[February-3-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a comprehensive analysis of cybersecurity incidents detected over a 24-hour period on February 3, 2026. The data indicates a volatile global threat landscape characterized by a high volume of data breaches, unauthorized access sales, and targeted defacement campaigns. The monitoring period recorded a significant surge in activity across multiple geopolitical theaters and industrial sectors. A primary driver of this activity was the threat actor A K U L A v 2, who orchestrated a widespread campaign targeting government, educational, and telecommunications sectors across the Middle East, specifically focusing on Iran, Israel, Iraq, and the UAE. Simultaneously, the Indonesian education sector faced a concentrated defacement campaign by the group BABAYO EROR SYSTEM, targeting numerous special needs schools.+4

Critical infrastructure remains a priority target. Alarming claims regarding unauthorized access to SCADA/HMI systems in the USA, Italy, Israel, and Australia suggest a potential escalation in operational technology (OT) threats. Furthermore, high-profile entities such as the Central Intelligence Agency (CIA) and Lawrence Livermore National Laboratory were allegedly targeted or breached, indicating that threat actors are emboldened to strike significantly hardened targets.+4

The commercialization of stolen data continues unabated on dark web forums. Large-scale datasets from Japan, Germany, and India—ranging from travel records to business directories—were listed for sale by actors such as Dripper.+1

This report details these incidents, categorizing them by threat vector, geography, and sector, to provide actionable intelligence on the current security posture of global organizations.


2. Geopolitical Threat Landscape

The incidents observed on February 3, 2026, reveal distinct geopolitical fault lines. The data suggests that cyber operations are increasingly mirroring regional tensions, particularly in the Middle East and Asia.

2.1 The Middle East Cyber Front

The most prolific activity was observed in the Middle East, driven largely by the threat actor A K U L A v 2. This actor’s operational tempo was exceptionally high, executing a “hack-and-leak” strategy focused on credential theft.

  • Iran: The primary target of this campaign was Iran. Victims included Semnan University , Shiraz University of Medical Sciences , Soroush Plus messenger , and the Mohaymen ICT Group. The breadth of targets—ranging from academia to secure communications and IT services—suggests a systematic effort to destabilize or embarrass Iranian infrastructure. Further breaches included Islamic Azad University , Omidnetco , and Pasargad Insurance Company.+4
  • Israel: Simultaneously, Israel faced significant targeting. The same actor, A K U L A v 2, claimed leaks against Statistics (education) , Kali Group Insurance , and Israel Aerospace Industries, a major defense contractor. Another group, Cyber 4vengers, claimed access to Israeli water control infrastructure, a critical escalation point.+4
  • The Gulf States & Iraq: The campaign extended to neighboring nations. In Iraq, the Ministry of Oil and Iraqi Airways were targeted. In the UAE, the Ministry of Education’s email platform was breached. Kuwait’s Ministry of Defense and Oman’s Ministry of Defence also saw alleged credential leaks.+4

This pattern indicates a regional cyber conflict where state institutions are the primary prey, likely for espionage or psychological warfare purposes.

2.2 Southeast Asia: Defacement and Data Theft

Indonesia featured heavily in the dataset, but the nature of the attacks differed from the Middle East.

  • Defacement Wave: A specific actor, BABAYO EROR SYSTEM, launched a mass defacement campaign against Indonesian schools, specifically “SLB” (Sekolah Luar Biasa) or special needs schools. While technically unsophisticated, the volume of these attacks disrupts local services and highlights vulnerability in the education sector’s web infrastructure.+3
  • Data Brokerage: Indonesia was also a source of commercial data leaks. The Fuel Distributor Database involving over 6,500 entities was leaked by actor AYYUBI , along with data from Toyota Bali Fair.+1

2.3 Western Nations: High-Value Espionage and Commerce

Attacks in the USA and Europe were characterized by high-value targets and large commercial data sales.

  • USA: The Lawrence Livermore National Laboratory, a key research facility, was the subject of a massive 15 TB data breach claim by the Infrastructure Destruction Squad. Additionally, access to SCADA systems and college software suites was put up for sale.+4
  • Europe: France saw breaches in government recruitment (Choisir le service public) and IT services. Germany saw a massive leak of citizen data (1.68 million records) and business directories.+2

3. Sector Analysis

3.1 Critical Infrastructure and Operational Technology (OT)

Perhaps the most alarming trend in this report is the recurring sale of unauthorized access to industrial control systems. These systems manage physical processes, and their compromise can lead to kinetic damage.

  • Water & Irrigation:
    • Israel: Unauthorized access to water control infrastructure was claimed by Cyber 4vengers.+1
    • Australia: Access to an irrigation management system was claimed, with the threat actor noting the ability to modify pump configurations and disable alarms.
  • Energy & Heating:
    • Italy: A heating control panel was allegedly compromised, with actors claiming full administrative access to the HMI/SCADA system, allowing for the manipulation of combustion operations.+1
    • USA: General SCADA/HMI system access was offered for sale.
  • Oil & Gas:
    • Indonesia: A database of 6,569 fuel distribution entities was leaked.
    • Iraq: Login credentials for the Iraqi Ministry of Oil were leaked.

Analysis: The specific mention of modifying “PID controller parameters” and “disabling alarms” indicates a sophisticated understanding of OT environments. These are not merely IT breaches; they are potential preludes to physical sabotage.

3.2 Government and Defense

Government entities remain the “apex predators” of targets for hacktivists and state-aligned actors.

  • Defense:
    • USA: The Lawrence Livermore National Laboratory breach involves 15 TB of data, including engineering blueprints and classified video.
    • Israel: Israel Aerospace Industries credentials were leaked.
    • Kuwait & Oman: Both nations saw their Ministries of Defense targeted.+1
    • Spain: The National Police (Cuerpo Nacional de Policía) suffered a breach of their PKI Directory, exposing Certificate Revocation Lists and root certificates. This is a severe cryptographic security failure.+1
  • Intelligence:
    • USA: The group DieNet announced targeting of the CIA.
    • Iran: An IAEA document related to Iran was allegedly leaked.

3.3 Education

The education sector is soft target, often lacking the budget for enterprise-grade security, yet holding vast amounts of PII.

  • Universities: Massive breaches affected Semnan University (Iran) , Tuwaiq Academy (Saudi Arabia) , Shiraz University of Medical Sciences (Iran) , and Islamic Azad University (Iran).+3
  • Defacement: As noted, Indonesian special needs schools (SLB) were systematically defaced.+1
  • Commercial Sales: Access to a “USA College Software Suite” was sold, granting root access.+2

3.4 Finance and Insurance

Financial institutions face constant pressure from motivated criminal actors seeking immediate monetization.

  • Banking & Payments: PRESTA Bank transfer data in Poland was leaked. Credentials for Kali Group Insurance in Israel were exposed.+1
  • Network Access: Access to a Chinese financial organization and a Ukrainian accounting firm was sold, offering root RCE.+1
  • Insurance: Pasargad Insurance (Iran) and Serlefin (Colombia) were breached, exposing customer billing and medical data.+1

4. Threat Actor Profiles

Understanding the adversary is key to defense. The following profiles are based on the activity observed on February 3, 2026.

4.1 A K U L A v 2

  • Primary Motivation: Geopolitical Hacktivism / State-Alignment.
  • Target Region: Middle East (Iran, Israel, Iraq, Gulf States).
  • Tactics: Credential harvesting and leaking (likely via phishing or infostealer logs).
  • Key Incidents: Leaked credentials for Semnan University , Shiraz University , Ministry of Defense Oman , and Israel Aerospace Industries.+4
  • Assessment: This actor is highly prolific, favoring volume over depth. They likely utilize automated tools to harvest credentials and publish them on Telegram to cause reputational damage and disruption.

4.2 BABAYO EROR SYSTEM

  • Primary Motivation: Defacement / Reputation / Vandalism.
  • Target Region: Indonesia.
  • Target Sector: Education (specifically Special Needs Schools).
  • Tactics: Website Defacement.
  • Key Incidents: Defaced SLB Santa Mulia Surabaya , SLB PH Malang, and others.+1
  • Assessment: This group appears to be a “script kiddie” or lower-sophistication collective. Their focus on educational institutions suggests they are exploiting known CMS vulnerabilities (like WordPress or Joomla) rather than conducting sophisticated intrusions.

4.3 miyako

  • Primary Motivation: Financial / Initial Access Broker (IAB).
  • Target Region: Global (China, USA, Ukraine, Asia).
  • Tactics: Selling root-level network access.
  • Key Incidents: Selling access to: Largest Real Estate Developer in Asia , USA College Software Suite , China Luxury Jewelry Company , and USA Electronic Manufacturer.+4
  • Assessment: miyako is a dangerous Initial Access Broker. They do not just sell data; they sell the keys to the castle—specifically Linux-based firewalls with root RCE and shell capabilities. This suggests they are exploiting a specific 0-day or N-day vulnerability in a widely used firewall appliance.

4.4 Dripper

  • Primary Motivation: Financial / Data Brokerage.
  • Target Region: Global (Germany, Malaysia, Japan, Ireland, India).
  • Tactics: Bulk data sales.
  • Key Incidents: Selling datasets from Wer liefert was (Germany) , Mayflower (Malaysia) , Sportsentry (Japan) , and Clubforce (Ireland).+3
  • Assessment: Dripper operates as a classic data wholesaler, aggregating large scrapings or database dumps and selling them on forums like BreachForums. The diversity of their targets indicates they are likely reselling data obtained from other breaches or widespread scraping operations.

4.5 Infrastructure Destruction Squad

  • Primary Motivation: Sabotage / High-Level Espionage.
  • Target Region: USA.
  • Key Incidents: Alleged 15 TB breach of Lawrence Livermore National Laboratory.
  • Assessment: The name implies a destructive intent. If their claim of possessing 15 TB of blueprints and classified video is true, this represents a Tier-1 national security incident.

5. Detailed Incident Catalog

The following section categorizes the raw incident data for closer examination.

5.1 Data Breaches (General)

The volume of data breaches remains the highest category of incidents.

  • Social Media:
    • Haijiao (China): 15.7 million records from an adult forum were leaked, including hashed passwords and phone numbers.
    • Brazzers (Canada): A dataset from the adult platform was shared.
  • Government & Public Sector:
    • Germany: A massive database of 1.68 million citizens was listed for sale.
    • Dominican Republic: Citizen data including “cedula” (ID) and blood type was leaked.
    • South Africa: Municipal Money suffered a breach of 73 million rows (likely historical data resurfacing).
  • Retail & Commerce:
    • Australia: An unidentified furniture company with $5M revenue had 48,000 leads exposed.
    • Indonesia: Bhinneka, a major e-commerce site, had user credentials sold.
    • India: ClickIndia user data (742k records) was put up for sale.

5.2 Initial Access Sales

Access brokers are the precursors to ransomware attacks.

  • USA: Access to IT networks via port 8040 was auctioned.
  • Indonesia: Shell access to SieradMU and Plantation & Mill Management System was sold by actor Gugugaga.+1
  • Denmark: Unauthorized access to a beauty salon.

5.3 Malware and Tools

  • WaveShield Server Logs: Logs containing IP addresses and Discord IDs were leaked.
  • Lazarus Botnet: Access details for the “LAZARUS” botnet, including C2 credentials, were leaked.
  • Network Target Finder: A tool for discovering admin panels and vulnerable WordPress sites was listed for sale.

5.4 Defacement

  • Tunisia: Innovative Display Concept was defaced by DARK 07x.
  • Bangladesh: Independent University and Fashitala B.L High School were targeted by KINGSMAN INDIA.+1
  • UAE: Industrialist.ae was defaced by Volcaryx1337.

6. Emerging Threat Vectors and Recommendations

6.1 Vector: Firewall Vulnerabilities

Observation: The actor miyako is selling access to Linux-based firewalls with “root RCE” across multiple disparate industries (Real Estate, Education, Manufacturing). Implication: This strongly suggests the exploitation of a specific, unpatched vulnerability in a common firewall appliance or VPN concentrator. Recommendation: Organizations must immediately audit their perimeter security devices. Specifically, verify patch levels on Linux-based appliances (e.g., Fortinet, Palo Alto, Cisco) and look for indicators of compromise such as unauthorized root shells or unfamiliar admin accounts.+2

6.2 Vector: Supply Chain and Third-Party Risk

Observation: The breach of Kroll related to FTX bankruptcy claims highlights how third-party administrators are critical choke points. Attackers bypassed internal safeguards to access sensitive financial claimant data. Implication: Even if a primary organization is secure, their legal or financial partners may not be. Recommendation: Implement strict third-party risk management (TPRM). Mandate multi-factor authentication (MFA) enforcement for all external partners accessing sensitive data.

6.3 Vector: OT/SCADA Insecurity

Observation: Multiple claims of access to water, heating, and irrigation systems. Implication: These systems often lack modern security controls and are increasingly connected to the internet. Recommendation: Air-gap critical OT networks where possible. If connectivity is required, use strict unidirectional gateways. Monitor network traffic for anomalous commands (e.g., changes to PID parameters).+1

6.4 Vector: Educational Sector Vulnerability

Observation: The sheer volume of university breaches indicates that higher education is a favored target for credential harvesting. Implication: Universities have large, open networks and high user turnover (students), making them difficult to secure. Recommendation: Educational institutions should accelerate the adoption of Zero Trust architectures. Network segmentation is crucial to ensure that a compromised student account does not grant access to administrative or research databases.+3


7. Conclusion

The events of February 3, 2026, paint a picture of a hyper-active and increasingly segmented cyber threat landscape. We are witnessing a bifurcation of threats:

  1. The Geopolitical Layer: Actors like A K U L A v 2 and Infrastructure Destruction Squad are engaging in targeted disruption of national assets (defense, nuclear, intelligence) in the Middle East and the US. These attacks are likely driven by ideology or state sponsorship.
  2. The Criminal Commercial Layer: Actors like miyako, Dripper, and Gugugaga are industrializing cybercrime. They are not hacking for a cause; they are filling a supply chain of stolen data and network access that fuels downstream ransomware and fraud.

Key Takeaway: The “safe” sectors are disappearing. From an Indonesian special needs school to the US Central Intelligence Agency, no entity is immune to targeting. The specific rise in “root RCE” sales for firewall appliances suggests a looming wave of ransomware attacks once these access points are purchased and weaponized.

Immediate Action Required: Organizations must pivot from reactive defense to proactive threat hunting. The specific intelligence regarding Linux firewall exploits and the targeting of PKI infrastructures demands immediate auditing of edge devices and cryptographic trust stores.+1

Detected Incidents Draft Data

  1. Alleged sale of unauthorized admin access to tripXOXO
    Category: Initial Access
    Content: The threat actor claims to have selling unauthorized admin access to tripXOXO
    Date: 2026-02-03T23:59:43Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Selling-Access-admin-PANEL-travel-For-sale?highlight=Access+admin+PANEL+travel+for+sale
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7fee3408-7faf-44e2-8d07-1213be6870ab.png
    Threat Actors: KaruHunters
    Victim Country: India
    Victim Industry: Leisure & Travel
    Victim Organization: tripxoxo
    Victim Site: tripxoxo.com
  2. Alleged leak of login credentials to Semnan University
    Category: Data Breach
    Content: he group claims to have leaked login credentials to Semnan University
    Date: 2026-02-03T23:58:33Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1049012
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/94f9f993-18e5-4837-b5c5-86a8237292d2.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Education
    Victim Organization: semnan university
    Victim Site: semnan.ac.ir
  3. Alleged leak of login credentials to Tuwaiq Academy
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Tuwaiq Academy in Saudi Arabia.
    Date: 2026-02-03T23:06:07Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1048481
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/46f9f209-a313-4ece-95b2-3927451d63d1.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Saudi Arabia
    Victim Industry: Education
    Victim Organization: tuwaiq academy
    Victim Site: tuwaiq.edu.sa
  4. Alleged leak of login credentials to Shiraz University of Medical Sciences
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Shiraz University of Medical Sciences and Health Services in Iran.
    Date: 2026-02-03T22:35:18Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1048369
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e36093b1-3a2b-4163-ba14-642b7ae6ee48.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Education
    Victim Organization: shiraz university of medical sciences (sums)
    Victim Site: sums.ac.ir
  5. Alleged leak of login credentials to Soroush Plus
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Soroush Plus messenger, Iran.
    Date: 2026-02-03T22:18:57Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1048282
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0e9de644-ac5c-49cd-8ae4-d8f1a5125e85.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: soroush plus
    Victim Site: splus.ir
  6. Alleged leak of login credentials to Mohaymen ICT Group
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Mohaymen ICT Group in Iran.
    Date: 2026-02-03T22:17:32Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1048268
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3c99c46a-f829-4133-83a4-db82df5c8f67.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: mohaymen ict group
    Victim Site: mohaymen.ir
  7. Alleged sale of WaveShield server logs
    Category: Malware
    Content: The threat actor claims to have leaked WaveShield server logs, exposing sensitive player information such as IP addresses, FiveM license keys, Discord IDs, Steam and Xbox Live identifiers, and player usernames.
    Date: 2026-02-03T22:14:35Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-FiveM-French-Server
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/66c97ddf-6306-4388-b155-d6194e411871.png
    Threat Actors: Cvld
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged data breach of Acti Informatique
    Category: Data Breach
    Content: The threat actor claims to have leaked data from acti-informatique.com, allegedly containing password hashes and game keys .
    Date: 2026-02-03T22:13:00Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/acti-informatique-com-passwd-hashes-and-gamekeys.258/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/07105528-d92a-457b-9fc2-1b3534c007f7.png
    Threat Actors: BobbyDropTables
    Victim Country: France
    Victim Industry: Information Technology (IT) Services
    Victim Organization: acti informatique
    Victim Site: acti-informatique.com
  9. Alleged leak of Fuel Distributor Database
    Category: Data Breach
    Content: The threat actor claims to have leaked a database containing information on 6,569 fuel distribution and oil & gas trading entities involved in general fuel trading activities. The dataset allegedly covers the years 2019–2023 and includes company names, fuel station identifiers (SPBU), and address/location details.
    Date: 2026-02-03T22:07:46Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-6569-Fuel-Distributor-Database-Oil-and-Gas-Trading-Entity-for-General-Fuel-Trading-B
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ce777444-fd99-4767-a36a-3757f73ecbe6.png
    Threat Actors: AYYUBI
    Victim Country: Indonesia
    Victim Industry: Oil & Gas
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged data leak of an unidentified furniture company from Australia
    Category: Data Breach
    Content: The threat actor claims to have leaked a database associated with an unidentified Australian furniture company with an estimated $5M revenue. The exposed dataset reportedly contains 48,000 rows of leads, including sensitive personal information such as customer names, phone numbers, email addresses, physical addresses, and Australian Company Numbers (ACN).
    Date: 2026-02-03T21:56:08Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/275147/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c5d91b88-7f5e-429f-81d2-0a0e1b6f0ae7.png
    Threat Actors: GeeksforGeeks
    Victim Country: Australia
    Victim Industry: Furniture
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged leak of login credentials to Statistics
    Category: Data Breach
    Content: The group claims to have leaked login credentials to the education website, Statistics, in Israel.
    Date: 2026-02-03T21:52:29Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1048560
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/187353b8-fdec-40d2-b201-d6f16d973e5b.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: statistics
    Victim Site: statistical.co.il
  12. Alleged data leak of furniture company from Australia
    Category: Data Breach
    Content: The threat actor claims to have leaked a database associated with an Australian furniture company with an estimated $5M revenue. The exposed dataset reportedly contains 48,000 rows of leads, including sensitive personal information such as customer names, phone numbers, email addresses, physical addresses, and Australian Company Numbers (ACN).
    Date: 2026-02-03T21:46:31Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/275147/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c5d91b88-7f5e-429f-81d2-0a0e1b6f0ae7.png
    Threat Actors: GeeksforGeeks
    Victim Country: Australia
    Victim Industry: Furniture
    Victim Organization: Unknown
    Victim Site: Unknown
  13. DARK 07x targets the website of Innovative Display Concept
    Category: Defacement
    Content: The threat actor claims to have defaced the organizations website.
    Date: 2026-02-03T21:18:00Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1559
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1be0d4ad-69d0-44ef-88ef-464aa6487dde.png
    Threat Actors: DARK 07x
    Victim Country: Tunisia
    Victim Industry: Information Technology (IT) Services
    Victim Organization: innovative display concept
    Victim Site: innovativedc.tn
  14. Alleged leak of login credentials to Kali Group Insurance Agency and Investments Marketing Ltd
    Category: Data Breach
    Content: The group claims to have leaked the login credentials for Kali Group Insurance Agency and Investments Marketing Ltd. in Israel.
    Date: 2026-02-03T21:12:08Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1048558
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78671175-94b7-4af1-a153-ddb391d2935e.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Israel
    Victim Industry: Financial Services
    Victim Organization: kali group insurance agency and investments marketing ltd
    Victim Site: kali.co.il
  15. Alleged Data Leak of PRESTA Bank Transfer Data in Poland
    Category: Data Breach
    Content: Threat Actor claims to have leaked PRESTA Bank Transfer data in Poland.
    Date: 2026-02-03T21:05:47Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/275150/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/215d5dc4-6e3c-4192-8c19-8938cf7249e7.png
    Threat Actors: Malwareboy
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Alleged Sale of Unauthorized Access to Largest Real Estate Developer in Asia
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to the network infrastructure of Asia’s largest real estate developer, allegedly providing Linux-based firewall access with root RCE, shell capabilities, and full network administrator panel permissions.
    Date: 2026-02-03T20:51:15Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-300-Largest-Real-Estate-Developer-in-Asia-Firewall-Network-Admin-Panel
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/146174f7-9d6b-42b9-a485-a9004ace7bad.png
    Threat Actors: miyako
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Alleged data breach of Haijiao
    Category: Data Breach
    Content: The threat actor claims to have obtained and shared a user database containing approximately 15.7 million records allegedly originating from haijiao.com, a Chinese adult forum platform. The database reportedly includes user account details such as usernames, email addresses, phone numbers, hashed passwords, avatars, roles, account status, login timestamps, IP-related metadata, profile descriptions, tags, popularity metrics, and certification-related fields
    Date: 2026-02-03T20:39:34Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-China-haijiao-com-15-7M-User-DB
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b8b7e598-f45c-407f-affb-12de634a77b8.png
    Threat Actors: Tanaka
    Victim Country: China
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: haijiao
    Victim Site: haijiao.com
  18. Alleged data leak of Toyota Bali Fair database
    Category: Data Breach
    Content: The threat actor claims to have leaked a customer database related to “Toyota Bali Fair”, containing records of approximately 2,000 customers. the dataset includes 2,618 lines in CSV and PDF formats, with data collected between 2020 and 2024. The allegedly exposed information contains customer names, phone numbers, vehicle ownership details, and car models.
    Date: 2026-02-03T20:37:14Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-2000-CUSTOMER-DATABASE-TOYOTA-BALI-FAIR-LEAKED-FREE-SAMPLE-DOWNLOAD
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/39c808e2-ee19-4f85-a8f6-8097d8728d3b.png
    Threat Actors: AYYUBI
    Victim Country: Indonesia
    Victim Industry: Automotive
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Alleged unauthorized access to an unidentified SCADA/HMI system in the USA
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to an unidentified SCADA/HMI system in the USA.
    Date: 2026-02-03T20:29:38Z
    Network: telegram
    Published URL: https://t.me/crewcyber/636?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eeec2770-5c77-45da-8b72-e2479061ddc9.png
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged data breach of Interplan AG
    Category: Data Breach
    Content: The group claims to have breached the organisation data of Interplan AG. They intent to publish it within 1-2 days.
    Date: 2026-02-03T20:14:50Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/9255855374/overview
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5da06610-41c1-47c5-ba23-438c5fd4d1a7.jpg
    Threat Actors: Worldleaks
    Victim Country: Germany
    Victim Industry: Events Services
    Victim Organization: interplan ag
    Victim Site: interplan.de
  21. Alleged data breach of Wakanim
    Category: Data Breach
    Content: The threat actor claims to be sharing a database belonging to Wakanim, an anime streaming platform, which was allegedly dumped in August 2022.the exposed database contains information on approximately 6.7 million users. The compromised data reportedly includes email addresses, usernames, real names, IP addresses, physical addresses, and account login dates.
    Date: 2026-02-03T20:13:59Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Wakanim-2022
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8598f9be-86fe-482c-b30a-4c587a91ab6a.png
    Threat Actors: authsso
    Victim Country: France
    Victim Industry: Entertainment & Movie Production
    Victim Organization: wakanim
    Victim Site: wakanim.tv
  22. Alleged data breach of Choisir le service public
    Category: Data Breach
    Content: The threat actor claims to be selling personal data of approximately 377,000 job seekers registered on “Choisir le service public”, the official French government recruitment platform for public sector employment. the allegedly leaked data includes full names, gender, dates of birth, postal codes, cities, country, email addresses, phone numbers, education level, professional specialization, language skills, job category, job preferences, account identifiers, and login activity metadata
    Date: 2026-02-03T20:01:34Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FR-377K-Choisir-le-service-public-gouv
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bbc96a1c-7dd3-4827-9fa9-6b2e9732180f.png
    Threat Actors: HexDex
    Victim Country: France
    Victim Industry: Government & Public Sector
    Victim Organization: choisir le service public
    Victim Site: choisirleservicepublic.gouv.fr
  23. Alleged data breach of ELC Electroconsult SpA
    Category: Data Breach
    Content: The threat actor claims to have leaked a large internal database belonging to ELC Electroconsult SpA, totaling over 90 GB and containing 54,000+ files, including approximately 37,734 PDF documents. The exposed data allegedly consists of engineering drawings, tender and bid documents, internal correspondence, approvals, and project documentation associated with PGE-ELC-JICA projects.
    Date: 2026-02-03T19:54:13Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-ELC-Electroconsult-SpA-DataBase-90-GB
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4ed28150-1161-42cf-9d69-d6e9e3034ee9.png
    Threat Actors: iloveya
    Victim Country: Italy
    Victim Industry: Building and construction
    Victim Organization: elc electroconsult spa
    Victim Site: elc-electroconsult.com
  24. Alleged Sale of Unauthorized Access to USA College Software Suite (SaaS)
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to a USA college software suite (SaaS), allegedly providing Linux-based firewall access with root RCE, shell capabilities, and network administrator panel permissions.
    Date: 2026-02-03T19:44:42Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-200-USA-College-Software-Suite-SaaS-Firewall-Network-Admin-Panel
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2abacd40-64bc-43e5-83de-fd5f3073a410.png
    Threat Actors: miyako
    Victim Country: USA
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged sale of unauthorized access to a China Luxury Jewelry Company
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized firewall and internal network access belonging to a China-based luxury jewelry company. The alleged access includes a Linux-based firewall with root-level remote code execution, shell access, and full network administrator panel privileges.
    Date: 2026-02-03T19:19:23Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-200-China-Luxury-Jewelry-Firewall-Network-Admin-Panel
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3a6cb513-2124-433a-bde0-17fc7c937c9f.png
    Threat Actors: miyako
    Victim Country: China
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged sale of unauthorized access to a U.S-based electronic device manufacturing company
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized network access to a U.S.-based electronic device manufacturing company. The alleged access includes a Linux-based firewall system with root-level remote code execution, shell access, and full network administrator panel privileges.
    Date: 2026-02-03T19:18:08Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-200-USA-Electronic-Device-Manufacturer
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2b798945-c562-42a7-9d77-37161878bda7.png
    Threat Actors: miyako
    Victim Country: USA
    Victim Industry: Electrical & Electronic Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Alleged sale of unauthorized access to a Ukrainian accounting and finance organization
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized network access to a Ukrainian accounting and finance organization. the access allegedly includes a Linux-based firewall device with root-level remote code execution, shell access, and full network administrator panel privileges.
    Date: 2026-02-03T19:08:06Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-200-Ukraine-Accounting-and-Finance-Firewall-Network-Admin-Panel
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/44127a80-20fd-45ad-80c1-d03b5f7068e9.png
    Threat Actors: miyako
    Victim Country: Ukraine
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged sale of unauthorized access to a Chinese financial organization
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized access to a Chinese financial organization’s internal network. The alleged access includes a Linux-based firewall device with root-level remote code execution, shell access, and full network administration panel privileges.
    Date: 2026-02-03T18:59:30Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-300-Chinese-Finance-Firewall-Network-Admin-Panel
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3ab3dc95-2bb6-4373-8f37-9f722d1f74ba.png
    Threat Actors: miyako
    Victim Country: China
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Alleged leak of Senior Benefits Center, LLC
    Category: Data Breach
    Content: Threat actor claims to have leaked admin and user account login credentials from Senior Benefits Center, LLC, USA.
    Date: 2026-02-03T18:35:35Z
    Network: telegram
    Published URL: https://t.me/crewcyber/635
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/463b71a2-39a8-43fc-8e65-3e8b1912818a.png
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: senior benefits center, llc
    Victim Site: seniorbenefits.us
  30. Alleged Sale of Unauthorized Access to Unidentified IT Networks from USA
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to IT networks with USA-based IT companies via services exposed on port 8040, offering control through a management interface that enables agent deployment and interaction with connected endpoints, with access reportedly updated daily and sold through an auction format.
    Date: 2026-02-03T18:27:02Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/275139/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eeecc15d-3457-4595-8ba4-6dd8c115cde0.png
    Threat Actors: DK_900
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data breach of Islamic Azad University
    Category: Data Breach
    Content: The threat actor claims leaked multiple databases allegedly belonging to the Islamic Azad University in Iran. the exposed data includes extensive academic and personal records such as user IDs, usernames, passwords, mobile numbers, student and staff names, family details, identification numbers, academic programs, enrollment information, grades, financial records, administrative logs, and internal support data.
    Date: 2026-02-03T18:18:48Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-The-Islamic-Azad-University-in-Iran-DB–186732
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0ccd4ef3-809e-47b8-9459-7da679bd08ad.png
    https://d34iuop8pidsy8.cloudfront.net/003e7aae-cd90-4c19-b6ef-b84a262d77a9.png
    Threat Actors: chris321
    Victim Country: Iran
    Victim Industry: Higher Education/Acadamia
    Victim Organization: islamic azad university
    Victim Site: iau.ir
  32. Alleged data breach of Allmax Nutrition
    Category: Data Breach
    Content: The threat actor claims to have leaked AllmaxNutrition . the attacker allegedly accessed servers, backups, and customer databases .The leaked data is said to include customer email addresses, usernames, first and last names, phone numbers, purchase history, and internal administrative logs.
    Date: 2026-02-03T18:17:43Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Big-Database-Dump-%E2%80%93-Allmax-Nutrition-Breached
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4d60143e-c4a0-4da6-9c9d-d7ff0c170a45.png
    Threat Actors: louna
    Victim Country: Canada
    Victim Industry: Food & Beverages
    Victim Organization: allmax nutrition
    Victim Site: allmaxnutrition.com
  33. Alleged data leak of the email service platform of UAEs Ministry of Education
    Category: Data Breach
    Content: The group claims to have leaked data from the email service platform of the United Arab Emirates’ Ministry of Education (MOE).
    Date: 2026-02-03T18:16:44Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1046819
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a12198b8-67db-4a05-bcf1-5df9e0dbe1f0.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: UAE
    Victim Industry: Government Administration
    Victim Organization: ministry of education (moe)
    Victim Site: mail.moe.gov.ae
  34. Alleged data breach of Kroll
    Category: Data Breach
    Content: The threat actor claims have leaked data with Kroll (kroll.com). the attackers allegedly gained control of the employee’s phone number, bypassed internal safeguards, and accessed sensitive files and systems related to FTX, BlockFi, and Genesis bankruptcy claims. The exposed data is said to include full names, email addresses, KYC status information, and internal notes such as account balances and risk assessments.
    Date: 2026-02-03T18:13:25Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Kroll-FTX-Bankruptcy-Claimants-kroll-com-2023-08-19-198-34K-People
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c4bc9666-a894-41f5-b745-a54f39fc27a4.png
    Threat Actors: thelastwhitehat
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: kroll
    Victim Site: kroll.com
  35. Alleged sale of Lazarus Botnet
    Category: Malware
    Content: The threat actor claims to be leaking access details for a botnet identified as “LAZARUS.” the actor shares command-and-control (C2) connection information, including an IP/domain, port number, and login credentials, allegedly allowing direct access to the botnet infrastructure
    Date: 2026-02-03T18:11:21Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/botnet-lazarus.229/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/30ac76f7-8f15-4b2d-ab3a-cc63ffd47374.png
    Threat Actors: ayka
    Victim Country: Unknown
