[August-1-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.

  1. Alleged data leak of Pelz Golf
    • Category: Data Breach
    • Content: The threat actor claims to have leaked a user database from the U.S.-based golf training and equipment website pelzgolf. The exposed data includes user login credentials, hashed passwords, email addresses, and display names for multiple users, such as staff or registered clients.
    • Date: 2025-08-01T14:30:53Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-DATABASE-USA-free-db-pelzgolf-com
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/3cf10629-c1c3-4741-9685-e247623a6a73.png
    • Threat Actors: Michaell
    • Victim Country: USA
    • Victim Industry: Sports
    • Victim Organization: pelz golf
    • Victim Site: pelzgolf.com
  2. Alleged data leak of eConsejos.com
    • Category: Data Breach
    • Content: The threat actor claims to have leaked organization’s database.
    • Date: 2025-08-01T14:30:05Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-DATABASE-econsejos-com-DATA-FREE
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/beb2edae-e3f7-4b66-a18b-07a45737f609.png
    • Threat Actors: Michaell
    • Victim Country: Spain
    • Victim Industry: Health & Fitness
    • Victim Organization: econsejos.com
    • Victim Site: econsejos.com
  3. Alleged data breach of Bulgarian Mini football Association
    • Category: Data Breach
    • Content: The threat actor claims to have leaked a database containing over 10,000 lines from the Bulgarian Mini Football Association.
    • Date: 2025-08-01T14:26:15Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-DATABASE-BAMF-BG-Bulgaria-sport-database
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/01692829-9ec2-4a89-b805-0a4e9a322196.png
    • Threat Actors: Z10N
    • Victim Country: Bulgaria
    • Victim Industry: Sports
    • Victim Organization: bulgarian mini football association
    • Victim Site: bamf.bg
  4. Alleged data sale of Fédération Sportive et Culturelle de France (FSCF)
    • Category: Data Breach
    • Content: The threat actor claims to be selling a full database of Fédération Sportive et Culturelle de France (FSCF). The leaked dataset reportedly includes extensive personal and organizational records.
    • Date: 2025-08-01T14:20:12Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-SELLING-FR-F%C3%A9d%C3%A9ration-Sportive-et-Culturelle-de-France-Full-SQL-Dump
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/33c61e30-0905-4924-b495-bc3747046c32.png
      • https://d34iuop8pidsy8.cloudfront.net/60049c7f-6bd0-4a8a-8a3d-ca06dc02d633.png
      • https://d34iuop8pidsy8.cloudfront.net/f1149593-4a79-44d4-ab6e-2efd69e67835.png
    • Threat Actors: Cena1010
    • Victim Country: France
    • Victim Industry: Sports
    • Victim Organization: fédération sportive et culturelle de france (fscf)
    • Victim Site: fscf.asso.fr
  5. Alleged sale of ScatSniff
    • Category: Malware
    • Content: The threat actor is selling “ScatSniff,” a stealthy web-based payment data skimmer designed to harvest card details undetected. It features AES-256-GCM encryption, DOM-less injection, WAF bypass, admin fingerprinting, and real-time analytics.
    • Date: 2025-08-01T14:19:57Z
    • Network: tor
    • Published URL: https://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142625/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/bd054b73-f846-4757-9417-e8f24de362d6.png
      • https://d34iuop8pidsy8.cloudfront.net/784bcbe3-a16b-4c8c-a93c-6d9ec85d3608.png
      • https://d34iuop8pidsy8.cloudfront.net/0309ea55-2754-42be-9f78-2e0e63df1cae.png
    • Threat Actors: babkin_vnuk
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  6. Alleged sale of admin-level WordPress access to high-traffic sites across various sectors
    • Category: Initial Access
    • Content: The threat actor claims to be selling unauthorized admin-level access to multiple high-traffic WordPress websites across various geographies, including the USA, Mexico, and Colombia. The listings include a U.S.-based fashion site offering web shell access with 1.8k–3.1k monthly traffic, a Colombian education site with 4.1k–7.8k monthly visits and plugin installation privileges, and a Colombian government website drawing 35k–63k monthly traffic with full admin access.
    • Date: 2025-08-01T14:13:00Z
    • Network: tor
    • Published URL: https://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142627/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/d56c3b76-b1a3-4163-8bc3-2c581ef4f1a7.png
    • Threat Actors: WujingKlaus
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  7. Liwaa Muhammad targets the website of the Official Council of the Al-Gaydi Tribe
    • Category: Defacement
    • Content: The group claims to have defaced the website of the Official Council of the Al-Gaydi Tribe.
