[December-1-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.

  1. Alleged Data Breach of Bhuiyan Engineering
  1. Alleged Data Leak of BTC Owners Database
  1. Alleged Data Breach of Lumen Textile Mills Ltd.
  1. Alleged Data Breach of Madina Scale & Co
  1. Alleged Sale of Unauthorized FortiSSL VPN Access Across Multiple Countries
  1. Alleged Data Breach of Redsun
  1. Alleged Data Breach of The Relief
  1. Alleged Data Breach of Senior Finance Controller office
  1. Alleged Data Breach of Office of the Chief Accounts and Finance Officer, Ministry of Defence
  1. University Loft Co. falls victim to PLAY ransomware
  1. PHA Co.,LTD falls victim to PLAY ransomware
  1. South Island PSD falls victim to PLAY ransomware
  1. Clark/Sullivan Construction falls victim to PLAY ransomware
  1. Hall Aluminum Products falls victim to PLAY ransomware
  1. Aspen Distribution Inc falls victim to PLAY ransomware
  1. Alleged Data Leak of Credit Card Database in USA
  1. Alleged Sale of Unauthorized VPN and DA Access to a Colombian Corporate Company
  1. B dynamic Logistics falls victim to Qilin ransomware
  1. France terre d’asile falls victim to Qilin ransomware
  1. San Miguel Global falls victim to Qilin ransomware
  1. Alleged leak of ARGENTINA PERSONAL DATA
  1. Alleged Data Breach of CABoom Leads
  1. Industrial Steam falls victim to RansomHouse Ransomware
  1. Miller Wood Trade Publications falls victim to INC RANSOM Ransomware
  1. Wisconsin Knife Works Inc falls victim to Akira Ransomware
  1. Alleged sale of an exploit for CVE-2025-60709
  1. Alleged Sale of Canada Database
  1. VirtualWare Solutions falls victim to Qilin ransomware
  1. HASCO Hasenclever GmbH + Co KG falls victim to Qilin ransomware
  1. Martin & Company falls victim to Akira Ransomware
  1. Cleveland Construction, Inc. falls victim to Akira Ransomware
  1. Enea AB falls victim to INC RANSOM Ransomware
  1. Alleged data leak of ECS
  1. ASTROFEIN – Astro- und Feinwerktechnik Adlershof GmbH falls victim to RansomHouse Ransomware
  1. Alleged data sale of multiple Czech organizations
  1. HMEI7 targets the website of Marvel Logistics Pte Ltd
  1. S&R Insurance Services falls victim to Akira Ransomware
  1. M.D. Manouel Insurance Agency falls victim to Akira Ransomware
  1. HMEI7 targets the website of Colégio Boni Consilii
  1. Alleged data breach of e-Retail
  1. Goldenrod Corporation falls victim to Akira Ransomware
  1. Abhe & Svoboda, Inc. falls victim to Akira Ransomware
  1. TUAN LE CONSTRUCTION COMPANY LIMITED falls victim to RADAR group Ransomware
  1. Floyd targets the website of Strade.Global.
  1. Floyd targets the website of Wes Collective LLC
  1. INNOMOTIVE Solutions Group falls victim to Akira Ransomware
  1. NullSector targets the website of Paper Moon Printing Co., Inc.
  1. HAZARDOUS CYBER TEAM targets the website of Department of Mines & Geology (Rajasthan)
  1. Alleged unauthorized access to a French industrial distillation control system
  • Category: Initial Access
  • Content: A group claims to have obtained unauthorized remote access to an industrial control system in France. The system reportedly manages key distillation parameters, including gas flow, temperature, timing, and recipe selection.
  • Date: 2025-12-01T10:36:43Z
  • Network: telegram
  • Published URL: https://t.me/c/2787466017/775
  • Screenshots: https://d34iuop8pidsy8.cloudfront.net/352e11f1-d94c-47ce-81e9-c9d34655eefe.png
  • Threat Actors: NoName057(16)
  • Victim Country: France
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown
  1. Alleged data breach of Civil Aviation Authority of Nepal
  • Category: Data Breach
  • Content: The group claims to have leaked data from Civil Aviation Authority of Nepal, compromised database contains airports and immigration details.
  • Date: 2025-12-01T10:34:17Z
  • Network: telegram
  • Published URL: https://t.me/ctrl_nepal/266
  • Screenshots: https://d34iuop8pidsy8.cloudfront.net/a0e33961-e5c1-4f48-84db-db9ab28fa8e1.png
  • Threat Actors: GenZRisingNepal
  • Victim Country: Nepal
  • Victim Industry: Airlines & Aviation
  • Victim Organization: civil aviation authority of nepal
  • Victim Site: caanepal.gov.np
  1. Bpost falls victim to TridentLocker Ransomware
  1. NullSector targets the website of AK Holdings
  1. scattered LAPSUS$ hunters 7.0 claims to target Adarma
  1. Alleged data breach of DeMi Group
  1. Rose Displays falls victim to GENESIS ransomware
  1. NullSector targets the website of ICON Shirt Company
  1. Alleged leak of login credentials to MAKE Labs
  1. Data Enterprises of the Northwest falls victim to GENESIS ransomware
  1. DEVMAN 2.0 ransomware group adds an unknown victim (m*ttcar**.**.it)
  1. Curtis Investment Group, Inc. falls victim to GENESIS Ransomware
  1. PETRO Environmental, LLC falls victim to GENESIS Ransomware
  1. DEVMAN 2.0 ransomware group adds an unknown victim ( afo.us)
  1. PJSI Consultants Sdn Bhd falls victim to GENESIS Ransomware
  1. New Horizons Medical falls victim to DEVMAN 2.0 Ransomware
  1. Easterseals Arc of Northeast Indiana falls victim to DEVMAN 2.0 Ransomware
  1. Abdulhadi Hospital falls victim to DEVMAN 2.0 Ransomware
  1. NullSector targets the website of tlacma.sk
  1. Soderstrom Architects falls victim to RansomHouse Ransomware
  1. NullSector targets the website of Reggaly.co
  1. NullSector targets the website of DESIGN PRINTING LA
  1. NullSector targets the website of Memberfyi Agency
  1. NoName targets the website of AXA
  1. HollySys Automation Technologies falls victim to CRYPTO24 Ransomware
  1. NullSector targets the website of AMGOK
  1. Alleged data breach of Dutch telecom company KPN N.V
  1. ./meicookies targets the website of Nurse Researchers Society for Innovations (NRSI)
  1. 404 crew cyber team targets the website of Nurturing Angels Home Care
  1. 404 crew cyber team targets the website of Rising Stars Academy of Cheer & Dance
  1. Alleged sale of unauthorized email sending access to cryptocurrency project domain
  1. BekasiRootSec targets the website of South Salmara College
  1. ./meicookies targets the website of PT. Nusantara Duasatu Telematika
  1. SHADOWX targets the website of Antva
  1. Alleged data breach of virtualbet online betting platform
  1. Alleged Unauthorized Access to Taiwan-Based VNC Environmental Control Server
  • Category: Initial Access
  • Content: The group claims to have discovered an unauthenticated VNC server in Taiwan, exposing a critical environmental monitoring and camera control system. According to the group, the server runs an outdated RFB 003.007 version on port 5900 with no authentication, leaving it open to CVE-2006-2450, replay attacks, and MITM risks. They allege that the system controls temperature, humidity, and visual surveillance inside a sensitive facility.
  • Date: 2025-12-01T04:53:43Z
  • Network: telegram
  • Published URL: https://t.me/n2LP_wVf79c2YzM0/2629
  • Screenshots: https://d34iuop8pidsy8.cloudfront.net/6120bb2b-a37b-4361-b65a-804b5bf348df.png
  • Threat Actors: Infrastructure Destruction Squad
  • Victim Country: Taiwan
  • Victim Industry: Unknown
  • Victim Organization: Unknown
  • Victim Site: Unknown
  1. Terror targets the website of Abra State Institute of Sciences and Technology (ASIST)
  1. Alleged Leak of corporate data from France
  1. Casa McDonald’s targets the website of CAPTA+
  1. KAL EGY 319 targets the website of SPB Crackers
  1. KAL EGY 319 targets the website of Sri Amirtha Crackers
  1. KAL EGY 319 targets the website of Sri Ayyanar Crackers
  1. Alleged sale of unauthorized access to multiple unidentified online shops in multiple countries
  1. KAL EGY 319 targets the website of National Office of Village Murukku
  1. KAL EGY 319 targets the website of Sri Ayyappa Crackers
  1. KAL EGY 319 targets the website of Sri Rajaguru Traders
  1. KAL EGY 319 target the website of Vel Sivakasi Crackers
  1. KAL EGY 319 targets the website of Sri Udhaya Anitha Crackers
  1. Alleged data leak of unidentified Italian regional healthcare booking system
  • Category: Initial Access
  • Content: Threat actor claims to have leaked data from a regional healthcare booking system in Northern Italy, allegedly exposing personal records of Italian citizens. The compromised information reportedly includes full names, birth dates, birthplaces, gender, email addresses, phone numbers, and national insurance numbers
  • Date: 2025-12-01T01:45:46Z
  • Network: openweb
  • Published URL: https://forum.exploit.biz/topic/271075/
  • Screenshots: https://d34iuop8pidsy8.cloudfront.net/84060975-8469-4acd-98d4-f4c1ba96e1d4.png
  • Threat Actors: wizgun
  • Victim Country: Italy
  • Victim Industry: Hospital & Health Care
  • Victim Organization: Unknown
  • Victim Site: Unknown
  1. KAL EGY 319 targets the website of National Office of VS Crackers
  1. KAL EGY 319 targets the website of National Office of Sri Lakshmi Priya Traders
  1. KAL EGY 319 target the website of Village Murukku
  1. KAL EGY 319 targets the website of Sivanesh Crackers
  1. KAL EGY 319 targets the website of Sivakasi Siva Crackers
  1. KAL EGY 319 targets the website of Sivakasi Vetri Velan Crackers
  1. KAL EGY 319 targets the website of National Office of Sms Pyrotech
  1. Alleged data breach of Scalextric España
  1. KAL EGY 319 target the website of Apache Software Foundation (ASF)
  1. Alleged data breach of CDUPS Korea

Conclusion

The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches, Ransomware, and Defacements are prominent, affecting various sectors from Engineering and Textiles to Government, Finance, and Retail, and impacting countries including Bangladesh, USA, South Korea, France, Argentina, India, and Australia. The compromised data ranges from personal user information and credit card details to sensitive patient records and corporate databases. Beyond data compromise, the report also reveals significant activity in initial access sales, with threat actors offering unauthorized access to corporate networks and even industrial control systems. The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools.