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71208/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  155. Alleged distribution of credential lists targeting Stripe, Square, QuickBooks, and Xero
    Category: Combo List
    Content: Threat actor distributes a 15 million record credential list targeting financial service platforms including Stripe, Square, QuickBooks, and Xero through Telegram channels. The actor offers free access to combolists and related programs through multiple Telegram groups.
    Date: 2026-04-05T15:52:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71205/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Alleged leak of New Zealand credentials combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a combolist containing over 15,000 email and password combinations allegedly from New Zealand users. The credentials are described as fresh and high quality.
    Date: 2026-04-05T15:31:46Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-15-K-%E2%9C%A6-New-Zealand-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: New Zealand
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Alleged leak of Norwegian credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 14,000 email and password combinations allegedly from Norway. The credentials are claimed to be fresh and high quality, distributed through hidden content on a cybercriminal forum.
    Date: 2026-04-05T15:30:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-14-K-%E2%9C%A6-Norway-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Norway
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Alleged leak of 1.3TB credential combolist
    Category: Combo List
    Content: A threat actor shared a 1.3TB collection of URL-login-password credentials described as a private database. The data appears to be offered as a free download containing browsing history and credential combinations.
    Date: 2026-04-05T15:28:49Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71204/
    Screenshots:
    None
    Threat Actors: strelok639
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Alleged leak of Portugal credential combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a credential combolist containing over 45,000 email and password combinations targeting Portugal users. The data is described as fresh and high quality, distributed through the Maxi_Leaks channel.
    Date: 2026-04-05T15:17:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-45-K-%E2%9C%A6-Portugal-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. Alleged leak of South African credential combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a combolist containing over 39,000 email and password combinations allegedly from South African users. The credentials are claimed to be fresh and high quality, distributed through hidden content requiring forum registration.
    Date: 2026-04-05T15:16:14Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-39-K-%E2%9C%A6-South-Africa-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: South Africa
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Alleged leak of Romanian credentials combolist
    Category: Combo List
    Content: A threat actor shared a fresh credential combolist containing over 34,000 email and password combinations targeting Romanian users. The credentials are being distributed for free on cybercrime forums.
    Date: 2026-04-05T15:15:05Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-34-K-%E2%9C%A6-Romania-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged leak of Slovakia credentials combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a combolist containing over 24,000 email and password combinations allegedly from Slovakia users. The credentials are claimed to be fresh and high quality, distributed through the Maxi_Leaks operation.
    Date: 2026-04-05T15:13:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-24-K-%E2%9C%A6-Slovakia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Slovakia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Website defacement of ELTS by PredixorX (XSQDD PHILIPPINE)
    Category: Defacement
    Content: PredixorX from the XSQDD PHILIPPINE team successfully defaced the ELTS website on April 5, 2026. The attack targeted a Linux-based server hosting the Philippine companys website.
    Date: 2026-04-05T15:05:47Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248287
    Screenshots:
    None
    Threat Actors: PredixorX, XSQDD PHILIPPINE
    Victim Country: Philippines
    Victim Industry: Unknown
    Victim Organization: ELTS
    Victim Site: elts.com.ph
  164. Alleged leak of Russian credential data via combolist
    Category: Combo List
    Content: Threat actor CobraEgy shared a combolist containing over 1.3 million email and password combinations allegedly originating from Russia. The credentials are described as fresh and high quality, distributed through a hidden download link on DemonForums.
    Date: 2026-04-05T15:01:19Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%A6%E2%9C%A6-1-3-M-%E2%9C%A6-Russia-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-5-4-2026-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Alleged leak of Maxi_Leaks credential logs
    Category: Data Leak
    Content: Threat actor CobraEgy shared a 3.4 GB collection of credential logs labeled as Maxi_Leaks dated 6/4/2026. The logs are described as fresh and high quality, containing username and password combinations.
    Date: 2026-04-05T15:00:13Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Request-%E2%9C%A6%E2%9C%A6-LOG-S-%E2%9C%A6%E2%9C%A6-Maxi-Leaks-%E2%9C%A6%E2%9C%A6-6-4-2026-%E2%9C%A6%E2%9C%A6-3-4-GB-%E2%9C%A6%E2%9C%A6
    Screenshots:
    None
    Threat Actors: CobraEgy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Alleged distribution of credential lists targeting PayPal, Wise, Revolut, Payoneer, and Cash App users
    Category: Combo List
    Content: Threat actor CODER is distributing email:password credential lists (combolists) containing 12 million records allegedly targeting users of financial services including PayPal, Wise, Revolut, Payoneer, and Cash App through Telegram channels.
    Date: 2026-04-05T14:59:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71201/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Website defacement of Vaughan Tamils community organization by E.H.9/XmrAnonye.id team
    Category: Defacement
    Content: The website of Vaughan Tamils, a Canadian Tamil community organization, was defaced by attacker E.H.9 affiliated with the XmrAnonye.id team on April 5, 2026. The attack targeted a Linux-based server hosting the community organizations website.
    Date: 2026-04-05T14:54:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248286
    Screenshots:
    None
    Threat Actors: E.H.9, XmrAnonye.id
    Victim Country: Canada
    Victim Industry: Community Organization
    Victim Organization: Vaughan Tamils
    Victim Site: vaughantamils.ca
  168. Alleged leak of mixed forum credential combolist
    Category: Combo List
    Content: User ValidMail allegedly shared an 82,000 record mixed credential combolist containing valid forum accounts on CrackingX forum. The post content is restricted to registered users only.
    Date: 2026-04-05T14:47:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71200/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  169. Alleged distribution of mixed credential combolist
    Category: Combo List
    Content: Forum post shares a mixed credential combolist labeled as HQ Mix containing login credentials from various sources. The post requires registration to access the hidden content.
    Date: 2026-04-05T14:36:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X2686-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a fresh high-quality combolist containing 4,000 mixed email credentials on a cybercriminal forum.
    Date: 2026-04-05T14:34:06Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71199/
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Alleged data leak of Center for Administrative Services in Ternopil, Ukraine
    Category: Data Leak
    Content: A Telegram channel posted what appears to be leaked data or compromised content related to the Center for Administrative Services in Ternopil, Ukraine (cnap.rada.te.ua). The post is framed as a celebratory share, suggesting the content was made available for free. The nature of the leaked content is not fully specified but implies government administrative data.
    Date: 2026-04-05T14:11:20Z
    Network: telegram
    Published URL: https://t.me/c/2453363811/1328
    Screenshots:
    None
    Threat Actors: Перун Сварога
    Victim Country: Ukraine
    Victim Industry: Government
    Victim Organization: Center for Administrative Services in Ternopil (ЦНАП)
    Victim Site: cnap.rada.te.ua
  172. Alleged sale of compromised business PayPal account
    Category: Initial Access
    Content: Threat actor claims to be selling access to an active business PayPal account from a US shop, reportedly containing approximately $30,000 and having processed over $19 million in transactions over three years.
    Date: 2026-04-05T14:04:24Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Business-Paypal-account
    Screenshots:
    None
    Threat Actors: Jurak
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Alleged leak of credentials from multiple platforms including Discord, Stack Overflow, Binance, and Coinbase
    Category: Combo List
    Content: Threat actor distributes a mixed combolist containing 17 million credentials allegedly from Discord, Stack Overflow, Medium, Binance, Coinbase, and Trust Wallet through Telegram channels. The credentials are being distributed for free through specified Telegram groups.
    Date: 2026-04-05T14:02:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71196/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Discord, Stack Overflow, Binance, Coinbase, Trust Wallet)
    Victim Site: Multiple platforms
  174. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 179,363 mixed country Hotmail email and password combinations via a file sharing service.
    Date: 2026-04-05T14:02:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71197/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  175. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum user HollowKnight07 shared a sample combolist containing 484 Hotmail email credentials on CrackingX forum as a free download.
    Date: 2026-04-05T14:02:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71198/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  176. Alleged Cyber Attack on Kuwait Ministry of Interior by Nasir Hacker Group
    Category: Cyber Attack
    Content: The hacker group Nasir has claimed responsibility for infiltrating Kuwaiti government and intelligence systems, including the Ministry of Interior. The group alleges it obtained documents related to Kuwaits military and intelligence cooperation with foreign entities, including the United States. They claim to possess information on Kuwaiti officials, military personnel, and political figures, threatening to publish portions of the data. The group also warned of further cyberattacks against Kuwaiti infrastructure if current conditions continue.
    Date: 2026-04-05T13:59:00Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20995
    Screenshots:
    None
    Threat Actors: نصیر
    Victim Country: Kuwait
    Victim Industry: Government
    Victim Organization: Kuwait Ministry of Interior
    Victim Site: Unknown
  177. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 allegedly valid Hotmail email account credentials dated April 5th.
    Date: 2026-04-05T13:49:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71195/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  178. Alleged distribution of stealer logs by FateTraffic threat actor
    Category: Logs
    Content: Threat actor fatetraffic distributed a collection of 1,392 mixed stealer logs via file sharing platform, containing stolen credentials and browser data harvested by information stealing malware.
    Date: 2026-04-05T13:48:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%93%97-FATETRAFFIC-1392-MIX-05-04-2026-STEALER-LOGS
    Screenshots:
    None
    Threat Actors: fatetraffic
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  179. Website defacement of alccoaching.org by Aptisme (Leviathan Perfect Hunter team)
    Category: Defacement
    Content: The coaching services website alccoaching.org was defaced by threat actor Aptisme, operating as part of the Leviathan Perfect Hunter team. This was a targeted single-site defacement attack rather than part of a mass campaign.