    • Date: 2025-08-01T14:09:09Z
    • Network: telegram
    • Published URL: https://t.me/liwaamohammad/644
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/7948556c-7a08-43d6-8b21-aafd34dca419.png
    • Threat Actors: Liwaa Muhammad
    • Victim Country: Saudi Arabia
    • Victim Industry: Civic & Social Organization
    • Victim Organization: the official council of the al-gaydi tribe
    • Victim Site: algaydi.com
  8. Alleged data leak of an Indonesian Hacker Pyscodes
    • Category: Data Leak
    • Content: The threat actor claims to have leaked a doxing document targeting an individual known as “Pyscodes,” an Indonesian hacker allegedly associated with the FSociety_Team group. The leaked information includes personal details such as age, familial status, and criticisms of the actor’s technical skills and activities, including ineffective DDoS attacks against hosting services.
    • Date: 2025-08-01T13:56:00Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-DOCUMENTS-Pyscodes-Budi-Indo-skid-behind-dead-FScociety-LARP
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/95a7a61f-1286-429c-9513-191f39792a27.png
    • Threat Actors: soujinsan69
    • Victim Country: Indonesia
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  9. Alleged data sale of PayPal, Payoneer, Skrill, MoneyGram transfers, and prepaid cards
    • Category: Data Leak
    • Content: The threat actor claims to be selling the data of PayPal, Payoneer Bank, Skrill Transfers, Moneygram and Prepaid Cards.
    • Date: 2025-08-01T13:46:25Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-Selling-Paypal-Payoneer-Bank-Skrill-Transfers-Prepaid-Cards
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/d8c95095-8403-4dad-bd06-428d7361e9cd.png
      • https://d34iuop8pidsy8.cloudfront.net/deb15715-c5e7-4673-913d-2315086cfc56.png
      • https://d34iuop8pidsy8.cloudfront.net/962a452a-bdf9-4d96-b0a7-df67c5864d35.png
    • Threat Actors: Monkfinity
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  10. Alleged data sale of an unidentified UK based Game studio site
    • Category: Data Leak
    • Content: The threat actor claims to be selling data of an unidentified Game studio site based in the United Kingdom. The data includes over 10 million active Steam keys across multiple titles, along with customer invoices, staff information (including names and emails), and full backend access to the company’s website.
    • Date: 2025-08-01T13:30:36Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-SELLING-Game-Studio-Site-10m-Steam-Keys-Staff-Invoices-Live-Access
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/dddfd9d1-bbca-49da-aab4-6e796f621987.png
    • Threat Actors: Seacoat
    • Victim Country: UK
    • Victim Industry: Gaming
    • Victim Organization: Unknown
    • Victim Site: Unknown
  11. Alleged data leak of Ministry of Public Works, Indonesia
    • Category: Data Breach
    • Content: The threat actor claims to have leaked a database of Department of Public Works and Housing (DPU-PR) of Manado City under Ministry of Public Works, Indonesia, containing detailed employee information. The exposed fields reportedly include Employee Code, Name, Employee ID (NIP), Rank, Grade, Position, Division, Bank Account Name, Account Number, and Employment Status.
    • Date: 2025-08-01T13:23:01Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-Data-Base-Pegawai-Dpupr-Kota-Manado
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/069fa1c0-9902-4f32-82b9-ae4eea126859.png
    • Threat Actors: BabayoSysteam
    • Victim Country: Indonesia
    • Victim Industry: Government Administration
    • Victim Organization: ministry of public works, indonesia
    • Victim Site: pu.go.id
  12. HAZARDOUS CYBER TEAM targets the website of BNRPRR Trust
    • Category: Defacement
    • Content: The group claims to have defaced the website of BNR & PRR Memorial Charitable Trust Kakinada.
    • Date: 2025-08-01T13:17:25Z
    • Network: telegram
    • Published URL: https://t.me/hazardouscyberteam/6
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/de5c63fc-4173-453b-9e1c-a86c68e32116.png
    • Threat Actors: HAZARDOUS CYBER TEAM
    • Victim Country: India
    • Victim Industry: Non-profit & Social Organizations
    • Victim Organization: barri nageswara rao and palepu raghavendra rao memorial charitable trust kakinada
    • Victim Site: bnrprrtrust.in
  13. Alleged Data Sale of 100K+ Coinbase Users’ Verified Personal Information
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database allegedly containing personal records of over 100,000 verified Coinbase users. The data is advertised as fresh from 2025 and reportedly includes full names, phone numbers, residential addresses, email addresses, and house values. Samples show detailed identity profiles such as age, home valuation, and full contact information, indicating a high-value breach of a cryptocurrency user base.
    • Date: 2025-08-01T13:12:26Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/263487/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/6726d44d-3d76-441f-a562-303f9b364139.PNG
    • Threat Actors: Love
    • Victim Country: USA
    • Victim Industry: Financial Services
    • Victim Organization: coinbase
    • Victim Site: coinbase.com
  14. Alleged Data Leak of U.S. Mobile Betting App Users
    • Category: Data Leak
    • Content: The threat actor claims to be selling a database allegedly sourced from a mobile betting application related to NBA and NHL users, with records primarily from the United States and parts of Canada. The dataset reportedly includes approximately 22,000 entries and is formatted with names, email addresses, and phone numbers.
    • Date: 2025-08-01T13:06:46Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/263475/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/5c3880e9-599c-45b0-975b-13ddfac43222.PNG
    • Threat Actors: rassvettt
    • Victim Country: USA
    • Victim Industry: Gambling & Casinos
    • Victim Organization: Unknown
    • Victim Site: Unknown
  15. Alleged data sale of Tamil Nadu Open University
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database allegedly stolen from the Tamil Nadu Open University, India, containing approximately 55,000 records. The sample data includes highly sensitive personally identifiable information (PII) such as name, Aadhaar number, date of birth, gender, mobile number, email, father’s and mother’s names, occupations, contact numbers, and full address.
    • Date: 2025-08-01T13:04:43Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-SELLING-tnou-ac-in-Tamil-Nadu-Open-University-Database
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/04e16e28-4e3e-4ac7-9fd0-9612bb62d7cb.png
      • https://d34iuop8pidsy8.cloudfront.net/620c6eb4-e603-457f-b3ce-95f953fd7845.png
    • Threat Actors: OutSkirts
    • Victim Country: India
    • Victim Industry: Education
    • Victim Organization: tamil nadu open university
    • Victim Site: tnou.ac.in
  16. Alleged data leak of Indonesia Smart Program (PIP) Potential Recipients Database
    • Category: Data Leak
    • Content: The threat actor claims to have leaked a database of Indonesia Smart Program (PIP) Potential Recipients Database funds. The dataset reportedly includes fields such as School ID, School Name, Student ID, Full Name, Grade, Province, District, Proposer, and Social Welfare Registry Status.
    • Date: 2025-08-01T13:04:37Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-DATABASE-CALON-PENERIMA-DANA-PIP-PROGRAM-INDONESIA-PINTAR-USULAN-DINAS
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/a0a29bc7-4631-4bef-9bdf-c6a9cf0a4e28.png
      • https://d34iuop8pidsy8.cloudfront.net/61b82b60-69e6-4793-a89b-8a35452d5342.png
    • Threat Actors: SukaMangga01
    • Victim Country: Indonesia
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  17. Alleged Data Leak of German Users from Shopify-Linked Database
    • Category: Data Leak
    • Content: The threat actor claims to be selling personal data of around 144,000 individuals from Germany, allegedly extracted from a Shopify-connected database. The leaked information reportedly follows the format: first name, last name, email, country, city, address, and postal code. Sample data includes full names, email addresses, German cities, and specific residential addresses.
    • Date: 2025-08-01T13:02:09Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/263473/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/5b8ef84b-c71a-4128-9a05-d4cc47958d72.PNG
    • Threat Actors: rassvettt
    • Victim Country: Germany
    • Victim Industry: E-commerce & Online Stores
    • Victim Organization: Unknown
    • Victim Site: Unknown
  18. Alleged Data leak of Austrian Residents via Shopify-Connected Database
    • Category: Data Leak
    • Content: The threat actor claims to possess a dataset containing personal records of approximately 7,500 individuals from Austria, allegedly obtained from a Shopify-integrated system. The leaked data reportedly includes names, email addresses, cities, postal codes, and full residential addresses, resembling typical e-commerce user profiles.
    • Date: 2025-08-01T13:02:02Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/263473/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/fb900288-0f69-4d45-9acf-7f6205d9c066.PNG
    • Threat Actors: rassvettt
    • Victim Country: Austria
    • Victim Industry: E-commerce & Online Stores
    • Victim Organization: Unknown
    • Victim Site: Unknown
  19. Alleged Data Leak of Swiss Users from Shopify-Connected Database
    • Category: Data Leak
    • Content: The threat actor claims to be selling a dataset containing personal information of approximately 1,400 individuals from Switzerland, allegedly harvested from a Shopify-based data source. The exposed data reportedly includes full names, email addresses, and detailed location information.
    • Date: 2025-08-01T13:01:56Z
    • Network: openweb
    • Published URL: https://forum.exploit.in/topic/263473/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/e05e0929-2423-4bf2-b6aa-ae240d3c7e53.PNG
    • Threat Actors: rassvettt
    • Victim Country: Switzerland
    • Victim Industry: E-commerce & Online Stores
    • Victim Organization: Unknown
    • Victim Site: Unknown
  20. Alleged unauthorized access to the website database of Iran Liberal
    • Category: Initial Access
    • Content: The group claims to have unauthorized access to the website database of Iran Liberal.
    • Date: 2025-08-01T12:47:10Z
    • Network: telegram
    • Published URL: https://t.me/Team_rachelhunter/1408
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/6e1d4141-2164-4ef8-a16f-12e5e49e3909.png
    • Threat Actors: Rachel Hunter
    • Victim Country: Iran
    • Victim Industry: Online Publishing
    • Victim Organization: iran liberal
    • Victim Site: iranliberal.com
  21. Alleged data sale of Indonesian Student Records
    • Category: Data Leak
    • Content: The threat actor claims to be selling a database containing the personal data of 52.9 million Indonesian students, with a total file size of approximately 2.7TB.
    • Date: 2025-08-01T12:22:09Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-52-9-Million-Indonesian-Student-Database
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/e3232153-229c-4baa-9460-cac513f65983.png
      • https://d34iuop8pidsy8.cloudfront.net/7a64c526-47f9-47d2-b68e-5dc379af742d.png
    • Threat Actors: LIUSHEN
    • Victim Country: Indonesia
    • Victim Industry: Education
    • Victim Organization: Unknown
    • Victim Site: Unknown
  22. Alleged data leak of Waffle factory
    • Category: Data Breach
    • Content: The threat actor claims to have leaked 251,000 records from customer database of Waffle Factory. The exposed data fields include id, uuid, customer nickname (nice_name), card information, phone number, email address, birthday, and registration details.
    • Date: 2025-08-01T11:59:10Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-Csv-Cloud-France-wafflefactory-com-Sweet-Waffle-Restaurant-Customers-251k-2
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/a67d2099-b3ce-4c39-82d2-fb33c751cb51.png
    • Threat Actors: eiden_fortale
    • Victim Country: Belgium
    • Victim Industry: Restaurants
    • Victim Organization: waffle factory
    • Victim Site: wafflefactory.com
  23. Alleged data leak of Perumda BPR Bank
    • Category: Data Breach
    • Content: The threat actor claims to have leaked data from the subdomain pages of Perumda BPR Bank.
    • Date: 2025-08-01T11:26:15Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-SUB-DOMAIN-BANKBPRGRESIK-go-id-BY-OHKA21
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/1069507e-9351-4558-97a6-bb979eea4fa0.png
    • Threat Actors: OHKA21
    • Victim Country: Indonesia
    • Victim Industry: Banking & Mortgage
    • Victim Organization: perumda bpr bank
    • Victim Site: bankbprgresik.go.id
  24. Alleged data leak of Sunan Giri Menganti Middle School
    • Category: Data Breach
    • Content: The threat actor claims to have leaked data from the subdomain pages of Sunan Giri Menganti Middle School.
    • Date: 2025-08-01T11:25:48Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-SUB-DOMAIN-SMPSUNANGIRIMENGANTI-sch-id-BY-OHKA21
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/5d8914d0-bd9f-4df5-9376-4afdd5bf44ba.png
      • https://d34iuop8pidsy8.cloudfront.net/ad7a244b-6795-4e24-8872-43717cc518f4.png
      • https://d34iuop8pidsy8.cloudfront.net/a1964bb9-e466-447e-aa5a-4143511d64c8.png
    • Threat Actors: OHKA21
    • Victim Country: Indonesia
    • Victim Industry: Education
    • Victim Organization: sunan giri menganti middle school
    • Victim Site: smpsunangiri.sch.id
  25. Alleged leak of Ukrainian Telecom and Internet Providers
    • Category: Data Breach
    • Content: The threat actor claims to have leaked database of multiple Ukrainian telecom and internet providers, such as EN Net, SITV, Golta Telecom, Alfa-TV, Spider Net, NCN, KWDS, Telza, Viner Telecom, and Altair Line. The compromised data includes payment details (card numbers, transactions), personal data (full names, addresses, phone numbers, logins, password hashes), as well as employee access credentials (JWT tokens, admin logins) and technical information like server IPs, API keys, and telephony configurations.
    • Date: 2025-08-01T10:48:08Z
    • Network: openweb
    • Published URL: https://forum.duty-free.cc/threads/872/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/7353f8f3-39e5-4cec-bea8-367e15d19b22.png
    • Threat Actors: ITARMYOFRUSSIA
    • Victim Country: Ukraine
    • Victim Industry: Network & Telecommunications
    • Victim Organization: en net
    • Victim Site: en.net.ua
  26. Alleged access sale of an Unidentified Indian College webiste
    • Category: Initial Access
    • Content: The threat actor claims to be selling access to an unidentified Indian college website.
    • Date: 2025-08-01T09:51:00Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-ac-in-College-Website-Access-India
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/cb111133-727e-4c9f-8a6e-fd44bcb8dfc1.png
      • https://d34iuop8pidsy8.cloudfront.net/6373552d-cc3a-4c68-9ea1-8e36ee7d0cd2.png
    • Threat Actors: OutSkirts
    • Victim Country: India
    • Victim Industry: Education
    • Victim Organization: Unknown
    • Victim Site: Unknown
  27. Alleged data sale of Béjwl Company Pte Ltd
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database from Béjwl Company Pte Ltd, a Singapore-based jewelry retailer, exposing approximately 1,139,155 records spanning from 2017 to 2025.
    • Date: 2025-08-01T09:04:12Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-SELLING-bejewl-com-Singapore-Jewelry-Store-2025-Leaks
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/427e5b69-a536-4f01-9be7-46e911520fd7.png
    • Threat Actors: NanC
    • Victim Country: Singapore
    • Victim Industry: Luxury Goods & Jewelry
    • Victim Organization: béjwl company pte ltd
    • Victim Site: bejewl.com
  28. Alleged data sale of Naukri.com
    • Category: Data Breach
    • Content: The threat actor claims to be selling 7 million job seekers data from Naukri.com. The data allegedly from 2022, includes extensive candidate information such as email IDs, dates of birth, mobile numbers, functional areas, specializations, industries, resume titles, key skills, work experience, employer history, current salary, job level, and location preferences. Educational details like courses, specializations, and institutions.
    • Date: 2025-08-01T08:57:30Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-India-naukri-com-Recruitment-Job-Search-Jobseekers-7-Million-2022
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/edfd121b-cde9-4e42-895f-df01fbe1bba7.png
      • https://d34iuop8pidsy8.cloudfront.net/82e69fe1-1fd2-4cf4-8a84-2e2a5cbf3e4c.png
    • Threat Actors: ethan_fernsbyy
    • Victim Country: India
    • Victim Industry: Information Technology (IT) Services
    • Victim Organization: naukri.com
    • Victim Site: naukri.com
  29. Alleged data sale of Naukri.com
    • Category: Data Breach
    • Content: The threat actor claims to be selling 7 million job seekers data from Naukri.com. The data, allegedly from 2022, includes extensive candidate information such as email IDs, dates of birth, mobile numbers, functional areas, specializations, industries, resume titles, key skills, work experience, employer history, current salary, job level, and location preferences. Educational details like courses, specializations, and institutions.
    • Date: 2025-08-01T08:56:44Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-DATABASE-India-naukri-com-Recruitment-Job-Search-Jobseekers-7-Million-2022
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/edfd121b-cde9-4e42-895f-df01fbe1bba7.png
      • https://d34iuop8pidsy8.cloudfront.net/82e69fe1-1fd2-4cf4-8a84-2e2a5cbf3e4c.png
    • Threat Actors: ethan_fernsbyy
    • Victim Country: India
    • Victim Industry: Information Technology (IT) Services
    • Victim Organization: naukri.com
    • Victim Site: naukri.com
  30. Alleged data sale of Medikabazaar
    • Category: Data Breach
    • Content: The threat actor claims to be selling 500k customer data of Medikabazaar which includes customer ID, email, full name, phone number, PAN, customer group, onboarding date, and full address.
    • Date: 2025-08-01T08:07:20Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-%F0%9F%94%B4MEDIKABAZAAR-COM-%E2%80%94-FULL-CUSTOMER-DATABASE-500k-customer-data
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/a816e9be-03ef-4cb6-a5ac-e39afedb595d.png
      • https://d34iuop8pidsy8.cloudfront.net/43ada2cf-512b-404b-b3e2-b4bf2e5c424b.png
    • Threat Actors: Medikabazaar
    • Victim Country: India
    • Victim Industry: Hospital & Health Care
    • Victim Organization: medikabazaar
    • Victim Site: medikabazaar.com
  31. Alleged Data Leak of Huachi New Pay
    • Category: Data Leak
    • Content: The group claims to have leaked data belonging to Huachi New Pay. NB: The authenticity of the post is yet to be verified
    • Date: 2025-08-01T07:00:25Z
    • Network: telegram
    • Published URL: https://t.me/aqj986/6531
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/b53ce8c4-c1fb-47c0-98e2-2b81bb231346.png
    • Threat Actors: Aiqianjin
    • Victim Country: USA
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  32. Alleged sale of corp Law access to an unidentified US organization
    • Category: Initial Access
    • Content: The threat actor claims to have corporate Law access to an unidentified U.S. organization.
    • Date: 2025-08-01T05:53:17Z
    • Network: tor
    • Published URL: http://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142614/
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/2a92d96b-8674-4de5-a3b5-1b99a5b61967.jpeg
    • Threat Actors: WISDOM
    • Victim Country: USA
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  33. Alleged data breach of Telepesquisa – Sua Pesquisa Começa Aqu
    • Category: Data Breach
    • Content: A threat actor claims to have breached telepesquisa.com, leaking over 287,000 client records, 102,000+ emails, 48,000 app users, and 66,000+ contacts including WhatsApp numbers.
    • Date: 2025-08-01T05:43:22Z
    • Network: openweb
    • Published URL: https://hydraforums.io/Threads-database-brasil-%F0%9F%8E%AF%F0%9F%92%B0
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/aa457055-3c23-4251-a4f6-4b187cc54be1.png
      • https://d34iuop8pidsy8.cloudfront.net/e724dc5e-316d-421f-91cd-352e8c29ed02.png
    • Threat Actors: DataVortexDB
    • Victim Country: Brazil
    • Victim Industry: Marketing, Advertising & Sales
    • Victim Organization: telepesquisa – sua pesquisa começa aqu
    • Victim Site: telepesquisa.com
  34. Alleged data breach of enviamais
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database allegedly sourced from enviamais.com.br, containing 200,000 phone numbers and detailed information on over 400,000 users, including documents.
    • Date: 2025-08-01T05:30:39Z
    • Network: openweb
    • Published URL: https://hydraforums.io/Threads-database-brasil-%F0%9F%8E%AF%F0%9F%92%B0
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/63cda2c3-f493-4596-87a4-88cb94ee1fe7.png
    • Threat Actors: DataVortexDB
    • Victim Country: Brazil
    • Victim Industry: Transportation & Logistics
    • Victim Organization: enviamais
    • Victim Site: enviamais.com.br
  35. Alleged data leak of superdoc.bg
    • Category: Data Breach
    • Content: Threat actor claims to have breached Superdoc.bg, exposing 1,214 cleaned records. The compromised data includes email addresses, location information, and potentially sensitive identifiers, with sample records provided as proof of breach.
    • Date: 2025-08-01T05:22:01Z
    • Network: openweb
    • Published URL: https://darkforums.st/Thread-Selling-superdoc-bg
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/4ec5ad95-8df3-4999-b5c6-6277c6d58ec5.png
    • Threat Actors: fuckoverflow
    • Victim Country: Bulgaria
    • Victim Industry: Healthcare & Pharmaceuticals
    • Victim Organization: superdoc.bg
    • Victim Site: superdoc.bg
  36. Alleged data leak of 600M U.S. personal records including SSNs and addresses
    • Category: Data Leak
    • Content: Threat actor claims to have leaked a database of 651 million U.S. records, containing names, SSNs, addresses, and related persons such as relatives and previous homeowners. The dataset is shared as a 32.71 GB compressed file.
    • Date: 2025-08-01T04:56:06Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-600-million-USA-NAME-SSN-ADDRESS-RELATED-PEOPLE
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/a76e4f08-0fe7-4024-8f72-450f782392b0.png
    • Threat Actors: kmsadkfmdksmf
    • Victim Country: USA
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  37. Alleged data sale of Saudi corporate companies.
    • Category: Data Leak
    • Content: Threat actor claims to have breached Saudi corporate companies, stealing 80GB of sensitive data including employees and workers personal information. The compromised data reportedly contains full names, national IDs, email addresses, phone numbers, residential addresses, dates of birth, and password hashes.
    • Date: 2025-08-01T04:45:42Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-saudi-arabic-leak
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/f72cae0f-aed2-4db6-8250-3b760829c28f.png
    • Threat Actors: NHYe
    • Victim Country: Saudi Arabia
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  38. Alleged data breach of Guangzhou Sprite Educational Technology Development Co, Ltd
    • Category: Data Breach
    • Content: The threat actor claims to have breached and is selling a database containing information on over 1.2 million students from China, allegedly sourced from ldapp.com.cn.
    • Date: 2025-08-01T04:28:21Z
    • Network: openweb
    • Published URL: https://hydraforums.io/Threads-database-china
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/3b74e27d-b155-473c-88c0-27b3a56823c7.png
      • https://d34iuop8pidsy8.cloudfront.net/9761ab4d-34d7-45e7-b7e9-f977d78474c5.png
    • Threat Actors: DataVortexDB
    • Victim Country: China
    • Victim Industry: Education
    • Victim Organization: guangzhou sprite educational technology development co, ltd
    • Victim Site: ldapp.com.cn
  39. Alleged sale of China Users data
    • Category: Data Leak
    • Content: A threat actor claims to have leaked theatomdata.com and is selling a database containing over 2 million unique Chinese phone numbers and related user information.
    • Date: 2025-08-01T04:25:49Z
    • Network: openweb
    • Published URL: https://hydraforums.io/Threads-database-china
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/a85b5295-4bcd-47d0-95fe-76607100e0b7.png
    • Threat Actors: DataVortexDB
    • Victim Country: China
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  40. Alleged data breach of theatomdata.com
    • Category: Data Breach
    • Content: A threat actor claims to have breached theatomdata.com and is selling a database containing over 2 million unique Chinese phone numbers and related user information.
    • Date: 2025-08-01T04:18:13Z
    • Network: openweb
    • Published URL: https://hydraforums.io/Threads-database-china
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/a85b5295-4bcd-47d0-95fe-76607100e0b7.png
    • Threat Actors: DataVortexDB
    • Victim Country: China
    • Victim Industry: Information Technology (IT) Services
    • Victim Organization: theatomdata.com
    • Victim Site: theatomdata.com
  41. Alleged data breach of Sejoy Biomedical Co., Ltd.
    • Category: Data Breach
    • Content: The threat actor claims to have breached and is selling a database containing over 660,000 lines of Chinese user information, including phone numbers.
    • Date: 2025-08-01T02:47:39Z
    • Network: openweb
    • Published URL: https://hydraforums.io/Threads-database-china
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/420d46f3-7ec0-4b16-aca7-839b81fe7b9c.png
    • Threat Actors: DataVortexDB
    • Victim Country: China
    • Victim Industry: Hospital & Health Care
    • Victim Organization: sejoy biomedical co., ltd.
    • Victim Site: sejoy.com
  42. Alleged data breach of French regional training program
    • Category: Data Breach
    • Content: The threat actor claims to have leaked a massive database containing personal information of individuals involved in the biggest French regional training program (PRF). This alleged leak exposes sensitive data such as names, birthdates, Social Security numbers, addresses, phone numbers, and email addresses of nearly 200,000 individuals.
    • Date: 2025-08-01T02:27:47Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-SELLING-FR-Biggest-French-Regional-Training-Program-PRF
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/23c462ec-8c28-44f9-b150-23b2a93c855c.png
    • Threat Actors: Cena1010
    • Victim Country: France
    • Victim Industry: Education
    • Victim Organization: Unknown
    • Victim Site: Unknown
  43. Alleged unauthorized access to Devawongse Varopakarn Institute of Foreign Affairs
    • Category: Initial Access
    • Content: The group claims to have accessed and leaked the login credentials of Devawongse Varopakarn Institute of Foreign Affairs
    • Date: 2025-08-01T02:10:34Z
    • Network: telegram
    • Published URL: https://t.me/mrrrbottt/384
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/cbe66b76-e836-48e1-a9b1-86e998c24912.png
    • Threat Actors: Kxichixxsec
    • Victim Country: Thailand
    • Victim Industry: Government & Public Sector
    • Victim Organization: devawongse varopakarn institute of foreign affairs
    • Victim Site: difa-tes.mfa.go.th
  44. Alleged unauthorized access to Devawongse Varopakarn Institute of Foreign Affairs
    • Category: Initial Access
    • Content: The group claims to have gained unauthorized access to the Devawongse Varopakarn Institute of Foreign Affairs
    • Date: 2025-08-01T02:09:11Z
    • Network: telegram
    • Published URL: https://t.me/mrrrbottt/384
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/cbe66b76-e836-48e1-a9b1-86e998c24912.png
    • Threat Actors: Kxichixxsec
    • Victim Country: Thailand
    • Victim Industry: International Affairs
    • Victim Organization: devawongse varopakarn institute of foreign affairs
    • Victim Site: difa-tes.mfa.go.th
  45. Kxichixxsec targets the website of Devawongse Varopakarn Institute of Foreign Affairs
    • Category: Initial Access
    • Content: The group claims to have taken down the website of Devawongse Varopakarn Institute of Foreign Affairs
    • Date: 2025-08-01T02:03:44Z
    • Network: telegram
    • Published URL: https://t.me/mrrrbottt/384
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/cbe66b76-e836-48e1-a9b1-86e998c24912.png
    • Threat Actors: Kxichixxsec
    • Victim Country: Thailand
    • Victim Industry: International Affairs
    • Victim Organization: devawongse varopakarn institute of foreign affairs
    • Victim Site: difa-tes.mfa.go.th
  46. Alleged leak of access to multiple PhpMyAdmin SQL Database
    • Category: Initial Access
    • Content: Threat actor claims to have leaked access to 52 phpMyAdmin accounts
    • Date: 2025-08-01T01:08:36Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-52-PhpMyAdmin-SQL-Database-Access-Live
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/3a1badee-19ea-441f-9ea8-322926921289.png
    • Threat Actors: Satanic
    • Victim Country: Unknown
    • Victim Industry: Software
    • Victim Organization: phpmyadmin
    • Victim Site: Unknown
  47. Alleged data breach of a French Certification Programs and Professional Advancement
    • Category: Data Leak
    • Content: The threat actor claims to have leaked a massive database containing personal information of individuals involved in the biggest French certification programs and professional advancement records. This alleged leak exposes sensitive data such as names, birthdates, addresses, and phone numbers of over two million people.
    • Date: 2025-08-01T01:01:19Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-SELLING-FR-Biggest-French-Certification-Programs-and-Professional-Advancement
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/c6aad780-c26a-42bf-aae8-57ff38d53fbb.jpeg
    • Threat Actors: Cena1010
    • Victim Country: France
    • Victim Industry: Education
    • Victim Organization: Unknown
    • Victim Site: Unknown
  48. Alleged data breach of Kuwait Airways leaked
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database containing 600,000 Kuwait Airways customer records in JSON and CSV formats. The leak includes personal information, passport details, contact data, and frequent flyer program records.
    • Date: 2025-08-01T00:52:07Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-SELLING-kuwait-airways-600K
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/ce913637-0855-4e12-837e-a0664ccde015.png
    • Threat Actors: IMAN
    • Victim Country: Kuwait
    • Victim Industry: Airlines & Aviation
    • Victim Organization: kuwait airways
    • Victim Site: kuwaitairways.com
  49. Database of Kuwait Airways allegedly leaked
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database containing 600,000 Kuwait Airways customer records in JSON and CSV formats. The leak includes personal information, passport details, contact data, and frequent flyer program records.
    • Date: 2025-08-01T00:07:08Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-SELLING-kuwait-airways-600K
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/ce913637-0855-4e12-837e-a0664ccde015.png
    • Threat Actors: IMAN
    • Victim Country: Kuwait
    • Victim Industry: Airlines & Aviation
    • Victim Organization: kuwait airways
    • Victim Site: kuwaitairways.com
  50. Database of Kuwait Airways allegedly leaked
    • Category: Data Breach
    • Content: The threat actor claims to have selling database containing 600,000 Kuwait Airways customer records in JSON and CSV formats. The leak includes personal information, passport details, contact data, and frequent flyer program records.
    • Date: 2025-08-01T00:02:23Z
    • Network: tor
    • Published URL: http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd.onion/Thread-SELLING-kuwait-airways-600K
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/603ce454-1d3e-4d6e-a065-a8ec6f962f94.png
    • Threat Actors: IMAN
    • Victim Country: Kuwait
    • Victim Industry: Airlines & Aviation
    • Victim Organization: kuwait airways
    • Victim Site: kuwaitairways.com