1. Executive Summary
The reported timeframe indicates a high volume of cyber activity characterized by aggressive ransomware campaigns, the sale of unauthorized initial access to e-commerce platforms, and significant data breaches targeting government and defense sectors. Two ransomware groups, LYNX and Sinobi, were particularly active, while threat actors like Shopify flooded markets with administrative access to online stores.
2. Major Ransomware Campaigns
Multiple ransomware groups posted new victims, with LYNX and Sinobi accounting for the majority of the incidents.
LYNX Ransomware Group The LYNX group targeted a wide range of industries globally, including government, education, and manufacturing.
- Government: Victims include the Ville de Dunkerque in France , the South West Development Commission in Australia , and the City of Milton Florida in the USA.+2
- Education: Attacks were reported against St Joseph’s College Echuca in Australia and St. Charles Preparatory School in the USA.+1
- Corporate & Industrial: LYNX claimed attacks on Regis Resources (Mining, Australia) , Tecno Electric Paraguay , and Marine Systems Corporation (Maritime, USA).+2
Sinobi Ransomware Group The Sinobi group focused heavily on US-based organizations across various sectors, threatening to publish data within 9–12 days.
- Healthcare & Biotech: Victims include Windward Life Care , American Health , and LAMPIRE Biological Laboratories, Inc..+2
- Engineering & Automotive: Targeted entities include Wesley Heating & Cooling , M&M Auto Parts , Harris Consulting Engineers , and Lares Corporation.+3
- International Targets: They also targeted SVA and Mobile Technology of Spain, SL and Delko Développement in France.+1
Other Ransomware Activity
- Akira: Claimed attacks on Purcell | Everett Architects (USA) , Gebrüder Bagusat GmbH & Co. KG (Germany) , and Posillico Inc. (USA).+2
- Everest: Targeted Bolttech (Insurance, Singapore) and IDeaS Revenue Solutions (USA).+1
- Nova: Claimed attacks on Triad Packaging, Inc. (USA) and Saplog Logistic and Transport (Italy).+1
3. Government and Defense Data Leaks
Several incidents involved the alleged leakage of highly sensitive military and government documents.
- Defense Secrets:
- Russia: A threat actor claimed to sell documents related to the Russian C70 Stealth aircraft.
- Israel: The group Hider_Nex claimed to leak secret documents, maps, and plans from the Israel Ministry of Defence.
- USA: Documents allegedly associated with the U.S. Navy’s Arleigh Burke-class destroyers, including torpedo blueprints, were leaked.
- Citizen & Identity Data:
- Thailand: The group NTSEC claimed leaks of Thailand passport information and citizen ID cards.+1
- France: DumpSec claimed to sell databases from the Fédération Française de Handball and the Fédération Française de Cyclisme, including national identity cards.+1
- Panama & Malaysia: Claims circulated regarding the leak of 30,000 Panamanian citizen records and Malaysian ID card data.+1
4. Initial Access & SCADA Vulnerabilities
A significant market activity was observed regarding the sale of unauthorized access, including critical infrastructure controls.
- Industrial Control Systems (ICS/SCADA):
- South Korea: The Infrastructure Destruction Squad claimed access to the industrial control system of Jeonnam Technopark, allowing management of factory equipment.
- United Kingdom: NoName057(16) claimed access to an industrial boiler and screw feeder control system operated by MPAC Automation & Controls.
- USA: Z-PENTEST ALLIANCE claimed access to high-precision gas analysis equipment at Aeris Technologies.
- E-Commerce Access Markets:
- The threat actor Shopify was extremely prolific, listing unauthorized admin and shell access for sale for numerous unidentified online stores in the USA, France, UK, Spain, Slovakia, and Malta.+4
5. Corporate Data Breaches
Large-scale data breaches affected major commercial entities and service providers.
- Energy & Utilities: A database belonging to Endesa, Spain’s largest electricity company, was allegedly put up for sale.
- Financial Services: Data leaks were reported for Bank Mandiri (Indonesia) and PayPal accounts.+1
- Retail & Services: Alleged breaches included Lidl customer accounts , AirdropAlert b.v , and a massive 60-million-line database from Koinly.+2
- Infrastructure: A significant leak of 340 GB of internal files from axyon.eu allegedly impacted major French organizations like Bouygues, EDF, and Engie.
Conclusion
The data from January 5, 2026, illustrates a volatile cyber threat environment. The simultaneous activity of the LYNX and Sinobi ransomware groups suggests a coordinated or highly opportunistic surge in extortion attempts targeting Western infrastructure and healthcare.
Furthermore, the exposure of military schematics (US Navy and Russian C70) and government databases (Israel and Thailand) points to a persistent espionage threat alongside financial cybercrime. Finally, the widespread availability of “initial access” to industrial control systems and e-commerce backends indicates that threat actors are successfully bypassing perimeter defenses, creating a ready-made market for secondary attacks.
Detected Incidents Draft Data
- Alleged Sale of Russian C70 Stealth Documents
Category: Data Breach
Content: Threat Actor claims to be selling documents allegedly related to the Russian C70 stealth.
Date: 2026-01-05T22:36:40Z
Network: openweb
Published URL: https://leakbase.la/threads/russ1an-c70-stealth-documents-f0r-sa1e-just-dm.47976/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7534e95d-5611-4304-83c1-bf090a4d30f1.png
Threat Actors: Frenshyny69
Victim Country: Russia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Business Databases from Multiple Countries
Category: Data Breach
Content: Threat Actor claims to have leaked business databases from multiple countries, including Switzerland, Belgium, and Germany, containing approximately 300,000 lines of data with fields such as full names, email addresses, company descriptions, and job titles.
Date: 2026-01-05T22:31:47Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/273214/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7a71b60e-e49d-4a8c-9647-1dcb087a327e.png
Threat Actors: kimald
Victim Country: Switzerland
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of 1.3 Million Mobile Numbers from Multiple Countries
Category: Data Breach
Content: Threat Actor claims to have leaked 1.3 million mobile numbers from multiple countries including Singapore, Sweden, Vietnam, Indonesia and Belgium.
Date: 2026-01-05T22:25:23Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/273212/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/95b4b26d-d346-4f79-947b-9222f344055d.png
Threat Actors: kimald
Victim Country: Singapore
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Thailand passport information
Category: Data Breach
Content: The group claims to have leaked multiple sets of passports from Thailand
Date: 2026-01-05T22:23:10Z
Network: telegram
Published URL: https://t.me/ntsec4real/72
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1be20234-b8f7-46c8-bf53-3ba28a3d132d.png
Threat Actors: NTSEC
Victim Country: Thailand
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Israel Ministry of Defence
Category: Data Breach
Content: The group claims to have leaked partnership documents, shelters, ID , passport, driving cards , secret documents, maps , plans from the Israel’s ministry of defence
Date: 2026-01-05T22:04:42Z
Network: telegram
Published URL: https://t.me/c/2878397916/363
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/93949ee9-63c4-499c-973b-7568fc15ff94.jpg
Threat Actors: Hider_Nex
Victim Country: Israel
Victim Industry: Government Administration
Victim Organization: israel ministry of defence
Victim Site: mod.gov.il - Alleged Sale of Unauthorized Admin Panel Access to a Laravel-Based Online Shop in Ireland
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized administrative access to a Laravel-Based online shop in Ireland. The access allegedly provides control over the store’s admin panel without server-level shell access.
Date: 2026-01-05T20:27:14Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/273203/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/183bdabe-e22b-4a64-b065-e098c393cb4a.png
https://d34iuop8pidsy8.cloudfront.net/dac783ea-089b-44cb-b16c-acbf525e54d9.png
Threat Actors: Razvedos
Victim Country: Ireland
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data sale of Bank Mandiri
Category: Data Breach
Content: The threat actor leaked data from Bank Mandiri Indonesia exposed a CSV database containing approximately 18,118 records. The leaked data reportedly includes customer-related information such as full names, email addresses, phone numbers, account or user classifications, bank identifiers, and transactions.
Date: 2026-01-05T19:41:18Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-www-bankmandiri-co-id
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/615e9819-a2ca-44a5-b892-c10cebdc09a6.png
Threat Actors: Hoover
Victim Country: Indonesia
Victim Industry: Financial Services
Victim Organization: bank mandiri
Victim Site: bankmandiri.co.id - Alleged sale of data from AirdropAlert b.v
Category: Data Breach
Content: The threat actor claims to have leaked data from AirdropAlert b.v . which includes user account details such as usernames, email addresses, wallet-related identifiers, IP addresses, and activity or subscription records linked to cryptocurrency airdrop participation.
Date: 2026-01-05T19:30:48Z
Network: openweb
Published URL: https://breachforums.bf/Thread-Airdropalert-com
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a83cd938-2099-4076-9ef6-6d2b04cbfd63.png
Threat Actors: Hoover
Victim Country: Netherlands
Victim Industry: Marketing, Advertising & Sales
Victim Organization: airdropalert b.v
Victim Site: airdropalert.com - Alleged leak of card data from an unidentified bank in Israel
Category: Data Breach
Content: The group claims to have leaked holder names, bank names, SSN-equivalent identifiers, dates of birth, full residential details such as address, city, state, ZIP code, country, email addresses and phone numbers, along with payment card data including card class and type, card numbers, CVV and expiration details
Date: 2026-01-05T18:58:09Z
Network: telegram
Published URL: https://t.me/AssasinCode/62
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/918c7d5e-60b0-46d9-b03c-e9bc1379ed42.jpg
Threat Actors: AssasinCode
Victim Country: Israel
Victim Industry: Banking & Mortgage
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Arleigh Burke-class DDG 52-78
Category: Data Breach
Content: Threat Actor claims to have leaked documents allegedly associated with the U.S. Navy’s Arleigh Burke-class guided-missile destroyers (DDG-52 to DDG-78), including torpedo blueprints.
Date: 2026-01-05T18:43:11Z
Network: openweb
Published URL: https://fuckforums.lol/showthread.php?tid=80
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/53866d06-7bcf-4915-8bb9-8a5abb56f9b4.png
https://d34iuop8pidsy8.cloudfront.net/287bcd43-19e6-41d4-ab59-8125e2877738.png
Threat Actors: jrintel
Victim Country: USA
Victim Industry: Defense & Space
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Thailand citizen ID cards
Category: Data Breach
Content: The group claims to have leaked ID card information belonging to Thailand citizens, including full name, address, phone number, ID card number, gender, and date of birth.
NB: Authenticity of the claim is yet to be verified.
Date: 2026-01-05T18:31:12Z
Network: telegram
Published URL: https://t.me/ntsec4real/71
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e2d9c829-17c3-416d-8443-dfb683a3d0cd.png
Threat Actors: NTSEC
Victim Country: Thailand
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown
- HellR00ters Team targets the website of Militar Plus
Category: Defacement
Content: The group claims to have defaced the website of Militar Plus
Date: 2026-01-05T18:05:37Z
Network: telegram
Published URL: https://t.me/c/2758066065/778
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/acfbeb42-cc47-4f83-bd66-1a56aa05b102.png
Threat Actors: HellR00ters Team
Victim Country: Spain
Victim Industry: Information Services
Victim Organization: militar plus
Victim Site: militarplus.com - Alleged data breach of Lidl
Category: Data Breach
Content: A threat actor claims to be selling a small set of Lidl customer accounts. which include login credentials or associated email addresses.
Date: 2026-01-05T17:56:50Z
Network: openweb
Published URL: https://breachforums.bf/Thread-x149-Lidl-accounts
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c0dd313e-c9a4-4050-bbb4-f6d6c0fc8f59.png
Threat Actors: kzkz
Victim Country: France
Victim Industry: Retail Industry
Victim Organization: lidl
Victim Site: lidl.fr - Alleged Sale of Unauthorized Shell and Admin Access to an Online PrestaShop Store in France
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized shell access and admin access to an online prestashop store in France, which includes full administrative control and server-level shell access.
Date: 2026-01-05T17:53:20Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273187/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/65666e0c-f9a5-4394-9e86-6c9a0e4a002e.png
Threat Actors: cobenotow
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Fédération Française de Handball
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly from the Fédération Française de Handball. The leaked data include national identity cards, photographs, signed documents, and birth certificates.
Date: 2026-01-05T17:50:06Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-FR-FFHANDBALL-CNI-PICTURE
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/dcbeb6b5-b18b-4d7a-a30b-6dd9f2fd21c5.png
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Sports
Victim Organization: fédération française de handball
Victim Site: ffhandball.fr - CEIVA Logic falls victim to CHAOS ransomware
Category: Ransomware
Content: Group claims to have obtained 1000 GB of organization’s data.
Date: 2026-01-05T17:50:03Z
Network: tor
Published URL: http://hptqq2o2qjva7lcaaq67w36jihzivkaitkexorauw7b2yul2z6zozpqd.onion/jw9jezQtUmi035C1bsqfW5xjC1i29MMW/ceiva-logic
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0e1828f3-872a-4b7f-a5da-3fa334e06b7b.png
Threat Actors: CHAOS
Victim Country: USA
Victim Industry: Electrical & Electronic Manufacturing
Victim Organization: ceiva logic
Victim Site: ceiva.com - Alleged Sale of Unauthorized Admin and Shell Access to an Unidentified WordPress Shop in Greece
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized admin access and shell access to an unidentified WordPress shop in Greece.
Date: 2026-01-05T17:48:45Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273195/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d9795a1b-4116-4987-ab7d-d3e5e041ffaf.png
Threat Actors: Shopify
Victim Country: Greece
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Purcell | Everett Architects falls victim to Akira Ransomware
Category: Ransomware
Content: The group claims to have obtained 30 GB of organisation’s data, the compromised information includes employee information, project files, financials, contracts and agreements, customers information and so on.
Date: 2026-01-05T17:36:42Z
Network: tor
Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/1899d3ea-4224-4d6b-b24d-de02d2b3bcda.png
Threat Actors: akira
Victim Country: USA
Victim Industry: Architecture & Planning
Victim Organization: purcell | everett architects
Victim Site: purcelleverett.com - Alleged data breach of Fédération Française de Cyclisme (FFC)
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly from the Fédération Française de Cyclisme (FFC). The leaked data include highly sensitive personal and identity documents such as national identity cards, photographs, signed documents, birth certificates, and related records.
Date: 2026-01-05T17:33:19Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-FR-FFC-CNI-PICTURE
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/951eefa2-ec71-4870-81cf-a8b9ab4e9dc2.png
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Sports
Victim Organization: fédération française de cyclisme (ffc)
Victim Site: ffc.fr - Gebrüder Bagusat GmbH & Co. KG falls victim to Akira Ransomware
Category: Ransomware
Content: The group claims to have obtained 20 GB of organisation’s data, the compromised information includes Project fiLes, financials, contracts and agreements, customers and partners information and so on.
Date: 2026-01-05T17:18:06Z
Network: tor
Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/df3abe24-1c11-491b-86b0-c375da1a6102.png
Threat Actors: akira
Victim Country: Germany
Victim Industry: Food & Beverages
Victim Organization: gebrüder bagusat gmbh & co. kg
Victim Site: bagusat.com - Regis Resources falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:59:22Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd5a39c439c5f45678a51
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a0e2a985-4513-48ca-b26e-f9804c6faa2d.png
https://d34iuop8pidsy8.cloudfront.net/80340982-211c-4f61-a4bd-6f0efbf81d7b.png
Threat Actors: LYNX
Victim Country: Australia
Victim Industry: Mining/Metals
Victim Organization: regis resources
Victim Site: mcphillamysgold.com - Ville de Dunkerque falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:50:31Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd8959c439c5f4567b5ec
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3824e57c-95f8-4dbc-a5d7-fe2f015a03ef.png
Threat Actors: LYNX
Victim Country: France
Victim Industry: Government Administration
Victim Organization: ville de dunkerque
Victim Site: ville-dunkerque.fr - St Joseph’s College Echuca falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:43:23Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd7b69c439c5f4567a8a1
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ebe7b696-e070-45a5-a072-fdf755f964d8.png
Threat Actors: LYNX
Victim Country: Australia
Victim Industry: Education
Victim Organization: st joseph’s college echuca
Victim Site: sje.vic.edu.au - GRANOS Y CEREALES DE COLOMBIA S.A falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:39:10Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd8109c439c5f4567acee
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4a69d244-ae56-4456-928b-c37b5d42a5cf.png
Threat Actors: LYNX
Victim Country: Colombia
Victim Industry: Food & Beverages
Victim Organization: granos y cereales de colombia s.a
Victim Site: granosycereales.com.co - Alleged data breach of DCECONSEIL
Category: Data Breach
Content: A threat actor claims to be selling approximately 844 GB of internal data allegedly obtained from dceconseil. The exposed data consists primarily of project and client-related files organized by orders rather than individual clients.
Date: 2026-01-05T16:38:35Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-dceconseil-fr-844GB-Hermes-Dalkia-Sodexo-Lidl-files
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b1035e43-80dc-48ea-acde-a2941326f3ee.png
Threat Actors: Angel_Batista
Victim Country: France
Victim Industry: Professional Services
Victim Organization: dceconseil
Victim Site: dceconseil.fr - Tecno Electric Paraguay falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:35:07Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd7549c439c5f4567a485
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/4003384c-1ba6-4dd8-829e-a7cb513c590e.png
Threat Actors: LYNX
Victim Country: Paraguay
Victim Industry: Electrical & Electronic Manufacturing
Victim Organization: tecno electric paraguay
Victim Site: tecnoelectric.com.py - Burdette Dental Lab, Inc., CDL falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:20:44Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd6b49c439c5f45679c71
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9658230e-9cb6-40a6-9d19-e8433ea0dde3.png
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Health & Fitness
Victim Organization: burdette dental lab, inc., cdl
Victim Site: burdettedental.com - Marine Systems Corporation falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T16:13:01Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd6209c439c5f45679273
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/519af51e-61b0-489c-bc76-bab3307c3d83.png
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Maritime
Victim Organization: marine systems corporation
Victim Site: mscorp.net - Crawford Orthodontics falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T15:58:57Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd4159c439c5f456773fd
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/24d1dee3-a54e-4437-8558-55355233cca2.png
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Hospital & Health Care
Victim Organization: crawford orthodontics
Victim Site: crawfordorthodontics.net - St. Charles Preparatory School falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T15:58:22Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd4bf9c439c5f45677f44
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bc2ef97a-b2cb-4393-a7d5-22642b6ce75c.png
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Education
Victim Organization: st. charles preparatory school
Victim Site: stcharlesprep.org - Black Dog Salvage falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T15:44:42Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695bd3719c439c5f45676c45
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/9cfea1fe-2034-4531-ac89-bfec6adcae71.png
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Retail Industry
Victim Organization: black dog salvage
Victim Site: blackdogsalvage.com - Alleged data breach of Learnable
Category: Data Breach
Content: The threat actor claims to have leaked dataset containing approximately 187,040 Learnable.com user credentials, consisting of email and password combinations
Date: 2026-01-05T15:32:14Z
Network: openweb
Published URL: https://xss.pro/threads/145190/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d9caf90e-84cd-41df-8b3a-80784cde6d46.png
Threat Actors: moonshine
Victim Country: Australia
Victim Industry: Information Technology (IT) Services
Victim Organization: learnable
Victim Site: learnable.com - Alleged admin access to University of Connecticut’s Emergency Alert System
Category: Initial Access
Content: The group claims to have gained unauthorized admin access to University of Connecticut’s Emergency Alert System
Date: 2026-01-05T15:06:16Z
Network: telegram
Published URL: https://t.me/SIapanamaLU/649
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/00f2f9da-16d7-4f7e-8be2-db7ad653d58b.jpg
Threat Actors: ZenXPloit
Victim Country: USA
Victim Industry: Higher Education/Acadamia
Victim Organization: university of connecticut
Victim Site: alert.uconn.edu/admin/login - Lewis Bear Company falls victim to Akira Ransomware
Category: Ransomware
Content: The group claims to have obtained the organisation’s data, the compromised information includes Employee scanned documents, HR files, projects and more.
Date: 2026-01-05T14:49:32Z
Network: tor
Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d2d45689-cceb-4132-92a9-7363b615d312.JPG
Threat Actors: akira
Victim Country: USA
Victim Industry: Food & Beverages
Victim Organization: lewis bear company
Victim Site: lewisbearcompany.com - KSL Ingenieure AG falls victim to Akira Ransomware
Category: Ransomware
Content: The group claims to have obtained 17 GBof organization’s data, the compromised information includes Confidential project files, employee scanned documents (DLs, passports and other files), HR files, projects, agreements, detailed financial, customers and partners information and so on.
Date: 2026-01-05T14:45:39Z
Network: tor
Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0662deb1-6c18-4820-8c52-6ad176f7a424.png
Threat Actors: akira
Victim Country: Switzerland
Victim Industry: Architecture & Planning
Victim Organization: ksl ingenieure ag
Victim Site: ksl-ing.ch - Posillico Inc. falls victim to Akira Ransomware
Category: Ransomware
Content: The group claims to have obtained 1 TB of organization’s data, the compromised information includes SQL databases containing employee personal data, project details, contracts and agreements, financial records, and insurance-related documents.
Date: 2026-01-05T14:25:07Z
Network: tor
Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/22d4b20a-abc8-4396-9856-92618a8c347b.jpeg
Threat Actors: akira
Victim Country: USA
Victim Industry: Building and construction
Victim Organization: posillico inc.
Victim Site: posillicoinc.com - Alleged leak of login credentials of Ministry of Education, Youth and Sports
Category: Data Breach
Content: The group claims to have leaked login credentials of Ministry of Education, Youth and Sports.
Date: 2026-01-05T14:12:38Z
Network: telegram
Published URL: https://t.me/thsecthailand/178
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fc205c74-ceec-4515-a273-247d40bd0ecc.png
https://d34iuop8pidsy8.cloudfront.net/94046523-4ab3-4a6e-a550-cdb2f36b4c49.png
Threat Actors: THSEC
Victim Country: Cambodia
Victim Industry: Government Administration
Victim Organization: ministry of education, youth and sports
Victim Site: sis.moeys.gov.kh - Alleged data breach of French Cycling Federation
Category: Data Breach
Content: The threat actor claims to have breached 800.000 lines of data of French Cycling Federation, Allegedly including Files ID, Surname, First name, Date_of_birth, Gender, Email, Address, Additional_address, Postcode, Town, Country and more
Date: 2026-01-05T14:03:47Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-FR-FFC-CNI-PICTURE
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f2cb8fc9-8337-49bb-bc28-92497a35bd35.JPG
https://d34iuop8pidsy8.cloudfront.net/eb81e09d-0aaa-4a6d-960c-7fd06eb8403d.JPG
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Sports
Victim Organization: french cycling federation
Victim Site: ffc.fr - Alleged Unauthorized Access to DHIS2 Systems
Category: Initial Access
Content: The group claims to have accessed DHIS2 digital health systems used by multiple countries. These platforms reportedly contain sensitive national health information, including disease surveillance data, vaccination records, and maternal health statistics.
NB : The group previously attacked other countries in December 30 2025
Date: 2026-01-05T13:57:27Z
Network: telegram
Published URL: https://t.me/c/2588114907/711
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cf9fc62a-7eec-48f0-a422-89a3b25b9b1c.jpg
Threat Actors: Keymous Plus
Victim Country: Mozambique
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown
- Alleged Unauthorized Access to the Webareal
Category: Initial Access
Content: The group claims to have accessed the administrative and server infrastructure of the webareal.sk e-commerce and website-builder platform, reportedly obtaining control over the admin dashboard and live production environment.
Date: 2026-01-05T13:50:18Z
Network: telegram
Published URL: https://t.me/neffex_the_blackhat/70
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d0a6aac5-e674-47a6-a570-39f43c12a24d.png
https://d34iuop8pidsy8.cloudfront.net/5d63fcf2-173c-4dfa-ba0a-d9cce0b8c5a6.png
Threat Actors: Neffex THe BlackHat
Victim Country: Czech Republic
Victim Industry: Software Development
Victim Organization: webareal
Victim Site: webareal.sk - FastAttacker targets the website of Arian Novin
Category: Ransomware
Content: Proof of downtime: https://check-host.net/check-report/36465aa4k604
Date: 2026-01-05T13:42:14Z
Network: telegram
Published URL: https://t.me/FastAttackerOrg/29?single
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8b9d0733-3ae9-41a8-bb63-aec1fb024ac5.png
https://d34iuop8pidsy8.cloudfront.net/c84b8e6d-a906-49a4-96c9-4c009791e493.png
Threat Actors: FastAttacker
Victim Country: Iran
Victim Industry: Software Development
Victim Organization: arian novin
Victim Site: arian.co.ir - Alleged data sale of FFHandball
Category: Data Breach
Content: The threat actor claims to be selling 5 million records from FFHandball, allegedly containing names, contact details, addresses, national identity cards, and other sensitive information.
Date: 2026-01-05T13:41:32Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-FR-FFHANDBALL-CNI-PICTURE
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5453e097-943d-46ac-b668-7581d71fd8b7.png
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Sports
Victim Organization: ffhandball
Victim Site: ffhandball.fr - Triad Packaging, Inc. falls victim to Nova Ransomware
Category: Ransomware
Content: The group claims to have obtained 102 GB of the organization’s data. The compromised data reportedly includes internal documents, financial records, and customer information, and the group intends to publish the data within one day.
Date: 2026-01-05T13:07:20Z
Network: tor
Published URL: http://sicarilxx2br6esqnhad4w26bcgb5j2snbbnhyo4b6t7kby2oy4x3jad.onion/blog.php
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/47c917a3-a177-4393-aede-d47077cf78f7.jpg
Threat Actors: The Sicari Knife
Victim Country: USA
Victim Industry: Manufacturing
Victim Organization: triad packaging, inc.
Victim Site: triadpack.com - Alleged data breach of Ministère de l’Agriculture et de la Souveraineté alimentaire
Category: Data Breach
Content: The group claims to have breached 3.4 Thousand files of data of Ministry of Agriculture and Food Sovereignty .
Note: it was previously breached by the threat actor ‘LAPSUS$ GROUP.’ on Dec 29 2025
Date: 2026-01-05T12:41:25Z
Network: openweb
Published URL: https://breachforums.bf/Thread-FR-FTP-agri-gouv-fr-3-4K-Files
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/85918fb1-15c0-4017-9796-bcf0e3fe8838.JPG
https://d34iuop8pidsy8.cloudfront.net/62dcae94-e857-49c4-b277-6f222a2d010b.JPG
Threat Actors: HexDex2
Victim Country: France
Victim Industry: Government Administration
Victim Organization: ministry of agriculture and food sovereignty
Victim Site: agriculture.gouv.fr
- Alleged unauthorized access to host21.server.ae
Category: Initial Access
Content: Threat actor claims to have leaked unauthorized Cpanel access to host21.server.ae.
Date: 2026-01-05T12:40:03Z
Network: openweb
Published URL: https://xforums.st/threads/host21-server-ae-cpanel-login.458925/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a968a225-9468-4a72-a864-98b2ac10d090.png
Threat Actors: X Forum Bot
Victim Country: UAE
Victim Industry: Unknown
Victim Organization: host21.server.ae
Victim Site: host21.server.ae - Pinoy XploitSec targets the website of Provat Corporate Services
Category: Defacement
Content: The group claims to have defaced the website of Provat Corporate Services.
Date: 2026-01-05T12:38:35Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223741
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c7a76f5e-110c-470b-8163-837b4aa9099a.png
Threat Actors: Pinoy XploitSec
Victim Country: UAE
Victim Industry: Financial Services
Victim Organization: provat corporate services
Victim Site: provatcorporates.ae - Alleged unauthorized admin access to Future Empire
Category: Initial Access
Content: Threat actor claims to have leaked the WordPress admin access to Future Empire.
Date: 2026-01-05T12:33:52Z
Network: openweb
Published URL: https://xforums.st/threads/www-futureempire-ae-admin-wp-login.459143/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3e64e809-435e-4823-9147-0dd8443c00ea.png
Threat Actors: X Forum Bot
Victim Country: UAE
Victim Industry: Real Estate
Victim Organization: future empire
Victim Site: futureempire.ae - 0xteam targets the website of Avance
Category: Defacement
Content: Group claims to have defaced the website of Avance.
Date: 2026-01-05T12:24:23Z
Network: openweb
Published URL: https://defacer.id/mirror/id/223665
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f1ff7043-8b18-4719-a1a3-dc99dead807a.png
Threat Actors: 0xteam
Victim Country: UAE
Victim Industry: Automotive
Victim Organization: avance
Victim Site: avance.ae - Alleged unauthorized access to JEONNAM TECHNOPARK
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to an industrial control and monitoring system operated by Jeonnam Techno Park in South Korea, allowing real-time monitoring and management of factory production equipment. The access reportedly enabled control over operational modules, visibility into machine status, productivity data, fault logs, and production reports, as well as the ability to modify network settings and manage equipment operations.
Date: 2026-01-05T12:16:23Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3150
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8a7c80e5-1e96-47fc-a6ba-f582da41e74f.jpg
https://d34iuop8pidsy8.cloudfront.net/ebe31509-d14d-47e2-8b50-c99dad226aea.jpg
https://d34iuop8pidsy8.cloudfront.net/a4e554ff-a770-4afa-bc6b-cf507a354e5b.jpg
https://d34iuop8pidsy8.cloudfront.net/b6fdfee1-8ae1-4543-bc93-5f3b4e27623e.jpg
Threat Actors: Infrastructure Destruction Squad
Victim Country: South Korea
Victim Industry: Research Industry
Victim Organization: jeonnam technopark
Victim Site: jntp.or.kr - Alleged leak of login access to South Korean girl’s system
Category: Initial Access
Content: The group claims to have gained login access to South Korean girl’s system
Date: 2026-01-05T12:07:01Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3160
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/123c686e-73d0-47ea-a0df-33aec012e14b.JPG
Threat Actors: Infrastructure Destruction Squad
Victim Country: South Korea
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Unauthorized Access to the industrial boiler and screw feeder control system
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to the industrial boiler and screw feeder control system operated by MPAC Automation & Controls, demonstrating full visibility and control over operational parameters such as temperature, pressure, fuel supply, feed rates, scheduling, startup/shutdown functions, alarms, and emergency controls used in industrial environments in the United Kingdom.
Date: 2026-01-05T11:39:40Z
Network: telegram
Published URL: https://t.me/c/2787466017/1468
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e2d932ad-1a9c-44c1-9d91-406d9c09d3ef.png
Threat Actors: NoName057(16)
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Saplog Logistic and Transport falls victim to Nova Ransomware
Category: Ransomware
Content: The group claims to have obtained 700 GB of the organization’s data and intends to publish them within 15-16 days.
Date: 2026-01-05T11:20:45Z
Network: tor
Published URL: http://novadmrkp4vbk2padk5t6pbxolndceuc7hrcq4mjaoyed6nxsqiuzyyd.onion/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a1050d6b-dc46-46fb-b648-97783148c7b0.jpg
Threat Actors: Nova
Victim Country: Italy
Victim Industry: Transportation & Logistics
Victim Organization: saplog logistic and transport
Victim Site: saplog.eu - Alleged unauthorized access to Aeris Technologies
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to the control and monitoring system of high-precision gas analysis equipment from Aeris Technologies, Inc, demonstrating real-time gas concentration readings, spectral analysis data, calibration controls, system parameters, and full configuration capabilities, including firmware updates and hardware control.
Date: 2026-01-05T10:54:22Z
Network: telegram
Published URL: https://t.me/zpentestalliance/918
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f74ed95a-16bb-4951-bb5a-0c702fdc24e1.png
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: USA
Victim Industry: Manufacturing
Victim Organization: aeris technologies
Victim Site: aerissensors.com - Alleged data breach of Basij Construction Organization
Category: Data Breach
Content: The group claims to have gained unauthorized access to the internal systems of the Basij Construction Organization. According to the attackers, the operation exposed structural weaknesses and significant cybersecurity vulnerabilities within government-linked digital networks and was intended as a warning, with further details to be released soon.
NB: The authenticity of the claim is yet to be verified.
Date: 2026-01-05T10:50:37Z
Network: telegram
Published URL: https://t.me/H3xV0id_Official/454
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c7c5b0c2-3357-427f-80f6-b3180fff8b86.png
https://d34iuop8pidsy8.cloudfront.net/b77faffa-8d96-457d-817d-7f30ee2637cf.png
Threat Actors: H3xV0id
Victim Country: Iran
Victim Industry: Government Administration
Victim Organization: basij construction organization
Victim Site: Unknown
- Alleged data breach of Council for the Development of Cambodia
Category: Data Breach
Content: The group claims to have defaced and breached data of Council for the Development of Cambodia
Date: 2026-01-05T10:25:35Z
Network: telegram
Published URL: https://t.me/BlackEyeThai/79
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b743a70e-a445-4aeb-a8e6-24809ce78176.JPG
Threat Actors: BlackEye-Thai
Victim Country: Cambodia
Victim Industry: Government Administration
Victim Organization: council for the development of cambodia
Victim Site: oda.cdc.gov.kh - Alleged leak of Malaysian citizen’s id card data
Category: Data Breach
Content: The group claims to have leaked a database allegedly containing personal information of individuals in Malaysia , including names, email addresses, and phone numbers.
Date: 2026-01-05T10:07:22Z
Network: telegram
Published URL: https://t.me/bjorkaspirit/228
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/dd5b0773-8742-45af-81e9-b8076b7bac12.jpg
https://d34iuop8pidsy8.cloudfront.net/4db5bc56-8658-4dcf-94d6-f1520955e2f9.jpg
Threat Actors: Bjorkanism
Victim Country: Malaysia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of PayPal accounts
Category: Data Breach
Content: The group claims to have leaked data from PayPal.
Date: 2026-01-05T10:02:32Z
Network: telegram
Published URL: https://t.me/c/2932498194/274
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6149de3b-3a6f-4386-a777-54c2a123c50f.png
Threat Actors: V FOR VENDETTA CYBER TEAM
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: paypal
Victim Site: paypal.com - South West Development Commission falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:58:49Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b84049c439c5f456277f7
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5f31b943-4ead-4469-add0-b8b64b0d63d5.jpg
Threat Actors: LYNX
Victim Country: Australia
Victim Industry: Government Administration
Victim Organization: south west development commission
Victim Site: swdc.wa.gov.au - Laurysen Kitchens Ltd. falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:49:00Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b84969c439c5f4562824c
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f31c8d64-42d3-4825-9a67-2dece7469e35.JPG
Threat Actors: LYNX
Victim Country: Canada
Victim Industry: Design
Victim Organization: laurysen kitchens ltd.
Victim Site: laurysenkitchens.com - Salcom (Sea Air & Land Communications Ltd) falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:40:05Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b82d19c439c5f45626089
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e0442ff3-507e-42a1-b6a9-10329ab2a5c9.jpg
Threat Actors: LYNX
Victim Country: New Zealand
Victim Industry: Electrical & Electronic Manufacturing
Victim Organization: salcom (sea air & land communications ltd)
Victim Site: salcom.com - Kidd’s Restoration and Cleaning Services falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:37:11Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b78139c439c5f4561ad1a
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d524e66b-7e9c-4a5c-9dd2-6fe014efed2b.png
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Consumer Services
Victim Organization: kidd’s restoration and cleaning services
Victim Site: kiddsservices.com - Hartford falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:32:31Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b79289c439c5f4561be6c
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/83aa5170-6767-4688-81a4-7e5b85649c4d.jpg
Threat Actors: LYNX
Victim Country: France
Victim Industry: Business Supplies & Equipment
Victim Organization: hartford
Victim Site: hartford.fr - WILD BUNCH falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained the organisations data.
Date: 2026-01-05T09:30:40Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b77869c439c5f4561a0b8
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e0f03fd3-2e93-49aa-aebe-69a1b5f776c0.JPG
Threat Actors: LYNX
Victim Country: France
Victim Industry: Motion Pictures & Film
Victim Organization: wild bunch
Victim Site: wildbunchdistribution.com - Braemac falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:27:22Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b76dd9c439c5f4561984d
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0b04a86a-6cc8-4a7f-b43a-111dab0a0352.jpg
Threat Actors: LYNX
Victim Country: Australia
Victim Industry: Electrical & Electronic Manufacturing
Victim Organization: braemac
Victim Site: braemac.com - City of Milton Florida falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:26:19Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b764f9c439c5f45618e49
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bfc6f5d9-70da-4634-89e4-9427057ce493.jpg
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Government Administration
Victim Organization: city of milton florida
Victim Site: miltonfl.org - Groupecho Canada Inc. falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T09:22:03Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b79b19c439c5f4561c99b
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/98b614f7-28dc-4a70-bfdf-86a3b8534ad9.jpg
Threat Actors: LYNX
Victim Country: Canada
Victim Industry: Financial Services
Victim Organization: groupecho canada inc.
Victim Site: groupecho.com - Alleged unauthorized access to Jeonnam Technopark
Category: Initial Access
Content: The group claims to have gained access to Jeonnam Technopark.
Date: 2026-01-05T08:55:38Z
Network: telegram
Published URL: https://t.me/n2LP_wVf79c2YzM0/3147
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6770d616-59e0-466d-84cd-e176d06670d5.png
Threat Actors: Infrastructure Destruction Squad
Victim Country: South Korea
Victim Industry: Business and Economic Development
Victim Organization: jeonnam technopark
Victim Site: jntp.or.kr - FastAttacker claims to target Iran
Category: Alert
Content: A recent post by the group indicates that they are targeting Iran.
Date: 2026-01-05T08:48:16Z
Network: telegram
Published URL: https://t.me/FastAttackerOrg/28
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d24bc5a2-c979-4a98-bb94-413dfcab6fac.jpg
Threat Actors: FastAttacker
Victim Country: Iran
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Wesley Heating & Cooling falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 30 GB of the organization’s data. The compromised data reportedly includes financial data, contracts, and customer data, and the group intends to publish the data within 9–10 days.
Date: 2026-01-05T08:46:37Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b68cb6387a4c9a2d37cb1
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/16098b20-073e-4691-b24a-5c39e2c21a33.jpg
https://d34iuop8pidsy8.cloudfront.net/0ee8a025-f523-43c7-9968-317d8452ac28.jpg
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Mechanical or Industrial Engineering
Victim Organization: wesley heating & cooling
Victim Site: wesleyheating.com - Alleged data breach of Koinly
Category: Data Breach
Content: The threat actor claims to have breached 60 million lines of Koinly.
NB: The authenticity of the claim is yet to be verified.
Date: 2026-01-05T08:45:53Z
Network: openweb
Published URL: https://breachstars.io/topic/35-mil-koinlyio-lines-database-jjpcgnh17drv
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/78280920-fbd4-489e-a67b-18fd88a88f71.JPG
Threat Actors: goodnight
Victim Country: UK
Victim Industry: Information Technology (IT) Services
Victim Organization: koinly
Victim Site: koinly.io
- Windward Life Care falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 25 GB of the organization’s data. The compromised data reportedly includes customer data, incident records, and contracts, and the group intends to publish the data within 9–10 days.
Date: 2026-01-05T08:40:40Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b67fa6387a4c9a2d37735
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/01de3003-965b-4766-9530-2715b20be9e2.jpg
https://d34iuop8pidsy8.cloudfront.net/3f1e5fd5-e62c-4a86-ad58-032a28bbec59.jpg
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Individual & Family Services
Victim Organization: windward life care
Victim Site: windwardlifecare.com - Madison Area YMCA Association falls victim to LYNX Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T08:34:27Z
Network: tor
Published URL: http://lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd.onion/leaks/695b61e49c439c5f456034c8
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0f6b2863-97b4-4126-96c3-9634873f3d18.jpg
Threat Actors: LYNX
Victim Country: USA
Victim Industry: Non-profit & Social Organizations
Victim Organization: madison area ymca association
Victim Site: madisonareaymca.org - Alleged leak of panama citizen’s data
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly containing personal information of over 30,000 individuals in Panama, including names, email addresses, and phone numbers.
Date: 2026-01-05T08:27:00Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-DB-30000-Panama-people-Name-email-Phone
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7972f8f6-0494-4727-8dea-99b265995e36.png
Threat Actors: Hoover
Victim Country: Panama
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - M&M Auto Parts falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 15 GB of data of the organisations data, The exposed data allegedly include Financial data, Contracts, Incidents, and the group intends to publish the data within 9 days.
Date: 2026-01-05T08:09:06Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b69af6387a4c9a2d3887e
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/09a767e2-8db9-4082-aab2-c4c32c26057a.JPG
https://d34iuop8pidsy8.cloudfront.net/3cd98b3d-001f-4033-ae5b-61f383ace6ac.JPG
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Automotive
Victim Organization: m&m auto parts
Victim Site: mmauto.com - Alleged data sale of Sirena-Travel GmbH
Category: Data Breach
Content: The threat actor claims to be selling data from Sirena-Travel GmbH, allegedly covering records from 2012 to 2023, including airline booking and ticketing data with passenger personal and travel details related to Russia.
