This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged sale of access to an unidentified Brazilian financial data center
- Category: Initial Access
- Content: The threat actor claims to be selling access to a Tier 1 Brazilian data center hosting a financial services company’s infrastructure. The offer includes 14 CentOS virtual machines with full root credentials accessible via VMware vSphere Web Console.
- Date: 2025-08-04T14:22:16Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Document-VMware-vSphere-Panel-Access-Brazilian-Data-Center-14-Rooted-VMs)
- Screenshots:
- Threat Actors: csrakitin
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged VPS Payment Bypass Exploit
- Category: Vulnerability
- Content: The threat actor claims to be selling a 0day payment exploit affecting a well-known VPS provider. The exploit allegedly allows users to activate and use VPS/VDS services without making any actual payment, as the system falsely marks orders as “Paid.” The seller claims the servers are instantly activated with no verification or delays.
- Date: 2025-08-04T14:22:12Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-Paid-VPS-Exploit-0day)
- Screenshots:
- Threat Actors: Z10N
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Myanmar’s Internal Revenue Department (IRD)
- Category: Data Breach
- Content: The threat actor claims to have compromised the database of Myanmar’s Internal Revenue Department (IRD) e-Filing system, which serves taxpayers, tax preparers, and IRD officials. The platform includes login access, official news, publications, and related government contacts.
- Date: 2025-08-04T14:22:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-DATABASE-INTERNAL-REVENUE-DEPARTMENT-MYANMAR)
- Screenshots:
- Threat Actors: INDOHAXSEC
- Victim Country: Myanmar
- Victim Industry: Government Administration
- Victim Organization: internal revenue department (ird)
- Victim Site: ird.gov.mm
- Alleged sale of admin access to an unauthorized organization in France
- Category: Initial Access
- Content: The threat actor claims to be selling admin access to an unidentified organization in the USA.
- Date: 2025-08-04T13:52:30Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263665/)
- Screenshots:
- Threat Actors: Yudgin
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of U.S. Network Access
- Category: Initial Access
- Content: The threat actor claims to be selling access to U.S.-based network environment, boasting around 100 compromised hosts and domain-level access. The listing includes a domain user account protected by SonicWall and AV Defender. The compromised environment contains approximately 17 million records.
- Date: 2025-08-04T13:48:25Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263663/)
- Screenshots:
- Threat Actors: Big-Bro
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of U.S. Network Access
- Category: Initial Access
- Content: The threat actor claims to be selling access to U.S.-based network environment, boasting around 150 compromised hosts and domain-level access. The listing includes a domain user account protected by SonicWall and AV Defender. The compromised environment contains approximately 10 million records.
- Date: 2025-08-04T13:42:25Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263662/)
- Screenshots:
- Threat Actors: Big-Bro
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of ShafaDoc
- Category: Data Breach
- Content: The threat actor claims to be selling ShafaDoc, an Iranian online medical appointment platform, allegedly leaking personal data of over 700,000 individuals. The exposed records include names, national IDs, phone numbers, and login credentials, potentially granting full access to individual user accounts.
- Date: 2025-08-04T13:25:34Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-SELLING-IRAN-IRAN-ONLINE-MEDICAL-PLATFORM)
- Screenshots:
- Threat Actors: xploitleaks
- Victim Country: Iran
- Victim Industry: Hospital & Health Care
- Victim Organization: shafadoc
- Victim Site: shafadoc.ir
- Alleged sale of FluxPanel
- Category: Malware
- Content: The threat actor is offering a Woo Commerce phishing toolkit called FluxPanel, featuring card and PayPal phishing forms, fake shipping tracking, real-time data capture (CVV, OTP, push), custom bank templates, and multi-language support. It includes a plugin, control panel, and is compatible with any WordPress theme or plugin.
- Date: 2025-08-04T13:25:27Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-SELLING-Woo-Phishing-Plugin-Phishing-Live-Panel-CVV-OTP-PUSH-FluxPanel)
- Screenshots:
- Threat Actors: hologram
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Metrologu.ru LLC
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Metrologu.ru LLC, containing approximately 3,615,349 lines with around 130,000 user records which includes user details such as usernames, emails, IP addresses, timestamps, and hashed passwords.
- Date: 2025-08-04T13:15:48Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-DATABASE-Main-Forum-of-Metrologists-metrologu-ru)
- Screenshots:
- Threat Actors: Dr0xKrueger
- Victim Country: Russia
- Victim Industry: Other Industry
- Victim Organization: metrologu.ru llc
- Victim Site: metrologu.ru
- Alleged data sale of Government of the Islamic Republic of Iran
- Category: Data Breach
- Content: The threat actor claims to be selling a database of Government of the Islamic Republic of Iran, allegedly containing personal details of Iranian citizens and high-ranking officials. The exposed data reportedly includes full names, father’s names, national IDs, dates of birth, phone numbers, email addresses, and home addresses.
- Date: 2025-08-04T13:15:42Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-SELLING-IRAN-iran-gov-ir-BREACHED)
- Screenshots:
- Threat Actors: xploitleaks
- Victim Country: Iran
- Victim Industry: Government Administration
- Victim Organization: government of the islamic republic of iran
- Victim Site: iran.gov.ir
- Alleged data leak of Satro-Paladine
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Satro-Paladine which includes approximately 17,296 user records and 270,930 order records.
- Date: 2025-08-04T12:33:28Z
- Network: openweb
- Published URL: (http://breachforums.hn/Thread-DATABASE-Satro-Paladin-online-store-satro-paladin-com)
- Screenshots:
- Threat Actors: Dr0xKrueger
- Victim Country: Russia
- Victim Industry: E-commerce & Online Stores
- Victim Organization: satro-paladine
- Victim Site: satro-paladin.com
- Russian Partisan targets the website of FIZZY VAPES LTD
- Category: Defacement
- Content: The group claims to have defaced the website of FIZZY VAPES LTD.
- Date: 2025-08-04T11:50:06Z
- Network: telegram
- Published URL: (https://t.me/PartisanCompany/338)
- Screenshots:
- Threat Actors: Russian Partisan
- Victim Country: UK
- Victim Industry: Tobacco
- Victim Organization: fizzy vapes ltd
- Victim Site: fizzyvapes.net
- Alleged data leak of Yandex maps
- Category: Data Breach
- Content: The threat actor claims to have leaked a database allegedly from Yandex Maps on 2022, reportedly containing 995,000 location records, of which approximately 902,000 include email addresses. The leaked data appears to list businesses and points of interest across Russia, featuring organization names, categories, full physical addresses, coordinates, and multiple contact emails.
- Date: 2025-08-04T11:38:44Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-DATABASE-Database-Leaked-Yandex-maps-2022)
- Screenshots:
- Threat Actors: johnwick1122
- Victim Country: Russia
- Victim Industry: Information Technology (IT) Services
- Victim Organization: yandex maps
- Victim Site: yandex.com
- Alleged unauthorized access to Vilniaus vandenys
- Category: Initial Access
- Content: The group claims to have gained unauthorized access of wastewater treatment plant control system in Lithuania operated by Vilniaus vandenys. The group alleges it manipulated pump and bioreactor parameters, disabled emergency alerts and critical sensors, and disrupted ventilation and power systems.
- Date: 2025-08-04T11:14:13Z
- Network: telegram
- Published URL: (https://t.me/Z_alliance_ru/706)
- Screenshots:
- Threat Actors: Z-ALLIANCE
- Victim Country: Lithuania
- Victim Industry: Energy & Utilities
- Victim Organization: vilniaus vandenys
- Victim Site: vv.lt
- Alleged SCADA Access of the Carlsbad Desalination Project
- Category: Initial Access
- Content: The threat actor claims to have access to SCADA of The Carlsbad Desalination Project.
- Date: 2025-08-04T11:01:49Z
- Network: telegram
- Published URL: (https://t.me/LazaGrad1/22)
- Screenshots:
- Threat Actors: LazaGrad Hack
- Victim Country: USA
- Victim Industry: Renewables & Environment
- Victim Organization: the carlsbad desalination project
- Victim Site: carlsbaddesal.com
- Allege data leak of Spirit.Fitness
- Category: Data Breach
- Content: The threat actor claims to have leaked a database allegedly from Spirit.Fitness, reportedly includes 77,255 cleaned records containing full names, phone numbers, and email addresses of clients or members.
- Date: 2025-08-04T10:10:29Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-DATABASE-Sports-clubs-Spirit-Fitness-spiritfit-ru)
- Screenshots:
- Threat Actors: Dr0xKrueger
- Victim Country: Russia
- Victim Industry: Health & Fitness
- Victim Organization: spirit.fitness
- Victim Site: spiritfit.ru
- Alleged data leak of students in Russia’s Kemerovo Region.
- Category: Data Leak
- Content: The threat actor claims to have leaked a database containing personal data of approximately 300,095 school children from the Kemerovo region in Russia. The leak reportedly includes details such as school number, full names, dates of birth, class information, admission dates, branch addresses, phone numbers, and email addresses.
- Date: 2025-08-04T10:10:11Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-COLLECTION-Students-in-the-Kemerovo-Region-300k)
- Screenshots:
- Threat Actors: Dr0xKrueger
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Solana Crypto Trading Bot
- Category: Malware
- Content: The threat actor claims to be selling a Solana trading bot built in Rust, optimized for high-frequency trading. It functions as a Nonjito bundler and features built-in Anti-snipe and MEV protection to defend against front-running. With an execution speed of under 1 millisecond, the tool is designed for stability and performance, making it suitable for novice users seeking an edge on the Solana blockchain.
- Date: 2025-08-04T09:47:03Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Crypto-Trading-Bot)
- Screenshots:
- Threat Actors: 456
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Crypto MEV Bot
- Category: Malware
- Content: The threat actor claims to be selling a high-speed MEV (Miner Extractable Value) bot targeting cryptocurrency transactions. Described as the fastest single-threaded MEV bot available, it claims to process 12,000 transactions for under 0.1 SOL, with a snipe speed under 130ms.
- Date: 2025-08-04T09:46:51Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-Crypto-MEV-Bot)
- Screenshots:
- Threat Actors: 456
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of BK-STROY
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from BK-STROY. The leak allegedly contains 294,765 records including full names, ID numbers, and detailed physical addresses. The exposed data may be used for identity profiling, targeted scams, or unauthorized data enrichment involving Kazakh individuals or businesses.
- Date: 2025-08-04T09:46:40Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-DATABASE-Kazakhstan-BK-STROY-bkstroy-kz)
- Screenshots:
- Threat Actors: Dr0xKrueger
- Victim Country: Kazakhstan
- Victim Industry: Building and construction
- Victim Organization: bk-stroy
- Victim Site: bkstroy.kz
- Alleged sale of Rdweb access to Geo Agric
- Category: Initial Access
- Content: The threat actor claims to be selling RDWeb access to Geo Agric. The access includes domain user, domain admins, enterprise admins and more.
- Date: 2025-08-04T09:25:41Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263649/)
- Screenshots:
- Threat Actors: K3MP3R
- Victim Country: Italy
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: geo agric
- Victim Site: geo-agric.com
- Alleged data leak of OVHcloud
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 1.6 million email and password pairs from OVHcloud.
- Date: 2025-08-04T09:19:00Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-DATABASE-1-6M-OVHCLOUD-com)
- Screenshots:
- Threat Actors: johnwick1122
- Victim Country: France
- Victim Industry: Software Development
- Victim Organization: ovhcloud
- Victim Site: ovhcloud.com
- Alleged sale of unauthorized access to mixed email accounts
- Category: Initial Access
- Content: The threat actor claims to be selling access to 44,000 mixed email accounts.
- Date: 2025-08-04T08:46:54Z
- Network: openweb
- Published URL: (https://leakbase.la/threads/44k-mixed-mail-access-fresh-list.41111/)
- Screenshots:
- Threat Actors: cidiia
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Ho Chi Minh City College of Transport (HCMCT)
- Category: Data Breach
- Content: The threat actor claims to have leaked a student database from the Ho Chi Minh City College of Transport in Vietnam. The exposed data includes highly sensitive information such as student IDs, passwords, full names, birth details, addresses, ID card numbers, academic scores, contact details (phone, email), parent and family information, political affiliations, course details, and graduation records.
- Date: 2025-08-04T07:43:21Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-Website-hcmct-edu-vn)
- Screenshots:
- Threat Actors: Ls1jWohGKtwY0iZ2yU
- Victim Country: Vietnam
- Victim Industry: Education
- Victim Organization: ho chi minh city college of transport (hcmct)
- Victim Site: hcmct.edu.vn
- Alleged data leak of Selective Service System
- Category: Data Leak
- Content: A threat actor claims to have leaked sensitive records allegedly sourced from the U.S. Selective Service System. Sample screenshots are provided on their dark forum.
- Date: 2025-08-04T07:31:50Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-www-sss-gov)
- Screenshots:
- Threat Actors: error_fixed
- Victim Country: USA
- Victim Industry: Government Administration
- Victim Organization: selective service system
- Victim Site: sss.gov
- Alleged Data Breach of Personnel Management Information System indonesia
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of simpeg.gorutkab.go.id, containing records of 4,260 civil servants in North Gorontalo, Indonesia. The dataset includes detailed personal, employment, and contact information, along with salary data and login credentials.
- Date: 2025-08-04T06:30:28Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-Personnel-Management-Information-System-INDONESIAN)
- Screenshots:
- Threat Actors: ParanoidHax
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: personnel management information system
- Victim Site: simpeg.gorutkab.go.id
- TEAM BD CYBER NINJA targeted the website of Playback Clube
- Category: Defacement
- Content: The threat actor claims to have defaced the website of Playback Clube. https://defacer.id/mirror/id/175919
- Date: 2025-08-04T06:21:31Z
- Network: telegram
- Published URL: (https://t.me/c/2594876836/84)
- Screenshots:
- Threat Actors: TEAM BD CYBER NINJA
- Victim Country: Brazil
- Victim Industry: Entertainment & Movie Production
- Victim Organization: playback clube
- Victim Site: playbackclube.app
- TEAM BD CYBER NINJA targeted the website of Playback Clube
- Category: Defacement
- Content: The threat actor claims to have defaced the website of Playback Clube
- Date: 2025-08-04T06:21:00Z
- Network: telegram
- Published URL: (https://t.me/c/2594876836/84)
- Screenshots:
- Threat Actors: TEAM BD CYBER NINJA
- Victim Country: Brazil
- Victim Industry: Entertainment & Movie Production
- Victim Organization: playback clube
- Victim Site: playbackclube.app
- Alleged sale of 500K+ Canada corporate contact records
- Category: Data Leak
- Content: Threat actor claims to be selling a database of over 500,000 Canadian corporate contact records. The exposed data reportedly includes names, job titles, email addresses, phone numbers, postal addresses, company names, and other related business details.
- Date: 2025-08-04T05:02:37Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-500k-Canada-Corporate-Contact-Directory-Exposed)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of South Korea Gaming Platform User Database
- Category: Data Leak
- Content: The threat actor claims to have leaked a South Korean gaming platform’s user database, containing sensitive personal details and login history.
- Date: 2025-08-04T04:50:04Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-120-432-South-Korea-Gaming-Platform-User-Database-with-Login-History-and-Personal)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: South Korea
- Victim Industry: Gaming
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Student Portal UK
- Category: Data Leak
- Content: The threat actor claims to be selling a database containing approximately 148,000 students in the United Kingdom, including Chinese international students. The leaked data reportedly includes email addresses, mobile numbers, names, nationalities, course and subject details, student care status, qualifications, and appointment locations.
- Date: 2025-08-04T04:43:01Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-148k-United-Kingdom-Student-Portal-Data-Leak-Comprehensive-Education-Database-Exp)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Social Golf Australia
- Category: Data Breach
- Content: A threat actor claims to have leaked data from an Australian golf club, exposing sensitive member details. The leaked information includes names, contact info, addresses, birthdates, membership status, and club affiliation. NB : The authenticity of the victim organization has yet to be confirmed.
- Date: 2025-08-04T04:42:26Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-250K-Rows-Australia-Golf-Club-Members-Data-Leak-Sensitive-Details-Exposed)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Australia
- Victim Industry: Sports
- Victim Organization: social golf australia
- Victim Site: socialgolfaustralia.com.au
- Alleged data leak of an unidentified Argentina government website
- Category: Data Leak
- Content: Threat actor claims to be selling a government database from Argentina containing approximately 1.5 million personal and employment records. The compromised data includes names, document numbers, phone numbers, tax IDs (CUIL), email addresses, addresses, birth and death dates, civil status, occupation, employer details, family relationships, and healthcare affiliations.
- Date: 2025-08-04T04:26:48Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-1-5m-Argentina-Government-Data-Breach-Personal-and-Employment-Records-Exposed)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Argentina
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data leak of Chinese E-Commerce Platform
- Category: Data Leak
- Content: A threat actor claims to have leaked a Chinese e-commerce platform, leaking user transaction records with personal and gender-specific pricing details
- Date: 2025-08-04T04:19:53Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-1m-China-E-Commerce-Transaction-Records-with-Gender-and-Price-Details)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: China
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Breach of Germany E-Commerce Customers
- Category: Data Breach
- Content: The threat actor claims to have leaked a German e-commerce customer database with ~850k records, including full contact and banking details.
- Date: 2025-08-04T04:18:49Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-850k-Germany-E-Commerce-Customer-Database-Leak-with-Full-Contact-Details)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Germany
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Japanese comprehensive service providers database
- Category: Data Leak
- Content: The threat actor claims to be selling a database containing approximately 195,000 records related to Japanese comprehensive service providers, including geo-location details. The leaked data reportedly includes service provider names, phone numbers, website URLs, addresses, regions, categories, pricing, activity status, descriptions, and timestamps of insertion and update, along with multiple images.
- Date: 2025-08-04T04:17:28Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-195-000-Japan-Comprehensive-Service-Provider-Database-with-Geo-Location-Details)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Japan
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Breach of Chinese E-Commerce Platform
- Category: Data Breach
- Content: A threat actor claims to have breached a Chinese e-commerce platform, leaking user transaction records with personal and gender-specific pricing details
- Date: 2025-08-04T04:15:18Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-1m-China-E-Commerce-Transaction-Records-with-Gender-and-Price-Details)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: China
- Victim Industry: E-commerce & Online Stores
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Brazil Customer Database with Partial Vehicle Details
- Category: Data Leak
- Content: Threat actor claims to be selling a customer database from Brazil containing approximately 1.2 million records. The compromised data includes customer names, email addresses, phone numbers, city, state, messages, product or service information, creation dates, and partial vehicle details.
- Date: 2025-08-04T04:02:59Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-1-2m-Brazil-Customer-Database-with-Partial-Vehicle-Details)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Brazil
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of Employee Directory data from an unidentified Telecom firm in Bangladesh
- Category: Data Leak
- Content: The threat actor claims to be selling a leaked employee directory containing data on approximately 1.3 million individuals affiliated with the Bangladesh telecom sector. The exposed information reportedly includes names (first, middle, last), email addresses, dates of birth, gender, employment rank, status, affiliations, and multiple contact numbers (mobile, office, residential), along with physical addresses.
- Date: 2025-08-04T03:48:46Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-1-3M-Bangladesh-Telecom-Employee-Directory-Leak)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Bangladesh
- Victim Industry: Network & Telecommunications
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Argentina Healthcare Beneficiary Database
- Category: Data Leak
- Content: Threat actor claims to be selling a healthcare beneficiary database from Argentina containing full personal details of approximately 1.2 million individuals. The compromised data includes ID numbers, user IDs, document numbers, phone numbers, tax IDs (CUIL), health insurance details, gender, email addresses, names, addresses, date of birth, occupation, civil status, and other sensitive personal and medical information.
- Date: 2025-08-04T03:46:11Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-Selling-1-2m-Argentina-Healthcare-Beneficiary-Database-Leak-with-Full-Personal-Details)
- Screenshots:
- Threat Actors: dumpster
- Victim Country: Argentina
- Victim Industry: Hospital & Health Care
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Unauthorized Access to smart parking system
- Category: Initial Access
- Content: The threat actor claims to have breached a smart parking system operated by a Taiwanese government agency, gaining full control over its central infrastructure, including surveillance cameras, payment terminals, license plate databases, and financial records. According to the actor, data on over 3,000 vehicles—such as license plate numbers and entry/exit logs—was exfiltrated, along with detailed financial records including parking bills and payment methods. The system’s operations were allegedly disrupted, temporarily disabling entry and exit gates.
- Date: 2025-08-04T02:16:21Z
- Network: telegram
- Published URL: (https://t.me/n2LP_wVf79c2YzM0/775)
- Screenshots:
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: Taiwan
- Victim Industry: Government Administration
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Data Leak of French Citizens Records
- Category: Data Leak
- Content: The threat actor claims to have leaked a database containing detailed records of over 60,000 French citizens. The data includes names, emails, birthdates, addresses, phone numbers, and purchase history from a retail loyalty program.
- Date: 2025-08-04T01:32:08Z
- Network: openweb
- Published URL: (https://kittyforums.to/thread/783)
- Screenshots:
- Threat Actors: cacaboudin
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of California Driver’s License Records from Online Marijuana Store
- Category: Data Leak
- Content: A threat actor claims to have leaked a database containing approximately 750 verified users from an online marijuana store in California.
- Date: 2025-08-04T00:56:59Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263633/)
- Screenshots:
- Threat Actors: rassvettt
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Turkish credit card records
- Category: Data Leak
- Content: The threat actor claims to have leaked 2,588 Turkish credit card records, allegedly obtained through sniffing. The data includes card numbers, expiration dates, cardholder names, addresses, phone numbers, and emails.
- Date: 2025-08-04T00:55:22Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263630/)
- Screenshots:
- Threat Actors: Gualtieri
- Victim Country: Turkey
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of California Driver’s License Records from Online Marijuana Store
- Category: Data Leak
- Content: A threat actor claims to be selling access to a database of approximately 750 verified users from an online marijuana store in California.
- Date: 2025-08-04T00:54:46Z
- Network: openweb
- Published URL: (https://forum.exploit.in/topic/263633/)
- Screenshots:
- Threat Actors: rassvettt
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Dentalastec S.r.l.
- Category: Data Breach
- Content: The threat actor claims to have leaked the dentalastec.it database, exposing sensitive data including names, emails, phone numbers, locations, and professional roles of medical and dental professionals. The leak contains detailed personal information of hundreds of individuals.
- Date: 2025-08-04T00:27:22Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-dentalastec-it-DataBase-Leak)
- Screenshots:
- Threat Actors: RL000
- Victim Country: Italy
- Victim Industry: Medical Equipment Manufacturing
- Victim Organization: dentalastec s.r.l.
- Victim Site: dentalastec.it
- Alleged data leak of National Police Spain
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly linked to the Spanish National Police. reportedly contains information obtained from a scan of police websites.
- Date: 2025-08-04T00:26:08Z
- Network: openweb
- Published URL: (https://breachforums.hn/Thread-National-Police-Spain)
- Screenshots:
- Threat Actors: SySNet
- Victim Country: Spain
- Victim Industry: Law Enforcement
- Victim Organization: national police spain
- Victim Site: policia.es
- Alleged data breach of ixigo
- Category: Data Breach
- Content: The threat actor claims to be selling a database containing over 17 million user accounts allegedly associated with ixigo, The data, offered as an SQL file, reportedly includes user emails, MD5-hashed passwords, full names, genders, phone numbers, usernames, salutations, device information, social media profiles, and auth tokens.
- Date: 2025-08-04T00:08:05Z
- Network: openweb
- Published URL: (https://darkforums.st/Thread-DATABASE-ixigo-Database-Leaked-Download-2019)
- Screenshots:
- Threat Actors: Chucky_BF
- Victim Country: India
- Victim Industry: Hospitality & Tourism
- Victim Organization: ixigo
- Victim Site: ixigo.com
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches and leaks are prominent, affecting various sectors from education and gaming to healthcare and automotive, and impacting countries including Bangladesh, Mexico, Malaysia, India, Indonesia, France, Brazil, and Israel. The compromised data ranges from personal user information and credit card details to sensitive patient records, classified military components, and large customer databases. Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to banking systems, corporate networks (including RDWeb access to Canadian and UK firms), and even government and military infrastructure like the Royal Thai Air Force and Madrid’s irrigation system. The sale of malware, including penetration testing tools and DDoS tools, further underscores the availability of offensive capabilities in the cyber underground. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.