[February-1-2026] Daily Cybersecurity Threat Report

1. Executive Summary

The cyber landscape on February 1, 2026, was dominated by three primary trends:

  1. Mass Defacement Campaigns: A concerted effort by “hacktivist” groups like HellR00ters Team and 404 CREW CYBER TEAM targeting small to medium enterprises (SMEs) across Slovenia, India, and Indonesia.+4
  2. High-Impact Data Leaks: Significant breaches targeting government and healthcare sectors, most notably the U.S. Government Publishing Office and Woundtech, the latter involving 3.8 TB of sensitive medical data.+1
  3. Monetization of Access: A robust underground economy on BreachForums and Exploit.biz for administrative access to e-commerce platforms and corporate Citrix environments.+2

2. Incident Classification & Statistical Overview

Based on the 93 reported incidents, the distribution of cyber activity is as follows:

CategoryPrimary ActorsKey Victims
Data Breachc0mmandor, Sythe, FulcrumSecWoundtech (USA), GPO (USA), MERNİS (Turkey)
DefacementHellR00ters Team, 404 CREW, UNDERGROUND-NETVarious Slovenian and Indonesian entities
Initial AccessParanoiaDe, H4JIM3, SpearrPalantir (USA), $23B China Corp, UK/US E-commerce
Malware/ToolsOpenBullet, F4AR, The SeekersWEEX Mobile Checker, JS Web Skimmers

3. Deep Dive: Major Cyber Incidents

3.1 Healthcare & Critical Data: The Woundtech Breach

One of the most severe incidents involved Woundtech, where the actor FulcrumSec claimed to have exfiltrated 3.8 TB of data.

  • Impact: Exposure of 160,000+ patients.
  • Data Types: 4.6 million clinical notes, EMR files, 85,000 referral documents with full PHI, and 93,000 clinical wound images.
  • Significance: This represents a massive violation of HIPAA standards and poses a long-term risk for medical identity theft.

3.2 Government & Defense Exploitation

Several incidents targeted national sovereignty and administrative bodies:

  • U.S. Government Publishing Office (GPO): Actor Sythe leaked over 1,500 records, including internal email communications and BCC/CC addresses.
  • MERNİS (Turkey): A breach of the Central Population Administration System was reported, exposing names, tax numbers, and residence data.
  • French Army (Armée de Terre): Angel_Batista claimed a leak of internal documents from the French Ministry of Defense site.

3.3 The Slovenian Defacement Wave

The HellR00ters Team executed a rapid-fire campaign in Slovenia, defacing multiple sites in a single day, including:

  • Kovaštvo Matjaž Vindiš (Mining/Metals).+2
  • MyFlightLog (Aviation).+2
  • Ekopool Balloon Club (Hospitality).
  • Barbara Celjska Foundation (Non-profit).

4. Threat Actor Profiles

4.1 The “c0mmandor” Campaigns

The actor c0mmandor was exceptionally prolific, focusing on Eastern European and Russian databases. Their activities included:

  • Leaking 830+ rows from an Armenian e-commerce site (Sextoys.am).
  • Releasing 2017-2018 Russian “mix” databases containing telecom and insurance data.
  • Exposing IT student data from Kazakhstan.

4.2 Initial Access Brokers (IABs)

Actors like ParanoiaDe and H4JIM3 are actively fueling the ransomware pipeline by selling administrative credentials:

  • ParanoiaDe listed admin access for WordPress shops in the UK, USA, and France.+2
  • H4JIM3 offered domain user access to a $23 Billion revenue Chinese organization via Citrix.

The report identifies the commercialization of specialized attack tools:

  • JS Web Skimmers: Actor F4AR released source code for a JavaScript skimmer designed to steal payment cards at checkout.
  • Lethalcompany.py: A new spyware/stealer identified by “The Seekers” designed for stealthy data collection on Windows systems.
  • Crypto Exchange Checkers: Tools specifically targeting WEEX mobile users are being sold for $500 to generate leads for further exploitation.

6. Geographical & Industry Impact Analysis

  • Slovenia: High frequency of defacements targeting local businesses.+2
  • India: Targeted by 404 CREW CYBER TEAM and Z-BL4CX-H4T.ID, focusing on retail and education.+2
  • Indonesia: Heavy focus from UNDERGROUND-NET on government and provincial education offices.+1
  • Iran: Shadow Cyber Security claimed wide-scale access to state databases, prisons, and news agencies.+2

7. Conclusion

The events of February 1, 2026, underscore a fractured yet highly efficient cyber-criminal ecosystem. While defacements serve as “noise” for hacktivist visibility, the silent exfiltration of terabytes of medical data (Woundtech) and government records (GPO, MERNİS) represents the true high-water mark of risk.

The proliferation of “initial access” listings suggests that many of these defaced or breached organizations may face secondary attacks, such as ransomware, in the coming weeks. Organizations must prioritize the securing of WordPress administrative panels and the patching of Citrix/VPN gateways to mitigate these specific, trending threats.

Detected Incidents Draft Data

  1. HellR00ters Team targets the website of Kovaštvo Matjaž Vindiš
    Category: Defacement
    Content: The group claims to have defaced the website of Kovaštvo Matjaž Vindiš
    Date: 2026-02-01T23:50:19Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/56d7bcd1-cced-4ba5-993a-e72f399d19e3.png
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Mining/Metals
    Victim Organization: kovaštvo matjaž vindiš
    Victim Site: kovastvovindis.si
  2. HellR00ters Team targets the website of Let balonom
    Category: Defacement
    Content: The group claims to have defaced the website of Let balonom
    Date: 2026-02-01T23:19:44Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/033f573c-8f0c-4a87-82dd-a1fd3afb94bd.png
    Threat Actors: HellR00ters Team
    Victim Country: Croatia
    Victim Industry: Leisure & Travel
    Victim Organization: let balonom
    Victim Site: letbalonom.hr
  3. HellR00ters Team targets the website of MyFlightLog
    Category: Defacement
    Content: The group claims to have defaced the website of MyFlightLog
    Date: 2026-02-01T23:18:32Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cf71fc2b-9769-4273-8136-30dfb170c713.jpg
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Aviation & Aerospace
    Victim Organization: myflightlog
    Victim Site: myflightlog.net
  4. Alleged sale of unauthorized access to an unidentified BB Market shop account
    Category: Data Breach
    Content: The threat actor claims to be selling unauthorized access to an unidentified BB market CC shop account.
    Date: 2026-02-01T23:16:02Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/275012/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ab98362a-8134-4dee-98b9-9641d4dfcdec.png
    Threat Actors: Big777
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. HellR00ters Team targets the website of Ekopool Balloon Club
    Category: Defacement
    Content: The group claims to have defaced the website of Ekopool Balloon Club
    Date: 2026-02-01T22:52:11Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e57562fd-5bd2-40a7-837f-0c17a222ad9b.jpg
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Hospitality & Tourism
    Victim Organization: ekopool balloon club
    Victim Site: poletzbalonom.si
  6. HellR00ters Team targets the website of VENOLEK
    Category: Defacement
    Content: The group claims to have defaced the website of VENOLEK
    Date: 2026-02-01T22:40:15Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/76db6eec-3edd-437b-9d57-7d69e592071a.jpg
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: venolek
    Victim Site: venolek.si
  7. HellR00ters Team targets the website of Studio Uršula
    Category: Defacement
    Content: The group claims to have defaced the website of Studio Uršula
    Date: 2026-02-01T22:39:23Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d7c1d88e-5000-4dff-83c5-720df63c7581.jpg
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Health & Fitness
    Victim Organization: studio uršula
    Victim Site: studio-ursula.si
  8. HellR00ters Team targets the website of Secondhandballoons.com
    Category: Defacement
    Content: The group claims to have defaced the website of Secondhandballoons.com
    Date: 2026-02-01T22:39:05Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/29752e3a-81a8-4b6a-a0d6-ab5f46efb6e9.jpg
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Aviation & Aerospace
    Victim Organization: Unknown
    Victim Site: secondhandballoons.com
  9. Alleged Leak of Flat/Land Registry Database From Poland
    Category: Data Breach
    Content: Threat actor claims to be selling leaked SQL database of flats/lands data from Poland. The compromised data reportedly contains over 25 million records.
    Date: 2026-02-01T22:27:35Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274909/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0ebb3228-d1fb-45e5-98ae-7cde64730ba9.png
    Threat Actors: matete
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. DARK 07x claims to target Tunisia
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Tunisia
    Date: 2026-02-01T22:18:32Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1538
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a4f87b40-81a6-4124-85f0-89f31e5d68d3.jpg
    Threat Actors: DARK 07x
    Victim Country: Tunisia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged data breach of Coinomi
    Category: Data Breach
    Content: A threat actor claims to have leaked a database allegedly associated with Coinomi, containing approximately 612,861 records. The exposed data appears to primarily include email addresses, as demonstrated by the provided sample list.
    Date: 2026-02-01T22:12:23Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Coinomi-DB
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3ca6e5c0-4536-48d9-a570-4b6ace93bf2f.png
    Threat Actors: kiura01
    Victim Country: UK
    Victim Industry: Financial Services
    Victim Organization: coinomi
    Victim Site: coinomi.com
  12. Alleged data breach of Tutoo
    Category: Data Breach
    Content: A threat actor claims to have leaked a full backup of the database and web files associated with tutoo.ir.
    Date: 2026-02-01T22:07:53Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-IR%C3%81N-FULL-BACKUP-DB-WEB-OF-tutoo-ir
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/50c76cc4-75ee-40b7-81bf-51fc4f041324.png
    Threat Actors: Evorax
    Victim Country: Iran
    Victim Industry: E-commerce & Online Stores
    Victim Organization: tutoo
    Victim Site: tutoo.ir
  13. Alleged leak of Full Exploit Pack Source Code
    Category: Malware
    Content: A threat actor claims to have leaked the complete exploit collection associated with ExploitPack.com, covering exploits from 2020 to 2026. The alleged leak reportedly includes exploit source code, payloads, shellcodes, scripts, and related components used within the ExploitPack framework. According to the post, the data was obtained by exploiting a vulnerability on the official website, granting unauthorized access to both older and newer exploit packs.
    Date: 2026-02-01T21:33:02Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-COLLECTION-exploitpack-com-ALL-Exploit-Leaked
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3bf284a0-cc14-43ba-8ced-cc33d55b1851.png
    https://d34iuop8pidsy8.cloudfront.net/ec1dfa8a-9b8a-4ac2-8e99-af3bf3ae979c.png
    Threat Actors: Spearr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. 404 CREW CYBER TEAM targets the website of Narpa Spices
    Category: Defacement
    Content: The group claims to have defaced the website of Narpa Spices
    Date: 2026-02-01T21:21:01Z
    Network: telegram
    Published URL: https://t.me/crewcyber/621
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7eae4460-7161-4de0-979d-f13e113be9f9.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: India
    Victim Industry: Food & Beverages
    Victim Organization: narpa spices
    Victim Site: narpaspices.in
  15. Alleged data leak of Bitcoin Balances Dataset
    Category: Data Breach
    Content: The threat actor claims to have leaked a dataset BTC BALS. the exposed information allegedly includes records containing email addresses, associated cryptocurrency wallet identifiers, and Bitcoin balance amounts
    Date: 2026-02-01T21:20:59Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-BTC-BALS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e78e644d-6231-46fc-b82f-f7af0ce668a7.png
    Threat Actors: Lurk
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. 404 CREW CYBER TEAM targets the website of Zaveri Bazaar
    Category: Defacement
    Content: The group claims to have defaced the website of Zaveri Bazaar
    Date: 2026-02-01T21:15:42Z
    Network: telegram
    Published URL: https://t.me/crewcyber/622
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f30a7550-4609-40e3-8484-f6ee27646949.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: India
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: zaveri bazaar
    Victim Site: zaveribazaar.co.in
  17. HellR00ters Team targets the website of Barbara Celjska Foundation
    Category: Defacement
    Content: The group claims to have defaced the website of Barbara Celjska Foundation
    Date: 2026-02-01T21:13:51Z
    Network: telegram
    Published URL: https://t.me/c/2758066065/952
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/61cf4b18-034f-4616-b12f-4f64888410ca.jpg
    Threat Actors: HellR00ters Team
    Victim Country: Slovenia
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: barbara celjska foundation
    Victim Site: fundacija-barbare-celjske.si
  18. 404 CREW CYBER TEAM targets the website of Sai Supermarket
    Category: Defacement
    Content: The group claims to have defaced the website of Sai Supermarket
    Date: 2026-02-01T21:00:37Z
    Network: telegram
    Published URL: https://t.me/crewcyber/620
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a9c19e42-a8c1-4795-b993-9ac4e47484af.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: India
    Victim Industry: Supermarkets
    Victim Organization: sai supermarket
    Victim Site: saisupermarket.in
  19. Alleged data breach of InfoLegale
    Category: Data Breach
    Content: The threat actor group claims to have leaked part of the InfoLegale database. they are currently disclosing around 2,000 user records, with the possibility of releasing the full dataset of 14M+ records later. The exposed information allegedly includes sensitive business and personal data such as full names, dates of birth, addresses, company and executive details, administrative and mandate-related records, and identifiers linked to French business entities.
    Date: 2026-02-01T20:59:21Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-FR-InfoLegale-14M-HawkSec
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2489a0bf-09c8-479e-8b00-a4fb1b3572fa.png
    https://d34iuop8pidsy8.cloudfront.net/2194ff63-57dd-41ab-a960-3228ed8a1c53.png
    Threat Actors: L4dybug
    Victim Country: France
    Victim Industry: Information Services
    Victim Organization: infolegale
    Victim Site: infolegale.fr
  20. Alleged sale of WEEX Crypto Exchange Mobile Checker
    Category: Malware
    Content: The threat actor is advertising a “WEEX Crypto Exchange Mobile Checker” tool for sale. the service is priced at $500 and is promoted as being useful for generating leads.
    Date: 2026-02-01T20:49:52Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-WEEX-Crypto-Exchange-Mobile-Checker
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6f6cde6a-baea-4fe5-9c8d-d5fb61ba1253.png
    Threat Actors: OpenBullet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. 404 CREW CYBER TEAM claims to target India
    Category: Alert
    Content: A recent post by the group indicates that they are targeting India.
    Date: 2026-02-01T20:22:31Z
    Network: telegram
    Published URL: https://t.me/crewcyber/619
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/10d9491f-88a3-4e71-919e-f961b1d7a9cc.jpg
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Shadow Cyber Security Claims to target Iran
    Category: Alert
    Content: A recent post by the group claims that they have gained access to databases, confidential information, and what it describes as strategically important assets across institutions of Iran.
    Date: 2026-02-01T20:04:11Z
    Network: telegram
    Published URL: https://t.me/shadow_cyber/261
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/45133605-74ee-44e2-a7b7-e391c4eddcf1.jpg
    Threat Actors: Shadow Cyber Security
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged sale of sensitive files of the Azerbaijan Institute
    Category: Data Breach
    Content: Threat actor claims to have leaked sensitive files of an unidentified Azerbaijan Institute.
    Date: 2026-02-01T19:57:08Z
    Network: openweb
    Published URL: https://leakbase.la/threads/sensitive-files-of-the-azerbaijan-institute-were-leaked-by-simon111.48718/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/45746396-bc7d-4e39-8a47-12fe0696ab9e.png
    Threat Actors: Simon111
    Victim Country: Azerbaijan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged data breach of ShadowTech
    Category: Data Breach
    Content: The threat actor claims to have leaked a database associated with shadowtech.fr, containing approximately 545K lines of records. the exposed data allegedly includes sensitive user and account information such as email addresses, full names, phone numbers, billing and shipping addresses, account creation details, and subscription and transaction-related metadata
    Date: 2026-02-01T19:52:47Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-shadowtech-fr
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f022568c-18bc-40b6-b41e-e950f5b9d405.png
    https://d34iuop8pidsy8.cloudfront.net/19b3b50e-e359-46db-a72f-44d75ed6d062.png
    Threat Actors: Yanisxratsu
    Victim Country: France
    Victim Industry: Computer & Network Security
    Victim Organization: shadowtech
    Victim Site: shadowtech.fr
  25. Alleged sale of IP checker and brute-force tool
    Category: Malware
    Content: Threat actor claims to be selling rust IP checker and bruteforce tool written in GO.
    Date: 2026-02-01T19:52:13Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274977/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0e651f2e-d98e-4f5c-9a1b-abc4af2cdaf6.png
    Threat Actors: privisnanet
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. HaxChipper targets the website of Bergie Digital
    Category: Defacement
    Content: The group claims to have defaced the website of Bergie Digital.
    Date: 2026-02-01T19:32:59Z
    Network: telegram
    Published URL: https://t.me/HaxChipper/116
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e136eb4b-4364-4103-977a-c151e039e033.png
    Threat Actors: HaxChipper
    Victim Country: USA
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: bergie digital
    Victim Site: bergiedigital.com
  27. Alleged data breach of Trezor
    Category: Data Breach
    Content: The threat actor claims to have leaked a dataset labeled “140K TREZOR LEAK”, allegedly containing around 140,000 user records, primarily email addresses,
    Date: 2026-02-01T19:27:01Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-140K-TREZOR-LEAK
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/93221e02-fe5f-44af-92db-6d14356c8a91.png
    Threat Actors: Lurk
    Victim Country: Czech Republic
    Victim Industry: Financial Services
    Victim Organization: trezor
    Victim Site: trezor.io
  28. HaxChipper targets the website of Mongol Kosen Technology College
    Category: Defacement
    Content: The group claims to have defaced the website of Mongol Kosen Technology College
    Date: 2026-02-01T19:03:20Z
    Network: telegram
    Published URL: https://t.me/HaxChipper/116
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/771887b1-7223-4666-882f-a15e88060248.jpg
    Threat Actors: HaxChipper
    Victim Country: Mongolia
    Victim Industry: Education
    Victim Organization: mongol kosen technology college
    Victim Site: mk.edu.mn
  29. Alleged data breach of Gran Quina de Nada
    Category: Data Breach
    Content: The threat actor claims to be uploading administrator access credentials for the portal portal.granquinnadenadal.cat. the exposed data allegedly includes portal login credentials
    Date: 2026-02-01T18:46:46Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SPAIN-granquinadenadal-cat-PORTAL-CREDENTIALS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/93c47622-aca4-43f7-a44d-497411df4f13.png
    Threat Actors: IntelShadow
    Victim Country: Spain
    Victim Industry: Leisure & Travel
    Victim Organization: gran quina de nada
    Victim Site: portal.granquinnadenadal.cat
  30. Alleged sale of unauthorized admin access to an unidentified WordPress shop in the UK
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized administrative access to an unidentified WordPress shop in the UK.
    Date: 2026-02-01T18:44:38Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274972/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cfdac12a-cce5-44ef-b46b-b5b1aa9bb3a4.jpeg
    Threat Actors: ParanoiaDe
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data sale of an unidentified organization from Australia
    Category: Data Breach
    Content: Threat actor claims to be selling leaked data from an unidentified organization based in Australia. The compromised data reportedly contains 65,000 rows leads, 10,000 rows of contacts 38,000 unique phone numbers and 51,000 unique emails. The organization reportedly operates in Civil Engineering Construction Retail industries with a revenue over $5 Million.
    Date: 2026-02-01T18:39:51Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274984/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/69aa6955-4495-437c-ac64-bdaef7198c94.png
    Threat Actors: GeeksforGeeks
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged data breach of Network Management System (NMS) in Bangladesh
    Category: Data Breach
    Content: The group claims to have breached the database of an unidentified Network Management System (NMS) in Bangladesh
    Date: 2026-02-01T18:21:30Z
    Network: telegram
    Published URL: https://t.me/LulzSecHackers/353
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5c7dbe2d-7d0c-480d-aa0e-c9ba3b9cbbbc.jpg
    Threat Actors: LulzSec Hackers
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged sale of unauthorized access to unidentified shop from USA
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized admin access to a US-based online shop, with alleged access to stolen credit card data collected via an iframe payment setup.
    Date: 2026-02-01T18:19:04Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274988/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/027344e3-5949-4123-83df-91518e642a6a.png
    Threat Actors: bot_ik2s
    Victim Country: USA
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged data breach of Crina Bulprich
    Category: Data Breach
    Content: The threat actor claims to be selling a database allegedly taken from crinabulprich.com, containing about 33,238 records, including customer order and personal information, with approximately 40% of the records allegedly containing payment card details.
    Date: 2026-02-01T18:13:45Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Crina-Bulprich-33-2k
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ea6ca227-82e0-4e5a-acf3-9b23e4db7f6d.png
    Threat Actors: temporary
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: crina bulprich
    Victim Site: crinabulprich.com
  35. Alleged sale of unauthorized access to unidentified wordpress shop from spain
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized administrative access to a WordPress-based e-commerce website of an unidentified organization based in Spain, including access to order management systems, payment processing features, and backend store operations.
    Date: 2026-02-01T17:59:50Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274973/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c20b0d72-a516-4cf9-b957-4b199e32d526.png
    Threat Actors: Shopify
    Victim Country: Spain
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged data breach of Concepto
    Category: Data Breach
    Content: The threat actor claims to be selling a leaked database from conceptoline.com, a luxury clothing brand, containing approximately 84,792 records. The exposed data allegedly includes customer details such as full names, email addresses, phone numbers, and billing/physical address information including country, city, and ZIP codes.
    Date: 2026-02-01T17:30:47Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-CONCEPTO-84-7k
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3e581bf4-c923-4dca-91d8-30628453ce75.png
    https://d34iuop8pidsy8.cloudfront.net/a0195dd7-6a23-4038-b260-93913a9fb861.png
    Threat Actors: temporary
    Victim Country: Romania
    Victim Industry: Fashion & Apparel
    Victim Organization: concepto
    Victim Site: conceptoline.com
  37. Alleged sale of unauthorized access to unidentified WordPress shop from USA
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to an unidentified WordPress shop from USA.
    Date: 2026-02-01T17:29:14Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274974/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b72dc7d8-af00-487d-8879-560b57e0697e.png
    Threat Actors: ParanoiaDe
    Victim Country: USA
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged data breach of Rewardy
    Category: Data Breach
    Content: The threat actor claims to be selling a database allegedly taken from Rewardy.io, containing about 2.2 million user records, including hashed passwords for a portion of accounts.
    Date: 2026-02-01T17:26:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-rewardy-io-2-2M-users
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/450be19b-7283-4570-8cc5-6daa133a91d4.png
    Threat Actors: test3221
    Victim Country: Colombia
    Victim Industry: Gaming
    Victim Organization: rewardy
    Victim Site: rewardy.io
  39. Alleged sale of unauthorized access to unidentified organization from China
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized domain user access to a Citrix based website of an unidentified organization based in China, reportedly having $23 billion in revenue.
    Date: 2026-02-01T17:12:19Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274970/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2b3e5c84-77bf-4c9c-b78d-b71aa092d9a4.png
    Threat Actors: H4JIM3
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged sale of unauthorized access to an unidentified organization from Turkey
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized domain user access to an unidentified manufacturing company based in Turkey.
    Date: 2026-02-01T16:57:13Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274986/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b8580832-da14-4a92-84c9-60e78edfd421.png
    Threat Actors: Big-Bro
    Victim Country: Turkey
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Alleged sale of unauthorized access to unidentified WordPress shop from USA
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to an unidentified WordPress shop based in USA.
    Date: 2026-02-01T16:43:37Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274983/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d50384cd-a6bb-4b24-a305-f4f8a74be5c2.png
    Threat Actors: ParanoiaDe
    Victim Country: USA
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Alleged Sale of Unauthorized WordPress Shop / Store Admin Access in france
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized administrative access to an France-based WordPress shop/store website.
    Date: 2026-02-01T16:32:06Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/274979/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b7e039b4-165e-4adb-8a29-9f9db75b9c61.png
    Threat Actors: ParanoiaDe
    Victim Country: France
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  43. TEAM BD CYBER NINJA OFFICIAL claims to target Bangladeshs banking system
    Category: Malware
    Content: A recent post by the group indicates that theyre targeting Bangladeshs banking system the group threatens potential destruction of databases and systems, claims persistence within targeted environments, and asserts the use of malware designed to evade detection while issuing political and ideological demands.
    Date: 2026-02-01T15:27:47Z
    Network: telegram
    Published URL: https://t.me/tbcnofficial/210?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7467f685-ac85-4388-880f-dee4cd458e4e.jpg
    Threat Actors: TEAM BD CYBER NINJA OFFICIAL
    Victim Country: Bangladesh
    Victim Industry: Banking & Mortgage
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Alleged Sale of FREE JavaScript Web Skimmer Source Code Released
    Category: Malware
    Content: The threat actor claims to be selling a JavaScript skimmer that steals payment card details from hacked online shop checkout pages.
    Date: 2026-02-01T15:21:09Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SOURCE-CODE-FREE-skimmer-web-in-js
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/66d03148-f49b-4172-b42c-36a78e5520b2.png
    Threat Actors: F4AR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Z-BL4CX-H4T.ID targets the website of Usicly
    Category: Defacement
    Content: The group claims to have defaced the website of Usicly
    Date: 2026-02-01T15:04:13Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/51
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/10d5b3a7-a076-4a81-b579-30b0afd456c2.jpg
    Threat Actors: Z-BL4CX-H4T.ID
    Victim Country: India
    Victim Industry: Music
    Victim Organization: usicly
    Victim Site: usicly.com
  46. Alleged data breach of Woundtech
    Category: Data Breach
    Content: The threat actor claims to have breached 3.8 TB of data from Woundtech, impacting 160,000+ patients. The leaked data allegedly includes personal and medical information, 4.6 million clinical notes, EMR files, 85,000 referral documents with full PHI, and approximately 93,000 clinical wound images.
    Date: 2026-02-01T14:49:38Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-FRESH-BREACH-PREVIEW-WOUNDTECH-HEALTHCARE-GRAPHIC-PHOTOS-MED-HISTORY-DOC-NOTES
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f2ea2337-4d6c-4e03-893e-e5b4e02e3161.png
    https://d34iuop8pidsy8.cloudfront.net/2170908a-7b5c-4c52-96aa-1897d63c7439.png
    Threat Actors: FulcrumSec
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: woundtech
    Victim Site: woundtech.net
  47. TEAM BD CYBER NINJA OFFICIAL claims to target all countries.
    Category: Alert
    Content: A recent post by the group indicates that theyre targeting all countries.
    Date: 2026-02-01T14:35:00Z
    Network: telegram
    Published URL: https://t.me/tbcnofficial/209
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2e27c192-2ac1-4e6d-9cbc-f01d58804409.jpg
    Threat Actors: TEAM BD CYBER NINJA OFFICIAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. WOLF CYBER ARMY targets the website of CommyX
    Category: Defacement
    Content: The group claims to have defaced the website of CommyX.
    Date: 2026-02-01T14:11:30Z
    Network: telegram
    Published URL: https://t.me/c/2670088117/427
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/37d93e03-b11b-4f29-bfbb-fcd92231b03e.png
    Threat Actors: WOLF CYBER ARMY
    Victim Country: Unknown
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: commyx
    Victim Site: commyx.com
  49. Alleged data breach of Sextoys.am
    Category: Data Breach
    Content: The threat actor claims to have breached 830+ rows of customer data belonging to Sextoys.am. The compromised data reportedly includes database tables such as address, customer, customer_ip, customer_login, information, and user.
    Date: 2026-02-01T13:18:50Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-sextoys-am-full-dump-sql
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ad6b57bc-25c5-42f2-8106-91c5bf18c5fd.png
    Threat Actors: c0mmandor
    Victim Country: Armenia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: sextoys.am
    Victim Site: sectoys.am
  50. Alleged data breach of eldorado.ua
    Category: Data Breach
    Content: The threat actor claims to have breached 20.3K SMTP records from eldorado.ua, allegedly containing IDs, incoming connection details, message statuses, SMS codes, Viber statuses, and more
    Date: 2026-02-01T13:06:53Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-eldorado-ua-SMTP-20-3k
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8d6dffeb-ded0-418a-97e6-d9e5b5a87e83.png
    https://d34iuop8pidsy8.cloudfront.net/8f0b50ee-94fd-4b2f-bbd8-e58a71110cad.png
    Threat Actors: CHONG
    Victim Country: Ukraine
    Victim Industry: E-commerce & Online Stores
    Victim Organization: eldorado.ua
    Victim Site: eldorado.ua
  51. Alleged data breach of Universarium
    Category: Data Breach
    Content: The threat actor claims to have breached data belonging to Universarium. The compromised data reportedly includes ID, full name, email address, mobile phonenumber, username, and account status.
    Date: 2026-02-01T12:50:59Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Universarium-ru-2019
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/607c0971-4865-434c-a2f0-c70fc6ea560c.png
    Threat Actors: c0mmandor
    Victim Country: Russia
    Victim Industry: Education
    Victim Organization: universarium
    Victim Site: universarium.org
  52. Alleged sale of Unauthorized access to Mall & Retail
    Category: Initial Access
    Content: The group claims to be selling unauthorized access to Mall & Retail.
    Date: 2026-02-01T12:33:41Z
    Network: telegram
    Published URL: https://t.me/memek1777/85
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b4006ef4-bcfd-4bbf-bbdd-ca4179b7d475.png
    Threat Actors: Gugugaga
    Victim Country: Colombia
    Victim Industry: Retail Industry
    Victim Organization: mall & retail
    Victim Site: mallyretail.com
  53. Alleged unauthorized access to a unidentified agricultural irrigation system in Turkey
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a system located which is responsible for the automated control of agricultural irrigation and fertilization in Turkey. In this access they got the control over They accessed an automated agricultural irrigation and fertilization control system that monitors and manages EC/pH levels, pumps, valves, flow sensors, alarms, and allows remote control via HMI and network connectivity.
    Date: 2026-02-01T12:16:41Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3538
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/90580bb6-7188-451a-9741-939cd8c67a2b.jpg
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Turkey
    Victim Industry: Agriculture & Farming
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged Unauthorized Access to a Café CCTV System in Denmark
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a CCTV System at a café in Denmark, reportedly observing customers spending time inside the establishment, including drinking beverages and engaging in leisure activities.
    Date: 2026-02-01T12:06:52Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1026
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/04681661-d0f3-4e21-b6c9-2b42a9c69266.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Denmark
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. Alleged data leak of Russian construction, real estate, and renovation companies
    Category: Data Breach
    Content: The threat actor claims to have leaked 322,258 rows of data from Russian construction, real estate, and renovation companies. The compromised data allegedly includes names, types, country, region, settlement, district, postal codes, addresses, sections, categories, and additional details.
    Date: 2026-02-01T12:00:26Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Russian-Construction-real-estate-renovation-companies
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c3aebe6e-8bf3-4c02-aa3e-13c4c89d9e2d.png
    Threat Actors: c0mmandor
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. STGHO3T claims to target Berlin
    Category: Alert
    Content: A recent post by the group indicates that theyre targeting Berlin in Germany.
    Date: 2026-02-01T11:37:36Z
    Network: telegram
    Published URL: https://t.me/stgho3tV/171
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6f5db57d-bd08-4ddf-93a8-9baf7aadcb62.jpeg
    Threat Actors: STGHO3T
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged data breach of Merkezi Nüfus İdaresi Sistemi
    Category: Data Breach
    Content: The threat claims to have breached data of General Directorate of Civil Registration and Nationality (MERNİS).The compromised data includes Full Name, Birthplace, Tax Number, Residence etc.Note: it was previously breached by the threat actor horrormar44 on September 5, 2024.
    Date: 2026-02-01T11:30:40Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-MERN%C4%B0S-%C4%B0L-%C4%B0L%C3%87E-KODLARI-MERN%C4%B0S-COUNTY-CODES
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e48de6ae-962a-4fe8-9b57-d2c4ef4f1dc4.png
    Threat Actors: hellohihi
    Victim Country: Turkey
    Victim Industry: Government Administration
    Victim Organization: merkezi nüfus idaresi sistemi
    Victim Site: nvi.gov.tr
  58. Alleged leak of mixed databases from Russia
    Category: Data Breach
    Content: The threat actor claims to have leaked mixed databases from Russia dating back to 2017–2018, allegedly comprising 17 files containing sensitive customer information related to telecommunications subscribers, WhatsApp clients, insurance customers, online food orders and more.
    Date: 2026-02-01T11:28:21Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Russian-mix-databases-2017-2018
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8a2183ec-0882-4237-828b-4fd208070d8b.png
    Threat Actors: c0mmandor
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged data leak of individuals who ordered theater tickets in Moscow between 2016 and 2017
    Category: Data Breach
    Content: The threat actor claims to have leaked a database allegedly containing over 45,000 records of individuals who ordered theater tickets in Moscow between 2016 and 2017, including full names, phone numbers, event details, seat information, booking dates and more.
    Date: 2026-02-01T11:25:26Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Moscow-People-who-ordered-tickets-to-theaters-2016-2017
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bafc4470-74df-4ad9-9955-888254cfea7d.png
    Threat Actors: c0mmandor
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged leak of Russian banks clients data
    Category: Data Breach
    Content: The threat actor claims to have leaked Russian bank client’s data dating back to 2018, allegedly comprising 18 files.
    Date: 2026-02-01T11:10:07Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Clients-of-Russian-banks-2018
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e2adbee2-9502-4f2f-82c2-fe4a2e5756d6.png
    Threat Actors: c0mmandor
    Victim Country: Russia
    Victim Industry: Banking & Mortgage
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Alleged data breach of Eden Tour Armenia
    Category: Data Breach
    Content: A threat actor claims to have leaked data from Eden Tour Armenia. The compromised data reportedly contains over 500 contact entries, including full names, email addresses, phone numbers, IP addresses, order details, timestamps, and message contents.
    Date: 2026-02-01T11:06:58Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-edentour-am-database-contact-form-entries
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5f29affa-e009-4cf6-8ee5-cea4287bf787.png
    Threat Actors: c0mmandor
    Victim Country: Armenia
    Victim Industry: Aviation & Aerospace
    Victim Organization: eden tour armenia
    Victim Site: edentour.am
  62. Alleged Unauthorized Access to a Hair Salon CCTV System in Ukraine
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a CCTV system at a hair salon in Ukraine, reportedly observing empty premises with no customers and minimal staff present during operating hours.
    Date: 2026-02-01T10:55:59Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1025
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7346dab4-07a8-401f-9408-a4c6685d2a0c.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Alleged leak of IT students data from Kazakhstan
    Category: Data Breach
    Content: The threat actor claims to have leaked 477 rows of IT students data from Kazakhstan, dated 2017, including full names, contact details, dates of birth, addresses, and more.
    Date: 2026-02-01T10:55:33Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-IT-students-Kazakhstan-2017
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/95fd8893-9c7a-466f-8cc4-82707116f494.png
    Threat Actors: c0mmandor
    Victim Country: Kazakhstan
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  64. Alleged data breach of Grupa Wirtualna Polska
    Category: Data Breach
    Content: The threat actor claims to have breached 42,000 records from Grupa Wirtualna Polska.
    Date: 2026-02-01T10:44:31Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-41K-o2-pl-MAIL-DATABASE
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4985e56e-971b-4517-80ae-05fab4bdfa8a.png
    Threat Actors: psikozesnaf
    Victim Country: Poland
    Victim Industry: Information Services
    Victim Organization: grupa wirtualna polska
    Victim Site: o2.pl
  65. Alleged sale of shell access to Ar-Rahman Islamic Boarding School
    Category: Initial Access
    Content: The group claims to be selling shell access to Ar-Rahman Islamic Boarding School.
    Date: 2026-02-01T10:27:51Z
    Network: telegram
    Published URL: https://t.me/memek1777/79
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/34cb26db-e979-40f6-821f-1a1ea08260b7.png
    Threat Actors: Gugugaga
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: ar-rahman islamic boarding school
    Victim Site: ponpesarrahmanplg.ponpes.id
  66. Alleged leak of SQL vulnerability in ASIMOV Robotics
    Category: Vulnerability
    Content: The group claims to have leaked SQL vulnerability in the website of ASIMOV Robotics.
    Date: 2026-02-01T10:27:13Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/92
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ab7cec24-e292-4f37-8a70-7190db129f07.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: India
    Victim Industry: Research Industry
    Victim Organization: asimov robotics
    Victim Site: asimovrobotics.com
  67. Alleged data breach of Demsoft Yazılım
    Category: Data Breach
    Content: The threat actor claims to have breached data from Demsoft Yazılım.
    Date: 2026-02-01T10:19:16Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-demsoft-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/317c4ce1-f557-4635-8e3a-1222536e8575.png
    Threat Actors: psikozesnaf
    Victim Country: Turkey
    Victim Industry: E-commerce & Online Stores
    Victim Organization: demsoft yazılım
    Victim Site: demsoft.com
  68. Alleged leak of WordPress login access to Suara Kapuas
    Category: Initial Access
    Content: The group claims to have leaked WordPress login access to Suara Kapuas.
    Date: 2026-02-01T09:35:11Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/374
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b774d01d-eba6-4e6b-a2b8-232e50208b22.png
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Indonesia
    Victim Industry: Newspapers & Journalism
    Victim Organization: suara kapuas
    Victim Site: suarakapuas.com
  69. Alleged leak of WordPress login access to Houston Stevenson
    Category: Initial Access
    Content: The group claims to have leaked WordPress login access to Houston Stevenson.
    Date: 2026-02-01T08:51:43Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/374
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a19fcb17-97ef-411c-80b9-5b63a552da3d.png
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Canada
    Victim Industry: Mental Health Care
    Victim Organization: houston stevenson
    Victim Site: houstonstevenson.com
  70. Alleged data breach of U.S. Government Publishing Office
    Category: Data Breach
    Content: The threat actor claims to have breached over 1,500 records from the U.S. Government Publishing Office, allegedly including 518 unique email addresses, emails sent, BCC and CC addresses, and full names.
    Date: 2026-02-01T08:13:59Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-GPO-Gov-Database-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3d274f48-6af6-4b21-8443-fbefe0ab1974.png
    https://d34iuop8pidsy8.cloudfront.net/5bd354d0-0675-43e9-a442-74bb3827f98f.png
    https://d34iuop8pidsy8.cloudfront.net/039340e0-027b-444e-a847-186b23391c78.png
    https://d34iuop8pidsy8.cloudfront.net/8ece733b-d962-4683-9677-d300eda64207.png
    Threat Actors: Sythe
    Victim Country: USA
    Victim Industry: Government Relations
    Victim Organization: u.s. government publishing office
    Victim Site: gpo.gov
  71. THE GARUDA EYE claims to target Albania
    Category: Alert
    Content: A recent post by the group indicates that theyre targeting Albania.
    Date: 2026-02-01T08:02:31Z
    Network: telegram
    Published URL: https://t.me/c/2312948728/1711
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4a7a700-52bd-4bc8-8151-850e5716a369.jpg
    Threat Actors: THE GARUDA EYE
    Victim Country: Albania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  72. Alleged data breach of unidentified Russian site
    Category: Data Breach
    Content: The threat actor claims to have breached over 700 credentials from an unidentified Russian website.
    Date: 2026-02-01T07:55:01Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Russian-site-breached
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/24d9c371-e067-414a-b011-ce89a1149d04.png
    Threat Actors: r00tUA
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Alleged leak of unauthorized access to FLOORX
    Category: Initial Access
    Content: The group claims to have leaked unauthorized word press access of FLOORX.
    Date: 2026-02-01T07:49:09Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/374
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/61a5720e-d480-458a-bc13-8ebced34e8c6.jpg
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Bangladesh
    Victim Industry: Civil Engineering
    Victim Organization: floorx
    Victim Site: floorxltd.com
  74. Alleged Unauthorized Access to Control Nacional de Armas
    Category: Initial Access
    Content: Threat Actor claims to have leaked unauthorized admin access of Control Nacional de Armas.
    Date: 2026-02-01T07:23:12Z
    Network: openweb
    Published URL: https://serviciosarmas.ccffaa.mil.ec/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/17dbe1c0-c0e1-4d70-8833-c8efe93aa3ea.png
    https://d34iuop8pidsy8.cloudfront.net/a51169dc-c403-4856-9d95-cb6fde3efa7c.png
    Threat Actors: GordonFreeman
    Victim Country: Ecuador
    Victim Industry: Defense & Space
    Victim Organization: control nacional de armas
    Victim Site: serviciosarmas.ccffaa.mil.ec
  75. Alleged leak of unauthorized access to EventON
    Category: Initial Access
    Content: The group claims to have leaked unauthorized word press access of EventON.
    Date: 2026-02-01T07:22:25Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/374
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5a16050d-37bd-4b04-bb73-884fc463b28e.jpg
    Threat Actors: Z-BL4CX-H4T
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: eventon
    Victim Site: myeventon.com
  76. Alleged Data breach of STIKes Mitra Husada Medan
    Category: Data Breach
    Content: The claims to have breached the database of STIKes Mitra Husada Medan; the dataset contains visible SQL dump header generated via phpMyAdmin, suggesting backend database exposure.
    Date: 2026-02-01T06:26:09Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-STIKes-Mitra-Husada-Medan
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eb7a7372-541b-439d-a349-c3cba86c9e7c.png
    Threat Actors: CY8ER_N4TI0N
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: stikes mitra husada medan
    Victim Site: mitrahusada.ac.id
  77. Alleged data breach of DIF Sonora
    Category: Data Breach
    Content: Threat actor claims to have leaked data belonging to DIF Sonora. The compromised data includes name, phone number, residential address.
    Date: 2026-02-01T06:23:18Z
    Network: openweb
    Published URL: https://x.com/sonoraciber/status/2017386291269099562
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b45aca2b-3440-4257-8038-a54a5367a1ea.png
    Threat Actors: Sonora Cybersecure
    Victim Country: Mexico
    Victim Industry: Government & Public Sector
    Victim Organization: dif sonora
    Victim Site: difsonora.gob.mx
  78. Alleged leak of lethalcompany.py
    Category: Malware
    Content: The group claims to have leaked a malicious program identified as lethalcompany.py, which is characterized as a spyware and information-stealing tool. This malware is designed to run stealthily on Windows systems, where it covertly monitors user activity and collects highly sensitive data, specifically including passwords.
    Date: 2026-02-01T06:20:19Z
    Network: telegram
    Published URL: https://t.me/the_seeker8/660
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/21975e08-8d77-4fce-a747-e5a45026d85a.png
    Threat Actors: The Seekers
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged Unauthorized Webmail Access of Palantir Technologies
    Category: Initial Access
    Content: The threat actor claims to have leaked the Webmail Access of Palantir Technologies.
    Date: 2026-02-01T04:49:41Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-PALANTIR-Webmail-Link
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a53be580-82aa-4428-88a8-fba982e0cf97.png
    Threat Actors: Spearr
    Victim Country: USA
    Victim Industry: Government Relations
    Victim Organization: palantir technologies
    Victim Site: palantir.com
  80. Z-BL4CX-H4T.ID targets the website of Nano Medical Clinic
    Category: Defacement
    Content: Group claims to have defaced the website of Nano Medical Clinic.
    Date: 2026-02-01T04:47:19Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/49
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/15503057-85e4-4b8a-be58-eff79e2ec6ea.png
    Threat Actors: Z-BL4CX-H4T.ID
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: nano medical clinic
    Victim Site: app.nanoclinic.com
  81. UNDERGROUND-NET targets the website of BUMN House
    Category: Defacement
    Content: Group claims to have defaced the website of BUMN HouseMirror link: https://defacer.id/mirror/id/235073
    Date: 2026-02-01T04:06:51Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1264
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c745b5ce-9700-4b15-835c-1d042a22c7ac.png
    Threat Actors: UNDERGROUND-NET
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: bumn house
    Victim Site: rumah-bumn.id
  82. UNDERGROUND-NET targets the website of PT Bank Perekonomi Rakyat (BPR) Swadhanamas Pakto
    Category: Defacement
    Content: Group claims to have defaced the website of PT Bank Perekonomi Rakyat (BPR) Swadhanamas PaktoMirror link: https://defacer.id/mirror/id/235076
    Date: 2026-02-01T03:56:36Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1267
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4ad4119-c4bc-444b-9e12-4a1b7da4717d.png
    Threat Actors: UNDERGROUND-NET
    Victim Country: Indonesia
    Victim Industry: Banking & Mortgage
    Victim Organization: pt bank perekonomi rakyat (bpr) swadhanamas pakto
    Victim Site: bprswadhanamaspakto.co.id
  83. UNDERGROUND-NET targets the website of PSMK Field of West Java Provincial Education Office
    Category: Defacement
    Content: Group claims to have defaced the website of PSMK Field of West Java Provincial Education OfficeMirror link: https://defacer.id/mirror/id/235075
    Date: 2026-02-01T03:52:47Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1266
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/62e8048b-ad8b-4aa8-8c1e-292ecb6a6871.png
    Threat Actors: UNDERGROUND-NET
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: psmk field of west java provincial education office
    Victim Site: psmk.jabarprov.go.id
  84. Alleged sale of Egyptian medical lab Patient data
    Category: Data Breach
    Content: Threat actor claims to be selling patient records allegedly obtained from multiple major medical laboratories in Egypt, comprising ~5,529 records with personal, contact, and diagnostic details, dated between December 2025 and January 2026.
    Date: 2026-02-01T03:47:01Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Selling-Egypt-Patients%C2%A0data-from-top-medical-labs
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/98922da0-0495-4d96-a138-527158f32341.png
    Threat Actors: CrowStealer
    Victim Country: Egypt
    Victim Industry: Hospital & Health Care
    Victim Organization: Unknown
    Victim Site: results.u-carelabs.com
  85. UNDERGROUND-NET targets the website of Online Reporting System (SLO) – IOSH Indonesia
    Category: Defacement
    Content: Group claims to have defaced the website of Online Reporting System (SLO) – IOSH IndonesiaMirror link: https://defacer.id/mirror/id/235074
    Date: 2026-02-01T03:28:00Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1265
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c08d55f5-4d4d-47a8-a6c7-45cf67b9f208.png
    Threat Actors: UNDERGROUND-NET
    Victim Country: Indonesia
    Victim Industry: Management Consulting
    Victim Organization: online reporting system (slo) – iosh indonesia
    Victim Site: slo-iosh.id
  86. Alleged data leak of Apparel & Accessories retail shop Australia
    Category: Data Breach
    Content: Threat actor claims to be selling data from an unidentified Apparel & Accessories retail store in Australia.
    Date: 2026-02-01T03:18:54Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/274890/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dc03747e-b7d3-48d6-a98c-b17f47c234ea.png
    https://d34iuop8pidsy8.cloudfront.net/3e58da42-54c5-4858-a5d0-71df18deeb3f.png
    Threat Actors: GeeksforGeeks
    Victim Country: Australia
    Victim Industry: Retail Industry
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Alleged Data Breach of Chennai Central Co-operative Bank Ltd
    Category: Data Breach
    Content: Threat actor claims to have obtained data from Chennai Central Co-operative Bank Ltd.
    Date: 2026-02-01T02:29:37Z
    Network: telegram
    Published URL: https://t.me/c/2705921599/164
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6402c60b-2801-4890-8c94-e4b2dd2e177b.png
    Threat Actors: Sy-Root
    Victim Country: India
    Victim Industry: Banking & Mortgage
    Victim Organization: chennai central co-operative bank ltd
    Victim Site: chennaiccb.bank.in
  88. Alleged Data Sale of Uganda Public Service Commission database
    Category: Data Breach
    Content: The threat actor claims to be selling a database of Uganda Public Service Commission portal data, the dataset contains personal and identification details of applicants.
    Date: 2026-02-01T00:56:20Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-Uganda-official-government-job-application–66571
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/feab8701-ac14-4ee3-87a4-b6e80142be95.png
    Threat Actors: daku
    Victim Country: Uganda
    Victim Industry: Government Administration
    Victim Organization: uganda public service commission (psc)
    Victim Site: vacancies.psc.go.ug
  89. Alleged data breach of Fars News Agency
    Category: Data Breach
    Content: Group claims to have gained access and leaked data belonging to Fars News Agency. The compromised data includes personal information.NB: The organization was previously breached on January 26, 2025.
    Date: 2026-02-01T00:47:57Z
    Network: telegram
    Published URL: https://t.me/shadow_cyber/254
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5c16386b-e770-4553-a5f3-37dce7e36da7.png
    Threat Actors: Shadow Cyber Security
    Victim Country: Iran
    Victim Industry: Broadcast Media
    Victim Organization: fars news agency
    Victim Site: farsnews.ir
  90. Alleged data breach of Peoples Mojahedin Organization of Iran
    Category: Data Breach
    Content: Group claims to have accessed and leaked data belonging to Peoples Mojahedin Organization of Iran. The compromised data includes several personal documents.
    Date: 2026-02-01T00:36:37Z
    Network: telegram
    Published URL: https://t.me/shadow_cyber/257
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7fb240db-dc8e-4889-9464-9ccc72e29d90.png
    Threat Actors: Shadow Cyber Security
    Victim Country: Iran
    Victim Industry: Political Organization
    Victim Organization: peoples mojahedin organization of iran
    Victim Site: mojahedin.org
  91. Alleged unauthorized access to unidentified government agency of Russian Federation
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to unidentified government agency of Russian Federation.
    Date: 2026-02-01T00:23:50Z
    Network: telegram
    Published URL: https://t.me/shadow_cyber/255
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78c6756c-53cd-4274-8a8e-d9532915db13.png
    Threat Actors: Shadow Cyber Security
    Victim Country: Russia
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Alleged data leak of Tehrans Prisons
    Category: Data Breach
    Content: Group claims to have leaked data belonging to Tehrans Prisons. The compromised data includes name, phone number and residential addresses.
    Date: 2026-02-01T00:04:36Z
    Network: telegram
    Published URL: https://t.me/shadow_cyber/253
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/336b0946-e455-4191-8917-b6ab86020911.png
    Threat Actors: Shadow Cyber Security
    Victim Country: Iran
    Victim Industry: Law Enforcement
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged Data Breach of Armée de Terre Documents
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Armée de Terre Documents.
    Date: 2026-02-01T00:03:59Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-defense-gouv-fr-Arm%C3%A9e-de-Terre-docs
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9ddf11dd-6a01-4449-9e2b-3a7ca7b2c785.png
    Threat Actors: Angel_Batista
    Victim Country: France
    Victim Industry: Defense & Space
    Victim Organization: armée de terre
    Victim Site: defense.gouv.fr