This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
1. Alleged Sale of Cracked Prynt Stealer 2024
- Category: Malware
- Content: The threat actor claims to be selling a cracked version of Prynt Stealer 2024, an information-stealing malware tool. This modified version reportedly bypasses licensing restrictions, allowing unrestricted deployment and mass distribution. The cracked variant retains all core malicious functions of the original stealer, including credential theft, anti-debugging, USB spread, and Telegram-based exfiltration.
- Date: 2025-08-28T14:10:16Z
- Network: openweb
- Published URL: https://demonforums.net/Thread-Prynt-Stealer-2024-The-Dark-Truth-Behind-Cracked-Malware
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/241e7cea-2e84-4b28-bb74-d2f292ac2700.png
- Threat Actors: Tavish62
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
2. Alleged sale of admin access to an OpenCart-Based Store in Australia
- Category: Initial Access
- Content: The threat actor claims to be selling Admin-level OpenCart (v3.0.3.8) access allegedly belonging to an Australia-based e-commerce store.
- Date: 2025-08-28T14:01:39Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/265118/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2c89f008-c753-4bc3-9d0b-7e85e87c0bec.png
- Threat Actors: SinCity
- Victim Country: Australia
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
3. Alleged Database Leak of Credicorp
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly belonging to Credicorp, a financial services holding company headquartered in Peru with operations across Latin America and the United States. The database reportedly contains over 568,000 records in SQL format, including approximately 16,900 unique email addresses and personal details such as names and email addresses of individuals.
- Date: 2025-08-28T13:35:43Z
- Network: openweb
- Published URL: https://leakbase.la/threads/credicorp-d-leak.42046/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7500e01d-e9ba-4a81-b3c3-4f211cfbb04e.png
- Threat Actors: frog
- Victim Country: Peru
- Victim Industry: Financial Services
- Victim Organization: credicorp ltd.
- Victim Site: credicorpnet.com
4. Alleged sale of root access to an Magento store in France
- Category: Initial Access
- Content: Threat actor claims to be selling root access to an Magento-based online store in France.
- Date: 2025-08-28T13:34:03Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/265117/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3dbf4a61-7972-4d22-a09a-1c004a626498.png
- Threat Actors: Zimmer
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
5. Alleged unauthorized access to Solar Power Facility in Spain
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the energy management system of a solar power facility in Spain. The access allegedly enables full administrative control, including management of solar panels, adjustment of panel angles, monitoring and controlling battery charge levels, modifying operating schedules, and tracking real-time energy production and consumption.
- Date: 2025-08-28T13:07:09Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/1264
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/634999e1-d523-4ceb-b2b3-c663c9b30cff.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Spain
- Victim Industry: Renewables & Environment
- Victim Organization: Unknown
- Victim Site: Unknown
6. Alleged data leak of South American smart tech contributors
- Category: Data Leak
- Content: The threat actor claims to have leaked a list of smart technology administrators and contributors operating across South America. The exposed data includes full names, email addresses, phone numbers, and office addresses of representatives from companies such as SIDCO (Chile), Terranet Kolombia SAS (Colombia), Isde-Ecuador (Ecuador), Confortechnologies (Peru), Smart-Tech (Uruguay), LAUT C.A. (Venezuela) and many more.
- Date: 2025-08-28T12:59:04Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-kontributor-admin-south-america
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d0ade482-cbaf-4cd3-80e6-ca355e0dbb3d.png
- Threat Actors: G4ll
- Victim Country: Chile
- Victim Industry: Information Technology (IT) Services
- Victim Organization: Unknown
- Victim Site: Unknown
7. Alleged access to unidentified transPV solar power plant, Romania
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to the TRASSIR video surveillance system and take control over transPV solar power plant in Romania.
- Date: 2025-08-28T11:57:23Z
- Network: telegram
- Published URL: https://t.me/Z_ALLIANCE/643
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5a572e5a-f01f-48e7-855f-b8803e25c5fa.JPG https://d34iuop8pidsy8.cloudfront.net/6dcc7951-915e-4992-a98a-84fd147862d6.JPG
- Threat Actors: Z-ALLIANCE
- Victim Country: Romania
- Victim Industry: Energy & Utilities
- Victim Organization: Unknown
- Victim Site: Unknown
8. Alleged data breach of Bike for Good
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Bike for Good, allegedly containing names, emails, roles, registration details, and more.
- Date: 2025-08-28T11:34:39Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Bike-for-Good-UK-%E2%80%93-Charity-Database-Exposure
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a9b60373-da20-4353-aa13-ef3a42f47abf.png
- Threat Actors: MrAxTheCatBlack
- Victim Country: UK
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: bike for good
- Victim Site: bikeforgood.org
9. Alleged data sale of Goa Industrial Development Corporation (GIDC)
- Category: Data Breach
- Content: The threat actor claims to be selling data from the Goa Industrial Development Corporation (GIDC), allegedly containing emails, phone numbers, user IDs, and more.
- Date: 2025-08-28T11:18:11Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Goa-Industrial-Development-Corporation-idc-goa-gov-in
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/24a7a1cc-6760-4f5b-a3ad-857d909cad35.png https://d34iuop8pidsy8.cloudfront.net/2eba079c-2125-477c-8488-b837254028eb.png
- Threat Actors: krekti
- Victim Country: India
- Victim Industry: Government Administration
- Victim Organization: goa industrial development corporation
- Victim Site: idc.goa.gov.in
10. Alleged data leak of PT. Mount Himun Peratama
- Category: Data Breach
- Content: The threat actor claims to have obtained a database containing 1,350 records of employees from GHP Property Services. The leaked data reportedly includes gender, phone numbers, mother’s names, work locations, NPWP (tax ID), email addresses, bank names, bank codes, account numbers, account holder names, job titles, and work areas.
- Date: 2025-08-28T11:13:02Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Source-Code-1350-DATA-PEGAWAI-GHP-PROPERTY-SERVICES
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/36180311-08f8-4ce8-8d44-43431ba64be4.png
- Threat Actors: RXY
- Victim Country: Indonesia
- Victim Industry: Real Estate
- Victim Organization: pt. mount himun peratama
- Victim Site: ghp-services.com
11. Alleged sale of access to Trilateral Cooperation Secretariat (TCS)
- Category: Initial Access
- Content: The threat actor claims to be selling access to the Trilateral Cooperation Secretariat (TCS), allegedly including ID, shop number, admin user ID, shop name, shop address, shop email, and more.
- Date: 2025-08-28T10:59:34Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Trilateral-Cooperation-Secretariat-Access
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/af59793f-3e0c-4be5-9ba4-40ca3d5ba41f.png
- Threat Actors: krekti
- Victim Country: South Korea
- Victim Industry: Government Administration
- Victim Organization: trilateral cooperation secretariat
- Victim Site: tcs-asia.org
12. Alleged data sale of Ministry of Public Security of Vietnam
- Category: Data Breach
- Content: The threat actor claims to be selling a database from the Ministry of Public Security of Vietnam containing 980,000 registrations. The leak reportedly includes full names, CCCD numbers, dates of birth, addresses, phone numbers, derogations, custody numbers, administrative details, IDs, origins, and inmates’ last names.
- Date: 2025-08-28T10:52:31Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-VIETNAM-Minister-of-Public-Security-980-000-registations
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/22fb2b0c-a7a5-4375-b70c-8abf012cc020.png
- Threat Actors: giorggios
- Victim Country: Vietnam
- Victim Industry: Government Administration
- Victim Organization: ministry of public security of vietnam
- Victim Site: bocongan.gov.vn
13. Alleged Sale of UAE Citizens’ Contact Data
- Category: Data Leak
- Content: The threat actor claims to be selling data containing approximately 800,000 records of individuals in the United Arab Emirates. The purported dataset reportedly includes fields such as ID, email, name, status, city, and phone number.
- Date: 2025-08-28T10:21:17Z
- Network: openweb
- Published URL: https://leakbase.la/threads/800k-united-arab-emirates-contact-details-with-status.42047/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5106f9e7-cfa7-4bd7-aa53-06342ad1a48c.png
- Threat Actors: iamanigga
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
14. Alleged sale of unidentiifed Jewelry Store and Hospital Databases
- Category: Data Leak
- Content: The threat actor claims to be selling two databases, an unidentified jewelry store dataset with 200,000 records from the USA and EU containing full names, email addresses, phone numbers, billing and shipping addresses, order dates, and payment methods, and an unidentified hospital database including sensitive personal data such as SSNs, full names, medical histories, and various related documents.
- Date: 2025-08-28T09:59:53Z
- Network: tor
- Published URL: https://xssforum7mmh3n56inuf2h73hvhnzobi7h2ytb3gvklrfqm7ut3xdnyd.onion/threads/142889/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cd2a6aae-5df6-418b-8b6d-162481869dc4.png
- Threat Actors: jaba1234
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
15. Alleged data leak of Newmeet
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Newmeet, a dating site, containing 5,404,326 unique email addresses and sensitive user information such as gender, date of birth, passwords, geographic locations, IP addresses, social links, and bio-data. It reportedly occurred in 2017
- Date: 2025-08-28T09:19:36Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Newmeet-com
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/31dbdb8f-3482-4482-b3ad-91ea199bd60a.png
- Threat Actors: Tanaka
- Victim Country: France
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: newmeet
- Victim Site: newmeet.com
16. Alleged unauthorized access to Ecoenerg Srl
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to Ecoenerg Srl in Italy. The access allegedly enables control over cogeneration unit control block, managing electrical and thermal loads, full customization of parameters, heating control, alarm signal tracking, manage load and operating time, manage electrical and thermal loads directly through the system.
- Date: 2025-08-28T09:12:28Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/1261
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c1ac011c-9f16-4f50-9d4a-a2c355f1ddf3.JPG
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Italy
- Victim Industry: Industrial Automation
- Victim Organization: ecoenerg srl
- Victim Site: ecoenerg.it
17. Alleged data sale of Awal Bros Hospital
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly sourced from Awal Bros Hospital, a healthcare provider in Indonesia which includes name of the patients name,gender, dob, age, etc.
- Date: 2025-08-28T08:30:15Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-awalbros-com-INDONESIA-HOSPITAL-DATABASE
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/28c0046c-8ab2-4913-a985-0655a53ea269.png https://d34iuop8pidsy8.cloudfront.net/5659a1c3-b455-431a-a020-8a68d78e4929.png
- Threat Actors: TAKESHI
- Victim Country: Indonesia
- Victim Industry: Hospital & Health Care
- Victim Organization: awal bros hospital
- Victim Site: awalbros.com
18. Alleged data leak of University of Information Technology and Communications (UOITC)
- Category: Data Breach
- Content: The threat actor claims to have leaked a staff database from the University of Information Technology and Communications (UOITC) in Iraq. The dataset reportedly includes full names, academic titles, institutional email addresses, passwords, and possibly other sensitive staff-related information
- Date: 2025-08-28T08:30:09Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-uoitc-edu-iq-The-University-of-Information-Technology-Communications-of-Iraq
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d1c506e7-e588-4643-88aa-5f2c03b5b571.png
- Threat Actors: donbiazzi
- Victim Country: Iraq
- Victim Industry: Education
- Victim Organization: university of information technology and communications (uoitc)
- Victim Site: uoitc.edu.iq
19. Alleged data breach of Regional Institute of Education, Bhopal
- Category: Data Breach
- Content: The group claims to have compromised the official portal of India’s Integrated Teacher Education Programme (ITEP), managed by the Regional Institute of Education (RIE), Bhopal. The breach allegedly exposed sensitive NID information of 5,545 teachers, and the threat actor claims to hold administrator-level access to the portal.
- Date: 2025-08-28T08:28:13Z
- Network: telegram
- Published URL: https://t.me/c/2594876836/148
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ffcd2747-6974-4183-87d2-9770acfb62be.png
- Threat Actors: TEAM BD CYBER NINJA
- Victim Country: India
- Victim Industry: Education
- Victim Organization: regional institute of education, bhopal
- Victim Site: itepriebhopalcounselling.in
20. Alleged Sale of Access to RDWeb Network
- Category: Initial Access
- Content: The threat actor claims to be selling access to a network associated with RDWeb in the USA. The alleged target operates in the Commercial & Residential Construction industry with an estimated revenue of $6 million. The compromised network reportedly includes 76 domain computers and 1 domain controller.
- Date: 2025-08-28T08:26:39Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/265110/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e9b5e68a-f8a8-439e-a2eb-82ab76279ebc.png
- Threat Actors: samy01
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: Unknown
- Victim Site: Unknown
21. Alleged data breach of Colorado Health Network
- Category: Data Breach
- Content: The group claims to have obtained over 900 GB of organizational data.
- Date: 2025-08-28T07:42:07Z
- Network: tor
- Published URL: http://cephalus6oiypuwumqlwurvbmwsfglg424zjdmywfgqm4iehkqivsjyd.onion/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/18ad2bcf-1c4b-407a-9f33-3a77fadc21f4.png
- Threat Actors: Cephalus
- Victim Country: USA
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: colorado health network
- Victim Site: coloradohealthnetwork.org
22. Alleged data breach of General Presidency for the Affairs of the Grand Mosque and the Prophet’s Mosque
- Category: Data Breach
- Content: The group claims to have leaked data from the General Presidency for the Affairs of the Grand Mosque and the Prophet’s Mosque. The leaked dataset is reported to be 25 MB in size and allegedly contains sensitive organizational information. They also allege to have defaced the website.
- Date: 2025-08-28T07:33:53Z
- Network: telegram
- Published URL: https://t.me/cybers102/233
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d29fb25e-59a5-4cc4-9b6a-cb4ff98d8b5a.png https://d34iuop8pidsy8.cloudfront.net/e7641bd3-f0e9-4c08-ac3e-32bd246aefb3.png
- Threat Actors: CyberS102
- Victim Country: Saudi Arabia
- Victim Industry: Government Administration
- Victim Organization: general presidency for the affairs of the grand mosque and the prophet’s mosque
- Victim Site: alharamain.gov.sa
23. Alleged data sale of AIRWALLEX
- Category: Initial Access
- Content: The threat actor claims to be selling AIRWALLEX account registered in the United Kingdom, including IBAN/SORT code and a VISA virtual card with limits reportedly reaching up to £1,000,000 per month.
- Date: 2025-08-28T07:21:35Z
- Network: openweb
- Published URL: https://bhf.pro/threads/712333/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/eba78e00-b8b3-42df-bc5b-4ded0d60a51a.png https://d34iuop8pidsy8.cloudfront.net/26b31022-df6b-46dc-839e-d21f5f5f9acb.png
- Threat Actors: proktor
- Victim Country: UK
- Victim Industry: Financial Services
- Victim Organization: airwallex
- Victim Site: airwallex.com
24. Alleged leak of German casino user data
- Category: Data Leak
- Content: The threat actor claims to have leaked data of 5 million German casino users, allegedly containing names, emails, phone numbers, source currency, and amount played.
- Date: 2025-08-28T07:15:52Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-5-million-German-Cassino-user-data
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/dcc9e623-0464-436a-a74b-afe573039093.png
- Threat Actors: DigitalGhostt
- Victim Country: Germany
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
25. Allegede leak of Serbian data
- Category: Data Leak
- Content: The threat actor claims to have leaked a database from Serbia.
- Date: 2025-08-28T07:10:24Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-serbian-sample
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cc275e54-67ce-4a23-85ea-5026e9ef7c6c.png
- Threat Actors: Katuru
- Victim Country: Serbia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
26. Alleged data breach of MiFibra
- Category: Data Breach
- Content: The threat actor claims to be selling data from MiFibra
- Date: 2025-08-28T05:53:46Z
- Network: telegram
- Published URL: https://t.me/DefacePeru/1333
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9189073c-748b-43f5-94c8-8057688b296d.png https://d34iuop8pidsy8.cloudfront.net/fe6e5bee-f9b2-4a22-816d-9e88f40aec70.png
- Threat Actors: Deface Peru
- Victim Country: Peru
- Victim Industry: Network & Telecommunications
- Victim Organization: mifibra
- Victim Site: mifibra.pe
27. Alleged unauthorized access to Colombian Aerospace Force
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to satellite monitoring and management system of Colombian Aerospace Force.
- Date: 2025-08-28T05:52:01Z
- Network: telegram
- Published URL: https://t.me/DefacePeru/1288
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9a9309bd-bf86-48d2-81d7-cfa9e11a63ba.png
- Threat Actors: Deface Peru
- Victim Country: Colombia
- Victim Industry: Airlines & Aviation
- Victim Organization: colombian aerospace force
- Victim Site: fac.mil.co
28. Alleged data breach of SAFESA (Salud Federal Salta)
- Category: Data Breach
- Content: The group claims to have leaked the data of SAFESA (Salud Federal Salta). The compromisd data includes more than 1.3 million Salta citizens data.
- Date: 2025-08-28T05:41:34Z
- Network: telegram
- Published URL: https://t.me/DefacePeru/1349
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5ff9f7db-f926-440b-845e-40ae9452b3fb.png
- Threat Actors: Deface Peru
- Victim Country: Argentina
- Victim Industry: Hospital & Health Care
- Victim Organization: safesa (salud federal salta)
- Victim Site: safesa.gob.ar
29. Alleged sale of botnet log database
- Category: Data Leak
- Content: The threat actor claims to have a new botnet log database for sale, offering fresh victim data including Facebook ads accounts, Instagram cookies, emails, passwords, and PC files.
- Date: 2025-08-28T03:40:05Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-New-data-logs-botnet-ready-to-sell
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/82daefc0-888a-4e7f-9329-808f1688ec14.png
- Threat Actors: Nextion
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
30. Alleged data breach of Vietnam Posts and Telecommunications Group
- Category: Data Breach
- Content: The threat actor claims to be selling data from Vietnam Posts and Telecommunications Group (VNPT), impacting 7 million records. The leaked database reportedly includes customer names, birth dates, gender, phone numbers, and email addresses.
- Date: 2025-08-28T03:22:48Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-7-Million-Vietnam-Posts-and-Telecommunications-Group-VNPT
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c445d730-c355-40a9-ac98-e2f02827fd3a.png
- Threat Actors: DigitalGhostt
- Victim Country: Vietnam
- Victim Industry: Computer & Network Security
- Victim Organization: vietnam posts and telecommunications group
- Victim Site: vnpt.com.vn
31. Alleged data leak of Canadian CyrptoForex Data
- Category: Data Leak
- Content: A threat actor claims to have leaked a database of 1.5 million Canadian individuals involved in Crypto and Forex trading. The dataset includes full names, phone numbers, emails, brokers, and BTC usage.
- Date: 2025-08-28T03:19:53Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-1-5-Million-Canada-CyrptoForex-Data
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ee844e78-c942-49ac-adf9-76f41aa354ab.png
- Threat Actors: DigitalGhostt
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
32. Alleged data breach of Ontario OUT of DOORS Magazine
- Category: Data Breach
- Content: The threat actor claims to be leaked data from an OUT of Doors, exposing sensitive information belonging to outdoor, travel, and real estate businesses. The leaked dataset reportedly contains company names, contact details (emails, phone numbers, names), websites, listing information, and business details such as prices and dates.
- Date: 2025-08-28T03:10:40Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-OUT-of-Doors-Data-Breach-Leaked-Download
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b3081261-36c5-4dc9-9b87-4eadbcf83bfb.png
- Threat Actors: N1KA
- Victim Country: Canada
- Victim Industry: Publishing Industry
- Victim Organization: ontario out of doors magazine
- Victim Site: oodmag.com
33. Alleged data breach of Airports of Thailand Public Co.,Ltd
- Category: Data Breach
- Content: The threat actor claims to have leaked an Airports of Thailand (AOT) military database containing 11 million records. The data reportedly includes flight transaction details (dates, flight numbers, airports, airlines, passenger counts, freight, traffic type, card numbers) and references to Royal Thai Air Force (RTAF) security force units stationed at Don Mueang Air Force Base.
- Date: 2025-08-28T03:08:51Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-11-Million-Airports-of-Thailand-AOT-military-database
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/084d05cf-dcca-4f3f-a97c-94bd5bc8b1cc.png
- Threat Actors: DigitalGhostt
- Victim Country: Thailand
- Victim Industry: Airlines & Aviation
- Victim Organization: airports of thailand public co.,ltd
- Victim Site: airportthai.co.th
34. Alleged data leak of US Air Force & Navy Placement in Asia Pacific
- Category: Data Leak
- Content: The threat actor claims to have leaked a database detailing U.S. Air Force and Navy personnel placements in the Asia-Pacific, including sensitive personal and operational data. The post also lists alleged blueprints of military aircraft and naval vessels like the F-117 Nighthawk and USS Carl Vinson.
- Date: 2025-08-28T01:38:59Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-US-Air-Force-Navy-Placement-in-Asia-Pacific-with-blueprint
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/aa0870c9-540e-4763-9aa0-c12865421949.png https://d34iuop8pidsy8.cloudfront.net/8d0cee3c-3759-42f5-aa20-c50fa22553dc.png
- Threat Actors: FreedomSecurity1337
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
35. Alleged data breach of OSIPTEL
- Category: Data Breach
- Content: The threat actor claims to have leaked the OSIPTEL database, exposing the personal information of millions of Peruvian telecom users, including phone numbers, national ID numbers, full names, email addresses, telecom operators, subscription types, service plans, and activation dates.
- Date: 2025-08-28T00:28:00Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-OSIPTEL-2025-PERU-DATABASE-LEAK-36M
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e2d36aec-708e-45d3-a229-1af8c1e0e33b.png
- Threat Actors: hannibalmaa
- Victim Country: Peru
- Victim Industry: Network & Telecommunications
- Victim Organization: osiptel
- Victim Site: osiptel.gob.pe
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from finance and e-commerce to government, healthcare, and education. These events impact a wide range of countries, including Peru, Australia, Vietnam, India, Indonesia, the USA, and multiple European nations. The compromised data ranges from personal user information and financial details to sensitive health records and government employee data.
Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to e-commerce stores, corporate networks, and critical infrastructure, such as energy facilities in Spain and Romania and aerospace systems in Colombia. The sale of malware, including a cracked information stealer, further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.