    Victim Industry: Computer & Network Security
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged data breach of Brazzers
    Category: Data Breach
    Content: The threat actor claims to have obtained and shared a dataset allegedly originating from the Brazzers platform. the leaked data totals approximately 37 MB and is provided as a text file.
    Date: 2026-02-03T17:48:51Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/brazzers-ad-lt-website.238/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/77e283a9-c55f-492e-b0a4-da77ee65efdf.png
    Threat Actors: tbny
    Victim Country: Canada
    Victim Industry: Entertainment & Movie Production
    Victim Organization: brazzers
    Victim Site: brazzers.com
  37. Alleged Unauthorized Access to Serlefin from Colombia
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to Serlefin based in Colombia, allegedly enabling access to internal insurance and healthcare systems containing customer invoices, batch billing data, provider reports, and account statements, with approximately 90 GB of data.
    Date: 2026-02-03T17:46:02Z
    Network: openweb
    Published URL: https://xforums.st/threads/serlefin-aliado-allianza-colombia-bogota-registro-individual-de-prestacion-de-servicios-de-salud-leads.501379/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2c0887a5-af16-4aa5-8e59-d22a9dd93752.png
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Insurance
    Victim Organization: serlefin
    Victim Site: serlefin.com
  38. Alleged data breach of First Turn Capital
    Category: Data Breach
    Content: A threat actor claims to have leaked the full database of firstturncapital.com.
    Date: 2026-02-03T16:48:40Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/firstturncapital-com-full-data-breach.233/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3a2b5994-35b2-4631-afbd-8686cb2ff7c7.png
    Threat Actors: GhostSec
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: first turn capital
    Victim Site: firstturncapital.com
  39. Alleged data leak of Germany Citizens Database
    Category: Data Breach
    Content: A threat actor claims to be selling a large German citizens database allegedly compiled from multiple breached sources. The dataset containing over 1.68 million records and is marketed on a breach forum.
    Date: 2026-02-03T16:43:33Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Germany-Citizens-Database-1-6M
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9cb4e9e8-ebb6-4de9-8053-2bff7a4d4833.png
    Threat Actors: temporary
    Victim Country: Germany
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Volcaryx1337 targets the website Industrialist.ae
    Category: Defacement
    Content: The threat actor claims to have defaced the organizations website.
    Date: 2026-02-03T15:36:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/787185
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b396d486-9e24-4575-8278-372eea6489e5.png
    Threat Actors: Volcaryx1337
    Victim Country: UAE
    Victim Industry: Real Estate
    Victim Organization: industrialist.ae
    Victim Site: industrialist.ae
  41. Alleged unauthorized access to an unidentified irrigation management system in Australia
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to an unidentified irrigation management system in Australia, alleging the ability to modify pump configurations, adjust PID controller parameters, and manipulate pressure, level, and flow sensor readings. They further assert that alarms and error states can be altered or disabled while remaining undetected by operators.
    Date: 2026-02-03T15:28:21Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1031
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7007b94a-d961-481c-b409-af29e8ce83a2.png
    https://d34iuop8pidsy8.cloudfront.net/4549c7b0-14d1-4085-9269-503fe7838cc9.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Cyber Attack hits Wieson Technologies Co., Ltd.
    Category: Cyber Attack
    Content: Wieson Technologies Co., Ltd., a company listed on the Taiwan Stock Exchange (TWSE), published an official announcement on 2 February 2026 via the Market Observation Post System (MOPS) following market disclosures. At the time of reporting, there has been no confirmation of a cyberattack, data breach, or system compromise affecting the company. No disruption to operations or leakage of sensitive information has been reported, and the disclosure appears to be part of routine regulatory communication. The situation remains under observation, with no further details indicating malicious activity.
    Date: 2026-02-03T14:57:07Z
    Network: openweb
    Published URL: https://emops.twse.com.tw/server-java/t05sr01_1_e?&isNew=Y&seq_no=1&spoke_time=173653&spoke_date=20260202&co_id=6272
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Taiwan
    Victim Industry: Electrical & Electronic Manufacturing
    Victim Organization: wieson technologies co., ltd.
    Victim Site: wieson.com
  43. Alleged leak of login credentials to Iraqi Airways
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Iraqi Airways.
    Date: 2026-02-03T14:54:32Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1047053
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/05eff8a4-6660-4fb1-ac0a-5130f8551ce3.jpg
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iraq
    Victim Industry: Government Administration
    Victim Organization: iraqi airways
    Victim Site: mail.ia.gov.iq
  44. Alleged data breach of PREMIER PAY
    Category: Data Breach
    Content: The threat actor claims to have breached the data from PREMIER PAY, allegedly including 5,000 leaked cards from the database.
    Date: 2026-02-03T14:50:18Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/premierpay-data-leak-part-1-credit-card-fullz-only.232/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5826c587-ae71-455d-97ed-1de46a3dfd62.JPG
    Threat Actors: GhostSec
    Victim Country: Canada
    Victim Industry: Information Technology (IT) Services
    Victim Organization: premier pay
    Victim Site: premierpay.ca
  45. Alleged Leak of Login Credentials for Oman Ministry of Defence Email Portal (OWA)
    Category: Data Breach
    Content: The group claims to have leaked login credentials for Oman ministry of defence email portal (OWA).
    Date: 2026-02-03T14:49:44Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1046807
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a64ecaa1-0f36-42e9-b3cd-2b57aef8824d.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Oman
    Victim Industry: Government Administration
    Victim Organization: ministry of defence
    Victim Site: mail.mod.gov.om
  46. Alleged unauthorized access to an unidentified beauty salon in Denmark
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to an unidentified beauty salon in Denmark.
    Date: 2026-02-03T14:31:02Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1030
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/42b24888-52c0-426d-9956-7780a7dbae2a.png
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Denmark
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Alleged data breach of Guns.lol
    Category: Data Breach
    Content: The group claims to have leaked data from Guns.lol. The compromised data reportedly contains a large collection of user records, including user account information.
    Date: 2026-02-03T14:26:59Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/guns-lol.237/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9fee89c3-7a6e-4b28-b87c-9e7a882c7397.png
    Threat Actors: tbny
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: guns.lol
    Victim Site: guns.lol
  48. Alleged data breach of Pretoria Society of Advocates
    Category: Data Breach
    Content: The threat actor claims to have breached over 2,427 unique users data, allegedly including PII Records, Phone Numbers, Usernames, First Names, Last Names.
    Date: 2026-02-03T14:25:58Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Pretoriabar-co-za-Database-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/56286c37-9308-4412-9f5a-eaf0aef1c9b1.JPG
    Threat Actors: OpenBullet
    Victim Country: South Africa
    Victim Industry: Legal Services
    Victim Organization: pretoria society of advocates
    Victim Site: pretoriabar.co.za
  49. Alleged data breach of Pakistan Institute of Education
    Category: Data Breach
    Content: The threat actor claims to have breached data from the Pakistan Institute of Education, allegedly containing internal reports, charts, and budget breakdowns
    Date: 2026-02-03T14:07:36Z
    Network: openweb
    Published URL: https://breachforums.cz/index.php?threads/pie-leak-full-internal-reports-charts-and-budget-breakdowns.240/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/26afff10-9b24-4124-a2e0-9df83a6d1fa6.jpg
    Threat Actors: K1ngSlay3r
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: pakistan institute of education
    Victim Site: pie.gov.pk
  50. DieNet claims to target Central Intelligence Agency
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Central Intelligence Agency and government websites in USA.
    Date: 2026-02-03T14:01:23Z
    Network: telegram
    Published URL: https://t.me/dienet3/201
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/875b9132-4228-4d4e-abf1-89b316274f8c.jpg
    Threat Actors: DieNet
    Victim Country: USA
    Victim Industry: International Affairs
    Victim Organization: central intelligence agency
    Victim Site: cia.gov
  51. Alleged data breach of Casa do Alemão
    Category: Data Breach
    Content: The group claims to have breached the organisations data.
    Date: 2026-02-03T13:50:23Z
    Network: telegram
    Published URL: https://t.me/levstccc/1608
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7e43274a-653e-444e-915a-a081dd5d0e3c.JPG
    Threat Actors: LEVSTRESS.SU
    Victim Country: Brazil
    Victim Industry: Hospitality & Tourism
    Victim Organization: casa do alemão
    Victim Site: casadoalemaobuzios.com
  52. Alleged leak of login credentials to Ministry of Defense (Kuwait)
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Ministry of Defense.
    Date: 2026-02-03T13:10:33Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1046767
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ee135e68-4da4-4589-a216-374995fa067a.jpg
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Kuwait
    Victim Industry: Government Administration
    Victim Organization: ministry of defense
    Victim Site: mail.mod.gov.kw
  53. Alleged unauthorized access to PIONEER DENTAL COLLEGE & HOSPITAL
    Category: Initial Access
    Content: The group claims to have leaked unauthorized access to PIONEER DENTAL COLLEGE & HOSPITAL
    Date: 2026-02-03T13:07:01Z
    Network: telegram
    Published URL: https://t.me/ZeroCertHackers/1020
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/16f9c0ad-027b-4328-9cb5-21384f257424.png
    Threat Actors: kingsman
    Victim Country: Bangladesh
    Victim Industry: Education
    Victim Organization: pioneer dental college & hospital
    Victim Site: old.pioneer.edu.bd
  54. Alleged data breach of Municipal Money
    Category: Data Breach
    Content: The threat actor claims to have breached 73202136 rows of data of Municipal Money, Note: it was previously breached by the threat actor markitto35 on Sat Dec 16 2023.
    Date: 2026-02-03T12:58:09Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Municipalmoney-gov-za-SQL
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a59b303c-18ae-4403-ae03-d4f610edab0d.JPG
    Threat Actors: Tanaka
    Victim Country: South Africa
    Victim Industry: Government Administration
    Victim Organization: municipal money
    Victim Site: municipalmoney.gov.za
  55. Alleged unauthorized access to an unidentified water control infrastructure in Israel
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to an unidentified water control infrastructure in Israel.
    Date: 2026-02-03T12:04:12Z
    Network: telegram
    Published URL: https://t.me/Cyber4vengers/10?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/80b1dcf9-8f4f-4bbc-b7bd-1cd79ed2ea60.png
    Threat Actors: Cyber 4vengers
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged unauthorized access to Sonata Messenger
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Sonata Messenger in Ukraine.
    Date: 2026-02-03T12:03:12Z
    Network: telegram
    Published URL: https://t.me/sauron_of_eye/66
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/56d5e31a-ef3a-4561-9c61-5bc63d0af005.jpg
    https://d34iuop8pidsy8.cloudfront.net/b4e0f515-cbd7-47fd-9822-d700dc7f48ae.jpg
    Threat Actors: EYE OF SAURON
    Victim Country: Ukraine
    Victim Industry: Software
    Victim Organization: sonata messenger
    Victim Site: Unknown
  57. KINGSMAN INDIA targets the website of Independent University, Bangladesh
    Category: Defacement
    Content: The group claims to have defaced the website of Independent University, Bangladesh.
    Date: 2026-02-03T11:59:03Z
    Network: telegram
    Published URL: https://t.me/ZeroCertHackers/1019
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9d472c0c-a4a7-4b67-9a23-22b1dbcc9d25.png
    Threat Actors: KINGSMAN INDIA
    Victim Country: Bangladesh
    Victim Industry: Higher Education/Acadamia
    Victim Organization: independent university, bangladesh
    Victim Site: iub.ac.bd
  58. Z-BL4CX-H4T.ID targets the website of Dr Yatra Skin Care
    Category: Defacement
    Content: The group claims to have defaced the website of Dr Yatra Skin Care.
    Date: 2026-02-03T11:48:30Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/55
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6f68a89c-506d-47d2-8ec7-62638a4f2031.png
    Threat Actors: Z-BL4CX-H4T.ID
    Victim Country: India
    Victim Industry: Hospital & Health Care
    Victim Organization: dr yatra skin care
    Victim Site: dryatraskincare.com
  59. KINGSMAN INDIA targets the website of Fashitala B.L High School
    Category: Defacement
    Content: The group claims to have defaced the website of Fashitala B.L High School.
    Date: 2026-02-03T11:39:46Z
    Network: telegram
    Published URL: https://t.me/ZeroCertHackers/1013
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/65459328-0c73-45c1-8a5c-e492e1dde229.png
    Threat Actors: KINGSMAN INDIA
    Victim Country: Bangladesh
    Victim Industry: Education
    Victim Organization: fashitala b.l high school
    Victim Site: fhschool.edu.bd
  60. Alleged leak of login credentials to omidnetco
    Category: Data Breach
    Content: The group claims to have leaked login credentials to omidnetco
    Date: 2026-02-03T11:00:42Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1046560
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c5c0c4cf-738c-42b0-bd55-9b8fed287156.JPG
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: omidnetco
    Victim Site: omidnet.ir
  61. Alleged data leak of Pasargad Insurance Company
    Category: Data Breach
    Content: The group claims to have gained organizations data.
    Date: 2026-02-03T10:58:19Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1046087
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/448d833d-5b86-445f-823d-75d9ebc175d4.jpg
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Insurance
    Victim Organization: pasargad insurance company
    Victim Site: core.pasargadinsurance.ir
  62. Alleged leak of login credentials associated with HideZeroOne
    Category: Data Breach
    Content: The threat actor claims to have leaked login credentials associated with HideZeroOne
    Date: 2026-02-03T10:54:16Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1046186
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/74dfc997-b573-4ac5-8521-286635d05209.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Professional Training
    Victim Organization: hidezeroone
    Victim Site: vip.hide01.ir
  63. Alleged leak of login credentials to SamanTel Dealer Portal
    Category: Data Breach
    Content: The group claims to have leaked login credentials to SamanTel Dealer Portal.
    Date: 2026-02-03T10:25:26Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045874
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/82a10172-0072-4784-a9b4-c26708b820a1.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Network & Telecommunications
    Victim Organization: samantel
    Victim Site: dealer.samantel.ir
  64. Alleged leak of webshell access to DigiCart6
    Category: Initial Access
    Content: The group claims to have leaked webshell access to DigiCart6.
    Date: 2026-02-03T10:15:46Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/375
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/42bcec93-6955-4fc7-a3e0-890c6f661585.png
    Threat Actors: Z-BL4CX-H4T
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: digicart6
    Victim Site: digicart6.com
  65. Alleged unauthorized access to an unidentified heating control panel in Italy
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to an unidentified heating control panel in Italy. According to the claim, they have access of full administrative access to the HMI/SCADA system, allowing them to manipulate combustion and heating operations, disable alarms, spoof or erase logs, exploit schedules for timed attacks, and disrupt services in ways that endanger people, property, and operations.
    Date: 2026-02-03T10:07:31Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/1029
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8a44cf24-84b4-4a18-9a81-9064ecd8dd4e.jpg
    https://d34iuop8pidsy8.cloudfront.net/f325955a-0565-4937-97e0-6236b7b16b7c.jpg
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Alleged sale of shell access to SieradMU
    Category: Initial Access
    Content: The group claims to be selling shell access to SieradMU
    Date: 2026-02-03T09:54:23Z
    Network: telegram
    Published URL: https://t.me/memek1777/105
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e20590f4-6965-4f9a-8541-ed14064a725d.png
    Threat Actors: Gugugaga
    Victim Country: Indonesia
    Victim Industry: Newspapers & Journalism
    Victim Organization: sieradmu
    Victim Site: sieradmu.com
  67. Alleged sale of shell access to Radiant Discovery Sdn Bhd
    Category: Initial Access
    Content: The group claims to be selling shell access to Radiant Discovery Sdn Bhd.
    Date: 2026-02-03T09:31:28Z
    Network: telegram
    Published URL: https://t.me/memek1777/105
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a000d317-4f6a-47c0-b2e9-9c74d0e08db1.png
    Threat Actors: Gugugaga
    Victim Country: Malaysia
    Victim Industry: Agriculture & Farming
    Victim Organization: radiant discovery sdn bhd
    Victim Site: radiantdiscovery.com.my
  68. Alleged sale of shell access to Sazeh Sim Pouyesh
    Category: Initial Access
    Content: The group claims to be selling shell access to Sazeh Sim Pouyesh
    Date: 2026-02-03T09:26:32Z
    Network: telegram
    Published URL: https://t.me/memek1777/105
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8834423d-803f-49b5-8568-957a01347091.png
    Threat Actors: Gugugaga
    Victim Country: Iran
    Victim Industry: Automotive
    Victim Organization: sazeh sim pouyesh
    Victim Site: sazehsimpouyesh.com
  69. Alleged sale of shell access to PLANTATION & MILL MANAGEMENT SYSTEM
    Category: Initial Access
    Content: The group claims to be selling shell access to PLANTATION & MILL MANAGEMENT SYSTEM.
    Date: 2026-02-03T09:14:26Z
    Network: telegram
    Published URL: https://t.me/memek1777/105
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/32fa5209-858f-4b15-a261-ebbc25875121.png
    Threat Actors: Gugugaga
    Victim Country: Indonesia
    Victim Industry: Agriculture & Farming
    Victim Organization: plantation & mill management system
    Victim Site: farmapps.ptmkh.id
  70. Alleged sale of shell access to SMC MALAYSIA
    Category: Initial Access
    Content: The group claims to be selling shell access to SMC MALAYSIA
    Date: 2026-02-03T09:13:00Z
    Network: telegram
    Published URL: https://t.me/memek1777/105
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3dc2b671-743b-4c9a-a230-206601ae29a5.JPG
    Threat Actors: Gugugaga
    Victim Country: Malaysia
    Victim Industry: Agriculture & Farming
    Victim Organization: smc malaysia
    Victim Site: seenmeeclay.com
  71. Alleged leak of login credentials associated with PISHKHAN.
    Category: Data Breach
    Content: The group claims to have leaked login credentials from PISHKHAN.
    Date: 2026-02-03T09:04:23Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045858
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cc9947e5-9a91-4cd2-a077-8f5d9487e89e.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: pishkhan
    Victim Site: epishkhan.ir
  72. Alleged data breach of Harley-Davidson
    Category: Data Breach
    Content: The threat actor claims to have breached 55 thousand plus rows of data of Harley-Davidson, allegedly including vehicle identification num, vehicle designator code, make code model, model year and more
    Date: 2026-02-03T08:51:44Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Harley-Davidson-Motorcycle-Database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e2795777-6b34-441b-b2d3-1ee93eaddcd2.JPG
    Threat Actors: c0mmandor
    Victim Country: USA
    Victim Industry: Automotive
    Victim Organization: harley-davidson
    Victim Site: harley-davidson.com
  73. Alleged leak of Israel database
    Category: Data Breach
    Content: The threat actor claims to have leaked data of 3.9 million individuals from Israel, allegedly containing names, phone numbers, country, relationship status, and more.
    Date: 2026-02-03T08:50:21Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-3-9M-ISRAEL-DATABASE
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/73f2914f-a06f-46e0-89b7-4f324460dfe7.jpg
    Threat Actors: roulettegun
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  74. Alleged data breach of Likitoria
    Category: Data Breach
    Content: The threat actor claims to have breached 41,183 rows of data from Likitoria, allegedly containing IDs, passwords, and more.
    Date: 2026-02-03T08:27:14Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-likitoria-com-medicines-drugs-and-medications
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/620b4767-5f41-43ec-a62b-9f01310c3a30.jpeg
    https://d34iuop8pidsy8.cloudfront.net/da84c843-f42c-497e-8331-91ed78dea233.jpeg
    Threat Actors: c0mmandor
    Victim Country: Kazakhstan
    Victim Industry: Healthcare & Pharmaceuticals
    Victim Organization: likitoria
    Victim Site: likitoria.com
  75. Alleged data breach of the National Police, Spain
    Category: Data Breach
    Content: The threat actor claims to have breached PKI Directory of the Spanish National Police, allegedly including Certificate Revocation Lists (CRLs), Authority Revocation Lists (ARLs), root and intermediate certificates, and certification policies.
    Date: 2026-02-03T08:18:13Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Exposed-PKI-Directory-of-the-Spanish-National-Police
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ef993fdd-b99a-4b77-abf4-346dad5015ef.JPG
    https://d34iuop8pidsy8.cloudfront.net/bfc209df-bcec-43b6-af66-cfaedd09fb1e.JPG
    Threat Actors: GordonFreeman
    Victim Country: Spain
    Victim Industry: Government Administration
    Victim Organization: the national police
    Victim Site: policia.es
  76. Alleged Leak of Login Credentials to Israel Aerospace Industries
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Israel Aerospace Industries.
    Date: 2026-02-03T08:13:53Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045289
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f8ace394-ca94-41d2-b2b6-9d37b64a60a1.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Israel
    Victim Industry: Defense & Space
    Victim Organization: israel aerospace industries
    Victim Site: iai.co.il
  77. Alleged leak of login credentials to Iraqi Ministry of Oil
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Iraqi Ministry of Oil.
    Date: 2026-02-03T07:56:41Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045454
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9accca3d-170c-40e8-abd0-d049565922a6.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iraq
    Victim Industry: Oil & Gas
    Victim Organization: iraqi ministry of oil
    Victim Site: oil.gov.iq
  78. Alleged leak of IAEA document for Iran
    Category: Data Breach
    Content: The group claims to have leaked IAEA document for Iran
    Date: 2026-02-03T07:55:15Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045640
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fd90892f-8c7d-44ce-8296-329b66df5051.JPG
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged leak of login credentials to Nissan Iraq AlSour
    Category: Data Breach
    Content: The group claims to have leaked login credentials to Nissan Iraq AlSour.
    Date: 2026-02-03T07:30:43Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045235
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e4592030-eb37-4583-bdfa-6018726a7561.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iraq
    Victim Industry: Automotive
    Victim Organization: nissan iraq alsour
    Victim Site: nissan-iq.com
  80. BABAYO EROR SYSTEM targets the website of SLB Santa Mulia Surabaya
    Category: Defacement
    Content: The group claims to have defaced the website of SLB Santa Mulia Surabaya
    Date: 2026-02-03T06:43:37Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d5c0052f-3a53-4245-b2dd-00556a0d6239.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb santa mulia surabaya
    Victim Site: slbsantimuliasurabaya.sch.id
  81. BABAYO EROR SYSTEM targets the website of SLB PH Malang
    Category: Defacement
    Content: The group claims to have defaced the website of SLB PH Malang
    Date: 2026-02-03T06:37:38Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/183ec1e8-a70b-4ad1-a726-a5a5e6744d9c.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb ph malang
    Victim Site: slbphmalang-official.sch.id
  82. Alleged data breach of Cuerpo Nacional de Policía
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Cuerpo Nacional de Policía.
    Date: 2026-02-03T06:36:15Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Exposed-PKI-Directory-of-the-Spanish-National-Police
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ee51ae11-b54b-47c1-9e94-9f5492d898a8.png
    https://d34iuop8pidsy8.cloudfront.net/91a1010b-66ee-42ca-8ab2-e5ffa2e0bc30.png
    Threat Actors: GordonFreeman
    Victim Country: Spain
    Victim Industry: Government Administration
    Victim Organization: cuerpo nacional de policía
    Victim Site: pki.policia.es
  83. BABAYO EROR SYSTEM targets the website of SLB BP Kalibaru
    Category: Defacement
    Content: The group claims to have defaced the website of SLB BP Kalibaru
    Date: 2026-02-03T06:34:35Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d4b1ac9f-a256-47ba-890f-7195e4276d99.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb bp kalibaru
    Victim Site: slbbpkalibaru.sch.id
  84. BABAYO EROR SYSTEM targets the website of SLB Bunga Melati Gempol
    Category: Defacement
    Content: The group claims to have defaced the website of SLB Bunga Melati Gempol
    Date: 2026-02-03T06:27:28Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ee67c1b7-e4d5-4a08-be96-b589622969b2.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb bunga melati gempol
    Victim Site: slbbungamelati-gempol.sch.id
  85. Alleged sale of SEKISUI Aerospace Corporation data
    Category: Data Breach
    Content: The threat actor claims to be selling a 2025 database from SEKISUI Aerospace Corporation containing sensitive aerospace technical data.
    Date: 2026-02-03T06:26:55Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-SEKISUI-Aerospace-Corporation-Dataset-2025
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4925c59c-3402-4daa-bd14-8981b7c546da.png
    Threat Actors: nxe
    Victim Country: USA
    Victim Industry: Manufacturing
    Victim Organization: seiksui aerospace corporation
    Victim Site: sekisuiaerospace.com
  86. BABAYO EROR SYSTEM targets the website of SLB Bina Harapan Lamongan
    Category: Defacement
    Content: The group claims to have defaced the website of SLB Bina Harapan Lamongan
    Date: 2026-02-03T06:23:06Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/458edbd3-cfe9-4e7c-890f-78bc3db72ef2.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb bina harapan lamongan
    Victim Site: slbbinaharapanlamongan.sch.id
  87. BABAYO EROR SYSTEM targets the website of SLB BC Optimal
    Category: Defacement
    Content: The group claims to have defaced the website of SLB BC Optimal
    Date: 2026-02-03T06:22:36Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cb008a79-44e3-45ab-a0c4-dd7684992d67.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb bc optimal
    Victim Site: slbbcoptimal.sch.id
  88. BABAYO EROR SYSTEM targets the website of SDL B B C D YPAC Jember
    Category: Defacement
    Content: The group claims to have defaced the website of SDL B B C D YPAC Jember
    Date: 2026-02-03T06:08:23Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a09c21c7-e2f7-4a8a-b217-339423ee8be9.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: sdl b b c d ypac jember
    Victim Site: sdlbbcdypacjember.sch.id
  89. BABAYO EROR SYSTEM targets the website of SLB Bhineka Pas
    Category: Defacement
    Content: The group claims to have defaced the website of SLB Bhineka Pas
    Date: 2026-02-03T06:01:13Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b35d81ff-1199-41eb-b409-8214e14bc312.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb bhineka pas
    Victim Site: slbbhinekapas.sch.id
  90. Alleged leak of Chinese project and employee data
    Category: Data Breach
    Content: The threat actor claims to have leaked the dataset of Chinese project and employee data.
    Date: 2026-02-03T06:00:24Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1240
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4add5f49-1ba2-4223-a4d5-b9046526d832.png
    Threat Actors: SnowSoul
    Victim Country: China
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: Unknown
    Victim Site: Unknown
  91. BABAYO EROR SYSTEM targets the website of SLBN Pembina Malang
    Category: Defacement
    Content: The group claims to have defaced the website of SLBN Pembina Malang
    Date: 2026-02-03T05:52:35Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0edfb308-7922-4cb6-b1a8-0c7e3b44e298.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slbn pembina malang
    Victim Site: slbnpembinamalang.sch.id
  92. Alleged leak of Republica Dominicana Citizens Data
    Category: Data Breach
    Content: Threat Actor claims to be leaked Republica Dominicana Citizens Data. The leaked data allegedly includes id, cedula, valida, names ,last Names ,civil Status, birth Date, sex, birth Place, blood Type and occupation information.
    Date: 2026-02-03T05:46:13Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-REPUBLICA-DOMINICANA-CITIZENS-LEAK-2026
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/33714f7f-1801-4133-909d-3ed972e75020.png
    https://d34iuop8pidsy8.cloudfront.net/dd3ece17-d3a0-4bd3-b905-21ddbbd6eb54.png
    Threat Actors: HatsuneM1ku
    Victim Country: Dominican Republic
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Alleged sale of data from South Korea
    Category: Data Breach
    Content: The threat actor claim to be leaked data from South Korea. The compromised data reportedly contain 408,000 records includes personal, contact, and account related information
    Date: 2026-02-03T05:41:27Z
    Network: openweb
    Published URL: https://bhf.pro/threads/719083/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4e7f2d16-a70f-4b80-8295-a3f2e7173d05.png
    Threat Actors: Steamulytor
    Victim Country: South Korea
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Alleged sale of data from Wer liefert was
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset of Wer liefert was, the dataset contains 437,000 records includes id, slug, name, zip, city, street, house Number, state, country Code, latitude, longitude, category, phone, fax, website, email, linkedin, xing, facebook, instagram, twitter, youtube, description, employees and turnover information.
    Date: 2026-02-03T05:00:13Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-437k-Germany-www-wlw-de-Business-contacts-and-professional-directory-data-includi
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fec2be54-bebc-46cc-82dd-31bdb0dc749d.png
    Threat Actors: Dripper
    Victim Country: Germany
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: wer liefert was
    Victim Site: wlw.de
  95. BABAYO EROR SYSTEM targets the website of SLB Al Khariq
    Category: Defacement
    Content: The group claims to have defaced the website of SLB Al Khariq
    Date: 2026-02-03T04:26:37Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/110
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f0804c52-aa45-4816-aecd-1f9e15752d4a.png
    https://d34iuop8pidsy8.cloudfront.net/cf8bbf58-01bd-4ff9-aac5-543fae54ce92.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb al khariq
    Victim Site: slbalkhariq.sch.id
  96. BABAYO EROR SYSTEM targets the website of SMPLB Sumber Dharma
    Category: Defacement
    Content: The group claims to have defaced the website of SMPLB Sumber Dharma
    Date: 2026-02-03T04:22:53Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/110
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ac573396-25e2-41e3-b015-4e5251ada3cc.png
    https://d34iuop8pidsy8.cloudfront.net/a8a85ee4-c21c-4f59-8369-1225f13b6156.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: smplb sumber dharma
    Victim Site: smplbsumberdharma.sch.id
  97. BABAYO EROR SYSTEM targets the website of SLB Bhakti Luhur Kota Madiun
    Category: Defacement
    Content: The group claims to have defaced the website of SLB Bhakti Luhur Kota Madiun
    Date: 2026-02-03T04:21:38Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/110
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0c7597d6-3fc7-42fb-80b1-35ad928cc0fc.png
    https://d34iuop8pidsy8.cloudfront.net/46e7861f-1330-474e-8ce8-cb53d5868d00.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb bhakti luhur kota madiun
    Victim Site: slbbhaktiluhurkotamadiun.sch.id
  98. BABAYO EROR SYSTEM targets the website of pklkshafa.sch.id
    Category: Defacement
    Content: The group claims to have defaced the website of pklkshafa.sch.id
    Date: 2026-02-03T04:09:33Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/110
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9a0be587-0bde-42b2-8e43-433eae77a745.png
    https://d34iuop8pidsy8.cloudfront.net/c8ae4fb3-1423-4edc-ad9b-b5f1811010be.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: pklkshafa.sch.id
  99. Alleged sale of data from Mayflower
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset of Mayflower, the dataset contains ~243,000 records includes id, full name, email, phone number, review text, rating, service type, booking id and created at information.
    Date: 2026-02-03T03:51:49Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-243k-Malaysia-https-www-mayflower-com-my-User-reviews-and-service-feedback-dat
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ccd025cf-d52e-4e10-983b-efcf037f2167.png
    Threat Actors: Dripper
    Victim Country: Malaysia
    Victim Industry: Leisure & Travel
    Victim Organization: mayflower
    Victim Site: mayflower.com.my
  100. BABAYO EROR SYSTEM targets the website of Yayasan Pendidikan Autis Mutiara Hati
    Category: Defacement
    Content: The group claims to have defaced the website of Yayasan Pendidikan Autis Mutiara Hati
    Date: 2026-02-03T03:48:33Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/110
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fadc5b36-a997-4718-b98d-f586caa53dee.png
    https://d34iuop8pidsy8.cloudfront.net/020d0f12-cf1d-4d57-b84b-d4cbc2b1df8a.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: yayasan pendidikan autis mutiara hati
    Victim Site: ypamutiarahati.sch.id
  101. Alleged data breach of Universitas Negeri Medan
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Universitas Negeri Medan, the dataset contains student pesonal records.
    Date: 2026-02-03T03:46:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Leaked-Database-of-Medan-State-University-indonesian-university
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ea1f3f37-5e2d-4b22-981d-2e326555b17f.png
    Threat Actors: anim3
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: universitas negeri medan
    Victim Site: unimed.ac.id
  102. BABAYO EROR SYSTEM targets the website of SLB B Dharma Wanita Sidoarjo
    Category: Defacement
    Content: The group claims to have defaced the website of SLB B Dharma Wanita Sidoarjo
    Date: 2026-02-03T03:43:05Z
    Network: telegram
    Published URL: https://t.me/c/3664625363/110
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7f7ef968-eeee-4be0-895a-d7f83d11fcc5.png
    https://d34iuop8pidsy8.cloudfront.net/2f31f9f5-9860-4867-ba55-ab6bcb4ed91b.png
    Threat Actors: BABAYO EROR SYSTEM
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: slb b dharma wanita sidoarjo
    Victim Site: slbbdharmawanitasidoarjo.sch.id
  103. Alleged leak of login credentials to HideZeroOne
    Category: Data Breach
    Content: The Group claims to have leaked login credentials from HideZeroOne
    Date: 2026-02-03T03:16:54Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1043529
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3a97e4a1-10ad-4aea-9f12-8e080b4c9196.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Iran
    Victim Industry: Professional Training
    Victim Organization: hidezeroone
    Victim Site: vip.hide01.ir
  104. Alleged Sale Of Data From HIMS University
    Category: Data Breach
    Content: The threat actor claims to be selling data from HIMS University. The compromised data reportedly contain 28,124 records includes personal, contact, account related information
    Date: 2026-02-03T03:07:43Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Selling-EGYPT-HIMS-University-Database-Full-Leak-28k-Records-Payment-Gateway-API
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a9c1b9bd-a997-4fb1-b2d2-8d960fae8a55.png
    https://d34iuop8pidsy8.cloudfront.net/7183a8b7-9f75-45e8-b16a-640a05f3ed43.png
    Threat Actors: quellostanco
    Victim Country: Egypt
    Victim Industry: Education
    Victim Organization: hims university
    Victim Site: hims.edu.eg
  105. Alleged sale of data from Sportsentry
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset of Sportsentry, the dataset contains 457,000 records includes registration date, event id, event name, user id, first name, last name, email, phone, birthday, gender, address, entry category, status and attendance flag information.
    Date: 2026-02-03T02:59:38Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-457k-Japan-https-www-sportsentry-ne-jp-Sports-event-registrations-and-attendanc
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e37be5e5-b89c-4987-80db-00e1f8a11901.png
    Threat Actors: Dripper
    Victim Country: Japan
    Victim Industry: Sports
    Victim Organization: sportsentry
    Victim Site: sportsentry.ne.jp/
  106. Alleged sale of travel.co.jp data
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset of travel.co.jp; the dataset contains 419,000 records like hotel and restaurant information, availability data, pricing details, and location metadata.
    Date: 2026-02-03T02:43:54Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-419k-Japan-https-www-travel-co-jp-Comprehensive-travel-data-hotel-restaurant-st
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/508bedb9-a8fa-4cc3-ad2d-2eabe3ed32f5.png
    Threat Actors: Dripper
    Victim Country: Japan
    Victim Industry: Hospitality & Tourism
    Victim Organization: travel.co.jp
    Victim Site: travel.co.jp
  107. Alleged leak of login credentials to Pares&Alvarez
    Category: Data Breach
    Content: The Group claims to have leaked login credentials from Pares&Alvarez
    Date: 2026-02-03T01:52:19Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1045155
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/95e92bba-daae-4490-9181-5ea9cb111a62.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Chile
    Victim Industry: Mining/Metals
    Victim Organization: pares&alvarez
    Victim Site: pya.cl
  108. Alleged leak of login credentials to Playtika
    Category: Data Breach
    Content: The Group claims to have leaked login credentials from Playtika
    Date: 2026-02-03T01:10:51Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1043564
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e38407ab-caa0-41bd-ae1b-4d8f502cc87c.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Israel
    Victim Industry: Gaming
    Victim Organization: playtika
    Victim Site: playtika.com
  109. Alleged leak of login credentials to Moon Active
    Category: Data Breach
    Content: The Group claims to have leaked login credentials from Moon Active
    Date: 2026-02-03T01:10:13Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1043575
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3ab1f823-beeb-4a0f-a0f0-9b589f1ef6d0.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: Israel
    Victim Industry: Gaming
    Victim Organization: moon active
    Victim Site: moonactive.com
  110. Alleged leak of login credentials to International Securities
    Category: Data Breach
    Content: The Group claims to have leaked login credentials from International Securities.
    Date: 2026-02-03T01:01:49Z
    Network: telegram
    Published URL: https://t.me/c/1943303299/1043674
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ea57eb65-339c-4704-aa09-a2bab5df01f1.png
    Threat Actors: A K U L A v 2 . 2
    Victim Country: UAE
    Victim Industry: Financial Services
    Victim Organization: international securities
    Victim Site: intlsecurities.ae
  111. Alleged sale of Clubforce data
    Category: Data Breach
    Content: The threat actor claims to be selling the dataset of Clubforce; the dataset contains 327,000 records related to active club member statistics and scoring data.
    Date: 2026-02-03T00:52:51Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-327k-Ireland-https-www-clubforce-com-Active-club-member-stats-and-scores-databa
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c00c1e06-4a82-42e9-bdfc-deb146fe19c2.png
    Threat Actors: Dripper
    Victim Country: Ireland
    Victim Industry: Sports
    Victim Organization: clubforce
    Victim Site: clubforce.com
  112. Alleged sale of Bhinneka data
    Category: Data Breach
    Content: The threat actor claims to be selling Bhinneka user data; The dataset includes account credentials and contact information.
    Date: 2026-02-03T00:33:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-624k-Indonesia-https-www-bhinneka-com-User-credentials-and-contact-informatio
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4f611004-45bb-49fa-bfd4-56d9953734d2.png
    Threat Actors: Dripper
    Victim Country: Indonesia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: bhinneka
    Victim Site: bhinnekka.com
  113. Alleged data breach of Lawrence Livermore National Laboratory
    Category: Data Breach
    Content: The group claims to have leaked 15 TB of data from Lawrence Livermore National Laboratory. The compromised data includes sensitive data documents and files encompassing millions of images millions of engineering and technical blueprints and classified internal video recordings and footage.
    Date: 2026-02-03T00:26:20Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3548
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b90e9470-2533-4917-a2c9-0c889dcdf456.png
    https://d34iuop8pidsy8.cloudfront.net/9284e662-d5d6-4bc6-920a-9e5dabd69eb8.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: USA
    Victim Industry: Research Industry
    Victim Organization: lawrence livermore national laboratory
    Victim Site: llnl.gov
  114. Alleged sale of ClickIndia data
    Category: Data Breach
    Content: The threat actor claims to be selling ClickIndia user data; the dataset contains 742,000 user records.
    Date: 2026-02-03T00:22:46Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-742k-india-https-www-clickindia-com-User-records-with-emails-names-mobiles-acco
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/97bf4fe2-3bfe-4ab7-beab-5701bd29cc43.png
    Threat Actors: Dripper
    Victim Country: India
    Victim Industry: E-commerce & Online Stores
    Victim Organization: clickindia
    Victim Site: clickindia.com
  115. Alleged Sale of Network Target Finder
    Category: Malware
    Content: Threat actor claims to be selling a network reconnaissance and target discovery tool named Network Target Finder, advertised as a universal solution for identifying administrative panels, vulnerable WordPress installations, and other web resources. The tool allegedly supports high-performance multithreaded scanning, HTTP/HTTPS requests, DNS resolution, Tor integration, and multiple target formats including domains, IP:port pairs, and email addresses.
    Date: 2026-02-03T00:14:38Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/275092/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/faa9c826-39c0-45b1-8dcf-a9c9936b0709.png
    https://d34iuop8pidsy8.cloudfront.net/1daadc7d-26f4-40f2-bdf4-f0c421a9a9cd.png
    https://d34iuop8pidsy8.cloudfront.net/cfb52a69-a116-4efa-a6a7-1b55925ff6ca.png
    https://d34iuop8pidsy8.cloudfront.net/125adfa7-381c-4d4c-ac9e-dc94fa06b26e.png
    https://d34iuop8pidsy8.cloudfront.net/caf5cb43-51c1-4f19-ae00-11f15a5e5ec4.png
    https://d34iuop8pidsy8.cloudfront.net/4f9116c5-6836-4f9a-a110-8fe25791d538.png
    Threat Actors: darksoftware
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown