Daily Cyber Threat Intelligence Report: December 21, 2025
1. Executive Summary
The provided dataset indicates a high volume of global cyber activity. Key trends include a surge in Initial Access Brokerage targeting educational and government institutions in Thailand, impactful Ransomware attacks against healthcare and infrastructure sectors in the Americas and Europe, and widespread Data Breaches affecting government entities in Indonesia and Senegal111111111.+4
2. Ransomware Incidents
Ransomware groups continue to target critical sectors, including healthcare, construction, and logistics. The group INC RANSOM and ANUBIS were particularly active during this period.
| Victim Organization | Industry | Country | Threat Actor | Status/Notes |
| Cedar Valley Services | Human Resources | USA | Qilin | Data obtained 2 |
| Woodglen Medical Group | Healthcare | USA | ANUBIS | Data renamed to “Emanate Health”; includes financial/customer records 3333+1 |
| VÁHOSTAV | Construction | Slovakia | DragonForce | 224.87 GB of data stolen; publication threatened in 7-8 days 4 |
| Evercover Helmet Covers | Sporting Goods | Hungary | INC RANSOM | Internal data gained 5 |
| Talarico SRL | Construction | Italy | INC RANSOM | Previously hit by “The Gentlemen” ransomware in Nov 2025 6 |
| University of Planalto Catarinense | Education | Brazil | LOCKBIT 5.0 | Publication threatened in 6-7 days 7 |
| Terport – Terminales Portuarias S.A. | Logistics | Paraguay | LYNX | Organization’s data obtained 8 |
3. Critical Data Breaches and Leaks
Threat actors have claimed the exfiltration of sensitive Personally Identifiable Information (PII) and government records from multiple regions.
Government & Public Sector
- Indonesia: A massive breach allegedly exposing Indonesian citizenship records is being sold by actor Brownies281, containing IDs, names, and biographic data9. Additionally, the National Nutrition Agency was compromised by GARUDA BLACKHAT CYBER CRIME10.+1
- Senegal: The Ministry of the Interior and Public Security suffered a leak of personnel data (rank, signatures, retirement dates) by actor HawkSec11. Another leak targeted a French embassy agent in Senegal12.+1
- USA (NASA): Actor JRINTEL FREE DATA V3 leaked a 61.6 MB archive from a NASA server related to Spanish teleradiology work13.
- Mexico: Actor Alz_157s leaked the SIRH (Human Resources System) database for Chiapas, including extensive employee PII14.
- Bangladesh: Actor 7 Proxies leaked insider employee databases, including police and military personnel records15.
Corporate & Commercial
- Rolls-Royce Motor Cars (China): A customer database in CSV format is allegedly being sold16.
- American Health (USA): A database of approximately 116,000 customer records (names, DOB, emails) is being sold by actor zoozkooz17.
- Fujian Radio, Film and Television Group (China): A breach from 2024 containing 3 million records (names, IDs, addresses) was leaked by Tokyo040418.
- Paytm (India): Actor Edric is selling 3.2 million user interest leads, including mobile numbers and age groups19.
- Fastweb (Italy): Actor espandive is selling access to a corporate panel20.
4. Initial Access & Credential Sales
Initial Access Brokers (IABs) are selling unauthorized entry points, which are often precursors to ransomware attacks.
Targeted Educational & Government Campaigns
A significant cluster of activity targeted Thailand, primarily orchestrated by actors Chennel G.H.G.K and Digit_4.
- Thailand: Admin panel access leaked for New GFMIS Thai (Government Fiscal Management), Ramkhamhaeng University Bookstore, ACC Group, and Prince Royal’s College212121212121212121.+2
- Turkey: Unauthorized VPN access to an unnamed Turkish university is for sale22.
Corporate & Infrastructure Access
- China: Unauthorized SSH access to a SOPHON Micro Server (Financial Services) is being sold by ransomcharger23.
- Guatemala: Internal access to the Ministry of Health is being sold by Juxn-Modz24.
- Global Infrastructure: A group called Infrastructure Destruction Squad claims to have hacked 265 systems worldwide25.
Credential Dumps (Digit_4 Activity)
The actor Digit_4 released login access for several high-profile platforms on Telegram, including:
- Google (USA)26.
- ThriveCart (Spain)27.
- The Sims Resource (Sweden)28.
- ThinkCentral (USA)29.
5. Defacement & Hacktivism
Hacktivist groups engaged in website defacements to signal presence or political messaging.
- 7 Proxies: Targeted Mojomer Hat Fazil Madrasha (Bangladesh)30.
- NATION OF SAVIORS: Claimed attacks on Government websites of India and ProCert UK Ltd31313131.+1
- GHOSTNET-X: Targeted multiple sites including an educational portal in Indonesia and a personal website32.
- DEFACER INDONESIAN TEAM: Targeted multiple Indonesian schools (MTs Al-Jihad Salaman, SMA Negeri 2 Pacitan)33333333.+1
- BekasiRootSec: Defaced the website of Lifestyle Interiors & Renovation (India)34.
6. Malware & Cybercrime Tools
Sophisticated tools are being marketed to facilitate further attacks.
- RDP Brut Fast: A tool for brute-forcing RDP on Debian environments is being sold by Mr.Bang35.
- VOID KILLER: Malware designed to terminate Antivirus and EDR (Endpoint Detection and Response) solutions is being sold by Crypt4You36.
- Casino Source Code: Source code for a new online casino is being sold by rebel13737.
Strategic Conclusion & Outlook
The intelligence data from this 24-hour period illustrates a highly commoditized and globally distributed cybercrime ecosystem. The sheer volume of incidents indicates that threat actors are operating with high velocity, leveraging specialized marketplaces to trade access, tools, and stolen data with efficiency.
Key strategic takeaways include:
- The Industrialization of Initial Access: There is a clear separation of labor where “Initial Access Brokers” (IABs) compromise networks and sell the keys rather than exploiting them immediately. The high volume of Admin Panel and VPN/SSH access sales—particularly targeting educational and government institutions in Thailand and Turkey —suggests these sectors are being stockpiled as “soft targets” for future ransomware or espionage campaigns.+3
- Escalation in Anti-Defense Tools: The sale of the “VOID KILLER” malware, explicitly designed to terminate Antivirus and EDR solutions , alongside specialized RDP brute-force tools, points to a tactical shift. Attackers are actively arming themselves to bypass modern behavioral detection systems, making standard perimeter defenses insufficient.+1
- Aggressive Double-Extortion in Critical Sectors: Ransomware groups like ANUBIS, INC RANSOM, and Qilin are not just encrypting data but are heavily relying on the threat of leaking sensitive PII (Personally Identifiable Information). The targeting of healthcare providers (Woodglen Medical Group) and infrastructure (VÁHOSTAV, Terport) highlights a ruthless focus on sectors where operational downtime or data privacy violations cause maximum leverage.+3
- Regional Data Sovereignty Crisis: Southeast Asia, specifically Indonesia, is currently under siege by data leakers. The exposure of massive datasets, including citizenship records and government personnel data, indicates systemic vulnerabilities in the region’s public digital infrastructure that are being exploited at scale.+1
Final Assessment: The threat landscape on this date shows a transition from opportunistic hacks to organized supply-chain style criminality. Organizations are advised to prioritize credential hygiene (to stop IABs) and behavioral monitoring (to detect anti-EDR activity) immediately, as the access sold today effectively becomes the ransomware breach of tomorrow.
Detected Incidents Draft Data
- Alleged sale of Australian medical documents
Category: Data Breach
Content: Threat actor claims to be selling 300 medical documents in Australia.
Date: 2025-12-21T23:49:58Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/272472/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e85b1004-5860-4afc-9ea1-cacee8d87bc0.png
Threat Actors: samy01
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cedar Valley Services falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2025-12-21T23:35:48Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=7adeac9a-3593-3d19-be7d-217c10e02be4
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0c291c5c-5625-44e1-9372-d7087d7efbc1.png
https://d34iuop8pidsy8.cloudfront.net/02219eea-9d52-42e2-8e50-abebf1399f43.png
Threat Actors: Qilin
Victim Country: USA
Victim Industry: Human Resources
Victim Organization: cedar valley services
Victim Site: cedarvalleyservices.org - Alleged sale of unauthorized SSH access to SOPHON Micro Server
Category: Initial Access
Content: Threat actor claims to be selling unauthorized SSH access to a SOPHON Micro Server associated with a China-based environment, consistent with initial access broker activity.
Date: 2025-12-21T23:19:35Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/272515/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/352a28f3-8490-4507-bb9c-82cecc3372e9.png
Threat Actors: ransomcharger
Victim Country: China
Victim Industry: Financial Services
Victim Organization: Unknown
Victim Site: Unknown - 7 Proxies targets the website of Mojomer Hat Fazil Madrasha
Category: Defacement
Content: The group claims to have defaced the website of Mojomer Hat Fazil Madrasha
Date: 2025-12-21T23:16:40Z
Network: telegram
Published URL: https://t.me/c/2366703983/870
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f3bdcf25-4805-4a4b-a29f-d7c0c1c75acc.png
Threat Actors: 7 Proxies
Victim Country: Bangladesh
Victim Industry: Education
Victim Organization: mojomer hat fazil madrasha
Victim Site: mhfmbor.com - Woodglen Medical Group falls victim to ANUBIS ransomware
Category: Ransomware
Content: The group claims to have obtained the organization’s data. The data reportedly includes customer information, as well as financial and operational records, and has been renamed to Emanate Health Medical Group OBGYN.
Date: 2025-12-21T22:46:34Z
Network: tor
Published URL: http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/r/5r5iXrDcq81ieO1gCAoEV+xeh85NS+tIldTzT3pLyWK1JxFF7IvdItkry8unp46VNERPoj+54TvwbEAmwGWglnRwREltS05T
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bae8ceaf-dde9-4586-95a8-b9274f721cde.png
https://d34iuop8pidsy8.cloudfront.net/7270673b-4bc1-472c-8c3f-4a1af1693db7.png
https://d34iuop8pidsy8.cloudfront.net/bea0d526-17ef-438c-9291-4346fbe58843.png
https://d34iuop8pidsy8.cloudfront.net/d942e63a-2ef2-4f12-a592-c45d9cd5924a.png
https://d34iuop8pidsy8.cloudfront.net/3f50cee7-d271-476f-942f-572fd70ae946.png
Threat Actors: ANUBIS
Victim Country: USA
Victim Industry: Hospital & Health Care
Victim Organization: woodglen medical group
Victim Site: woodglenmedical.com - Woodglen Medical Group falls victim to ANUBIS ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data. The data contains customer information, financial and operational information.
