This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
1. Alleged Data Breach of form-vl
- Category: Data Breach
- Content: The threat actor claims to have leaked data from form-vl. The compromised data reportedly includes full names, email addresses, phone numbers, hashed passwords, IP addresses, and registration timestamps.
- Date: 2025-12-17T23:50:49Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-DATABASE-FREE-RUSSIAN-DATABASE-form-vl-ru
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f17a7854-0124-41c9-91c8-98ce86f4be52.png
- Threat Actors: trashfunny
- Victim Country: Russia
- Victim Industry: Furniture
- Victim Organization: form-vl.ru
- Victim Site: form-vl.ru
2. Cyb3r Drag0nz claims to target Ministry of Education (Iraq)
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Ministry of Education (Iraq)
- Date: 2025-12-17T23:38:19Z
- Network: telegram
- Published URL: https://t.me/c/2508606000/159
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/036be544-7035-48cb-99f1-75296fc3012a.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Education
- Victim Organization: ministry of education (iraq)
- Victim Site: moedu.gov.iq
3. Cyb3r Drag0nz claims to target Iraqi counter-terrorism
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Iraqi counter-terrorism
- Date: 2025-12-17T23:33:04Z
- Network: telegram
- Published URL: https://t.me/c/2508606000/159
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e5fdf13d-2899-4259-a421-b1b61ee88a21.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Government Administration
- Victim Organization: counter-terrorism
- Victim Site: icts.gov.iq
4. Cyb3r Drag0nz claims to target Ministry of Interior (Iraq)
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Ministry of Interior (Iraq)
- Date: 2025-12-17T23:22:31Z
- Network: telegram
- Published URL: https://t.me/c/2508606000/161
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f6387d47-7749-4520-b50e-c2fcb2a86e94.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Government Administration
- Victim Organization: ministry of interior (iraq)
- Victim Site: moi.gov.iq
5. Cyb3r Drag0nz claims to target Rafidain Bank
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Rafidain Bank.
- Date: 2025-12-17T23:21:03Z
- Network: telegram
- Published URL: https://t.me/c/2508606000/161
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/664ab4a3-24f8-4d97-9e00-ec9340bfd78c.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Banking & Mortgage
- Victim Organization: rafidain bank
- Victim Site: rafidain-bank.gov.iq
6. ShinyHunters claims to target French Ministry of the Interior
- Category: Alert
- Content: A recent post by the group indicates that they are targeting French Ministry of the Interior.
- Date: 2025-12-17T23:09:43Z
- Network: telegram
- Published URL: https://t.me/ShinyCorporation/59
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/19ffe311-fde2-4f79-970c-c176ee5980a3.png
- Threat Actors: ShinyHunters
- Victim Country: France
- Victim Industry: Government Administration
- Victim Organization: french ministry of the interior
- Victim Site: interieur.gouv.fr
7. jokeir 07x targets the website of KAPA APE
- Category: Defacement
- Content: The group claims to have defaced the website of KAPA APE
- Date: 2025-12-17T22:49:20Z
- Network: telegram
- Published URL: https://t.me/DarK07xxxxxxx/360
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/545acad5-2ec2-482e-8e0b-1aca1afef94c.png
- Threat Actors: jokeir 07x
- Victim Country: Greece
- Victim Industry: E-commerce & Online Stores
- Victim Organization: kapa ape
- Victim Site: kapaepe.gr
8. Alleged leak of login access to Ubon Ratchathani Technical College
- Category: Initial Access
- Content: The group claims to have gained unauthorized access and leaked the login credentials to the administrator portal for the admissions system of Ubon Ratchathani Technical College.
- Date: 2025-12-17T22:44:41Z
- Network: telegram
- Published URL: https://t.me/kkg_z/629
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0b863f35-ae98-4c9c-9380-1777c92b5319.png
- Threat Actors: KKG-Z
- Victim Country: Thailand
- Victim Industry: Education
- Victim Organization: ubon ratchathani technical college
- Victim Site: admission.utc.ac.th
9. jokeir 07x targets the website of Printfrica
- Category: Defacement
- Content: The Group claims to have defaced the website of Printfrica.
- Date: 2025-12-17T22:37:00Z
- Network: telegram
- Published URL: https://t.me/DarK07xxxxxxx/360
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cb2d5869-7f8c-4ad6-89eb-cc952d84c05a.png
- Threat Actors: jokeir 07x
- Victim Country: Unknown
- Victim Industry: E-commerce & Online Stores
- Victim Organization: printfrica
- Victim Site: printfrica.com
10. MedHelp falls victim TERMITE Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 25 GB of organization’s data.
- Date: 2025-12-17T22:26:36Z
- Network: tor
- Published URL: http://termiteuslbumdge2zmfmfcsrvmvsfe4gvyudc5j6cdnisnhtftvokid.onion/post/6941ec0ffeb604ea6ee5510d
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5a30fa1b-1836-41c2-ae3b-7c69b7ef5a4a.png
- Threat Actors: TERMITE
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: medhelp
- Victim Site: medhelpclinics.com
11. jokeir 07x targets the website of Incepti Development
- Category: Defacement
- Content: The group claims to have defaced the website of Incepti Development in Poland.
- Date: 2025-12-17T22:25:16Z
- Network: telegram
- Published URL: https://t.me/DarK07xxxxxxx/360?single
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/18121f03-5c91-4abc-a220-63ffe319e879.png
- Threat Actors: jokeir 07x
- Victim Country: Poland
- Victim Industry: Building and construction
- Victim Organization: incepti development kp investment sp. z o.o. sp. kom.
- Victim Site: incepti.pl
12. Alleged Sale of New Generation RDP Brute Force Tool
- Category: Malware
- Content: A threat actor claims to be selling a new-generation RDP brute-force software for 2025, allegedly using a custom protocol and supporting multi-threaded execution on Linux (CLI). The actor states the tool targets valid RDP credentials, may have partial compatibility issues with Windows 11, and is actively maintained with fixes and updates.
- Date: 2025-12-17T22:24:18Z
- Network: openweb
- Published URL: https://ramp4u.io/threads/rdp-%D0%BD%D0%BE%D0%B2%D0%BE%D0%B5-%D0%BF%D0%BE%D0%BA%D0%BE%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5-%D0%B1%D1%80%D1%83%D1%82%D0%B0-%D1%87%D0%B0%D1%81%D1%82%D0%B8%D1%87%D0%BD%D0%BE-%D1%80%D0%B0%D0%B1%D0%BE%D1%87%D0%B8%D0%B9-%D1%81%D0%BE%D1%84%D1%82-%D0%BD%D0%B0-%D1%80%D1%8B%D0%BD%D0%BA%D0%B5-2025.3713/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2532f9e3-ef78-445d-84d3-f9cfea0952e6.png
- Threat Actors: RedTeam
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
13. Alleged leak of unauthorized access to Policía Cibernética de Puebla
- Category: Initial Access
- Content: The group claims to have leaked unauthorized access to Policía Cibernética de Puebla
- Date: 2025-12-17T22:13:39Z
- Network: telegram
- Published URL: https://t.me/c/3211040888/309
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b9e637e0-c0bf-4303-991d-21407d90d8ed.png https://d34iuop8pidsy8.cloudfront.net/ec5cb81c-a163-4ddb-a4d3-9fd425f58449.png
- Threat Actors: Chronus leaks
- Victim Country: Mexico
- Victim Industry: Government Administration
- Victim Organization: policía cibernética de puebla
- Victim Site: policiacibernetica.puebla.gob.mx
14. Fatimion cyber team targets Zayed Foundation
- Category: Cyber Attack
- Content: A recent post by the group claims a breach of the Zayed Foundation system, with alleged exposure of sensitive citizen data.
- Date: 2025-12-17T22:09:46Z
- Network: telegram
- Published URL: https://t.me/hak994/4587
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/91be92aa-a6f1-4d12-8197-e264bf6e650c.png
- Threat Actors: Fatimion cyber team
- Victim Country: UAE
- Victim Industry: Unknown
- Victim Organization: zayed foundation
- Victim Site: Unknown
15. Alleged leak of unauthorized access to Secretaría de Seguridad Pública del Estado de Guanajuato
- Category: Initial Access
- Content: The group claims to leaked unauthorized access to Secretaría de Seguridad Pública del Estado de Guanajuato
- Date: 2025-12-17T22:09:09Z
- Network: telegram
- Published URL: https://t.me/c/3211040888/309
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/0076a0af-e278-4fd3-bffa-14b29d3b09fd.png https://d34iuop8pidsy8.cloudfront.net/5c78e56c-59d4-4176-9bc1-d2cf9e079179.png
- Threat Actors: Chronus leaks
- Victim Country: Mexico
- Victim Industry: Government Administration
- Victim Organization: secretaría de seguridad pública del estado de guanajuato
- Victim Site: seguridad.guanajuato.gob.mx
16. Alleged leak of unauthorized access to C5 CDMX
- Category: Initial Access
- Content: The group claims to have leaked unauthorized access to C5 CDMX (Centro de Comando, Control, Cómputo, Comunicaciones y Contacto Ciudadano)
- Date: 2025-12-17T22:05:11Z
- Network: telegram
- Published URL: https://t.me/c/3211040888/309
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c7423742-f1bb-46ab-aeba-ee9d0bef7ad8.png https://d34iuop8pidsy8.cloudfront.net/806f9314-d23e-47d5-94ea-b6a014d650f8.png
- Threat Actors: Chronus leaks
- Victim Country: Mexico
- Victim Industry: Government Administration
- Victim Organization: c5 cdmx
- Victim Site: c5.cdmx.gob.mx
17. Fatimion cyber team targets the UAE Ministry of Health and Prevention
- Category: Cyber Attack
- Content: Recent posts by the group allege a large-scale and coordinated cyberattack targeting government health institutions across the United Arab Emirates, claiming access to the official systems of the Ministry of Health and Prevention (MOHAP), intrusion into databases containing citizen health records, and breaches across 847 hospitals with alleged access to their internal databases.
- Date: 2025-12-17T22:04:59Z
- Network: telegram
- Published URL: https://t.me/hak994/4589
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f40f1537-b82a-46ad-8114-b121bfccc78f.png https://d34iuop8pidsy8.cloudfront.net/2b5ebccc-cd83-42b8-a830-e49c165a11a8.png https://d34iuop8pidsy8.cloudfront.net/7e8a088e-51fd-4c7b-b9e5-2d638c37786d.png https://d34iuop8pidsy8.cloudfront.net/3439f4e5-2018-4cd2-b9e2-273a90dbdef4.png https://d34iuop8pidsy8.cloudfront.net/819250f6-16d1-4b13-b79c-fb36d912afd3.png https://d34iuop8pidsy8.cloudfront.net/c0a4b3ab-4bd4-43f2-8199-d7f74f440052.png https://d34iuop8pidsy8.cloudfront.net/fe720cca-d389-4ba2-9994-ded759b08023.png
- Threat Actors: Fatimion cyber team
- Victim Country: UAE
- Victim Industry: Government Administration
- Victim Organization: ministry of health and prevention
- Victim Site: mohap.gov.ae
18. Alleged leak of unauthorized access to Secretaría de Seguridad Pública del Estado de Hidalgo
- Category: Initial Access
- Content: The group claims to have gained unauthorized access to Secretaría de Seguridad Pública del Estado de Hidalgo
- Date: 2025-12-17T21:59:28Z
- Network: telegram
- Published URL: https://t.me/c/3211040888/309
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/39944c15-bd50-4356-81d7-7d68b1749342.png https://d34iuop8pidsy8.cloudfront.net/54d8fbe2-91f7-40fe-b9cc-324be5b476a5.png
- Threat Actors: Chronus leaks
- Victim Country: Mexico
- Victim Industry: Government Administration
- Victim Organization: secretaría de seguridad pública del estado de hidalgo
- Victim Site: s-seguridad.hidalgo.gob.mx
19. Alleged Sale of EDR Killer Malware
- Category: Malware
- Content: Threat actor claims to be selling an EDR killer malware with source code, which allegedly disables endpoint security solutions and requires local administrator privileges to operate.
- Date: 2025-12-17T21:38:15Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/272273/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a534b35b-4e24-49da-a7c2-908f81e5ed60.png
- Threat Actors: amenouzume
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
20. CVK Hotels & Resorts falls victim to INC RANSOM
- Category: Ransomware
- Content: he group claims to have obtained organization’s data.
- Date: 2025-12-17T21:33:20Z
- Network: tor
- Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/69431c02be52b3ea15d4b3ef
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/8523c5dd-ebc3-47ce-97b5-9a2594a5187d.png
- Threat Actors: INC RANSOM
- Victim Country: Turkey
- Victim Industry: Hospitality & Tourism
- Victim Organization: cvk hotels & resorts
- Victim Site: cvkhotelsandresorts.com
21. Alleged leak of Netflix
- Category: Data Breach
- Content: A threat actor claims to be offering 2.4 million cleaned stealer log entries associated with Netflix accounts. The leaked data likely includes Netflix login credentials
- Date: 2025-12-17T21:14:07Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-Fresh-2-4-Million-Lines-Netflix-StealerLog
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f78f4fbf-c567-434f-90b9-69a0d68c210c.png
- Threat Actors: silenthook9
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
22. Alleged leak of Georgian Companies Database
- Category: Data Breach
- Content: A threat actor claims to be sharing a database of Georgian companies containing personal and contact information. which includes approximately 2,778 records associated with companies and individuals in Georgia.
- Date: 2025-12-17T21:01:12Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-DATABASE-Georgian-Companies-Database
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/229fe599-0522-4ac5-abb7-26cb51363940.png
- Threat Actors: MG3L0
- Victim Country: Georgia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
23. Alleged data breach of Banco Vimenca
- Category: Data Breach
- Content: The threat actor claims to be leaking a database belonging to Banco Vimenca, containing sensitive financial and personal information of customers and employees. The exposed data reportedly includes over 190,000 scanned Dominican ID cards of active clients, bank statements, personal data of nearly 700 employees, NDAs, confidentiality agreements, and highly sensitive contracts involving partner banks, clients, and third parties.
- Date: 2025-12-17T20:54:25Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-DATABASE-Banco-Vimenca-Data-leak
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a04c0503-9661-4c70-80b4-0651954e5b46.png
- Threat Actors: Dreamer8000
- Victim Country: Dominican Republic
- Victim Industry: Financial Services
- Victim Organization: banco vimenca
- Victim Site: vimenca.com
24. Zimeda falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T20:42:37Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/zimedaeu/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/12af2614-2040-440a-b331-9912850d37ec.png
- Threat Actors: SAFEPAY
- Victim Country: Germany
- Victim Industry: Medical Equipment Manufacturing
- Victim Organization: zimeda
- Victim Site: zimeda.eu
25. G & L Mechanical Contractor, L.P falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T20:39:14Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/gandlmechanicalcom/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/bcf37a86-0749-4b73-b0ad-74309f874103.png
- Threat Actors: SAFEPAY
- Victim Country: USA
- Victim Industry: Building and construction
- Victim Organization: g & l mechanical contractor, l.p
- Victim Site: gandlmechanical.com
26. Alleged data breach of Institutional Revolutionary Party (PRI)
- Category: Data Breach
- Content: A threat actor claims to have access to an internal online platform operated by Mexico’s Institutional Revolutionary Party (PRI).The leaked dataset reportedly contains approximately 1.35 million images, including front and back photographs of Mexican voter identification cards.
- Date: 2025-12-17T20:37:50Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-Selling-PRI-INE-CREDENTIAL-DATABASE
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e24c1a39-0e83-4ff3-bc06-bdd174ba9018.png
- Threat Actors: Sc0rp10nn
- Victim Country: Mexico
- Victim Industry: Political Organization
- Victim Organization: institutional revolutionary party (pri)
- Victim Site: pri.org.mx
27. Art City Dental falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T20:27:07Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/artcitydentalcom/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9b991303-1875-43fc-a176-5bd25c357ac7.png
- Threat Actors: SAFEPAY
- Victim Country: USA
- Victim Industry: Health & Fitness
- Victim Organization: art city dental
- Victim Site: artcitydental.com
28. HEINRICH AND BERG – NOTARIES IN GERRESHEIM falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T20:25:19Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/notar-gerresheimde/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/5d45edfe-057f-44da-b920-510b3805b40c.png
- Threat Actors: SAFEPAY
- Victim Country: Germany
- Victim Industry: Real Estate
- Victim Organization: heinrich and berg – notaries in gerresheim
- Victim Site: notar-gerresheim.de
29. KKG-Z targets the website of Stadium Office portal of the Ubon Ratchathani Rajabhat University (UBRU)
- Category: Defacement
- Content: The group claims to have defaced the website of Stadium Office portal of the Ubon Ratchathani Rajabhat University (UBRU).
- Date: 2025-12-17T20:15:39Z
- Network: telegram
- Published URL: https://t.me/kkg_z/628
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7c79b14b-73df-4cdb-baae-385fa011a8f7.png
- Threat Actors: KKG-Z
- Victim Country: Thailand
- Victim Industry: Education
- Victim Organization: ubon ratchathani rajabhat university (ubru)
- Victim Site: stadiumoffice.ubru.ac.th
30. SilverLine Group Inc. falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T20:05:50Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/silverlinegroupinccom/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/62e0986d-0be7-40fd-bf4b-66baa6e1f239.png
- Threat Actors: SAFEPAY
- Victim Country: Canada
- Victim Industry: Building and construction
- Victim Organization: silverline group inc.
- Victim Site: silverlinegroupinc.com
31. Alleged leak of credential database from Thabo School
- Category: Data Breach
- Content: The group claims to have defaced the website and leaked 300 sets of usernames and passwords from the admission portal of Thabo School in Thailand.
- Date: 2025-12-17T19:59:00Z
- Network: telegram
- Published URL: https://t.me/kkg_z/622
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/02088cc6-35a7-4fd7-9c51-042f11281a69.png
- Threat Actors: KKG-Z
- Victim Country: Thailand
- Victim Industry: Education
- Victim Organization: thabo school
- Victim Site: admission.thaboschool.ac.th
32. Smile Center of Utah falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T19:57:49Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/smilecenterutahcom/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/72a37407-ae31-44bf-bf4c-7e0724524e71.png
- Threat Actors: SAFEPAY
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: smile center of utah
- Victim Site: smilecenterutah.com
33. Security of the America LTDA falls victim to SAFEPAY Ransomware
- Category: Ransomware
- Content: The group claims to obtained the organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T19:50:56Z
- Network: tor
- Published URL: http://safepaypfxntwixwjrlcscft433ggemlhgkkdupi2ynhtcmvdgubmoyd.onion/blog/post/seguriamericascom/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/43a2db65-ae48-41f9-86dc-70d230325e9b.png
- Threat Actors: SAFEPAY
- Victim Country: Colombia
- Victim Industry: Security & Investigations
- Victim Organization: security of the america ltda
- Victim Site: seguriamericas.com
34. 7 Proxies targets the website of Kurmitola High School & College
- Category: Defacement
- Content: The group claims to have defaced the website of Kurmitola High School & College in Bangladesh.
- Date: 2025-12-17T19:50:12Z
- Network: telegram
- Published URL: https://t.me/c/2366703983/833
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b7ea1be1-f952-44bd-8c4b-5bc121698783.png
- Threat Actors: 7 Proxies
- Victim Country: Bangladesh
- Victim Industry: Education
- Victim Organization: kurmitola high school & college
- Victim Site: khsac.edu.bd
35. INDRAMAYU CHAOS SYSTEM targets the website of Faculty of Architecture and Creative Arts, Rajamangala University of Technology Isan (RMUTI)
- Category: Defacement
- Content: The group claims to have defaced the website of Faculty of Architecture and Creative Arts, Rajamangala University of Technology Isan (RMUTI)
- Date: 2025-12-17T19:38:16Z
- Network: telegram
- Published URL: https://t.me/c/3427600175/95
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/eef23d8c-d994-4834-859a-d5c618783b85.png
- Threat Actors: INDRAMAYU CHAOS SYSTEM
- Victim Country: Thailand
- Victim Industry: Education
- Victim Organization: faculty of architecture and creative arts, rajamangala university of technology isan (rmuti)
- Victim Site: faca.rmuti.ac.th
36. Alleged leak of Georgian Schools
- Category: Data Breach
- Content: The threat actor claims to have a database containing contact information (phones and emails) allegedly related to schools in Georgia, totaling approximately 2,310 records.
- Date: 2025-12-17T19:21:36Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-DATABASE-Georgian-Schools
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/f3644b1f-8abb-47e7-8ddb-a78cda3234f1.png
- Threat Actors: MG3L0
- Victim Country: Georgia
- Victim Industry: Education
- Victim Organization: Unknown
- Victim Site: Unknown
37. Rogue77 targets the website of Mirpur Mofid-e-Aam School and College
- Category: Defacement
- Content: The group claims to have defaced the organization’s website.
- Date: 2025-12-17T18:58:07Z
- Network: telegram
- Published URL: https://t.me/r0gue77/12
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/3ff6bd1d-d145-45d2-897a-726db73bbb6f.png
- Threat Actors: Rogue77
- Victim Country: Bangladesh
- Victim Industry: Education
- Victim Organization: mirpur mofid-e-aam school and college
- Victim Site: mmesc.edu.bd
38. Rogue77 targets the website of Bangladesh Ex-Cadets Association (BECA), Rangpur Unit
- Category: Defacement
- Content: The group claims to have defaced the website of Bangladesh Ex-Cadets Association (BECA), Rangpur Unit.
- Date: 2025-12-17T18:31:36Z
- Network: telegram
- Published URL: https://t.me/r0gue77/11
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ef8d88f7-8c64-40e8-89d9-7ddce8052d18.png
- Threat Actors: Rogue77
- Victim Country: Bangladesh
- Victim Industry: Non-profit & Social Organizations
- Victim Organization: bangladesh ex-cadets association (beca), rangpur unit
- Victim Site: becarangpur.org.bd
39. Alleged data breach of Preimpregnados AR
- Category: Data Breach
- Content: The threat actor claims to have a data leak originating from preimpregnados.com.ar, with the dataset allegedly shared via an external download link.
- Date: 2025-12-17T18:28:45Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-PREIMPREGNADOS-AR-LEAK
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b9d630b2-bd81-4405-bc19-8cc3cbbf7778.png
- Threat Actors: ExploitBolivia
- Victim Country: Argentina
- Victim Industry: Manufacturing
- Victim Organization: preimpregnados ar
- Victim Site: preimpregnados.com.ar
40. Alleged data breach of SOFIPA
- Category: Data Breach
- Content: The threat actor claims to have a database breach involving sofipa.org.mx, with allegedly exposed sensitive personal and financial data such as identification details, contact information, credit-related records, and loan application metadata.
- Date: 2025-12-17T18:15:03Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-DATABASE-Data-breach-sofipa-org-mx
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b9fe953a-6542-4561-8c83-73ea5ba67f2f.png
- Threat Actors: marshallmonr
- Victim Country: Mexico
- Victim Industry: Financial Services
- Victim Organization: sofipa
- Victim Site: sofipa.org.mx
41. 404 CREW CYBER TEAM targets the website of PV Materials
- Category: Defacement
- Content: The group claims to have defaced the website of PV Materials.
- Date: 2025-12-17T18:14:14Z
- Network: telegram
- Published URL: https://t.me/crewcyber/391
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/e29f8fcb-b630-43ad-8b3e-f4b5ce7885a9.png
- Threat Actors: 404 CREW CYBER TEAM
- Victim Country: Brazil
- Victim Industry: Building and construction
- Victim Organization: pv materials
- Victim Site: pvmateriais.com.br
42. Alleged data leak of Naftali Bennett
- Category: Data Breach
- Content: The group claims to have leaked the personal mobile device of former Israeli Prime Minister Naftali Bennett, leaking approximately 1,900 private chat messages.
- Date: 2025-12-17T18:10:25Z
- Network: openweb
- Published URL: https://handala-hack.to/naftali-bennett-chats/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/57b2c13f-9bb3-497a-a737-4a6899ad9033.png https://d34iuop8pidsy8.cloudfront.net/8b99747c-0788-47ee-8925-60c23ad57505.png https://d34iuop8pidsy8.cloudfront.net/3b6025bf-7c12-4cc5-b7e7-ed5ddc070c17.png
- Threat Actors: Handala Hack
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
43. Trojan 1337 targets the website of BDCricTime
- Category: Defacement
- Content: The group claims to have defaced the website of BDCricTime
- Date: 2025-12-17T17:50:36Z
- Network: telegram
- Published URL: https://t.me/c/2805167925/100
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d12b78ee-7881-4957-85a8-7ad9cdbabf2f.png https://d34iuop8pidsy8.cloudfront.net/862b8ffa-594c-4ac7-85bf-8dee57e44750.png https://d34iuop8pidsy8.cloudfront.net/da87e08d-00e3-4dc9-9981-09f801402515.png
- Threat Actors: Trojan 1337
- Victim Country: Bangladesh
- Victim Industry: Sports
- Victim Organization: bdcrictime
- Victim Site: bdcrictime.com
44. Alleged Sale of 10,000 Credit Card Records in Turkey
- Category: Data Breach
- Content: Threat actor claims to be selling 10,000 credit card details in Turkey. The compromised data reportedly includes credit card number, expiry date, CVV, full name, address, city, state, ZIP code, country, and phone number, with some records also containing additional SOAP-related data.
- Date: 2025-12-17T17:19:36Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/272254/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b52c99f3-1cb7-4e61-a329-bb87cce69411.png
- Threat Actors: old_pirate
- Victim Country: Turkey
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
45. Cyb3r Drag0nz claims to target Ministry of Higher Education and Scientific Research
- Category: Alert
- Content: A recent post by the group claims that they have successfully disrupted the digital platform of the Ministry of Higher Education’s in Iraq, making it inaccessible.
- Date: 2025-12-17T17:09:57Z
- Network: telegram
- Published URL: https://t.me/c/2508606000/155
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/2b8168c5-e1be-49e0-9a3b-7a41516274a1.png
- Threat Actors: Cyb3r Drag0nz
- Victim Country: Iraq
- Victim Industry: Education
- Victim Organization: ministry of higher education and scientific research
- Victim Site: mohesr.gov.iq
46. Alleged Sale of Unauthorized Site and Server Access to Top 20 Companies in Brazil
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized site and server access to top 20 companies in Brazil, which allegedly includes a Node.js entry point, website payment functionality, and database access containing records of approximately 20 million users, reportedly including detailed personal data and information related to relatives and local social networks.
- Date: 2025-12-17T17:04:52Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/272248/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/9b90f96d-14bd-4131-938d-0f05d77f2692.png
- Threat Actors: astrotrain
- Victim Country: Brazil
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
47. TENGU ransomware group adds an unknown victim (lol)
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and they intend to publish it within 9-10 days.
- Date: 2025-12-17T17:03:35Z
- Network: tor
- Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/c080d02876ae0fd24190edd17c6140ca44b1626050eb86fab1a0a277a116bf3b/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a25defe3-baa5-4fa3-a0a3-b2d33cb1b9d2.png
- Threat Actors: TENGU
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
48. TENGU ransomware group adds an unknown victim (Unknown)
- Category: Ransomware
- Content: The group claims to have obtained 11 GB organization’s internal data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T16:52:39Z
- Network: tor
- Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/bc5723b509285febe34720381141a5509f50a50f44f48f250c899b37ff117b41/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/cfcefad2-4f6a-4358-a73d-26203916b832.png
- Threat Actors: TENGU
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
49. 7 Proxies claims to target Bangladesh
- Category: Alert
- Content: A recent post by the group indicates that they’re targeting Bangladesh.
- Date: 2025-12-17T16:40:03Z
- Network: telegram
- Published URL: https://t.me/c/2366703983/826
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7edd1605-b788-4256-9fc5-dad201c4d5be.png
- Threat Actors: 7 Proxies
- Victim Country: Bangladesh
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
50. Trojan 1337 claims to target Bangladesh
- Category: Alert
- Content: A recent post by the group indicates that they’re targeting Bangladesh.
- Date: 2025-12-17T16:29:56Z
- Network: telegram
- Published URL: https://t.me/c/2805167925/99
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/770f1a57-f439-4ab5-85b0-11c75065495e.png
- Threat Actors: Trojan 1337
- Victim Country: Bangladesh
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
51. Ghilan Legion claims to target Myanmar
- Category: Alert
- Content: A recent post by the group indicates that they’re targeting Myanmar
- Date: 2025-12-17T16:26:19Z
- Network: telegram
- Published URL: https://t.me/c/2600829716/332
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/34a3e56f-bc60-474c-bf87-ce70942fdd4c.png
- Threat Actors: Ghilan Legion
- Victim Country: Myanmar
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
52. Netstar Australia falls victim to BlackShrantac Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 800 GB of organization’s data. The data includes Financial Data (Bank account details, Invoices, Tax, Insurance, Contracts, etc), Customers Data(Address, Email, Phone Number, etc), Databases
- Date: 2025-12-17T16:26:09Z
- Network: tor
- Published URL: http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/37
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/05618245-2599-4866-9dc1-26ab531d8eac.png https://d34iuop8pidsy8.cloudfront.net/4732e041-f40c-4030-9028-3af5b29d2160.png https://d34iuop8pidsy8.cloudfront.net/6b46e21f-7b5d-48e6-b20d-a51662b9b3f4.png https://d34iuop8pidsy8.cloudfront.net/e47683a4-f2cc-4567-bb44-a6f003a220ea.png https://d34iuop8pidsy8.cloudfront.net/b300d090-bc91-4cca-9032-6167182fa69e.png
- Threat Actors: BlackShrantac
- Victim Country: Australia
- Victim Industry: Information Technology (IT) Services
- Victim Organization: netstar australia
- Victim Site: netstaraustralia.com.au
53. 404 CREW CYBER TEAM targets the website of Sempre Design
- Category: Defacement
- Content: The group claims to have defaced website hosting an internal directory of Sempre Design.
- Date: 2025-12-17T16:22:24Z
- Network: telegram
- Published URL: https://t.me/crewcyber/390
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c423fdf5-5a2e-41d6-89e9-2110d1ae8159.png
- Threat Actors: 404 CREW CYBER TEAM
- Victim Country: Brazil
- Victim Industry: Information Technology (IT) Services
- Victim Organization: sempre design
- Victim Site: ciclodeux.com.br.sempredesign.com.br
54. 404 CREW CYBER TEAM targets the website of Ministry of Development and Social Assistance
- Category: Defacement
- Content: The group claims to have defaced the applications and authentication portal of Ministry of Development and Social Assistance.
- Date: 2025-12-17T15:57:28Z
- Network: telegram
- Published URL: https://t.me/crewcyber/389
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/645c162e-f2dd-42b7-8ed8-5fea353bebf1.png
- Threat Actors: 404 CREW CYBER TEAM
- Victim Country: Brazil
- Victim Industry: Government Administration
- Victim Organization: ministry of development and social assistance
- Victim Site: aplicacoes.mds.gov.br
55. Latitude 33 Planning & Engineering falls victim to akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 53 GB of the organization’s data. The compromised data includes Employees information (passports, DLs, and numerous forms with personal information), detailed financials, payment details, client files, projects, etc.
- Date: 2025-12-17T15:48:12Z
- Network: tor
- Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/b758e3b5-09cf-4e46-9f54-76b6cd4d304d.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Civil Engineering
- Victim Organization: latitude 33 planning & engineering
- Victim Site: latitude33.com
56. Alleged data leak targeting Pusdalops, BNPB
- Category: Data Breach
- Content: The group claims to have gained unauthorized access to the Operational Control Center (Pusdalops) of BNPB, Indonesia’s national disaster management agency. The compromised dataset reportedly include fields such as position name, NIK, NPWP, NIP, address, ID, and email.
- Date: 2025-12-17T15:34:08Z
- Network: telegram
- Published URL: https://t.me/c/2956021863/102
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/4c668d66-a6e4-48ab-a210-fb180f4e5c64.png
- Threat Actors: GARUDA BLACKH4T COMUNITY
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: badan nasional penanggulangan bencana (bnpb)
- Victim Site: pusdalops.bnpb.go.id
57. Acme Industrial Company falls victim to akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 256 GB of the organization’s corporate data. The compromised data reportedly includes Employee information (passports, DLs, SSNs, birth and death certs, medical information), financials, payment details, client files, NDAs, etc.
- Date: 2025-12-17T15:18:00Z
- Network: tor
- Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/d15aebd3-2951-43d7-8201-c41b70485132.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Machinery Manufacturing
- Victim Organization: acme industrial company
- Victim Site: acmeindustrial.com
58. Alleged Sale of Italy Business Leads
- Category: Data Breach
- Content: The threat actor is advertising the sale of a large database of Italian and European business leads, claiming access to hundreds of thousands of verified company contacts, including business names, addresses, geographic details, and email addresses, intended for B2B marketing, lead generation, and targeted outreach campaigns.
- Date: 2025-12-17T15:09:15Z
- Network: openweb
- Published URL: https://darkforums.hn/Thread-Selling-Italy-Business-Leads-Available
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/969aa09d-40e9-4bcb-b93f-aff9ffc99929.png
- Threat Actors: Edric
- Victim Country: Italy
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
59. Adelman & Gettleman, Ltd. falls victim to akira Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 31 GB of the organization’s data. The compromised data reportedly includes Clients and employees information (passports, DLs, SSNs), financials, court files, police reports and other confidential files.
- Date: 2025-12-17T15:06:52Z
- Network: tor
- Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/c3f29fe8-e823-4b89-b015-de46f0769ce7.png
- Threat Actors: akira
- Victim Country: USA
- Victim Industry: Law Practice & Law Firms
- Victim Organization: adelman & gettleman, ltd.
- Victim Site: ag-ltd.com
60. 404 CREW CYBER TEAM targets the website of Municipality of Congonhas
- Category: Defacement
- Content: The group claims to have defaced the website of Municipality of Congonhas (Minas Gerais), Brazil.
- Date: 2025-12-17T15:01:58Z
- Network: telegram
- Published URL: https://t.me/crewcyber/388
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/689b1d09-d482-47ad-a482-ea9cffbc721c.png
- Threat Actors: 404 CREW CYBER TEAM
- Victim Country: Brazil
- Victim Industry: Government Administration
- Victim Organization: municipality of congonhas
- Victim Site: congonhas.mg.gov.br
61. The Araneta Group falls victim OSIRIS Ransomware
- Category: Ransomware
- Content: The group claims to have obtained organization’s data and they intend to publish it within 2-3 days.
- Date: 2025-12-17T14:56:10Z
- Network: tor
- Published URL: https://osirisbm3357xrccnid23nlyuqwzbgqheaei6dxvyi34tbkqr3bmvfid.onion/app/publications
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/ebb7d882-620b-4627-b8f3-bee5ca7dae78.png
- Threat Actors: OSIRIS
- Victim Country: Philippines
- Victim Industry: Real Estate
- Victim Organization: the araneta group
- Victim Site: aranetagroup.com
62. We BoyZ targets the website of Sistema Fiep
- Category: Defacement
- Content: The group claims to have defaced the website of Sistema Fiep.
- Date: 2025-12-17T14:35:42Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/217382
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/18007c1b-134d-456e-909d-37206e76fb90.jpg
- Threat Actors: We BoyZ
- Victim Country: Brazil
- Victim Industry: Civic & Social Organization
- Victim Organization: sistema fiep
- Victim Site: minhafiep.sistemafiep.org.br
63. We BoyZ targets the website of Information Network Security Administration
- Category: Defacement
- Content: The group claims to have defaced the website of Information Network Security Administration.
- Date: 2025-12-17T14:33:16Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/217395
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/7c5900e3-2d0d-417f-ad5f-c78fa4d890fa.png
- Threat Actors: We BoyZ
- Victim Country: Ethiopia
- Victim Industry: Government Administration
- Victim Organization: information network security administration
- Victim Site: dms.insa.gov.et
64. We BoyZ targets the website of ENUGU STATE GEOGRAPHIC INFORMATION SYSTEMS SERVICES (ENGIS)
- Category: Defacement
- Content: The group claims to have defaced the website of ENUGU STATE GEOGRAPHIC INFORMATION SYSTEMS SERVICES (ENGIS).
- Date: 2025-12-17T14:13:30Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/217385
- Screenshots: https://d34iuop8pidsy8.cloudfront.net/a87d481f-6f4a-4786-bf2c-51fbfd6309cc.png
- Threat Actors: We BoyZ
- Victim Country: Nigeria
- Victim Industry: Government Administration
- Victim Organization: enugu state geographic information systems services (engis)
- Victim Site: portal.engis.en.gov.ng
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Data breaches, defacements, and ransomware attacks are prominent, affecting various sectors from government administration and education to healthcare and banking. The attacks impact a wide range of countries including Iraq, Mexico, Thailand, the USA, and European nations.
The compromised data ranges from sensitive government records and citizen health information to corporate internal data and personal user credentials. Beyond data compromise, the report also reveals significant activity in initial access sales and the marketing of offensive tools, such as RDP brute-force software.
The collective incidents underscore the persistent threats organizations face from data exfiltration, unauthorized network access, and malicious actors such as Cyb3r Drag0nz, Chronus leaks, and various ransomware groups like TERMITE.