    Date: 2026-04-05T13:42:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829698
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Professional Services
    Victim Organization: ALC Coaching
    Victim Site: alccoaching.org
  180. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor snowstormxd allegedly shared fresh Hotmail credentials via a Telegram channel. The exact number of affected accounts and method of acquisition are not specified in the post.
    Date: 2026-04-05T13:38:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71193/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  181. Website defacement of Evervision by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, with attacker XYZ, successfully defaced the homepage of Evervisions website on April 5, 2026. This was a single-target home page defacement rather than a mass attack.
    Date: 2026-04-05T13:31:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829697
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: South Korea
    Victim Industry: Unknown
    Victim Organization: Evervision
    Victim Site: evervision.co.kr
  182. Website defacement of Evervision by Alpha wolf team
    Category: Defacement
    Content: The Alpha wolf team, attributed to attacker XYZ, successfully defaced the Evervision website on April 5, 2026. The attack targeted a Linux-based server hosting the South Korean technology companys website.
    Date: 2026-04-05T13:30:03Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248285
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: South Korea
    Victim Industry: Technology
    Victim Organization: Evervision
    Victim Site: evervision.co.kr
  183. Alleged WordPress-related data leak by threat actor zod
    Category: Combo List
    Content: Threat actor zod posted WordPress-related content in a combolists and dumps forum section, with access details provided via Telegram channel. Specific content details are protected behind registration requirements.
    Date: 2026-04-05T13:29:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71191/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing 1,120 Hotmail email and password combinations on a cybercrime forum as a free download.
    Date: 2026-04-05T13:28:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71192/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  185. Alleged leak of XAMs 316 database collection from multiple forums
    Category: Data Leak
    Content: A threat actor shared XAMs collection of 316 databases containing 5.7 million records originally from RaidForums 2019. The databases were allegedly obtained using a custom auto dumper tool and contain data from various forum websites including gaming, automotive, medical, and other industry forums.
    Date: 2026-04-05T13:27:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-XAM-s-316-Database-Collection-2019-5-7-Million
    Screenshots:
    None
    Threat Actors: Blastoize
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  186. Alleged leak of mixed email access credentials
    Category: Combo List
    Content: A threat actor leaked a collection of 5,000 valid email access credentials from mixed sources. The credentials are being distributed on a cybercriminal forum as hidden content for registered users.
    Date: 2026-04-05T13:19:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71190/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  187. Website defacement of Aiello Engineering by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker working with the Alpha wolf team successfully defaced the homepage of Aiello Engineerings website on April 5, 2026. This was a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-05T13:18:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829696
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Engineering
    Victim Organization: Aiello Engineering
    Victim Site: aielloengineering.com
  188. Website defacement of Aiello Engineering by XYZ/Alpha wolf team
    Category: Defacement
    Content: The XYZ attacker from Alpha wolf team defaced the Aiello Engineering website on April 5, 2026. The attack targeted a FreeBSD-hosted engineering company website.
    Date: 2026-04-05T13:17:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248284
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Engineering
    Victim Organization: Aiello Engineering
    Victim Site: aielloengineering.com
  189. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Actor TeraCloud1 shared a collection of 3,000 valid email credentials described as Mix on a cracking forum. The content is hidden and requires registration to access, with additional private cloud access offered via Telegram.
    Date: 2026-04-05T13:09:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71189/
    Screenshots:
    None
    Threat Actors: TeraCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Alleged data breach of CustomKing database
    Category: Data Leak
    Content: A 105MB SQL database dump from UK online store CustomKing is being shared on a dark web forum. The threat actor has provided contact information via Telegram for further communication.
    Date: 2026-04-05T13:08:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-customking-co-uk-UK-online-store-website-database
    Screenshots:
    None
    Threat Actors: crazyboy68
    Victim Country: United Kingdom
    Victim Industry: E-commerce
    Victim Organization: CustomKing
    Victim Site: customking.co.uk
  191. Alleged leak of Japanese email credentials
    Category: Combo List
    Content: A threat actor leaked approximately 1,700 valid Japanese email credentials on a cybercrime forum. The credentials appear to be from April 5th, 2024 and are being distributed to registered forum users.
    Date: 2026-04-05T12:59:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71188/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Alleged leak of US email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 1,000 US-based email credentials dated April 5th on a cybercrime forum. The post indicates the data consists of valid email access credentials.
    Date: 2026-04-05T12:47:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71187/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Alleged leak of French email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,100 French email credentials allegedly obtained in April 2024. The credentials are being distributed for free to registered forum users.
    Date: 2026-04-05T12:37:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71186/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  194. Website defacement of jobsinabudhabi.com by VinzXploit/CYBER ERROR SYSTEM
    Category: Defacement
    Content: The attacker VinzXploit from the CYBER ERROR SYSTEM team successfully defaced the jobsinabudhabi.com website on April 5, 2026. The defacement targeted a job portal serving the Abu Dhabi employment market.
    Date: 2026-04-05T12:26:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829682
    Screenshots:
    None
    Threat Actors: VinzXploit, CYBER ERROR SYSTEM
    Victim Country: United Arab Emirates
    Victim Industry: Employment Services
    Victim Organization: Jobs in Abu Dhabi
    Victim Site: jobsinabudhabi.com
  195. Website defacement of theinfopedia.com by VinzXploit (CYBER ERROR SYSTEM)
    Category: Defacement
    Content: VinzXploit from the CYBER ERROR SYSTEM team successfully defaced theinfopedia.com on April 5, 2026, targeting the pwd.php page of the information/media website.
    Date: 2026-04-05T12:25:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829683
    Screenshots:
    None
    Threat Actors: VinzXploit, CYBER ERROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Information/Media
    Victim Organization: The Infopedia
    Victim Site: theinfopedia.com
  196. Website defacement of ittedi.com by VinzXploit/CYBER ERROR SYSTEM
    Category: Defacement
    Content: VinzXploit from the CYBER ERROR SYSTEM team defaced the ittedi.com website on April 5, 2026, targeting the pwd.php page. The attack was documented and archived on zone-xsec.com mirror.
    Date: 2026-04-05T12:25:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829689
    Screenshots:
    None
    Threat Actors: VinzXploit, CYBER ERROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ittedi.com
  197. Website defacement of IT Team Corp by VinzXploit (CYBER ERROR SYSTEM)
    Category: Defacement
    Content: VinzXploit from the CYBER ERROR SYSTEM team successfully defaced the IT Team Corp website on April 5, 2026, targeting the pwd.php page. The incident appears to be a single-site defacement rather than a mass attack campaign.
    Date: 2026-04-05T12:24:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829694
    Screenshots:
    None
    Threat Actors: VinzXploit, CYBER ERROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Information Technology
    Victim Organization: IT Team Corp
    Victim Site: itteamcorp.com
  198. Website defacement of Real Wealth Australia by VinzXploit/CYBER ERROR SYSTEM
    Category: Defacement
    Content: Website defacement attack conducted by VinzXploit from the CYBER ERROR SYSTEM team against Real Wealth Australias website on April 5, 2026. The attack targeted what appears to be a financial services company based in Australia.
    Date: 2026-04-05T12:24:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829695
    Screenshots:
    None
    Threat Actors: VinzXploit, CYBER ERROR SYSTEM
    Victim Country: Australia
    Victim Industry: Financial Services
    Victim Organization: Real Wealth Australia
    Victim Site: www.realwealthaustralia.com
  199. Mass website defacement campaign by Zod targeting skillerio.com
    Category: Defacement
    Content: The attacker/group known as Zod conducted a mass defacement campaign targeting skillerio.com on April 5, 2026. This was identified as a mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-05T12:17:54Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248274
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology/Education
    Victim Organization: Skiller
    Victim Site: skillerio.com
  200. Mass website defacement campaign by Zod targeting infiniaclinic.com
    Category: Defacement
    Content: Threat actor Zod conducted a mass defacement campaign targeting the Infinia Clinic website on April 5, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-05T12:17:35Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248276
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Infinia Clinic
    Victim Site: infiniaclinic.com
  201. Mass defacement campaign by Zod targeting housingcompare.in
    Category: Defacement
    Content: Attacker group Zod conducted a mass defacement campaign targeting housingcompare.in, a real estate comparison website. The attack was part of a broader mass defacement operation rather than a targeted single-site compromise.
    Date: 2026-04-05T12:17:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248277
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Real Estate
    Victim Organization: Housing Compare
    Victim Site: housingcompare.in
  202. Mass defacement campaign by Zod threat actor targeting facesmbymadhuraa.com
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting facesmbymadhuraa.com, a beauty/cosmetics business website. The attack occurred on April 5, 2026, affecting a Linux-based server hosting the victims website.
    Date: 2026-04-05T12:16:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248278
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Beauty/Cosmetics
    Victim Organization: Faces by Madhuraa
    Victim Site: facesmbymadhuraa.com
  203. Mass defacement targeting education sector by Zod
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting the DigitizeLearn educational platform. This incident was part of a broader mass defacement operation affecting multiple websites simultaneously.
    Date: 2026-04-05T12:16:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248279
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Education
    Victim Organization: DigitizeLearn
    Victim Site: digitizelearn.in
  204. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: Threat actor Zod conducted a mass defacement campaign targeting multiple websites including digitalhackzone.com on April 5, 2026. The attack targeted Linux-based systems and affected multiple sites simultaneously rather than a single organization.
    Date: 2026-04-05T12:16:12Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248280
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: digitalhackzone.com
  205. Mass website defacement by Zod targeting chanakyacp.com
    Category: Defacement
    Content: The attacker known as Zod conducted a mass defacement campaign targeting chanakyacp.com on April 5, 2026. The incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-05T12:15:52Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248283
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Chanakya CP
    Victim Site: chanakyacp.com
  206. Website defacement of adigitalgalaxy.com by Zod
    Category: Defacement
    Content: The attacker known as Zod successfully defaced the adigitalgalaxy.com website on April 5, 2026. The target appears to be a technology-related organization running on a Linux server.
    Date: 2026-04-05T12:09:55Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248273
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: A Digital Galaxy
    Victim Site: adigitalgalaxy.com
  207. Alleged leak of GMX email credentials combolist
    Category: Combo List
    Content: A threat actor distributed a targeted combolist containing 124,000 GMX email credentials in email:password format. The actor also advertises selling additional credential lists for various email providers and countries through Telegram contact.
    Date: 2026-04-05T12:06:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-124K-GMX-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: GMX
    Victim Site: gmx.com
  208. Alleged distribution of corporate credential combolist via Telegram
    Category: Combo List
    Content: Threat actor CODER is distributing a 7 million record corporate credential combolist for free through Telegram channels. The actor also operates channels for free programs and additional credential lists.
    Date: 2026-04-05T11:55:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71183/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Website defacement of sportmassage.hu by Zod
    Category: Defacement
    Content: The attacker known as Zod successfully defaced the Hungarian sports massage website sportmassage.hu on April 5, 2026. This appears to be an isolated defacement incident targeting a healthcare/wellness service provider.
    Date: 2026-04-05T11:52:59Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248271
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Hungary
    Victim Industry: Healthcare/Wellness
    Victim Organization: Unknown
    Victim Site: sportmassage.hu
  210. Website defacement of oznetshop.com by Zod
    Category: Defacement
    Content: The attacker known as Zod successfully defaced the oznetshop.com e-commerce website on April 5, 2026. The defacement targeted a specific page (zod.html) on the cloud-hosted platform.
    Date: 2026-04-05T11:52:41Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248272
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Oznetshop
    Victim Site: oznetshop.com
  211. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared what they claim are fresh, valid Hotmail credentials in a combolist format. The actor indicates these are private files with untouched hits, suggesting previously unused credential combinations.
    Date: 2026-04-05T11:45:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Fresh-Hotmail-Drops
    Screenshots:
    None
    Threat Actors: Akari21
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  212. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor leaked a mixed credential combolist containing 32,890 lines of compromised credentials. The data is distributed for free via Telegram channel with password protection.
    Date: 2026-04-05T11:43:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71181/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  213. Alleged leak of WEB.DE email credentials
    Category: Combo List
    Content: Actor WINGO allegedly shared a combolist containing 3,000 WEB.DE email and password combinations on a cybercriminal forum.
    Date: 2026-04-05T11:33:43Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3K-WEB-DE
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Germany
    Victim Industry: Technology
    Victim Organization: WEB.DE
    Victim Site: web.de
  214. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing 1,000 valid mixed email and password combinations through a free download link on Pasteview.
    Date: 2026-04-05T11:32:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-VALID-MIXED
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  215. Alleged leak of educational institution credentials and social media data
    Category: Combo List
    Content: A threat actor shared a credential list containing 136,052 entries allegedly targeting educational institutions, social media platforms, and shopping sites. The data is being distributed for free through a file hosting service.
    Date: 2026-04-05T11:30:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71179/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  216. Alleged data breach of PrimeTel/NConnect
    Category: Data Breach
    Content: Threat actor AckLine is selling a 21GB database dump from Botswana internet service provider NConnect/PrimeTel for $300. The data allegedly contains information from 2014-2026 including 67 employees full names and emails.
    Date: 2026-04-05T10:51:37Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-PrimeTel-PTY-LTD-T-A-Nconnect
    Screenshots:
    None
    Threat Actors: AckLine
    Victim Country: Botswana
    Victim Industry: Telecommunications
    Victim Organization: PrimeTel (PTY) LTD T/A Nconnect
    Victim Site: Unknown
  217. Alleged leak of corporate email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 19,000 corporate email credentials described as fresh and valid, dated April 5th. The credentials appear to be made available for free download to registered forum users.
    Date: 2026-04-05T10:47:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71176/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  218. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,910 mixed email credentials for free download on a cybercrime forum.
    Date: 2026-04-05T10:47:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71177/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  219. Alleged data leak of Greenhandle.in customer database
    Category: Data Leak
    Content: Customer database from Indian B2B packaging marketplace Greenhandle.in allegedly leaked, containing customer names, business names, mobile numbers, email addresses, product orders, and quantities.
    Date: 2026-04-05T10:47:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-greenhandle-in-is-an-online-B2B-marketplace-based-in-INDIA
    Screenshots:
    None
    Threat Actors: crazyboy68
    Victim Country: India
    Victim Industry: E-commerce
    Victim Organization: Greenhandle
    Victim Site: greenhandle.in
  220. Alleged data breach of UNIFAP university portal in Brazil
    Category: Data Breach
    Content: Database dump from a Brazilian university student portal containing user IDs, email addresses, password hashes, and account status information. The compromised system manages student grades, curricula, announcements, and educational documents.
    Date: 2026-04-05T10:46:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-conta-unifapace-edu-br-is-a-student-website-from-BRAZIL-DB-Access
    Screenshots:
    None
    Threat Actors: crazyboy68
    Victim Country: Brazil
    Victim Industry: Education
    Victim Organization: UNIFAP
    Victim Site: conta.unifapace.edu.br
  221. Website defacement of gerhardthiel.com by Hiro-X (Maros Black Hat)
    Category: Defacement
    Content: The personal website gerhardthiel.com was defaced by attacker Hiro-X, affiliated with the Maros Black Hat team, on April 5th, 2026. The incident targeted a Linux-hosted website and appears to be an isolated defacement rather than part of a mass campaign.
    Date: 2026-04-05T10:45:34Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248270
    Screenshots:
    None
    Threat Actors: Hiro-X, Maros Black Hat
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Gerhard Thiel
    Victim Site: gerhardthiel.com
  222. Alleged leak of TEEB Valuation Database by PaskoCyberRexor
    Category: Data Leak
    Content: A post forwarded from PASKO FORUM (P/F) claims to share the TEEB Valuation Database via an external document link (sg.docworkspace.com). The post is attributed to handles DanzNisMxst7 and PaskoCyberRexor, with a linked Telegram channel. The database appears to be made available for free download.
    Date: 2026-04-05T10:38:56Z
    Network: telegram
    Published URL: https://t.me/paskocyberrexor/65
    Screenshots:
    None
    Threat Actors: PaskoCyberRexor
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: TEEB
    Victim Site: Unknown
  223. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: User klyne05 shared a combolist containing Hotmail email credentials on a cybercriminal forum. The post indicates the credentials are described as private, fresh, and checked.
    Date: 2026-04-05T10:36:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71174/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  224. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a sample combolist containing 650 Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-05T10:35:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71175/
    Screenshots:
    None
    Threat Actors: HollowKnight07
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  225. Alleged data leak of Vietnamese website anhsangsoiduong.vn database
    Category: Data Leak
    Content: A threat actor leaked an 800MB SQL database dump from Vietnamese website anhsangsoiduong.vn containing user credentials, email addresses, and registration data.
    Date: 2026-04-05T10:35:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-anhsangsoiduong-vn-Vietnamese-website-database
    Screenshots:
    None
    Threat Actors: crazyboy68
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: anhsangsoiduong.vn
  226. Website defacement of meshkat.store by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The e-commerce website meshkat.store was defaced by attacker tirz4sec, affiliated with the jatengblekhet team, on April 5, 2026. The defacement targeted the WordPress uploads directory of the online store.
    Date: 2026-04-05T10:34:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829673
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Meshkat Store
    Victim Site: meshkat.store
  227. Website defacement of Free-Find by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The attacker tirz4sec, associated with the jatengblekhet team, defaced the Free-Find website on April 5, 2026. The attack targeted the WordPress content directory of the UK-based technology service provider.
    Date: 2026-04-05T10:32:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829674
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: United Kingdom
    Victim Industry: Technology
    Victim Organization: Free-Find
    Victim Site: free-find.co.uk
  228. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor allegedly leaked 34,000 German email credentials with full valid mail access on a cybercrime forum.
    Date: 2026-04-05T10:25:55Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71172/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  229. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: Threat actor leaked a mixed combolist containing 39,000 email credentials through a file sharing service and promoted additional credential databases via Telegram channel.
    Date: 2026-04-05T10:25:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71173/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  230. Alleged Sale of Hotmail Credential Combolists Across Multiple Countries
    Category: Combo List
    Content: A threat actor is selling Hotmail credential combolists covering multiple countries including UK, DE, JP, NL, BR, PL, ES, US, IT, and others. The actor claims to own a private cloud and offers inbox searching with keyword filtering. The combolists are themed around popular platforms including PayPal, eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. Valid NTLWorld webmails are also offered. Buyers are directed to DM for requests.
    Date: 2026-04-05T10:20:49Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59408
    Screenshots:
    None
    Threat Actors: Admu
    Victim Country: Unknown
    Victim Industry: Technology / Email Services
    Victim Organization: Hotmail / Microsoft
    Victim Site: hotmail.com
  231. Website defacement of gearowl.com by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The website gearowl.com was defaced by attacker tirz4sec, associated with the jatengblekhet team, on April 5, 2026. The defacement targeted the WordPress uploads directory of the site.
    Date: 2026-04-05T10:19:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829668
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: GearOwl
    Victim Site: gearowl.com
  232. Website defacement of gv-neckarsulm.de by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: On April 5, 2026, the website of gv-neckarsulm.de was defaced by attacker tirz4sec, who is affiliated with the jatengblekhet team. The defacement targeted the WordPress content directory of what appears to be a German municipal government website.
    Date: 2026-04-05T10:18:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829669
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Germany
    Victim Industry: Government
    Victim Organization: City of Neckarsulm
    Victim Site: gv-neckarsulm.de
  233. Website defacement of Mobilificio Solinas by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The attacker tirz4sec, affiliated with the jatengblekhet team, successfully defaced the website of Italian furniture manufacturer Mobilificio Solinas on April 5, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-05T10:18:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829670
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Italy
    Victim Industry: Furniture Manufacturing
    Victim Organization: Mobilificio Solinas
    Victim Site: www.mobilificiosolinas.it
  234. Website defacement of niptuckpages.com by tirz4sec/jatengblekhet team
    Category: Defacement
    Content: The website niptuckpages.com was defaced by attacker tirz4sec affiliated with the jatengblekhet team on April 5, 2026. This appears to be an isolated single-site defacement incident.
    Date: 2026-04-05T10:17:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829671
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: niptuckpages.com
  235. Alleged cyber attack by Hanzala group targeting 27 Israeli companies
    Category: Cyber Attack
    Content: The hacktivist group Hanzala claimed responsibility for a cyber attack targeting the websites of 27 Israeli companies. The group stated the operation was carried out in response to the killing of children in Minab, framing it as cyber retaliation. The attack reportedly targeted company websites to deliver a political message.
    Date: 2026-04-05T10:17:44Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20993
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Israel
    Victim Industry: Multiple sectors
    Victim Organization: Multiple Israeli companies (27)
    Victim Site: Unknown
  236. Alleged leak of Hotmail credential combinations
    Category: Combo List
    Content: A threat actor shared a combolist containing 2,400 Hotmail credential combinations from various countries on a cybercriminal forum.
    Date: 2026-04-05T10:15:27Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71171/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  237. Website defacement of campiuttiesteves.com.br by tirz4sec (jatengblekhet team)
    Category: Defacement
    Content: The website campiuttiesteves.com.br was defaced by attacker tirz4sec, affiliated with the jatengblekhet team, on April 5, 2026. The defacement targeted a specific file (t.txt) on the Brazilian website.
    Date: 2026-04-05T10:06:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829666
    Screenshots:
    None
    Threat Actors: tirz4sec, jatengblekhet
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Campiutti Esteves
    Victim Site: campiuttiesteves.com.br
  238. Alleged new operation or data release by Handala hack group
    Category: Cyber Attack
    Content: Handala, a known pro-Palestinian hacktivist group, announced a new post on their official site via a shortened URL. The post likely contains details of a cyber attack, data breach, or leak targeting Israeli organizations, consistent with the groups historical activity.
    Date: 2026-04-05T10:05:00Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/75
    Screenshots:
    None
    Threat Actors: HANDALA HACK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  239. Alleged malicious npm packages impersonating Strapi plugins used for remote access and data theft
    Category: Malware
    Content: 36 malicious packages were identified on npm, masquerading as legitimate Strapi plugins. Upon installation, they execute malicious code enabling remote access, credential theft, and persistent backdoor establishment. Attackers leveraged Redis and PostgreSQL to exfiltrate sensitive data, with a particular focus on cryptocurrency-related information.
    Date: 2026-04-05T09:57:32Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20992
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Software Development
    Victim Organization: Unknown
    Victim Site: npmjs.com
  240. Alleged leak of mixed access credential list
    Category: Combo List
    Content: A threat actor shared a credential list containing email and password combinations for mixed access accounts via a free download link on a cybercriminal forum.
    Date: 2026-04-05T09:47:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-mixed-access
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  241. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: A threat actor named Jelooos allegedly shared a combolist containing 3.4K fresh Hotmail credentials on the CrackingX forum. The post indicates these are valid credential combinations.
    Date: 2026-04-05T09:46:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71169/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  242. Alleged Cyber Attack by North Korean Hackers on Cryptocurrency Platform via Social Engineering
    Category: Cyber Attack
    Content: A report from Cyberban News (Persian-language cybersecurity outlet) describes a recent attack attributed to North Korea-linked hackers against a cryptocurrency platform. The attackers reportedly did not rely solely on technical vulnerabilities; instead, they used slow infiltration and social engineering to gain the trust of platform members and exploit internal decision-making processes. The report highlights that cryptocurrency security cannot be guaranteed by technical code review alone, as human factors and management processes represent significant attack surfaces.
    Date: 2026-04-05T09:42:15Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20991
    Screenshots:
    None
    Threat Actors: North Korean Hackers
    Victim Country: Unknown
    Victim Industry: Cryptocurrency / Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  243. Alleged defacement of multiple websites by INDOHAXSEC (FidzXploit)
    Category: Defacement
    Content: Threat actor FidzXploit operating under the group INDOHAXSEC claimed responsibility for defacing multiple websites including domains associated with India (sivaadvertisingcompany.in), Pakistan (khurramumtaz.com), and Brazil (lampiaosolucoes.com.br), among others. A Zone-H mirror (ID: 41673308) was submitted as proof of the defacements.
    Date: 2026-04-05T09:25:22Z
    Network: telegram
    Published URL: https://t.me/IndoHaxSec3/83
    Screenshots:
    None
    Threat Actors: INDOHAXSEC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: boovikey.sivaadvertisingcompany.in, heavydata.khurramumtaz.com, hospital.spearas.com, heavydata.spearas.com, lp.lampiaosolucoes.com.br, school.spearas.com, shop.spearas.com
  244. Alleged defacement of multiple websites by INDOHAXSEC
    Category: Defacement
    Content: Threat actor FidzXploit operating under the INDOHAXSEC group claims to have defaced multiple websites including domains associated with sivaadvertisingcompany.in, khurramumtaz.com, spearas.com, and lampiaosolucoes.com.br. A photo was shared as proof of the defacements.
    Date: 2026-04-05T09:23:40Z
    Network: telegram
    Published URL: https://t.me/c/3180612800/83
    Screenshots:
    None
    Threat Actors: FidzXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: boovikey.sivaadvertisingcompany.in, heavydata.khurramumtaz.com, hospital.spearas.com, heavydata.spearas.com, lp.lampiaosolucoes.com.br, school.spearas.com, shop.spearas.com
  245. Website defacement of Siva Advertising Company by fidzxploit/INDOHAXSEC
    Category: Defacement
    Content: The website boovikey.sivaadvertisingcompany.in belonging to Siva Advertising Company was defaced by attacker fidzxploit from the INDOHAXSEC team on April 5, 2026. The targeted server was running on Linux operating system.
    Date: 2026-04-05T09:20:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248263
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: India
    Victim Industry: Advertising
    Victim Organization: Siva Advertising Company
    Victim Site: boovikey.sivaadvertisingcompany.in
  246. Website defacement of heavydata.khurramumtaz.com by fidzxploit/INDOHAXSEC
    Category: Defacement
    Content: The website heavydata.khurramumtaz.com was defaced by attacker fidzxploit from the INDOHAXSEC team on April 5, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-05T09:20:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248264
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: heavydata.khurramumtaz.com
  247. Mass defacement campaign by INDOHAXSEC targeting hospital infrastructure
    Category: Defacement
    Content: The threat actor fidzxploit from INDOHAXSEC team conducted a mass defacement campaign targeting healthcare infrastructure on April 5, 2026. The attack affected hospital.spearas.com as part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-05T09:20:11Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248265
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: hospital.spearas.com
  248. Mass website defacement by INDOHAXSEC team member fidzxploit targeting heavydata.spearas.com
    Category: Defacement
    Content: INDOHAXSEC team member fidzxploit conducted a mass defacement attack targeting heavydata.spearas.com on April 5, 2026. This was part of a larger mass defacement campaign rather than an isolated single-site attack.
    Date: 2026-04-05T09:19:53Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248266
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: heavydata.spearas.com
  249. Website defacement of Lampiao Solucoes by fidzxploit (INDOHAXSEC)
    Category: Defacement
    Content: Brazilian business services company Lampiao Solucoes had their website defaced by attacker fidzxploit associated with the INDOHAXSEC team on April 5, 2026. The attack targeted the companys subdomain landing page hosted on a Linux server.
    Date: 2026-04-05T09:19:35Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248267
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: Brazil
    Victim Industry: Business Services
    Victim Organization: Lampiao Solucoes
    Victim Site: lp.lampiaosolucoes.com.br
  250. Mass defacement campaign by INDOHAXSEC targeting educational institutions
    Category: Defacement
    Content: INDOHAXSEC threat group conducted a mass defacement campaign targeting educational websites. The attack was carried out by operator fidzxploit and affected the school.spearas.com domain as part of a broader campaign against multiple sites.
    Date: 2026-04-05T09:19:17Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248268
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: school.spearas.com
  251. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a mixed credential combolist containing 9,000 email and password combinations through a free download link on a cybercriminal forum.
    Date: 2026-04-05T09:18:51Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-9K-MIXED-LEAK
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  252. Alleged leak of Hotmail credentials combolist
    Category: Combo List
    Content: A combolist containing 1.58 million Hotmail credentials from mixed countries has been made available for free download. The threat actor shared the credential list through a file hosting service.
    Date: 2026-04-05T08:59:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71165/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  253. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a Google Drive link containing a combolist of 10,000 mixed email credentials for free download on a cybercrime forum.
    Date: 2026-04-05T08:21:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71163/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  254. Alleged distribution of ConcreteBending 8.01 cracked software
    Category: Initial Access
    Content: Forum post offering download of cracked ConcreteBending 8.01 engineering software for concrete structural analysis. The post appears to be distributing pirated software disguised as legitimate engineering content.
    Date: 2026-04-05T08:21:42Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71164/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: Unknown
    Victim Site: Unknown
  255. Alleged sale of stolen credit cards and carding tools via Telegram channels
    Category: Cyber Attack
    Content: Multiple actors are advertising stolen credit card (CC) stores, card checkers, and CVV services across a Telegram marketplace channel. Advertisements reference @vcxdcvx as a CC store, @cocococococococo1 as a card checker service, t.me/fsdf12452 for high-balance cards, and @nzccg001 for a CVV benefits group. Chinese-language posts also advertise bulk messaging and custom software services via @LW_0808.
    Date: 2026-04-05T08:15:30Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59360
    Screenshots:
    None
    Threat Actors: NeZha CVV Support
    Victim Country: Unknown
    Victim Industry: Financial
    Victim Organization: Unknown
    Victim Site: Unknown
  256. Alleged distribution of pirated CADValley InfraWizard Professional 2026 software
    Category: Data Leak
    Content: Forum post appears to be distributing pirated CADValley InfraWizard Professional 2026 software for free download. The post contains detailed product descriptions and features of the infrastructure design software.
    Date: 2026-04-05T08:12:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71161/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: CADValley
    Victim Site: Unknown
  257. Alleged distribution of cracked Codemill IFC Export software
    Category: Initial Access
    Content: A forum post distributes cracked version of Codemill IFC Export for Autodesk AutoCAD Plant3D 3.0.5 software for free download. The post provides detailed description of the softwares features and functionality for Building Information Modeling workflows.
    Date: 2026-04-05T08:11:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71162/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: Codemill
    Victim Site: Unknown
  258. Alleged data breach of Bank Pembangunan Daerah Banten
    Category: Data Breach
    Content: Threat actor Blastoize claims to possess data from Indonesian regional development bank containing 733,000 card details and 73,000 individual customer records. The leaked data includes card numbers, transaction details, customer names, addresses, and identification numbers from Bank Pembangunan Daerah Bantens systems.
    Date: 2026-04-05T08:11:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Indonesia-bankbanten-co-id-Bank-Pembangunan-Daerah-Banten-16-Million-2024
    Screenshots:
    None
    Threat Actors: Blastoize
    Victim Country: Indonesia
    Victim Industry: Financial Services
    Victim Organization: Bank Pembangunan Daerah Banten
    Victim Site: bankbanten.co.id
  259. Alleged data leak of Puerto Inteligente Seguro Mexico personnel database
    Category: Data Leak
    Content: Threat actor marssepe leaked a database containing personal information of over 640,000 personnel registered with Puerto Inteligente Seguro Mexico. The leaked data includes names, government IDs (CURP, RFC), social security numbers, blood types, employment details, and photos.
    Date: 2026-04-05T08:11:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-LEAK-Personal-Puerto-Inteligente-Seguro-Mexico-640K
    Screenshots:
    None
    Threat Actors: marssepe
    Victim Country: Mexico
    Victim Industry: Transportation
    Victim Organization: Puerto Inteligente Seguro
    Victim Site: puertointeligenteseguro.mx
  260. Alleged bypass sale targeting pbipsi.com
    Category: Vulnerability
    Content: A threat actor is offering a 1x bypass for pbipsi.com, suggesting a security bypass tool or technique targeting this domain, potentially for unauthorized access or circumventing security controls.
    Date: 2026-04-05T08:01:08Z
    Network: telegram
    Published URL: https://t.me/c/2939819285/77
    Screenshots:
    None
    Threat Actors: Jax Plans Bot
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pbipsi.com
  261. Alleged distribution of cracked CadPro Tools for AutoCAD 2026
    Category: Data Leak
    Content: Forum post distributing cracked version of CadPro Tools for AutoCAD 2026 software with detailed feature descriptions and installation instructions.
    Date: 2026-04-05T08:00:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71158/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: CadPro Tools
    Victim Site: Unknown
  262. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 1,220 valid Hotmail email and password combinations through a free download link on a cybercriminal forum.
    Date: 2026-04-05T08:00:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71160/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  263. Alleged distribution of pirated CadPro Tools for Revit 2026 software
    Category: Data Leak
    Content: Forum user GoRainCC is distributing what appears to be pirated CadPro Tools for Revit 2026 software on a cracking forum. The post provides detailed feature descriptions of the BIM automation software.
    Date: 2026-04-05T08:00:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71159/
    Screenshots:
    None
    Threat Actors: GoRainCC
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: CadPro Tools
    Victim Site: Unknown
  264. Website defacement of BIET Bhadrak by fidzxploit (INDOHAXSEC)
    Category: Defacement
    Content: The INDOHAXSEC team member fidzxploit defaced the website of BIET Bhadrak, an educational institution in India, on April 5, 2026. The attack targeted the institutions primary website hosted on cloud infrastructure.
    Date: 2026-04-05T07:42:06Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248262
    Screenshots:
    None
    Threat Actors: fidzxploit, INDOHAXSEC
    Victim Country: India
    Victim Industry: Education
    Victim Organization: BIET Bhadrak
    Victim Site: bietbhadrak.ac.in
  265. Alleged leak of mixed forum credentials
    Category: Combo List
    Content: A threat actor shared a collection of 82,000 mixed forum credentials described as valid. The combolist appears to contain credentials from various forum platforms.
    Date: 2026-04-05T07:39:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71157/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  266. Alleged Unauthorized Access to CCTV Surveillance System of UK Hostel by Z-Pentest Alliance
    Category: Cyber Attack
    Content: Threat actor group Z-Pentest Alliance claims to have gained full access to the CCTV system of an unnamed hostel in the United Kingdom. The group states all cameras are under their control, covering areas including the kitchen, entrance, hallways, dining room, living room, backyard, and street-facing exterior. Access was reportedly obtained without brute force or physical interference, indicating critically weak security posture. The group frames the intrusion as a vulnerability demonstration rather than a financially motivated attack, and denies blackmail or data theft intent. Post is tagged with #OpUK and references to specific targets (#FuckEastwood, #FuckRedCircus), suggesting a targeted campaign against UK infrastructure.
    Date: 2026-04-05T07:28:23Z
    Network: telegram
    Published URL: https://t.me/c/2729466495/924
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: United Kingdom
    Victim Industry: Hospitality
    Victim Organization: Unknown
    Victim Site: Unknown
  267. Alleged sale of stolen credit card data via carding stores PepeCard, AllCards, and CocoCheck
    Category: Initial Access
    Content: Multiple carding stores are advertising stolen credit card (CVV) data for sale. PepeCard offers 100,000+ cards daily (US/Canada/UK/Global) starting at $1 per valid card with 75-95% validity rate, accessible via pepecard.mobi and a Tor hidden service. AllCards offers 100k+ global cards daily, with US cards at $1.2-2 per valid card and other countries at $2.5-3, accessible via allcards.vlweh.com and a Tor hidden service. CocoCheck is advertised as a CC checker service at $0.01 per check, supporting bulk validation at cococheck.co. All three platforms have been operating for over three years.
    Date: 2026-04-05T07:20:51Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59372
    Screenshots:
    None
    Threat Actors: PepeCard
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Website defacement of HOM by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a redefacement attack against www.hom.com on April 5, 2026, targeting the media/customer section of the website. This appears to be a repeat attack on the same target rather than an initial compromise.
    Date: 2026-04-05T07:03:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829652
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: HOM
    Victim Site: www.hom.com
  269. Alleged sale of mail access, combolists, and credential tools across multiple countries
    Category: Logs
    Content: A threat actor operating as @Dataxlogs is advertising the sale of mail access for multiple countries including France, Belgium, Australia, Canada, UK, US, Netherlands, Poland, Germany, and Japan. The offering includes configs, scripts, tools, hits, combos, and more, with custom requests available.
    Date: 2026-04-05T06:52:15Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59356
    Screenshots:
    None
    Threat Actors: Dataxlogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Website defacement of akademiatiptop.pl by Aptisme (Leviathan Perfect Hunter)
    Category: Defacement
    Content: The attacker Aptisme, affiliated with the Leviathan Perfect Hunter team, defaced the Polish educational institution Akademia Tip Tops website on April 5, 2026. The attack targeted a specific file (art.txt) on the victims domain.
    Date: 2026-04-05T06:51:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829632
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Poland
    Victim Industry: Education
    Victim Organization: Akademia Tip Top
    Victim Site: akademiatiptop.pl
  271. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,120 Hotmail email and password combinations on an underground forum.
    Date: 2026-04-05T06:50:27Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1120-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  272. Website defacement of penosil.pro by Aptisme/Leviathan Perfect Hunter team
    Category: Defacement
    Content: The threat actor Aptisme, associated with the Leviathan Perfect Hunter team, successfully defaced the penosil.pro website on April 5, 2026. The attack targeted a specific page on the construction materials companys website.
    Date: 2026-04-05T06:45:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829610
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Construction/Manufacturing
    Victim Organization: Penosil
    Victim Site: penosil.pro
  273. Website defacement of agentn.net by Aptisme (Leviathan Perfect Hunter team)
    Category: Defacement
    Content: The attacker Aptisme, affiliated with the Leviathan Perfect Hunter team, successfully defaced the art.html page of agentn.net on April 5, 2026. This appears to be an isolated defacement incident targeting a single webpage rather than a mass attack.
    Date: 2026-04-05T06:44:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829611
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: agentn.net
  274. Website defacement of BusyB by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the BusyB website on April 5, 2026. The attack targeted a specific page within the customer media directory of the UK-based organization.
    Date: 2026-04-05T06:44:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829612
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: BusyB
    Victim Site: busyb.co.uk
  275. Website defacement of Ragan and Massey by DimasHxR
    Category: Defacement
    Content: The website raganandmassey.com was defaced by threat actor DimasHxR on April 5, 2026. This was an isolated defacement incident targeting a single organizations web presence.
    Date: 2026-04-05T06:43:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829613
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ragan and Massey
    Victim Site: raganandmassey.com
  276. Website defacement of Saucer Solutions by DimasHxR
    Category: Defacement
    Content: On April 5, 2026, attacker DimasHxR defaced the Saucer Solutions website. This was an individual defacement incident rather than part of a mass defacement campaign.
    Date: 2026-04-05T06:43:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829614
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Saucer Solutions
    Victim Site: saucersolutions.com
  277. Website defacement of Mardi Gras Beads For Less by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the Mardi Gras Beads For Less e-commerce website on April 5, 2026. The attack targeted a retail website specializing in Mardi Gras merchandise and party supplies.
    Date: 2026-04-05T06:42:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829617
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Mardi Gras Beads For Less
    Victim Site: mardigrasbeadsforless.com
  278. Website defacement of Gadget Parts by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the Australian electronics retailer Gadget Parts website on April 5, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-05T06:41:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829620
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Electronics/Retail
    Victim Organization: Gadget Parts
    Victim Site: gadgetparts.com.au
  279. Website defacement of TimeToCart e-commerce platform by DimasHxR
    Category: Defacement
    Content: E-commerce website timetocart.com was defaced by threat actor DimasHxR on April 5, 2026. The defacement targeted a specific media directory path rather than the main homepage.
    Date: 2026-04-05T06:41:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829621
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: TimeToCart
    Victim Site: timetocart.com
  280. Website defacement of almandoos.com by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the almandoos.com website on April 5, 2026, targeting a specific media/customer subdirectory. This was an individual attack rather than part of a mass defacement campaign.
    Date: 2026-04-05T06:40:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829622
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: almandoos.com
  281. Website defacement of Venashop by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer-related page on the Polish e-commerce website venashop.pl on April 5, 2026. This appears to be a single-target defacement incident affecting the online retail platform.
    Date: 2026-04-05T06:39:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829626
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: E-commerce
    Victim Organization: Venashop
    Victim Site: venashop.pl
  282. Website defacement of CanMedDirect by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the Canadian medical services website canmeddirect.ca on April 5, 2026. The attack targeted a specific media/customer section of the healthcare organizations website.
    Date: 2026-04-05T06:39:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829628
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Canada
    Victim Industry: Healthcare
    Victim Organization: CanMedDirect
    Victim Site: canmeddirect.ca
  283. Website defacement of bijurdelimon.com by DimasHxR
    Category: Defacement
    Content: Solo attacker DimasHxR defaced bijurdelimon.com on April 5, 2026, targeting a specific subdirectory rather than the homepage.
    Date: 2026-04-05T06:38:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829629
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bijurdelimon.com
  284. Website defacement of thisisfromroy.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced www.thisisfromroy.com on April 5, 2026. The incident was a single-site defacement with no apparent political motivation or mass campaign involvement.
    Date: 2026-04-05T06:38:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829631
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: www.thisisfromroy.com
  285. Website defacement of World Meeting and Events by Aptisme/Leviathan Perfect Hunter
    Category: Defacement
    Content: The attacker Aptisme, associated with team Leviathan Perfect Hunter, defaced the World Meeting and Events website on April 5, 2026. This appears to be a targeted single-site defacement rather than a mass attack campaign.
    Date: 2026-04-05T06:31:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829609
    Screenshots:
    None
    Threat Actors: Aptisme, Leviathan Perfect Hunter
    Victim Country: Unknown
    Victim Industry: Events and Conferences
    Victim Organization: World Meeting and Events
    Victim Site: worldmeetingandevents.com
  286. Alleged leak of German credential combolist
    Category: Combo List
    Content: A credential combolist containing 566,368 lines targeting German users has been made available for free download via file sharing platform.
    Date: 2026-04-05T06:29:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71156/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  287. Alleged Cyber Threat by Handala Hack Against Critical Infrastructure of Irans Adversaries
    Category: Cyber Attack
    Content: Handala Hack issued a formal warning threatening widespread cyberattacks against water, electricity, and oil infrastructure in countries perceived as hostile to Iran or the Resistance Axis. The group claims to have these infrastructures under complete surveillance and control and promises a paralyzing cyberattack in response to any action against Irans energy infrastructure. The statement is framed as a final warning and describes years of preparation for such attacks.
    Date: 2026-04-05T06:23:54Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/74
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: Unknown
    Victim Industry: Energy, Water, Oil & Gas
    Victim Organization: Unknown
    Victim Site: Unknown
  288. Alleged Cookie Stealer/Manager Software Package — New Update Announced
    Category: Malware
    Content: A Telegram channel Threat Market is advertising a full cookie management software package, claiming a new update will be available soon. The post is in Russian and suggests a tool designed for cookie theft or session hijacking operations.
    Date: 2026-04-05T06:16:57Z
    Network: telegram
    Published URL: https://t.me/c/3881618514/29
    Screenshots:
    None
    Threat Actors: Threat Market
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  289. Alleged Android Malware NoVoice Distributed via Google Play Infecting 2.3 Million Devices
    Category: Malware
    Content: A malware named NoVoice has reportedly been distributed through more than 50 applications on the Google Play Store, infecting approximately 2.3 million Android devices. The malware exploits vulnerabilities in older Android versions to gain root-level system access without requiring suspicious permissions. It is reportedly persistent even after a factory reset, capable of infiltrating apps to steal data and access user accounts. Infected devices maintain continuous communication with attacker-controlled C2 servers to receive new commands.
    Date: 2026-04-05T06:03:00Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20986
    Screenshots:
    None
    Threat Actors: NoVoice
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Google Play
    Victim Site: play.google.com
  290. Website defacement of BH Online Store by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdirectory of the BH Online Store e-commerce website on April 5, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-05T05:52:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829608
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: BH Online Store
    Victim Site: www.bhonlinestore.com
  291. Alleged data leak by LegioNLeakeRs group
    Category: Data Leak
    Content: Thread posted by LegioNLeakeRs group claiming to share URL, login, and password data, though no specific content details are available in the post.
    Date: 2026-04-05T05:32:28Z
    Network: openweb
    Published URL: https://xforums.st/threads/legionleakers-url-log-pass.604931/
    Screenshots:
    None
    Threat Actors: hannisonntag
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  292. Website defacement of ProtonsCable by PH.BL4KE (STORM BREAKER SECURITY)
    Category: Defacement
    Content: The telecommunications company ProtonsCables website was defaced by attacker PH.BL4KE from the STORM BREAKER SECURITY team on April 5, 2026. This was a targeted home defacement affecting the organizations main website.
    Date: 2026-04-05T05:12:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829575
    Screenshots:
    None
    Threat Actors: PH.BL4KE, STORM BREAKER SECURITY
    Victim Country: Unknown
    Victim Industry: Telecommunications
    Victim Organization: ProtonsCable
    Victim Site: protonscable.com
  293. Website defacement of Edumalls by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the Edumalls educational platform website. This incident represents a redefacement of the target, indicating the site may have been previously compromised and restored.
    Date: 2026-04-05T05:00:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/829557
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Edumalls
    Victim Site: www.edumalls.com
  294. Alleged data breach of Mitra Husada University UPPM portal with admin credentials exposed
    Category: Data Breach
    Content: A threat actor associated with Rakyat Digital Crew has leaked what appears to be an SQL database dump from uppm.mitrahusada.ac.id, an Indonesian academic institution (Mitra Husada University). The dump includes admin table records with usernames, MD5-hashed passwords, full names, and email addresses. The MD5 hash 21232f297a57a5a743894a0e4a801fc3 corresponds to the password admin, indicating weak credential practices.
    Date: 2026-04-05T04:55:07Z
    Network: telegram
    Published URL: https://t.me/c/3755871403/188
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Mitra Husada University (UPPM)
    Victim Site: uppm.mitrahusada.ac.id
  295. Alleged leak of credential combolist containing 60 million records
    Category: Combo List
    Content: A threat actor leaked a credential combolist containing 60 million URL:LOGIN:PASS combinations on a cybercrime forum. The post appears to offer free access to the credential data requiring forum registration to view.
    Date: 2026-04-05T04:30:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71148/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  296. Alleged sale of shell access by threat actor BABAYO EROR SYSTEM
    Category: Initial Access
    Content: A threat actor operating under BABAYO EROR SYSTEM is offering shell access for sale (Wts domut Akses Shell). The post instructs interested buyers to contact via private message (@yatimluajg) and mentions use of a trusted middleman/escrow service (Rekber kan). No specific target or price disclosed.
    Date: 2026-04-05T04:16:42Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/453
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  297. Alleged defacement of multiple websites by Mr.PIMZZZXploit
    Category: Defacement
    Content: Threat actor Mr.PIMZZZXploit, affiliated with Babayo Eror System, claims to have defaced multiple websites including domains hosted in Indonesia, Pakistan, and other regions. Targeted sites include jurnal.angkoso.my.id, ahadbinilyas.passionflip.pk, travel.skyrank.shop, shop.abbasgarments.com, thepicwall.com.pikesway.com, and marie.abbasgarments.com.
    Date: 2026-04-05T04:14:51Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/452
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: jurnal.angkoso.my.id, ahadbinilyas.passionflip.pk, travel.skyrank.shop, shop.abbasgarments.com, thepicwall.com.pikesway.com, marie.abbasgarments.com
  298. Alleged Sale of Full Access to French Ministry of Culture Subsidized Entity
    Category: Initial Access
    Content: A threat actor is offering for sale near-complete access to a French government-owned entity subsidized by the Ministry of Culture. The package includes Domain Admin rights with plain-text passwords for 18 accounts, ~850 AD users (546 with plain-text passwords), ~1,250 Windows devices, root access to 33 XEN servers and 282 VMs, firewall and web proxy admin, Google Workspace and Microsoft Azure full administration, EDR Security Center full control, iDRAC access to 22 physical servers, Cisco network device root passwords, and multiple SaaS/business accounts. Access methods include a C2 beacon, RDP on an unmonitored server, and VPN. Personal data of employees including IDs, passports, IBANs, and medical records is also accessible.
    Date: 2026-04-05T04:00:20Z
    Network: telegram
    Published URL: https://t.me/c/3500620464/6405
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: France
    Victim Industry: Government
    Victim Organization: French Ministry of Culture subsidized entity
    Victim Site: Unknown
  299. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a collection of 1,210 Hotmail credentials in a cybercriminal forum. The credentials appear to be distributed as a free download rather than being sold.
    Date: 2026-04-05T03:58:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71145/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  300. Alleged leak of multi-platform credential combolist affecting Reddit, GitHub, and other services
    Category: Combo List
    Content: Threat actor CODER is distributing a 17 million record credential combolist containing SMTP and gaming credentials from multiple platforms including Reddit, GitHub, Quora, and various e-commerce sites. The combolist is being shared through Telegram channels for free distribution.
    Date: 2026-04-05T03:57:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71146/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Multiple (Reddit, Quora, Shein, Temu, Etsy, Wish, GitHub, IntelliJ IDEA, GitLab)
    Victim Site: Multiple platforms
  301. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 831,238 credential pairs targeting German users through a file sharing service. The credentials appear to be mixed from various sources and made available for free download.
    Date: 2026-04-05T03:57:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71147/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  302. Alleged leak of 70 million credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 70 million URL:LOGIN:PASS credentials on a cybercrime forum.
    Date: 2026-04-05T03:25:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71143/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  303. Alleged leak of credentials containing 11 million records
    Category: Combo List
    Content: A threat actor allegedly leaked a credential list containing 11 million records in a cybercriminal forum. The post content is restricted and requires registration to view details.
    Date: 2026-04-05T03:03:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71138/
    Screenshots:
    None
    Threat Actors: Leak Realm
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  304. Alleged leak of Hotmail credential combolist containing 4,600 accounts
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,600 Hotmail email credentials through a free download link on MediaFire. The credentials are claimed to be valid and high quality, dated April 5, 2026.
    Date: 2026-04-05T03:02:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71139/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  305. Alleged Data Breach and Leak of European Commission (europa.eu) by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have compromised over 350GB (uncompressed) of data from the European Commission (europa.eu). The leaked data allegedly includes mail server dumps, databases, confidential documents, contracts, and other sensitive material. The data has been made available for free download via a direct IP-hosted ZIP file and is also listed on the groups Tor-based leak site. The post was updated on 28 March 2026.
    Date: 2026-04-05T02:34:58Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/772
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Belgium
    Victim Industry: Government
    Victim Organization: European Commission
    Victim Site: europa.eu
  306. Alleged Data Breach of Ameriprise Financial by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have breached Ameriprise Financial, Inc., exfiltrating 236GB (compressed) of Salesforce records containing PII and internal corporate data. The group states the company failed to reach a ransom agreement and has published a download link along with an onion site, indicating the data has been leaked publicly as of March 26, 2026.
    Date: 2026-04-05T02:33:59Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/771
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Ameriprise Financial, Inc.
    Victim Site: Unknown
  307. Alleged leak of French government identity documents
    Category: Data Leak
    Content: Actor MONEYLINE claims to possess French identity documents including ID cards, driver licenses, and passports, sharing links to Google Drive and Telegram channel for access. No pricing mentioned suggesting free distribution of sensitive government documents.
    Date: 2026-04-05T02:32:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-big-data-france-if-you-need-tell-me-france-id-card-driver-licende-passport
    Screenshots:
    None
    Threat Actors: MONEYLINE
    Victim Country: France
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  308. Alleged data breach and leak of Infinite Campus, Inc. by ShinyHunters
    Category: Data Breach
    Content: Threat actor ShinyHunters claims to have breached Infinite Campus, Inc., exfiltrating 1.2GB (compressed) of Salesforce records containing PII and internal corporate data. The data has been made available for free download via a direct IP-hosted URL, with the filename suggesting a ransom was demanded but not paid. The post references an onion site for verification. Updated 26 March 2026.
    Date: 2026-04-05T02:32:25Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/770
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Education Technology
    Victim Organization: Infinite Campus, Inc.
    Victim Site: Unknown
  309. Alleged ransomware data leak of Berkadia Commercial Mortgage by ShinyHunters
    Category: Data Leak
    Content: Threat actor ShinyHunters claims to have compromised Berkadia Commercial Mortgage, LLC (berkadia.com), exfiltrating Salesforce records containing PII and internal corporate data totaling 27GB compressed. The actor states the company failed to reach a ransom agreement and has published a download link to the leaked data. The archive is hosted at 91.215.85.22 and also accessible via a Tor onion address.
    Date: 2026-04-05T02:31:26Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/769
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Berkadia Commercial Mortgage, LLC
    Victim Site: berkadia.com
  310. Alleged Data Breach and Leak of Berkadia Commercial Mortgage by ShinyHunters
    Category: Data Breach
    Content: The ShinyHunters threat actor claims to have compromised Berkadia Commercial Mortgage, LLC (berkadia.com), exfiltrating 27GB (compressed) of Salesforce records containing PII and internal corporate data. The group states the company failed to reach a ransom agreement and has published a download link to the stolen data archive named shouldve_paid_the_ransom_berkadia-shinyhunters.7z. The leak was updated on 25 March 2026 and is also accessible via a Tor onion site.
    Date: 2026-04-05T02:29:17Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/768
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Berkadia Commercial Mortgage, LLC
    Victim Site: berkadia.com
  311. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to offer valid Hotmail credential lists through a Telegram channel. The post advertises high-quality credentials but requires registration to view full content.
    Date: 2026-04-05T02:23:22Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71136/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  312. Alleged sale of stolen credit cards via Telegram storefront
    Category: Logs
    Content: Multiple posts in the channel advertise a credit card store at t.me/fsdf12452, claiming to sell CCS (credit cards) described as 100% alive with high balances. This is consistent with carding marketplace activity involving stolen payment card data.
    Date: 2026-04-05T02:07:23Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59309
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: t.me/fsdf12452
  313. Alleged sale of multi-platform combolists and credential logs including Hotmail, Amazon, PayPal, and more
    Category: Combo List
    Content: A threat actor is offering for sale fresh, valid, and private combolists and credential logs covering multiple platforms including Hotmail, Amazon, eBay, PayPal, Netflix, PSN, Xbox, Instagram, and many others. Coverage spans numerous countries including US, UK, FR, DE, JP, AU, CA, NL, PL, BR, IT, ES, MX, and more. The seller claims to operate a private cloud and offers keyword-based inbox searching on request.
    Date: 2026-04-05T02:04:40Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59310
    Screenshots:
    None
    Threat Actors: Yìchén
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Alleged leak of Spotify and Apple Music credentials
    Category: Combo List
    Content: Threat actor distributing a 14 million credential combolist targeting Spotify and Apple Music accounts through Telegram channels. The credentials are being shared for free through dedicated Telegram groups.
    Date: 2026-04-05T02:02:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71135/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Entertainment and Media
    Victim Organization: Spotify and Apple Music
    Victim Site: Unknown
  315. Alleged data breach of Endesa and EmergiaCC customer database
    Category: Logs
    Content: Threat actors claim to be selling internal and confidential documents from Endesa (Manizales, Spain) and Emergia Customer Care containing 25 million records with personal information including names, addresses, phone numbers, email addresses, and IBAN numbers for $200.
    Date: 2026-04-05T02:01:47Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-ENDESA-EmergiaCC-Manizales-Spain
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Spain
    Victim Industry: Energy/Utilities
    Victim Organization: Endesa / EmergiaCC
    Victim Site: emergiacc.com
  316. Alleged distribution of stolen credential logs via Telegram
    Category: Logs
    Content: Threat actor is distributing 604GB of fresh stealer logs containing URL:USER:PASS credential combinations through a free Telegram channel with daily updates.
    Date: 2026-04-05T02:01:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-604GB-URL-USER-PASS-FRESH-LOGS-DAILY-UPDATE-FREE-TELEGRAM
    Screenshots:
    None
    Threat Actors: seainloq12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  317. Alleged offering of virtual phone numbers for SMS verification services
    Category: Initial Access
    Content: Threat actor offering virtual phone number rental service for SMS verification with numbers from over 40 countries, accepting cryptocurrency payments including Monero for anonymity. Service provides unlimited SMS messages for up to 90 days and could facilitate account creation or verification bypass for malicious purposes.
    Date: 2026-04-05T02:01:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Rent-virtual-numbers-for-SMS-via-telegram-bot–72283
    Screenshots:
    None
    Threat Actors: GetRenewed
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  318. Alleged counterfeiting service for US drivers licenses
    Category: Initial Access
    Content: Threat actor lockbit advertises counterfeiting services for US drivers licenses on dark web forum, claiming lowest market prices and worldwide shipping. Contact established via Telegram for custom orders.
    Date: 2026-04-05T02:00:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Advanced-counterfeiting-US-driver-s-licenses
    Screenshots:
    None
    Threat Actors: lockbit
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  319. Alleged data breach of Chinese volunteer and political party database
    Category: Data Breach
    Content: Threat actor claims to have obtained a database containing 92.5 million records from Chinas national volunteer service platform, including names, ID cards, phone numbers, emails, political party affiliations, and organizational memberships. The data allegedly includes members from various Chinese political parties and volunteer organizations.
    Date: 2026-04-05T02:00:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-China-zyh365-com-Political-Parties-and-Volunteer-Communities-92-Million-2024
    Screenshots:
    None
    Threat Actors: Blastoize
    Victim Country: China
    Victim Industry: Government
    Victim Organization: zyh365.com Volunteer Collection Platform
    Victim Site: zyh365.com
  320. Alleged sale of OnlyFans accounts and adult content platform credentials
    Category: Data Breach
    Content: Forum post advertising a shop selling OnlyFans account balances and accounts for various adult content platforms. The post includes extensive categorization of adult content types and popular adult entertainment brands.
    Date: 2026-04-05T02:00:33Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-1-PORN-SHOP-%E2%9C%A8-OnlyFans-Balance-Porn-Sites-Accounts-Shop-%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: FANZIO
    Victim Country: Unknown
    Victim Industry: Adult Entertainment
    Victim Organization: OnlyFans
    Victim Site: onlyfans.com
  321. Alleged data breach of French Regional Health Agencies (ARS) and hospitals
    Category: Data Breach
    Content: Threat actor claims to be selling a database containing 35 million records from French Regional Health Agencies (ARS) and over 130 hospitals including APHP. The data appears to include detailed patient information with medical identifiers, personal details, and hospital system data.
    Date: 2026-04-05T02:00:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FR-35-M-130-HOPITAUX-APHP
    Screenshots:
    None
    Threat Actors: Dumpsec
    Victim Country: France
    Victim Industry: Healthcare
    Victim Organization: Regional Health Agencies (ARS) and French hospitals
    Victim Site: normandie.ars.sante.fr
  322. Alleged data breach of Gas Natural Vanti and GNP Grupo Nacional de Proyectos
    Category: Data Breach
    Content: Threat actor Petro_Escobar claims to be selling internal SQL databases from Gas Natural Vanti and GNP Grupo Nacional de Proyectos containing over 10 million records for $500 USD. The data allegedly includes operational social media management, back-office messaging, and product sales information totaling 500 MB.
    Date: 2026-04-05T02:00:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Gas-Natural-Vanti-GNP-Grupo-Nacional-de-Proyectos
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Energy/Utilities
    Victim Organization: Gas Natural Vanti, GNP Grupo Nacional de Proyectos
    Victim Site: gnpsa.com, grupovanti.com
  323. Alleged data breach of Susinsumos.com involving corporate database and documents sale
    Category: Data Breach
    Content: Threat actor is selling 30.26 GB of corporate data from Susinsumos.com for $500, including databases, financial records, HR data, tax documents, and business files. The data appears to contain comprehensive corporate infrastructure including web servers, databases, payroll information, and tax compliance documents.
    Date: 2026-04-05T01:59:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Susinsumos-com-Databases-Backups-Documents
    Screenshots:
    None
    Threat Actors: vexin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Susinsumos
    Victim Site: susinsumos.com
  324. Alleged sale of access to multiple government email systems
    Category: Initial Access
    Content: Threat actor selling administrative access to government email systems across Bulgaria, Angola, South Africa, and Nigeria, including capabilities to create unlimited government email accounts and access to intelligence services.
    Date: 2026-04-05T01:59:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-Government-Emails-for-Cheap–72315
    Screenshots:
    None
    Threat Actors: DuperKinger123
    Victim Country: Multiple
    Victim Industry: Government
    Victim Organization: Multiple Government Agencies
    Victim Site: Unknown
  325. Alleged data breach of Banco AV Villas and associated Colombian financial institutions
    Category: Data Breach
    Content: Threat actor published internal databases from Colombian financial institutions containing customer information, loan obligations, contact details, payment statuses, and collection management data. The leaked data includes sensitive financial information such as document numbers, payment agreements, debt amounts, and customer management activities.
    Date: 2026-04-05T01:59:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Banco-Av-Villas-EmergiaCC-Conalcreditos-Colombia
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Financial Services
    Victim Organization: Banco AV Villas, EmergiaCC, Conalcreditos
    Victim Site: emergiacc.com, conalcreditos.com.co
  326. Alleged sale of administrative access to Brazilian Central Bank PSTI system
    Category: Initial Access
    Content: Threat actor claims to be selling administrative-level access to Brazilian Central Banks PSTI system for $5,000 USD, offering access to internal communications, files, and PIX system certificates. The actor guarantees persistence within the environment and accepts only cryptocurrency payments.
    Date: 2026-04-05T01:59:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Access-to-sta-bcb-gov-br-PSTI-Account
    Screenshots:
    None
    Threat Actors: pstipwner
    Victim Country: Brazil
    Victim Industry: Financial Services
    Victim Organization: Central Bank of Brazil
    Victim Site: sta.bcb.gov.br
  327. Alleged data leak of BourseDesVols database
    Category: Data Leak
    Content: A threat actor shared a database dump allegedly containing 3,312,785 records from BourseDesVols, a French entity. The data is being distributed for free download via file sharing service.
    Date: 2026-04-05T01:59:07Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-BourseDesVols-FR
    Screenshots:
    None
    Threat Actors: uhqboyz
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: BourseDesVols
    Victim Site: Unknown
  328. Alleged data leak of Summit USA financial and payment processing databases
    Category: Data Leak
    Content: Threat actor SnowSoul leaked approximately 100GB of data allegedly from Summit USA, including payment settlement data, ACH processing databases, bank affiliate information, and various financial database backups spanning multiple years. The data is being distributed for free through multiple file hosting services.
    Date: 2026-04-05T01:58:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-USA-data-summitusa-com-8115-SnowSoul-ID-1278-Free-download-100G
    Screenshots:
    None
    Threat Actors: SnowSoul
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Summit USA
    Victim Site: summitusa.com
  329. Alleged data leak of Italian tax/legal portal database
    Category: Data Leak
    Content: Database containing 85,000 customer records from an Italian tax and legal services portal has been leaked and made available for free download on a dark web forum.
    Date: 2026-04-05T01:58:49Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Italian-tax-legal-portal-85K-customers-and-more
    Screenshots:
    None
    Threat Actors: AleDelRey
    Victim Country: Italy
    Victim Industry: Legal Services
    Victim Organization: Unknown
    Victim Site: Unknown
  330. Alleged supply chain cyber attack on Axios npm package via North Korean-linked threat actors
    Category: Malware
    Content: Hackers attributed to North Korea conducted a social engineering attack targeting an Axios developer. By inviting the victim to fake meetings and displaying fabricated Microsoft Teams errors, they tricked the developer into installing a malicious update that was actually remote access malware. The attackers then published malicious versions of the Axios npm package. The compromised versions were available for only a few hours but could infect user systems and steal sensitive information. The Axios team removed the malicious versions and reset access credentials, stating the attack is part of a broader campaign targeting major open-source projects.
    Date: 2026-04-05T01:35:38Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/20985
    Screenshots:
    None
    Threat Actors: North Korea-linked hackers
    Victim Country: Unknown
    Victim Industry: Software / Open Source
    Victim Organization: Axios
    Victim Site: npmjs.com
  331. Alleged leak of German shopping website credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 495,248 credential pairs allegedly targeting German shopping websites. The data was made available as a free download via a cloud storage link.
    Date: 2026-04-05T01:28:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71131/
    Screenshots:
    None
    Threat Actors: HQcomboSpace
    Victim Country: Germany
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  332. Alleged sale of access to Brazilian government web shells
    Category: Initial Access
    Content: A threat actor is offering two web shells on Brazilian government (.gov.br) domains for sale, with contact directed to @Rici144.
    Date: 2026-04-05T01:05:07Z
    Network: telegram
    Published URL: https://t.me/c/2590737229/894
    Screenshots:
    None
    Threat Actors: Nullsec Philippines
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: gov.br
  333. Alleged Sale of Raw Network Infrastructure Power by MILNET Services
    Category: Malware
    Content: A forwarded message from MilitaryNetworks advertises MILNET, a raw network infrastructure service operational since 2015, offering high-power network capacity. The post directs interested parties to contact via @HaxStrokeServices and @MILNETServices on Telegram, suggesting this is a paid service for offensive network operations or DDoS infrastructure.
    Date: 2026-04-05T00:55:42Z
    Network: telegram
    Published URL: https://t.me/MILNETServices/2
    Screenshots:
    None
    Threat Actors: MILNET
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Alleged leak of credentials from multiple organizations including Alibaba, eBay, and others
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 12.3 million credentials allegedly from multiple organizations including Alibaba, eBay, Lennar, D.R. Horton, CBRE, Brookfield, and Shopify through Telegram channels. The credentials are being shared for free along with associated programs.
    Date: 2026-04-05T00:37:30Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71128/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Multiple (Alibaba, eBay, Lennar, D.R. Horton, CBRE, Brookfield, Shopify)
    Victim Site: Unknown
  335. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: Forum user ValidMail allegedly shared a combolist containing 82,000 mixed forum credentials described as valid. The post appears to offer access to the credential data through the CrackingX forum.
    Date: 2026-04-05T00:27:14Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71127/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown