This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.
1. Pharaoh’s Team Channel targets the website of CampusBuzz
- Category: Defacement
- Content: The group claims to have defaced the website of CampusBuzz
- Date: 2025-12-07T23:57:17Z
- Network: telegram
- Published URL: https://t.me/Pharaohs_n/423 Screenshots: https://d34iuop8pidsy8.cloudfront.net/6c5219c6-bbad-4e48-b5ad-7c68cd21f35e.png
- Threat Actors: Pharaoh’s Team Channel
- Victim Country: India
- Victim Industry: Social Media & Online Social Networking
- Victim Organization: campusbuzz
- Victim Site: campusbuzz.site
2. Pharaoh’s Team Channe targets the website of Smart School
- Category: Defacement
- Content: The group claims to have defaced the website of Smart School
- Date: 2025-12-07T23:39:19Z
- Network: telegram
- Published URL: https://t.me/Pharaohs_n/423 Screenshots: https://d34iuop8pidsy8.cloudfront.net/b6fdec1f-1dda-40bc-8412-ee67f4877790.png https://d34iuop8pidsy8.cloudfront.net/1482124f-655c-4eaa-8260-f76f79e0c13d.png
- Threat Actors: Pharaoh’s Team Channel
- Victim Country: Montenegro
- Victim Industry: Education
- Victim Organization: smart school
- Victim Site: lnote.hstn.me
3. Pharaoh’s Team Channel targets the website of xBuilder Lab Inc.
- Category: Defacement
- Content: The group claims to have defaced the website of xBuilder Lab Inc.
- Date: 2025-12-07T22:21:57Z
- Network: telegram
- Published URL: https://t.me/Pharaohs_n/423 Screenshots: https://d34iuop8pidsy8.cloudfront.net/f42f21dc-5d9e-44c2-9ded-a2c57bbf06be.png https://d34iuop8pidsy8.cloudfront.net/5596c31c-3439-4361-bf1b-68b20edfa908.png
- Threat Actors: Pharaoh’s Team Channel
- Victim Country: USA
- Victim Industry: Software
- Victim Organization: xbuilder lab inc..
- Victim Site: xbuilder.ai
4. Alleged Sale of CORS Vulnerability in a Medium-Sized Cryptocurrency Platform in Burma
- Category: Vulnerability
- Content: A threat actor claims to be selling a CORS vulnerability affecting a medium-sized cryptocurrency platform in Burma. It can be exploited like a standard CORS vulnerability with minor adjustments that allow bypassing the platform’s WAF.
- Date: 2025-12-07T21:16:48Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/271576/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/0d29ffe4-56ca-4535-ad2a-1fdf050116f5.png
- Threat Actors: CircuitBreaker
- Victim Country: Myanmar
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
5. Tucson Independent Physicians and Surgeons falls victim to LOCKBIT Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s data and intends to publish it within 15 days.
- Date: 2025-12-07T20:32:41Z
- Network: tor
- Published URL: http://lockbitapt67g6rwzjbcxnww5efpg4qok6vpfeth7wx3okj52ks4wtad.onion/post/12baaa3b6fd40b4c30612dded7872750 Screenshots: https://d34iuop8pidsy8.cloudfront.net/65eb2174-ff73-4796-8180-56daa2a7d3b6.png
- Threat Actors: LOCKBIT 5.0
- Victim Country: USA
- Victim Industry: Hospital & Health Care
- Victim Organization: tucson independent physicians and surgeons
- Victim Site: tucson-physicians.com
6. Alleged data leak of Ukraine Mirotic Air defense suppliers
- Category: Data Breach
- Content: The threat actor claims to be selling a Ukraine-related data leak allegedly involving Mikrotik/Mirotik air-defense suppliers, offering an archive containing PDF, Word, and Excel documents reportedly linked to Ukrainian defense-related providers.
- Date: 2025-12-07T20:24:20Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Source-Code-Ukraine-Dataleak-Mirotik-Providers-Air-Defencs Screenshots: https://d34iuop8pidsy8.cloudfront.net/b55d34aa-27dd-4851-8401-207c39b826f5.png
- Threat Actors: rootkaliwhoami
- Victim Country: Ukraine
- Victim Industry: Defense & Space
- Victim Organization: Unknown
- Victim Site: Unknown
7. Alleged sale of identity cards from Romania and China
- Category: Data Breach
- Content: The threat actor claims to be selling identity card data from Romania and China
- Date: 2025-12-07T20:12:44Z
- Network: openweb
- Published URL: https://darkforums.st/Thread-Selling-IDENTITY-CARDS-for-ROMANIA-and-CHINA Screenshots: https://d34iuop8pidsy8.cloudfront.net/30883c8a-db53-497c-b5f5-bdfa93057f50.png
- Threat Actors: socializer
- Victim Country: Romania
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
8. Alleged Data Breach of K3G Solutions LTDA in Brazil
- Category: Data Breach
- Content: Threat Actor claims to have breached the database of K3G Solutions LTDA in Brazil, leaking 192 GB of data that includes a full Huawei iManager U2000 backup, complete internal databases, major network configuration files Huawei, ZTE, Fiberhome, VSOL, MikroTik, network monitoring data Zabbix, Grafana, Graylog, Netbox, backbone GIS/KML maps, and customer documents and contracts.
- Date: 2025-12-07T19:43:38Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/271570/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/d27cc704-8d13-479f-a231-1ed99479cdc6.png
- Threat Actors: zestix
- Victim Country: Brazil
- Victim Industry: Network & Telecommunications
- Victim Organization: k3g solutions ltda
- Victim Site: k3gsolutions.com.br
9. Dream Hack targets the website of DocPro
- Category: Defacement
- Content: The Group claims to have defaced the website of DocPro.
- Date: 2025-12-07T18:51:22Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214778 Screenshots: https://d34iuop8pidsy8.cloudfront.net/f220489b-cba8-453c-beb1-c825bb14f6cc.png
- Threat Actors: Dream Hack
- Victim Country: France
- Victim Industry: Legal Services
- Victim Organization: docpro
- Victim Site: geniusmoney.docopro.com
10. Alpha wolf targets the website of Surveybell
- Category: Defacement
- Content: The Group claims to have defaced the website of Surveybell.
- Date: 2025-12-07T18:45:22Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214774 Screenshots: https://d34iuop8pidsy8.cloudfront.net/876a8c2b-d404-4fee-9540-1091bac2faf3.png
- Threat Actors: Alpha wolf
- Victim Country: USA
- Victim Industry: Market Research
- Victim Organization: surveybell
- Victim Site: surveybell.com
11. GHOST SECURITY SOCIETY PH targets the website of Labhmart
- Category: Defacement
- Content: The Group claims to have defaced the website of Labhmart.
- Date: 2025-12-07T18:36:45Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214786 Screenshots: https://d34iuop8pidsy8.cloudfront.net/c9ae6a68-cb1c-4c7c-8087-c8f15c56d9d8.png
- Threat Actors: GHOST SECURITY SOCIETY PH
- Victim Country: India
- Victim Industry: E-commerce & Online Stores
- Victim Organization: labhmart
- Victim Site: labhmart.com
12. Alleged Data Breach of TAJMAC-ZPS in Czech Republic
- Category: Data Breach
- Content: Threat Actor claims to have breached the database of TAJMAC-ZPS in Czech Republic, leaking 530 MB of internal data including ERP migration documents, feasibility studies, IT/OT architecture files, licensing details, cost-center records, export paperwork, and engineering documentation.
- Date: 2025-12-07T18:24:51Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/271554/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/b328b4f6-db21-45e4-8a54-08740fcb7e90.png https://d34iuop8pidsy8.cloudfront.net/8262b1fe-05ae-4361-9910-e280d0f212d8.png https://d34iuop8pidsy8.cloudfront.net/880ed932-c128-44e2-8b87-e1065ef84ea7.png https://d34iuop8pidsy8.cloudfront.net/6958dd25-7022-4135-9207-66c14dfba362.png
- Threat Actors: zestix
- Victim Country: Czech Republic
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: tajmac-zps
- Victim Site: tajmac-zps.cz
13. Jeffrey W. Krol & Associates, Ltd. falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 100 GB of the organization’s confidential internal data, including financial information and customer records, and intends to publish it within 9 days.
- Date: 2025-12-07T18:19:55Z
- Network: tor
- Published URL: http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/69357f7488b6823fa25d3fb4 Screenshots: https://d34iuop8pidsy8.cloudfront.net/4cf174fd-3b63-456a-b736-90bfafb6b513.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Accounting
- Victim Organization: jeffrey w. krol & associates, ltd.
- Victim Site: jwkrol.com
14. Alleged data breach of U.S. Department of Health and Human Services
- Category: Data Breach
- Content: The group claims to have breached data of the U.S. Department of Health and Human Services.
- Date: 2025-12-07T16:51:43Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/2765 Screenshots: https://d34iuop8pidsy8.cloudfront.net/5e0e555e-2ffd-4cf9-b5ee-ac578ccb3c64.png
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: USA
- Victim Industry: Government Administration
- Victim Organization: u.s. department of health and human services
- Victim Site: hhs.gov
15. Alleged Data Breach of Air Miles in Spain
- Category: Data Breach
- Content: Threat Actor claims to have breached the database of Air Miles in Spain, including 131 GB of data which contains several million records of personal information.
- Date: 2025-12-07T16:16:20Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/271559/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/3c2764d8-1308-43ad-a17c-d12712381171.png
- Threat Actors: Everestgroup
- Victim Country: Spain
- Victim Industry: Hospitality & Tourism
- Victim Organization: air miles
- Victim Site: travelclub.es
16. David M. Schwarz Architects, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 50 GB of the organization’s internal data.
- Date: 2025-12-07T16:12:36Z
- Network: tor
- Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=c0a207bf-2f8f-3326-b931-f8ab5a35fc8e Screenshots: https://d34iuop8pidsy8.cloudfront.net/324bea25-30ad-48ab-913f-ab97bca41873.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Architecture & Planning
- Victim Organization: david m. schwarz architects, inc.
- Victim Site: dmsas.com
17. Gopher Industrial, Inc. falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 500 GB of the organization’s internal data, including financial records, contracts, and incident reports, and intends to publish it within 9 days.
- Date: 2025-12-07T16:06:34Z
- Network: tor
- Published URL: http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/6935808188b6823fa25d47ab Screenshots: https://d34iuop8pidsy8.cloudfront.net/dd7eec7c-cc16-42a0-9871-54b7a4c6d236.png https://d34iuop8pidsy8.cloudfront.net/0eb6a378-37c6-43a5-b385-bf31e4bdb5f0.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: gopher industrial, inc.
- Victim Site: gopherindustrial.com
18. Alleged data breach of SNB Capital
- Category: Data Breach
- Content: The group claims to have breached the organization’s data.
- Date: 2025-12-07T15:58:33Z
- Network: telegram
- Published URL: https://t.me/c/2273625312/3051 Screenshots: https://d34iuop8pidsy8.cloudfront.net/b8981f57-954a-4a5f-aad8-62ee9de95c76.png
- Threat Actors: Yiqun data
- Victim Country: Saudi Arabia
- Victim Industry: Banking & Mortgage
- Victim Organization: snb capital
- Victim Site: snbcapital.com
19. Alleged access to OnlyPet
- Category: Initial Access
- Content: The group claims to have gained access to OnlyPet.
- Date: 2025-12-07T15:57:06Z
- Network: telegram
- Published URL: https://t.me/c/3321178780/114 Screenshots: https://d34iuop8pidsy8.cloudfront.net/46f0b2b5-778c-4fbd-9ba0-d8b4403bebba.png
- Threat Actors: BROTHERHOOD CAPUNG INDONESIA
- Victim Country: Iran
- Victim Industry: Business and Economic Development
- Victim Organization: onlypet
- Victim Site: onlypet.ir
20. jokeir 07x targets the website of Tabbaanistore
- Category: Defacement
- Content: The group claims to have defaced the website of Tabbaanistore.
- Date: 2025-12-07T15:14:02Z
- Network: telegram
- Published URL: https://t.me/DarK07xxxxxxx/343 Screenshots: https://d34iuop8pidsy8.cloudfront.net/360088b2-0903-4eb7-867b-e12e488b25de.png
- Threat Actors: jokeir 07x
- Victim Country: Tunisia
- Victim Industry: E-commerce & Online Stores
- Victim Organization: tabbaanistore
- Victim Site: tabbaanistore.tn
21. Quality Companies falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 40 GB of the organization’s sensitive internal data, including customer records and intends to publish it within 12 days.
- Date: 2025-12-07T14:57:56Z
- Network: tor
- Published URL: http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/6935887d88b6823fa25d7a1e Screenshots: https://d34iuop8pidsy8.cloudfront.net/28c2a7a7-23a6-4eea-9f82-a488ae2bc3d1.png https://d34iuop8pidsy8.cloudfront.net/d367fe7b-32a4-4314-b841-4cfe680fba8c.png
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: quality companies
- Victim Site: qualitycompanies.com
22. Galesi Group falls victim to Sinobi Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 40 GB of the organization’s data, which includes Confidential, Financial data, and intends to publish it within 8-9 days.
- Date: 2025-12-07T14:33:04Z
- Network: tor
- Published URL: http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/6935817388b6823fa25d4aa1 Screenshots: https://d34iuop8pidsy8.cloudfront.net/c2491788-7542-49e1-9687-4db33b0c18fc.jpg https://d34iuop8pidsy8.cloudfront.net/8be8e23b-2780-4179-a842-bea94d79bf42.jpg
- Threat Actors: Sinobi
- Victim Country: USA
- Victim Industry: Real Estate
- Victim Organization: galesi group
- Victim Site: galesi.com
23. Alleged data breach of U.S. Department of Labor
- Category: Data Breach
- Content: The group claims to be leaked the database of U.S. Department of Labor. The compromised data includes name, profession and email etc.
- Date: 2025-12-07T13:44:18Z
- Network: telegram
- Published URL: https://t.me/n2LP_wVf79c2YzM0/2760 Screenshots: https://d34iuop8pidsy8.cloudfront.net/91a1d6d8-8d02-46ff-a8ea-4ae6052337db.jpg
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: USA
- Victim Industry: Government Administration
- Victim Organization: u.s. department of labor
- Victim Site: dol.gov
24. Acoustical Control, LLC falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s internal data.
- Date: 2025-12-07T12:21:26Z
- Network: tor
- Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=393a67ff-24b4-3565-98dc-563a7aa050c0 Screenshots: https://d34iuop8pidsy8.cloudfront.net/6ba18176-6dbf-471a-96a6-574ed011d962.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Oil & Gas
- Victim Organization: acoustical control, llc
- Victim Site: acousticalcontrol-llc.com
25. AMH Philippines, Inc. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 6,730.00 GB of the organizations data.
- Date: 2025-12-07T12:16:22Z
- Network: tor
- Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=c585c090-3411-3bd9-bf12-ad7817638fdf Screenshots: https://d34iuop8pidsy8.cloudfront.net/48190c40-da48-45ab-9a3c-63c563a88031.jpg
- Threat Actors: Qilin
- Victim Country: Philippines
- Victim Industry: Building and construction
- Victim Organization: amh philippines, inc.
- Victim Site: amhphil.com
26. La Costa Dental Excellence falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s internal data.
- Date: 2025-12-07T12:06:18Z
- Network: tor
- Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=b1e8703c-3fe3-34c5-8af7-6fc953b4402b Screenshots: https://d34iuop8pidsy8.cloudfront.net/d21deeb2-a134-495b-8530-0fc2b1e41deb.png
- Threat Actors: Qilin
- Victim Country: USA
- Victim Industry: Medical Practice
- Victim Organization: la costa dental excellence
- Victim Site: lacostadentalexcellence.com
27. YAZAKI Corporation falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Content: The group claims to have obtained 350 GB of the organization’s data. The compromised data includes Confidential documents, Clients Data, NDA, Financial data, Operations, Corporate data, HR data such as employee medical records, Business Agreements, Development, Drawings, Technological production requirements and all documentation for the production of parts for BMW, NISSAN, SCANIA and many other global brands And a lot of other VERY IMPORTANT information.
- Date: 2025-12-07T11:59:54Z
- Network: tor
- Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/6930381ebe52b3ea15aa8317 Screenshots: https://d34iuop8pidsy8.cloudfront.net/2436d2d0-619c-48a4-a1b9-d7bcee468c3c.jpg https://d34iuop8pidsy8.cloudfront.net/e9cce54c-c01f-4d27-bbab-14af11c66463.jpg
- Threat Actors: INC RANSOM
- Victim Country: Japan
- Victim Industry: Manufacturing
- Victim Organization: yazaki corporation
- Victim Site: yazaki-group.com
28. Alleged sale of Weapon toolkit
- Category: Malware
- Content: The threat actor claims to be selling a malware toolkit named Weapon, allegedly offering botnet capabilities, credential theft, remote payload delivery, and EDR bypassing. The Weapon can collect data from multiple browsers, cryptocurrency wallets, and messaging platforms, and includes a management panel for campaigns, logs, proxies, and file uploads.
- Date: 2025-12-07T11:45:04Z
- Network: openweb
- Published URL: https://xss.pro/threads/144658/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/8b3949db-df5b-4725-957e-467899b87d57.png https://d34iuop8pidsy8.cloudfront.net/20d74a12-6215-4fe5-8f8a-91f9c9130c78.png https://d34iuop8pidsy8.cloudfront.net/672812e1-f226-421f-a8d4-134b8072e206.png
- Threat Actors: mock
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
29. Alleged data breach of the French Swimming Federation
- Category: Data Breach
- Content: The threat actor claims to have breached data of the French Swimming Federation.
- Date: 2025-12-07T11:36:41Z
- Network: openweb
- Published URL: https://x.com/L1ghtS3c/status/1997510919027609885 Screenshots: https://d34iuop8pidsy8.cloudfront.net/57749017-6a54-49eb-b1a8-d92b43d0309c.png
- Threat Actors: LightSec
- Victim Country: France
- Victim Industry: Sports
- Victim Organization: french swimming federation
- Victim Site: ffnatation.fr
30. Alleged data breach of the French Karate Federation
- Category: Data Breach
- Content: The threat actor claims to have breached data of the French Karate Federation.
- Date: 2025-12-07T11:36:28Z
- Network: openweb
- Published URL: https://x.com/L1ghtS3c/status/1997510919027609885 Screenshots: https://d34iuop8pidsy8.cloudfront.net/7a98cec3-783b-453f-91a2-e3eeb9d82914.png
- Threat Actors: LightSec
- Victim Country: France
- Victim Industry: Sports
- Victim Organization: french karate federation
- Victim Site: ffkarate.fr
31. Alleged data breach of the French Tennis Federation
- Category: Data Breach
- Content: The threat actor claims to have breached data of the French Tennis Federation.
- Date: 2025-12-07T11:35:55Z
- Network: openweb
- Published URL: https://x.com/L1ghtS3c/status/1997510919027609885 Screenshots: https://d34iuop8pidsy8.cloudfront.net/55987c8b-17be-4dfc-bf84-a59e6fc01d78.png
- Threat Actors: LightSec
- Victim Country: France
- Victim Industry: Sports
- Victim Organization: french tennis federation
- Victim Site: fft.fr
32. Illustrious Barcelona Bar Association (ICAB) falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s internal data.
- Date: 2025-12-07T11:21:03Z
- Network: tor
- Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=26bd6415-113f-3e2a-9a59-59de5ac6a8b1 Screenshots: https://d34iuop8pidsy8.cloudfront.net/d214dd4c-7d73-4a9a-b7ac-f7c04f8e5a54.jpg https://d34iuop8pidsy8.cloudfront.net/87f24d82-1957-4f54-862c-4cf3a66e75c5.jpg
- Threat Actors: Qilin
- Victim Country: Spain
- Victim Industry: Law Practice & Law Firms
- Victim Organization: illustrious barcelona bar association (icab)
- Victim Site: icab.es
33. Alleged sale of Pemerintahan Kota Pariaman database
- Category: Data Breach
- Content: The group claims to be selling the database of Pemerintahan Kota Pariaman.NB : This organization was breached by ” Z-SH4DOWSPEECH “
- Date: 2025-12-07T11:20:35Z
- Network: telegram
- Published URL: https://t.me/c/3027611821/183 Screenshots: https://d34iuop8pidsy8.cloudfront.net/d63ceefb-1bf6-437a-92f5-af484c8f39b2.png https://d34iuop8pidsy8.cloudfront.net/59249c62-fcfb-4f0f-aef5-a3a7ceadf444.png https://d34iuop8pidsy8.cloudfront.net/4931a8f2-370b-43df-8a04-8dea1d376ddd.png
- Threat Actors: Z-BL4CX-H4T
- Victim Country: Indonesia
- Victim Industry: Government Administration
- Victim Organization: pemerintahan kota pariaman
- Victim Site: pariamankota.go.id
34. Sanko Air Conditioning Co., Ltd. falls victim to Qilin Ransomware
- Category: Ransomware
- Content: The group claims to have obtained the organization’s internal data.
- Date: 2025-12-07T11:05:58Z
- Network: tor
- Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=04517761-332b-3c4e-8b01-d69201d7c720 Screenshots: https://d34iuop8pidsy8.cloudfront.net/e30c08fa-b9c7-4771-8c00-79f2b09de9a9.png
- Threat Actors: Qilin
- Victim Country: Japan
- Victim Industry: Manufacturing
- Victim Organization: sanko air conditioning co., ltd.
- Victim Site: sanko-air.co.jp
35. Alleged unauthorised access to Dispatch center of Ukrainian housing & utilities federation
- Category: Initial Access
- Content: The group claims to have gained access to a dispatch-center belonging to the Federation of Housing & Utilities Employers of Ukraine.NB: The authenticity of the claim is yet to be verified
- Date: 2025-12-07T10:59:03Z
- Network: telegram
- Published URL: https://t.me/perunswaroga/832 Screenshots: https://d34iuop8pidsy8.cloudfront.net/32b76335-f2e9-42c6-b49f-e91f6233f238.png
- Threat Actors: Perun Svaroga
- Victim Country: Ukraine
- Victim Industry: Facilities Services
- Victim Organization: federation of housing and utilities employers of ukraine
- Victim Site: dispetcher.info-gkh.com.ua
36. NOT-CTBER claims to target Thailand
- Category: Alert
- Content: A recent post by the group indicates that they are targeting Thailand
- Date: 2025-12-07T09:38:52Z
- Network: telegram
- Published URL: https://t.me/notctber/1427 Screenshots: https://d34iuop8pidsy8.cloudfront.net/8562b2eb-c166-49bd-b234-36c721cb3eeb.jpg
- Threat Actors: NOT-CTBER
- Victim Country: Thailand
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
37. V FOR VENDETTA CYBER TEAM targets the website of Rex TV India
- Category: Defacement
- Content: The group claims to have deface the website of Rex TV India
- Date: 2025-12-07T09:22:08Z
- Network: telegram
- Published URL: https://t.me/c/2932498194/230 Screenshots: https://d34iuop8pidsy8.cloudfront.net/19e2f13c-7490-475a-bd43-3fa89cc81ff1.jpg
- Threat Actors: V FOR VENDETTA CYBER TEAM
- Victim Country: India
- Victim Industry: Newspapers & Journalism
- Victim Organization: rex tv india
- Victim Site: rextvindia.com
38. Alleged data breach of V-Comp
- Category: Data Breach
- Content: The group claims to have obtained access to the data base of V-Comp. The compromised data reportedly includes personal data like email addresses, phone numbers, store orders, encrypted information about customers’ addresses.
- Date: 2025-12-07T08:45:48Z
- Network: telegram
- Published URL: https://t.me/c/1514923101/222 Screenshots: https://d34iuop8pidsy8.cloudfront.net/a0504faa-ffaf-4a9e-a765-4e37ea953282.jpg
- Threat Actors: ECLIPSE
- Victim Country: Ukraine
- Victim Industry: E-commerce & Online Stores
- Victim Organization: v-comp
- Victim Site: v-comp.com.ua
39. Alleged unauthorized access to NASA LC‑34 HCS system
- Category: Initial Access
- Content: A group claims to have accessed an internal interface of the NASA LC‑34 HCS compressor control system. The claim states that the interface displays operational parameters and historical logs, and suggests that alterations could affect equipment behavior.
- Date: 2025-12-07T08:35:41Z
- Network: telegram
- Published URL: https://t.me/zpentestalliance/814 Screenshots: https://d34iuop8pidsy8.cloudfront.net/f76ce96c-ba82-4138-a700-854a4f52c549.png
- Threat Actors: Z-PENTEST ALLIANCE
- Victim Country: USA
- Victim Industry: Aviation & Aerospace
- Victim Organization: nasa
- Victim Site: nasa.gov
40. Alleged Sale of Access to Unidentified Industrial Control Systems (ICS)
- Category: Initial Access
- Content: The group claims to be selling access to two unidentified Industrial Control Systems (ICS).
- Date: 2025-12-07T07:57:17Z
- Network: telegram
- Published URL: https://t.me/nullsechackers/648 Screenshots: https://d34iuop8pidsy8.cloudfront.net/f19def96-8f52-4577-8ff3-3827fa8b2d55.png
- Threat Actors: Nullsec Philippines
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
41. Alleged sale of 130 credit card records in UK
- Category: Data Breach
- Content: Threat actor claims to be selling 130 credit card details in UK .The compromised data reportedly includes credit card number, expiry, cvv, name ,address ,city ,zip code ,phone number, and date of birth.
- Date: 2025-12-07T06:27:26Z
- Network: openweb
- Published URL: https://forum.exploit.biz/topic/271538/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/e2f9d55a-831e-4185-b017-fccef61aa9a2.png
- Threat Actors: samy01
- Victim Country: UK
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
42. Alleged Sale of HFx v3.0 Exploitation Toolkit
- Category: Malware
- Content: A threat actor claims to be selling “HFx v3.0,” a multifunctional cracking and exploitation suite. The tool claims to support CMS logins, shell uploads, mail abuse, SMTP generation, mass exploitation, password resets, CP/WHM access, FTP functions, SSH brute-forcing, and additional webmail utilities.
- Date: 2025-12-07T04:53:33Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/271534/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/8d83c33b-8808-473f-9a50-bd2aa1220dbf.png https://d34iuop8pidsy8.cloudfront.net/7f4991c3-3aaf-46fe-ad97-7419db44d316.png
- Threat Actors: HEX80
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
43. Alleged Sale of HFx SMTP Domain-Based Cracking Tool
- Category: Malware
- Content: A threat actor claims to be selling HFx SMTP, a domain-based SMTP cracking toolkit that supports multiple mail service providers. The tool automates domain scanning and SMTP credential cracking, indicating clear malicious use for unauthorized email access and spam operations.
- Date: 2025-12-07T04:44:30Z
- Network: openweb
- Published URL: https://forum.exploit.in/topic/271533/ Screenshots: https://d34iuop8pidsy8.cloudfront.net/b74def90-fccd-49be-92b4-24983fc8e4c4.png https://d34iuop8pidsy8.cloudfront.net/91ff3c7c-dc71-4c2e-ab40-b83931e87978.png
- Threat Actors: HEX80
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
44. PASKOBLACKHAT targets the website of dana.ismec.cl
- Category: Defacement
- Content: The group claims to have defaced the website of dana.ismec.cl
- Date: 2025-12-07T04:32:34Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214460 Screenshots: https://d34iuop8pidsy8.cloudfront.net/755a95c9-8690-4415-bf94-2f9529728b36.png
- Threat Actors: PASKOBLACKHAT
- Victim Country: Chile
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
45. TH3 EL1T3 GHOST targets the website of Mozilla Foundation
- Category: Defacement
- Content: The group claims to have defaced the website of Mozilla Foundation.
- Date: 2025-12-07T03:24:29Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214735 Screenshots: https://d34iuop8pidsy8.cloudfront.net/5e2c4623-2682-4ee8-859b-6cabe37d68b0.png
- Threat Actors: TH3 EL1T3 GHOST
- Victim Country: USA
- Victim Industry: Software Development
- Victim Organization: mozilla foundation
- Victim Site: bugzilla.mozilla.org
46. PASKOBLACKHAT targets the website of Chimney World
- Category: Defacement
- Content: The group claims to have defaced the website of Chimney World.
- Date: 2025-12-07T03:20:19Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214464 Screenshots: https://d34iuop8pidsy8.cloudfront.net/4462d990-8fac-4c33-bc31-3c0ea97a96e8.png
- Threat Actors: PASKOBLACKHAT
- Victim Country: Qatar
- Victim Industry: Manufacturing
- Victim Organization: chimney world
- Victim Site: chimneyworld.com
47. TH3 EL1T3 GHOST targets the website of Google Bug Hunters
- Category: Defacement
- Content: The group claims to have defaced the website of Google Bug Hunters
- Date: 2025-12-07T03:03:41Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214734 Screenshots: https://d34iuop8pidsy8.cloudfront.net/bdbba214-5740-48c1-8954-b89448cd3c8f.png
- Threat Actors: TH3 EL1T3 GHOST
- Victim Country: USA
- Victim Industry: Computer & Network Security
- Victim Organization: google bug hunters
- Victim Site: bughunters.google.com
48. Reaper Byte Philippines Kano State Ministry of Solid Minerals Resources
- Category: Defacement
- Content: The group claims to have defaced the website of Kano State Ministry of Solid Minerals Resources.
- Date: 2025-12-07T02:50:09Z
- Network: openweb
- Published URL: https://defacer.id/archive/special Screenshots: https://d34iuop8pidsy8.cloudfront.net/248d1e10-37e1-45fb-947f-3d490d867337.png
- Threat Actors: Reaper Byte Philippines
- Victim Country: Nigeria
- Victim Industry: Mining/Metals
- Victim Organization: kano state ministry of solid minerals resources
- Victim Site: solidminerals.kn.gov.ng
49. Reaper Byte Philippines targets the website of Kano State Ministry of Youth & Sport Development
- Category: Defacement
- Content: The group claims to have defaced the website of Kano State Ministry of Youth & Sport Development .
- Date: 2025-12-07T02:41:46Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214427 Screenshots: https://d34iuop8pidsy8.cloudfront.net/a0232701-50e3-47bb-a6d4-4ec3c51d8787.png
- Threat Actors: Reaper Byte Philippines
- Victim Country: Nigeria
- Victim Industry: Government & Public Sector
- Victim Organization: kano state ministry of youth & sport development
- Victim Site: youthandsports.kn.gov.ng
50. Reaper Byte Philippines targtes the website of Kano State Ministry of Water Resources
- Category: Defacement
- Content: The group claims to have defaced the website of Kano State Ministry of Water Resources.
- Date: 2025-12-07T02:33:07Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214428 Screenshots: https://d34iuop8pidsy8.cloudfront.net/8a1bf599-f0f1-4229-93b0-6b110433a1d2.png
- Threat Actors: Reaper Byte Philippines
- Victim Country: Nigeria
- Victim Industry: Energy & Utilities
- Victim Organization: kano state ministry of water resources
- Victim Site: waterresources.kn.gov.ng
51. TH3 EL1T3 GHOST targets the website of YesWeHack
- Category: Defacement
- Content: The group claims to have defaced the website of YesWeHack
- Date: 2025-12-07T02:30:34Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214733 Screenshots: https://d34iuop8pidsy8.cloudfront.net/79a639c9-2488-4c4c-b557-07ac75133fac.png
- Threat Actors: TH3 EL1T3 GHOST
- Victim Country: France
- Victim Industry: Computer & Network Security
- Victim Organization: yeswehack
- Victim Site: yeswehack.com
52. PASKOBLACKHAT targets the website of HB Labor-Supply Contractor Ltd
- Category: Defacement
- Content: The group claims to have defaced the website of HB Labor-Supply Contractor Ltd.
- Date: 2025-12-07T02:16:05Z
- Network: openweb
- Published URL: https://defacer.id/mirror/id/214743 Screenshots: https://d34iuop8pidsy8.cloudfront.net/faef8d48-6df7-4daa-b607-3affd1e81d95.png
- Threat Actors: PASKOBLACKHAT
- Victim Country: Brazil
- Victim Industry: Manufacturing & Industrial Products
- Victim Organization: hb labor-supply contractor ltd
- Victim Site: casadosdados.com.br
Conclusion
The incidents detailed in this report highlight a diverse and active landscape of cyber threats. Defacements, ransomware attacks, and data breaches are prominent, affecting various sectors from government administration and healthcare to education, manufacturing, and social media. The geographic scope is vast, impacting countries including the USA, France, India, Brazil, Japan, Ukraine, and Nigeria.
The compromised data ranges from personal user information and internal government records to sensitive medical files and confidential corporate documentation. Beyond data compromise, the report reveals significant activity in initial access claims, with threat actors targeting critical infrastructure and government entities such as NASA and Ukrainian utilities. The presence of malware toolkits for sale further underscores the availability of offensive capabilities in the cyber underground.
The incidents collectively demonstrate that organizations across various industries and geographies face persistent threats from data exfiltration, unauthorized network access, and the proliferation of malicious tools. The nature of these incidents emphasizes the critical importance of robust cybersecurity measures, including strong access controls, data protection strategies, continuous vulnerability management, and proactive threat intelligence to defend against a wide array of sophisticated and opportunistic attacks.