1. Executive Summary
This report analyzes 95 distinct cyber incidents recorded on January 4, 2026. The data indicates a surge in activity across four primary categories: Data Breaches, Ransomware, Initial Access Sales, and Website Defacements.
Key observations include:
- High-Volume Data Breaches: Massive datasets involving millions of records were exposed, notably in the telecommunications and healthcare sectors.
- Ransomware Campaigns: The threat group Dire Wolf launched a coordinated campaign targeting multiple global industries.
- Critical Infrastructure Targeting: The Infrastructure Destruction Squad claimed access to industrial control systems (ICS) and SCADA systems in South Korea, Spain, and Italy.
- Geographic Spread: Victims are distributed globally, with significant concentrations in Indonesia, the USA, France, the UK, and India.
2. Major Data Breaches
The majority of reported incidents involve the sale or leakage of sensitive databases. These breaches span government, healthcare, and commercial sectors.
A. High-Impact & Large-Scale Breaches
- Robi Axiata Limited (Bangladesh): A threat actor named int3lzO claimed to possess aggregated statistical data representing approximately 40 million subscribers1.
- Turkey Hospital Workers: A leak allegedly exposed information on approximately 2.7 million healthcare employees, including doctors and hospital workers across Turkey2.
- PT Matahari Department Store Tbk (Indonesia): A breach reportedly compromised 2 million customer records, including PII and card-related numbers3333.+1
- Immobiliare.it (Italy): A database of 1.4 million records related to real estate agents, including private mobile numbers, was offered for sale4.
- Upbit (South Korea): The Infrastructure Destruction Squad claimed to have hacked the crypto-exchange’s servers, obtaining 1.83 TB of infrastructure and operational data5.
B. Government & Public Sector
- United Kingdom: A threat actor named Grubder leaked a “data-export.unitedkingdom” database containing 218,000 user records with cleartext passwords and physical addresses6.
- Cherokee County Government (USA): Approximately 92,000 government employee records, including HR identifiers and office locations, were listed for sale777.+2
- Aguascalientes (Mexico): A leak reportedly exposed government data including addresses, fines, and bank account details8.
C. Healthcare & Critical Services
- HIDOC (Indonesia): A national-scale hospital booking and patient queue database was offered for sale, covering the end-to-end outpatient booking lifecycle9.
- BrightSpeed (USA): The Crimson Collective claimed a breach involving customer account masters, payment histories, and masked card details10.
- Resource Corporation of America (USA): Targeted by Medusa Ransomware, which threatens to publish internal data within 15-16 days11.
3. Ransomware Campaigns
Ransomware activity was dominated by a specific actor, though other well-known groups remain active.
The “Dire Wolf” Campaign
The threat group Dire Wolf executed a rapid series of attacks across diverse industries on the same day.
- KwikLedgers (USA): 31 GB of data stolen, including tax filings and financial records12.
- Hydrodiseño (Spain): 487 GB of data stolen, including employee records and legal documents13.
- Bina Darulaman Berhad (Malaysia): 500 GB of data stolen, including design drawings and confidential documents14.
- Laurenzano Logística (Argentina): 100 GB of logistics data obtained15.
- Sunzen Group (Malaysia): 108 GB of biotechnology data obtained16.
- Pernel Media (France): 500 GB of media production data obtained17.
Other Active Groups
- Qilin: Targeted Sönmezler Metal (Turkey) 18, Cal Spas (USA) 19, and Tommotek WA Pty Ltd (Australia)20.+2
- Dark Storm Team: Targeted the Ministry of Foreign Affairs (Venezuela), providing proof of website downtime21.
4. Industrial Control Systems (ICS) & Initial Access
A concerning trend is the sale of direct access to critical infrastructure and operational technology (OT).
Infrastructure Destruction Squad
This group focused on gaining control over physical systems:
- South Korea: Claimed access to an industrial control system for metal thermal processing (heating, quenching, tempering)2222.+1
- Iran (Teco Impianti s.r.l): Claimed login access to a system managing climate, feed, and water for farming2323.+1
- Italy (Avinatura Srl SS): Claimed access to poultry house environmental controls, including temperature and ventilation systems24.
- Spain: Claimed access to a payment and management system for dryers25.
General Access Sales
- Fortinet: An actor is selling 1,200 unauthorized Fortinet admin access points26.
- Opéra National de Paris: Unauthorized SFTP access exposing server credentials and internal hostnames27.
- WordPress Shops: The actor Shopify is selling shell/admin access to shops in Iceland, Denmark, Poland, France, Italy, and Chile28282828.+1
5. Threat Actor Analysis
| Threat Actor | Primary Activity | Focus / Tactics |
| Grubder | Data Brokerage | Highly prolific; focused on selling UK and USA PII datasets (e.g., Mumsnet, Cherokee County, Needham Business)292929292929292929.+2 |
| Dire Wolf | Ransomware | High-volume exfiltration (100GB-500GB+) targeting global enterprises with defined countdown timers for publication30303030.+1 |
| Loser | Data Brokerage | Focused on e-commerce and talent profiles in Europe and Canada (e.g., VinterNet, Broil King, CastingStudio)313131313131313131.+2 |
| LionDataMarket | Data Brokerage | Heavily focused on Indonesian platforms (Sayurbox, Titipku, Indopaket)32323232.+1 |
| Infrastructure Destruction Squad | ICS/SCADA Attacks | Targets operational technology (farming, metal processing) rather than just data exfiltration33333333.+1 |
6. Conclusion
The intelligence gathered from January 4, 2026, highlights a volatile cyber landscape.
- Indonesia is a primary target for data brokers, with multiple e-commerce and logistics platforms compromised.
- Ransomware has become industrialized, evidenced by Dire Wolf’s simultaneous, high-volume attacks across three continents in a single day.
- Operational Technology is at risk, with the Infrastructure Destruction Squad demonstrating the capability to access and potentially manipulate physical control systems in the agriculture and manufacturing sectors.
- Credential exposure is widespread, with thousands of administrative access points (Fortinet, WordPress) available for purchase, likely serving as precursors to future ransomware or espionage attacks.
Recommendation: Organizations in the affected sectors (Healthcare, Telecommunications, Manufacturing) should immediately audit their external attack surfaces, specifically looking for exposed Fortinet appliances and unsecured database endpoints.
Detected Incidents Draft Data
- Alleged Data Breach of Shining Hope for Communities (SHOFCO)
Category: Data Breach
Content: Threat Actor claims to have breached the database of Shining Hope for Communities in Kenya, which contains 129k records of user information.
Date: 2026-01-04T22:33:27Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273134/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0c43092a-d3cd-49af-94a0-743610924d0b.png
Threat Actors: betway
Victim Country: Kenya
Victim Industry: Non-profit & Social Organizations
Victim Organization: shining hope for communities
Victim Site: shofcowelfare.org - Alleged data breach of Turkey Hospital Workers Database
Category: Data Breach
Content: A threat actor claims to have leaked data belonging to hospital workers and doctors across Turkey. The data allegedly exposed information on approximately 2.7 million healthcare employees
Date: 2026-01-04T22:29:47Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-REICHLeaks-Turkiye-Hospital-Workers-Doctor-Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1e8aecf9-bb67-4870-a154-80158abd363a.png
Threat Actors: Elliptic
Victim Country: Turkey
Victim Industry: Government & Public Sector
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of PT Matahari Department Store TBK
Category: Data Breach
Content: Threat Actor claims to have breached the database of PT Matahari Department Store Tbk in Indonesia, containing approximately 2 million customer records. The exposed data reportedly includes personally identifiable information such as customer names, email addresses, dates of birth, gender, phone numbers, and card-related numbers.
Date: 2026-01-04T22:28:23Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273136/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9813490a-2c62-4cf4-8ad6-47985d4d6cb7.png
Threat Actors: betway
Victim Country: Indonesia
Victim Industry: Retail Industry
Victim Organization: pt matahari department store tbk
Victim Site: matahari.com - Alleged data breach of Petits-Fils
Category: Data Breach
Content: The threat actor claims to have exposure of an employee database belonging to Petits-Fils, a French elderly home-care services company. The leaked dataset reportedly contains around 1,000 employee records and was shared in JSON format.
Date: 2026-01-04T22:20:32Z
Network: openweb
Published URL: https://breachforums.bf/Thread-FR-Petit-Fils-1K-Employees
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9d0569e9-863d-4e7c-a7e8-c1045f4f0651.png
Threat Actors: HexDex2
Victim Country: France
Victim Industry: Hospital & Health Care
Victim Organization: petits-fils
Victim Site: petits-fils.com - Alleged sale of 120x express vpn
Category: Data Breach
Content: The threat actor claims to have selling approximately 120 ExpressVPN-related entries, shared via an external file-hosting link.
Date: 2026-01-04T22:09:29Z
Network: openweb
Published URL: https://breachforums.bf/Thread-120x-express-vpn
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f9d2b7a7-b349-42c0-bc0b-28b6aeaedf13.png
Threat Actors: buadamcokfena
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of data-export.united kingdom
Category: Data Breach
Content: Threat Actor claims to have leaked a database allegedly sourced from data-export.unitedkingdom, containing approximately 218,000 user records. The exposed data reportedly includes sensitive user information such as personally identifiable information, cleartext passwords, IP addresses, and physical address details. The dataset allegedly contains extensive account-level fields, including user IDs, names, email addresses, account status, verification flags, gender, age range, contact numbers, postal addresses, signup and login metadata, reputation metrics, alerts counts, and system-related information.
Date: 2026-01-04T22:06:08Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-218k-United-Kingdom-data-export-united-kingdom-User-PII-cleartext-passwords-s
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/34d29dc6-8e0b-42ef-920c-b253e229ecc4.png
Threat Actors: Grubder
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Dark Storm Team targets the website of Ministry of Foreign Affairs (Venezuela)
Category: Ransomware
Content: Proof of Downtime: https://check-host.net/check-report/363acc6fk39e
Date: 2026-01-04T22:00:09Z
Network: telegram
Published URL: https://t.me/Darkstormre/49
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/59e2ae89-1873-4c6f-a20a-79b5a60fb954.png
Threat Actors: Dark Storm Team
Victim Country: Venezuela
Victim Industry: Government Administration
Victim Organization: ministry of foreign affairs (venezuela)
Victim Site: mppre.gob.ve - Alleged data breach of BrightSpeed
Category: Data Breach
Content: The group claims to have breached the database of BrightSpeed. The data reportedly includes customer and account master records with names, emails, phone numbers, billing and service addresses, account and network details, address qualification data with geolocation coordinates and service eligibility, user-level account information, payment histories and payment methods with masked card details, as well as appointment and order records containing customer contact information and installation details. The group also states that a data sample will be released on Monday night
Date: 2026-01-04T21:57:25Z
Network: telegram
Published URL: https://t.me/crimsonbackup/10
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/02cf77fe-680d-47f8-bbfb-fc4773630f11.jpg
Threat Actors: Crimson Collective
Victim Country: USA
Victim Industry: Network & Telecommunications
Victim Organization: brightspeed
Victim Site: brightspeed.com. - Alleged data breach of Accommodation for Students
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly sourced from Accommodation for Students. The listing advertises approximately 182,000 records containing owner-related personally identifiable information (PII). The exposed data reportedly includes email addresses, phone numbers, password hashes, names, addresses, account metadata, and other profile attributes
Date: 2026-01-04T21:49:51Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-182k-United-Kingdom-accommodationforstudents-com-Owner-PII-password-hashes-em
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f24416ed-213b-4426-a193-277cef54216c.png
Threat Actors: Grubder
Victim Country: UK
Victim Industry: Real Estate
Victim Organization: accommodation for students
Victim Site: httpaccommodationforstudents.com - Alleged Data Breach of Mumsnet Limited
Category: Data Breach
Content: Threat Actor claims to have breached the database of Mumsnet Limited in the United Kingdom. The exposed data reportedly includes user personally identifiable information, password hashes, signup IP addresses, and home address details. The dataset allegedly contains extensive account-level information such as usernames, email addresses, account status, membership details, reputation metrics, login and signup metadata, location data, and contact numbers.
Date: 2026-01-04T21:40:21Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-1-4m-United-Kingdom-https-www-mumsnet-com-User-PII-password-hashes-signup-I
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b8201dff-ae1c-497a-a3fc-bb586e685d63.png
Threat Actors: Grubder
Victim Country: UK
Victim Industry: Online Publishing
Victim Organization: mumsnet limited
Victim Site: mumsnet.com - Alleged data breach of Cherokee County Government
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly obtained from cherokeecountyga.gov, a United States local government entity. The exposed dataset reportedly contains approximately 92,000 government employee records, including employee full names, job titles, departments, work email addresses, phone numbers, office locations, HR identifiers, employment status, hire and end dates, and internal organizational details
Date: 2026-01-04T21:23:12Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-92k-United-States-cherokeecountyga-gov-Government-Employee-PII-HR-Systems-Co
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/24db3ced-e353-4314-a822-df9403689cd6.png
Threat Actors: Grubder
Victim Country: USA
Victim Industry: Government & Public Sector
Victim Organization: cherokee county government
Victim Site: cherokeecountyga.gov - Alleged data breach of Needham Business Association
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly obtained from needhambusiness.co.uk, a United Kingdom–based business membership organization. The exposed dataset reportedly contains approximately 127,000 member records, including full names, email addresses, office and mobile phone numbers, physical addresses, membership details, login metadata, IP logs, and password hashes with associated salts.
Date: 2026-01-04T21:15:22Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-127k-United-Kingdom-needhambusiness-co-uk-Member-PII-password-hashes-mobile-n
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d1ae8e0d-6418-41f0-b6ab-4a3b21fc2701.png
Threat Actors: Grubder
Victim Country: UK
Victim Industry: Non-profit & Social Organizations
Victim Organization: needham business association
Victim Site: needhambusiness.co.uk - Alleged data breach of Buehler
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly sourced from buehler a United States–based industrial manufacturing company. The exposed dataset reportedly contains approximately 136,000 marketing and B2B lead records, including full names, business email addresses, phone numbers, company names, physical addresses, inquiry messages, preferred response methods, and submission IP addresses.
Date: 2026-01-04T21:07:06Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-136k-United-States-https-www-buehler-com-Marketing-Leads-B2B-Emails-Phone-N
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9e5d181c-9294-4a22-8571-139c941b5222.png
Threat Actors: Grubder
Victim Country: USA
Victim Industry: Manufacturing
Victim Organization: buehler
Victim Site: buehler.com - Alleged data breach of AustinRealEstate
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly sourced from austinrealestate a United States–based real estate platform. The exposed dataset reportedly contains approximately 182,000 real estate lead records, including full names, email addresses, phone numbers, contact preferences, property interests, budget ranges, location preferences, IP addresses, and inquiry metadata.
Date: 2026-01-04T20:57:49Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-182k-United-States-https-www-austinrealestate-com-Real-Estate-Leads-PII-Ema
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3556315c-cc9d-4346-9345-ef806e89f136.png
Threat Actors: Grubder
Victim Country: USA
Victim Industry: Real Estate
Victim Organization: austinrealestate
Victim Site: austinrealestate.com - Alleged data breach of ActiveHerb
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly obtained from activeherb.com, a United States–based health supplement retailer. The exposed dataset reportedly contains approximately 114,000 customer records, including email addresses, phone numbers, health-related queries, product purchase information, and customer interaction metadata.
Date: 2026-01-04T20:55:34Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-114k-United-States-https-www-activeherb-com-Customer-Emails-Health-Queries
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2b665085-f390-4aff-85be-cdeb3d6fbc72.png
Threat Actors: Grubder
Victim Country: USA
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: activeherb
Victim Site: activeherb.com - Alleged data breach of Wadhifa
Category: Data Breach
Content: The threat actor is advertising the sale of a database allegedly from Wadhifa, a Saudi Arabia–based employment and job-seeker platform. The dataset reportedly contains 418,293 job seeker records and includes highly sensitive personal information such as full names, dates of birth, national ID numbers, email addresses, phone and WhatsApp numbers.
Date: 2026-01-04T20:52:29Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-418k-Saudi-Arabia-wadhefa-com-418-293-Job-Seeker-CVs-National-IDs-Emails-Pho
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/14a2c998-48f4-4987-b6b2-22ca94c8ced7.png
Threat Actors: Grubder
Victim Country: Saudi Arabia
Victim Industry: Staffing/Recruiting
Victim Organization: wadhifa
Victim Site: wadhifa.com - Alleged data breach of Robi Axiata Limited
Category: Data Breach
Content: The threat actor claims to be offering a large-scale dataset allegedly related to Robi Axiata Limited. The dataset is advertised as representing approximately 40 million Robi subscribers and is described as aggregated statistical data rather than raw customer records.
Date: 2026-01-04T20:46:42Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-40-million-Robi-phone-number-dataset-%E2%80%93-Bangladesh
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/513f60e4-1b24-487e-b952-21eb5df4bf4e.png
Threat Actors: int3lzO
Victim Country: Bangladesh
Victim Industry: Network & Telecommunications
Victim Organization: robi axiata limited
Victim Site: robi.com.bd - Alleged Sale of Unauthorized Admin and Shell Access to Unidentified WordPress Shops in Multiple Countries
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized admin and shell access to an unidentified WordPress shop in multiple countries, including Iceland, Denmark, and Poland.
Date: 2026-01-04T20:45:36Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273127/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/aa99ed16-a5d1-4832-94e3-575f0a1abc65.png
Threat Actors: Shopify
Victim Country: Iceland
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Schultze & Braun
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly extracted from the website of Schultze & Braun, a German law firm. The dataset is advertised as containing approximately 106,000 records and reportedly includes legal entity names, entity types, brand and division details, postal addresses, phone and fax numbers, email addresses.
Date: 2026-01-04T20:41:02Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-106k-Germany-schultze-braun-de-Law-Firm-Records-Legal-Entities-Phone-Address
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0255b901-e592-4db9-8875-a0321b8f01ac.png
Threat Actors: Grubder
Victim Country: Germany
Victim Industry: Legal Services
Victim Organization: schultze & braun
Victim Site: schultze-braun.de - Alleged Sale of Unauthorized Admin and Shell Access to an Unidentified WordPress Shop in France
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized admin access and shell access to an unidentified WordPress shop in France.
Date: 2026-01-04T20:25:25Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273125/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9df629d7-2a3a-431f-91d6-d760f08bc498.png
Threat Actors: Shopify
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin and Shell Access to an Unidentified WordPress Shop in Italy
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized admin access and shell access to an unidentified WordPress shop in Italy.
Date: 2026-01-04T20:24:46Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273124/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0db2b577-3572-44d8-8ee4-8f68b6d22a90.png
Threat Actors: Shopify
Victim Country: Italy
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin and Shell Access to an Unidentified WordPress Shop in Chile
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized admin access and shell access to an unidentified WordPress shop in Chile.
Date: 2026-01-04T20:10:59Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273120/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/25e33885-0d29-46ab-97f6-e2e28523e13b.png
Threat Actors: Shopify
Victim Country: Chile
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - JavaneseTeam targets the website of Faith Victory Association
Category: Defacement
Content: The Group claims to have defaced the website of Faith Victory Association in Rwanda.
Date: 2026-01-04T19:20:05Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223269
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/04254cf0-87d2-4131-85db-447b299ee43b.png
Threat Actors: JavaneseTeam
Victim Country: Rwanda
Victim Industry: Non-profit & Social Organizations
Victim Organization: faith victory association
Victim Site: faith-victory.org - Alleged data leak of France Unofficial Database Index
Category: Data Breach
Content: The threat actor claims to be selling database index related to France. The exposed data may contain user information such as emails, usernames, and personal records, creating potential security and privacy risks.
Date: 2026-01-04T19:08:40Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Unofficial-Database-Index-French-edition–183062
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8c833de9-26c3-4885-bc07-b61b34f8d6e7.png
Threat Actors: Addka72424
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BONDOWOSO BLACK HAT targets the website of Mediatax
Category: Defacement
Content: The Group claims to have defaced the website of Mediatax in Indonesia.
Date: 2026-01-04T19:01:07Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223267
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a5ee326c-2a59-4138-8720-a9ed07c1baee.png
Threat Actors: BONDOWOSO BLACK HAT
Victim Country: Indonesia
Victim Industry: Accounting
Victim Organization: mediatax
Victim Site: mediatax.id - Alleged data breach of HIDOC
Category: Data Breach
Content: The threat actor claims to be offering a national-scale hospital booking and patient queue database linked to HIDOC, a centralized healthcare appointment and queue-management platform used across Indonesia. which includes end-to-end outpatient booking lifecycle informations.
Date: 2026-01-04T19:00:04Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-HIDOC-CO-ID-1-32m-%E2%80%94-NATIONAL-HOSPITAL-BOOKING-PATIENT-QUEUE-DATABASE-INDONESIA
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e7c3e366-345b-4597-9934-121cc240cf46.png
Threat Actors: LionDataMarket
Victim Country: Indonesia
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: hidoc
Victim Site: hidoc.co.id - Alleged data breach of Sayurbox
Category: Data Breach
Content: A threat actor claims to be selling a large order and payment database from Sayurbox Indonesia, an online grocery delivery platform. which include order details, pricing information, vouchers and discounts, delivery options, payment methods and transaction metadatas.
Date: 2026-01-04T18:48:53Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-SAYURBOX-INDONESIA-8-5-Million-Records-ONLINE-GROCERY-DELIVERY
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/11911cc6-b6e2-4422-ae9e-b5d085c00e74.png
Threat Actors: LionDataMarket
Victim Country: Indonesia
Victim Industry: E-commerce & Online Stores
Victim Organization: sayurbox
Victim Site: sayurbox.com - BONDOWOSO BLACK HAT targets the website of Poris Pack
Category: Defacement
Content: The Group claims to have defaced the website of Poris Pack in Indonesia.
Date: 2026-01-04T18:47:25Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223266
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ba84ec4e-c1ba-4f6f-8f2f-81411555a224.png
Threat Actors: BONDOWOSO BLACK HAT
Victim Country: Indonesia
Victim Industry: E-commerce & Online Stores
Victim Organization: poris pack
Victim Site: poris.id - Alleged data breach of Titipku
Category: Data Breach
Content: The threat actor claims to be selling a full user and vendor database belonging to Titipku, an Indonesian hyperlocal shopping and delivery platform. which includes user IDs, full names, email addresses, phone numbers, gender, birth dates, account creation and update timestamps, and profile metadata.
Date: 2026-01-04T18:46:50Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-titipku-com-DATABASE-%E2%80%94-470-000-Records-INDONESIA-Shopping-Platform
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2f68daf2-0ee2-4f7d-b9d7-d1c79f32c908.png
Threat Actors: LionDataMarket
Victim Country: Indonesia
Victim Industry: E-commerce & Online Stores
Victim Organization: titipku
Victim Site: titipku.com - Alleged data breach of Indopaket
Category: Data Breach
Content: The threat actor claims to be offering for sale a large-scale logistics delivery database associated with Indopaket, an Indonesian national last-mile courier service.
Date: 2026-01-04T18:45:51Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-HIDOC-CO-ID-1-32m-%E2%80%94-NATIONAL-HOSPITAL-BOOKING-PATIENT-QUEUE-DATABASE-INDONESIA
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/767486af-ea52-419f-b67c-1915758ef935.png
Threat Actors: LionDataMarket
Victim Country: Indonesia
Victim Industry: Transportation & Logistics
Victim Organization: indopaket
Victim Site: indopaket.co.id - Dream Hack targets the website of Doctors Query Private Limited
Category: Defacement
Content: The Group claims to have defaced the website of Doctors Query Private Limited in India.
Date: 2026-01-04T18:40:00Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223282
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5ff95629-2c94-42d0-92bc-6abb99912cce.png
Threat Actors: Dream Hack
Victim Country: India
Victim Industry: Education
Victim Organization: doctors query private limited
Victim Site: doctorsquery.com - Alleged data leak of Indonesia Trans Network
Category: Data Breach
Content: The group claims to have leaked employee id photo files of Indonesia Trans Network
Date: 2026-01-04T18:33:24Z
Network: telegram
Published URL: https://t.me/c/3487552490/158
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b99c998f-6fa6-4d0b-814e-95da7393d23e.jpg
https://d34iuop8pidsy8.cloudfront.net/a32f1145-f105-4708-9d3e-7ca647a372d9.jpg
https://d34iuop8pidsy8.cloudfront.net/988e9f79-6dbe-4f97-89f8-c067e9492b7b.jpg
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Network & Telecommunications
Victim Organization: indonesia trans network
Victim Site: itn.net.id - Alleged Unauthorized Access to an Opéra national de Paris
Category: Initial Access
Content: A threat actor claims to be offering unauthorized SFTP access associated with Opéra national de Paris, allegedly exposing server credentials, certificate passwords, FTP/SFTP access details, internal hostnames, and service configuration information.
Date: 2026-01-04T18:27:20Z
Network: openweb
Published URL: https://breachforums.bf/Thread-FR-Access-SFTP-OperaDeParis
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9f45b820-cd41-4d55-ad25-24fcdf2da0ad.png
Threat Actors: HexDex2
Victim Country: France
Victim Industry: Performing Arts
Victim Organization: opéra national de paris
Victim Site: operadeparis.fr - Alleged sale of 10M Outlook Cleaned Emails Database
Category: Data Breach
Content: A threat actor claims to be offering a “cleaned” database containing over 10 million Outlook email addresses.
Date: 2026-01-04T18:26:45Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Outlook-Cleaned-Emails-Database-10M
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f365b24a-02fd-4a01-b6df-72add908d229.png
Threat Actors: Toxic_Wolf
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of Massive iCloud Email Database
Category: Data Breach
Content: A threat actor claims to be distributing a dataset containing approximately 23 million iCloud email addresses allegedly associated with Apple iCloud users. The dataset reportedly consists solely of email addresses in CSV format.
Date: 2026-01-04T18:25:49Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Massive-23M-iCloud-Email-Database-at-Your-Fingertips
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cd74970a-b0fe-4c84-aaee-9c26978657d3.png
Threat Actors: Toxic_Wolf
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of VinterNet
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly from VinterNet . containing approximately 156,000 e-commerce order records. The exposed data reportedly includes customers’ full names, email addresses, phone numbers, billing and shipping addresses, invoice details, order metadata, and payment-related status informations.
Date: 2026-01-04T17:52:08Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-156k-France-https-www-vinternet-net-E-commerce-Orders-DB-Full-PII-Emails-P
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/59964629-d7fd-40c5-a665-8e13bdea8415.png
Threat Actors: Loser
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: vinternet
Victim Site: vinternet.net - Alleged data breach of Immobiliare.it
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly from Immobiliare.it .containing approximately 1.4 million records related to Italian real estate agents. The exposed data reportedly includes agents’ full names, email addresses, private mobile phone numbers, office addresses, city and postal code information, and internal record metadata, posing risks of targeted phishing, harassment, and business email compromise.
Date: 2026-01-04T17:51:14Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-1-4m-Italy-immobiliare-it-Real-Estate-Agent-PII-Private-Mobile-Numbers-Emails
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bed34c3e-795b-4307-a3f7-3806867e9492.png
Threat Actors: Loser
Victim Country: Italy
Victim Industry: Real Estate
Victim Organization: immobiliare.it
Victim Site: immobiliare.it - Alleged data breach of Kotori Juku
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly from Kotori Juku. containing approximately 98,000 records. The exposed data reportedly includes users’ full names, dates of birth, phone numbers, email addresses, physical addresses, account metadata, and password hashes, posing potential risks of account takeover, phishing, and identity fraud.
Date: 2026-01-04T17:40:41Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-98k-Japan-kotori-juku-jp-Education-Portal-DB-PII-Emails-Phone-Numbers-Addre
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8995892b-b5eb-43e0-8c08-996a50cfd97f.png
Threat Actors: Loser
Victim Country: Japan
Victim Industry: Education
Victim Organization: kotori juku
Victim Site: kotori-juku.jp - Alleged data breach of Broil King
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly from Broil King. containing approximately 267K customer records from Canada. The exposed data reportedly includes customers’ full names, email addresses, phone numbers, shipping addresses, product model and serial numbers, warranty registration details, and service case information, posing a risk of phishing, fraud, and targeted scams.
Date: 2026-01-04T17:38:33Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-267k-Canada-broilkingbbq-com-Customer-database-personal-emails-phone-numbers
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2f7a021a-bd89-438e-b367-e8fe114c461f.png
Threat Actors: Loser
Victim Country: Canada
Victim Industry: Consumer Goods
Victim Organization: broil king
Victim Site: broilkingbbq.com - Alleged data breach of Golf
Category: Data Breach
Content: The threat actor claims to be selling a database from Golf. The dataset is advertised as containing approximately 500,000 member records and includes personally identifiable informations.
Date: 2026-01-04T17:30:52Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-500k-Australia-https-www-golflink-com-au-Member-database-including-PII-Golf
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9a012180-d7d3-4f78-b547-624f8ca9dac1.png
Threat Actors: Loser
Victim Country: Australia
Victim Industry: Sports
Victim Organization: golf
Victim Site: golf.com.au - Alleged data leak of Misr Pharmacies
Category: Data Breach
Content: Threat actor claims to have leaked data from Misr Pharmacies The exposed data is said to include customer order and shipment records containing names, email addresses, phone numbers, billing and shipping details, payment and delivery information, as well as e-prescription records with prescription IDs, customer names and mobile numbers, image URLs, address details, and timestamps
Date: 2026-01-04T16:50:55Z
Network: telegram
Published URL: https://t.me/c/3470684086/246
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4e686910-c9ae-4c3c-9a3b-93c6ae935d93.jpg
Threat Actors: RED EYES
Victim Country: Egypt
Victim Industry: Hospital & Health Care
Victim Organization: misr pharmacies
Victim Site: misr-online.com - Alleged access to an unidentified swimming pool in Denmark
Category: Initial Access
Content: The group claims to have gained unauthorized access to the CCTV system of an unidentified swimming pool in Denmark
Date: 2026-01-04T16:06:24Z
Network: telegram
Published URL: https://t.me/zpentestalliance/917
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b55136e3-c671-4cd4-99e9-30f30aa44c44.jpg
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Denmark
Victim Industry: Recreational Facilities & Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Paper Deals
Category: Data Breach
Content: The group claims to have breached data from Paper Deals
Date: 2026-01-04T16:05:47Z
Network: telegram
Published URL: https://t.me/c/3054021775/259
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/55fc06a7-cec5-4200-a1fc-120feb90d940.jpg
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: India
Victim Industry: E-commerce & Online Stores
Victim Organization: paper deals
Victim Site: paperdeals.in - Alleged data breach of BDjobs.com
Category: Data Breach
Content: A threat actor claims to be selling a large-scale database extract from BDjobs.com, one of Bangladesh’s largest online job portals. The dataset is advertised as containing approximately 1 million user records and includes highly sensitive personally identifiable information.
Date: 2026-01-04T15:44:34Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-1m-Bangladesh-https-www-bdjobs-com-Full-PII-database-including-National-IDs
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/74dc98d2-68e4-4828-a2ad-8505ae524a9c.png
Threat Actors: Loser
Victim Country: Bangladesh
Victim Industry: Staffing/Recruiting
Victim Organization: bdjobs.com
Victim Site: bdjobs.com - Alleged data breach of CastingStudio
Category: Data Breach
Content: A threat actor claims to be selling a database extract from CastingStudio, a Belgium-based talent casting platform. The dataset is advertised as containing approximately 100,000 professional talent profiles, including personally identifiable information, contact details, and media-related metadata.
Date: 2026-01-04T15:40:19Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-100k-Belgium-castingstudio-com-Professional-talent-profiles-PII-contact-info–183100
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b3b3ba13-55b6-4e55-acb5-5619ac390d74.png
Threat Actors: Loser
Victim Country: Belgium
Victim Industry: Entertainment & Movie Production
Victim Organization: castingstudio
Victim Site: castingstudio.com - Alleged data leak of Chungbuk National University College of Veterinary Medicine
Category: Data Breach
Content: Threat actor claims to have leaked data from Chungbuk National University. The compromised data reportedly include name, email, password, etc.
Date: 2026-01-04T14:25:26Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-%E2%AD%90%EF%B8%8F-South-Korea-Database-vetmed-cbnu-ac-kr-%E2%AD%90%EF%B8%8F
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/038aa9ce-3598-41cd-8c30-8bd5769917f0.png
Threat Actors: AshleyWood2022
Victim Country: South Korea
Victim Industry: Education
Victim Organization: chungbuk national university college of veterinary medicine
Victim Site: vetmed.cbnu.ac.kr - No team targets the website of Anepro
Category: Defacement
Content: The group claims to have defaced the website of Anepro.
Date: 2026-01-04T14:15:55Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223190
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/65bcb794-a984-46d3-a22c-36ce33777111.jpg
Threat Actors: No team
Victim Country: Mexico
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: anepro
Victim Site: anepro.com.mx - Resource Corporation of America falls victim to Medusa Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s internal data and intends to publish it within 15-16 days.
Date: 2026-01-04T13:58:10Z
Network: tor
Published URL: http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/detail?id=20058b47f2b4df7a0402f1fc268880b9
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bacdcf97-b194-4995-9d82-5b8715f7818d.jpg
https://d34iuop8pidsy8.cloudfront.net/6e5231c0-6932-43d9-889f-f624db7d3423.jpg
Threat Actors: MEDUSA
Victim Country: USA
Victim Industry: Hospital & Health Care
Victim Organization: resource corporation of america
Victim Site: resource-corp.com - Alleged data breach of Doctolib
Category: Data Breach
Content: The threat actor claims to have breached data belonging to Doctolib.
Date: 2026-01-04T13:23:33Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-Doctolib-2025-French-Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3a0fdbdb-1735-47c4-9a10-5b1aef847fed.png
Threat Actors: host1337
Victim Country: France
Victim Industry: Software Development
Victim Organization: doctolib
Victim Site: doctolib.com - Alleged Data Breach of Upbit
Category: Data Breach
Content: The group claims to have hacked the servers of Upbit, obtaining access to a substantial volume of confidential infrastructure and operational data. The compromised dataset is reported to include detailed information about system hardware, memory, storage capacity, and network traffic, amounting to approximately 1.83 TB of sensitive information.
Date: 2026-01-04T13:00:55Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3124
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2cdd48f9-3926-40a1-9944-44369d1c9699.png
https://d34iuop8pidsy8.cloudfront.net/3331c9f8-3fc7-4959-bc66-1cf787d3c485.png
https://d34iuop8pidsy8.cloudfront.net/7c657068-ddb1-4b3a-a4e1-c0d2763033aa.png
https://d34iuop8pidsy8.cloudfront.net/fe68c260-1629-4cbe-a8c2-9169e31b42d0.png
https://d34iuop8pidsy8.cloudfront.net/e90e1ec1-dbbd-4c2d-a545-30acfe54ef9f.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: South Korea
Victim Industry: Financial Services
Victim Organization: upbit
Victim Site: upbit.com - Alleged data breach of H1B Metrics
Category: Data Breach
Content: Threat actor claims to have leaked data from H1B Metrics. The compromised data reportedly include name, address, phone number, email, pin code, etc.
Date: 2026-01-04T12:58:37Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-USA-h1bmetrics-com-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8c430c8a-3f18-4b34-a998-322df963be63.png
Threat Actors: lulzintel
Victim Country: USA
Victim Industry: Information Services
Victim Organization: h1b metrics
Victim Site: h1bmetrics.com - Alleged data leak of gkpartner.pixelserver.ru
Category: Data Breach
Content: Threat actor claims to have leaked data from gkpartner.pixelserver.ru. The compromised data reportedly include name, email, password, phone number, etc.
Date: 2026-01-04T12:55:11Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-gkpartner-pixelserver-ru-Database-Russia
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/212b9974-5994-4530-b334-d4a69d21171f.png
Threat Actors: LindaBF
Victim Country: Russia
Victim Industry: Unknown
Victim Organization: gkpartner.pixelserver.ru
Victim Site: gkpartner.pixelserver.ru - Alleged data breach of Sindicato Profesional Independiente Docente
Category: Data Breach
Content: The threat actor claims to have breached data belonging to Sindicato Profesional Independiente Docente. The compromised data reportedly includes ID, course information, name, and additional records.
Date: 2026-01-04T12:45:15Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-cursos-spido-info-Database-Spain
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/41e6e234-8a4c-4d40-8cea-ec145e83ef93.png
Threat Actors: LindaBF
Victim Country: Spain
Victim Industry: Education
Victim Organization: sindicato profesional independiente docente
Victim Site: cursos.spido.info - Alleged Unauthorized Access to an industrial control and monitoring system in South Korea
Category: Initial Access
Content: The group claims to have gained alleged unauthorized access to an industrial control and monitoring system in South Korea. The compromised system reportedly provides managing and controlling all stages of metal thermal processing, including heating, quenching, tempering, and the use of oil as a cooling medium.
Date: 2026-01-04T12:41:42Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3139
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fb0672d0-c6ff-4fa4-a82f-0d14a81cb7ce.JPG
Threat Actors: Infrastructure Destruction Squad
Victim Country: South Korea
Victim Industry: Automotive
Victim Organization: dongjin electric & precision co., ltd.
Victim Site: dongjinco.com - Alleged data breach of DKMads
Category: Data Breach
Content: Threat actor claims to have leaked source code from DKMads.
Date: 2026-01-04T12:35:01Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SOURCE-CODE-DKMads-Data-Breach-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f680d003-7f57-46e4-afcb-e43ec2f8239a.png
Threat Actors: shabanaiqbal420
Victim Country: Myanmar
Victim Industry: Marketing, Advertising & Sales
Victim Organization: dkmads
Victim Site: dkmads.com - 6ickzone targets the website of binmart.shop
Category: Defacement
Content: The group claims to have defaced the website of binmart.shop
Date: 2026-01-04T12:22:01Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223179
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e3df85ba-20f4-46fd-ac3c-a46787a9585f.JPG
Threat Actors: 6ickzone
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: binmart.shop - Alpha wolf targets the website of Agence Meran
Category: Defacement
Content: The group claims to have defaced the website of Agence Meran
girasolnettoyage.agencemeran.fr
https://defacer.id/mirror/id/223214
hortensia.agencemeran.fr
https://defacer.id/mirror/id/223215
addicthair.agencemeran.fr
https://defacer.id/mirror/id/223219
agencemeran.fr
https://defacer.id/mirror/id/223218
hcoeurjaune.agencemeran.fr
https://defacer.id/mirror/id/223217
artvision.agencemeran.fr
https://defacer.id/mirror/id/223193
czevent.agencemeran.fr
https://defacer.id/mirror/id/223192
thonielpicktone.agencemeran.fr
https://defacer.id/mirror/id/223195
maleffilm.agencemeran.fr
https://defacer.id/mirror/id/223206
malef.agencemeran.fr
https://defacer.id/mirror/id/223200
urbansavage.agencemeran.fr
https://defacer.id/mirror/id/223199
zinews.agencemeran.fr
https://defacer.id/mirror/id/223198
media.agencemeran.fr
https://defacer.id/mirror/id/223205
eelr.agencemeran.fr
https://defacer.id/mirror/id/223196
khalifacoiffure.agencemeran.fr
https://defacer.id/mirror/id/223212
nemezyss.agencemeran.fr
https://defacer.id/mirror/id/223204
czweeding.agencemeran.fr
https://defacer.id/mirror/id/223191
czweeding2.agencemeran.fr
https://defacer.id/mirror/id/223216
imscleaning.agencemeran.fr
https://defacer.id/mirror/id/223208
arq.agencemeran.fr
https://defacer.id/mirror/id/223213
lefumoirdesyapi.agencemeran.fr
https://defacer.id/mirror/id/223209
letsgo.agencemeran.fr
https://defacer.id/mirror/id/223202
Date: 2026-01-04T12:14:21Z
Network: openweb
Published URL: https://defacer.id/archive/1
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/183364ab-9ca2-4460-adcd-ff2b95ae8ec0.png
https://d34iuop8pidsy8.cloudfront.net/b78e9721-877b-4ae6-8bae-0800f5f11998.png
https://d34iuop8pidsy8.cloudfront.net/ffc7d6e1-1f2b-4fc6-861c-32eb5a9d35ac.png
https://d34iuop8pidsy8.cloudfront.net/fae2e187-a673-4b87-93f4-67989cb958d7.jpg
https://d34iuop8pidsy8.cloudfront.net/3ee6d941-d10c-402c-880f-7fcb9e80e668.jpg
Threat Actors: Alpha wolf
Victim Country: France
Victim Industry: Information Technology (IT) Services
Victim Organization: agence meran
Victim Site: girasolnettoyage.agencemeran.fr
Alleged sale of unauthorized Fortinet admin access
Category: Initial Access
Content: Threat actor claims to be selling 1200 unauthorized Fortinet admin access.
Date: 2026-01-04T00:05:04Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273052/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4cda57be-d668-4418-b8c9-b7d91770017a.png
Threat Actors: ClientMonero
Victim Country: India
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown
Sönmezler Metal falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained the organization’s data.
Date: 2026-01-04T12:11:00Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=fce35e22-6243-390c-bb7e-00074eb92bf8
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b607a792-1270-476d-94a2-11b184e7918c.jpg
Threat Actors: Qilin
Victim Country: Turkey
Victim Industry: Mining/Metals
Victim Organization: sönmezler metal
Victim Site: sonmezlermetal.com.tr
6ickzone targets the website of HEXUS
Category: Defacement
Content: The group claims to have defaced the website of HEXUS
Date: 2026-01-04T12:07:11Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223177
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c27d0e10-64bc-4378-8969-da7257eb369c.JPG
Threat Actors: 6ickzone
Victim Country: Bangladesh
Victim Industry: Consumer Electronics
Victim Organization: hexus
Victim Site: hexusbd.shop
Cal Spas falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained the organization’s data.
Date: 2026-01-04T12:04:45Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=b32b7816-1b2c-3f86-8cfb-c05213b4ac10
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/69b5ed44-a380-4c81-8946-084b86dcdc97.jpg
Threat Actors: Qilin
Victim Country: USA
Victim Industry: Manufacturing
Victim Organization: cal spas
Victim Site: calspas.com
6ickzone targets the website of Naeem Ali
Category: Defacement
Content: The group claims to have defaced the website of Naeem Ali.
Date: 2026-01-04T11:58:58Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223178
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9fa7835a-6025-433d-89a2-438ae40bac6e.jpg
Threat Actors: 6ickzone
Victim Country: Pakistan
Victim Industry: Software Development
Victim Organization: Unknown
Victim Site: naeemali.dev
Tommotek WA Pty Ltd falls victim to Qilin Ransomware
Category: Ransomware
Content: The group claims to have obtained the organization’s data.
Date: 2026-01-04T11:56:15Z
Network: tor
Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=14295723-fdc2-34b8-a7f3-468219a279c6
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f76114bd-2026-48c0-89b9-dd1b5030f721.jpg
Threat Actors: Qilin
Victim Country: Australia
Victim Industry: Machinery Manufacturing
Victim Organization: tommotek wa pty ltd
Victim Site: tommotek.com
6ickzone targets the website of Reubro Design
Category: Defacement
Content: The group claims to have defaced the website of Reubro Design.
Date: 2026-01-04T11:50:53Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223180
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2ba0bc36-f17b-451d-839f-c57e074a1bf8.jpg
Threat Actors: 6ickzone
Victim Country: India
Victim Industry: Graphic & Web Design
Victim Organization: reubro design
Victim Site: design.reubro.com
Alleged data breach of Insightsoftware
Category: Data Breach
Content: The threat actor claims to have breached data belonging to Insightsoftware. The compromised data reportedly includes Insightsoftware Atlas source code.
Date: 2026-01-04T11:47:08Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-Credera-Data-Breach
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e6b36cc8-b36e-4d35-a348-d6c92c7b7d9f.png
Threat Actors: 888
Victim Country: USA
Victim Industry: Software Development
Victim Organization: insightsoftware
Victim Site: insightsoftware.com
No team targets the website of Asim Khan Official
Category: Defacement
Content: The group claims to have defaced the website of Asim Khan Official
Date: 2026-01-04T11:41:51Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223176
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e4e3fc21-fccf-498e-8af1-e345909046bd.JPG
Threat Actors: No team
Victim Country: Pakistan
Victim Industry: Unknown
Victim Organization: asim khan official
Victim Site: asimkhanofficial.com
6ickzone targets the website of Midlands Musculoskeletal Imaging
Category: Defacement
Content: The group claims to have defaced the website of Midlands Musculoskeletal Imaging.
Date: 2026-01-04T11:35:04Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223181
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/dfabbb48-434a-4a67-828d-f0b84cf2420a.jpg
Threat Actors: 6ickzone
Victim Country: UK
Victim Industry: Hospital & Health Care
Victim Organization: midlands musculoskeletal imaging
Victim Site: midlandsimaging.co.uk
JavaneseTeam targets the website of Projecto SIMPLIFICA
Category: Defacement
Content: The group claims to have defaced the website of Projecto SIMPLIFICA.
Date: 2026-01-04T11:32:42Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223188
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9eeb73f8-0a8d-478f-8216-396af344e384.jpg
Threat Actors: JavaneseTeam
Victim Country: Angola
Victim Industry: Government Administration
Victim Organization: projecto simplifica
Victim Site: cms.qa.simplifica.gov.ao
6ickzone targets the website of MSK Radiology 4U
Category: Defacement
Content: The group claims to have defaced the website of MSK Radiology 4U.
Date: 2026-01-04T11:29:40Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223182
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/640d9ee9-9c1b-4ec9-aa28-faf1b270532d.jpg
Threat Actors: 6ickzone
Victim Country: UK
Victim Industry: Hospital & Health Care
Victim Organization: msk radiology 4u
Victim Site: mskradiology4u.co.uk
No team targets the website of National Savings
Category: Defacement
Content: The group claims to have defaced the website of National Savings
Date: 2026-01-04T11:26:49Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223175
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/71f7cf69-ffe5-4de2-b2dc-c2b5a4dc85c3.JPG
Threat Actors: No team
Victim Country: Pakistan
Victim Industry: Government Administration
Victim Organization: national savings
Victim Site: nationalsavings.pk
JavaneseTeam targets the website of SEPE
Category: Defacement
Content: The group claims to have defaced the website of SEPE .
Date: 2026-01-04T11:24:23Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223187
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/39b9765c-63ec-40a3-93fb-3b1238a520b3.jpg
Threat Actors: JavaneseTeam
Victim Country: Angola
Victim Industry: Government Administration
Victim Organization: sepe
Victim Site: content.sepe.gov.ao
Alpha wolf targets the website of ZI’NEWS
Category: Defacement
Content: The group claims to have defaced the website of ZI’NEWS.
Date: 2026-01-04T11:23:19Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223197
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f266d6ab-472f-43cd-adc1-5a267a43f56d.jpg
Threat Actors: Alpha wolf
Victim Country: France
Victim Industry: Online Publishing
Victim Organization: zi’news
Victim Site: zinews.fr
Alleged login access to TECO IMPIANTI s.r.l
Category: Initial Access
Content: The group claims to have gained login access to TECO IMPIANTI s.r.l. The compromised system reportedly provides clmate and environmental management within the farm, feed and water management, automatic maintenance and cleaning, manual control and settings, alarms and notifications.
Date: 2026-01-04T10:51:00Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3123
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b65685a1-a605-4d88-908b-479493d6ca52.JPG
Threat Actors: Infrastructure Destruction Squad
Victim Country: Iran
Victim Industry: Farming
Victim Organization: teco impianti s.r.l
Victim Site: tecoimpianti.it
Alleged unauthorized access to unidentified management system of dryers in Spain
Category: Initial Access
Content: The group claims to have gained access to the unidentified payment and management system for dryers in Spain.
Date: 2026-01-04T10:35:10Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3122
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8f0932bd-407f-434f-9189-d92d4d4397fd.jpg
Threat Actors: Infrastructure Destruction Squad
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown
Alleged login access to Avinatura Srl SS
Category: Initial Access
Content: The group claims to have gained login access to Avinatura Srl SS. The compromised system reportedly provides access to the poultry house environmental control system, allowing them to monitor real-time sensor data and control temperature, humidity, ventilation, heating, and water systems across all zones.
Date: 2026-01-04T09:06:05Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3071
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b2242476-61a2-44df-bb32-a0f5df09eda2.JPG
Threat Actors: Infrastructure Destruction Squad
Victim Country: Italy
Victim Industry: Food Production
Victim Organization: avinatura srl ss
Victim Site: avinatura.it
Alleged Data leak of H1METRICS
Category: Data Breach
Content: The threat actor claims to have leaked databases belonging to H1METRICS. The compromised data reportedly includes name, slug, address, city, state, ZIP code, point-of-contact first name, point-of-contact last name, and additional information.
Date: 2026-01-04T08:58:46Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-USA-h1bmetrics-com-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5a2050dc-72a0-4acb-b178-e6a77f338824.png
https://d34iuop8pidsy8.cloudfront.net/050d6199-9fa5-4155-a139-f2f8265c7ce8.png
Threat Actors: lulzintel
Victim Country: USA
Victim Industry: Legal Services
Victim Organization: h1metrics
Victim Site: h1metrics.com
Alleged Data leak of NordVPN
Category: Data Breach
Content: The threat actor claims to have leaked databases belonging to NordVPN. The compromised data reportedly includes Salesforce API keys, Jira tokens, and additional sensitive information.
Date: 2026-01-04T08:49:39Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-SQL-nordvpn-com-SalesForce-leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7e2b0d76-67bd-4cbe-aca7-ab4f77bac13f.png
https://d34iuop8pidsy8.cloudfront.net/f779805f-e8aa-4fc4-bd7b-a070079efab1.png
https://d34iuop8pidsy8.cloudfront.net/0bc9822b-825b-421f-949f-4d8c5163ef86.png
Threat Actors: 1011
Victim Country: Panama
Victim Industry: Information Services
Victim Organization: nordvpn
Victim Site: nordvpn.com
Alleged login access to Cambodia Securities Exchange
Category: Initial Access
Content: The group claims to have gained login access to Cambodia Securities Exchange
Date: 2026-01-04T08:27:26Z
Network: telegram
Published URL: https://t.me/BlackEyeThai/72
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1bd51645-f394-429e-aaca-4211229722af.JPG
Threat Actors: BlackEye-Thai
Victim Country: Cambodia
Victim Industry: Capital Markets/Hedge Fund/Private Equity
Victim Organization: cambodia securities exchange
Victim Site: i.csx.com.kh
Alleged data breach of Indradhanush Gas Gris Limited
Category: Data Breach
Content: The threat actor claims to have leaked databases belonging to Indradhanush Gas Grid Limited. The compromised data reportedly includes candidate type, date of birth, candidate name, gender, mobile number, email address, and additional information.
Date: 2026-01-04T08:20:42Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-INDIA-iggl-co-in-Employee-Data
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5a77c8d1-b018-49bf-9bb5-34d14bbcaab3.png
Threat Actors: Tanaka
Victim Country: India
Victim Industry: Oil & Gas
Victim Organization: indradhanush gas grid limited
Victim Site: iggl.co.in
KwikLedgers falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 31 GB of the organization’s data. The compromised data reportedly includes internal documents, insurance policy documents, financial documents, confidential documents, database backups, audit documents, internal agreements, customer data, tax filing documents, and financial records. The group intends to publish the data within 20–21 days.
Date: 2026-01-04T07:21:58Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1472f7f5-2c1e-4290-8d7e-90aeb813477a.jpg
Threat Actors: Dire Wolf
Victim Country: USA
Victim Industry: Accounting
Victim Organization: kwikledgers
Victim Site: kwikledgers.com
Hydrodiseño falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 487 GB of the organization’s data. The compromised data reportedly includes Internal Documents, Financial Documents, Legal Documents, Employee Records, Customer Data, Financial Records, Personal Information. The group intends to publish the data within 26–27 days.
Date: 2026-01-04T07:19:29Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6ec8e36b-ff94-44f2-bf49-46542ee2f38b.jpg
Threat Actors: Dire Wolf
Victim Country: Spain
Victim Industry: Wholesale
Victim Organization: hydrodiseño
Victim Site: hydrodiseno.com
Bina Darulaman Berhad falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 500 GB of the organization’s data. The compromised data reportedly includes internal documents, insurance policy documents, financial documents, email backups, legal documents, design drawings, confidential documents, supplier documents, employee records, audit documents, internal agreements, customer data, tax filing documents, financial records, and personal information. The group intends to publish the data within 28–29 days.
Date: 2026-01-04T07:12:34Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/12a8f408-8542-4e5f-8431-4b4b69d0b4c6.jpg
Threat Actors: Dire Wolf
Victim Country: Malaysia
Victim Industry: Building and construction
Victim Organization: bina darulaman berhad
Victim Site: bdb.com.my
Alleged data breach of JR Creation
Category: Data Breach
Content: A threat actor claims to be breached 4.50 GB data from JR Creation. The Compromised Data Reportedly contain 85,000 records.
Date: 2026-01-04T06:31:43Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-Indian-Students-rjrcreation-in-70K
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/70b0b09d-8d9d-44e9-b3a0-3aafd7685101.png
https://d34iuop8pidsy8.cloudfront.net/aff6fdc2-1374-4963-b0ee-ce296ee77c3d.png
https://d34iuop8pidsy8.cloudfront.net/f2bf24a8-821a-44c9-aaf1-bcb7158cbe2b.png
Threat Actors: notangel
Victim Country: India
Victim Industry: Education
Victim Organization: jr creation
Victim Site: jrcreation.in
Laurenzano Logística falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 100 GB of the organization’s data and intends to publish it within 20-21 days.
Date: 2026-01-04T06:27:30Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/89c26f53-41d3-4c5f-aa41-6086cb31ddd9.png
Threat Actors: Dire Wolf
Victim Country: Argentina
Victim Industry: Transportation & Logistics
Victim Organization: laurenzano logística
Victim Site: laurenzanologistica.com.ar
Sunzen Group falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 108 GB of the organization’s data and intends to publish it within 27-28 days.
Date: 2026-01-04T06:24:57Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9f407ed7-df4c-43eb-b572-68fd343a0612.png
Threat Actors: Dire Wolf
Victim Country: Malaysia
Victim Industry: Biotechnology
Victim Organization: sunzen group
Victim Site: sunzengroup.com
Varimed Medikal falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 2GB GB of the organization’s data and intends to publish it within 31-40 days.
Date: 2026-01-04T06:18:54Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6d14d5d4-efb7-443c-9a47-58d998b85948.png
Threat Actors: Dire Wolf
Victim Country: Turkey
Victim Industry: Medical Equipment Manufacturing
Victim Organization: varimed medikal
Victim Site: varimed.com.tr
Pernel Media falls victim to Dire Wolf Ransomware
Category: Ransomware
Content: The group claims to have obtained 500 GB of the organization’s data and intends to publish it within 11-12 days.
Date: 2026-01-04T05:55:37Z
Network: tor
Published URL: http://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d543532d-3680-45dc-9d79-2c0525fbe140.png
Threat Actors: Dire Wolf
Victim Country: France
Victim Industry: Media Production
Victim Organization: pernel media
Victim Site: pernelmedia.com
6ickzone targets the website of Reubro International
Category: Defacement
Content: The group claims to have defaced the website of Reubro International.
Date: 2026-01-04T05:13:23Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223184
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2f14984e-ab16-4e32-be61-6209b0ddc244.png
Threat Actors: 6ickzone
Victim Country: India
Victim Industry: Information Technology (IT) Services
Victim Organization: reubro international
Victim Site: reubrotech.com
Pinoy XploitSec targets the website of The Redeemed College Of Missions
Category: Defacement
Content: The group claims to have defaced the website of The Redeemed College Of Missions
Date: 2026-01-04T04:58:50Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223189
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d5f2e05b-1a6f-4476-941a-57e796c69b78.png
Threat Actors: Pinoy XploitSec
Victim Country: Nigeria
Victim Industry: Education
Victim Organization: the redeemed college of missions
Victim Site: rcm.edu.ng
diparis targets the website of Critical Infrastructure Portal Government of Manipur
Category: Defacement
Content: The group claims to have defaced the website of Critical Infrastructure Portal Government of Manipur.
Date: 2026-01-04T04:56:07Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223190
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cc87308c-01de-40c5-9ea0-5aeb055617f1.png
Threat Actors: diparis
Victim Country: India
Victim Industry: Government Administration
Victim Organization: critical infrastructure portal government of manipur
Victim Site: criticalinfra.mn.gov.in
Alleged data leak of Aguascalientes
Category: Data Breach
Content: The group claims to have leaked Aguascalientes government database. The compromised data reportedly includes Name, Address, License, Fines and Bank accounts.
Date: 2026-01-04T04:30:11Z
Network: telegram
Published URL: https://t.me/c/3625792235/91
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2918c9c5-2863-4335-bea0-22a7aad45b48.png
https://d34iuop8pidsy8.cloudfront.net/02256857-2dcb-492b-ab65-2c7d1d10af65.png
Threat Actors: Chronus leaks
Victim Country: Mexico
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown
Alleged data breach of QuestCraft
Category: Data Breach
Content: The threat actor claims to be leaked data from QuestCraft. The Compromised Data Reportedly contain 741 647 records including User, IPs, Password.
Date: 2026-01-04T04:21:32Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-QuestCraft-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3518410c-5371-471a-bcdf-65249be75e4f.png
https://d34iuop8pidsy8.cloudfront.net/2f2f2fac-b05d-4762-99b9-17d084361896.png
Threat Actors: Kayo
Victim Country: Unknown
Victim Industry: Gaming
Victim Organization: questcraft
Victim Site: questcraft.org
Alleged data breach of QuestApply
Category: Data Breach
Content: The threat actor claims to be leaked data from QuestApply. The Compromised Data Reportedly include Email Addresses , names, job title.
Date: 2026-01-04T04:12:25Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-questapply-com-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/003eae5d-d393-414f-87ea-3aa5b0a11265.png
Threat Actors: lulzintel
Victim Country: USA
Victim Industry: Education
Victim Organization: questapply
Victim Site: questapply.com
Alleged data breach of AgroParisTech
Category: Data Breach
Content: A threat actor claims to be breached 211 GB of data from AgroParisTech. The Compromised Data Reportedly include Internal databases, Personally Identifiable Information, Passport data, Passport data, Student records.
Date: 2026-01-04T02:48:57Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-France-AgroParisTech-agroparistech-fr-211GB
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e9e95e7f-db8f-4746-bf31-0475ebc4278b.png
https://d34iuop8pidsy8.cloudfront.net/190b7177-7b53-4127-8019-50ae0116d740.png
Threat Actors: lulzintel
Victim Country: France
Victim Industry: Higher Education/Acadamia
Victim Organization: agroparistech
Victim Site: agroparistech.fr
Alleged data breach of Enerparc AG
Category: Data Breach
Content: Threat actor claims to have breached the internal database of Enerparc AG. The compromised data reportedly includes tenders and technical proposals for transformer stations, station requirement tables, factory acceptance test protocols, final station documentation, detailed photos of equipment, and test videos.
Date: 2026-01-04T00:18:31Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273005/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/101f30e2-80d3-4764-8470-3c7a76bd6ced.png
https://d34iuop8pidsy8.cloudfront.net/12c070d7-3f33-4b5c-b135-b81a454d4ba7.png
https://d34iuop8pidsy8.cloudfront.net/cc9d8084-da41-45a9-91fd-d99e996b22a2.png
Threat Actors: zestix
Victim Country: Germany
Victim Industry: Energy & Utilities
Victim Organization: enerparc ag
Victim Site: enerparc.de