[April-9-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a comprehensive analysis of the global cyber threat landscape based on intelligence gathered on April 9, 2026. The data reflects a highly volatile environment characterized by massive credential dumping, geopolitically motivated hacktivism, high-impact data breaches involving critical infrastructure and military targets, and automated mass-defacement campaigns.

The day’s events underscore a thriving underground economy where multi-million-record combo lists are distributed freely to build reputation, while high-value zero-days, initial access vectors, and corporate databases are sold for premium cryptocurrency payouts. The most alarming trends include unverified but highly damaging claims of petabyte-scale military data theft , the compromise of Industrial Control Systems (ICS) , and targeted psychological operations against state intelligence apparatuses.


2. High-Impact Data Breaches and Extortion

The intelligence reveals several catastrophic data breach claims targeting government, military, and multinational corporate entities.

  • China National Supercomputing Center (NSCC): A highly critical claim emerged regarding the breach of China’s National Supercomputing Center. A threat actor operating under the moniker “amazcybr” (and later referenced as “McLovin” and “Mipor”) alleges the exfiltration of over 10 petabytes of classified military and aerospace research data. The stolen data purportedly includes satellite schematics, aerospace simulations, and defense contractor research, which is being offered for $20,000. If verified, this represents a severe compromise of the People’s Liberation Army (PLA) intelligence and operational planning capabilities.
  • Cisco and Salesforce: A threat actor is attempting to sell a massive cache of confidential data allegedly belonging to Cisco and Salesforce, reportedly sourced by the group UNC6040/ShinyHunters. The data is claimed to include source code for core Cisco products (IOS, ASA, NX-OS), GitHub repositories, AWS buckets, and over 3.15 million Salesforce records. The asking price is roughly $500,000, and ShinyHunters was observed advertising “ShinyHunters Files Cloud” with 9.1 million Salesforce files for a $10,000 lifetime access fee.
  • Los Angeles Metro Transit: The Iranian hacking group “Ababeel Minab” claimed responsibility for a devastating attack on the Los Angeles County Metropolitan Transportation Authority (LA Metro). The group alleges they wiped over 500 terabytes of critical server data and exfiltrated 1 terabyte of sensitive information, describing it as one of the largest attacks on the US urban transportation sector. Western sources indicated the attackers focused on infiltrating industrial control systems and Rockwell Automation equipment.
  • Financial and Banking Institutions: The financial sector faced severe targeting. A threat actor claimed to hold data on 1.2 million French banking customers, including IBANs and PII from major institutions like BNP Paribas, Societe Generale, and Credit Agricole. Furthermore, a breach of Bank BSI Indonesia exposed 24,000 employee records , and a massive Serasa database dump allegedly containing 220 million Brazilian citizen records (1.8TB of data) was offered for $350. Additionally, 88,483 records from Mexican AFORE retirement funds were put up for sale.

3. Geopolitical Hacktivism and Cyber Warfare

State-aligned and politically motivated hacktivism formed a major pillar of the day’s threat activity, with conflicts in the Middle East and Asia spilling over into the cyber domain.

Targeting Israel and the IDF

The threat actor group “Handala” (حنظله) executed a sustained psychological and data-leak campaign against the Israeli Defense Forces (IDF) and its intelligence apparatus.

  • Handala announced an imminent operation targeting IDF Unit 8200, specifically its “Iran Desk”.
  • The group claimed persistent access to systems associated with former IDF Chief of Staff General Herzi Halevi.
  • They allegedly extracted over 19,000 confidential images and videos from top-secret meetings, including classified files and unredacted faces of Israeli military pilots and operatives. Handala explicitly mocked Israeli military operational security, stating that blurring and pixelating images did not prevent them from accessing the underlying intelligence.
  • In a coordinated effort, the hacktivist group “OpsShadowStrike” defaced Israeli religious sites like prayersinisrael.com under the #SavePalestine banner.

Z-Pentest Alliance Campaigns

The group “Z-Pentest Alliance” demonstrated advanced capabilities targeting both educational and critical infrastructure sectors.

  • Taiwan Operations: Tagged under #OpTaiwan, the group compromised Tatung University (TTU), gaining administrative access to the SINEW SCMS classroom management system. They claimed the ability to mass-deploy malware across all lab machines and threatened to leak Microsoft and Google credentials of students and faculty.
  • Luxembourg ICS Compromise: In a highly concerning escalation, the group claimed to have compromised an RTU32 industrial controller managing cathodic protection systems for pipelines in Luxembourg. The actors asserted full control over the HMI panel and substation parameters, manipulating values while disguising the activity as routine communication errors.

Operations in Asia and the Middle East

  • “The Garuda Eye” announced a series of attacks against Indonesian government-affiliated companies and indicated a future pivot to the Bank of Philippines.
  • A Pakistani group named “Evil Markhors” claimed to leak over 1TB of Indian election data spanning from 1948 to 2026.
  • Widespread GPS/GNSS spoofing and jamming operations were reported in the Persian Gulf, Sea of Oman, and Strait of Hormuz, threatening maritime and aviation navigation safety.

4. The Epidemic of Automated Website Defacements

April 9, 2026, saw an extraordinary volume of website defacements, primarily driven by automated exploitation tools operated by a few highly active threat actors.

  • The “DimasHxR” Spree: A solo attacker operating as “DimasHxR” compromised dozens of websites globally. Their methodology appears highly automated, specifically targeting subdirectories—often /media/ or /customer/ pathways—rather than root homepages. Victims spanned various sectors and countries, including German e-commerce (Radbag) , the UK (Make It Homely) , Vietnam (The Body Shop) , South Africa (Leroy Merlin) , and Italy (Gruppo San Marco). The sheer volume suggests the exploitation of a common vulnerability in a specific CMS plugin or media-handling library.
  • Zod’s Mass Campaigns: The actor “Zod” orchestrated massive defacement campaigns affecting numerous domains simultaneously, such as foresttravel.site, 9999webportal.cloud, and spacehub.cloud. These attacks were classified as mass defacement operations, indicating the compromise of shared hosting environments or the exploitation of widespread software flaws.
  • Other Actors: Additional defacements were carried out by “maw3six” (targeting the University of Buton in Indonesia and a German government portal) , and “0xfansX” (targeting Sri Lankan and international sites).

5. The Underground Credential Economy: Combo Lists and Logs

The proliferation of “Combo Lists” (combinations of usernames/emails and passwords) remains a foundational element of the cybercrime ecosystem, fueling credential stuffing and account takeover (ATO) attacks.

  • Massive Volume: Billions of credentials changed hands on forums like CrackingX and DemonForums. A user named “zod” allegedly shared a list containing 5 billion URL/login/password combinations. Actor “Daxus” distributed 22.85 million records , and “CODER” distributed multiple lists, including an 8 million line list and an 11 million line eBay-targeted list.
  • Targeting Microsoft/Hotmail: Microsoft services, particularly Hotmail, were overwhelmingly targeted. Actors like “alphaxdd”, “UniqueCombo”, “MailAccesss”, and “Kokos2846q” repeatedly dumped thousands of “fresh, UHQ (Ultra High Quality)” Hotmail credentials. The obsession with Microsoft accounts is likely due to their utility in bypassing spam filters and serving as pivot points for broader identity theft.
  • Geographic Targeting: Threat actors frequently segmented combo lists by nationality. Actor “thejackal101” was highly prolific, releasing geographically specific lists for Romania (28K), Russia (86K), Philippines (68K), Peru (77K), Portugal (46K), Pakistan (30K), and Poland (250K).
  • Stealer Logs: Beyond simple passwords, actors traded “stealer logs” obtained via malware like Mystic Stealer. These logs (shared by actors like “KazeFreak”, “UP_DAISYCLOUD”, and “Xyph0rix”) are highly valuable as they contain not just credentials, but session cookies, autofill data, and cryptocurrency wallet information, allowing attackers to bypass Multi-Factor Authentication (MFA).

6. Initial Access, Malware, and Exploits

The infrastructure enabling these attacks was actively traded and upgraded in underground marketplaces.

  • DDoS-for-Hire: The “Deepstresser” service announced an update to version 1.0.3, introducing a new TCP Amplification bypass method. The operators claimed it exploits HTTP/HTTPS vulnerabilities to achieve up to 120Mpps, successfully bypassing protections from Cloudflare, OVH, and DDoS-Guard.
  • Offensive Toolkits: Actors like “Keymous” and “LulzSec Black” sold bundled offensive security tools for $99, which notably included CobaltStrike—a legitimate penetration testing framework heavily abused by ransomware operators for Command and Control (C2) operations.
  • Exploits and Vulnerabilities: A threat actor claimed to sell an exploit abusing a Discord feature to retrieve any user’s email address using only their user ID, bypassing rate limits. Another actor, “SysInvaders”, sold reflected XSS vulnerabilities affecting European companies for Monero and Bitcoin.
  • Fraud Facilitation: Actors offered tutorials and tools for financial fraud, including Apple Pay fraud methods requiring only BIN and credit card data, and SMS verification bypass services like “DogeSMS” to defeat OTP (One-Time Password) security.

7. Conclusion

The cybersecurity events of April 9, 2026, illustrate a mature, highly compartmentalized cybercrime ecosystem. The data reveals a clear dichotomy in threat actor behavior. On one end, automated script kiddies and low-tier actors flood forums with billions of recycled credentials and execute indiscriminate mass defacements to build clout. On the other end, sophisticated APTs and specialized initial access brokers compromise critical infrastructure (such as the Luxembourg ICS and LA Metro ), steal petabytes of classified military data (China NSCC ), and engage in high-stakes psychological warfare (Handala vs. Israel ).

The sheer volume of credential dumping, particularly targeting Microsoft/Hotmail accounts, indicates that credential stuffing remains one of the most persistent and effective attack vectors globally. Furthermore, the commercialization of advanced tools—such as CobaltStrike bundles and TCP amplification DDoS services —lowers the barrier to entry, empowering less skilled actors to launch devastating attacks.

Organizations must assume that user credentials are fundamentally compromised and prioritize zero-trust architectures, robust session management (to combat cookie-stealing malware ), and rigorous isolation of industrial control systems from internet-facing networks. The incidents observed in this intelligence dataset highlight that no sector—from local retail to national defense—is immune to the escalating scale and severity of modern cyber threats.

Detected Incidents Draft Data

  1. Alleged data breach of China National Supercomputing Center
    Category: Data Breach
    Content: Threat actor claims to have breached Chinas National Supercomputing Center and obtained over 10 petabytes of classified military and aerospace research data including simulation data, design files, and satellite telemetry. The post includes hashtags and mentions proof files but access requires forum registration.
    Date: 2026-04-09T23:48:24Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-CHINA-NSCC-SUPERCOMPUTING-BREACH-%E2%80%93-10-PETABYTES-OF-CLASSIFIED-MILITARY-DB-LEAK
    Screenshots:
    None
    Threat Actors: amazcybr
    Victim Country: China
    Victim Industry: Government/Defense
    Victim Organization: National Supercomputing Center (NSCC)
    Victim Site: Unknown
  2. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 25,000 Hotmail email and password combinations through a paste site link. The credentials are being distributed for free on a cybercriminal forum.
    Date: 2026-04-09T23:39:22Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-25k-Good-Hotmail-List
    Screenshots:
    None
    Threat Actors: Razly
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  3. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 25,000 Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-09T23:37:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71620/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  4. Alleged Sale of Private Cloud Hotmail UHQ Credentials and Multi-Platform Combolists
    Category: Combo List
    Content: Three actors (Yhōu, Yìchén, Wěilóng) are selling access to private cloud databases containing high-quality (UHQ) Hotmail credentials and geo-specific combolists. Coverage includes FR, IT, BR, UK, US, AU, JP, NL, PL, ES, MX, CA, SG, DE, RU and more. Platform-specific data includes Amazon, eBay, Walmart, Poshmark, Kleinanzeigen, Reddit, Depop, and Marriott. Sellers claim keyword search capability and describe the data as fresh, valid, and private.
    Date: 2026-04-09T23:26:28Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/60044
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Multiple
    Victim Industry: E-Commerce, Technology, Retail, Hospitality
    Victim Organization: Hotmail, Amazon, eBay, Walmart, Poshmark, Kleinanzeigen, Reddit, Depop, Marriott
    Victim Site: Unknown
  5. Alleged distribution of credential combinations from multiple forums
    Category: Combo List
    Content: Threat actor CODER is distributing credential combinations (combolists) containing 8 million lines allegedly sourced from various forums. The credentials are being shared through Telegram channels for free access.
    Date: 2026-04-09T23:25:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71619/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged distribution of mixed email credential combolist
    Category: Combo List
    Content: A threat actor is distributing a free download of 130,000 email and password credentials in mixed format, while also advertising separate sales of additional credential lists and email lists targeting multiple countries including France, UK, Germany, USA, Spain, Italy, Canada, and Australia.
    Date: 2026-04-09T23:13:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71617/
    Screenshots:
    None
    Threat Actors: steeve75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged leak of credential combolist targeting multiple streaming and gaming platforms
    Category: Combo List
    Content: A threat actor is distributing a combolist containing 130,000 email and password combinations claimed to be valid for Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify accounts. The actor is also separately offering to sell high-quality credential lists from various email providers and geographic regions.
    Date: 2026-04-09T23:03:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-130k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–199962
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged Cyber Intrusion into Chinas Peoples Liberation Army Exposing 10 Petabytes of Classified Military Data
    Category: Data Breach
    Content: Unofficial sources report a cyberattack against the Peoples Liberation Army (PLA) of China, allegedly resulting in the exposure of over 10 petabytes of sensitive military information. The leaked data purportedly includes personnel records, intelligence reports, operational plans, and classified documents. The claim remains unverified.
    Date: 2026-04-09T22:45:28Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21110
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: China
    Victim Industry: Defense & Military
    Victim Organization: Peoples Liberation Army (PLA)
    Victim Site: Unknown
  9. Alleged leak of educational institution credentials
    Category: Combo List
    Content: Threat actor CODER is distributing a 7 million record educational institution combolist for free via Telegram channels. The actor operates multiple Telegram groups providing free credential lists and tools.
    Date: 2026-04-09T22:40:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71616/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged data breach of 365.loans
    Category: Data Breach
    Content: Threat actor claims to be selling a 365.loans database containing over 6 million records including emails, IP addresses, user agents, UIDs, and API keys. The actor is accepting offers and requesting payment in cryptocurrency through onsite escrow.
    Date: 2026-04-09T22:30:47Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-365-Loans-USA-Canada-Loans-service
    Screenshots:
    None
    Threat Actors: [Trial Mod]xtc
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: 365.loans
    Victim Site: 365.loans
  11. Alleged leak of Spanish identity documents
    Category: Data Leak
    Content: Threat actor catwoman shared Spanish identity documents including front and back of IDs with facial images. This appears to be part two of a series, with continuation dependent on community support.
    Date: 2026-04-09T22:29:52Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Spain-IDS-2
    Screenshots:
    None
    Threat Actors: catwoman
    Victim Country: Spain
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged leak of 290,000 credential combinations
    Category: Combo List
    Content: A threat actor shared a combolist containing 290,000 URL:username:password combinations in URL:LOG:PASS format on a cybercriminal forum. The credentials appear to be offered as a free download to registered forum members.
    Date: 2026-04-09T22:06:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-290K-HIGH-QUALITY-URL-LOG-PASS
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged leak of credential combolist containing 290,000 records
    Category: Combo List
    Content: A threat actor shared a credential combolist containing 290,000 URL:username:password combinations on a cybercriminal forum. The data is being distributed for free to registered forum members.
    Date: 2026-04-09T22:04:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71615/
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor distributing fresh Hotmail credential lists through Telegram channel and file sharing platform. Claims to add new credential data daily with focus on valid email accounts.
    Date: 2026-04-09T21:53:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71613/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  15. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared 345 Hotmail credential combinations on a cybercrime forum. The post contains hidden content available only to registered users of the platform.
    Date: 2026-04-09T21:53:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71614/
    Screenshots:
    None
    Threat Actors: lpbPrivate
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  16. Alleged data leak of Universidad Politecnica de Tapachula database
    Category: Data Leak
    Content: User Z3r00 shared a database containing personal information from Universidad Politecnica de Tapachula including full names, phone numbers, emails, addresses, postal codes, CURP identifiers, and other personal details via free download link.
    Date: 2026-04-09T21:40:55Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-CHIAPAS-UNIVERSIDAD-POLITECNICA-DE-TAPACHULA
    Screenshots:
    None
    Threat Actors: Z3r00
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Universidad Politecnica de Tapachula
    Victim Site: Unknown
  17. Alleged DDoS-for-Hire Service Deepstresser 1.0.3 Update with TCP Amplification Bypass Capabilities
    Category: Malware
    Content: Deepstresser (deepstresser.su) has announced version 1.0.3 of their DDoS-for-hire stresser service, introducing a new TCPAMP (TCP Amplification) attack method. The method exploits vulnerabilities in HTTP/HTTPS servers to amplify packet output, achieving 600k–1Mpps per concurrent with a projected total capacity of 120Mpps. The operator claims successful bypass testing against Cloudflare IPv4 peer protection, OVH, TCPShield, DDoS-Guard, Aurologic, and Path. Additionally, a new dedicated Layer 4 spoof server was added to the network, providing up to 1.8Gbps (4Mpps) output and increasing available slots by 20.
    Date: 2026-04-09T21:35:07Z
    Network: telegram
    Published URL: https://t.me/c/1669509146/92336
    Screenshots:
    None
    Threat Actors: Deepstresser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged leak of credential combolist containing 1 million login credentials
    Category: Combo List
    Content: A threat actor shared a MEGA download link containing an alleged combolist of 1 million URL, login, and password combinations on a criminal forum.
    Date: 2026-04-09T21:31:01Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71612/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Website defacement of minhhanhh1234.id.vn by Alperen_216
    Category: Defacement
    Content: The threat actor Alperen_216 (ALP team) successfully defaced the Vietnamese website minhhanhh1234.id.vn on April 10, 2026. The attack targeted a specific PHP file on the domain.
    Date: 2026-04-09T21:30:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832110
    Screenshots:
    None
    Threat Actors: ALP, Alperen_216
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: minhhanhh1234.id.vn
  20. Alleged Sale of Hotmail, Gmail, and Multi-Platform Combolists and Account Logs
    Category: Combo List
    Content: Multiple threat actors are selling combolists and account credentials spanning Hotmail, Gmail, Comcast, ATT, AOL, GMX-DE, and dozens of platforms including PayPal, Amazon, Netflix, Facebook Ads, iCloud, LinkedIn, and more. Coverage includes multiple countries (US, UK, DE, FR, IT, BR, JP, etc.). Offerings include UHQ mail access, cookies, logs, fullz, and account-specific credentials for financial, dating, gaming, and e-commerce platforms.
    Date: 2026-04-09T21:20:17Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/60030
    Screenshots:
    None
    Threat Actors: Wěilóng
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Alleged data breach of Forestal Atlántico Sur by ShadowByt3S
    Category: Data Breach
    Content: ShadowByt3S claims to have stolen 9GB of data from Forestal Atlántico Sur including PostgreSQL database dumps, employee records, operational data, and GPS coordinates. The threat actor is demanding ransom payment within 72 hours or they will sell the complete database.
    Date: 2026-04-09T21:19:19Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-ShadowByt3-Claims-Responsibility-For-Forestal-Atl%C3%A1ntico-Sur-FAS
    Screenshots:
    None
    Threat Actors: ShadowByt3S
    Victim Country: Uruguay
    Victim Industry: Forestry
    Victim Organization: Forestal Atlántico Sur
    Victim Site: Unknown
  22. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 370,000 Hotmail email and password combinations dated April 9th. The credentials are being distributed for free to registered forum members.
    Date: 2026-04-09T20:46:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71611/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  23. Alleged leak of Bank BSI Indonesia employee database
    Category: Data Leak
    Content: Actor XSVSHACKER leaked a database containing 24,000 records of Bank BSI Indonesia employees including names, employee IDs, phone numbers, email addresses, job titles, and office locations.
    Date: 2026-04-09T20:45:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-INDONESIA-DATABASE-BANKBSI-GO-ID
    Screenshots:
    None
    Threat Actors: XSVSHACKER
    Victim Country: Indonesia
    Victim Industry: Banking
    Victim Organization: Bank BSI
    Victim Site: bankbsi.go.id
  24. Alleged Cyber Attack on Los Angeles Metro by Iranian Hacking Group Ababeel Minab
    Category: Cyber Attack
    Content: The Iranian hacking group Ababeel Minab has claimed responsibility for a cyberattack targeting the IT infrastructure of the Los Angeles County Metropolitan Transportation Authority (LA Metro). The group alleges that over 500 terabytes of critical server data was completely wiped, and more than 1 terabyte of sensitive data was exfiltrated prior to destruction. The attack is being described as one of the largest cyber incidents in the US urban transportation sector.
    Date: 2026-04-09T20:18:01Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21109
    Screenshots:
    None
    Threat Actors: ابابیل میناب
    Victim Country: United States
    Victim Industry: Transportation / Public Transit
    Victim Organization: Los Angeles County Metropolitan Transportation Authority (LA Metro)
    Victim Site: Unknown
  25. Alleged leak of Romanian credential combolist
    Category: Combo List
    Content: A threat actor shared a credential combolist containing over 28,000 email:password combinations allegedly from Romanian users. The data is described as fresh and high quality, with additional content available through a Telegram channel.
    Date: 2026-04-09T20:15:19Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-28-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Romania-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged leak of forum credentials combolist
    Category: Combo List
    Content: A threat actor shared an 82,000 record combolist containing forum credentials. The credentials are described as a mix of valid email and password combinations from various forum platforms.
    Date: 2026-04-09T20:14:40Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%99%8B-82k-MIX-Base-With-Valid-FORUMS-%E2%99%8B-18
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 24,000 email and password combinations for mail access on a cybercrime forum.
    Date: 2026-04-09T20:14:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-24k-Good-MailAccess-Combolist
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to offer fresh private Hotmail credentials containing 1,243 records. The actual content is hidden behind registration requirements.
    Date: 2026-04-09T20:13:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71609/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  29. Alleged leak of mixed forum credential combolist
    Category: Combo List
    Content: A mixed combolist containing 82,000 valid forum credentials is being distributed on underground forum CrackingX.
    Date: 2026-04-09T20:12:26Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71610/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Alleged leak of Russian credential combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing over 86,000 email and password combinations allegedly from Russian sources. The credentials are claimed to be fresh and high quality, and were made available for free download on an underground forum.
    Date: 2026-04-09T20:01:47Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-86-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Russia-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged leak of Philippines credential combolist
    Category: Combo List
    Content: Threat actor thejackal101 shared a credential combolist containing over 68,000 email and password combinations allegedly from Philippines users. The data is described as fresh and high quality, distributed through hidden forum content.
    Date: 2026-04-09T20:00:46Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-68-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Philippines-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Philippines
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged leak of Peruvian credential combolist
    Category: Combo List
    Content: A threat actor leaked a credential combolist containing over 77,000 email and password combinations allegedly originating from Peru. The actor also provided a Telegram channel for additional compromised data.
    Date: 2026-04-09T19:59:31Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-77-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Peru-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Peru
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged leak of Portuguese credentials combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing over 46,000 email and password combinations allegedly from Portugal, marked as fresh and high quality. The credentials are being distributed for free on underground forums.
    Date: 2026-04-09T19:58:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-46-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Portugal-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Portugal
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged leak of Pakistani credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing over 30,000 email:password credential pairs allegedly originating from Pakistan. The credentials are being distributed for free and promoted as fresh and high quality.
    Date: 2026-04-09T19:57:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-30-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Pakistan-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged distribution of 9 million credential combolist targeting multiple platforms
    Category: Combo List
    Content: Threat actor distributes a 9 million record combolist containing email and password combinations for various platforms including PSN, Payback, and PayPal through Telegram channels. The credentials are being shared freely rather than sold.
    Date: 2026-04-09T19:55:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71607/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged promotion of SMS verification bypass service DogeSMS
    Category: Initial Access
    Content: Threat actor promotes DogeSMS service offering virtual phone numbers and SMS verification bypass capabilities for OTP codes across multiple countries. The service is marketed for testing workflows but could facilitate account takeover and fraud activities.
    Date: 2026-04-09T19:55:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71606/
    Screenshots:
    None
    Threat Actors: Dogesms
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Alleged leak of German credential combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 59,594 German email and password combinations on a cybercrime forum. The actor also promotes a premium cloud service with paid subscription tiers ranging from $10-50.
    Date: 2026-04-09T19:45:49Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-59-594-Good-Germany-D4RKNETHUB-CLOUD-09-04-26
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged leak of Polish credentials combolist
    Category: Combo List
    Content: Threat actor thejackal101 shared a combolist containing over 250,000 email:password combinations allegedly from Polish users. The credentials are described as fresh and high quality, distributed through a hidden content section requiring registration to access.
    Date: 2026-04-09T19:44:45Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9C%AA-250-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Poland-%E2%9C%AA-9-APR-2026-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Alleged leak of German credentials combolist
    Category: Combo List
    Content: Threat actor D4rkNetHub shared a combolist containing 59,594 German credentials on a cracking forum. The post appears to offer free access to the credential data through an image hosting link.
    Date: 2026-04-09T19:42:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71605/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged Cyber Attack and Initial Access Compromise of Tatung University (TTU) by Z-Pentest Alliance
    Category: Initial Access
    Content: Threat actor group Z-Pentest Alliance claims to have gained full control of a faculty/administrator computer at Tatung University (TTU), Taiwan, Department of Digital Media Design. They report administrative access to SINEW SCMS (classroom management system), exposing a full inventory of lab computers, internal IP addresses (142.123..), MAC addresses, and hardware specs. The actor claims access to the instructors work files, OneDrive, and Microsoft account, with the ability to mass-deploy malware across all lab machines via SCMS. Threats include mass infection, credential leakage (Microsoft, Google), data exfiltration of student/faculty records, and using the university network as a pivot point into other Taiwanese systems. Post is tagged #OpTaiwan.
    Date: 2026-04-09T19:41:42Z
    Network: telegram
    Published URL: https://t.me/Z_Pentest_Alliance_ru/930
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: Taiwan
    Victim Industry: Education
    Victim Organization: Tatung University (大同大學, TTU)
    Victim Site: ttu.edu.tw
  41. Alleged distribution of corporate email credentials combolist
    Category: Combo List
    Content: Threat actor CODER is distributing a 7 million record combolist containing corporate email credentials through Telegram channels. The actor operates multiple Telegram groups offering free credential lists and programs.
    Date: 2026-04-09T19:30:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71602/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged leak of credential logs via DAISY CLOUD service
    Category: Combo List
    Content: Threat actor NEW_DAISYCLOUD shared 5,330 fresh credential logs through a cloud service called DAISY CLOUD, distributed via a password-protected file hosting link on pixeldrain.com.
    Date: 2026-04-09T19:30:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71603/
    Screenshots:
    None
    Threat Actors: NEW_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alleged leak of email credentials from USA and Europe
    Category: Combo List
    Content: A threat actor shared a combolist containing 6,300 email credentials with valid mail access, reportedly from users in the USA and Europe. The credentials are being distributed as a free download on an underground forum.
    Date: 2026-04-09T19:30:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71604/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Alleged leak of stealer logs containing credentials
    Category: Logs
    Content: Threat actor UP_DAISYCLOUD shared 5,330 fresh stealer logs from April 9th via a cloud storage link. The logs are distributed for free download and the actor promotes daily updates through their Telegram channel.
    Date: 2026-04-09T19:29:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5330-LOGS-CLOUD-%E2%98%81-09-APRIL-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Alleged data breach of Prefeitura Municipal de Caieiras
    Category: Data Breach
    Content: Threat actor Spirigatito claims to be selling a database containing 363,519 records from the municipal government of Caieiras, São Paulo, Brazil. The data allegedly includes personal information such as full names, CPF numbers, birth dates, phone numbers, email addresses, and medical record numbers.
    Date: 2026-04-09T19:28:10Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Government-of-Brazil-Prefeitura-Municipal-de-Caieiras–188012
    Screenshots:
    None
    Threat Actors: Spirigatito
    Victim Country: Brazil
    Victim Industry: Government
    Victim Organization: Prefeitura Municipal de Caieiras
    Victim Site: Unknown
  46. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum post claims to offer 600 valid Hotmail email credentials. The post appears to be offering a combolist of Hotmail accounts, though the actual content requires forum registration to view.
    Date: 2026-04-09T19:06:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71600/
    Screenshots:
    None
    Threat Actors: Jelooos
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  47. Alleged Cyber Attack and Initial Access Compromise of Tatung University (TTU) Taiwan by Z-Pentest Alliance
    Category: Cyber Attack
    Content: Threat actor group Z-Pentest Alliance claims to have gained full control over a faculty/administrator computer at Tatung University (TTU), Taiwan, specifically within the Department of Digital Media Design. They report administrative access to SINEW SCMS (信業科技 教室管理系統), a classroom computer management system, exposing a full inventory of lab computers, internal IP addresses (142.123..), MAC addresses, and Windows version details. The actors claim access to the instructors OneDrive and Microsoft account, all work files, and the ability to mass-deploy malware across all lab machines via SCMS. They threaten credential leaks (Microsoft, Google), public release of academic materials under their brand, and further lateral movement into other Taiwanese systems. Post is tagged #OpTaiwan indicating a broader campaign.
    Date: 2026-04-09T19:06:38Z
    Network: telegram
    Published URL: https://t.me/c/2729466495/930
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: Taiwan
    Victim Industry: Education
    Victim Organization: Tatung University (大同大學, TTU)
    Victim Site: ttu.edu.tw
  48. Alleged leak of email credential combolists via PandaCloud service
    Category: Combo List
    Content: Threat actor advertising a free service providing fresh email credential combolists updated daily through Telegram channel and file sharing platform. The service claims to offer only valid and recent credential combinations from various email providers.
    Date: 2026-04-09T19:05:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71601/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Alleged data leak of Matomo analytics platform database
    Category: Data Leak
    Content: A threat actor claims to have discovered multiple SQL database files totaling over 24GB in an Amazon S3 bucket, allegedly containing Matomo analytics platform data including visitor logs and database dumps. The actor is sharing download links to the leaked data for free.
    Date: 2026-04-09T19:03:09Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Matomo-Privacy-first-Google-Analytics-Alternative
    Screenshots:
    None
    Threat Actors: OriginalCrazyOldFart
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Matomo
    Victim Site: matomo.org
  50. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: A threat actor allegedly shared a collection of valid Hotmail credentials on a cybercrime forum. The post indicates the credentials are fresh and valid, though the exact count is hidden behind registration requirements.
    Date: 2026-04-09T18:53:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71599/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  51. Alleged sale of credit card data and financial services on XF forum
    Category: Data Breach
    Content: Threat actor bigpunisher111 is selling credit card data with high and low balances for online shopping, carding, and various payment platforms. The actor also offers bank logs, gift cards, and cash-out services through multiple communication channels.
    Date: 2026-04-09T18:44:18Z
    Network: openweb
    Published URL: https://xforums.st/threads/tele-terrellwhitte-discord-active24hrs-gmail-sosaboy959-gmail-com-whatsapp-1-425-531-1773.606517/
    Screenshots:
    None
    Threat Actors: bigpunisher111
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Alleged data breach of MiFlash Mobile
    Category: Data Breach
    Content: Threat actor claims to have compromised MiFlash Mobile database containing personal information of 500,000 members and MD5-encrypted passwords for 200,000 members. The actor is allegedly selling the data and claims most passwords are being cracked.
    Date: 2026-04-09T18:37:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FLASHMOBILE-MX-500K-With-Password-FULL-PII
    Screenshots:
    None
    Threat Actors: Brazzers
    Victim Country: Mexico
    Victim Industry: Technology
    Victim Organization: MiFlash Mobile
    Victim Site: miflashmobile.mx
  53. Alleged data leak of Bangladesh fuel pump database from fuelpass.gov.bd
    Category: Data Leak
    Content: A threat actor leaked a database containing fuel pump station information from the Bangladesh governments fuel pass system. The leaked data includes station details, owner information, contact details, location data, and transaction counts for fuel pumps across Bangladesh.
    Date: 2026-04-09T18:36:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-fuelpass-gov-bd-fuel-pump-data-leak
    Screenshots:
    None
    Threat Actors: death11
    Victim Country: Bangladesh
    Victim Industry: Government
    Victim Organization: Bangladesh Government Fuel Pass System
    Victim Site: fuelpass.gov.bd
  54. Alleged leak of California identification documents with selfies
    Category: Data Leak
    Content: A threat actor shared California identification documents paired with selfie photographs on a cybercrime forum. The content is hidden behind registration requirements, making specific details unavailable.
    Date: 2026-04-09T18:36:46Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%92%8EUSA-Cali-ID-Selfie-%F0%9F%92%8E
    Screenshots:
    None
    Threat Actors: Databroque
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged data breach of Lenme platform
    Category: Data Breach
    Content: Threat actor claims to possess a database containing personal information from Lenme.com including names, addresses, phone numbers, and Social Security numbers. The actor is gauging interest in the full database by sharing a small sample of 5 records.
    Date: 2026-04-09T18:36:41Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-lenme-com-invest-btc-data-usa
    Screenshots:
    None
    Threat Actors: bases_email_num_usa
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Lenme
    Victim Site: lenme.com
  56. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor MegaCloudshop shared a combolist containing 1,200 allegedly valid Hotmail email credentials via file sharing service. The credentials are claimed to be fresh and provide full mail access.
    Date: 2026-04-09T18:27:26Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-1-2K-Full-Valid-HOTMAIL-Fresh-Mail-Access-09-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  57. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,200 allegedly valid Hotmail email credentials on a cybercrime forum. The credentials are claimed to be fresh and from April 9th.
    Date: 2026-04-09T18:25:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71598/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  58. Alleged leak of credential combolist containing 22.85 million records
    Category: Logs
    Content: Threat actor Daxus made available a credential combolist containing 22.85 million URL:LOGIN:PASS records through their platform. The actor promotes additional services through their website and Telegram channel.
    Date: 2026-04-09T18:23:13Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-%E2%AD%90%EF%B8%8FURL-LOG-PASS-22-85-M-%E2%9C%85-ULP-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged defacement of baitaranighat.com by OpsShadowStrike
    Category: Defacement
    Content: The hacktivist group #OpsShadowStrike claimed responsibility for defacing the Indian website baitaranighat.com, uploading a defacement page at /ops.html. The attack was carried out in collaboration with multiple Malaysian hacktivist groups including TengkorakCyberCrew, EagleCyberCrew, MalaysiaHacktivist, CyberActivistMalaysia, AskarBadai, TheSweetNight, Noheartz, and several individual actors. The operation appears politically motivated, tied to pro-Palestine and anti-Israel sentiment under the #AllMuslimHackers banner.
    Date: 2026-04-09T18:12:48Z
    Network: telegram
    Published URL: https://t.me/c/3844432135/274
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Baitarani Ghat
    Victim Site: baitaranighat.com
  60. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Actor snowstormxd shared fresh Hotmail credentials through free download links on a cybercriminal forum. The combolist was made available via Pasteview and Telegram channels at no cost.
    Date: 2026-04-09T17:49:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71596/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  61. Alleged distribution of stolen credentials via Mystic Stealer
    Category: Logs
    Content: Threat actor KazeFreak distributed 1,000 stolen credential logs obtained via Mystic Stealer malware from Spanish victims running Windows 10 Enterprise and Chrome browser. The logs include credentials, cookies, cryptocurrency wallet data, and autofill information.
    Date: 2026-04-09T17:46:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-URL-LOGIN-PASS-Mystic-Stealer-1000-logs
    Screenshots:
    None
    Threat Actors: KazeFreak
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  62. Alleged sale of Discord email disclosure exploit
    Category: Initial Access
    Content: Threat actor claims to be selling an exploit that abuses an outdated Discord feature to retrieve any users email address using only their user ID for 0.5 XMR. The alleged exploit reportedly bypasses rate limiting mechanisms.
    Date: 2026-04-09T17:46:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-GET-ANY-DISCORD-USERS-EMAIL-%F0%9F%92%99
    Screenshots:
    None
    Threat Actors: znf
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Discord
    Victim Site: discord.com
  63. Alleged sale of classified Chinese military supercomputing data
    Category: Data Breach
    Content: Threat actor claims to be selling over 10 petabytes of classified military research data allegedly stolen from Chinas National Supercomputing Center, including satellite schematics, aerospace simulations, and defense contractor research for $20,000.
    Date: 2026-04-09T17:46:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-CHINA-10-PETABYTES-MILITARY-LEAK
    Screenshots:
    None
    Threat Actors: McLovin
    Victim Country: China
    Victim Industry: Government/Military
    Victim Organization: National Supercomputing Center (NSCC)
    Victim Site: Unknown
  64. Alleged data leak of Payap University database
    Category: Data Leak
    Content: A threat actor allegedly leaked a database from Payap University containing personal information including names, ID numbers, phone numbers, email addresses, and administrative data. The sample shows structured database records with employee or member information across various Indonesian regions.
    Date: 2026-04-09T17:45:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-payap-ac-th-Payap-University-Official-Website-In-Thailand
    Screenshots:
    None
    Threat Actors: blackhunter1
    Victim Country: Thailand
    Victim Industry: Education
    Victim Organization: Payap University
    Victim Site: payap.ac.th
  65. Alleged data breach of Shukah.com
    Category: Data Breach
    Content: Threat actor undertaker is selling a database containing 7.7 million records from Shukah.com dated July 2025. The data includes customer information, payment details, driver data, and location coordinates for $600.
    Date: 2026-04-09T17:45:44Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Shukah-com-7M
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Shukah
    Victim Site: shukah.com
  66. Alleged leak of Hotmail credentials
    Category: Data Leak
    Content: Threat actor martcloud posted a free download link claiming to contain fresh Hotmail credentials on a dark web forum.
    Date: 2026-04-09T17:45:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-FULL-FRESH-HOTMAILS-unrapped–72856
    Screenshots:
    None
    Threat Actors: martcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  67. Alleged data breach of French banking institutions
    Category: Data Breach
    Content: Threat actor claims to possess a dataset containing comprehensive personal and financial information including IBANs, personal details, and account information from multiple major French and European banks including BNP Paribas, Societe Generale, and Credit Agricole.
    Date: 2026-04-09T17:45:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-1-2M-FR-FICOBA-BANK-LEADS-2026
    Screenshots:
    None
    Threat Actors: bestdata
    Victim Country: France
    Victim Industry: Financial Services
    Victim Organization: Multiple French Banks
    Victim Site: Unknown
  68. Alleged data breach of Optavia customer database
    Category: Data Breach
    Content: Threat actor claims to have obtained customer data from Optavia including email addresses, passwords, names, phone numbers, and partial credit card information. The data is being distributed through a download link and the actor is offering additional databases through Telegram contact.
    Date: 2026-04-09T17:45:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-optavia-com-website-USA-data
    Screenshots:
    None
    Threat Actors: bases_email_num_usa
    Victim Country: United States
    Victim Industry: Health and Wellness
    Victim Organization: Optavia
    Victim Site: optavia.com
  69. Alleged leak of BidenCash credit card data
    Category: Data Leak
    Content: Nearly one million credit cards allegedly leaked by BidenCash dark web market, including card numbers, expiration dates, and CVV codes. The data was shared for free through clearnet file-hosting services and promoted on Russian-speaking hacker forums.
    Date: 2026-04-09T17:44:33Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-BidenCash-1-221-551-cards-for-free2-csv
    Screenshots:
    None
    Threat Actors: HarleenQuinzel2905
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  70. Alleged data leak of Carwah car rental platform database
    Category: Data Leak
    Content: Threat actor Spirigatito leaked a database from Carwah, Saudi Arabias digital car rental platform, containing personal information including names, emails, phone numbers, national IDs, dates of birth, and driver license data with images.
    Date: 2026-04-09T17:44:18Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-DATABASE-Carwah-Database-Drivers-Licence-Leaked-Download
    Screenshots:
    None
    Threat Actors: Spirigatito
    Victim Country: Saudi Arabia
    Victim Industry: Transportation
    Victim Organization: Carwah
    Victim Site: Unknown
  71. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor has made available a credential combolist containing 3,183 Hotmail email and password combinations described as premium mixed mail hits.
    Date: 2026-04-09T17:35:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71595/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  72. Alleged CCTV System Compromise of Manchester Pharmacy by NoName057(16)
    Category: Cyber Attack
    Content: The threat actor group NoName057(16) claims to have successfully infiltrated the CCTV surveillance system of a pharmacy located in Manchester, UK. The post includes politically motivated commentary targeting the UK, references to OpGreatBritain, and hashtags suggesting an ongoing campaign against British targets. The group frames this as retaliation against Russophobes, indicating a pro-Russian hacktivist motivation.
    Date: 2026-04-09T17:17:51Z
    Network: telegram
    Published URL: https://t.me/c/3087552512/1706
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: United Kingdom
    Victim Industry: Healthcare / Retail Pharmacy
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Alleged leak of USA credential combolist
    Category: Logs
    Content: Threat actor D4rkNetHub shared a credential combolist containing 1,133 USA-based accounts on a cybercriminal forum. The post appears to offer free access to the credential list rather than selling it.
    Date: 2026-04-09T16:48:01Z
    Network: openweb
    Published URL: https://xforums.st/threads/1-133-good-usa-d4rknethub-cloud-09-04-26.606492/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Alleged leak of USA credentials combolist
    Category: Combo List
    Content: Threat actor D4rkNetHub allegedly leaked a combolist containing 1,133 credentials from USA users on a cybercrime forum. The credentials are described as Good USA suggesting they are verified or high-quality.
    Date: 2026-04-09T16:45:19Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71594/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Mass defacement targeting Indonesian educational institution by maw3six
    Category: Defacement
    Content: Threat actor maw3six conducted a mass defacement attack targeting the University of Butons website as part of a broader campaign. The attack was executed on April 9, 2026, affecting the institutions online presence.
    Date: 2026-04-09T16:35:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248376
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: University of Buton
    Victim Site: sijamu.umbuton.ac.id
  76. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Actor alphaxdd shared a combolist containing 659 allegedly valid Hotmail email and password combinations on cybercriminal forum. The credentials are described as premium hits with mixed mail types.
    Date: 2026-04-09T16:32:34Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-659x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  77. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 659 premium Hotmail email credentials on CrackingX forum. The credentials are described as valid hits from private cloud sources and mixed email accounts.
    Date: 2026-04-09T16:31:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71592/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  78. Alleged Imminent Cyber Attack Announced by Handala Against Israeli IDF Unit 8200
    Category: Cyber Attack
    Content: Threat actor Handala has announced a forthcoming cyber operation targeting the Israeli militarys Unit 8200, with specific focus on its Iran Desk. The group is teasing a surprise to be revealed the following day, suggesting a planned data breach, leak, or disruptive attack against Israeli signals intelligence infrastructure.
    Date: 2026-04-09T16:29:35Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/217
    Screenshots:
    None
    Threat Actors: HANDALA HACK
    Victim Country: Israel
    Victim Industry: Government / Military Intelligence
    Victim Organization: Unit 8200 (IDF Intelligence Corps)
    Victim Site: Unknown
  79. Alleged Sale of Sensitive Cisco and Salesforce Data Including Source Code and Credentials
    Category: Data Breach
    Content: A threat actor is allegedly selling a large volume of confidential data from Cisco and Salesforce. The claimed data includes source code for Cisco products (IOS, ASA, NX-OS), user identity information, GitHub repositories, and AWS-stored data. Over 3.15 million Salesforce records are also reportedly included. The data is being offered for approximately $500,000. No official confirmation has been issued by either company.
    Date: 2026-04-09T16:29:07Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21099
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco, Salesforce
    Victim Site: Unknown
  80. Alleged Sale of Mexican AFORE Retirement Fund Database with 88,483 Records
    Category: Data Breach
    Content: A threat actor is selling an alleged database of Mexican AFORE (Administradoras de Fondos para el Retiro / retirement fund administrators) records in .xlsx format. The dataset reportedly contains 88,483 individual records with extensive PII including full name, CURP (national ID), email, employer, home address, postal code, retirement account balance (RCV), AFORE provider, NSS (social security number), NRP, and sector/industry. A sample record shows a balance of $2,348,472 MXN. Price is described as negotiable. Contact handle: @MagoSpeak.
    Date: 2026-04-09T16:27:58Z
    Network: telegram
    Published URL: https://t.me/c/3764001014/102
    Screenshots:
    None
    Threat Actors: SpeakTeam
    Victim Country: Mexico
    Victim Industry: Financial Services / Retirement Funds
    Victim Organization: AFORE (Multiple Retirement Fund Administrators)
    Victim Site: Unknown
  81. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: Threat actor klyne05 shared a mixed email credential combolist described as private, fresh, and checked on a cybercriminal forum. The post offers the credential data as a free download with minimal details provided about the source or contents.
    Date: 2026-04-09T16:19:02Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71588/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged leak of credential combolist containing 22.85 million records
    Category: Combo List
    Content: Threat actor Daxus allegedly leaked a credential combolist containing 22.85 million URL:LOG:PASS combinations on CrackingX forum. The data is being distributed through the actors website and Telegram channel.
    Date: 2026-04-09T16:18:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71590/
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  83. Alleged distribution of DeepNude v2 Premium cracking tool
    Category: Data Leak
    Content: Cracked version of DeepNude v2 Premium AI image transformation software being distributed on cybercrime forum. The tool is designed for automated generation of fake nude images and may facilitate non-consensual intimate imagery creation.
    Date: 2026-04-09T16:05:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-DeepNude-v2-Premium-Cracked
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: DeepNude
    Victim Site: Unknown
  84. WhatDROID Pro Activated
    Category: Alert
    Content: New thread posted by Starip: WhatDROID Pro Activated
    Date: 2026-04-09T16:04:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-WhatDROID-Pro-Activated
    Screenshots:
    None
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. 136K CORPS TARGETED COMBOLIST
    Category: Combo List
    Content: New thread posted by Ra-Zi: 136K CORPS TARGETED COMBOLIST
    Date: 2026-04-09T16:03:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-136K-CORPS-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  86. [1035x] ⭐⭐ FRESH HQ HOTMAIL ⭐⭐
    Category: Combo List
    Content: New thread posted by KiwiShio: [1035x] ⭐⭐ FRESH HQ HOTMAIL ⭐⭐
    Date: 2026-04-09T16:03:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71585/
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. 9K Full Valid Mail Access Just top Quality 09.04
    Category: Combo List
    Content: New thread posted by MailAccesss: 9K Full Valid Mail Access Just top Quality 09.04
    Date: 2026-04-09T16:02:34Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71587/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. DIGECAM (GUATEMALA) 62K FireArm Serials And Models.
    Category: Alert
    Content: New thread posted by GordonFreeman: DIGECAM (GUATEMALA) 62K FireArm Serials And Models.
    Date: 2026-04-09T16:00:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DIGECAM-GUATEMALA-62K-FireArm-Serials-And-Models
    Screenshots:
    None
    Threat Actors: GordonFreeman
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Alleged leak of US email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,200 fresh valid US email credentials dated April 9th on an underground forum.
    Date: 2026-04-09T15:50:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-2K-Usa-Fresh-Valid-Mail-Access-09-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged leak of US email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 1,200 allegedly fresh and valid US email credentials dated April 9th on a cybercriminal forum specializing in combolists and credential dumps.
    Date: 2026-04-09T15:49:35Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71583/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Alleged Cyber Attack on Luxembourg Pipeline Cathodic Protection ICS Infrastructure by Z-Pentest Alliance
    Category: Cyber Attack
    Content: Threat group Z-Pentest Alliance claims one of their members successfully compromised an RTU32 (Remote Terminal Unit 32) industrial controller managing cathodic protection systems for pipelines and metal structures in Luxembourg. The actor claims full access to the main HMI panel, with control over substation parameters including New Setpoints, Off Potential, IR-Drop, Impedance, and Setup across four channels. The system is reportedly generating communication errors with values maxing out at 999, while operators believe it is a routine Comm err station 0 issue. The group frames this as a demonstration of offensive ICS capability and states the next target is already being worked on.
    Date: 2026-04-09T15:39:13Z
    Network: telegram
    Published URL: https://t.me/c/2729466495/929
    Screenshots:
    None
    Threat Actors: Z-Pentest Alliance
    Victim Country: Luxembourg
    Victim Industry: Energy / Critical Infrastructure (Pipeline / Utilities)
    Victim Organization: Unknown
    Victim Site: Unknown
  92. ⚡⚡ X1915 Valid UHQ Mix ⚡⚡
    Category: Combo List
    Content: New thread posted by Roronoa044: ⚡⚡ X1915 Valid UHQ Mix ⚡⚡
    Date: 2026-04-09T15:38:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1915-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged leak of Hotmail credentials on CrackingX forum
    Category: Combo List
    Content: Forum user noir shared what appears to be valid Hotmail credentials in a mixed combolist format on CrackingX forum. The post mentions X1915 Valid UHQ Mix suggesting high-quality credential data.
    Date: 2026-04-09T15:37:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71581/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  94. Website defacement of Radbag by DimasHxR
    Category: Defacement
    Content: The German e-commerce website Radbag was defaced by the attacker DimasHxR on April 9, 2026. The defacement targeted a customer media subdirectory of the main website.
    Date: 2026-04-09T15:23:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832108
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: E-commerce
    Victim Organization: Radbag
    Victim Site: www.radbag.de
  95. Alleged sale of offensive hacking tools bundle including CobaltStrike and AI vulnerability finder
    Category: Malware
    Content: A threat actor operating under CyberShop is selling a bundle of offensive security and hacking tools for $99, including TargetFetcher, CobaltStrike, CodeShield Pro, and AI Vuln Finder, with Diecat included as a free bonus. The offer is promoted as a 72-hour limited promo via a Telegram bot contact.
    Date: 2026-04-09T14:59:05Z
    Network: telegram
    Published URL: https://t.me/c/2588114907/1064
    Screenshots:
    None
    Threat Actors: Keymous
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Website defacement of giaysneaker.store by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the Vietnamese sneaker retailer website giaysneaker.store on April 9, 2026. The attack targeted a specific page within the media/custom directory rather than the main homepage.
    Date: 2026-04-09T14:54:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832104
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Unknown
    Victim Site: giaysneaker.store
  97. Website defacement of funkbomb.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the funkbomb.com website on April 9, 2026. This appears to be an isolated defacement incident targeting a single website rather than a mass attack campaign.
    Date: 2026-04-09T14:54:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832105
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: funkbomb.com
  98. Alleged cyber attack on Syria Ministry of Public Works and Housing by Keymous
    Category: Defacement
    Content: Threat actor group Keymous claims to have targeted the Syrian Ministry of Public Works and Housing. The post uses the Syrian flag emoji and ministry name as a trophy post, consistent with defacement or data breach activity attributed to this group.
    Date: 2026-04-09T14:51:13Z
    Network: telegram
    Published URL: https://t.me/c/2588114907/1066
    Screenshots:
    None
    Threat Actors: Keymous
    Victim Country: Syria
    Victim Industry: Government
    Victim Organization: Ministry of Public Works and Housing
    Victim Site: Unknown
  99. Alleged leak of mixed domain credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 30,000 email and password combinations from mixed domains via a paste service link. The credentials are being distributed for free on a cybercriminal forum.
    Date: 2026-04-09T14:50:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-30k-Mixed-Domains-Good-Combolist
    Screenshots:
    None
    Threat Actors: Razly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Alleged leak of mixed domain credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 30,000 mixed domain credentials. The credentials are described as good quality and made available through a file sharing service.
    Date: 2026-04-09T14:50:00Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71580/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  101. Alleged sale of domain list with authority metrics by Pharaohs Team
    Category: Phishing
    Content: Pharaohs Team market is offering a list of 22 domains across multiple countries and TLDs, each accompanied by Domain Authority (DA) and Page Authority (PA) scores. Such lists are commonly used for phishing infrastructure, spam campaigns, SEO manipulation, or malicious redirects. Contact provided via Telegram handle @phteam_s.
    Date: 2026-04-09T14:49:31Z
    Network: telegram
    Published URL: https://t.me/c/3205199875/464
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  102. Alleged sale of AWS S3 access to US corporation
    Category: Initial Access
    Content: Threat actor AckLine is allegedly selling access to AWS S3 backup systems of a US corporation with $5.8M revenue, requesting offers via private message on Qtox.
    Date: 2026-04-09T14:47:11Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-AWS-US-Corp
    Screenshots:
    None
    Threat Actors: AckLine
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  103. Ladministration communale dAnderlues subit une cyberattaque de grande ampleur: les services fermés pour une durée inconnue
    Category: Cyber Attack
    Content: La commune dAnderlues a été victime dune cyberattaque de grande ampleur, entraînant la fermeture de ses services administratifs pour une durée indéterminée. Lattaque a eu lieu entre minuit et 5h du matin le 8 avril 2026. Les autorités locales et fédérales tentent de rétablir laccès aux systèmes informatiques et de déterminer lorigine de lattaque.
    Date: 2026-04-09T14:40:44Z
    Network: openweb
    Published URL: https://www.dhnet.be/regions/charleroi/2026/04/09/ladministration-communale-danderlues-subit-une-cyberattaque-de-grande-ampleur-les-services-fermes-pour-une-duree-inconnue-MBTDZSJTLJB7TIM2SXAWOQ4OAQ/
    Screenshots:
    None
    Threat Actors:
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Anderlues
    Victim Site: anderlues.be
  104. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 53,000 mixed email and password combinations on a cybercrime forum, providing free access to registered users.
    Date: 2026-04-09T14:38:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-53K-Mix-Mail-Access-Combo–199925
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  105. Alleged leak of mixed email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 53,000 mixed email and password combinations on a cybercriminal forum. The credentials appear to be from various sources and are being distributed for free to registered forum users.
    Date: 2026-04-09T14:37:13Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71579/
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  106. Website defacement of Diktum by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against diktum.lt on April 9, 2026. The attack targeted a specific media/customer section of the Lithuanian website.
    Date: 2026-04-09T14:31:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832098
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Lithuania
    Victim Industry: Unknown
    Victim Organization: Diktum
    Victim Site: diktum.lt
  107. Alleged leak of Comcast credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,000 Comcast email and password combinations via a free download link on a cybercrime forum.
    Date: 2026-04-09T14:25:39Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1K-COMCAST
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: United States
    Victim Industry: Telecommunications
    Victim Organization: Comcast
    Victim Site: comcast.com
  108. Alleged distribution of HQ Mix combolist containing 1,779 credentials
    Category: Combo List
    Content: A threat actor is distributing a high-quality mixed credential list containing 1,779 entries on a cybercriminal forum. The combolist appears to be shared for free download behind a registration gate.
    Date: 2026-04-09T14:24:37Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X1779-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  109. Alleged solicitation for stolen email credentials and social media cookies
    Category: Logs
    Content: A threat actor operating under the handle best_ is actively seeking to purchase stolen credentials and session cookies, specifically: valid IMAP email:password combos (non-Gmail/Microsoft), fresh Gmail cookies not previously verified by LinkedIn buyers, and LinkedIn cookies with passwords. The actor is seeking long-term partnerships with data providers, suggesting ongoing bulk acquisition of compromised account data.
    Date: 2026-04-09T14:21:59Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/60019
    Screenshots:
    None
    Threat Actors: best_
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  110. Alleged sale of multi-platform combolists, cookies, and logs including Hotmail, Gmail, Yahoo, PayPal, and more
    Category: Logs
    Content: A threat actor is selling combolists and stealer logs covering a wide range of platforms including email providers (Hotmail, Gmail, Yahoo, AOL, Comcast), social media (Facebook, Instagram, TikTok), streaming services (Netflix, Disney), e-commerce (Amazon, eBay, PayPal), and dating apps (Badoo, Bumble, OkCupid). The offering includes cookies and logs for accounts across multiple countries including France, Italy, United States, United Kingdom, Germany, and Spain. Contact is directed to @xRealWorker on Telegram.
    Date: 2026-04-09T14:19:00Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/60013
    Screenshots:
    None
    Threat Actors: xRealWorker
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  111. Alleged data leak of Foxhog Ventures VC firm database
    Category: Data Leak
    Content: Threat actor leaked alleged database dump from Foxhog Ventures VC firm containing CRM data of 172 startup founders and SME owners, including personal information, project details, and financial records. The leak includes detailed victim profiles with contact information and investment-related documentation.
    Date: 2026-04-09T14:12:42Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Foxhog-Ventures-Leaked
    Screenshots:
    None
    Threat Actors: nono0101
    Victim Country: India
    Victim Industry: Financial Services
    Victim Organization: Foxhog Ventures
    Victim Site: Unknown
  112. Alleged leak of mixed email credential list
    Category: Combo List
    Content: A threat actor shared a combolist containing 4,400 mixed email credentials for free download on a cybercriminal forum.
    Date: 2026-04-09T14:11:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71578/
    Screenshots:
    None
    Threat Actors: NotSellerxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  113. Alleged initial access to held.co.il admin panel (Israel)
    Category: Initial Access
    Content: Threat actor Keymous Plus shared admin panel access credentials for held.co.il, an Israeli domain. The post includes the admin panel URL (https://held.co.il/admin), confirmed successful login credentials (7stars:7stars), login statistics showing 1 successful login on 2026-03-25, and diagnostic details indicating an unhandled exception during an order export attempt. The access appears to be to an e-commerce or order management system.
    Date: 2026-04-09T14:11:15Z
    Network: telegram
    Published URL: https://t.me/c/2588114907/1065
    Screenshots:
    None
    Threat Actors: Keymous Plus
    Victim Country: Israel
    Victim Industry: E-commerce
    Victim Organization: Held
    Victim Site: held.co.il
  114. Alleged leak of email credential combolist containing 16,000 records
    Category: Combo List
    Content: Threat actor COYTO shared a combolist containing 16,000 email credentials for free download on DemonForums. The credential list was made available through a paste sharing service.
    Date: 2026-04-09T14:00:07Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-16K-MAIL-ACCESS-HQ
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  115. Website defacement of Casmar Global by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a subdirectory of the Casmar Global website on April 9, 2026. The incident was not a mass defacement or redefacement attack.
    Date: 2026-04-09T13:52:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832069
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Casmar Global
    Victim Site: casmarglobal.com
  116. Alleged leak of credential combolist containing 3,000 valid accounts
    Category: Combo List
    Content: Threat actor WINGO shared a combolist containing 3,000 allegedly valid email and password combinations through a free download link on DemonForums.
    Date: 2026-04-09T13:47:17Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3k-VALID-ACCESS–199919
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  117. Alleged leak of mixed credential combolist containing 64,418 records
    Category: Combo List
    Content: A threat actor shared a combolist containing 64,418 email and password combinations described as a fresh mix on a cybercrime forum. The credentials appear to be from mixed sources and are being distributed for free.
    Date: 2026-04-09T13:46:19Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-64-418-Lines-Fresh-Mix-Combolist
    Screenshots:
    None
    Threat Actors: stormtrooper
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  118. Website defacement of CAD File Store by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the CAD File Store website on April 9, 2026. The incident targeted a single page rather than the main homepage or multiple sites simultaneously.
    Date: 2026-04-09T13:46:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832067
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology/Software
    Victim Organization: CAD File Store
    Victim Site: cadfilestore.com
  119. Website defacement of BuyMyStock by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer media subdirectory of buymystock.com on April 9, 2026. This appears to be an isolated defacement incident targeting the financial services platform.
    Date: 2026-04-09T13:45:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832068
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: BuyMyStock
    Victim Site: buymystock.com
  120. Alleged leak of mixed credential combolist
    Category: Combo List
    Content: A threat actor shared a fresh mixed combolist containing 64,418 credential pairs through a cybercrime forum. The actor promotes additional content through a Telegram channel.
    Date: 2026-04-09T13:45:09Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71577/
    Screenshots:
    None
    Threat Actors: Browzchel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  121. Website defacement of makeithomely.co.uk by DimasHxR
    Category: Defacement
    Content: Solo attacker DimasHxR successfully defaced the Make It Homely website on April 9, 2026. The defacement targeted the media directory of the UK-based home goods retailer.
    Date: 2026-04-09T13:39:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832065
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: Make It Homely
    Victim Site: makeithomely.co.uk
  122. Website defacement of German government portal by maw3six
    Category: Defacement
    Content: Attacker maw3six successfully defaced a German government procedure guide portal on April 9, 2026. The incident targeted a subdomain of the official Verfahrenslotse service platform used for administrative procedures.
    Date: 2026-04-09T13:38:13Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248375
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Germany
    Victim Industry: Government
    Victim Organization: Verfahrenslotse
    Victim Site: platz.verfahrenslotse.org
  123. Website defacement of The Body Shop Vietnam by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced The Body Shop Vietnams website on April 9, 2026, targeting the media section of their e-commerce platform. This appears to be an isolated defacement incident rather than part of a mass campaign.
    Date: 2026-04-09T13:32:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832054
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Vietnam
    Victim Industry: Retail/Cosmetics
    Victim Organization: The Body Shop Vietnam
    Victim Site: thebodyshop.com.vn
  124. Website defacement of TKC by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced a subdirectory of the TKC website on April 9, 2026. The attack targeted a customer address page within the media section of the site.
    Date: 2026-04-09T13:32:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832059
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: TKC
    Victim Site: tkc.co.uk
  125. Website defacement of TimeLuxury by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the TimeLuxury website on April 9, 2026. The defacement targeted a specific subdirectory rather than the main homepage of what appears to be a luxury goods retailer.
    Date: 2026-04-09T13:31:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832060
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: TimeLuxury
    Victim Site: timeluxury.com
  126. Website defacement of Luxan BV by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a customer address page on the Luxan BV website on April 9, 2026. Luxan is a Dutch agricultural chemical company specializing in crop protection products.
    Date: 2026-04-09T13:30:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832061
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Agriculture/Chemical
    Victim Organization: Luxan BV
    Victim Site: luxan.nl
  127. Website defacement of krab.sk by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a customer address page on krab.sk on April 9, 2026. This was an individual defacement targeting a specific subdirectory of the Slovak website.
    Date: 2026-04-09T13:23:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832045
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Slovakia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: krab.sk
  128. Website defacement of Systems Print Media by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Systems Print Media website on April 9, 2026. The attack targeted a UK-based media and printing companys web presence.
    Date: 2026-04-09T13:23:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832046
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Media/Printing
    Victim Organization: Systems Print Media
    Victim Site: systemsprintmedia.co.uk
  129. Website defacement of LED Technologies by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced LED Technologies website on April 9, 2026. The incident targeted a single page rather than the main homepage or multiple sites.
    Date: 2026-04-09T13:22:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832053
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Technology
    Victim Organization: LED Technologies
    Victim Site: ledtechnologies.co.uk
  130. Alleged sale of offensive hacking toolkit bundle including CobaltStrike by LulzSec Black
    Category: Malware
    Content: LulzSec Black is advertising a 72-hour promotional bundle of offensive security/hacking tools for $99, including TargetFetcher, CobaltStrike, CodeShield Pro, AI Vuln Finder, and Diecat (free). Contact via @CyberShop_contact_bot. CobaltStrike is a well-known post-exploitation framework commonly abused by threat actors for C2 operations.
    Date: 2026-04-09T13:21:49Z
    Network: telegram
    Published URL: https://t.me/c/2727439812/5599
    Screenshots:
    None
    Threat Actors: LulzSec Black
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Website defacement of iNews Agency by DimasHxR
    Category: Defacement
    Content: Australian news agency iNews Agency was defaced by attacker DimasHxR on April 9, 2026. The defacement targeted a specific page in the media/customer section of the website.
    Date: 2026-04-09T13:16:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832042
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Media/News
    Victim Organization: iNews Agency
    Victim Site: inewsagency.com.au
  132. Website defacement of KiltsForMen by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the kiltsformen.com website on April 9, 2026. This appears to be an isolated defacement incident targeting the retail companys online presence.
    Date: 2026-04-09T13:15:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832043
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: KiltsForMen
    Victim Site: kiltsformen.com
  133. Alleged sale of US credentials combolist
    Category: Data Breach
    Content: Threat actor Seacoat is allegedly selling a credential list containing 400,000 email:password combinations claimed to be from United States users. The actor provides a sample file and requests contact via Telegram for purchase.
    Date: 2026-04-09T13:14:51Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-Strong-400k-USA-email-pass
    Screenshots:
    None
    Threat Actors: Seacoat
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  134. Alleged leak of classified images of former Israeli Chief of Staff by Iranian group Handala
    Category: Data Leak
    Content: Iranian hacking group HANDALA claims to have leaked classified images showing former Israeli Chief of Staff Herzi Halevi during undisclosed trips to Jordan and Qatar. The leaked material allegedly includes images of meetings in Jordan where Halevi reportedly presented a dagger belonging to a Jordanian soldier killed in the 1967 war. The claim was shared via LulzSec Black channel.
    Date: 2026-04-09T13:11:42Z
    Network: telegram
    Published URL: https://t.me/c/2727439812/5597
    Screenshots:
    None
    Threat Actors: HANDALA
    Victim Country: Israel
    Victim Industry: Government & Defense
    Victim Organization: Israel Defense Forces
    Victim Site: Unknown
  135. Website defacement of JYSK Vietnam by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the JYSK Vietnam retail website on April 9, 2026, targeting the customer address media directory. This appears to be an isolated defacement incident against the Danish furniture retailers Vietnamese operations.
    Date: 2026-04-09T13:09:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832039
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Vietnam
    Victim Industry: Retail
    Victim Organization: JYSK Vietnam
    Victim Site: jysk.vn
  136. Website defacement of arsludica.com by DimasHxR
    Category: Defacement
    Content: The website arsludica.com was defaced by threat actor DimasHxR on April 9, 2026. This was a targeted single-site defacement with no specified motivation or proof of concept provided.
    Date: 2026-04-09T13:09:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832040
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Ars Ludica
    Victim Site: arsludica.com
  137. Website defacement of HH Formulations by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the HH Formulations website on April 9, 2026. The defacement targeted a specific media directory rather than the homepage.
    Date: 2026-04-09T12:57:33Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832031
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Chemical/Pharmaceutical
    Victim Organization: HH Formulations
    Victim Site: hhformulations.com
  138. Website defacement of safta.com by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the safta.com website on April 9, 2026. The attack targeted a specific subdirectory rather than the main homepage and was conducted by an individual attacker without team affiliation.
    Date: 2026-04-09T12:56:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832032
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: SAFTA
    Victim Site: safta.com
  139. Website defacement of dufio.com.br by M789
    Category: Defacement
    Content: Attacker M789 defaced the dufio.com.br website on April 9, 2026, targeting specific banner images on the Brazilian site. This was an isolated defacement incident not part of a mass campaign.
    Date: 2026-04-09T12:56:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832036
    Screenshots:
    None
    Threat Actors: M789
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Dufio
    Victim Site: dufio.com.br
  140. Website defacement of Movimento Vida Saudável by maw3six
    Category: Defacement
    Content: The attacker maw3six defaced the Brazilian health and wellness organization Movimento Vida Saudávels website on April 9, 2026. The defacement targeted a specific page rather than the homepage and appears to be an isolated incident.
    Date: 2026-04-09T12:55:19Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248374
    Screenshots:
    None
    Threat Actors: maw3six
    Victim Country: Brazil
    Victim Industry: Healthcare/Wellness
    Victim Organization: Movimento Vida Saudável
    Victim Site: movimentovidasaudavel.com.br
  141. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 45,000 Hotmail email and password combinations on a cybercrime forum. The actor also advertises a shop for credential combinations from various countries.
    Date: 2026-04-09T12:53:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-4-45000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  142. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor shared an 82,000 record combolist containing email and password combinations from various forums. The credentials are described as validated and mixed from multiple forum platforms.
    Date: 2026-04-09T12:51:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%99%8B-82k-MIX-Base-With-Valid-FORUMS-%E2%99%8B-17
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A mixed combolist containing 82,000 valid forum credentials is being shared on a cybercriminal forum. The credentials appear to be sourced from various forum platforms.
    Date: 2026-04-09T12:50:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71571/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Alleged leak of Crypto.com credential samples
    Category: Combo List
    Content: Forum post claims to contain sample credentials allegedly from Crypto.com, posted in a combolists and dumps section with hidden preview content.
    Date: 2026-04-09T12:49:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71572/
    Screenshots:
    None
    Threat Actors: knvx
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Crypto.com
    Victim Site: crypto.com
  145. Website defacement of sviato.shop by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the e-commerce website sviato.shop on April 9, 2026. The defacement targeted a specific customer addition page rather than the main homepage.
    Date: 2026-04-09T12:49:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832016
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Sviato
    Victim Site: sviato.shop
  146. Website defacement of cuirsy.com by DimasHxR
    Category: Defacement
    Content: Website defacement attack conducted by threat actor DimasHxR against cuirsy.com on April 9, 2026. The attack targeted a specific subdirectory containing customer address information.
    Date: 2026-04-09T12:49:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832017
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: cuirsy.com
  147. Website defacement of GreenVibe by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the GreenVibe website on April 9, 2026. The incident targeted a single page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-09T12:48:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832022
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: GreenVibe
    Victim Site: greenvibe.com.ua
  148. Website defacement of Greenheart Premiums by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the greenheart-premiums.com website on April 9, 2026. This was an isolated defacement incident targeting a single organization rather than a mass defacement campaign.
    Date: 2026-04-09T12:47:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832023
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Greenheart Premiums
    Victim Site: greenheart-premiums.com
  149. Alleged leak of credential combolists containing 1,000 lists
    Category: Combo List
    Content: Threat actor BlackPanda shared 1,000 credential combolists for free download via MEGA file sharing service. The post includes sample email:password combinations from various domains and organizations.
    Date: 2026-04-09T12:47:40Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Exclusive-1k-Combolists
    Screenshots:
    None
    Threat Actors: BlackPanda
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Website defacement of Hydromarket by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Indonesian e-commerce website Hydromarket on April 9, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-09T12:47:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832024
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Indonesia
    Victim Industry: E-commerce
    Victim Organization: Hydromarket
    Victim Site: hydromarket.co.id
  151. Sumitomo Metal Mining Reports Ransomware Attack at Philippine Nickel Subsidiary – TipRanks.com
    Category: Cyber Attack
    Content: Sumitomo Metal Mining Cos Philippine nickel smelting subsidiary, Coral Bay Nickel Corporation, suffered a ransomware attack. The company isolated the affected servers and is investigating the breach with external specialists. The attack had a limited impact on operations and is not expected to significantly affect the companys consolidated results.
    Date: 2026-04-09T12:46:49Z
    Network: openweb
    Published URL: https://www.tipranks.com/news/company-announcements/sumitomo-metal-mining-reports-ransomware-attack-at-philippine-nickel-subsidiary
    Screenshots:
    None
    Threat Actors:
    Victim Country: Philippines
    Victim Industry: Unknown
    Victim Organization: Coral Bay Nickel Corporation
    Victim Site: cbnc.com.ph
  152. Caos en entrega de pasaportes por supuesto âataque cibernéticoâ, ¿tiene que ver el nuevo modelo?
    Category: Cyber Attack
    Content: Un supuesto ataque cibernético causó la suspensión de la atención en las oficinas de la Cancillería de Colombia para la expedición de pasaportes en varias ciudades, incluyendo Medellín, Bogotá, Cali y Bucaramanga. El problema se concentró en la plataforma SITAC, lo que impidió la prestación de servicios clave como apostilla y pasaportes en línea. La Cancillería informó que se están realizando labores técnicas para resolver las intermitencias y mejorar la plataforma.
    Date: 2026-04-09T12:46:47Z
    Network: openweb
    Published URL: https://www.elcolombiano.com/colombia/caos-en-entrega-de-pasaportes-por-supuesto-ataque-cibernetico-tiene-que-ver-el-nuevo-modelo-PB35343682
    Screenshots:
    None
    Threat Actors:
    Victim Country: Colombia
    Victim Industry: Unknown
    Victim Organization: Cancillería de Colombia
    Victim Site: cancilleria.gov.co
  153. Website defacement of ixpress.se by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the ixpress.se website on April 9, 2026, targeting what appears to be a customer address media directory. The attack was an isolated defacement incident rather than part of a mass campaign.
    Date: 2026-04-09T12:46:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832025
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: ixpress.se
  154. Website defacement of Gruppo San Marco by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Gruppo San Marco website on April 9, 2026. The attack targeted a specific subdirectory rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-09T12:45:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832030
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Gruppo San Marco
    Victim Site: grupposanmarco.eu
  155. Mass defacement campaign by Zod targeting foresttravel.site
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting foresttravel.site on April 9, 2026. This was part of a broader mass defacement operation rather than a targeted attack on the individual organization.
    Date: 2026-04-09T12:44:51Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248357
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Travel and Tourism
    Victim Organization: Forest Travel
    Victim Site: foresttravel.site
  156. Mass defacement campaign by Zod targeting 9999webportal.cloud
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting 9999webportal.cloud on April 9, 2026. The incident was part of a broader mass defacement operation rather than targeting a single specific organization.
    Date: 2026-04-09T12:44:30Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248358
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: 9999webportal.cloud
  157. Mass website defacement campaign by Zod targeting motivationalbooks.site
    Category: Defacement
    Content: The attacker Zod conducted a mass defacement campaign targeting motivationalbooks.site on April 9, 2026. This incident was part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-09T12:44:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248359
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Publishing/Media
    Victim Organization: Unknown
    Victim Site: motivationalbooks.site
  158. Mass website defacement campaign by Zod targeting purewords4u.com
    Category: Defacement
    Content: The attacker or group known as Zod conducted a mass defacement campaign targeting multiple websites including purewords4u.com on April 9, 2026. This was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-09T12:43:48Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248360
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: purewords4u.com
  159. Mass defacement targeting spacehub.cloud by Zod
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting spacehub.cloud on April 9, 2026. The attack affected multiple pages as part of a broader mass defacement operation rather than targeting the homepage specifically.
    Date: 2026-04-09T12:43:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248362
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: SpaceHub
    Victim Site: spacehub.cloud
  160. Mass defacement targeting spicefoods.site by Zod
    Category: Defacement
    Content: Attacker Zod conducted a mass defacement campaign targeting spicefoods.site on April 9, 2026. The attack affected multiple pages rather than just the homepage, indicating a broader compromise of the website.
    Date: 2026-04-09T12:42:49Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248363
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Food/Restaurant
    Victim Organization: Spice Foods
    Victim Site: spicefoods.site
  161. Mass website defacement campaign by Zod targeting spicesign.com
    Category: Defacement
    Content: Threat actor Zod conducted a mass defacement campaign targeting spicesign.com on April 9, 2026. The attack was part of a broader mass defacement operation rather than a targeted attack on the specific organization.
    Date: 2026-04-09T12:42:29Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248364
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Spice Sign
    Victim Site: spicesign.com
  162. Mass website defacement campaign by Zod targeting tagsfor.site
    Category: Defacement
    Content: The threat actor known as Zod conducted a mass defacement campaign targeting multiple websites including tagsfor.site on April 9, 2026. This was part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-09T12:42:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248365
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tagsfor.site
  163. Mass website defacement campaign by Zod threat actor
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting multiple websites including theaitech.site. This was identified as part of a broader mass defacement operation rather than targeting a specific organization.
    Date: 2026-04-09T12:41:48Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248366
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: theaitech.site
  164. Mass website defacement campaign by Zod targeting thecryptopulse.cloud
    Category: Defacement
    Content: Zod conducted a mass defacement campaign targeting thecryptopulse.cloud on April 9, 2026. The attack appears to be part of a broader mass defacement operation rather than a targeted attack on the cryptocurrency news platform.
    Date: 2026-04-09T12:41:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248367
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Cryptocurrency/Financial Technology
    Victim Organization: The Crypto Pulse
    Victim Site: thecryptopulse.cloud
  165. Mass defacement campaign targeting theinsure.site by Zod
    Category: Defacement
    Content: Threat actor Zod conducted a mass defacement campaign targeting theinsure.site on April 9, 2026. The attack was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-09T12:41:07Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248368
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Insurance
    Victim Organization: Unknown
    Victim Site: theinsure.site
  166. Mass website defacement by Zod targeting thespices.site
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement attack targeting thespices.site on April 9, 2026. This incident was part of a broader mass defacement campaign rather than a targeted attack on a specific organization.
    Date: 2026-04-09T12:40:47Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248369
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thespices.site
  167. Mass defacement campaign by Zod targeting thesurehub.site
    Category: Defacement
    Content: Mass defacement attack conducted by threat actor Zod targeting thesurehub.site on April 9, 2026. The attack was part of a larger mass defacement campaign rather than targeting a specific organization.
    Date: 2026-04-09T12:40:28Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248370
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thesurehub.site
  168. Mass defacement campaign by Zod targeting multiple websites
    Category: Defacement
    Content: Zod conducted a mass defacement campaign targeting multiple websites including thetechai.site on April 9, 2026. The attack appears to be part of a broader campaign rather than targeting a specific organization.
    Date: 2026-04-09T12:40:08Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248371
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: The Tech AI
    Victim Site: thetechai.site
  169. Mass website defacement campaign by Zod targeting usinsurance.site
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting usinsurance.site on April 9, 2026. This incident was part of a broader mass defacement operation rather than a targeted single-site attack.
    Date: 2026-04-09T12:39:48Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248372
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: United States
    Victim Industry: Insurance
    Victim Organization: Unknown
    Victim Site: usinsurance.site
  170. Mass defacement campaign by Zod targeting usnewshub.cloud
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting the news website usnewshub.cloud on April 9, 2026. This incident appears to be part of a broader mass defacement operation rather than a targeted attack on a specific organization.
    Date: 2026-04-09T12:39:27Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248373
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Media/News
    Victim Organization: US News Hub
    Victim Site: usnewshub.cloud
  171. Website defacement of Absaugwelt24 by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the German industrial equipment website absaugwelt24.de on April 9, 2026. The defacement targeted a specific page within the customer media section of the site.
    Date: 2026-04-09T12:33:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831983
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Industrial Equipment
    Victim Organization: Absaugwelt24
    Victim Site: absaugwelt24.de
  172. Website defacement of Allynor by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against allynor.com on April 9, 2026. The attack targeted a specific customer addition page on the media subdirectory of the victims website.
    Date: 2026-04-09T12:33:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831984
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Allynor
    Victim Site: allynor.com
  173. Website defacement of annaver.shop by DimasHxR
    Category: Defacement
    Content: The e-commerce website annaver.shop was defaced by threat actor DimasHxR on April 9, 2026. The attack targeted a specific page within the sites media directory rather than the homepage.
    Date: 2026-04-09T12:32:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831985
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Annaver
    Victim Site: annaver.shop
  174. Website defacement of autocosmetic.pl by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the autocosmetic.pl website, targeting what appears to be an automotive cosmetics retailer based in Poland. The defacement occurred on April 9, 2026 and was documented with a mirror URL for threat intelligence purposes.
    Date: 2026-04-09T12:32:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831986
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Automotive/Retail
    Victim Organization: Auto Cosmetic
    Victim Site: autocosmetic.pl
  175. Website defacement of bakwerk.net by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the bakwerk.net website on April 9, 2026. The defacement targeted a specific customer add page rather than the main site homepage.
    Date: 2026-04-09T12:31:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831988
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Bakwerk
    Victim Site: bakwerk.net
  176. Website defacement of Calamar Menswear by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the Calamar Menswear website on April 9, 2026. The defacement targeted a specific media subdirectory rather than the homepage of the mens clothing retailer.
    Date: 2026-04-09T12:31:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831990
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Fashion
    Victim Organization: Calamar Menswear
    Victim Site: calamar-menswear.com
  177. Website defacement of Carnilove by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a media subdirectory of the Polish pet food company Carniloves website on April 9, 2026. The attack targeted a specific page rather than the main homepage.
    Date: 2026-04-09T12:30:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831991
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Poland
    Victim Industry: Pet Food/Animal Nutrition
    Victim Organization: Carnilove
    Victim Site: carnilove.com.pl
  178. Alleged Cyber Attack Against Indonesia by TheGarudaEye
    Category: Cyber Attack
    Content: Threat actor TheGarudaEye announced that tomorrow will be their last attack against Indonesia, and they will continue targeting the next BoP (likely Bank of Philippines or similar financial/government target). The post implies an ongoing attack campaign with a planned pivot to a new target.
    Date: 2026-04-09T12:30:07Z
    Network: telegram
    Published URL: https://t.me/c/2738395378/1479
    Screenshots:
    None
    Threat Actors: TheGarudaEye
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  179. Website defacement of creasemplice.it by DimasHxR
    Category: Defacement
    Content: The website creasemplice.it was defaced by threat actor DimasHxR on April 9, 2026. This was an individual defacement targeting a specific subdirectory of the site.
    Date: 2026-04-09T12:29:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831992
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: creasemplice.it
  180. Website defacement of donsap.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the donsap.com website on April 9, 2026, specifically targeting the customer address media section of the site.
    Date: 2026-04-09T12:29:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831994
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Donsap
    Victim Site: donsap.com
  181. Website defacement of ECS Georgia by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of ecs.ge on April 9, 2026. This was an isolated defacement incident targeting the Georgian organizations customer address media section.
    Date: 2026-04-09T12:28:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831995
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Georgia
    Victim Industry: Unknown
    Victim Organization: ECS
    Victim Site: ecs.ge
  182. Website defacement of iamsleepy.co.uk by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the iamsleepy.co.uk website on April 9, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-09T12:28:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831996
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: iamsleepy.co.uk
  183. Website defacement of Maison du Kilim by DimasHxR
    Category: Defacement
    Content: DimasHxR conducted a website defacement attack against Maison du Kilims e-commerce platform on April 9, 2026. The attack targeted a specific subdirectory of the retail website rather than the homepage.
    Date: 2026-04-09T12:27:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831997
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Maison du Kilim
    Victim Site: maisondukilim.com
  184. Website defacement of niewiem.cloud by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against niewiem.cloud on April 9, 2026. The attack targeted a specific customer media section of the cloud service providers infrastructure.
    Date: 2026-04-09T12:27:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832000
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: niewiem.cloud
  185. Website defacement of octelift.shop by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the e-commerce website octelift.shop on April 9, 2026. The attack targeted a specific customer media directory rather than the main homepage.
    Date: 2026-04-09T12:26:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832002
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: Octelift
    Victim Site: octelift.shop
  186. Website defacement of optibarca.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced a subdirectory of optibarca.com on April 9, 2026. This was an isolated defacement incident targeting a specific media customer area of the website.
    Date: 2026-04-09T12:26:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832003
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Optibarca
    Victim Site: optibarca.com
  187. Alleged leak of USA email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,800 valid USA email credentials with full access on a cybercrime forum. The credentials are claimed to be valid and provide full mail access.
    Date: 2026-04-09T12:25:52Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-1-8K-USA-Full-Valid-Mail-Access-09-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. Website defacement of parafarmacia.click by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the parafarmacia.click website on April 9, 2026. The target appears to be a parapharmacy or pharmaceutical-related website based on the domain name.
    Date: 2026-04-09T12:25:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832004
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: Unknown
    Victim Site: parafarmacia.click
  189. Website defacement of paulroth.fr by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a customer management page on paulroth.fr on April 9, 2026. The attack targeted a specific media/customer section of the website rather than the main homepage.
    Date: 2026-04-09T12:25:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832005
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: paulroth.fr
  190. Website defacement of PFIPL by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a page on pfipl.com on April 9, 2026, targeting what appears to be a customer address section of the website.
    Date: 2026-04-09T12:24:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832006
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: PFIPL
    Victim Site: pfipl.com
  191. Alleged leak of USA email credentials
    Category: Combo List
    Content: A threat actor shared a credential list containing 1,800 allegedly valid USA email accounts with full access credentials dated April 9th.
    Date: 2026-04-09T12:24:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71570/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Website defacement of pick-up-moebel.de by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR defaced the German furniture retailer Pick-up Möbels website on April 9, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-09T12:23:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832007
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Retail/Furniture
    Victim Organization: Pick-up Möbel
    Victim Site: pick-up-moebel.de
  193. Website defacement of Plasticenter-Toolcenter by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Plasticenter-Toolcenter website on April 9, 2026. The incident targeted a manufacturing/industrial companys web presence without apparent team affiliation.
    Date: 2026-04-09T12:23:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832008
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Manufacturing/Industrial
    Victim Organization: Plasticenter-Toolcenter
    Victim Site: plasticenter-toolcenter.com
  194. Website defacement of Schottenrock by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a media directory on the German website schottenrock.com.de on April 9, 2026. This appears to be an isolated defacement incident targeting a single subdirectory rather than the main homepage.
    Date: 2026-04-09T12:22:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/832010
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Schottenrock
    Victim Site: schottenrock.com.de
  195. Alleged leak of email credentials from EU, Asia, and Russia
    Category: Logs
    Content: Threat actor MegaCloud claims to have 10,000 fresh valid email access credentials from EU, Asia, and Russia regions. No content is available to verify the claims or determine if this is a free leak or paid offering.
    Date: 2026-04-09T12:14:51Z
    Network: openweb
    Published URL: https://xforums.st/threads/10k-fresh-eu-asia-ru-full-valid-mail-access-09-04.606474/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Alleged leak of email credentials from EU, Asia, and Russia
    Category: Combo List
    Content: Threat actor shared a collection of 10,000 allegedly fresh and valid email credentials from European, Asian, and Russian sources dated April 9th. The credentials are being distributed as hidden content requiring forum registration to access.
    Date: 2026-04-09T12:12:04Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71569/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Alleged data breach of Taiwan PIDC government website
    Category: Data Breach
    Content: Threat actor claims to have obtained a database containing 462,000 records from Taiwans PIDC government website. The data includes contact information, email addresses, phone numbers, job titles, and technical support tickets of active web users and tech analysts.
    Date: 2026-04-09T12:09:41Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-462k-Taiwan-www-pidc-gov-tw-Active-web-users-contact-and-tech-analyst-data-recor
    Screenshots:
    None
    Threat Actors: Bfdf2
    Victim Country: Taiwan
    Victim Industry: Government
    Victim Organization: Public Investment and Development Corporation
    Victim Site: pidc.gov.tw
  198. Alleged leak of mixed email credential list
    Category: Combo List
    Content: A threat actor shared a credential list containing 3,950 email access credentials from mixed sources as a free download on an underground forum.
    Date: 2026-04-09T12:00:52Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71564/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Alleged leak of 5 billion credential combinations
    Category: Combo List
    Content: Forum post claims to offer access to 5 billion username/password combinations (ULP combolist) shared by user @hello_zod_bot on a credential sharing forum.
    Date: 2026-04-09T12:00:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71566/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Alleged leak of email credential combolists via PandaCloud service
    Category: Combo List
    Content: Threat actor Kokos2846q advertises a service called PandaCloud that provides free access to email credential combolists, claiming fresh databases are added daily with only valid and recent credentials.
    Date: 2026-04-09T11:59:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71567/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  201. Alleged distribution of eBay credential combolist
    Category: Combo List
    Content: Threat actor distributing an 11 million record credential combolist allegedly containing eBay email and password combinations through Telegram channels. The actor is offering free access to the combolist and associated cracking tools through their Telegram groups.
    Date: 2026-04-09T11:59:05Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71568/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: eBay
    Victim Site: ebay.com
  202. Alleged commercial graphic design services offering
    Category: Alert
    Content: Forum post advertising legitimate graphic design services including logos, signatures, banners and branding assets, claiming over 2000 completed projects for various clients.
    Date: 2026-04-09T11:58:29Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71565/
    Screenshots:
    None
    Threat Actors: OlympusReigns
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Alleged defacement of prayersinisrael.com by OpsShadowStrike
    Category: Defacement
    Content: Hacktivist group OpsShadowStrike, in collaboration with multiple groups including TengkorakCyberCrew, MalaysiaHacktivist, EagleCyberCrew, and others, claims to have defaced the Israeli website prayersinisrael.com. The operation appears politically motivated, targeting Israeli sites under the #SavePalestine and #AllMuslimHackers banners.
    Date: 2026-04-09T11:46:30Z
    Network: telegram
    Published URL: https://t.me/c/3844432135/272
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: Israel
    Victim Industry: Religious/Non-profit
    Victim Organization: Prayers in Israel
    Victim Site: prayersinisrael.com
  204. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 1,522 Hotmail credentials on a cybercriminal forum. The post appears to offer free access to the credential list.
    Date: 2026-04-09T11:34:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71563/
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  205. Alleged leak of German email credentials
    Category: Combo List
    Content: Threat actor leaked a collection of 31,000 German email credentials through a Telegram channel, promoting a service that provides free email credential lists with daily updates.
    Date: 2026-04-09T11:11:15Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71561/
    Screenshots:
    None
    Threat Actors: Kokos2846q
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  206. Alleged leak of mixed email credentials including corporate accounts
    Category: Combo List
    Content: A threat actor shared a combolist containing 40,000 valid email credentials including corporate accounts through a file sharing service. The credentials appear to be from mixed sources and were made available for free download.
    Date: 2026-04-09T10:59:47Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71560/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  207. Alleged leak of email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 40,000 valid email access credentials, including corporate accounts, on a cybercrime forum.
    Date: 2026-04-09T10:59:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-40K-Full-Valid-Mail-Access-MIX-with-Corp-09-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged distribution of credential lists targeting corporate SMTP servers
    Category: Combo List
    Content: Threat actor CODER is distributing credential lists (combolists) targeting corporate SMTP servers through Telegram channels. The actor offers free access to credential combinations and associated programs through dedicated Telegram groups.
    Date: 2026-04-09T10:48:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71557/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a collection of 71,000 German email credentials with full mail access on an underground forum. The credentials appear to be recently obtained as of April 9th.
    Date: 2026-04-09T10:47:39Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71558/
    Screenshots:
    None
    Threat Actors: MailAccesss
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  210. Alleged leak of German email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 71,000 German email credentials with full mail access on a cybercriminal forum.
    Date: 2026-04-09T10:47:11Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-71K-GERMANY-Just-Full-Mail-Access-09-04
    Screenshots:
    None
    Threat Actors: MegaCloudshop
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  211. Alleged leak of mixed email credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 7,302 mixed email credentials on a cybercriminal forum. The credentials appear to be made available for free download to registered forum users.
    Date: 2026-04-09T10:35:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71556/
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  212. Alleged sale of stolen CVV card data via multiple carding shops
    Category: Logs
    Content: Multiple carding shop advertisements shared in the channel promoting stolen CVV/payment card data. Shops include PepeCard (pepecard.mobi), AllCards (allcards.vlweh.com), CocoCheck (cococheck.co), and 9Check.me. These services offer 100,000+ cards daily across US, Canada, UK, and global regions. Pricing ranges from $1–$3 per valid card. Services include card validity checking, bulk purchasing, and Tor-accessible storefronts. All shops claim to charge only for valid/active cards.
    Date: 2026-04-09T10:25:08Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/60003
    Screenshots:
    None
    Threat Actors: PepeCard
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  213. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor UniqueCombo shared a combolist containing 45,000 allegedly unique Hotmail email and password combinations on cybercriminal forum. The actor also promotes a shop selling credential combinations from various countries.
    Date: 2026-04-09T10:23:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-3-45000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  214. Website defacement of TechWorld Supply by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the TechWorld Supply website on April 9, 2026, targeting a media/customer section of the technology supply companys domain. This was an isolated defacement incident rather than part of a mass campaign.
    Date: 2026-04-09T10:19:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831902
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology/Retail
    Victim Organization: TechWorld Supply
    Victim Site: techworldsupply.com
  215. Website defacement of The Little Goldsmith by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a subdirectory of The Little Goldsmith jewelry website on April 9, 2026. The attack targeted a specific media directory rather than the main homepage.
    Date: 2026-04-09T10:19:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831906
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Switzerland
    Victim Industry: Jewelry/Retail
    Victim Organization: The Little Goldsmith
    Victim Site: thelittlegoldsmith.ch
  216. Website defacement of The Patio Store by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced thepatiostore.com, a retail website selling patio furniture and outdoor equipment. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-09T10:18:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831907
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: The Patio Store
    Victim Site: thepatiostore.com
  217. Website defacement of The Prime Blinds by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the website of The Prime Blinds, a home furnishings retailer, on April 9, 2026. The defacement targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-09T10:18:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831908
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Home Furnishings
    Victim Organization: The Prime Blinds
    Victim Site: theprimeblinds.com
  218. Website defacement of theqgear.com by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced theqgear.com on April 9, 2026, targeting a specific directory path on the website. The attack was a single defacement incident with no identified team affiliation.
    Date: 2026-04-09T10:17:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831909
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: theqgear.com
  219. Website defacement of tommylyy.com by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR conducted a website defacement attack against tommylyy.com on April 9, 2026. The attack targeted a specific media/customer advertising section of the website rather than the main homepage.
    Date: 2026-04-09T10:17:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831910
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tommylyy.com
  220. Website defacement of Topbonsai by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR successfully defaced the Topbonsai website, a Brazilian bonsai retailer, targeting a subdirectory rather than the main homepage. The incident occurred on April 9, 2026, affecting the media/custom section of the site.
    Date: 2026-04-09T10:16:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831911
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Retail/E-commerce
    Victim Organization: Topbonsai
    Victim Site: topbonsai.com.br
  221. Website defacement of trefasajandekok.hu by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Hungarian website trefasajandekok.hu on April 9, 2026. The attack was a single-site defacement with no specified motivation or proof of concept provided.
    Date: 2026-04-09T10:16:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831912
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Hungary
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: trefasajandekok.hu
  222. Website defacement of true-whey.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the True Whey nutrition company website on April 9, 2026. The defacement targeted a specific media directory rather than the main homepage.
    Date: 2026-04-09T10:15:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831913
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Health/Nutrition
    Victim Organization: True Whey
    Victim Site: true-whey.com
  223. Website defacement of unidentshop.ru by DimasHxR
    Category: Defacement
    Content: A single website defacement targeting the Russian e-commerce site unidentshop.ru was conducted by the attacker DimasHxR on April 9, 2026. The defacement specifically targeted a subdirectory of the sites media content area.
    Date: 2026-04-09T10:14:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831919
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Russia
    Victim Industry: E-commerce
    Victim Organization: Unident Shop
    Victim Site: unidentshop.ru
  224. Website defacement of UziMall by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the UziMall e-commerce website on April 9, 2026, targeting a specific customer management page. This was an isolated defacement incident with no apparent team affiliation.
    Date: 2026-04-09T10:14:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831923
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: UziMall
    Victim Site: uzimall.com
  225. Website defacement of venige.com by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced venige.com on April 9, 2026, targeting the customer address section of the website. The attacker operated independently without team affiliation.
    Date: 2026-04-09T10:13:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831924
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Venige
    Victim Site: venige.com
  226. Website defacement of Venture Wholesale by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the UK-based wholesale company Venture Wholesales website on April 9, 2026. The defacement targeted a specific page within the media directory rather than the homepage.
    Date: 2026-04-09T10:13:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831925
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Wholesale Trade
    Victim Organization: Venture Wholesale
    Victim Site: venturewholesale.co.uk
  227. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: User klyne05 shared a fresh, checked combolist containing Hotmail credentials on CrackingX forum. The post indicates the credentials are private and recently verified.
    Date: 2026-04-09T10:12:48Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71554/
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  228. Website defacement of mexbs.com by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdirectory of mexbs.com on April 9, 2026. The attack targeted a specific media/customer section of the website rather than the main homepage.
    Date: 2026-04-09T10:12:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831935
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mexbs.com
  229. Website defacement of viewdep.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced a page on viewdep.com on April 9, 2026. This appears to be an isolated defacement incident targeting a specific customer management page on the domain.
    Date: 2026-04-09T10:12:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831936
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: viewdep.com
  230. Website defacement of Leroy Merlin South Africa by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced a media subdirectory of the Leroy Merlin South Africa retail website on April 9, 2026. The attack targeted the home improvement retailers online presence without apparent mass defacement or redefacement characteristics.
    Date: 2026-04-09T10:11:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831937
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: South Africa
    Victim Industry: Retail
    Victim Organization: Leroy Merlin
    Victim Site: leroymerlin.co.za
  231. Website defacement of Trussardi Parfums by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a media subdirectory of the Trussardi Parfums website on April 9, 2026. This was an isolated defacement targeting the luxury fragrance brands web presence.
    Date: 2026-04-09T10:10:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831940
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Fashion/Luxury Goods
    Victim Organization: Trussardi Parfums
    Victim Site: trussardiparfums.com
  232. Website defacement of genericday.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced the genericday.com website on April 9, 2026. This was an individual defacement attack with no identified team affiliation or stated motivation.
    Date: 2026-04-09T10:04:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831690
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: genericday.com
  233. Website defacement of Getmore by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a subdirectory of the Getmore website on April 9, 2026. The attack targeted a specific media/customer section rather than the main homepage.
    Date: 2026-04-09T10:04:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831691
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Zimbabwe
    Victim Industry: Unknown
    Victim Organization: Getmore
    Victim Site: getmore.co.zw
  234. Website defacement of GlobalSingleSource by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the GlobalSingleSource website on April 9, 2026. This was an isolated defacement targeting a single page rather than a mass or home page defacement.
    Date: 2026-04-09T10:03:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831692
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: GlobalSingleSource
    Victim Site: globalsinglesource.co.uk
  235. Website defacement of Graphic Visuals by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the graphicvisuals.com website on April 9, 2026. The attack targeted a specific subdirectory rather than the main homepage and was not part of a mass defacement campaign.
    Date: 2026-04-09T10:02:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831695
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Media/Design
    Victim Organization: Graphic Visuals
    Victim Site: graphicvisuals.com
  236. Website defacement of Graphic Visuals by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the graphicvisuals.com website on April 9, 2026. This was a single-target defacement incident affecting a design/creative services company.
    Date: 2026-04-09T10:02:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831696
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Design/Creative Services
    Victim Organization: Graphic Visuals
    Victim Site: graphicvisuals.com
  237. Website defacement of Green Olive by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Green Olive website (greenolive.com.au) on April 9, 2026. This was a single-site defacement targeting a specific subdirectory of the Australian organizations web presence.
    Date: 2026-04-09T10:01:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831697
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Green Olive
    Victim Site: greenolive.com.au
  238. Website defacement of Green Olive by DimasHxR
    Category: Defacement
    Content: DimasHxR successfully defaced the Green Olive website on April 9, 2026. The attack targeted a specific subdirectory rather than the main homepage.
    Date: 2026-04-09T10:01:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831698
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Australia
    Victim Industry: Food/Restaurant
    Victim Organization: Green Olive
    Victim Site: greenolive.com.au
  239. Website defacement of Groomer Shop by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the groomershop.eu website on April 9, 2026. The attack targeted a retail grooming services website and was not part of a mass defacement campaign.
    Date: 2026-04-09T10:00:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831699
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/E-commerce
    Victim Organization: Groomer Shop
    Victim Site: groomershop.eu
  240. Alleged leak of email credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,500 allegedly fresh and valid email access credentials through a file sharing platform.
    Date: 2026-04-09T10:00:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71553/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  241. Website defacement of Harvey Nichols Saudi Arabia by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a media subdirectory of Harvey Nichols Saudi Arabias website on April 9, 2026. This appears to be a single-target defacement incident affecting the luxury retailers regional website.
    Date: 2026-04-09T09:59:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831700
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Saudi Arabia
    Victim Industry: Retail
    Victim Organization: Harvey Nichols
    Victim Site: harveynichols.sa
  242. Website defacement of Herbganic by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced the Herbganic UK website on April 9, 2026, targeting what appears to be an organic/herbal products retailer. The defacement affected a specific media/customer directory rather than the main homepage.
    Date: 2026-04-09T09:59:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831701
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United Kingdom
    Victim Industry: Retail/E-commerce
    Victim Organization: Herbganic
    Victim Site: herbganic.co.uk
  243. Alleged leak of email credential combolist
    Category: Combo List
    Content: Threat actor leaked a combolist containing 3,500 fresh valid email access credentials through a paste service. The credentials are being distributed freely on cybercriminal forums.
    Date: 2026-04-09T09:59:02Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3-5K-Fresh-Valid-Mail-Access
    Screenshots:
    None
    Threat Actors: Razly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  244. Website defacement of HQRP by DimasHxR
    Category: Defacement
    Content: Attacker DimasHxR defaced the hqrp.com website on April 9, 2026. The defacement targeted a specific directory path within the customer media section of the site.
    Date: 2026-04-09T09:58:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831702
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: HQRP
    Victim Site: hqrp.com
  245. Website defacement of Hydac by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Hydac New Zealand website on April 9, 2026. The attack targeted a specific page within the companys media directory rather than the homepage.
    Date: 2026-04-09T09:58:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831703
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: New Zealand
    Victim Industry: Industrial Equipment/Hydraulics
    Victim Organization: Hydac
    Victim Site: hydac.co.nz
  246. Website defacement of idropanshop.com by DimasHxR
    Category: Defacement
    Content: Solo attacker DimasHxR defaced the iDropanShop e-commerce website on April 9, 2026. The attack targeted a specific page rather than the main site and was not part of a mass defacement campaign.
    Date: 2026-04-09T09:57:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831704
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-commerce
    Victim Organization: iDropanShop
    Victim Site: idropanshop.com
  247. Website defacement of Impulse USA by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced the impulseusa.com website on April 9, 2026, targeting a specific media directory path. This was an isolated defacement incident not part of a mass campaign.
    Date: 2026-04-09T09:56:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831705
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Impulse USA
    Victim Site: impulseusa.com
  248. Website defacement of Innov8tive Designs by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR defaced a subdirectory of innov8tivedesigns.com on April 9, 2026. This was an isolated single-site defacement targeting what appears to be a design services company.
    Date: 2026-04-09T09:56:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831707
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Design/Creative Services
    Victim Organization: Innov8tive Designs
    Victim Site: innov8tivedesigns.com
  249. Website defacement of Isadora Jewellery by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced the Isadora Jewellery website on April 9, 2026, targeting a media subdirectory. The incident was documented as a single defacement rather than a mass attack.
    Date: 2026-04-09T09:55:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831708
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Retail/Jewelry
    Victim Organization: Isadora Jewellery
    Victim Site: isadorajewellery.com
  250. Website defacement of Isoteam Homecare by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced the Isoteam Homecare website on April 9, 2026. The incident targeted a healthcare organization providing home care services.
    Date: 2026-04-09T09:54:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831709
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: Isoteam Homecare
    Victim Site: isoteamhomecare.com
  251. Website defacement of kaafmeem.com by DimasHxR
    Category: Defacement
    Content: Individual attacker DimasHxR defaced a subdirectory on kaafmeem.com on April 9, 2026. The attack targeted a specific media/customer advertisement section rather than the main homepage.
    Date: 2026-04-09T09:54:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831711
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kaafmeem.com
  252. Website defacement of kanna.pe by DimasHxR
    Category: Defacement
    Content: DimasHxR defaced a customer address page on kanna.pe domain on April 9, 2026. The attack targeted a specific page rather than the homepage and was not part of a mass defacement campaign.
    Date: 2026-04-09T09:53:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831712
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Peru
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kanna.pe
  253. Website defacement of kardoules.com by DimasHxR
    Category: Defacement
    Content: The attacker DimasHxR successfully defaced kardoules.com on April 9, 2026. This appears to be an isolated defacement incident targeting a single website.
    Date: 2026-04-09T09:53:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831713
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: kardoules.com
  254. Website defacement of keiconn.com by DimasHxR
    Category: Defacement
    Content: Threat actor DimasHxR successfully defaced the keiconn.com website on April 9, 2026, targeting a specific customer addition page within the media directory.
    Date: 2026-04-09T09:52:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831717
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Keiconn
    Victim Site: keiconn.com
  255. Website defacement of kidley.com by DimasHxR targeting customer address data
    Category: Defacement
    Content: DimasHxR defaced kidley.com targeting the customer address section on April 9, 2026. The attacker operated independently without team affiliation and specifically targeted customer data areas of the website.
    Date: 2026-04-09T09:51:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831718
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Kidley
    Victim Site: kidley.com
  256. Alleged data breach of Strelnik amber jewelry store
    Category: Data Breach
    Content: Customer database from Russian amber jewelry e-commerce site strelnik.ru containing personal information including names, emails, phone numbers, addresses and hashed passwords. The store operates from Kaliningrad and specializes in Baltic amber jewelry with international shipping.
    Date: 2026-04-09T09:34:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-strelnik-ru-is-an-online-amber-jewelry-store-based-in-Russia
    Screenshots:
    None
    Threat Actors: blackhunter1
    Victim Country: Russia
    Victim Industry: Retail/E-commerce
    Victim Organization: Strelnik
    Victim Site: strelnik.ru
  257. Alleged GPS/GNSS Spoofing and Jamming Operations in Middle East Region
    Category: Cyber Attack
    Content: Reports indicate increased GPS/GNSS disruption and manipulation in sensitive Middle Eastern regions, particularly the Persian Gulf, Sea of Oman, Strait of Hormuz, and surrounding occupied territories. The disruptions include signal spoofing (transmitting fake GPS signals) and jamming, causing ships and aircraft to display incorrect position data. This poses significant risks to maritime and aviation navigation safety in the region.
    Date: 2026-04-09T09:21:48Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21094
    Screenshots:
    None
    Threat Actors: خبرگزاری سایبربان| Cyberban News
    Victim Country: Unknown
    Victim Industry: Transportation & Logistics
    Victim Organization: Unknown
    Victim Site: Unknown
  258. Alleged Data Breach of Chinese Government Supercomputer Center with Sensitive Military Data Exfiltration
    Category: Data Breach
    Content: An unidentified hacking group claims to have infiltrated a Chinese government-affiliated supercomputer center and exfiltrated more than 10 petabytes of data. The alleged stolen data includes classified documents, missile and weapons design plans, aerospace research, and information related to key industrial entities. The threat actor claims to have maintained access for months. A portion of the data has been publicly released while the remainder is being offered for sale. Published samples are reported to be consistent with the nature of such a facility, though the claim remains independently unverified.
    Date: 2026-04-09T09:14:22Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21093
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: China
    Victim Industry: Government / Defense
    Victim Organization: Chinese Government Supercomputer Center
    Victim Site: Unknown
  259. Alleged sale of combolists, logs, and account credentials across multiple platforms
    Category: Logs
    Content: A threat actor is selling a wide range of stolen credentials and logs including Hotmail, Comcast, Windstream, Spectrum, AT&T, AOL, Gmail, Yahoo combolists, cookies and logs, as well as account access for Facebook, Instagram, Netflix, PayPal, Amazon, Steam, TikTok, iCloud, LinkedIn, and many other platforms. The actor claims to own a private cloud and offers inbox searching by keyword for Hotmail databases across multiple countries (UK, DE, JP, NL, BR, PL, ES, US, IT).
    Date: 2026-04-09T09:06:15Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/59999
    Screenshots:
    None
    Threat Actors: tuzelity
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  260. Alleged sale of identity documents from multiple countries
    Category: Data Breach
    Content: Threat actor BigDataSeller is selling 15GB of passport, drivers license, and ID card data from various countries including Germany, USA, UK, China, and others. The documents allegedly have expiration dates of 2026 or later and payment is requested in Monero cryptocurrency.
    Date: 2026-04-09T09:03:31Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-15GB-of-passport-DL-and-ID-card-data-from-various-countries
    Screenshots:
    None
    Threat Actors: BigDataSeller
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Alleged sale of reflected XSS vulnerabilities in multiple European companies
    Category: Initial Access
    Content: Threat actor SysInvaders is selling reflected XSS vulnerabilities affecting four companies across Sweden, Norway, and Poland with revenues ranging from $1 million to $500 million. Payment is accepted in XMR and BTC.
    Date: 2026-04-09T09:03:04Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Reflected-XSS-Vulnerabilities
    Screenshots:
    None
    Threat Actors: SysInvaders
    Victim Country: Multiple
    Victim Industry: Multiple
    Victim Organization: Unknown
    Victim Site: Unknown
  262. Alleged data breach of French DCL language certification system
    Category: Data Breach
    Content: Threat actor HexDex claims to be selling personal data of 93,061 individuals who completed French Language Proficiency Diploma certification. The data includes full names, birth dates, addresses, phone numbers, emails, educational background, and professional information including military personnel details.
    Date: 2026-04-09T09:02:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FR-DCL-Dipl%C3%B4mes-de-comp%C3%A9tence-en-langue
    Screenshots:
    None
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Education
    Victim Organization: DCL (Diplôme de Compétence en Langue)
    Victim Site: Unknown
  263. Alleged data breach of InigoApp digital business card platform
    Category: Data Breach
    Content: A threat actor is selling a database dump from InigoApp.com, a digital business card platform, containing over 1 million unique email addresses and 30 million rows of data including personal profiles, contact information, and account details for $1,000.
    Date: 2026-04-09T09:02:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-InigoApp-com-1M
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: InigoApp
    Victim Site: inigoapp.com
  264. Alleged data breach of sapabansos.jatim.go.id – Indonesian Government Social Assistance Database
    Category: Data Breach
    Content: Threat actor BABAYO EROR SYSTEM claims to be selling a database from sapabansos.jatim.go.id, an Indonesian East Java provincial government social assistance (bansos) portal. The alleged breach contains 1.2 million records in XLSX format (760 MB), purportedly from 2026. Exposed fields include PKH program IDs, NIK (national identity numbers), family card numbers (No KK), names of elderly recipients, guardians, biological mothers, and companions, age, address, gender, date of birth, Bank Jatim account numbers, and administrative location data (kabupaten/kecamatan/kelurahan). The data is being sold for $590 USD and is also listed on BreachForums (breached.st).
    Date: 2026-04-09T09:02:35Z
    Network: telegram
    Published URL: https://t.me/BabayoErorSyteam/461
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Sapabansos Jawa Timur (East Java Social Assistance Portal)
    Victim Site: sapabansos.jatim.go.id
  265. Alleged data breach of Globaltalex recruitment platform
    Category: Data Breach
    Content: Threat actor undertaker is selling a database dump from Globaltalex.com containing over 80,000 records of candidate information including emails, contact numbers, names, skills, experience, and location data for $300.
    Date: 2026-04-09T09:02:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Globaltalex-com-80k
    Screenshots:
    None
    Threat Actors: undertaker
    Victim Country: Unknown
    Victim Industry: Staffing and Recruitment
    Victim Organization: Globaltalex
    Victim Site: globaltalex.com
  266. Alleged data breach of Mossad and Israeli companies
    Category: Data Breach
    Content: Thread claims to involve database related to Mossad and Israeli companies, though no specific details about the data or distribution method are available in the post content.
    Date: 2026-04-09T09:02:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-MOSSAD-DATABASE-AND-ISRAEL-COMPANIES
    Screenshots:
    None
    Threat Actors: INSOMNIAX
    Victim Country: Israel
    Victim Industry: Government
    Victim Organization: Mossad
    Victim Site: Unknown
  267. Alleged data leak from Chinas National Supercomputing Centre (NSCC) Tianjin
    Category: Data Leak
    Content: Threat actor claims to have exfiltrated classified military and aerospace research data from Chinas National Supercomputing Centre, including satellite schematics, defense simulations, and employee personal information. The leaked data allegedly contains years of computational research from top Chinese defense contractors and universities.
    Date: 2026-04-09T09:02:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-CHINA-NSCC-SUPERCOMPUTING-CLASSIFIED-MILITARY-LEAK-2026
    Screenshots:
    None
    Threat Actors: Mipor
    Victim Country: China
    Victim Industry: Government/Defense
    Victim Organization: National Supercomputing Centre (NSCC) Tianjin
    Victim Site: Unknown
  268. Alleged data leak of Universidad Popular de la Chontalpa database
    Category: Data Leak
    Content: Threat actor SpeakTeam leaked a database containing personal information of Universidad Popular de la Chontalpa students/applicants including full names, phone numbers, birthdates, emails, and other sensitive personal details. The data is being distributed for free via file sharing links.
    Date: 2026-04-09T09:02:08Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-M%C3%89XICO-UNIVERSIDAD-POPULAR-DE-LA-CHONTALPA
    Screenshots:
    None
    Threat Actors: SpeakTeam
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Universidad Popular de la Chontalpa
    Victim Site: Unknown
  269. Alleged data breach of sapabansos.jatim.go.id – Indonesian Government Social Assistance Database
    Category: Data Breach
    Content: Threat actor BABAYO EROR SYSTEM is selling an alleged database dump from sapabansos.jatim.go.id, an Indonesian East Java provincial government social assistance (bansos) portal. The dataset reportedly contains 1.2 million records in XLSX format (760 MB), including fields such as PKH+ ID, NIK (national identity number), KK number (family card), names of elderly recipients, guardians, biological mothers, and companions, age, address, gender, date of birth, Bank Jatim account numbers, and administrative location data (kabupaten, kecamatan, kelurahan). The data is dated 2026 and is being offered for $590 USD via Telegram and BreachForums.
    Date: 2026-04-09T09:01:51Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/461
    Screenshots:
    None
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Sapabansos Jatim (East Java Social Assistance Portal)
    Victim Site: sapabansos.jatim.go.id
  270. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Forum user COYTO shared a link to what is claimed to be high quality Hotmail email and password combinations distributed as a free download.
    Date: 2026-04-09T08:52:55Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-HQ-HOTMAIL–199899
    Screenshots:
    None
    Threat Actors: COYTO
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  271. Mass defacement campaign by XSQDD PHILIPPINE team targeting French educational institution
    Category: Defacement
    Content: XSQDD PHILIPPINE team conducted a mass defacement campaign targeting the Institut de Genech educational institution in France. The attack was carried out by threat actor PredixorX as part of a broader mass defacement operation on April 9, 2026.
    Date: 2026-04-09T08:44:26Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248356
    Screenshots:
    None
    Threat Actors: PredixorX, XSQDD PHILIPPINE
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Institut de Genech
    Victim Site: cdr.institutdegenech.fr
  272. Website defacement of Institut de Genech by PredixorX/XSQDD PHILIPPINE
    Category: Defacement
    Content: The Chamilo learning management system of Institut de Genech was defaced by attacker PredixorX affiliated with team XSQDD PHILIPPINE on April 9, 2026. The attack targeted the French educational institutions e-learning platform.
    Date: 2026-04-09T08:38:33Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248355
    Screenshots:
    None
    Threat Actors: PredixorX, XSQDD PHILIPPINE
    Victim Country: France
    Victim Industry: Education
    Victim Organization: Institut de Genech
    Victim Site: chamilo.institutdegenech.fr
  273. Alleged Cyber Attack on Los Angeles Transportation Infrastructure Targeting Industrial Control Systems
    Category: Cyber Attack
    Content: A cyber attack has reportedly targeted Los Angeles public transportation systems, causing disruption to parts of the network. According to Western sources, attackers focused on infiltrating industrial control systems and Rockwell Automation equipment. US cybersecurity authorities had previously warned about increased activity from Iran-linked hacker groups targeting critical infrastructure. Full details regarding the extent of damage or disruption have not been officially confirmed and investigations are ongoing.
    Date: 2026-04-09T08:36:50Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21092
    Screenshots:
    None
    Threat Actors: Iran-linked hacker groups
    Victim Country: United States
    Victim Industry: Transportation
    Victim Organization: Los Angeles Public Transportation
    Victim Site: Unknown
  274. Alleged leak of mixed domain credentials combolist
    Category: Combo List
    Content: Threat actor shared a combolist containing 46,400 email and password combinations from mixed domains as a free download on cybercriminal forum.
    Date: 2026-04-09T08:30:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-46-4K-MIXED-DOMAINS
    Screenshots:
    None
    Threat Actors: WINGO
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  275. Alleged leak of Ficha.jp GitHub source code repositories
    Category: Data Leak
    Content: Threat actor claims to have leaked comprehensive GitHub repositories from Japanese AI development company Ficha.jp, including core SDK platforms, ADAS algorithms, DMS neural networks, OCR projects, and customer-specific project code for companies like Desay, Koito, and JVC.
    Date: 2026-04-09T08:18:27Z
    Network: openweb
    Published URL: https://spear.cx/Thread-japan-ai-ficha-jp-company-all-GitHub-code
    Screenshots:
    None
    Threat Actors: datasolu
    Victim Country: Japan
    Victim Industry: Technology
    Victim Organization: Ficha.jp
    Victim Site: ficha.jp
  276. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor alphaxdd shared a combolist containing 831 alleged valid Hotmail email and password combinations on a cybercrime forum. The credentials are described as premium hits from private cloud sources.
    Date: 2026-04-09T08:17:32Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-831x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  277. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor alphaxdd distributed a collection of 831 allegedly valid Hotmail credential combinations through a forum post, providing free download access via Telegram contact.
    Date: 2026-04-09T08:16:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71552/
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  278. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 45,000 Hotmail email and password combinations on a cybercrime forum. The actor also promotes a shop selling credential lists from various countries.
    Date: 2026-04-09T07:55:12Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-2-45000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  279. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 45,000 alleged Hotmail email and password combinations on a cybercriminal forum.
    Date: 2026-04-09T07:54:58Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71551/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  280. Alleged data breach of Sparsa Digital by OpsShadowStrike
    Category: Data Breach
    Content: Hacktivist group OpsShadowStrike, in collaboration with multiple Malaysian and international hacktivist crews including TengkorakCyberCrew, EagleCyberCrew, and others, claims to have breached Indian digital signage and media solutions company Sparsa Digital. The threat actors allege they have obtained and are making available source code and database contents. The operation appears politically motivated, referencing pro-Palestinian and anti-Israel sentiments under the #AllMuslimHackers banner.
    Date: 2026-04-09T07:35:57Z
    Network: telegram
    Published URL: https://t.me/c/3844432135/267
    Screenshots:
    None
    Threat Actors: OpsShadowStrike
    Victim Country: India
    Victim Industry: Technology / Digital Media
    Victim Organization: Sparsa Digital
    Victim Site: Unknown
  281. Alleged Cyber Intrusion of Israeli Military Systems by Hanzala Hacker Group
    Category: Cyber Attack
    Content: The Hanzala hacker group has issued a statement claiming persistent access to systems associated with General Herzi Halevi, former Chief of Staff of the Israeli Defense Forces. The group alleges extraction and archiving of a significant volume of images and videos from military meetings and activities. They further claim that recent Israeli military efforts to blur published images did not prevent their access to the underlying information. The statement also references access to details about military commanders and facilities, with promises of future content releases.
    Date: 2026-04-09T07:33:51Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21086
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Israel
    Victim Industry: Defense & Military
    Victim Organization: Israeli Defense Forces (IDF)
    Victim Site: Unknown
  282. Alleged Cyber Intrusion of Israeli Army Systems by Hanzala Hacker Team
    Category: Cyber Attack
    Content: The Hanzala hacker team issued a statement claiming they maintained long-term access to systems associated with former Israeli Army Chief of Staff General Herzi Halevi. The group claims to have extracted and archived a significant volume of images and videos from military meetings and activities. They assert that recent Israeli Army efforts to blur published images did not prevent their access to information. The statement also references access to details about military commanders and facilities, with promises of further data releases in the future.
    Date: 2026-04-09T07:31:53Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21085
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Israel
    Victim Industry: Government & Defense
    Victim Organization: Israeli Defense Forces (IDF)
    Victim Site: Unknown
  283. Website defacement of Anglia Bijeljina by VOID2401/ANTI VOID team
    Category: Defacement
    Content: The ANTI VOID team, specifically member VOID2401, successfully defaced the website of Anglia Bijeljina, an educational institution. The attack occurred on April 9, 2026, targeting a Linux-based server hosting the organizations primary website.
    Date: 2026-04-09T07:09:17Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248353
    Screenshots:
    None
    Threat Actors: VOID2401, ANTI VOID
    Victim Country: Bosnia and Herzegovina
    Victim Industry: Education
    Victim Organization: Anglia Bijeljina
    Victim Site: anglia-bijeljina.com
  284. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: A forum user shared a combolist containing 548 Hotmail email and password combinations. The credentials are described as HQ (high quality) and are being distributed for free to registered forum members.
    Date: 2026-04-09T06:58:29Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-%E2%9A%A1%E2%9A%A1-X548-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Steveee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  285. Alleged Claim by Hanzala Group That Pixelation of Israeli Military Images Does Not Prevent Intelligence Access
    Category: Cyber Attack
    Content: The threat actor group Hanzala (حنظله) issued a statement in response to the Israeli militarys practice of pixelating and blurring images of personnel, equipment, and meetings before public release. The group claims that such pixelation measures are ineffective and do not prevent access to the underlying details, implying they possess technical capabilities (such as image reconstruction or de-pixelation techniques) to recover redacted information from Israeli military imagery.
    Date: 2026-04-09T06:49:26Z
    Network: telegram
    Published URL: https://t.me/c/1283513914/21084
    Screenshots:
    None
    Threat Actors: حنظله
    Victim Country: Israel
    Victim Industry: Defense & Military
    Victim Organization: Israeli Defense Forces (IDF)
    Victim Site: Unknown
  286. Threat: HANDALA HACK
    Category: Cyber Attack
    Content: Insufficient content to assess threat intelligence value. Message 208 is media only with no text context, and message 215 only says More Details on site with no URL, target, or actionable intel provided.
    Date: 2026-04-09T06:30:13Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/208
    Screenshots:
    None
    Threat Actors: HANDALA HACK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  287. Alleged Persistent Cyber Intrusion of Israeli Military General Staff Systems by Handala
    Category: Cyber Attack
    Content: Hacktivist group Handala claims to have maintained long-term covert access to systems associated with former Israeli Chief of Staff General Herzi Halevis command infrastructure. The group alleges extraction and archiving of over 19,000 confidential images and videos from top-secret meetings, classified files, and military crisis rooms. They further claim to have identified and archived unredacted faces of hundreds of Israeli military pilots, field commanders, and security operatives. The group states full exposure has not yet occurred but threatens future release.
    Date: 2026-04-09T06:22:55Z
    Network: telegram
    Published URL: https://t.me/c/3548035165/183
    Screenshots:
    None
    Threat Actors: Handala
    Victim Country: Israel
    Victim Industry: Defense & Military
    Victim Organization: Israel Defense Forces (IDF) General Staff
    Victim Site: Unknown
  288. Alleged stealer logs with browser-extracted credentials shared by Xyph0rix X CapybaraXploit
    Category: Logs
    Content: Threat actors Xyph0rix and CapybaraXploit shared stealer log output containing browser-extracted credentials from Google Chrome Login Data files. The dump includes plaintext passwords for multiple accounts belonging to identifiable individuals, covering services such as Netflix, Google Accounts, Instagram, Facebook, Spotify, Walmart Mexico, Microsoft, and Mexican government portals (declaranetqro.queretaro.gob.mx, empleo.gob.mx, sems.gob.mx). Credentials appear to originate from a victim machine at C:\Users\DeadCode\AppData\Local\Google\Chrome. An SSH RSA public key (root@hajek45) is also included in the dump.
    Date: 2026-04-09T06:21:46Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix_CapybaraXploit/45
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  289. Alleged Sale of Stolen Data Collections by ShinyHunters Including Salesforce Databases and Ransom Files
    Category: Data Breach
    Content: The ShinyHunters threat actor group is advertising three paid Telegram-based data access channels: (1) ShinyHunters Files Cloud containing 9.1M+ files from Salesforce databases (2024-2026) priced at $10,000 lifetime; (2) Pay or leaks ransom database with 1.02M+ files priced at $5,000 lifetime; (3) Whale private containing 3.39B+ files from CDN/RF/BF sources priced at $3,000 lifetime. Additionally references a scattered LAPSUS$ hunters part 9 chat including 3M+ Cisco source code files. An onion DLS site is also provided. The post is signed by ShinyHunters with identified Telegram handles for owner, admin, and moderator.
    Date: 2026-04-09T06:16:20Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/959
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology, Multiple Sectors
    Victim Organization: Salesforce, Cisco (among others)
    Victim Site: Unknown
  290. Alleged Sale of ShinyHunters Cloud Data Collections Including Salesforce Databases and Ransom Files
    Category: Data Breach
    Content: ShinyHunters is advertising three paid Telegram-based data collections: (1) ShinyHunters Files Cloud containing 9.1M+ files from Salesforce databases (2024-2026) priced at $10,000 lifetime; (2) Pay or Leaks ransom database with ~1M files priced at $5,000 lifetime; (3) Whale Private collection of 3.39 billion files from CDN/RF/BF sources priced at $3,000 lifetime. Additionally references a scattered LAPSUS$ hunters part 9 chat and claims to possess 3M+ Cisco source code files. An onion DLS (data leak site) is also provided.
    Date: 2026-04-09T06:15:34Z
    Network: telegram
    Published URL: https://t.me/c/3737716184/958
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: Unknown
    Victim Industry: Technology, Cloud Services
    Victim Organization: Salesforce, Cisco (among others)
    Victim Site: Unknown
  291. Mass defacement targeting commune-ghenada.com by Zod
    Category: Defacement
    Content: The threat actor Zod conducted a mass defacement campaign targeting the Commune Ghenada website on April 9, 2026. This appears to be part of a broader mass defacement operation rather than a targeted attack on a single organization.
    Date: 2026-04-09T06:08:07Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/248352
    Screenshots:
    None
    Threat Actors: Zod, Zod
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Commune Ghenada
    Victim Site: commune-ghenada.com
  292. Alleged leak of Indian election data by Pakistani hacktivist group
    Category: Data Leak
    Content: A Pakistani hacktivist group called Evil Markhors allegedly leaked over 1TB of Indian election data spanning from 1948 to 2026. The data is being distributed for free on dark web forums in document format, with samples from 2017 and 2026 currently available for download.
    Date: 2026-04-09T06:06:49Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-Election-Data-Of-India
    Screenshots:
    None
    Threat Actors: Trump_Epstein
    Victim Country: India
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  293. Alleged leak of mixed forum credentials combolist
    Category: Combo List
    Content: A threat actor shared an 82,000 record combolist containing email and password combinations allegedly from various forums. The credentials are described as validated and mixed from multiple sources.
    Date: 2026-04-09T05:44:25Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%99%8B-82k-MIX-Base-With-Valid-FORUMS-%E2%99%8B-16
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  294. Alleged leak of mixed credential combolist containing 82,000 records
    Category: Combo List
    Content: A threat actor shared a mixed credential combolist containing 82,000 records described as valid and sourced from various forums.
    Date: 2026-04-09T05:42:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71550/
    Screenshots:
    None
    Threat Actors: ValidMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  295. Alleged Data Leak of Indian Database Collection Spanning Multiple Organizations
    Category: Data Leak
    Content: A threat actor has leaked a collection of databases from 8 Indian (and one Israeli) organizations, including educational institutions (ssgmce.ac.in, manabadi.co.in, mkbhauni.edu.in, patkarvardecollege.edu.in), industrial/biomedical companies (proficientindustries.in, sdbiosensor.co.in), and the Computer Society of India (csi-india.org). The collection contains approximately 9,000 rows of personal data including email addresses, first/last names, phone numbers, and other PII. Data spans 2021–2025 and is available in SQL, CSV, and TXT formats. The archive is freely distributed via biteblob.com.
    Date: 2026-04-09T05:39:23Z
    Network: telegram
    Published URL: https://t.me/DedaleOfficials/171
    Screenshots:
    None
    Threat Actors: Dedale Office
    Victim Country: India
    Victim Industry: Education, Manufacturing, Biomedical, Information Technology
    Victim Organization: Multiple Indian Organizations (SSGMCE, Manabadi, MKB Hauni, Patkar Varde College, Proficient Industries, SD Biosensor, CSI India, Copyz)
    Victim Site: ssgmce.ac.in, manabadi.co.in, mkbhauni.edu.in, patkarvardecollege.edu.in, proficientindustries.in, sdbiosensor.co.in, csi-india.org, copyz.co.il
  296. Website defacement of Nordeq Group by God Of Server
    Category: Defacement
    Content: The attacker God Of Server successfully defaced the Nordeq Group website on April 9, 2026. This appears to be a targeted single-site defacement rather than part of a mass campaign.
    Date: 2026-04-09T05:34:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831583
    Screenshots:
    None
    Threat Actors: God Of Server, God Of Server
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Nordeq Group
    Victim Site: nordeqgroup.com
  297. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combolist containing 45,000 unique Hotmail email and password combinations on a cybercrime forum.
    Date: 2026-04-09T05:16:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71549/
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  298. Alleged leak of Alabama consumer database
    Category: Data Leak
    Content: A threat actor shared a 537.9 MB database containing 2021 consumer data for Alabama residents, including personal information, voter affiliations, demographics, financial indicators, and lifestyle preferences. The data appears to be comprehensive consumer profiling information with detailed personal attributes.
    Date: 2026-04-09T05:15:14Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-2021-Consumer-Data-for-Alabama
    Screenshots:
    None
    Threat Actors: OriginalCrazyOldFart
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  299. Alleged cyber attack by The Garuda Eye group postponed and rescheduled
    Category: Cyber Attack
    Content: The threat actor group The Garuda Eye announced via their Telegram channel that an ongoing attack has been temporarily postponed and will resume at 14:00 Jakarta, Indonesia time. No specific target or attack type was disclosed in this message.
    Date: 2026-04-09T05:09:30Z
    Network: telegram
    Published URL: https://t.me/c/2738395378/1475
    Screenshots:
    None
    Threat Actors: The Garuda Eye
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  300. Alleged cyber attack by The Garuda Eye postponed and rescheduled
    Category: Cyber Attack
    Content: Threat actor group The Garuda Eye announced via their Telegram channel that an ongoing attack has been temporarily postponed and will resume at 13:00 Jakarta, Indonesia time. No specific target was mentioned in this message.
    Date: 2026-04-09T05:08:00Z
    Network: telegram
    Published URL: https://t.me/c/2738395378/1474
    Screenshots:
    None
    Threat Actors: The Garuda Eye
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  301. Alleged sale of hacking tools targeting Facebook, Instagram and Twitter accounts
    Category: Initial Access
    Content: Threat actor offers advanced hacking tools designed for mass compromise of social media accounts across Facebook, Instagram and Twitter platforms. The tools feature automated proxy rotation, user agent spoofing, ID collection capabilities and password combination options with escrow payment accepted.
    Date: 2026-04-09T04:50:32Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SOURCE-CODE-Advanced-Tools-for-Mass-Hacking-of-Facebook-IG-and-Twitter-Accounts
    Screenshots:
    None
    Threat Actors: sxxone
    Victim Country: Unknown
    Victim Industry: Social Media
    Victim Organization: Facebook, Instagram, Twitter
    Victim Site: facebook.com, instagram.com, twitter.com
  302. Alleged sale of financial service access tools and methods
    Category: Initial Access
    Content: Threat actor offering AIO checker tools and cashout methods targeting multiple financial platforms including PaddyPower, BetFair, Bet365, and other services, requiring EU bank drops and virtual cards for execution.
    Date: 2026-04-09T04:50:06Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-aio-checker-cashout-targets-with-method
    Screenshots:
    None
    Threat Actors: AnarchyBin
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Multiple
    Victim Site: Unknown
  303. Alleged sale of Iranian VPS access for bypassing geo-restrictions
    Category: Initial Access
    Content: Threat actor offers Iranian VPS and VDS services from providers like ArvanCloud, Parspack, and IranServer for bypassing geo-restrictions and accessing Iranian websites. The seller warns of instability and potential blocking if malicious activity is detected.
    Date: 2026-04-09T04:49:50Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-SELLING-IRANIAN-VPS-AND-VDS-FROM-ANY-PROVIDER-ARVANCLOUD-PARSPACK-IRANSERVER
    Screenshots:
    None
    Threat Actors: infinityteam
    Victim Country: Iran
    Victim Industry: Technology
    Victim Organization: Multiple Iranian VPS providers
    Victim Site: Unknown
  304. Alleged leak of stealer logs containing Facebook and Google credentials by Xyph0rix X CapybaraXploit
    Category: Logs
    Content: Threat actors Xyph0rix and CapybaraXploit shared stealer log output containing multiple plaintext credentials for Facebook, Google accounts, and several other web platforms including rr.feriaconellas.com, terranovasistemabolt.com, and conellas.app. The logs include email/password pairs for multiple accounts associated with the same individual or organization.
    Date: 2026-04-09T04:25:24Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix_CapybaraXploit/44
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: facebook.com, accounts.google.com, rr.feriaconellas.com, terranovasistemabolt.com, conellas.app
  305. Website defacement of keshan.info by 0xfansX
    Category: Defacement
    Content: The website keshan.info was defaced by attacker 0xfansX from the 0xfans team on April 9, 2026. The defacement targeted a specific file (a.txt) on the domain.
    Date: 2026-04-09T04:22:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831578
    Screenshots:
    None
    Threat Actors: 0xfansX, 0xfans
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: keshan.info
  306. Website defacement of tripsntips.org by 0xfansX
    Category: Defacement
    Content: The travel website tripsntips.org was defaced by attacker 0xfansX, affiliated with the 0xfans team, on April 9, 2026. The defacement targeted a specific file (a.txt) rather than the main homepage.
    Date: 2026-04-09T04:21:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831581
    Screenshots:
    None
    Threat Actors: 0xfansX, 0xfans
    Victim Country: Unknown
    Victim Industry: Travel/Tourism
    Victim Organization: Trips n Tips
    Victim Site: tripsntips.org
  307. Website defacement of epmuktakhabar.com by CYKOMNEPAL
    Category: Defacement
    Content: CYKOMNEPAL conducted a home page defacement attack against epmuktakhabar.com, a Nepalese news website. The attack was documented on April 9, 2026, targeting the main page of the media organizations website.
    Date: 2026-04-09T04:21:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831582
    Screenshots:
    None
    Threat Actors: CYKOMNEPAL, CYKOMNEPAL
    Victim Country: Nepal
    Victim Industry: Media/News
    Victim Organization: EPM Ukta Khabar
    Victim Site: epmuktakhabar.com
  308. Website defacement of flame.lk by 0xfansX
    Category: Defacement
    Content: The website flame.lk was defaced by attacker 0xfansX, associated with the 0xfans team, on April 9, 2026. This appears to be an isolated defacement incident targeting a single Sri Lankan domain.
    Date: 2026-04-09T04:14:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/831577
    Screenshots:
    None
    Threat Actors: 0xfansX, 0xfans
    Victim Country: Sri Lanka
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: flame.lk
  309. Alleged leak of IRGC and Basij member database
    Category: Data Leak
    Content: Actor claims to have leaked a database containing personal information of IRGC and Basij members including full names, national ID codes, addresses, ranks, and phone numbers. Sample data is provided via file sharing service and additional information is offered through Telegram contact.
    Date: 2026-04-09T04:08:04Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-IRGC-AND-BASIJ-MEMBER-INFO-DATABASE
    Screenshots:
    None
    Threat Actors: infinityteam
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: IRGC and Basij
    Victim Site: Unknown
  310. Alleged distribution of mixed corporate domain credential lists
    Category: Combo List
    Content: Threat actor CODER is distributing free credential lists containing 9 million mixed corporate domain accounts through Telegram channels. The actor promotes both free combolists and programs through dedicated Telegram groups.
    Date: 2026-04-09T03:48:12Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71543/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Alleged leak of credential combolist containing 21.2 million entries
    Category: Logs
    Content: Threat actor StarLinkClub shared a credential combolist containing URL, login, and password combinations totaling 21.2 million lines in a 1.2GB file on cybercriminal forums.
    Date: 2026-04-09T03:36:02Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-URL-LOGIN-PASS-Url-Log-Pass-21-242-709-M%C4%B1ll%C4%B1on-L%C4%B1nes-1-2gb
    Screenshots:
    None
    Threat Actors: StarLinkClub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  312. Alleged data breach of Hotel Books with sale of credit card and personal information
    Category: Data Breach
    Content: Threat actor sexybroker is allegedly selling stolen data from Hotel Books, including 9,000 credit card records with full payment card details and 60,000 personal information records containing names, emails, phone numbers, and addresses for $400.
    Date: 2026-04-09T03:07:11Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Credit-Card-Info-Personal-Info-Hotel-Books-Data-breach
    Screenshots:
    None
    Threat Actors: sexybroker
    Victim Country: Unknown
    Victim Industry: Hospitality
    Victim Organization: Hotel Books
    Victim Site: Unknown
  313. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing 34,000 mixed email and password combinations through a cybercrime forum, with additional content available via Telegram channel.
    Date: 2026-04-09T03:05:43Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71542/
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  314. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: A threat actor leaked a combolist containing 34,000 mixed email credentials on a cybercrime forum. The credentials are being distributed for free to registered forum members.
    Date: 2026-04-09T03:05:32Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-34K-Mix-Mail-Access-Combo–199887
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  315. Alleged leak of mixed email credentials combolist
    Category: Combo List
    Content: Threat actor MarkVesto shared a combolist containing 34,000 mixed email and password credentials on DemonForums. The credentials appear to be from various email providers and the actor also promoted their Telegram channel for additional content.
    Date: 2026-04-09T03:05:16Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-34K-Mix-Mail-Access-Combo–199888
    Screenshots:
    None
    Threat Actors: MarkVesto
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  316. Alleged data breach of Simpcity
    Category: Data Breach
    Content: Forum post claims to contain a database dump from Simpcity affecting 8,173,355 users. The sample data shows SQL INSERT statements containing user information including usernames, email addresses, timestamps, and other user profile data.
    Date: 2026-04-09T02:42:56Z
    Network: openweb
    Published URL: https://pwnforums.st/Thread-Simpcity-8-173-355-Users
    Screenshots:
    None
    Threat Actors: Emzywemzy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Simpcity
    Victim Site: Unknown
  317. Alleged Cyber Attack on Indonesian Government Company by TheGarudaEye
    Category: Cyber Attack
    Content: Threat actor TheGarudaEye announced an ongoing attack against an unspecified Indonesian government-affiliated company. The actor indicated a temporary hold until 12:00 Indonesia time, after which they planned to re-attack. A media file (likely proof of attack/downtime) was shared alongside the announcement.
    Date: 2026-04-09T02:37:57Z
    Network: telegram
    Published URL: https://t.me/c/2738395378/1462
    Screenshots:
    None
    Threat Actors: TheGarudaEye
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  318. Alleged leak of BabaCloud stealer logs
    Category: Logs
    Content: Threat actor C7xJB allegedly made available over 5,000 stealer logs from BabaCloud for free download on a cybercrime forum.
    Date: 2026-04-09T02:12:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-BabaCloud-New-5000-Logs
    Screenshots:
    None
    Threat Actors: C7xJB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: BabaCloud
    Victim Site: Unknown
  319. Alleged data breach of Serasa database containing Brazilian citizen records
    Category: Data Breach
    Content: Threat actor Buddha is allegedly selling a complete Serasa database dump containing over 220 million Brazilian citizen records including names, emails, phone numbers, addresses, dates of birth, CPF numbers, income data, and gender information for $350. The compressed 507GB database expands to 1.8TB and is dated August 17, 2022.
    Date: 2026-04-09T02:12:41Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Serasa-Full-Database-2022-223-Million-Brazil-Citizens-1-8-TB-Full-Dump
    Screenshots:
    None
    Threat Actors: Buddha
    Victim Country: Brazil
    Victim Industry: Financial Services
    Victim Organization: Serasa
    Victim Site: Unknown
  320. Alleged data breach of Taiwan PIDC government database
    Category: Data Breach
    Content: Threat actor claims to have breached the Taiwan PIDC government website and is offering to sell a database containing 482,000 records of contact information and support tickets. The data includes personal details, contact information, and customer service interactions from the organizations operations.
    Date: 2026-04-09T02:12:10Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-482k-Taiwan-www-pidc-gov-tw-Active-web-users-contact
    Screenshots:
    None
    Threat Actors: Databroker1
    Victim Country: Taiwan
    Victim Industry: Government
    Victim Organization: PIDC
    Victim Site: pidc.gov.tw
  321. Alleged data leak of CNOPS Morocco database
    Category: Data Leak
    Content: Threat actor JBT2026 leaked a database containing approximately 3 million records of CNOPS insured members. The leaked data includes names, membership numbers, registration numbers, ID card numbers, and addresses in CSV format.
    Date: 2026-04-09T02:11:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-MOROCCO-CNOPS-FULL-USERS-DATABASE-National-Fund-for-Social-Welfare-Organizations
    Screenshots:
    None
    Threat Actors: JBT2026
    Victim Country: Morocco
    Victim Industry: Government
    Victim Organization: National Fund for Social Welfare Organizations (CNOPS)
    Victim Site: Unknown
  322. Alleged sale of Cisco Systems source code and database
    Category: Data Breach
    Content: Threat actor claims to be selling Cisco source code and database containing 3.15 million Salesforce records, allegedly stolen by UNC6040/ShinyHunters. The data reportedly includes source code for various Cisco products including IOS, ASA, and NX-OS, along with PII, GitHub repositories, and AWS buckets.
    Date: 2026-04-09T02:11:53Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Cisco-All-Source-Code
    Screenshots:
    None
    Threat Actors: lenka
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Cisco Systems
    Victim Site: cisco.com
  323. Alleged data breach of Argentine Air Force news portal
    Category: Data Breach
    Content: Threat actor claims breach of Argentine Air Forces official news portal Noticias en Vuelo and provides organizational structure details. The actor notes there is no valuable information and describes it as just a snack.
    Date: 2026-04-09T02:11:43Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-State-affiliated-military-news-source-for-the-Argentine-Air-Force
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Argentina
    Victim Industry: Government/Military
    Victim Organization: Argentine Air Force
    Victim Site: noticiasenvuelo.faa.mil.ar
  324. Alleged sale of ETrade Securities customer database Category: Data Breach Content: A threat actor is allegedly selling a database containing 1.9 million ETrade Securities customer records including email addresses, names, registration numbers, dates of birth, and trading category information. The actor is using Telegram for contact regarding pricing and additional data.
    Date: 2026-04-09T02:11:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-E-Trade-Securities-USA-1900000
    Screenshots:
    None
    Threat Actors: DDying
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: E*Trade Securities
    Victim Site: Unknown
  325. Alleged leak of Local Link Limerick WordPress database
    Category: Data Leak
    Content: A WordPress database from Irish transportation service Local Link Limerick was allegedly leaked, containing user credentials and account information for 5 users including administrators and staff members.
    Date: 2026-04-09T02:11:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Ireland-Local-Link-Limerick-locallinklc-ie-Wordpress-Database
    Screenshots:
    None
    Threat Actors: blackwinter99
    Victim Country: Ireland
    Victim Industry: Transportation
    Victim Organization: Local Link Limerick
    Victim Site: locallinklc.ie
  326. Alleged leak of Hotmail credential lists
    Category: Combo List
    Content: Threat actor RedCloud made available a combolist containing 3.3K Hotmail email and password combinations, claiming the credentials are valid and high quality as of April 9th, 2026.
    Date: 2026-04-09T01:41:19Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-3-3K-%E2%9A%A1Hotmail%E2%9A%A1Valid-Mail-Access-09-04
    Screenshots:
    None
    Threat Actors: RedCloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  327. Alleged leak of Hotmail credentials on cybercriminal forum
    Category: Combo List
    Content: A threat actor shared a combolist containing 3,300 alleged Hotmail email credentials on a cybercriminal forum, distributed via a MediaFire download link.
    Date: 2026-04-09T01:40:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71541/
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  328. Alleged Apple Pay fraud tutorial and payment services offering
    Category: Initial Access
    Content: Threat actor offering step-by-step tutorial for Apple Pay fraud using BIN and credit card data, along with related services including Google Pay auto-add and non-VBV card lists for cryptocurrency payment.
    Date: 2026-04-09T01:29:56Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-ALL-YOU-NEED-FOR-THE-APPLE-PAY-CHOPS-IS-JUST-THE-BIN-CC–199869
    Screenshots:
    None
    Threat Actors: yaxaxav
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Apple
    Victim Site: Unknown
  329. Alleged Apple Pay fraud tutorial and credit card data sales
    Category: Combo List
    Content: Threat actor offers Apple Pay fraud tutorial requiring only BIN and credit card data, along with state-specific BIN lists, Google Pay auto-add services, and non-VBV (Verified by Visa) card lists for cryptocurrency payment.
    Date: 2026-04-09T01:29:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-ALL-YOU-NEED-FOR-THE-APPLE-PAY-CHOPS-IS-JUST-THE-BIN-CC–199871
    Screenshots:
    None
    Threat Actors: yaxaxav
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Apple Pay
    Victim Site: Unknown
  330. Alleged leak of Hotmail credentials
    Category: Combo List
    Content: Threat actor Roronoa044 shared what appears to be a collection of valid Hotmail email and password combinations on cybercriminal forum. The actor claims the credentials are valid and high quality, distributed through their Telegram channel.
    Date: 2026-04-09T01:18:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X412-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  331. Alleged leak of Hotmail credential combolist
    Category: Combo List
    Content: Threat actor noir is distributing a collection of allegedly valid Hotmail email credentials through Telegram. The post advertises X412 Valid UHQ Hotmail credentials as a private cloud mix.
    Date: 2026-04-09T01:17:24Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71540/
    Screenshots:
    None
    Threat Actors: noir
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Microsoft
    Victim Site: hotmail.com
  332. Alleged data breach of Infodesk affecting multiple pharmaceutical and healthcare organizations
    Category: Data Breach
    Content: Threat actor claims to be selling employee data from Infodesk database breach affecting 18 major organizations including Johnson & Johnson, Moderna, GSK, and others. Data includes employee names and email addresses from pharmaceutical, healthcare, and consulting companies.
    Date: 2026-04-09T01:08:38Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Infodesk-Database-employee-lists-from-JNJ-Moderna-Novonesis-and-more
    Screenshots:
    None
    Threat Actors: art
    Victim Country: Unknown
    Victim Industry: Healthcare/Pharmaceutical
    Victim Organization: Infodesk
    Victim Site: infodesk.com
  333. Alleged cyber attack on Indonesian government-linked company by Garuda Eye
    Category: Cyber Attack
    Content: Threat actor operating under the handle THE GARUDA EYE announced an imminent or ongoing cyber attack targeting an Indonesian government-affiliated company, using casual language to signal the operation is underway.
    Date: 2026-04-09T01:03:57Z
    Network: telegram
    Published URL: https://t.me/c/2738395378/1461
    Screenshots:
    None
    Threat Actors: THE GARUDA EYE
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Alleged leak of mixed domain credential list
    Category: Combo List
    Content: A threat actor shared a high-quality credential list containing 46,000 mixed domain accounts through a public paste service. The combolist appears to be distributed freely without any payment requirement.
    Date: 2026-04-09T00:22:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/71538/
    Screenshots:
    None
    Threat Actors: Cir4d
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  335. Alleged sale of Vietnam flight booking system passport data
    Category: Data Breach
    Content: Threat actor sexybroker claims to be selling passport data from a Vietnamese flight booking system breach containing over 1.1 million records at $0.1 per passport. The data allegedly includes full passport images with contact information from travelers worldwide including China, Japan, USA, UK, Canada, Russia, and other countries.
    Date: 2026-04-09T00:13:31Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Selling-Passport-Data-breach-Vietnam-Fligh-Book-World-Wide-guests
    Screenshots:
    None
    Threat Actors: sexybroker
    Victim Country: Vietnam
    Victim Industry: Transportation
    Victim Organization: Unknown
    Victim Site: Unknown