This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged data sale of Bouygues Telecom
- Category: Data Breach
- Content: The threat actor claims to be selling data from Bouygues Telecom.
- Date: 2025-08-20T13:08:55Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Database-Bouyguestelecom-fr)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8d9711db-f32b-4b37-bca7-a9aff3a98cfb.png
- Threat Actors: bouygues_BF
- Victim Country: France
- Victim Industry: Network & Telecommunications
- Victim Organization: bouygues telecom
- Victim Site: bouyguestelecom.fr
- Alleged data leak of multiple French company databases
- Category: Data Leak
- Content: The threat actor claims to have obtained databases from multiple French companies, including Boulanger, Free Mobile, SFR, GoSport, IntelX Darty, Autosur, and others.
- Date: 2025-08-20T13:07:46Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/i-databases-from-boulanger-free-mobile-sfr-gosport-intelx-darty-autosur-and-much-more-my-telegram-apoloud.41690/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2a8b97af-af6c-4dc8-bc2e-e1bc81e56696.png
- Threat Actors: Yororoadi
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of MTsS. DARUL ULUM KOTABARU
- Category: Data Breach
- Content: The threat actor claims to have leaked data from MTsS Darul Ulum Kotabaru.
- Date: 2025-08-20T12:58:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-LEAKED-DATABASE-SISWA-MTSDARULULUMKOTABARU–24953)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/42ccd8ad-496a-4886-9c48-359c2a396b02.png
- Threat Actors: LangitDev
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: mtss. darul ulum kotabaru
- Victim Site: mtsdarululumkotabaru.sch.id
- Alleged data breach of Kerala Local Self Government Department
- Category: Data Breach
- Content: The threat actor claims to have leaked data from the Kerala Local Self Government Department, allegedly containing the name of the district, state code, Grama Panchayat address, name of the president, mobile number, email address, and more.
- Date: 2025-08-20T12:49:18Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Source-Code-President-of-Data-1-5-Grama-Panchayat-India)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/59b2b8f7-c9d9-4c8c-8770-cc5cbe925575.png
- Threat Actors: RXY
- Victim Country: India
- Victim Industry: Government Administration
- Victim Organization: kerala local self government department
- Victim Site: lsgd.kerala.gov.in
- Alleged sale of Greenwich University data
- Category: Data Breach
- Content: The threat actor claims to be selling an 821 MB SQL database allegedly stolen from Greenwich University, reportedly leaked on August 18, 2025. The dataset contains over 3 million records, including accounts, access controls, and user preferences.
- Date: 2025-08-20T12:23:15Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Greenwich-University-Vietnam-Data-Breach-2025-%E2%80%94-821MB-CRM-Database-Exposed)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2b07a558-c591-4e65-aa3f-60e8e5009366.png
- Threat Actors: Chucky_BF
- Victim Country: Vietnam
- Victim Industry: Education
- Victim Organization: greenwich university
- Victim Site: greenwich.edu.vn
- Alleged data sale of Kimo.com.tw
- Category: Data Breach
- Content: The threat actor claims to be selling a 35.9 MB CSV database allegedly stolen from Kimo.com.tw, reportedly leaked on August 18, 2025. The dataset contains over 100,000 records, including usernames, email addresses, password hashes, IP addresses, registration dates and activity timestamps, and profile data.
- Date: 2025-08-20T12:16:00Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Kimo-com-tw-Portal-Taiwan-Data-Breach-2025-%E2%80%94-35-9MB-Legacy-User-Database-Exposed)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b23ea744-0afb-4e02-8083-9bdf7db51c8a.png
- Threat Actors: Chucky_BF
- Victim Country: Taiwan
- Victim Industry: Online Publishing
- Victim Organization: kimo.com.tw
- Victim Site: tw.yahoo.com
- Alleged sale of Rock Records data
- Category: Data Breach
- Content: The threat actor claims to be selling a 30.4 MB CSV database allegedly stolen from Rock Records, reportedly leaked in March 2025. The dataset contains over 66,000 records, including full names, gender, birth dates, email addresses and phone numbers, residential addresses, ZIP codes, cities and countries, login and registration timestamps, last activity dates, personal details, and music-related preferences.
- Date: 2025-08-20T12:02:46Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Rock-Records-Taiwan-Data-Breach-2025-%E2%80%94-30-4MB-Music-Portal-User-Database-Exposed)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3c8701f6-1238-41b7-9b10-adbb92f84dcb.png
- Threat Actors: Chucky_BF
- Victim Country: Taiwan
- Victim Industry: Music
- Victim Organization: rock records co.ltd.
- Victim Site: rock.com.tw
- Alleged data sale of Sunny Tennis
- Category: Data Breach
- Content: The threat actor claims to be selling an 11.1 MB CSV database allegedly stolen from Onchain, reportedly leaked on August 08, 2025. The dataset contains over 20,000 records, including full names, genders, email addresses, phone numbers, passwords, membership details, join dates, activity logs, player descriptions, coach information, and more.
- Date: 2025-08-20T11:58:11Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-SunnyTennis-tw-2025-Data-Breach-%E2%80%94-11-1MB-of-Member-Database-Exposed)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4ae1d739-7ed9-4ee6-b4cd-d68237b9bf54.png
- Threat Actors: Chucky_BF
- Victim Country: Taiwan
- Victim Industry: Sports
- Victim Organization: sunny tennis
- Victim Site: sunnytennis.tw
- Alleged leak of an unidentified U.S. bank database
- Category: Data Leak
- Content: The threat actor claims to have leaked full user data from an unidentified U.S. database, totaling 110,000 user records. The dataset reportedly contains first names, last names, addresses, cities, phone numbers, ZIP codes, and other banking-related details.
- Date: 2025-08-20T11:47:31Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/264624/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6706f367-6082-4283-9e81-69aa67df07f3.png
- Threat Actors: cobenotow
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Onchain data
- Category: Data Breach
- Content: The threat actor claims to be selling an 8.68 MB CSV database allegedly stolen from Onchain, reportedly leaked on June 12, 2025. The dataset contains over 40,000 records, including usernames, display names and WordPress logins, email addresses, password hashes, registration dates, account metadata, and corporate accounts tied to blockchain projects.
- Date: 2025-08-20T11:45:50Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Onchain-org-Lightcurve-Data-Breach-%E2%80%94-8-68MB-of-WordPress-User-Accounts-Exposed)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/04d3838d-66ba-4d45-8684-2a5a431ed651.png
- Threat Actors: Chucky_BF
- Victim Country: Switzerland
- Victim Industry: Information Technology (IT) Services
- Victim Organization: onchain
- Victim Site: onchain.org
- Alleged data breach of Techno Bondhu
- Category: Data Breach
- Content: The threat actor claims to have leaked 95.59 KB of data from Techno Bondhu, allegedly containing admin accounts, user registrations, employee records, products, orders, services, categories, and more.
- Date: 2025-08-20T11:31:59Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-LEAK-TechnoBondhu-technobondhu-in-Database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/028e316e-67bc-4c5e-ba29-47745c17d335.png https://d34iuop8pidsy8.cloudfront.net/4aa4eaab-6a06-46be-9b4f-2ecebb263e84.png
- Threat Actors: FreedomSecurity1337
- Victim Country: India
- Victim Industry: Information Technology (IT) Services
- Victim Organization: techno bondhu
- Victim Site: technobondhu.in
- Alleged data breach of Ukrainian Armed Forces
- Category: Data Breach
- Content: The threat actor claims to be selling data allegedly obtained from the General Staff of the Armed Forces of Ukraine, detailing approximately 1.7 million servicemen reported killed or missing in action during the Special Military Operation.The dataset reportedly spans from 2022 to 2025 and includes full names, dates, circumstances and locations of death or disappearance, personal data, photos, and more.
- Date: 2025-08-20T10:52:56Z
- Network: telegram
- Published URL: (https://t.me/mash/67103?single)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c332d924-051a-4cb0-9e45-5246fab75d5f.png https://d34iuop8pidsy8.cloudfront.net/619db8eb-b0b8-41f0-a5c0-5b34faeadbb2.png
- Threat Actors: Mash
- Victim Country: Ukraine
- Victim Industry: Government Administration
- Victim Organization: ministry of defense of ukraine
- Victim Site: mod.gov.ua
- Alleged sale of X3 Express VPN premium accounts
- Category: Data Leak
- Content: The threat actor claims to be selling premium accounts for X3 Express VPN.
- Date: 2025-08-20T10:42:27Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/x3-express-vpn-premium-accounts.41688/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/55cbe82d-1824-4337-9a41-98c77d800ba6.png
- Threat Actors: jih11
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of 15K Gmail accounts
- Category: Data Leak
- Content: The threat actor claims to be selling 15,000 Gmail accounts, including 115 recently verified entries.
- Date: 2025-08-20T10:17:08Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/15k-gmail-115.41687/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/72a23a12-4e48-4ba2-9ee9-4cb8169ec8b0.png
- Threat Actors: KONAI
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Israel Defence Force and Sovcom bank
- Category: Data Breach
- Content: The threat actor claims to be selling data belonging to the Israel Defense Forces and Sovcombank.
- Date: 2025-08-20T09:09:39Z
- Network: telegram
- Published URL: (https://t.me/digitalsghost/406)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2134adf3-1961-4133-aba7-ad7bf26d4d4c.png https://d34iuop8pidsy8.cloudfront.net/3136bda6-da5b-4c69-83c2-0d257e954b2a.png
- Threat Actors: DigitalGhost
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of 10K U.S. credit card records
- Category: Data Leak
- Content: The threat actor claims to be selling 10,500 U.S. credit card records, with a claimed 60%+ authorization success rate and 25%+ AVS (Address Verification System) approval. The dataset includes standard credit card fields such as CC number, expiration date, CVV, cardholder name, address, city, state, ZIP, and for 3,000 entries, also email and phone numbers.
- Date: 2025-08-20T08:56:28Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/264610/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e1eb6bca-509c-4d85-91d9-c15b8c852e6c.png
- Threat Actors: cashmoneycard
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Brazilian citizens database
- Category: Data Leak
- Content: The threat actor claims to have leaked a Brazilian citizens database containing phone numbers and email addresses.
- Date: 2025-08-20T08:11:40Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/brazilian-citizens-database-with-phone-and-email.41682/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a6cca597-d13c-4a01-b0c3-6b5b27fede33.png
- Threat Actors: giyogej590
- Victim Country: Brazil
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Instagram database
- Category: Data Breach
- Content: The threat actor claims to be selling a database of 1 million Instagram accounts, allegedly containing email addresses, names, phone numbers, and Instagram usernames.
- Date: 2025-08-20T08:07:14Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-1M-USA-INSTAGRAM-DATABASE)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d4c87d20-74ae-4a38-8ae8-cb467a628219.png
- Threat Actors: tomy
- Victim Country: USA
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: instagram
- Victim Site: instagram.com
- Alleged Leak of Botswana Mobile Number
- Category: Data Leak
- Content: The threat actor claims to have leaked a dataset containing Botswana’s Mobile Number
- Date: 2025-08-20T08:04:29Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/botswana-mobile-number-data.41681/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cd4911e2-4ede-41cf-843a-9e0a1d53f838.png
- Threat Actors: bahol85800
- Victim Country: South Africa
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of wordpress plugins
- Category: Alert
- Content: The threat actor claims to be selling WordPress plugins.
- Date: 2025-08-20T08:02:08Z
- Network: tor
- Published URL: (https://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142748/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3d201a22-19b7-4377-816b-30de8cd9beb5.png https://d34iuop8pidsy8.cloudfront.net/299864c2-6de8-4e33-89cd-60fd2b364def.png
- Threat Actors: 520
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- NoName targets the website of Antwerp Fried Chicken
- Category: Defacement
- Content: Group claims to have defaced the website of Antwerp Fried Chicken. Mirror Link : https://haxor.id/archive/team/black+elerone+team
- Date: 2025-08-20T07:45:41Z
- Network: telegram
- Published URL: (https://t.me/c/2634086323/975)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7edc7106-5041-4a2c-af76-1cb0d53ff18c.JPG
- Threat Actors: NoName057(16)
- Victim Country: Belgium
- Victim Industry: Food & Beverages
- Victim Organization: antwerp fried chicken
- Victim Site: antwerpfriedchickengent.be
- Alleged sale of UK shopping database
- Category: Data Leak
- Content: The threat actor claims to be selling a UK-based shopping database, containing 21 million records.
- Date: 2025-08-20T07:44:39Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/uk-shopping-2025.41679/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/973b4f3b-cd3d-45ac-a1c6-fc26c07a2dce.png
- Threat Actors: show_more
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- NoName targets the website of Callneat
- Category: Defacement
- Content: Group claims to have defaced the website of Callneat.
- Date: 2025-08-20T07:39:40Z
- Network: telegram
- Published URL: (https://t.me/c/2634086323/974)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/62f1d10d-ef76-403a-9410-008dfc0db3b7.JPG
- Threat Actors: NoName057(16)
- Victim Country: Belgium
- Victim Industry: Network & Telecommunications
- Victim Organization: callneat
- Victim Site: callneat.be
- Fatimion cyber team claims to target the website of Zionist entity
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Israel’s Zionist entity.
- Date: 2025-08-20T07:14:17Z
- Network: telegram
- Published URL: (https://t.me/hak993/4161)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/96f143e2-e4c3-447b-a77e-5209feb85031.png
- Threat Actors: Fatimion cyber team
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of contact details from the United Arab Emirates
- Category: Data Leak
- Content: The threat actor claims to be selling a database containing contact details from the United Arab Emirates. The dataset reportedly includes fields such as ID, email, name, status, and phone number
- Date: 2025-08-20T06:31:21Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-United-Arab-Emirates-Contact-Details-with-Status?highlight=Anosdark123)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3cdbf509-321a-4c2f-bb1f-bab55105a4d1.png
- Threat Actors: Anoswantstobatte1
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Ant Village, Wonokerto District
- Category: Data Breach
- Content: The threat actor claims to have leaked the entire database of Ant Village (Desa Semut) in Wonokerto District. The leaked information reportedly includes details such as mother’s and father’s names, full residential addresses, province names, district names, subdistrict names, village names, neighborhood units (RW/RT), and other personal identifiers.
- Date: 2025-08-20T06:23:51Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-LEAKED-ANT-VILLAGE-SITE-GO-ID)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/1cb4bf21-c44a-4422-bce8-b6243576b82e.png
- Threat Actors: darknessX404
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: ant village, wonokerto district
- Victim Site: desasemut.wordpress.com
- Alleged leak of unauthorized access to an unidentified organization’s industrial control system (ICS)
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an unidentified organization’s industrial control system (ICS), allegedly taking full control over silos, production line equipment, and process parameters.
- Date: 2025-08-20T06:17:47Z
- Network: telegram
- Published URL: (https://t.me/Z_alliance_ru/973)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/09c733bd-b956-4b41-80e4-5a0e165ab10b.png
- Threat Actors: Z-ALLIANCE
- Victim Country: Unknown
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to an unidentified government organization in Jordan
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to an unidentified government organization in Jordan.
- Date: 2025-08-20T06:12:52Z
- Network: telegram
- Published URL: (https://t.me/hak993/4163)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/efbd8de3-1aa4-4605-b62a-cbd53f0eaaa3.png
- Threat Actors: Fatimion cyber team
- Victim Country: Jordan
- Victim Industry: Government & Public Sector
- Victim Organization: Unknown
- Victim Site: Unknown
- Ruskinet claims to target Serbia
- Category: Alert
- Content: A recent post by the group indicated that they are targeting Saudi Arabia.
- Date: 2025-08-20T05:54:33Z
- Network: telegram
- Published URL: (https://t.me/ruskinet/230)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0d178c8e-230f-4d5a-9d71-205a2ebf8b2e.png
- Threat Actors: RuskiNet
- Victim Country: Serbia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of GOBIERNO BOLIVARIANO DE VENEZUELA
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing personal information related to the Gobierno Bolivariano de Venezuela. The leak includes over 11,000 records with details such as names, birthdates, occupations, contact numbers, addresses, and emails.
- Date: 2025-08-20T04:57:19Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-GOBIERNO-BOLIVARIANO-DE-VENEZUELA)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/00288af1-bf29-4dd8-9bda-8a8581afa8a9.png
- Threat Actors: notalive
- Victim Country: Venezuela
- Victim Industry: Government & Public Sector
- Victim Organization: gobierno bolivariano de venezuela
- Victim Site: Unknown
- Alleged data breach of BET10
- Category: Data Breach
- Content: The threat actor claims to be selling a database from BET10, an online casino platform based in Brazil. The breach exposed data from 81,661 unique users, including names, emails, account access details, balances (withdrawal and bonus), affiliate status, CPF numbers (Brazilian taxpayer registry), and phone numbers.
- Date: 2025-08-20T04:50:36Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-BET10-br-com%C2%A0Casino-Database)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/6a976408-1655-4da1-b894-258a2a2cc695.png https://d34iuop8pidsy8.cloudfront.net/c7fd3f4d-f365-4bf0-877f-8cb9473a049a.png
- Threat Actors: 888
- Victim Country: Brazil
- Victim Industry: Gambling & Casinos
- Victim Organization: bet10
- Victim Site: bet10.br.com
- H3C4KEDZ targets the website of ACD Vending Machines
- Category: Defacement
- Content: The group claims to have defaced the website of ACD Vending Machines. Mirror Link : https://haxor.id/archive/team/black+elerone+team
- Date: 2025-08-20T04:38:20Z
- Network: telegram
- Published URL: (https://t.me/We_H3c4kedz1/757)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c5335e59-193e-44ef-9293-add46da43536.png
- Threat Actors: H3C4KEDZ
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: acd vending machines
- Victim Site: acdvendingmachines.com
- H3C4KEDZ targets the website of Acar Air and Heat
- Category: Defacement
- Content: The group claims to have defaced the website of Acar Air and Heat. Mirror Link : https://defacer.id/archive/team=black%2520elerone%2520team/page=1
- Date: 2025-08-20T04:36:42Z
- Network: telegram
- Published URL: (https://t.me/We_H3c4kedz1/757)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f1af8cc0-5c79-4a72-87fb-5b1d41f02738.png
- Threat Actors: H3C4KEDZ
- Victim Country: USA
- Victim Industry: Energy & Utilities
- Victim Organization: acar air and heat
- Victim Site: acarairandheat.com
- H3C4KEDZ targets the website of ACD Vending Machines
- Category: Defacement
- Content: The group claims to have defaced the website of ACD Vending Machines
- Date: 2025-08-20T04:29:43Z
- Network: telegram
- Published URL: (https://t.me/We_H3c4kedz1/757)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c5335e59-193e-44ef-9293-add46da43536.png
- Threat Actors: H3C4KEDZ
- Victim Country: USA
- Victim Industry: Retail Industry
- Victim Organization: acd vending machines
- Victim Site: acdvendingmachines.com
- H3C4KEDZ targets the website of 7 Landscaping Inc
- Category: Defacement
- Content: The group claims to have defaced the website of 7 Landscaping Inc., Mirror Link: https://zone-xsec.com/search/q=black+elerone+team
- Date: 2025-08-20T04:12:13Z
- Network: telegram
- Published URL: (https://t.me/We_H3c4kedz1/757)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5e6c17c9-9996-46de-b0a5-732203839d8b.png
- Threat Actors: H3C4KEDZ
- Victim Country: USA
- Victim Industry: Professional Services
- Victim Organization: 7 landscaping inc
- Victim Site: 7landscapeinc.com
- Alleged data leak of Singapore Job Hunting Leads
- Category: Data Leak
- Content: A threat actor claims to have leaked over 150,000 job hunting records from Singapore in XLSX format, dated between 2024 and 2025. The data, dumped on August 20, 2025, includes personal details such as email, name, mobile number, job history, and qualifications. Some entries also contain sensitive IDs like NRIC, Work Permit, or PR numbers.
- Date: 2025-08-20T03:47:05Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/singapore-job-hunting-leads.41677/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a858c11d-d2fc-4803-8b79-d7eb60a7df0d.png
- Threat Actors: anubisdex
- Victim Country: Singapore
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of WP admin access to an unidentified shop in Australia
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized WordPress admin access to an unidentified shop in Australia.
- Date: 2025-08-20T02:22:44Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/264594/)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4389cabb-4c75-4f21-837e-7dd01839bcea.png
- Threat Actors: Reve
- Victim Country: Australia
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Universidad César Vallejo
- Category: Data Breach
- Content: The threat actor claims to have breached student records from Cesar Vallejo University (UCV) in Peru. The exposed information includes names, surnames, national ID numbers (DNI), phone numbers, email addresses, and academic programs. The breach compromises sensitive personal and academic details of enrolled students
- Date: 2025-08-20T01:36:22Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-UCV-STUDENT)
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/674d75c0-dbe4-433e-bd0e-5b0d5c813aa0.png
- Threat Actors: Deadman
- Victim Country: Peru
- Victim Industry: Education
- Victim Organization: universidad césar vallejo
- Victim Site: ucv.edu.pe
Conclusion The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases. Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.