Date: 2025-12-21T22:41:59Z
Network: tor
Published URL: http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/r/5r5iXrDcq81ieO1gCAoEV+xeh85NS+tIldTzT3pLyWK1JxFF7IvdItkry8unp46VNERPoj+54TvwbEAmwGWglnRwREltS05T
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bae8ceaf-dde9-4586-95a8-b9274f721cde.png
https://d34iuop8pidsy8.cloudfront.net/7270673b-4bc1-472c-8c3f-4a1af1693db7.png
https://d34iuop8pidsy8.cloudfront.net/bea0d526-17ef-438c-9291-4346fbe58843.png
https://d34iuop8pidsy8.cloudfront.net/d942e63a-2ef2-4f12-a592-c45d9cd5924a.png
https://d34iuop8pidsy8.cloudfront.net/3f50cee7-d271-476f-942f-572fd70ae946.png
Threat Actors: ANUBIS
Victim Country: USA
Victim Industry: Hospital & Health Care
Victim Organization: woodglen medical group
Victim Site: emanatehealth.org - Alleged data leak of Indonesian citizenship records
Category: Data Breach
Content: A threat actor claims to be selling a large dataset allegedly containing Indonesian citizenship records. The advertised data reportedly includes personal and demographic details such as national ID numbers, full names, dates and places of birth, religion, marital status, phone numbers, and email addresses, suggesting a possible compromise
Date: 2025-12-21T22:14:20Z
Network: openweb
Published URL: https://darkforums.hn/Thread-Selling-Indonesia-citizenship-data-80-million-records-full-info
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bb4159f2-406d-4d07-9e46-5777680a4dfd.png
Threat Actors: Brownies281
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: dukcapil.kemendagri.go.id - Alleged leak of NASA teleradiology data
Category: Data Breach
Content: The group claims to have leaked a 61.6 MB archive allegedly exfiltrated from an official NASA server, reportedly containing data related to NASA’s collaborative work in Spanish teleradiology.
Date: 2025-12-21T21:14:27Z
Network: telegram
Published URL: https://t.me/topsecretdocumentsleaked/170
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d628b54d-3e5f-4eb8-9ac7-8527c5e3b43c.jpg
Threat Actors: JRINTEL FREE DATA V3
Victim Country: USA
Victim Industry: Aviation & Aerospace
Victim Organization: nasa
Victim Site: nasa.gov - GHOSTNET-X targets the SMAN 1 Bandar Lampung Gallery portal
Category: Defacement
Content: The group claims to have defaced the Gallery portal of SMAN 1 Bandar Lampung in Indonesia
Date: 2025-12-21T21:03:43Z
Network: telegram
Published URL: https://t.me/c/3614850505/83
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/31f58c9b-3638-44e8-82d0-845ef60a9fa8.png
Threat Actors: GHOSTNET-X
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: sman 1 bandar lampung
Victim Site: galeri.smansa-bdl.sch.id - GHOSTNET-X targets the website of Ali Mourtada
Category: Defacement
Content: The group claims to have defaced the website of Ali Mourtada
Date: 2025-12-21T20:36:36Z
Network: telegram
Published URL: https://t.me/c/3614850505/83
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c74c2b92-e8d0-42b2-82eb-da0355a453cd.png
Threat Actors: GHOSTNET-X
Victim Country: Unknown
Victim Industry: Gaming
Victim Organization: ali mourtada website
Victim Site: thoughtmongery.com - Alleged data leak of Government & Law-Enforcement Agencies from Multiple Countries
Category: Data Breach
Content: The threat actor claims to be selling access to and data from multiple government and law-enforcement systems, including alleged Russian FSB documents, government and police email panels from Angola, Thailand, and the UK, ministry accounts, and education administration accounts containing large volumes of student data.
Date: 2025-12-21T20:22:08Z
Network: openweb
Published URL: https://darkforums.hn/Thread-Selling-selling-fsb-documents-and-gov-mails-and-ministry
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b1dd54e3-a53e-4702-9a84-4ed6d005e046.png
Threat Actors: systemreset
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - VÁHOSTAV falls victim to DragonForce Ransomware
Category: Ransomware
Content: The group claims to have obtained 224.87 GB of organization’s data and they intend to publish it within 7-8 days.
Date: 2025-12-21T20:13:42Z
Network: tor
Published URL: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/614072be-44bc-4e74-8d50-d8ac54cbdda3.png
Threat Actors: DragonForce
Victim Country: Slovakia
Victim Industry: Building and construction
Victim Organization: váhostav
Victim Site: vahostav-sk.sk - Alleged data leak of Fastweb
Category: Data Breach
Content: The threat actor claims to be selling a Fastweb corporate panel.
Date: 2025-12-21T20:05:40Z
Network: openweb
Published URL: https://darkforums.hn/Thread-Selling-sell-fastweb-corporate-panel
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fa7a1305-94d6-47a4-b486-026aff4fbec6.png
Threat Actors: espandive
Victim Country: Italy
Victim Industry: Network & Telecommunications
Victim Organization: fastweb
Victim Site: fastweb.it - 404 CREW CYBER TEAM targets the website of Dendrita Publicidad
Category: Defacement
Content: The group claims to have defaced the admin panel of Dendrita Publicidad
Date: 2025-12-21T19:42:04Z
Network: telegram
Published URL: https://t.me/crewcyber/437
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/481238c8-cad1-48ed-bc5c-f15ec078d1ae.png
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Mexico
Victim Industry: Marketing, Advertising & Sales
Victim Organization: dendrita publicidad
Victim Site: dendritapublicidad.com.mx - Alleged data breach of Rolls-Royce Motor Cars
Category: Data Breach
Content: The threat actor claims to be selling Rolls-Royce China customer database distributed in CSV format
Date: 2025-12-21T19:28:31Z
Network: openweb
Published URL: https://leakbase.la/threads/rolls-royce-china-customer-database.47364/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2ec70f6b-b2a3-40ea-9ee7-7e7243ea5165.png
Threat Actors: show_more
Victim Country: China
Victim Industry: Retail Industry
Victim Organization: rolls-royce motor cars
Victim Site: rolls-roycemotorcars.com.cn - Alleged sale of RDP Brut Fast tool
Category: Malware
Content: The threat actor claims to be selling an RDP brute-force tool designed for fast and reliable attacks against systems using the NLA protocol on Debian-based environments. The offering includes features such as parallelized brute-forcing, memory-efficient combination generation, progress checkpointing, proxy validation, and filtering of successful or invalid targets.