Date: 2026-01-05T08:08:11Z
Network: openweb
Published URL: https://darkforums.io/Thread-Sirena-Travel-2023-Russia
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/952fdaf7-9247-435b-892f-b17c60a60f9b.png
Threat Actors: Flexx
Victim Country: Russia
Victim Industry: Airlines & Aviation
Victim Organization: sirena-travel gmbh
Victim Site: sirena-travel.com - American Health falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 50 GB of the organisations data, The exposed data allegedly include Customer’s data, Incidents, and the group intends to publish the data within 9 days.
Date: 2026-01-05T07:58:48Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b597f6387a4c9a2d30177
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/951ae348-fd92-4fae-bc25-ca86a4fa2146.JPG
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Hospital & Health Care
Victim Organization: american health
Victim Site: ah-group.us - Alleged leak of Russian border service data
Category: Data Breach
Content: The threat actor claims to be selling a database allegedly containing Russian border crossing seat sales data from 2014 to 2023, including yearly totals and unique records, with a sample of 500,000 lines available for testing.
Date: 2026-01-05T07:57:50Z
Network: openweb
Published URL: https://darkforums.io/Thread-DATABASE-Border-crossings-in-Russia-2014-2023
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3e9bb3ba-6a1e-4e15-88a5-bfc4ee90da6a.png
Threat Actors: Flexx
Victim Country: Russia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Harris Consulting Engineers LLC falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 50 GB of organization data and intend to publish within 9 – 10 days.
Date: 2026-01-05T07:54:08Z
Network: tor
Published URL: http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/695b5aa36387a4c9a2d308cc
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c9fe5ce4-30d7-4414-9e07-06479f022f1b.png
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Mechanical or Industrial Engineering
Victim Organization: harris consulting engineers llc
Victim Site: harrisengineers.com - NLFX Professional falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T07:53:45Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b53a66387a4c9a2d2d327
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6d01c51b-7753-480c-9a7f-ab717e544f75.jpg
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Events Services
Victim Organization: nlfx professional
Victim Site: nlfxpro.com - SVA and Mobile Technology of Spain, SL falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 50 GB of the organization’s data. The compromised data reportedly includes financial data and customer data, and the group intends to publish the data within 3–4 days.
Date: 2026-01-05T07:53:41Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b572d6387a4c9a2d2f4a2
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3af772bb-632a-472a-a5f9-4a72f372c7d8.jpg
Threat Actors: Sinobi
Victim Country: Spain
Victim Industry: Broadcast Media
Victim Organization: sva and mobile technology of spain, sl
Victim Site: svaytecnosp.com - LAMPIRE Biological Laboratories, Inc. falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 100 GB of the organization’s data. The compromised data reportedly includes confidential information, financial data, and contracts, and the group intends to publish the data within 9–10 days.
Date: 2026-01-05T07:48:46Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b57e86387a4c9a2d2f7ec
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/46988c9c-68b8-4e1a-957a-018eb660f4ba.jpg
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Biotechnology
Victim Organization: lampire biological laboratories, inc.
Victim Site: lampire.com - Krenzer Marine falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 30 GB of organization’s data.
Date: 2026-01-05T07:46:09Z
Network: tor
Published URL: http://sinobi6ftrg27d6g4sjdt65malds6cfptlnjyw52rskakqjda6uvb7yd.onion/leaks/695b5ba56387a4c9a2d31013
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/af51b335-20a4-44be-a40b-be0b0c133e45.png
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Maritime
Victim Organization: krenzer marine
Victim Site: krenzermarine.com - Boathouse on the Bay falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T07:40:11Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b5e556387a4c9a2d324b9
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f2e730e9-ea14-4358-a81e-343db136dbdc.jpg
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Restaurants
Victim Organization: boathouse on the bay
Victim Site: boathouseonthebay.com - Pools by Bradley falls victim to Sinobi ransomware
Category: Ransomware
Content: The group claims to have obtained 50 GB of data of the organisations data, The exposed data allegedly include Contracts, Financial data, Customer’s data, They claim to publish it within 9 days.
Date: 2026-01-05T07:37:46Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/24580c6a-a8fb-4d54-b813-2c4f0b955eaf.JPG
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Building and construction
Victim Organization: pools by bradley
Victim Site: poolsbybradley.com - Lares Corporation falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 720GB of the organization data. The compromised data allegedly contains confidential data , Financial data, Contracts, Incidents and they intend to publish it within 11-12 days.
Date: 2026-01-05T07:34:17Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b5c596387a4c9a2d316f4
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/acd08e41-adab-41f9-bcd3-a129dabea97e.jpeg
https://d34iuop8pidsy8.cloudfront.net/00df90f0-ac13-43ea-b039-0631352fd16b.jpeg
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Automotive
Victim Organization: lares corporation
Victim Site: larescorp.com - Delko Développement falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained 15 GB of the organization’s data.
Date: 2026-01-05T07:30:32Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b55ce6387a4c9a2d2e7a3
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/ebd93c06-f318-4298-b58e-a15ec2c5f165.jpg
Threat Actors: Sinobi
Victim Country: France
Victim Industry: Automotive
Victim Organization: delko développement
Victim Site: delko.fr - GreenValley International falls victim to Sinobi Ransomware
Category: Ransomware
Content: The group claims to have obtained organization’s data.
Date: 2026-01-05T06:42:47Z
Network: tor
Published URL: http://sinobi6ywgmmvg2gj2yygkb2hxbimaxpqkyk27wti5zjwhfcldhackid.onion/leaks/695b53356387a4c9a2d2cf20
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/08c739a5-88e5-4048-86f3-5336a895c794.png
Threat Actors: Sinobi
Victim Country: USA
Victim Industry: Other Industry
Victim Organization: greenvalley international
Victim Site: greenvalleyintl.com - Alleged data breach of Shadow
Category: Data Breach
Content: The threat actor claims to be leaked data from Shadow. The compromised data reportedly includes first and last names, dates of birth, email addresses, phone numbers, physical addresses, cities, postal codes.
Note: Shadow was previously breached on Jun 2025
Date: 2026-01-05T06:29:21Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FR-French-Shadow-Tech-Database-shadow-tech
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3c2bf7c1-2994-487c-87fb-2e73aa95c745.png
Threat Actors: telaviv
Victim Country: France
Victim Industry: Software Development
Victim Organization: shadow
Victim Site: shadow.tech
- Alleged Data Breach of Ioburo
Category: Data Breach
Content: A threat actor claims to have breached and shared a customer database belonging to Ioburo.
Date: 2026-01-05T06:19:10Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FR-Ioburo-ioburo-fr
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/fce149ab-b96e-4558-8980-5029b73d0e8d.png
Threat Actors: telaviv
Victim Country: France
Victim Industry: Commercial Real Estate
Victim Organization: loburo
Victim Site: ioburo.fr - Alleged Data Breach of Elite Auto
Category: Data Breach
Content: A threat actor claims to have breached and shared a customer database belonging to Elite Auto, a France-based car sales and reselling company. The exposed data contains personal and vehicle-related information linked to individuals who interacted with or purchased vehicles from the company.
Date: 2026-01-05T06:05:00Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FR-Elite-Auto-elite-auto-fr
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/71e20823-e3df-4ba3-ba33-03d5c1049910.png
Threat Actors: telaviv
Victim Country: France
Victim Industry: Automotive
Victim Organization: elite auto
Victim Site: elite-auto.fr - Alleged sale of admin and shell access to unidentified stores in multiple countries
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to unidentified online stores in multiple countries.
Date: 2026-01-05T05:59:02Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273091/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c80a86fa-2daa-46f4-ad18-8fd265c81d9e.png
Threat Actors: Shopify
Victim Country: Unknown
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin and shell access to online store in USA
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in USA.
Date: 2026-01-05T05:58:37Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273092/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/92d654b1-c772-4097-8d2b-a76b0b5435ab.png
Threat Actors: Shopify
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Indonesia Internet Service Provider
Category: Data Breach
Content: A threat actor claims to have leaked a subscribers database associated with an Indonesia-based Internet Service Provider (ISP).The dataset include network device identifiers, firmware and chip details, service status indicators, and signal metrics related to customer connections.
Date: 2026-01-05T05:53:54Z
Network: openweb
Published URL: https://darkforums.io/Thread-Document-INDONESIA-INTERNET-SERVICE-PROVIDER-Subscribers-Database
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/34db841c-a20f-4bdb-b5e1-a930dab85813.png
Threat Actors: chillcapybara
Victim Country: Indonesia
Victim Industry: Network & Telecommunications
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin and shell access to unidentified store in Spain
Category: Vulnerability
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in Spain.
Date: 2026-01-05T05:49:35Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273094/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a4a128e0-2de7-4db7-8b5e-8a5bb5fff2d7.png
Threat Actors: Shopify
Victim Country: Spain
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin and shell access to unidentified store in Spain
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in Spain.
Date: 2026-01-05T05:44:46Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273095/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/5784e19a-8167-436a-b8fd-4c46ea7164c4.png
Threat Actors: Shopify
Victim Country: Spain
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of PanRest
Category: Data Breach
Content: The threat actor claims to have leaked data from PanRest. The compromised data reportedly includes first and last names, usernames, email addresses, phone numbers, physical and delivery addresses, IP addresses, user‑agent details, dates of birth, ordered products, payment methods, pricing information, and delivery‑person identity details
Date: 2026-01-05T05:36:51Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-Database-Panrest-pl-Poland
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/6b1b1485-d31b-4107-812e-31e57d126906.png
https://d34iuop8pidsy8.cloudfront.net/3a05b144-3611-43fb-b33f-31d7e6a2e13a.png
Threat Actors: daghetiaw
Victim Country: Poland
Victim Industry: E-commerce & Online Stores
Victim Organization: panrest
Victim Site: panrest.pl - Alleged sale of admin and shell access to unidentified store in USA
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to unidentified online store in USA.
Date: 2026-01-05T05:27:58Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273096/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/db920b4b-9884-47e9-b9e4-734acbb19e6c.png
Threat Actors: Shopify
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin and shell access to unidentified store in Slovakia
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in Slovakia.
Date: 2026-01-05T05:24:39Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273097/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cd49d248-f666-48d6-aa8d-8ced8e5c2cc6.png
Threat Actors: Shopify
Victim Country: Slovakia
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of lshq.ca
Category: Data Breach
Content: A threat actor claims to have leaked a user database belonging to lshq.ca, a Canada-based platform. The dataset includes hashed passwords, email addresses, usernames, IP addresses, OAuth details, geolocation data, and internal application logs.
Date: 2026-01-05T05:20:42Z
Network: openweb
Published URL: https://darkforums.io/Thread-42k-Canada-lshq-ca-User-DB-Emails-Hashed-Passwords-Names-Usernames-IP-Addresses
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c29fc866-eacf-466c-83f0-5fa2df954272.png
Threat Actors: gtaviispeak
Victim Country: Canada
Victim Industry: Gaming
Victim Organization: ishq
Victim Site: ishaq.ca - Alleged sale of admin and shell access to unidentified store in USA
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in USA.
Date: 2026-01-05T05:14:15Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273098/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a5c14408-8a14-4961-80f0-8f1a3b409e3d.png
Threat Actors: Shopify
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin and shell access to unidentified store in Malta
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in Malta.
Date: 2026-01-05T05:09:54Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273101/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/730ba2a3-6779-4485-a539-55f5347698e2.png
Threat Actors: Shopify
Victim Country: Malta
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of Minecraft Stealer RAT Logs
Category: Data Breach
Content: The threat actor claims to have released database logs collected by a popular Minecraft stealer RAT. The leaked data includes over 6,000 Minecraft session records along with compromised PC data such as cookies, local files, screenshots, Discord tokens, IP addresses, system details, and user credentials.
Date: 2026-01-05T05:03:31Z
Network: openweb
Published URL: https://breachforums.bf/Thread-ALL-Database-Logs-from-a-popular-minecraft-stealer-rat
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/0a4c639f-97ea-4ff9-be1f-fb1b46652013.png
https://d34iuop8pidsy8.cloudfront.net/d29d22c1-f797-4e5a-bae0-a87446eb2555.png
https://d34iuop8pidsy8.cloudfront.net/c8503b42-914b-4e71-b7ab-c622ed184e74.png
https://d34iuop8pidsy8.cloudfront.net/b6c2bda8-1f48-494a-b647-3d9bed17cd39.png
https://d34iuop8pidsy8.cloudfront.net/fc360ffc-5bc3-4eb6-8f8b-6e46fbe59200.png
Threat Actors: Explorers
Victim Country: Unknown
Victim Industry: Gaming
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin access to unidentified store in Turkey
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to unidentified online store for ladies products in Turkey.
Date: 2026-01-05T04:49:39Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273105/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/38dc3522-09c4-4c11-a6a8-92b2502f7646.png
Threat Actors: Fancy.Bear
Victim Country: Turkey
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin access to unidentified store in Poland
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified online store in Poland.
Date: 2026-01-05T04:35:50Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273108/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/d29a546c-b9b4-42d0-9f92-c25a713e2124.png
Threat Actors: Fancy.Bear
Victim Country: Poland
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of admin access to unidentified online store in Poland
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified online clothing store in Poland.
Date: 2026-01-05T04:34:20Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273107/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b4a8cbf9-68f6-4ed1-a1ee-38641155c760.png
Threat Actors: Fancy.Bear
Victim Country: Poland
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of 313 credit card records from USA
Category: Data Breach
Content: Threat actor claims to be selling 313 USA credit card records. The compromised data reportedly includes credit card number, expiry month, expiry year, cvv2, first name, last name, state, city, address, zip, phone number, and email address.
Date: 2026-01-05T04:24:24Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273119/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/c5d67641-1ac7-4cfe-a0ef-fc9d58e2d83b.png
Threat Actors: Magnez
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Bolttech falls victim to Everest Ransomware
Category: Ransomware
Content: The group claims to have obtained 186 GB of the organization internal data and they intend to publish it within 3-4 days.
Date: 2026-01-05T04:17:00Z
Network: tor
Published URL: http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/news/Bolttech/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/485b2b59-5b4b-45c9-a7c8-37d6cd7ec4f1.png
Threat Actors: Everest
Victim Country: Singapore
Victim Industry: Insurance
Victim Organization: bolttech
Victim Site: bolttech.io - Alleged sale of Europages Data From Multiple countries
Category: Data Breach
Content: The threat actor claims to be selling Europages Data From Denmark, Austria, and Belgium. The compromised data reportedly contain 548,000 records from Denmark, 210,000 records from Austria and 58,000 records from Belgium including name, Job title, Business name, Business normal name, Country, Address, City, Postcode, Region, Phone, Email, Latitude, Longitude, National Ids.
Date: 2026-01-05T04:16:27Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-Europages-Denmark-and-Austria-databases
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/8190d06c-798a-43c0-894c-09a563d7373e.png
Threat Actors: selluk
Victim Country: Denmark
Victim Industry: Other Industry
Victim Organization: europages
Victim Site: europages.com - Alleged sale of admin and shell access to unidentified store in UK
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in UK.
Date: 2026-01-05T04:15:26Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273121/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/16f281cd-684a-4e43-97e4-3af23b565db0.png
Threat Actors: Shopify
Victim Country: UK
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of LELO HEX
Category: Data Breach
Content: The threat actor claims to have released interaction data from LELO’s HEX email newsletter campaign conducted in 2016. The dataset contains newsletter recipient email addresses along with tracking metadata such as exit pages, IP addresses, locations, and campaign interaction details.
Date: 2026-01-05T04:07:48Z
Network: openweb
Published URL: https://darkforums.io/Thread-LELO-HEX-Newsletter-Campaign-Interaction-Data-2016
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/bbc25915-18fe-4337-a1db-31a94ab34f9a.png
Threat Actors: Edric
Victim Country: Unknown
Victim Industry: Consumer Services
Victim Organization: lelo
Victim Site: lelocondoms.com - IDeaS Revenue Solutions falls victim to Everest Ransomware
Category: Ransomware
Content: The group claims to have obtained 603GB of the organization internal data and they intend to publish it within 4-5 days.
Date: 2026-01-05T04:02:12Z
Network: tor
Published URL: http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/news/IDeaS/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/357d2cf2-9d50-4a65-9039-d092532a78d7.png
Threat Actors: Everest
Victim Country: USA
Victim Industry: Hospitality & Tourism
Victim Organization: ideas revenue solutions
Victim Site: ideas.com - Alleged sale of admin and shell access to unidentified store in US / Canada
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in USA / Canada.
Date: 2026-01-05T03:54:32Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273123/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/90a31d19-82fe-4c26-a138-add1eee8d6e5.png
Threat Actors: Shopify
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin and shell access to unidentified store in USA
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online store in USA.
Date: 2026-01-05T03:39:57Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273126/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2870ded8-ed9c-45dd-82f1-dcfeb69e66cd.png
Threat Actors: Shopify
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin and shell access to unidentified online store in France
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to unidentified online store in France.
Date: 2026-01-05T03:31:38Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273128/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/834728ad-2aaa-4389-a513-3a5802f93066.png
Threat Actors: Shopify
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin and shell access to unidentified store in UK
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified online shop in UK.
Date: 2026-01-05T03:18:11Z
Network: openweb
Published URL: https://forum.exploit.in/topic/273129/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7222a9c4-9b83-4359-b632-57eb2bf004cb.png
Threat Actors: Shopify
Victim Country: UK
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of SYSTEM-level C2 access beacons
Category: Initial Access
Content: The threat actor claims to be selling access to a command-and-control (C2) server containing 80+ active SYSTEM-level beacons.
Date: 2026-01-05T03:04:49Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-Access-to-C2-with-a-big-number-of-SYSTEM-access-beacons
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/a5116180-4bd9-4688-b8d1-4ecd0af8ae49.png
Threat Actors: TheArchitect1
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of mist.com.br
Category: Data Breach
Content: The threat actor claims to have leaked the Mist Store (mist.com.br) database following a data breach in January 2026. The exposed dataset contains approximately 30,000 order records from the Brazilian e-commerce platform.
Date: 2026-01-05T02:44:28Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-Brazil-mist-com-br-Leaked-Download
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/df787e4a-377d-43c6-837c-8c1a6d758f90.png
Threat Actors: lulzintel
Victim Country: Brazil
Victim Industry: E-commerce & Online Stores
Victim Organization: mist store
Victim Site: mist.com.br - Alleged data breach of League & Sports HQ
Category: Data Breach
Content: The threat actor claims to be selling data from LSHQ. The compromised data reportedly contain 42,000 user records including user IDs, first and last names, nicknames, email addresses, usernames, hashed passwords, OAuth provider details and access tokens, administrator flags, account status, login timestamps, IP addresses, contact email addresses.
Date: 2026-01-05T02:29:35Z
Network: openweb
Published URL: https://darkforums.io/Thread-42k-Canada-lshq-ca-User-DB-Emails-Hashed-Passwords-Names-Usernames-IP-Addresses
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/7b78f04f-4c11-499f-acc7-25d14ff1ce14.png
Threat Actors: gtaviispeak
Victim Country: Canada
Victim Industry: Sports
Victim Organization: league & sports hq
Victim Site: lshq.ca - Alleged sale of internal corporate files from axyon.eu
Category: Data Breach
Content: The threat actor claims to be selling approximately 340 GB of internal files allegedly exfiltrated from axyon.eu, affecting multiple major French organizations. The dataset contains internal documents, engineering data, construction records, and operational files related to energy production, infrastructure, and industrial projects.
Date: 2026-01-05T02:22:28Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-axyon-eu-340GB-Bouygues-EDF-Power-Plants-Eiffage-Engie-Files
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/cf9e965a-6034-4d8b-b770-70f911a211d3.png
Threat Actors: Angel_Batista
Victim Country: France
Victim Industry: Building and construction
Victim Organization: axyon
Victim Site: axyon.eu - Alleged data breach of accommodationforstudents.com
Category: Data Breach
Content: The threat actor claims to be selling a database containing 182,000 records associated with accommodationforstudents.com. The exposed data includes owner PII, such as email addresses, phone numbers, and password hashes, extracted from internal systems.
Date: 2026-01-05T02:11:44Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-182k-United-Kingdom-accommodationforstudents-com-Owner-PII-password-hashes-em
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f8ee7241-e8f7-4c9b-af89-16dd0ff12f0f.png
Threat Actors: Loser
Victim Country: USA
Victim Industry: Education
Victim Organization: accommodation for students
Victim Site: accommodationforstudents.com - Alleged sale of Endesa Spain customer database
Category: Data Breach
Content: The threat actor claims to be selling a new and previously unreported database belonging to Endesa, Spain’s largest electricity and gas company.
Date: 2026-01-05T01:40:46Z
Network: openweb
Published URL: https://breachforums.bf/Thread-SELLING-ES-Endesa-BIGGEST-SPAIN-DATABASE-No-old-data
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/93cd15f7-2dc8-450b-a852-bd608202e4fc.png
https://d34iuop8pidsy8.cloudfront.net/c51909ef-832d-47e3-baaf-aac77f30c41b.png
Threat Actors: spain
Victim Country: Spain
Victim Industry: Energy & Utilities
Victim Organization: endesa
Victim Site: endesa.com - Alleged data breach of Wadhefa
Category: Data Breach
Content: The threat actor claims to be selling data from Wadhefa. The compromised data reportedly contain 418,293 records including first, middle, and last names, dates of birth, national ID numbers, social and disability status, employment status, job titles, education institutions and fields, graduation years, training centers, skills, work experience details, email addresses, phone and WhatsApp numbers, postal addresses.
Date: 2026-01-05T01:35:22Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-418k-Saudi-Arabia-wadhefa-com-418-293-Job-Seeker-CVs-National-IDs-Emails-Pho
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/b6b1ccac-b885-494f-bc1e-a0833fa5038b.png
Threat Actors: Grubder
Victim Country: Saudi Arabia
Victim Industry: Other Industry
Victim Organization: wadhefa
Victim Site: wadhefa.com - Alleged data breach of GolfLink
Category: Data Breach
Content: The threat actor claims to be leaked data from GolfLink. The compromised data reportedly contain 500,000 records including member IDs, first and last names, dates of birth, primary and alternate email addresses, home, mobile and work phone numbers, full postal addresses.
Date: 2026-01-05T01:17:41Z
Network: openweb
Published URL: https://darkforums.io/Thread-Selling-1m-Bangladesh-https-www-bdjobs-com-Full-PII-database-including-National-IDs
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/92e5ff3e-2032-423b-926c-79ea90e1d24e.png
Threat Actors: Grubder
Victim Country: Australia
Victim Industry: Sports
Victim Organization: golflink
Victim Site: golf.com.au - Alleged Leak of Erectile Dysfunction Medication Records from United States
Category: Data Breach
Content: The threat actor claims to be leak Erectile Dysfunction Medication Records. The compromised data reportedly contain 916952 records including gender, dates of birth, physical addresses, city, state, ZIP code, email addresses, prescription details, medication names, dosage information, IP addresses.
Date: 2026-01-05T00:35:51Z
Network: openweb
Published URL: https://breachforums.bf/Thread-US-Erectile-Dysfunction-Medication-Records-%E2%80%93-2016-Sensitive-Health-Data–183159
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/f7118531-0dd4-4713-8e49-74ae953f5cc5.png
Threat Actors: Toxic_Wolf
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Lions Clubs International
Category: Data Breach
Content: The threat actor claims to be leaked data from Lions Clubs International. The compromised data reportedly contain 135,000 records including first and last names, dates of birth, postal addresses, phone numbers, professional status, membership roles, join dates, and engagement details.
Date: 2026-01-05T00:22:19Z
Network: openweb
Published URL: https://breachforums.bf/Thread-FR-LionsFrance-135K
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/3a8bcc58-147d-48a8-b378-6a948b373ae7.png
https://d34iuop8pidsy8.cloudfront.net/c80384e8-14f4-439b-ad2e-8b2845cdc98e.png
Threat Actors: HexDex2
Victim Country: France
Victim Industry: Other Industry
Victim Organization: lions clubs international
Victim Site: lionsclubs.org - Alleged Leak of French Hospital and Ophthalmologist Data
Category: Data Breach
Content: A threat actor claims to be leaked data from French Hospital and Ophthalmologist. The compromised data reportedly includes patient and practitioner first and last names, dates of birth, phone numbers, email addresses, physical addresses
Date: 2026-01-05T00:05:06Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-FR-Hospital-Ophthalmologist-2025-Databases
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/28f67ce7-2e44-4768-acf2-793bdae960b3.png
Threat Actors: host1337
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown