This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
- Alleged data leak of Kawamoto Pump Mfg. Co. Ltd.
- Category: Data Breach
- Content: The threat actor claims to have leaked the contact database of Kawamoto Pump Mfg. Co. Ltd. The compromised data includes detailed contact records such as contact names (in both Kanji and Kana), company types, company names, sections, groups, postal codes, prefectures, addresses, phone numbers, mobile numbers, emails, sales channels, and notes related to product inquiries.
- Date: 2025-08-05T14:27:16Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Kawamoto-Pump-Mfg-Co-Ltd-kawamoto-global-com-Leaked-Download
- Screenshots:
- Threat Actors: N1KA
- Victim Country: Japan
- Victim Industry: Oil & Gas
- Victim Organization: kawamoto pump mfg.co. ltd.
- Victim Site: kawamoto-global.com
- Alleged data sale of Hotel Regina Isabella
- Category: Data Breach
- Content: The threat actor claims to be selling the database of Hotel Regina Isabella, a luxury resort located in Ischia, Italy. The compromised files include EU, US, and Middle Eastern passports, Italian ID cards, and various other national identification documents, along with over 30,000 high-resolution scans and photographs of guest identity documents.
- Date: 2025-08-05T14:14:44Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Hotel-Regina-Isabella-%E2%80%93-30K-Passport-ID-Photos-from-Guests-2025
- Screenshots:
- Threat Actors: mydocs
- Victim Country: Italy
- Victim Industry: Hospitality & Tourism
- Victim Organization: hotel regina isabella
- Victim Site: reginaisabella.com
- Alleged data sale of Portals Hills Boutique Hotel
- Category: Data Breach
- Content: The threat actor claims to be selling the database of Portals Hills Boutique Hotel. The compromised files include EU, UK, and US passports, Spanish DNI cards, Netherlands IDs, and various other national identification documents and 6,300 high-quality scans and photographs of guest identity documents.
- Date: 2025-08-05T14:14:37Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-SPAIN-Hills-Boutique-Mallorca-%E2%80%93-6-3K-Guest-Passport-ID-Scans-2025
- Screenshots:
- Threat Actors: mydocs
- Victim Country: Spain
- Victim Industry: Hospitality & Tourism
- Victim Organization: portals hills boutique hotel
- Victim Site: portals-hills.com
- Alleged data leak of Hemvati Nandan Bahuguna Garhwal University (HNBGU)
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Hemvati Nandan Bahuguna Garhwal University (HNBGU). The compromised database reportedly contains sensitive information related to students, lecturers, and other associated personnel.
- Date: 2025-08-05T14:14:32Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-Hemvati-Nandan-Bahuguna-Garhwal-University-HNBGU
- Screenshots:
- Threat Actors: MCZ
- Victim Country: India
- Victim Industry: Education
- Victim Organization: hemvati nandan bahuguna garhwal university (hnbgu)
- Victim Site: online.hnbgu.ac.in
- Alleged leak of German Personal and Banking Data
- Category: Data Leak
- Content: The threat actor claims to have leaked 20,000 lines of German personal data, including IBAN details from various banks.
- Date: 2025-08-05T13:48:37Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-AUGUST-2025-VERY-FRESH-GERMAN-FULL-DATA-WITH-IBAN-MIXED-BANKS
- Screenshots:
- Threat Actors: mikespinter
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Zemleteka
- Category: Data Breach
- Content: The threat actor caims to have leaked the database of Zemleteka. The data includes fields such as user ID, username, password hashes, cache passwords, account status, access groups, session information, and account creation timestamps.
- Date: 2025-08-05T13:48:30Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-Russian-database-free-of-site-zemleteka-ru
- Screenshots:
- Threat Actors: Sophia
- Victim Country: Russia
- Victim Industry: Real Estate
- Victim Organization: zemleteka
- Victim Site: zemleteka.ru
- Alleged data leak of South Korean Integrated Engine Test Facility
- Category: Data Leak
- Content: The threat actor claims to have leaked 1,200 files from the operational database of the South Korean Integrated Engine Test Facility. The compromised data includes detailed safety protocols, personnel requirements, engine installation and removal procedures, and fire safety guidelines.
- Date: 2025-08-05T13:48:25Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-SOUTH-KOREAN-DATABASE
- Screenshots:
- Threat Actors: YANZXPLOIT
- Victim Country: South Korea
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of 10,333 Mixed Email Access Accounts
- Category: Data Leak
- Content: The threat actor claims to be selling a batch of 10,333 email accounts with valid access credentials.
- Date: 2025-08-05T13:47:31Z
- Network: openweb
- Published URL: https://leakbase.la/threads/10-333-mixed-good-mail-access-domains.41177/
- Screenshots:
- Threat Actors: cidiia
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of National Authority for Sanitation and Safety in Fisheries and Aquaculture (SANIPES)
- Category: Data Breach
- Content: The threat actor claims to have leaked 4277 files from the database of National Authority for Sanitation and Safety in Fisheries and Aquaculture (SANIPES). The compromised data includes Payments, internal entity documents, audit reports.
- Date: 2025-08-05T13:24:58Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Document-SANIPES-PERU-LEAK-DOCUMENTS-2025
- Screenshots:
- Threat Actors: Gatito_FBI_Nz
- Victim Country: Peru
- Victim Industry: Fishery
- Victim Organization: national authority for sanitation and safety in fisheries and aquaculture (sanipes)
- Victim Site: sanipes.gob.pe
- Alleged leak of user credential of KTC
- Category: Initial Access
- Content: Group claims to have leaked the user credentials of KTC
- Date: 2025-08-05T13:22:43Z
- Network: telegram
- Published URL: https://t.me/unknowsec1/48
- Screenshots:
- Threat Actors: UnknowSEC
- Victim Country: Thailand
- Victim Industry: Financial Services
- Victim Organization: ktc
- Victim Site: ktc.co.th
- Alleged data sale of BKADEMY Corporation
- Category: Data Breach
- Content: The threat actor claims to be selling a dataset of 27,000 records from BKADEMY Corporation, a major Vietnamese company. The data includes email addresses, names, and phone numbers.
- Date: 2025-08-05T12:50:40Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-SELLING-27k-VIETNAM-https-bkademy-vn-Teacher-student-data
- Screenshots:
- Threat Actors: Moon_WALK
- Victim Country: Vietnam
- Victim Industry: Education
- Victim Organization: bkademy corporation
- Victim Site: bkademy.vn
- Alleged data sale of Gopify-HRM+
- Category: Data Breach
- Content: The threat actor claims to be selling a dataset of 11,000 records from Gopify-HRM+, a major Vietnamese company. The data includes email addresses, names, and phone numbers.
- Date: 2025-08-05T12:50:17Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-SELLING-11K-VIETNAM-https-gopify-tech
- Screenshots:
- Threat Actors: Moon_WALK
- Victim Country: Vietnam
- Victim Industry: Human Resources
- Victim Organization: gopify-hrm+
- Victim Site: gopify.tech
- Alleged data sale of Australian Business leads
- Category: Data Leak
- Content: The threat actor claims to be selling a database containing 610,000 Australian business leads. The dataset reportedly includes detailed business information such as Australian company numbers, principals, emails, former names, Australian business numbers, trading names, websites, business names, phone numbers, addresses, states, postcodes, and registration status.
- Date: 2025-08-05T12:50:10Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-SELLING-610k-AUSTRALIA-BUSINESS-LEADS-DATA
- Screenshots:
- Threat Actors: Moon_WALK
- Victim Country: Australia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of FPT Corporation
- Category: Data Breach
- Content: The threat actor claims to be selling a dataset of 95,060 records from FPT Corporation, a major Vietnamese company. The data includes email addresses, names, and phone numbers.
- Date: 2025-08-05T12:49:09Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-SELLING-95k-Vietnam-https-fpt-com
- Screenshots:
- Threat Actors: Moon_WALK
- Victim Country: Vietnam
- Victim Industry: Information Technology (IT) Services
- Victim Organization: fpt corporation
- Victim Site: fpt.com
- Alleged data leak of an unidentified university in Uzbekistan
- Category: Data Leak
- Content: The threat actor claims to have leaked student database from an unidentified university in Uzbekistan dated 2023. The dataset reportedly contains over 30,000 entries including full names, passport numbers, phone numbers, email addresses, course details, and admission dates.
- Date: 2025-08-05T12:24:04Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-Student-Database-from-Uzbekistan-University-2023
- Screenshots:
- Threat Actors: snus
- Victim Country: Uzbekistan
- Victim Industry: Education
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Rapid Flyer
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing 2 million records from Rapid Flyer. The data reportedly includes personal and business information such as first name, last name, company, email, password (likely hashed), date of birth, registration date, total paid, addresses, postal codes, city, phone numbers (fixed and mobile), VAT number, and DNI.
- Date: 2025-08-05T12:23:56Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-2-Million-Rapid-Flyr-com-database
- Screenshots:
- Threat Actors: DigitalGhostt
- Victim Country: France
- Victim Industry: Printing
- Victim Organization: rapid flyer
- Victim Site: rapid-flyr.com
- Alleged Data Leak of Hang Seng Investment Clients
- Category: Data Breach
- Content: The threat actor claims to have leaked a database allegedly associated with Hang Seng Investment Management, a financial services firm based in Hong Kong. The exposed data appears to include personally identifiable information (PII) such as phone numbers (starting with +852), customer names, investment categories, and product types—many of which are related to funds, bonds, and equity investments.NB: The authenticity of the post is not verified
- Date: 2025-08-05T12:08:49Z
- Network: telegram
- Published URL: https://t.me/aqj986/6631
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: China
- Victim Industry: Financial Services
- Victim Organization: hang seng investment management
- Victim Site: hangsenginvestment.com
- Alleged Data Leak of FOREX.com
- Category: Data Breach
- Content: The threat actor claims to have leaked a database allegedly tied to FOREX.com, a major online trading platform. The exposed data appears to contain personally identifiable information (PII) of customers, including names, email addresses, phone numbers, locations, account types, traded instruments (such as crude oil and gold), and transaction dates.NB: The authenticity of the post is not verified
- Date: 2025-08-05T12:04:51Z
- Network: telegram
- Published URL: https://t.me/aqj986/6630
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: forex.com
- Victim Site: forex.com
- Alleged data breach of Robinhood
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Robinhood.NB: The authenticity of the claim is yet to be verified.
- Date: 2025-08-05T11:57:06Z
- Network: telegram
- Published URL: https://t.me/aqj986/6627
- Screenshots:
- Threat Actors: Aiqianjin
- Victim Country: UK
- Victim Industry: Financial Services
- Victim Organization: robinhood
- Victim Site: robinhood.com
- Alleged data leak of Kyungsung University
- Category: Data Breach
- Content: The threat actor claims to have leaked 166MB of data from Kyungsung University in South Korea.
- Date: 2025-08-05T11:44:05Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-Kyungsung-University-Intranet-database
- Screenshots:
- Threat Actors: Godskull
- Victim Country: South Korea
- Victim Industry: Education
- Victim Organization: kyungsung university
- Victim Site: ks.ac.kr
- Alleged data leak of Indonesian Pediatricians Association
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of Indonesian Pediatrician Association. The leaked data reportedly includes sensitive personal documents such as KTP (Indonesian ID cards), Izasah cards, and IDAI Membership pledge cards.
- Date: 2025-08-05T11:44:00Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Ikatan-Dokter-Anak-Indonesia-idai-or-id
- Screenshots:
- Threat Actors: N1KA
- Victim Country: Indonesia
- Victim Industry: Hospital & Health Care
- Victim Organization: indonesian pediatricians association
- Victim Site: idai.or.id
- Alleged Data Leak of Instagram
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing approximately 9.3 million records allegedly related to Instagram.
- Date: 2025-08-05T11:26:30Z
- Network: openweb
- Published URL: https://leakbase.la/threads/instagram-com-9-3m-by-qcloudcombo.41171/
- Screenshots:
- Threat Actors: r3zz
- Victim Country: USA
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: instagram
- Victim Site: instagram.com
- Alleged data breach of OriGene
- Category: Data Breach
- Content: The group claims to have obtained data from the organization.
- Date: 2025-08-05T11:24:23Z
- Network: tor
- Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/1742838557/overview
- Screenshots:
- Threat Actors: Worldleaks
- Victim Country: USA
- Victim Industry: Biotechnology
- Victim Organization: origene
- Victim Site: origene.com
- Alleged Data Leak of SF Express
- Category: Data Breach
- Content: The threat actor claims to have leaked a partial database allegedly related to SF Express, a major Chinese multinational delivery and logistics company
- Date: 2025-08-05T11:21:56Z
- Network: openweb
- Published URL: https://leakbase.la/threads/sf-express-com-china-cn-partial.41169/
- Screenshots:
- Threat Actors: Hackit
- Victim Country: China
- Victim Industry: Transportation & Logistics
- Victim Organization: sf express
- Victim Site: sf-express.com
- Alleged data leak of Ho Chi Minh City University of Foreign Languages and Information Technology (HUFLIT)
- Category: Data Breach
- Content: The threat actor claims to have leaked a database from Ho Chi Minh City University of Foreign Languages and Information Technology (HUFLIT). The dataset reportedly contains detailed personal and academic information of students, including student IDs, passwords, full names, images, birth details, ethnicity, religion, addresses, contact information, family details, enrollment data, academic performance, study status, and other related fields.
- Date: 2025-08-05T11:16:49Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-Website-huflit-edu-vn
- Screenshots:
- Threat Actors: Ls1jWohGKtwY0iZ2yU
- Victim Country: Vietnam
- Victim Industry: Education
- Victim Organization: ho chi minh city university of foreign languages and information technology (huflit)
- Victim Site: huflit.edu.vn
- Alleged data sale of Italian leads
- Category: Data Leak
- Content: The threat actor claims to be selling a fresh database of over 200,000 leads from Italy. The data reportedly includes phone numbers, names or company names, and addresses.
- Date: 2025-08-05T11:16:43Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Italy-Leads-2025
- Screenshots:
- Threat Actors: whatsapp
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Ionos SMTP Accounts
- Category: Data Leak
- Content: The threat actor claims to be selling working SMTP/IMAP accounts allegedly linked to various Ionos domains, including ionos.de, ionos.fr, ionos.it, ionos.com, and ionos.co.uk
- Date: 2025-08-05T11:12:09Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263729/
- Screenshots:
- Threat Actors: Dsmith
- Victim Country: Germany
- Victim Industry: Information Technology (IT) Services
- Victim Organization: ionos
- Victim Site: ionos.de
- Alleged data of Erkent and Okçular village database
- Category: Data Leak
- Content: The threat actor claims to have leaked databases from Erkent and Okçular villages, containing 6,000 and 7,000 records respectively, including ID numbers, names, dates of birth, addresses, and other personal details.
- Date: 2025-08-05T10:57:37Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-Erkent-and-Ok%C3%A7ular-village-database
- Screenshots:
- Threat Actors: AKalite
- Victim Country: Turkey
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Sale of Full Ohio State Voter ID Database
- Category: Data Leak
- Content: The threat actor claims to be selling the complete voter ID database for the state of Ohio, USA.
- Date: 2025-08-05T10:57:21Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-FULL-OHIO-STATE-VOTER-ID-DATABASE
- Screenshots:
- Threat Actors: dsfhdsfjhsdfhjsfgsdfg
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Access Sale Involving State Data Agency of Lithuania
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized RDP access allegedly linked to the State Data Agency of Lithuania, a government institution responsible for national statistics.
- Date: 2025-08-05T10:57:07Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263710/
- Screenshots:
- Threat Actors: Saturned33
- Victim Country: Lithuania
- Victim Industry: Government Administration
- Victim Organization: state data agency of lithuania
- Victim Site: osp.stat.gov.lt
- SERVER KILLERS claims to target Denmark
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Denmark.
- Date: 2025-08-05T10:45:31Z
- Network: telegram
- Published URL: https://t.me/xServerKillers/140
- Screenshots:
- Threat Actors: SERVER KILLERS
- Victim Country: Denmark
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data sale of Takbet
- Category: Data Breach
- Content: The threat actor claims to be selling a user database from TAKBET, containing personal information of approximately 325,000 users. The compromised dataset is said to include user IDs, email addresses, usernames, full names, IP addresses, mobile numbers, and gender details. Sample records show registration IPs and Iranian mobile numbers linked to identifiable individuals.
- Date: 2025-08-05T10:15:42Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-TAKBET-Biggest-online-Casino-database-in-IRAN
- Screenshots:
- Threat Actors: payisano
- Victim Country: Iran
- Victim Industry: Gambling & Casinos
- Victim Organization: takbet
- Victim Site: takbet.com
- Alleged sale of Crypto and Social Media Mobile Number Checker
- Category: Data Leak
- Content: The threat actor claims to be selling Mobile number checker having capabilities across multiple platforms, including major cryptocurrency exchanges and social media services. The service allegedly checks if a number is registered on platforms such as Binance, Bybit, OKX, Coinbase, KuCoin, CoinW, Gate.io, HTX, and Bitunix, along with WhatsApp, Telegram, Instagram, Facebook, Twitter, LinkedIn, Skype, Viber, TikTok, Amazon, and more.
- Date: 2025-08-05T10:15:35Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-Mobile-phone-number-checker–22057
- Screenshots:
- Threat Actors: 1688shuju
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of 80 million Telegram users
- Category: Data Leak
- Content: The threat actor claims to have leaked a massive Telegram user database containing personal details of approximately 80 million accounts. The data appears to include fields such as account ID, phone number, username, first name, and last name.
- Date: 2025-08-05T10:04:36Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-80-MILION-TELEGRAM-ACCOUNT
- Screenshots:
- Threat Actors: YANZXPLOIT
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged leak of vulnerability in Izzi Telecom
- Category: Vulnerability
- Content: The threat actor claims to have discovered an SQL Injection vulnerability in the login and password recovery section of Izzi Telecom. The vulnerability can be tested using Burp Suite to intercept the request, which is then passed to SQLMap for exploitation. While the user was unable to extract database tables—potentially due to a SQLMap-related bug—they shared technical steps and a screenshot (via Imgur) for others to replicate or investigate further.
- Date: 2025-08-05T10:04:00Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-SQL-Injection-Vulnerability-in-Mexican-ISP
- Screenshots:
- Threat Actors: v3nuzc0d3r2325
- Victim Country: Mexico
- Victim Industry: Network & Telecommunications
- Victim Organization: izzi telecom
- Victim Site: izzi.mx
- Alleged sale of Indonesian teachers data
- Category: Data Leak
- Content: The threat actor claims to be selling a database allegedly containing the full personal details of 2.7 million Indonesian teachers, sourced from a 2025 breach of an education server. The leaked dataset reportedly includes sensitive information such as National ID (KTP), Family Card Number (KK), Civil Servant ID (NIP), Taxpayer Number (NPWP), full home addresses, active phone numbers, personal emails, and complete education history.
- Date: 2025-08-05T10:03:44Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-SELL-2-7M-Indonesian-Teachers-Full-Dox-Database-KTP-KK-NIP-NPWP-Address-Phone-Email
- Screenshots:
- Threat Actors: Admiral1337
- Victim Country: Indonesia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data leak of Actual Design
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of Actual Design, containing personally identifiable information of users which includes email IDs, usernames, display names, and user credentials such as WordPress-style hashed passwords and activation keys.
- Date: 2025-08-05T09:08:36Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-Russian-database-free-of-site%C2%A0-actual-d-ru
- Screenshots:
- Threat Actors: Sophia
- Victim Country: Russia
- Victim Industry: Furniture
- Victim Organization: actual design
- Victim Site: actual-d.ru
- Alleged data leak of WebFerma
- Category: Data Breach
- Content: The threat actor claims to have leaked a user database of WebFerma, reportedly includes usernames, email addresses, display names, WordPress-style hashed passwords, and user activation keys.
- Date: 2025-08-05T09:08:27Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Russian-database-free-of-site-webferma-com
- Screenshots:
- Threat Actors: Sophia01
- Victim Country: Russia
- Victim Industry: Agriculture & Farming
- Victim Organization: webferma
- Victim Site: webferma.com
- Alleged data leak of Pam65.ru
- Category: Data Breach
- Content: The threat actor claims to have leaked a database of Pam65.ru, exposing personally identifiable user data. The dataset reportedly contains full names, birth dates, email addresses, usernames, hashed passwords, cities, and phone numbers. Some records include login credentials, with locations spanning various cities across Russia and nearby regions.
- Date: 2025-08-05T09:08:21Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-Russian-database-free-of-site-pam65-ru
- Screenshots:
- Threat Actors: Sophia01
- Victim Country: Russia
- Victim Industry: Luxury Goods & Jewelry
- Victim Organization: pam65.ru
- Victim Site: pam65.ru
- Alleged data leak of Motorcycle MOTOshop.UA
- Category: Data Breach
- Content: The threat actor claims to have leaked the database of Motorcycle MOTOshop.UA, which contains customer names, emails, billing and shipping addresses, order amounts, and credit card information.
- Date: 2025-08-05T08:19:15Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-Ukraine-database-free-of-site-motoshop-ua
- Screenshots:
- Threat Actors: Sophia
- Victim Country: Ukraine
- Victim Industry: E-commerce & Online Stores
- Victim Organization: motorcycle motoshop.ua
- Victim Site: motoshop.ua
- Alleged Data Breach of River Crypto Exchange
- Category: Data Breach
- Content: The threat actor claims to have leaked the full database of River, a crypto exchange, exposing data of 11,000+ users.
- Date: 2025-08-05T06:21:15Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-DATABASE-River-crypto-exchange-wallet-full-database
- Screenshots:
- Threat Actors: Manik123
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: river crypto exchange
- Victim Site: river.com
- Alleged sale of RD web access to an unidentified USA company
- Category: Initial Access
- Content: The threat actor is offering to sell unauthorized RD Web access to an unidentified USA company.
- Date: 2025-08-05T06:13:48Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263707/
- Screenshots:
- Threat Actors: ProfessorKliq
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Unauthorized access to an Unidentified Organization in France
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized access to an Unidentified Organization in France.
- Date: 2025-08-05T05:46:02Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263706/
- Screenshots:
- Threat Actors: Big-Bro
- Victim Country: France
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged sale of Critical Vulnerability which affects Türk Telekom
- Category: Vulnerability
- Content: The threat actor claims to be selling a critical vulnerability affecting Türk Telekom’s Online Services portal, potentially exposing data of 28 million customers. According to the post, knowing just a target’s phone number allegedly allows an attacker to log in as the user and access or modify personal details. This includes the victim’s full name, national ID number, detailed address, modem details (including password changes), phone numbers under the account, and internet usage records.
- Date: 2025-08-05T05:45:53Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-T%C3%BCrk-Telekom-Critical-Vulnerability-28M-Customer-at-Risk
- Screenshots:
- Threat Actors: masterseller
- Victim Country: Turkey
- Victim Industry: Network & Telecommunications
- Victim Organization: türk telekom
- Victim Site: turktelekom.com.tr
- Alleged data breach of Nova Medical Center
- Category: Data Breach
- Content: The threat actor claims to be selling a medical database from Nova Medical Center, a network of diagnostic centers in Kazakhstan. The dataset reportedly contains 311,000 records dated August 2, 2025, and includes sensitive information such as ID numbers, full names, phone numbers, cities, IINs (Individual Identification Numbers), dates of birth, appointment details, doctor names, services provided, comments, prices, and payment statuses. The data is offered in CSV format
- Date: 2025-08-05T05:02:39Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-nova-med-kz-Kazakhstan-medical-database
- Screenshots:
- Threat Actors: scorpion1337
- Victim Country: Kazakhstan
- Victim Industry: Hospital & Health Care
- Victim Organization: nova medical center
- Victim Site: nova-med.kz
- Alleged sale of unauthorized access to an unidentified us bank account
- Category: Initial Access
- Content: The threat actor claims to be selling full access to a U.S. bank account that can withdraw $5 billion.
- Date: 2025-08-05T04:44:31Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Bank-account-for-a-prince-from-an-Arab-country
- Screenshots:
- Threat Actors: darksou
- Victim Country: USA
- Victim Industry: Banking & Mortgage
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Unauthorized Access to Multiple Unidentified Organizations in Ukraine
- Category: Initial Access
- Content: A threat actor has allegedly gained unauthorized access in a significant breach impacting two major Ukrainian retail chains—one specializing in electronics and the other in footwear—each with 15 to 20 physical store locations. The breach, reportedly facilitated through a shared systems administrator, resulted in the total and irreversible loss of critical network infrastructure. Affected components include core switches, routers, servers, employee VPNs, surveillance systems, and 1C accounting platforms.
- Date: 2025-08-05T04:41:13Z
- Network: telegram
- Published URL: https://t.me/WeAreKillnet_Channel/236?single
- Screenshots:
- Threat Actors: WE ARE KILLNET
- Victim Country: Ukraine
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Don Bosco Job Placement Network
- Category: Data Breach
- Content: The threat actor claims to have leaked the source code and admin panel data from the Don Bosco Job Placement Network. The exposed information appears to be a backend user management system or database, containing records of 23 users including their names, mobile numbers, email addresses, usernames, and plaintext passwords. These users include regional coordinators from locations such as Goa, Pune, Chennai, Hyderabad, and Bengaluru, as well as database and program managers.
- Date: 2025-08-05T04:26:03Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Source-Code-DON-BOSCO-JOB-PLACEMENT-NETWORK-BY-OHKA21
- Screenshots:
- Threat Actors: OHKA21
- Victim Country: India
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: don bosco jobs
- Victim Site: donboscojobs.org
- Alleged data breach of Kaohsiung Medical University
- Category: Data Breach
- Content: The threat actor claims to have breached Kaohsiung Medical University and leaked a 64.4 MB database, sharing CMS content from 2015.
- Date: 2025-08-05T03:59:51Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-taiwan-Kmu-university-kmu-edu-tw-database-Leaked-Download
- Screenshots:
- Threat Actors: Godskull
- Victim Country: Taiwan
- Victim Industry: Higher Education/Acadamia
- Victim Organization: kaohsiung medical university
- Victim Site: kmu.edu.tw
- Alleged leak of Pakistan police data
- Category: Data Leak
- Content: A threat actor claims to have obtained sensitive data belonging to approximately 130,000 Pakistani police personnel. The information reportedly includes high-level details such as membership records and population identification cards.
- Date: 2025-08-05T02:24:37Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-130K-Police-Pakistani-data
- Screenshots:
- Threat Actors: DigitalGhostt
- Victim Country: Pakistan
- Victim Industry: Law Enforcement
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged unauthorized access to StoriesBuzz
- Category: Initial Access
- Content: The threat actor claims to have gained unauthorized access to the control panel and internal email of StoriesBuzz, a British media company supporting the Zionist entity.
- Date: 2025-08-05T02:08:57Z
- Network: telegram
- Published URL: https://t.me/hak993/4011
- Screenshots:
- Threat Actors: Fatimion cyber team
- Victim Country: UK
- Victim Industry: Media Production
- Victim Organization: storiesbuzz
- Victim Site: Unknown
- Alleged sale of RD Web access to a French Mechanical Parts Company
- Category: Initial Access
- Content: The Threat actor is offering to sell RD Web access to a French Mechanical Parts Company.
- Date: 2025-08-05T01:49:46Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/263701/
- Screenshots:
- Threat Actors: K3MP3R
- Victim Country: France
- Victim Industry: Mechanical or Industrial Engineering
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged data breach of Krisp
- Category: Data Breach
- Content: The threat actor claims to be selling legacy marketing and contact data allegedly sourced from the South African website Krisp. The exposed dataset appears to originate from a customer relationship management (CRM) or email marketing system used around 2009–2010. The records contain names, phone numbers, email addresses, physical addresses, and promotional content. Entities mentioned include SACD, Brilliant Ballustrades, and Gigga Construction
- Date: 2025-08-05T01:46:58Z
- Network: openweb
- Published URL: https://breachforums.hn/Thread-DATABASE-krisp-org-za-South-Africa
- Screenshots:
- Threat Actors: r57
- Victim Country: South Africa
- Victim Industry: Biotechnology
- Victim Organization: krisp
- Victim Site: krisp.org.za
- TEAM BD CYBER NINJA targets the website of Amanda Spann
- Category: Defacement
- Content: The Group claims to have defaced website of Amanda Spann in USA.mirror id: https://defacer.id/mirror/id/176113
- Date: 2025-08-05T01:36:24Z
- Network: telegram
- Published URL: https://t.me/c/2594876836/85
- Screenshots:
- Threat Actors: TEAM BD CYBER NINJA
- Victim Country: USA
- Victim Industry: Management Consulting
- Victim Organization: amanda spann
- Victim Site: amandaspann.com
- Alleged data breach of Sovcombank
- Category: Data Breach
- Content: The threat actor has claimed a massive data breach involving Sovcombank, a major private Russian bank. The actor alleges possession of a 140 million user database spanning from 2019 to 2025, totaling 80GB in CSV format. The leaked data reportedly includes full names, dates and places of birth, phone numbers, emails, passport details (series, numbers, issuing authority, and issue dates), home addresses, marital status, spouse and contact information, and pension data.
- Date: 2025-08-05T01:31:57Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-140-Million-Sovkom-Bank-User-Database-2019-2025
- Screenshots:
- Threat Actors: DigitalGhostt
- Victim Country: Russia
- Victim Industry: Banking & Mortgage
- Victim Organization: sovcombank
- Victim Site: sovcombank.ru
- TEAM BD CYBER NINJA targets the website of Amanda Spann
- Category: Defacement
- Content: The Group claims to have defaced website of Amanda Spann in USA.
- Date: 2025-08-05T01:30:52Z
- Network: telegram
- Published URL: https://t.me/c/2594876836/85
- Screenshots:
- Threat Actors: TEAM BD CYBER NINJA
- Victim Country: USA
- Victim Industry: Management Consulting
- Victim Organization: amanda spann
- Victim Site: amandaspann.com
- Alleged Unauthorized Access to U.S. Oil & Gas Control System
- Category: Initial Access
- Content: A threat actor claiming to have leaked a database states that a critical oil and gas facility in the U.S. has been hacked, with full remote control over operations. They threaten that any state opposing China will face total infrastructure collapse, including power, water, and financial systems.
- Date: 2025-08-05T00:32:06Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/777
- Screenshots:
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: Unknown
- Victim Site: Unknown
- Alleged Unauthorized Access to U.S. Oil & Gas Control System
- Category: Initial Access
- Content: The threat actor claims to have breached a SCADA system at a major oil and gas facility in Texas, gaining access to critical infrastructure operations. They report control over oil and water storage tanks, well parameters (flow, pressure, temperature), and the ability to configure equipment such as valves, pumps, and controllers.
- Date: 2025-08-05T00:11:37Z
- Network: telegram
- Published URL: https://t.me/Z_alliance_ru/731
- Screenshots:
- Threat Actors: Z-ALLIANCE
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: Unknown
- Victim Site: Unknown
The cyber incidents detailed in this report reveal a diverse and active threat landscape. Data breaches and leaks are prominent, affecting various sectors from education, hospitality, and financial services to healthcare and manufacturing across countries including Japan, Italy, Spain, India, Indonesia, Russia, South Korea, Peru, Thailand, Vietnam, Australia, France, China, Uzbekistan, Germany, UK, Kazakhstan, Pakistan, Taiwan, and Ukraine1. The compromised data is wide-ranging, encompassing personal information, financial details (including credit card and IBAN numbers), sensitive identity documents (passports, national IDs), military-related data, and internal company documents2.
Beyond data compromise, the report highlights significant activity in initial access sales3. Threat actors are offering unauthorized access to a variety of systems, including corporate networks (RD Web access), government institutions (State Data Agency of Lithuania, Royal Thai Air Force), and critical infrastructure such as a U.S. oil and gas SCADA system and a Madrid irrigation system4. The availability and sale of vulnerabilities and malicious tools, such as an SQL Injection vulnerability in Izzi Telecom and various DDoS and penetration testing tools, further underscore the proliferation of offensive capabilities in the cyber underground5.
These incidents collectively demonstrate that organizations across all industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the availability of malicious tools6. The nature of these events emphasizes the critical importance of robust cybersecurity measures, including strong access controls, comprehensive data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks7.