Date: 2025-12-21T19:23:57Z
Network: openweb
Published URL: https://ramp4u.io/threads/rdp-brut-fast.3731/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b09eb36e-e623-4578-9ff1-9b1af803d0c2.png
Threat Actors: Mr.Bang
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Z-PENTEST ALLIANCE claims to target Mama Coffee
Category: Alert
Content: A recent post by the group claims that they have gained unauthorized access to the CCTV system of Mama Coffee, coffee shop in Ukraine.
Date: 2025-12-21T19:09:58Z
Network: telegram
Published URL: https://t.me/zpentestalliance/872
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/433152d7-6a5c-4886-938c-5fd93e340dde.png
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Ukraine
Victim Industry: Food & Beverages
Victim Organization: mama coffee
Victim Site: Unknown - NATION OF SAVIORS claims to target Government websites of India
Category: Alert
Content: A recent post by the group indicates that they are targeting Government websites of India
Date: 2025-12-21T18:35:38Z
Network: telegram
Published URL: https://t.me/c/2259100562/662
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7bbd027d-ec5e-4b81-b1d5-cb3a1dec2428.jpg
Threat Actors: NATION OF SAVIORS
Victim Country: India
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Netfly targets Dedicated SMTP services
Category: Alert
Content: A recent post by the group indicates that they’re targeting Dedicated SMTP services.
Date: 2025-12-21T18:34:36Z
Network: openweb
Published URL: https://darkforums.hn/Thread-Selling-Dedicated-SMTP-with-High-Delivery-Performance
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8e468703-f93a-40ff-9d8d-db81a9614822.png
Threat Actors: Netfly
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Crypto Bitcoin Funnel
Category: Data Breach
Content: The threat actor claims to be selling an allegedly leaked database of Crypto Bitcoin Funnel registration leads. The exposed data appears to include personal information such as first and last names, email addresses, phone numbers, countries, IP addresses, devices, and campaign identifiers linked to multiple Bitcoin-themed marketing funnels.
Date: 2025-12-21T18:08:55Z
Network: openweb
Published URL: https://darkforums.hn/Thread-DATABASE-Crypto-Bitcoin-Funnel-Registration-leads
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/126a2581-cccc-4960-b505-c3f68fb72b24.png
Threat Actors: aisdata
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Elementos BUAP
Category: Data Breach
Content: The threat actor claims to be selling an allegedly compromised full database with Elementos BUAP, containing author records, artist information, and content relationship data, primarily related to editorial and publication management rather than financial or payment information.
Date: 2025-12-21T18:04:50Z
Network: openweb
Published URL: https://darkforums.hn/Thread-Document-MEXICO-BUAP-%E2%80%93-Elementos-Full-Database-Dump
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1f400e8d-9dcc-434d-b770-6884355774b0.png
Threat Actors: Evorax
Victim Country: Mexico
Victim Industry: Education
Victim Organization: elementos buap
Victim Site: elementos.buap.mx - Alleged Data Leak of USA Shop
Category: Data Breach
Content: The threat actor claims to be selling access to a self-hosted U.S,based shop, including administrative panel access, native checkout forms, and card-based order processing.
Date: 2025-12-21T17:51:38Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/272492/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/922bbf1b-91e4-4db8-9311-26075ed36922.png
Threat Actors: CMPunk
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged admin access to the website of sp.yamato.in.th
Category: Initial Access
Content: The group claims to have gained unauthorized access to the administrator panel of the website sp.yamato.in.th
Date: 2025-12-21T17:43:13Z
Network: telegram
Published URL: https://t.me/black100eyes/112
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7273faac-7f52-4fa7-bb80-243883d1ab9e.png
Threat Actors: Chennel G.H.G.K
Victim Country: Thailand
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: sp.yamato.in.th - Alleged data breach of FinShiksha
Category: Data Breach
Content: The threat actor claims to be sharing an allegedly compromised WordPress database associated with FinShiksha, exposing backend content such as post records, metadata, and database structure rather than direct customer financial data.
Date: 2025-12-21T16:47:48Z
Network: openweb
Published URL: https://darkforums.hn/Thread-DATABASE-%E2%AD%90-WordPress-Database-finshiksha-com-%E2%AD%90
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5f03a121-ccea-4799-aea6-2b86ad158f60.png
Threat Actors: AshleyWood2022
Victim Country: India
Victim Industry: Education
Victim Organization: finshiksha
Victim Site: finshiksha.com - Alleged data breach of AGGUN
Category: Data Breach
Content: The threat actor claims to be sharing an allegedly compromised database to AGGUN. The exposed data samples suggest customer and order-related information, including user accounts, contact details, addresses, order IDs, payment and delivery information, and other transactional records.
Date: 2025-12-21T16:35:44Z
Network: openweb
Published URL: https://darkforums.hn/Thread-DATABASE-%E2%AD%90-South-Korea-Database-www-aggun-kr-%E2%AD%90
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0f021abf-77d6-4df6-b805-52ddf9a99383.png
Threat Actors: AshleyWood2022
Victim Country: South Korea
Victim Industry: E-commerce & Online Stores
Victim Organization: aggun
Victim Site: aggun.kr - Alleged data breach of American Health
Category: Data Breach
Content: The threat actor claims to be selling an allegedly compromised customer database of American Health, which containing personal information such as names, addresses, contact details, dates of birth, and email addresses, with an alleged dump size of approximately 116,000 records.
Date: 2025-12-21T16:26:19Z
Network: openweb
Published URL: https://leakbase.la/threads/americanhealthus-com-customers-database.47359/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ce993209-56cc-40d6-b4ab-d5fa347446be.png
Threat Actors: zoozkooz
Victim Country: USA
Victim Industry: Health & Fitness
Victim Organization: american health
Victim Site: americanhealthus.com - Alleged leak of login access to Ramkhamhaeng University Bookstore
Category: Initial Access
Content: The group claims to have leaked the Credentials to the website of Ramkhamhaeng University Bookstore
Date: 2025-12-21T16:00:35Z
Network: telegram
Published URL: https://t.me/black100eyes/113
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e9d5b772-6b48-42c0-88cb-d3c2d948ad0d.jpg
Threat Actors: Chennel G.H.G.K
Victim Country: Thailand
Victim Industry: Education
Victim Organization: ramkhamhaeng university
Victim Site: bookstore.ru.ac - Evercover Helmet Covers falls victim to INC RANSOM Ransomware
Category: Ransomware
Content: The group claims to have gained the organization’s internal data.
Date: 2025-12-21T15:06:41Z
Network: tor
Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/6948023fbe52b3ea15221b9c
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2a85bbf6-dfb5-4937-99b3-9dcfe383c9de.png
Threat Actors: INC RANSOM
Victim Country: Hungary
Victim Industry: Sporting Goods
Victim Organization: evercover helmet covers
Victim Site: evercover.com - Alleged data breach of National Nutrition Agency
Category: Data Breach
Content: The group claims to have breached the organization’s data
Date: 2025-12-21T14:56:48Z
Network: telegram
Published URL: https://t.me/garudablackhat/114
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/72622aa7-f307-4134-9d58-583b8373e260.png
Threat Actors: GARUDA BLACKHAT CYBER CRIME
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: national nutrition agency
Victim Site: bgn.go.id - Talarico SRL falls victim to INC RANSOM Ransomware
Category: Ransomware
Content: The group claims to have obtained the organization’s internal data.
Note: Talarico SRL has previously fallen victim to The Gentlemen ransomware on November 24, 2025.
Date: 2025-12-21T14:54:21Z
Network: tor
Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/6948038dbe52b3ea15222e64
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1f6f3b41-d475-4e71-848c-77b4dbb8a013.png
Threat Actors: INC RANSOM
Victim Country: Italy
Victim Industry: Building and construction
Victim Organization: talarico srl
Victim Site: talaricosrl.it
- Alleged Data Leak of Bangladesh Government Personnel Information
Category: Data Breach
Content: The group claims to have leaked data from insider employee databases of the Bangladesh Government, allegedly including records related to police and military personnel that contain national identification references, passport-related details, permanent addresses, and other sensitive personal information.
Date: 2025-12-21T14:24:39Z
Network: telegram
Published URL: https://t.me/c/2366703983/867
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a0e23bbb-8cad-40c8-aadb-1fb712e6724c.png
Threat Actors: 7 Proxies
Victim Country: Bangladesh
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of personal data of a French embassy agent in Senegal
Category: Data Breach
Content: Threat actor claims to have leaked the personal data of a French embassy agent in Senegal, reportedly including name, address, phone number, email address, and other personal details.
Date: 2025-12-21T14:13:07Z
Network: openweb
Published URL: https://breachforums.bf/Thread-A-French-Embassy-agent-in-Senegal-who-is-a-pedophile
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a8496257-ce81-4a04-bfb4-9975774e1f10.png
Threat Actors: Neyzxxxx
Victim Country: Senegal
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of admin panel access to PS School
Category: Initial Access
Content: The group claims to have leaked the admin panel access of PS School
Date: 2025-12-21T14:07:11Z
Network: telegram
Published URL: https://t.me/black100eyes/103
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e25f1461-ea98-40b5-a862-d9371135f7d7.jpg
Threat Actors: Chennel G.H.G.K
Victim Country: Thailand
Victim Industry: Education
Victim Organization: ps school
Victim Site: psschool.in.th - NATION OF SAVIORS targets the website of ProCert UK Ltd
Category: Defacement
Content: The group claims to have taken down the website of ProCert UK Ltd
Date: 2025-12-21T13:51:00Z
Network: telegram
Published URL: https://t.me/c/2259100562/659
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8d6998bf-72b5-4abf-8d6e-08756a67b1eb.jpg
Threat Actors: NATION OF SAVIORS
Victim Country: UK
Victim Industry: Professional Training
Victim Organization: procert uk ltd
Victim Site: procertuk.org - Alleged sale of user leads from Paytm
Category: Data Breach
Content: Threat actor claims to be selling Paytm user interest leads allegedly linked to users in India. The dataset reportedly contains over 3.2 million records, including names, email addresses, mobile numbers, city, gender, and age group information.
Date: 2025-12-21T13:45:16Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-Paytm-User-Interest-Leads-%E2%80%93-India–182000
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5a729964-51af-421f-bc87-b859ed941b3e.png
Threat Actors: Edric
Victim Country: India
Victim Industry: Financial Services
Victim Organization: paytm
Victim Site: paytm.com - Alleged leak of data from SIRH system of Chiapas, Mexico
Category: Data Breach
Content: Threat actor claims to have leaked database records belonging to the SIRH (Sistema Integral de Recursos Humanos) system of Chiapas, Mexico. The allegedly exposed data pertains to administrative personnel and includes extensive personally identifiable information (PII), such as full names, date and place of birth details, contact information, residential addresses, nationality, education records, language details, employment and payroll-related data, fiscal information, credential details, and profile photos.
Date: 2025-12-21T13:32:52Z
Network: openweb
Published URL: https://darkforums.hn/Thread-DATABASE-DATA-OF-SIRH-MEXICO
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4bc724f5-fd6f-4688-8f46-a333eb85ff14.png
Threat Actors: Alz_157s
Victim Country: Mexico
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - DEFACER INDONESIAN TEAM targets the website of MTs Al-Jihad Salaman
Category: Defacement
Content: The group claims to have defaced the website of MTs Al-Jihad Salaman.
Date: 2025-12-21T13:23:53Z
Network: telegram
Published URL: https://t.me/c/2433981896/207
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/03c02208-6d47-4b80-8289-52aacb0b7b8e.png
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: mts al-jihad salaman
Victim Site: lulus.mtsaljihadsalaman.sch.id - Alleged unauthorized user account access at BRED Bank Cambodia
Category: Data Breach
Content: The group claims to have gained access to a BRED Bank Cambodia customer account.
Date: 2025-12-21T13:18:55Z
Network: telegram
Published URL: https://t.me/h3c4kedzsec_official/240
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/735b9440-b5b9-453e-b55c-062110e82e52.png
https://d34iuop8pidsy8.cloudfront.net/11b8f283-4dde-4390-ad73-0cb6ef78eb70.png
Threat Actors: H3C4KEDZ
Victim Country: Cambodia
Victim Industry: Banking & Mortgage
Victim Organization: bred bank cambodia
Victim Site: bredcambodia.com.kh - GHOST SECURITY SOCIETY PH targets the website of CAMPP
Category: Defacement
Content: The group claims to have defaced the website of CAMPP
Date: 2025-12-21T13:08:29Z
Network: openweb
Published URL: https://defacer.id/mirror/id/219922
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fc09e342-0955-4c90-a5c3-5a5476f65de1.JPG
Threat Actors: GHOST SECURITY SOCIETY PH
Victim Country: Brazil
Victim Industry: Social Media & Online Social Networking
Victim Organization: campp
Victim Site: campp.org.br - BekasiRootSec targets the website of Lifestyle Interiors & Renovation
Category: Defacement
Content: The group claims to have defaced the website of Lifestyle Interiors & Renovation
Date: 2025-12-21T12:48:09Z
Network: openweb
Published URL: https://defacer.id/mirror/id/220036
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ecc8d666-5d88-4be6-83dc-00e4b2964ef4.JPG
Threat Actors: BekasiRootSec
Victim Country: India
Victim Industry: Architecture & Planning
Victim Organization: lifestyle interiors & renovation
Victim Site: lifestyleinteriorshub.in - Ministry of the Interior and Public Security of Senegal
Category: Data Breach
Content: The threat actor claims to have leaked data from the Ministry of the Interior and Public Security of Senegal. The compromised data reportedly includes name, first name, registration number (CCAP), expected retirement date, document number, signatory’s position/rank, signature, and official stamp.
NB: The threat actor also claims to be responsible for the hack of the French Ministry of the Interior.
Date: 2025-12-21T12:46:59Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Ministry-of-the-Interior-of-Senegal-HawkSec
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2011b129-acf4-434a-aae0-1dce78eb15c5.png
https://d34iuop8pidsy8.cloudfront.net/7f7ce198-e3e1-42aa-bf33-4a1eb1ba0a6a.png
Threat Actors: HawkSec
Victim Country: Senegal
Victim Industry: Government Administration
Victim Organization: ministry of the interior and public security of senegal
Victim Site: interieur.gouv.sn
- DEFACER INDONESIAN TEAM targets the website of SMA Negeri 2 Pacitan
Category: Defacement
Content: The group claims to have defaced the website of SMA Negeri 2 Pacitan.
Date: 2025-12-21T12:33:10Z
Network: telegram
Published URL: https://t.me/c/2433981896/209
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/975f3efa-9023-4e0c-b0ef-2f7bfc21071e.png
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: sma negeri 2 pacitan
Victim Site: info.sman2pacitan.sch.id - XmrAnonye.id targets the website of Cnej Togo
Category: Defacement
Content: The group claims to have defaced the website of Cnej Togo
Date: 2025-12-21T12:27:43Z
Network: openweb
Published URL: https://defacer.id/mirror/id/220032
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7756ae1b-f650-4f13-b866-3414feb9cfef.JPG
Threat Actors: XmrAnonye.id
Victim Country: Togo
Victim Industry: Government Administration
Victim Organization: cnej togo
Victim Site: wp.cnej.tg - No team targets the website of Esmeralma
Category: Defacement
Content: The group claims to have defaced the website of Esmeralma
Date: 2025-12-21T11:37:42Z
Network: openweb
Published URL: https://defacer.id/mirror/id/220033
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ffed0eb0-a7d8-4a94-9278-bfb6d1bab9ef.JPG
Threat Actors: No team
Victim Country: France
Victim Industry: Luxury Goods & Jewelry
Victim Organization: esmeralma
Victim Site: esmeralma.fr - X1RTX targets the website of Thirumala Milk Products
Category: Defacement
Content: The group claims to have defaced the website of Thirumala Milk Products
Date: 2025-12-21T11:16:55Z
Network: openweb
Published URL: https://defacer.id/mirror/id/220029
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5e44ad55-6e0e-4168-8968-9bc6ed159da9.JPG
Threat Actors: X1RTX
Victim Country: India
Victim Industry: Food Production
Victim Organization: thirumala milk products
Victim Site: teamcloud.co.in - NATION OF SAVIORS targets the website of crm.sahineevesh.com
Category: Defacement
Content: The group claims to have taken down the website of crm.sahineevesh.com
Date: 2025-12-21T10:50:52Z
Network: telegram
Published URL: https://t.me/c/2259100562/657
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7d01f942-7658-4c5c-b954-d6f0cf348f0c.png
Threat Actors: NATION OF SAVIORS
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: crm.sahineevesh.com - lxrdk1773n targets the website of Jakarta
Category: Defacement
Content: The group claims to have defaced the website of Jakarta
Date: 2025-12-21T10:49:54Z
Network: openweb
Published URL: https://defacer.id/mirror/id/220028
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d429f29f-5ef2-464c-bdb4-37100c008040.JPG
Threat Actors: lxrdk1773n
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: jakarta
Victim Site: komunikasipublik.jakarta.go.id - Alleged database leak of Medvarsity
Category: Data Breach
Content: The threat actor claims to have leaked data of 147,000 users from Medvarsity. The compromised data reportedly includes first names, last names, email addresses, mobile numbers, passwords, IDs, UUIDs, etc.
Date: 2025-12-21T10:32:27Z
Network: openweb
Published URL: https://darkforums.hn/Thread-DATABASE-India-medvarsity-com-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9f6899ba-c304-42d5-97ba-61b787bb5b8b.png
Threat Actors: Demetrius
Victim Country: India
Victim Industry: Education
Victim Organization: medvarsity
Victim Site: medvarsity.com - University of Planalto Catarinense falls victim to LOCKBIT 5.0 Ransomware
Category: Ransomware
Content: The group claims to have obtained the organization’s data and intends to publish it within 6 – 7 days.
Date: 2025-12-21T09:55:17Z
Network: tor
Published URL: http://lockbitapt67g6rwzjbcxnww5efpg4qok6vpfeth7wx3okj52ks4wtad.onion/post/0f0099fb93e3d840e972f0503498ab3d
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/600dac52-53b3-4ed2-b9be-d7dd58fd989f.png
Threat Actors: LOCKBIT 5.0
Victim Country: Brazil
Victim Industry: Education
Victim Organization: university of planalto catarinense
Victim Site: uniplaclages.edu.br - Alleged leak of admin panel access to ACC Group (Thailand) Co., Ltd
Category: Initial Access
Content: The group claims to have leaked the admin panel access of ACC Group (Thailand) Co., Ltd.
Date: 2025-12-21T09:51:34Z
Network: telegram
Published URL: https://t.me/black100eyes/85
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/eaac2fdc-930f-4a0b-853d-735038934ab9.png
Threat Actors: Chennel G.H.G.K
Victim Country: Thailand
Victim Industry: Transportation & Logistics
Victim Organization: acc group (thailand) co., ltd
Victim Site: accgroup.co.th - Alleged leak of admin panel access to New GFMIS Thai
Category: Initial Access
Content: The group claims to have leaked the admin panel access of New GFMIS Thai
Date: 2025-12-21T08:51:20Z
Network: telegram
Published URL: https://t.me/black100eyes/83
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/df334789-840f-45dc-b83b-bb95a12e1df9.jpg
Threat Actors: Chennel G.H.G.K
Victim Country: Thailand
Victim Industry: Government Administration
Victim Organization: new gfmis thai
Victim Site: vendors.gfmis.go.th - Terport – Terminales Portuarias S.A. falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2025-12-21T08:48:25Z
Network: tor
Published URL: http://lynxblogxutufossaeawlij3j3uikaloll5ko6grzhkwdclrjngrfoid.onion/leaks/6947a0582423bc3ce01f5c42
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d00633d7-e539-46bd-b922-0ebdd31a93c5.jpg
Threat Actors: LYNX
Victim Country: Paraguay
Victim Industry: Transportation & Logistics
Victim Organization: terport – terminales portuarias s.a.
Victim Site: terport.com.py - Alleged Data Breach of Fujian Radio, Film and Television Group
Category: Data Breach
Content: The threat actor claims to have leaked 3 million records of data from Fujian Radio, Film and Television Group, which was compromised in 2024. The compromised data allegedly contains full names, ID numbers, physical addresses, and cable TV box codes.
Date: 2025-12-21T07:51:45Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Chinese-FRTN-Regional-Cable-TV-Provider-3M-Data-Breach
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a2f106d3-7938-4ebd-aa4b-d0caca3bbcba.png
Threat Actors: Tokyo0404
Victim Country: China
Victim Industry: Online Publishing
Victim Organization: fujian radio, film and television group
Victim Site: fjtv.net - Alleged Sale of Unauthorized VPN Access to Turkish University
Category: Initial Access
Content: The threat actor claims to be selling Unauthorized VPN Access to a Turkish University .
Date: 2025-12-21T06:25:38Z
Network: openweb
Published URL: https://breachforums.bf/Thread-VPN-Turkey-University
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9b18a5bf-d9f3-483d-8c27-6b308435938c.png
Threat Actors: dead
Victim Country: Turkey
Victim Industry: Education
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of “VOID KILLER” antivirus termination malware
Category: Malware
Content: Threat actor claims to be selling ‘VOID KILLER,’ a malware designed to terminate antivirus and EDR solutions.
Date: 2025-12-21T06:12:22Z
Network: openweb
Published URL: https://forum.exploit.in/topic/272466/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/df7bb253-34f2-49dc-92d2-270c87052b5d.png
https://d34iuop8pidsy8.cloudfront.net/3f3fdabe-8065-4274-9110-73907c2d3aee.png
Threat Actors: Crypt4You
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of login Access to ThriveCart
Category: Initial Access
Content: The group claims to have leaked the login of ThriveCart
Date: 2025-12-21T06:09:03Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/325
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/aa1f38d6-9930-4312-8691-4b2800508e78.png
Threat Actors: Digit_4
Victim Country: Spain
Victim Industry: E-commerce & Online Stores
Victim Organization: thrivecart
Victim Site: objetivoclientes.thrivecart.com - Alleged leak of login Access to Thuisvester
Category: Initial Access
Content: The group claims to have leaked the login Access of Thuisvester
Date: 2025-12-21T05:59:43Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/326
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a7aea8b0-e6b6-4a2d-9c0d-36ede21ffd44.png
Threat Actors: Digit_4
Victim Country: Netherlands
Victim Industry: Real Estate
Victim Organization: thuisvester
Victim Site: thuisvester.nl - Alleged leak of login access to Prince Royal’s College
Category: Initial Access
Content: The group claims to have leaked the login credentials of Prince Royal’s College.
Date: 2025-12-21T05:58:15Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/324
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e83651a4-4eff-4f81-9831-4c96f192f146.png
Threat Actors: Digit_4
Victim Country: Thailand
Victim Industry: Education
Victim Organization: prince royal’s college
Victim Site: paymentv2.prc.ac.th - Alleged leak of login access to The Sims Resource
Category: Initial Access
Content: The group claims to have leaked the login credentials to The Sims Resource
Date: 2025-12-21T05:50:17Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/322
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d3390eda-98ea-4d70-93e3-f7672395d89d.png
Threat Actors: Digit_4
Victim Country: Sweden
Victim Industry: Gaming
Victim Organization: the sims resource
Victim Site: thesimsresource.com - Alleged leak of login Access to ThinkCentral
Category: Initial Access
Content: The group claims to have leaked the login to ThinkCentral
Date: 2025-12-21T05:49:46Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/327
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/218ef670-06d6-4455-80b8-01786c26d29c.png
Threat Actors: Digit_4
Victim Country: USA
Victim Industry: Education
Victim Organization: thinkcentral
Victim Site: -k6.thinkcentral.com - Alleged leak of login access to Google
Category: Initial Access
Content: The group claims to have leaked the login credentials of Google.
Date: 2025-12-21T05:46:24Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/323
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f2b217a0-3915-49a4-b8f1-205c2cd56ef6.png
Threat Actors: Digit_4
Victim Country: USA
Victim Industry: Software
Victim Organization: google
Victim Site: account.google.com - Alleged Unauthorized Access to the Ministry of Health of Guatemala
Category: Initial Access
Content: The threat actor claims to be selling unauthorized access to the Ministry of Health of Guatemala.
Date: 2025-12-21T05:31:43Z
Network: openweb
Published URL: https://breachforums.bf/Thread-COLLECTION-mspas-gob-gt-ACCESO-INTERNO
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c5e3e7bb-fb61-4b5e-989b-821143a6346e.png
Threat Actors: Juxn-Modz
Victim Country: Guatemala
Victim Industry: Hospital & Health Care
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of login access to TheoTown Forum
Category: Initial Access
Content: The group claims to have leaked the login credentials to TheoTown Forum
Date: 2025-12-21T05:09:56Z
Network: telegram
Published URL: https://t.me/bl4cyb3r/321
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/62c338bb-ed28-453f-b436-53950146481a.png
Threat Actors: Digit_4
Victim Country: Germany
Victim Industry: Software Development
Victim Organization: theotown forum
Victim Site: forum.theotown.com - Alleged data breach of WashXpress
Category: Data Breach
Content: Threat actor claims to have leaked the database of WashXpress. The compromised data reportedly includes 90,500+ customer Emails.
Date: 2025-12-21T03:50:02Z
Network: openweb
Published URL: https://leakbase.la/threads/breached-washxpressth-com-database-90500-unique-customer-emails.47340/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5e28df02-95fa-4c24-92f9-f40c44bc05ba.png
https://d34iuop8pidsy8.cloudfront.net/e0658eb0-c333-4a63-a993-635d4d55e798.png
Threat Actors: nagumoiz
Victim Country: Thailand
Victim Industry: Recreational Facilities & Services
Victim Organization: washxpress
Victim Site: washxpressth.com - Alleged Data Breach of ISBN PERU
Category: Data Breach
Content: The threat actor claims to have leaked data from ISBN PERU.
Date: 2025-12-21T03:35:46Z
Network: openweb
Published URL: https://darkforums.hn/Thread-DATABASE-LEAK-FRESH-ISBN-PERU-2025
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/53be6e40-12ce-4cca-9b79-41a4b0b8e068.png
https://d34iuop8pidsy8.cloudfront.net/9cf4d65c-0133-4fdc-a21c-92db10a6fcce.png
https://d34iuop8pidsy8.cloudfront.net/c27d6bc1-d2bc-44bf-a173-186af93dfe21.png
Threat Actors: Johan_Liebheart
Victim Country: Peru
Victim Industry: Government Relations
Victim Organization: isbn peru
Victim Site: gob.pe - Alleged Data Breach of Win Systems
Category: Data Breach
Content: The threat actor claims to have leaked data from Win Systems. The compromised data reportedly contain 5,600 records including Name, Primary Email, Emails, Organization, Language, Timezone, PhoneNumber, Position.
Date: 2025-12-21T03:09:03Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-Win-Systems%C2%A0Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8c7b4b23-307c-4cf7-9458-08d60a735983.png
Threat Actors: dead
Victim Country: Spain
Victim Industry: Gambling & Casinos
Victim Organization: win systems
Victim Site: winsysgroup.com - Alleged sale of online casino source code
Category: Initial Access
Content: Threat actor claims to be selling source code access to a new online Casino.
Date: 2025-12-21T01:10:43Z
Network: openweb
Published URL: https://ramp4u.io/threads/selling-source-code-for-a-new-online-casino.3727/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6023dd6f-b559-4da4-8efc-b9451e5ccae4.png
Threat Actors: rebel137
Victim Country: Unknown
Victim Industry: Gambling & Casinos
Victim Organization: fate bet
Victim Site: fate.bet - Alleged Unauthorized Access to unidentified infrastructure system
Category: Initial Access
Content: The group claims to have hacked 265 systems worldwide.
Date: 2025-12-21T00:25:00Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/2977
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ea1c5570-d907-423b-875a-a12326eb515f.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown