[January-08-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report analyzes 124 distinct cyber incidents recorded within a 24-hour window, primarily on January 8, 2026. The threat landscape is characterized by a high volume of ransomware attacks targeting the manufacturing and education sectors, significant data breaches affecting government and healthcare infrastructures, and a coordinated campaign of website defacements. Notably, there is a marked increase in attacks targeting Operational Technology (OT) and industrial control systems.


2. Ransomware Campaigns

Ransomware groups were highly active, with Qilin, Akira, and BlackShrantac being the most prominent actors. The attacks targeted a diverse range of industries including defense, education, and food production.

Qilin Ransomware Activity

The Qilin group was responsible for a significant number of confirmed compromises across multiple countries.

  • Education: Victim organizations include the Spring Grove Area School District in the USA.
  • Manufacturing & Industrial: Victims include Retrofit Service Company (USA) , Telstar Corporation (South Korea) , and Cressi (Italy).+2
  • Defense: TriVector Services, Inc., a defense and space organization in the USA, was compromised.
  • Healthcare: Anteriad, a marketing firm, allegedly lost 3 TB of data.

Akira & Other Ransomware Groups

  • Akira: Targeted Morton Buildings, Inc. (Construction), allegedly stealing 100GB of project data. They also compromised Udall Law Firm, stealing sensitive client legal documents , and Gordon Companies Inc..+2
  • BlackShrantac: Claimed a massive 1TB data theft from Schneider Prototyping India and a 2TB theft from the National Water Authority in Peru.+1
  • ANUBIS: Targeted “About Women Ob-Gyn” in the USA.
  • CL0P: Claimed victims including the Committee to Protect Journalists and the food company Mutti.+1

3. Critical Infrastructure and Industrial Control Systems (ICS)

A concerning trend in this dataset is the specific targeting of industrial control systems and critical infrastructure, particularly by the group Infrastructure Destruction Squad and Z-PENTEST ALLIANCE.

  • Czech Republic Heating & HVAC: The Infrastructure Destruction Squad claimed unauthorized access to multiple heating management systems. They reportedly gained control over boilers, pumps, and temperature settings. They also accessed an industrial HVAC system, allegedly enabling control over air disinfection and thermal valves.+4
  • Hospital Targeting: The same group issued an alert indicating they are targeting hospitals in the Czech Republic.
  • US Food Processing: Z-PENTEST ALLIANCE claimed access to a food processing control system in the USA, allegedly capable of modifying recipe parameters like temperature and humidity in real-time.
  • US Oil & Gas: The same group claimed access to an oil and gas facility, allegedly controlling pressure and flow parameters in pipes and tanks.

4. Major Data Breaches

Threat actors leaked or listed for sale massive datasets containing Personally Identifiable Information (PII), government records, and corporate secrets.

Government and National Registries

  • China: A threat actor claimed to leak a database of 1.2 billion Chinese citizen records, including national IDs and GPS coordinates, allegedly from the State Council.
  • Russia: Leaks included “state secret” documents and a top-secret FSB document.+1
  • France: Extensive breaches targeted French entities, including the INPI (26 million company records) , Sorbonne University , and various sports federations (Mountaineering, Bridge, American Football).+4

Corporate and Consumer Data

  • Amazon: A threat actor claimed to breach Amazon, allegedly exposing 6 million user login pairs.
  • Healthcare: A leak from OpenLoop Health in the USA allegedly exposed 1.6 million patient records.
  • Open Web/Databases: GhostSocks Database was leaked, including credentials and contact details.

5. Initial Access Sales

Threat actors are actively selling unauthorized access, serving as a precursor to future ransomware or espionage attacks.

  • Banking: Sale of Fortigate admin access to a US Banking Finance organization.
  • Surveillance: Unauthorized access to surveillance cameras in the USA and a coffee shop in Ukraine.+1
  • Government: Access to the “One Window Service Office” in Cambodia, which handles citizen ID and residency services.

6. Defacement Campaigns

Hacktivist activity remains high, with groups using website defacement to send political or disruptive messages.

  • CyberOprationCulture: This group was extremely active, targeting numerous Indian entities across various sectors, including construction, education, and religious institutions.+3
  • PhantomSec1337: Focused on US-based construction and flooring companies, defacing websites for D and D Custom Solutions, B and K Hardwood Floor, and others.+2
  • Diparis: Targeted government websites in Angola, Indonesia, and Kyrgyzstan.+2

7. Conclusion

The cyber incidents from January 8, 2026, demonstrate a volatile threat environment. The most critical risk detected is the direct manipulation of Operational Technology (OT) in the Czech Republic and the USA, which poses physical safety risks beyond standard data theft.+1

Simultaneously, the scale of alleged data breaches—particularly the 1.2 billion record leak from China and the 6 million Amazon records —indicates that massive credential stuffing and identity theft campaigns are likely to follow. Ransomware groups continue to operate with impunity, heavily targeting the education and manufacturing sectors.+1

Detected Incidents Draft Data

  1. Alleged sale of unauthorized access to unidentified Banking Finance organization in USA
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized fortigate admin access to an unidentified Banking Finance organization in USA.
    Date: 2026-01-08T22:57:30Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273342/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/03859c67-0f1a-440c-a772-caddd0a0b91c.png
    Threat Actors: cold666
    Victim Country: USA
    Victim Industry: Banking & Mortgage
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Alleged data leak of GhostSocks Database
    Category: Data Breach
    Content: A threat actor claims to have leaked data from GhostSocks, with the exposed information reportedly including usernames, passwords, and associated Telegram and email contact details.
    Date: 2026-01-08T22:51:30Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273394/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e000c577-a872-4abc-bddb-a7681bb5e55b.png
    https://d34iuop8pidsy8.cloudfront.net/c63de19e-d6a2-4c0e-92af-d6e619fe0f73.png
    Threat Actors: unl0ck
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged sale of unauthorized RDP access to unidentified Manufacturing company in Italy
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized RDP access to an unidentified Manufacturing company in Italy.
    Date: 2026-01-08T22:48:49Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273365/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b9ed557d-0b1d-4534-9bec-86c8c28f4344.png
    Threat Actors: Big-Bro
    Victim Country: Italy
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged data leak of Fédération Française de Natation
    Category: Data Breach
    Content: The threat actor claims to be selling the data from Fédération Française de Natation.
    Date: 2026-01-08T22:24:20Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-ffnv-rar-extracted-data
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4a4f7de6-4fa0-4041-bc57-8c1b5913289e.png
    Threat Actors: anon2589
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: french swimming federation
    Victim Site: Unknown
  5. About Women Ob-Gyn falls victim to ANUBIS Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organization’s data.
    Date: 2026-01-08T22:09:25Z
    Network: tor
    Published URL: http://om6q4a6cyipxvt7ioudxt24cw4oqu4yodmqzl25mqd2hgllymrgu4aqd.onion/r/fhg8fW6QLYEZpEa4dL7tT2k20T0ZsrotUJ0hMBg5CSdCQNvrOC9tp8swf9dJlJYoDttLGO3j7z7EbD3JQNGR6WUtOZGYw
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b2f34d05-17de-47f7-81a4-663798f8d3fb.png
    https://d34iuop8pidsy8.cloudfront.net/93c02a50-a167-4f04-9a30-46e27438eb16.png
    https://d34iuop8pidsy8.cloudfront.net/540980fc-a361-4cdc-ba61-3684f5baeec9.png
    Threat Actors: ANUBIS
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: about women ob-gyn
    Victim Site: aboutwomenobgyn.com
  6. Alleged access to Hive Ransomware Affiliate Panel
    Category: Initial Access
    Content: The group claims to have gained login credentials to Hive Ransomware Affiliate Panel
    Date: 2026-01-08T21:42:33Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/480?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d0be622a-c033-486a-96fb-197720b6a596.jpg
    Threat Actors: Bjorkanism
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: hive ransomware
    Victim Site: Unknown
  7. Alleged Sale of Next Gen Malware
    Category: Malware
    Content: Threat Actor claims to be selling Next Gen Malware.
    Date: 2026-01-08T21:05:44Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-COLLECTION-Next-Gen-Malware
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/443c73d7-78a6-47d4-9683-b39413552ef5.png
    Threat Actors: Spearr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged Data Breach of Comedy Works
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Comedy Works in USA, allegedly containing 200,000 user records. The compromised data includes billing addresses, partial credit card information (last four digits, card type, and expiration date), email addresses, passwords, and names.
    Date: 2026-01-08T20:58:34Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-USA-comedyworks-com-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b3d2112f-0103-44d9-b250-bbe216d05711.png
    https://d34iuop8pidsy8.cloudfront.net/002b6e84-b222-4356-9e4e-ee96385a80c6.png
    Threat Actors: lulzintel
    Victim Country: USA
    Victim Industry: Entertainment & Movie Production
    Victim Organization: comedy works
    Victim Site: comedyworks.com
  9. Alleged Unauthorised Access to Canadian tax office
    Category: Initial Access
    Content: The group claims to have gained unauthorized cPanel and WordPress admin access to a Canadian tax office.
    Date: 2026-01-08T20:46:35Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273391/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c5e8da5-4fb5-4bf3-9a6e-808ebe872a93.png
    Threat Actors: test_mobi
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged Initial Access to unidentified Food processing control system in USA
    Category: Initial Access
    Content: The group claims that they have gained unauthorized access to a control system used to manage food processing technology within the food industry, including production of sauces, sausages, and smoked meats. The exposed interface reportedly displays recipe configurations with parameters such as temperature, humidity, processing time, and control status set to manual (HAND) mode, indicating the ability to select recipes and modify production parameters in real time
    Date: 2026-01-08T20:09:11Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/943
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a931c215-5d97-44cb-93a5-dc74bef4afc4.jpg
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged Data Leak of Preprod
    Category: Data Breach
    Content: Threat Actor claims to have leaked the database of Preprod, which consists of approximately 12 files.
    Date: 2026-01-08T19:28:35Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Preprod-leak-001
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/30872212-a641-46b1-a675-e502ffa7e4d8.png
    Threat Actors: Ag0stin0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Alleged data breach of SimpleSwap
    Category: Data Breach
    Content: The threat actor leaked database containing approximately 68,744 user records. The leaked data allegedly includes user account information such as email addresses, public IDs, names, account creation timestamps, KYC status , notification settings, internal trace IDs, and feature flags.
    Date: 2026-01-08T19:26:15Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-simpleswap-io-Crypto-Swap-68K-users
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2a794a02-a11c-4f82-baa7-738385470e03.png
    Threat Actors: rennn
    Victim Country: Seychelles
    Victim Industry: Financial Services
    Victim Organization: simpleswap
    Victim Site: simpleswap.io
  13. Alleged leak of Russian documents
    Category: Data Breach
    Content: The group claims to have leaked state secret Russian documents
    Date: 2026-01-08T19:25:40Z
    Network: telegram
    Published URL: https://t.me/topsecretdocumentsleaked/204
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dc560012-1e44-4b1b-a4a5-dc65e01d7246.jpg
    Threat Actors: JRINTEL FREE DATA V3
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. CyberOprationCulture targets the website of
    Category: Defacement
    Content: The group claims to have defaced the website of
    Date: 2026-01-08T19:22:07Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/52
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/00f5ae60-a27a-4913-afdb-573420516692.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Religious Institutions
    Victim Organization: niityaa kumbh
    Victim Site: niityaakumbh.com
  15. CyberOprationCulture targets the website of N-Fours Infra & Construction
    Category: Defacement
    Content: The group claims to have defaced the website of N-Fours Infra & Construction
    Date: 2026-01-08T19:20:23Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/52
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/36c78006-3fe5-486f-9893-98a5f321a111.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Building and construction
    Victim Organization: n-fours infra & construction
    Victim Site: nfoursinfra.com
  16. Alleged Data Leak of Pre-Production
    Category: Data Breach
    Content: Threat Actor claims to have leaked the database of Pre-Production, which consists of approximately 13 files.
    Date: 2026-01-08T19:19:06Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-pre-production-leaks-02
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bd5b3512-240c-41ca-a40c-9e19d0ed1f64.png
    Threat Actors: Ag0stin0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. CyberOprationCulture targets the website of Golden Orchid
    Category: Defacement
    Content: The group claims to have defaced the website of Golden Orchid
    Date: 2026-01-08T19:15:08Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/52
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5f794967-1813-487b-8ab8-087160f7d2a8.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Restaurants
    Victim Organization: golden orchid
    Victim Site: mygoldenorchid.com
  18. Alleged data leak of Russian FSB Document
    Category: Data Breach
    Content: A threat actor claims to have leaked a top-secret Russian FSB document, reportedly shared as a single RTF file.
    Date: 2026-01-08T19:13:41Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-TOP-SECRET-Russian-FSB-Document-LEAKED
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7b4dff22-bb59-4b54-910b-1e81fe3a9993.png
    https://d34iuop8pidsy8.cloudfront.net/78611074-cc13-45bc-89cc-01f7a339deff.png
    Threat Actors: jrintel
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. CyberOprationCulture targets the website of Kailash Agencies
    Category: Defacement
    Content: The group claims to have defaced the website of Kailash Agencies
    Date: 2026-01-08T19:12:47Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/51
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a770fe9c-578a-4e15-9b9e-daf88229915a.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Food & Beverages
    Victim Organization: kailash agencies
    Victim Site: kailashagencies.com
  20. CyberOprationCulture targets the website of
    Category: Defacement
    Content: The group claims to have defaced the website of
    Date: 2026-01-08T19:09:15Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/50
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b7105106-9302-421f-8b47-9b4c5b2a2a60.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: jai maruti gas cylinders limited
    Victim Site: jmgcl.com
  21. Federal University of Sergipe falls victim to VECT Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 150 GB organization’s data. The data includes financial records, students data and intends to publish them within 3-4 days.
    Date: 2026-01-08T19:07:36Z
    Network: tor
    Published URL: http://bu7zr6fotni3qxxoxlcmpikwtp5mjzy7jkxt7akflnm2kwkbdtgtjuid.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b8ef7156-aa4d-46ad-92f3-690b841ba457.png
    Threat Actors: VECT
    Victim Country: Brazil
    Victim Industry: Education
    Victim Organization: federal university of sergipe
    Victim Site: ufs.br
  22. Mutti falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organization’s data.
    Date: 2026-01-08T19:05:52Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/mutti-parma-com
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3b77b188-5327-458d-a219-fab82e7bcb26.png
    Threat Actors: CL0P
    Victim Country: Italy
    Victim Industry: Food & Beverages
    Victim Organization: mutti
    Victim Site: mutti-parma.com
  23. CyberOprationCulture targets the website of Forevermore 3D Casting
    Category: Defacement
    Content: The group claims to have defaced the website of Forevermore 3D Casting
    Date: 2026-01-08T18:58:11Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/49
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a2083047-4fda-460d-a791-5b6fe186e4d6.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Arts & Crafts
    Victim Organization: forevermore 3d casting
    Victim Site: forevermore3dcasting.com
  24. Alleged Data Breach of Lit
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Lit in Italy, allegedly containing 3,09,667 customer records.
    Date: 2026-01-08T18:43:33Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-lit-it-crypto-related
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ad61c42b-189a-404b-9515-0c7e4d5766ee.png
    Threat Actors: Wadjet
    Victim Country: Italy
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: lit
    Victim Site: lit.it
  25. Committee to Protect Journalists falls victim to CL0P Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organization’s data.
    Date: 2026-01-08T18:41:46Z
    Network: tor
    Published URL: http://santat7kpllt6iyvqbr7q4amdv6dzrh6paatvyrzl7ry3zm72zigf4ad.onion/cpj-org
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7c064629-2e6a-476c-917a-238b91c07fcc.png
    Threat Actors: CL0P
    Victim Country: USA
    Victim Industry: International Affairs
    Victim Organization: committee to protect journalists
    Victim Site: cpj.org
  26. CyberOprationCulture targets the website of Crystal Analytix
    Category: Defacement
    Content: The group claims to have defaced the website of
    Date: 2026-01-08T18:41:21Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/46
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0db241ff-12d6-4039-9956-b1cff644550d.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Education
    Victim Organization: crystal analytix
    Victim Site: crystalanalytix.com
  27. CyberOprationCulture targets the website of Filmy Film Productions
    Category: Defacement
    Content: The group claims to have defaced the website of Filmy Film Productions
    Date: 2026-01-08T18:36:21Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/48
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b423f4ec-1aee-4423-b516-89bf8aa27e64.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Motion Pictures & Film
    Victim Organization: filmy film productions
    Victim Site: filmyfilmproductions.com
  28. CyberOprationCulture targets the website of Digital Navik Private Limited
    Category: Defacement
    Content: The group claims to have defaced the website of Digital Navik Private Limited
    Date: 2026-01-08T18:29:10Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/47
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b5ab70b6-4e6a-428f-925c-e7e5728fb606.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: India
    Victim Industry: Education
    Victim Organization: digital navik private limited
    Victim Site: digitalnavik.com
  29. Alleged Data Leak of LAKOMKA
    Category: Data Breach
    Content: Threat Actor claims to have leaked the database of LAKOMKA, allegedly containing 32,497 customer records.
    Date: 2026-01-08T18:25:23Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-32-497-customers-LAKOMKA
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c6f5430-69d5-4ec1-b920-1939fd07c1e1.png
    Threat Actors: Ag0stin0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. CyberOprationCulture targets the website of 3Z Laundry Services
    Category: Defacement
    Content: The group claims to have defaced the website of 3Z Laundry
    Date: 2026-01-08T18:19:56Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/45
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6e4db310-c248-464c-9e40-e295d3a874dd.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: Qatar
    Victim Industry: Consumer Services
    Victim Organization: 3z laundry services
    Victim Site: 3zlaundry.com
  31. Alleged Data Leak of bobbyfoun.tw
    Category: Data Breach
    Content: Threat Actor claims to have leaked the database of bobbyfoun.tw in Taiwan, which includes customer-related information such as user details and purchase records.
    Date: 2026-01-08T18:09:55Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Prepro-leak-03-bobbyfoun-tw
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d4a49f4e-2e23-4147-9cbc-8c6b12cd2895.png
    Threat Actors: Ag0stin0
    Victim Country: Taiwan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: bobbyfoun.tw
  32. Pollock Communications falls victim to INC RANSOM Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organization’s data.
    Date: 2026-01-08T17:41:31Z
    Network: tor
    Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/695fd6398f1d14b7434fa840
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8b2ad0df-3238-4ff8-bbc6-d8143aea601c.png
    Threat Actors: INC RANSOM
    Victim Country: USA
    Victim Industry: Public Relations/PR
    Victim Organization: pollock communications
    Victim Site: lpollockpr.com
  33. Alleged access to unidentified Coffee shop in Ukraine
    Category: Initial Access
    Content: The group claims to have gained unauthorized CCTV access to a Coffee shop in Ukraine
    Date: 2026-01-08T17:39:29Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/143v
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8ca039cf-d3e2-46b0-8ebe-9faf044f703b.jpg
    Threat Actors: MORNING STAR
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged Unauthorised Root Access to an unidentified TV live Streaming Website
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized domain root access to an unidentified TV live Streaming Website.
    Date: 2026-01-08T17:38:57Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273376/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1eefa799-4eea-4970-8b05-1c4ca7b975cd.png
    Threat Actors: Mr.Wizard
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged data breach of St Michael’s Church of England Primary School, Pelsall
    Category: Data Breach
    Content: The threat actor claims to have leaked data from St Michael’s Church of England Primary School, Pelsall.
    Date: 2026-01-08T17:30:09Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/41
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5d4e6992-9369-41a5-a649-fe2df63a9ffe.png
    Threat Actors: CyberOprationCulture
    Victim Country: UK
    Victim Industry: Education
    Victim Organization: st michael’s church of england primary school, pelsall
    Victim Site: stmichaelspelsall.co.uk
  36. Alleged data breach of ArinGo Computer
    Category: Data Breach
    Content: The threat actor claims to have leaked data from ArinGo Computer.
    Date: 2026-01-08T17:26:17Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/41
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c8428d87-9571-41c6-a4dc-b484ff3ca89e.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Retail Industry
    Victim Organization: aringo computer
    Victim Site: aringocomputer.com
  37. Alleged data breach of Uruk University
    Category: Data Breach
    Content: The group claims to have breached the database of Uruk University.
    Date: 2026-01-08T17:22:28Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cbcdd3ba-4dfe-4b6d-b919-78ca5dfbbf73.png
    Threat Actors: CyberOprationCulture
    Victim Country: Iraq
    Victim Industry: Education
    Victim Organization: uruk university
    Victim Site: uruk.edu.iq
  38. Alleged data breach of
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Amazon, allegedly exposing approximately 6 million user login pairs (ULP) containing email/username and password combinations.
    Date: 2026-01-08T17:16:37Z
    Network: openweb
    Published URL: https://leakbase.la/threads/amazon-com-6m-ulp.48030/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e1a299d0-2932-4ce1-9e5f-830ba7623622.png
    Threat Actors: r3zz
    Victim Country: USA
    Victim Industry: E-commerce & Online Stores
    Victim Organization: amazon
    Victim Site: amazon.com
  39. Alleged Data Breach of Faculty of Agriculture, University of Riau
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Faculty of Agriculture, University of Riau in Indonesia.
    Date: 2026-01-08T17:11:56Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/42
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fc44ee39-5a63-441b-a9a1-1347624201b5.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: faculty of agriculture, university of riau
    Victim Site: sitani.faperta.unri.ac.id
  40. Retrofit Service Company, Inc. falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-08T17:08:50Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=54830d8a-8b6a-329a-a203-9d848b82c049
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bcb6d1f2-67e5-4ce5-a428-cdd2be09209f.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: retrofit service company, inc.
    Victim Site: retrofitsc.com
  41. Spring Grove Area School District falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-08T17:08:28Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=9201fb94-bd27-3af0-8959-dc363d66ed13
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c61939a7-1d48-4a40-a036-e21cdf1c92e5.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Education
    Victim Organization: spring grove area school district
    Victim Site: sgasd.org
  42. Alleged Data Breach of Mirsharai Upazila Development Plan (MUDP)
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Mirsharai Upazila Development Plan in Bangladesh.
    Date: 2026-01-08T17:02:26Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/41
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cd8c8cfc-c5b0-4ee5-87e3-0b3800f0b33c.png
    Threat Actors: CyberOprationCulture
    Victim Country: Bangladesh
    Victim Industry: Government Administration
    Victim Organization: mirsharai upazila development plan
    Victim Site: mudp.gov.bd
  43. Softlab falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-08T17:01:48Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=efca9ff5-d2ed-3965-8c7d-60f064832d9a
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/07ef73e2-4feb-4620-9df0-b8491b28d446.png
    Threat Actors: Qilin
    Victim Country: Italy
    Victim Industry: Information Technology (IT) Services
    Victim Organization: softlab
    Victim Site: soft.it
  44. STESAD GmbH falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-08T16:49:32Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=63ec7de3-33f7-3029-9a10-476b14e27ed9
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b6dd33ae-97b9-43e3-a214-a3c15d677e5e.png
    Threat Actors: Qilin
    Victim Country: Germany
    Victim Industry: Building and construction
    Victim Organization: stesad gmbh
    Victim Site: stesad.de
  45. Alleged data breach of Relive Physiotherapy & Sports Injury Clinic
    Category: Data Breach
    Content: The group claims to have breached the database of Relive Physiotherapy & Sports Injury Clinic
    Date: 2026-01-08T16:47:30Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4cf917e6-764c-4888-81a8-9bb627e85749.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: UK
    Victim Industry: Medical Practice
    Victim Organization: relive physiotherapy & sports injury clinic
    Victim Site: relievephysiotherapy.co.uk
  46. Alleged data breach of Anderson & Partners
    Category: Data Breach
    Content: The group claims to have breached the database of Anderson & Partners
    Date: 2026-01-08T16:42:08Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/44fc378c-d835-4bd3-b76c-0eb742dc9660.jpg
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Law Practice & Law Firms
    Victim Organization: anderson & partners
    Victim Site: anderson.co.id
  47. Gaviota falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-08T16:21:22Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=93809062-e5fa-3482-800b-bc7c1765bf85
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5bca5de5-16c5-4051-8ab5-7e234fb755e9.png
    Threat Actors: Qilin
    Victim Country: Spain
    Victim Industry: Building and construction
    Victim Organization: gaviota
    Victim Site: gaviotagroup.com
  48. TriVector Services, Inc. falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained organizations data.
    Date: 2026-01-08T16:15:16Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=1f50d3ec-3a35-3f73-b59f-c80605f7074e
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/54539eaf-da11-47c1-a5c6-7038e70bb516.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Defense & Space
    Victim Organization: trivector services, inc.
    Victim Site: trivector.us
  49. CyberDragon caims to target Syria
    Category: Alert
    Content: A recent post by the group indicates that they’re targeting Syrian government and communication and internet lines.
    Date: 2026-01-08T15:51:58Z
    Network: telegram
    Published URL: https://t.me/c/3573104830/18
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/717879e4-b6f6-4b1a-aa4d-8b17b55a6eb4.jpg
    Threat Actors: CyberDragon
    Victim Country: Syria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Morton Buildings, Inc. falls victim to Akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 100GB of the organization’s data. Compromised data includes employee documents, projects, specifications and drawings, NDA, partner information, contacts and so on.
    Date: 2026-01-08T15:45:50Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a7f6aed0-63fc-4875-9e6a-0b6aa131f0b6.png
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: morton buildings, inc.
    Victim Site: mortonbuildings.com
  51. Udall Law Firm LLP falls victim to Akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 78 GB of the organization’s corporate data, compromised data includes large amount of clients’ personal information such as passport numbers, SSNs, drivers licenses, death/birth certs, financials, NDA, police incidents, confidentiality agreements and so on.
    Date: 2026-01-08T14:35:26Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9cdfa000-7da8-4769-a9ab-a676fbc83d8d.jpg
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Law Practice & Law Firms
    Victim Organization: udall law firm llp
    Victim Site: udalllaw.com
  52. Alleged Unauthorised Access to an unidentified oil and gas facility in the USA
    Category: Initial Access
    Content: The group claims to have gained alleged unauthorised access to an unidentified oil and gas facility in the USA, The compromised system allegedly controls Main pressure and flow parameters in pipes and tanks (Tubing Pressure, Casing Pressure, Flowline Pressure), separator control with pressure and fluid level indicators (Separator Pressure, Level Safety), valve control settings based on a set value (Manual Setpoint, Valve Output).
    Date: 2026-01-08T14:34:16Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/940
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e1661478-36df-4597-9a58-cf1f34a18865.JPG
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: USA
    Victim Industry: Oil & Gas
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Gordon Companies Inc. falls victim to Akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organization’s corporate data, compromised data includes employee personal information such as passport numbers, SSNs and other scanned documents, client data, financials, NDA and so on.
    Date: 2026-01-08T14:30:55Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/26a842cf-d8e6-4922-a3b3-8ea3f9185b3e.jpg
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: gordon companies inc.
    Victim Site: gordoncompaniesinc.com
  54. Anteriad falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained 3 TB of the organizations data.
    Date: 2026-01-08T14:25:07Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=b473211a-305b-3837-bea1-d4f822c56484
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7918bc26-e308-4cbe-89fe-6b8e4a504d63.png
    https://d34iuop8pidsy8.cloudfront.net/cfb2dca1-1cfe-499f-b173-0b60f28a7699.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: anteriad
    Victim Site: anteriad.com
  55. Alleged data leak of service recipients in WINONGO VILLAGE
    Category: Data Breach
    Content: The group claims to have leaked list of service recipients in WINONGO VILLAGE on January, 2023.
    Date: 2026-01-08T14:23:18Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/77
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f14a21b8-f8aa-4ff4-8c51-7d3003aca565.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged leak of Burau Sub-district Office in Indonesia
    Category: Data Breach
    Content: The group claims to have leaked database of related to Burau Sub-district Office in Indonesia
    Date: 2026-01-08T14:22:30Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/78
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1c346c33-cf13-4df8-a7d9-7b673ec7a399.jpg
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  57. Alleged leak of a database related to Marengmang
    Category: Data Breach
    Content: The group claims to have leaked database of related to Marengmang in Indonesia.
    Date: 2026-01-08T14:11:23Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/76
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/235d42da-14ec-4457-8416-c141122fb43b.jpg
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged data leak of UAE investors
    Category: Data Breach
    Content: The group claims to have leaked 90K database of UAE investors. The compromised data contains email, account name, phone, bill country , account status, brand, agent name, ftd status, ftd amount, total deposited usd and last Updated.
    Date: 2026-01-08T14:02:36Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/403
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/58a4ca09-5935-4360-acc3-16954e589125.jpg
    Threat Actors: Bjorkanism
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  59. Alleged leak of GCC database
    Category: Data Breach
    Content: The group claims to have leaked GCC crypto database.
    Date: 2026-01-08T13:59:19Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/422
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e7707735-ea6c-43be-8beb-9ccc74e743dd.png
    Threat Actors: Bjorkanism
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged data leak of Northern Cyprus Ministry of Health
    Category: Data Breach
    Content: The threat actor claims to have leaked 340,000 records from the Northern Cyprus Ministry of Health. The compromised data reportedly includes name, surname, ID number, gender, and birthplace.
    Date: 2026-01-08T13:50:43Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-REICHLeaks-Northern-Cyprus-Ministry-of-Health-Database-partial
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b63d3908-969e-4aa6-b5c1-80c31614c240.png
    Threat Actors: harakiri
    Victim Country: Turkey
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of health of the republic of cyprus
    Victim Site: saglik.gov.ct.tr
  61. Alleged leak of login credentials from Movimento Civico Mentana Nostra
    Category: Initial Access
    Content: The group claims to have leaked login credentials from the Movimento Civico Mentana Nostra website in Italy.
    Date: 2026-01-08T13:48:59Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9af1ecfe-c058-4a2e-ae50-527e165ee40c.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Italy
    Victim Industry: Civic & Social Organization
    Victim Organization: movimento civico mentana nostra
    Victim Site: mentananostra.it/svil/wp-login.php
  62. Alleged data leak of Dubai investors
    Category: Data Breach
    Content: The group claims to have leaked a database of Dubai investors.
    Date: 2026-01-08T13:45:35Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/313
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c95570c-bc40-47e0-b4bd-77d444c853b6.jpg
    Threat Actors: Bjorkanism
    Victim Country: UAE
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Alleged leak of login credential from Bryanston Primary School
    Category: Initial Access
    Content: The group claims to have leaked login credentials from Bryanston Primary School in South Africa.
    Date: 2026-01-08T13:37:33Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/785f0935-b557-4590-bcec-626bf13ff02d.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: South Africa
    Victim Industry: Education
    Victim Organization: bryanston primary school
    Victim Site: bpsonline.co.za/wp-login.php
  64. Alleged unauthorized access to TotalSuite
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to TotalSuite
    Date: 2026-01-08T13:25:08Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7dc1d5fb-e2db-4efe-9db5-d0e7ef3266e5.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Unknown
    Victim Industry: Information Technology (IT) Services
    Victim Organization: totalsuite
    Victim Site: demos.totalsuite.net
  65. Alleged leak of login credentials from Smackcoders
    Category: Initial Access
    Content: Group claims to have leaked login credentials for the admin panel of Smackcoders
    Date: 2026-01-08T13:23:51Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bf92076a-1a93-4f5e-92ef-93fe5130f0b2.jpg
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: India
    Victim Industry: Software Development
    Victim Organization: smackcoders
    Victim Site: demo.smackcoders.com
  66. Alleged leak of login credentials from NEX-Forms
    Category: Initial Access
    Content: Group claims to have leaked login credentials for the admin panel of NEX-Forms.
    Date: 2026-01-08T13:22:44Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e467ee3d-85b5-46c1-b620-67606daf918c.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Unknown
    Victim Industry: Software
    Victim Organization: nex-forms
    Victim Site: basixonline.net
  67. Alleged data breach of sorbonne university
    Category: Data Breach
    Content: The threat actor claims to have breached data from Sorbonne University, with two ZIP files measuring 379 MB and 30 MB.
    Date: 2026-01-08T13:19:54Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-sorbonne-university-of-paris-2024
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/451a6158-82b1-4365-b6ed-8c57a09dcffb.png
    Threat Actors: Aimbot
    Victim Country: France
    Victim Industry: Higher Education/Acadamia
    Victim Organization: sorbonne university
    Victim Site: sorbonne-universite.fr
  68. Alleged unauthorized access to JBSofts
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to JBSofts.
    Date: 2026-01-08T13:17:18Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/df2fb6bb-f844-4946-949a-6de283c82df5.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: jbsofts
    Victim Site: jbsofts.net
  69. Alleged leak of login credential from WCPA Free Demo website
    Category: Initial Access
    Content: Group claims to have leaked login credential from WCPA Free Demo website, operated by Acowebs.
    Date: 2026-01-08T13:12:38Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/37dd97d2-5da3-494e-8bb4-399301da62f5.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: acowebs
    Victim Site: wcpa-free.demo2.acowebs.com
  70. Alleged unauthorized access to AcyMailing
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to AcyMailing.
    Date: 2026-01-08T13:07:53Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0eaa90bf-8c7d-4fa9-aebf-f699e7dac0b8.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: France
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: acymailing
    Victim Site: demo.acymailing.com
  71. Alleged leak of login credentials from jaybabani.com
    Category: Initial Access
    Content: Group claims to have leaked login credentials for the admin panel of jaybabani.com.
    Date: 2026-01-08T13:06:53Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/75
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/862b1923-8f53-4d11-b7e2-4ea2e17ff10f.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: jaybabani.com
    Victim Site: jaybabani.com
  72. Alleged data breach of Yaaka
    Category: Data Breach
    Content: The threat actor claims to have breached data belonging to Yaaka, totaling 252 MB, compressed into a 24 million archive.

Note: it was previously breached by the threat actor ‘nonokali’ on December 25, 2024.
Date: 2026-01-08T13:05:25Z
Network: openweb
Published URL: https://breachforums.bf/Thread-DATABASE-yaaka-fr-sql-2024
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/e0f5b4d2-ce37-45d7-8c9c-96c2815fa568.png
Threat Actors: Aimbot
Victim Country: France
Victim Industry: Information Technology (IT) Services
Victim Organization: yaaka
Victim Site: yaaka.fr

  1. Alleged data breach of Code With Harry
    Category: Defacement
    Content: The group claims to have breached 395,384 lines of data from the organisation, allegedly including email (395,150), phone (395,380), name (392,738), address (334).
    Date: 2026-01-08T13:00:51Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/310
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/708f1184-efeb-4221-8c89-2f276de319c3.JPG
    Threat Actors: Bjorkanism
    Victim Country: India
    Victim Industry: Education
    Victim Organization: code with harry
    Victim Site: codewithharry.com
  2. Alleged unauthorized access to mySCADA Technologies
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to mySCADA’s systems and obtained confidential information related to its operations.
    Date: 2026-01-08T12:58:49Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3223
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/07ac0bb2-c1ea-46c5-85c1-482a8f0566a3.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Czech Republic
    Victim Industry: Machinery Manufacturing
    Victim Organization: myscada technologies
    Victim Site: myscada.org
  3. DEFACER INDONESIAN TEAM targets the website of UMMATAN
    Category: Defacement
    Content: The group claims to have defaced the website of UMMATAN.
    Date: 2026-01-08T12:54:42Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/517
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/99e47ff9-8f1f-4083-b974-74cabd8d0af1.png
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: Indonesia
    Victim Industry: Religious Institutions
    Victim Organization: ummatan
    Victim Site: ummatan.yafata.or.id
  4. Zen targets the website of Marang District Council
    Category: Defacement
    Content: the group claims to have defaced the website of Marang District Council
    Date: 2026-01-08T12:49:48Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224446
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2cffc1a3-35fa-4d7c-98c8-1c67f2c34450.JPG
    Threat Actors: Zen
    Victim Country: Malaysia
    Victim Industry: Government Administration
    Victim Organization: marang district council
    Victim Site: kpass-pay.mdmarangonline.gov.my
  5. Alleged data breach of Accuick
    Category: Data Breach
    Content: The group claims to have breached 177 thousand user records from the organisation, allegedly including Candidate id, Name, Email, Phone number.
    Date: 2026-01-08T12:45:33Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/309
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/21f51cbf-0039-4a15-b572-a9d66226d214.JPG
    Threat Actors: Bjorkanism
    Victim Country: USA
    Victim Industry: Staffing/Recruiting
    Victim Organization: accuick
    Victim Site: www4.accuick.com
  6. Alleged data leak of Serbian citizens data
    Category: Data Breach
    Content: The group claims to have leaked data Serbian citizens. The compromised data includes name, address, street , personal numbers etc.
    Date: 2026-01-08T12:43:08Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/306
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7b8611a7-5197-420c-9390-76a7b2467925.jpg
    Threat Actors: Bjorkanism
    Victim Country: Serbia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged data breach of PROLIGA
    Category: Data Breach
    Content: The group claims to have breached 7000 user records belonging to PROLIGA, compromised data includes Roles, Names, Emails, Hashed Passwords, Phones, SMS codes, Images, Verification Details, Browser Details.
    Date: 2026-01-08T12:38:16Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/308
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/38ae5a8d-3a61-4e5b-99b7-d6b6de396b74.png
    Threat Actors: Bjorkanism
    Victim Country: Uzbekistan
    Victim Industry: Sports
    Victim Organization: proliga
    Victim Site: proliga.uz
  8. Alleged data breach of FindNear
    Category: Data Breach
    Content: The group claims to have breached data from FindNear, compromised data contains Full Name, Phone number, Location, KYC photo, State.
    Date: 2026-01-08T12:38:00Z
    Network: telegram
    Published URL: https://t.me/bjorkaspirit/307
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/98fdb28c-392e-472b-9fad-61fd133a1feb.png
    Threat Actors: Bjorkanism
    Victim Country: Vietnam
    Victim Industry: Mechanical or Industrial Engineering
    Victim Organization: findnear
    Victim Site: findnear.vn
  9. Alleged data breach of French Federation of Mountaineering and Climbing
    Category: Data Breach
    Content: The threat actor claims to have breached 561,000 records belonging to the French Federation of Mountaineering and Climbing. The compromised data reportedly includes names, email addresses, physical addresses, and additional information. The data was allegedly leaked on January 6, 2026.
    Date: 2026-01-08T12:34:46Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FR-561K-F%C3%A9d%C3%A9ration-Fran%C3%A7aise-Montagnes-Escalade
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/890eaf37-c374-4056-aee6-d95fcb802bdf.png
    Threat Actors: HexDex2
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: french federation of mountaineering and climbing
    Victim Site: ffme.fr
  10. lxrdk1773n targets the website of Department of Health
    Category: Defacement
    Content: Group claims to have defaced the website of Department of Health
    Date: 2026-01-08T12:19:29Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224438
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/60d8815e-9cd6-4912-9144-7e23d9065976.JPG
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: department of health
    Victim Site: hpc11.go.th
  11. Alleged data breach of French Bridge Federation
    Category: Data Breach
    Content: The threat actor claims to have breached 262,000 records belonging to the French Bridge Federation.The compromised data includes name , address , id , email and more.The data was leaked on April 28, 2025.
    Date: 2026-01-08T12:16:37Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FR-262K-F%C3%A9d%C3%A9ration-Fran%C3%A7aise-Bridge
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/572c4ea5-52fb-4fc1-9814-72f676592796.png
    Threat Actors: HexDex2
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: french bridge federation
    Victim Site: ffbridge.fr
  12. Alleged data breach of Avantages Jeunes
    Category: Data Breach
    Content: The threat actor claims to have breached 282,906 records belonging to Avantages Jeunes. The compromised data reportedly includes name, address, ID, email address, and additional information.
    Date: 2026-01-08T12:14:14Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FR-AvantageJeunes-282K
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a7e4776b-ce31-4ebb-9c8d-cff971a6ad85.png
    Threat Actors: HexDex2
    Victim Country: France
    Victim Industry: Legal Services
    Victim Organization: avantages jeunes
    Victim Site: avantagesjeunes.com
  13. Alleged Unauthorised Access to an unidentified heating management system in the Czech Republic
    Category: Initial Access
    Content: The group claims to have gained alleged unauthorised access to an unidentified heating management system in the Czech Republic, The compromised system allegedly controls heat sources such as boilers, gas valves, and pumps, ensuring the circulation of hot water and the efficient operation of the system. It monitors indoor temperatures, the required temperature, outdoor temperature, and the temperature in hot water tanks.
    Date: 2026-01-08T12:07:58Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3216
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/551f1f1b-e544-468e-8cbf-5e4effe50718.JPG
    https://d34iuop8pidsy8.cloudfront.net/7865c348-7c53-4af4-af49-c63407189443.JPG
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Czech Republic
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Alleged data sale of French American Football Federation (FFFA)
    Category: Data Breach
    Content: “The threat actor claims to be selling 59 MB of data from the French American Football Federation (FFFA), allegedly containing names, dates of birth, email addresses, countries, and more.
    Date: 2026-01-08T11:56:25Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-FR-200K-F%C3%A9d%C3%A9ration-Fran%C3%A7aise-Football-Am%C3%A9ricain
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/732979dc-d72c-470b-a9c7-261d2e0b420c.png
    https://d34iuop8pidsy8.cloudfront.net/d5a68f77-996f-4690-8e6d-ee34e2ebd0ff.png
    Threat Actors: HexDex2
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: french american football federation
    Victim Site: fffa.org
  15. Alleged leak of Indonesian citizen pii data
    Category: Data Breach
    Content: The threat actor claims to have leaked the PII data of timothy ronald, an Indonesian citizen, allegedly containing his name, address, NIK, province, and other personal details.
    Date: 2026-01-08T11:53:44Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-Re-hello-Indonesian
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7b5458cb-2999-4266-9484-f29c9be71bf1.png
    Threat Actors: KX7
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Diparis targets the website of Integrated Foreign Trade Platform (Angola)
    Category: Defacement
    Content: Group claims to have defaced the website of Integrated Foreign Trade Platform (Angola).
    Date: 2026-01-08T11:42:17Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/223128
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4745813d-4556-44dc-99a5-109387cd3688.png
    Threat Actors: diparis
    Victim Country: Angola
    Victim Industry: Government Administration
    Victim Organization: integrated foreign trade platform
    Victim Site: at.pice.gov.ao
  17. Diparis targets the website of Muara Enim Regency Government
    Category: Defacement
    Content: Group claims to have defaced the website of Muara Enim Regency Government.
    Date: 2026-01-08T11:36:55Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/222911
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8350903e-054f-4702-9606-3b6f28252170.png
    Threat Actors: diparis
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: muara enim regency government
    Victim Site: desa-gunungagung.muaraenimkab.go.id
  18. Diparis targets the website of AgroPortal
    Category: Defacement
    Content: Group claims to have defaced the website of AgroPortal (Kyrgyzstan).
    Date: 2026-01-08T11:34:25Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/223143
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fe32a784-41a2-4f38-a782-5723c90ed45a.png
    Threat Actors: diparis
    Victim Country: Kazakhstan
    Victim Industry: Government Administration
    Victim Organization: agroportal
    Victim Site: portal.agrosmart.gov.kg
  19. 404 CREW CYBER TEAM targets the website of Gallagher Consulting Group Inc.
    Category: Defacement
    Content: The group claims to have defaced the website of Gallagher Consulting Group Inc.
    Date: 2026-01-08T11:13:18Z
    Network: telegram
    Published URL: https://t.me/crewcyber/505
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/71a9c8e5-bb71-4faa-a12d-0329992fd0fc.JPG
    Threat Actors: 404 CREW CYBER TEAM
    Victim Country: USA
    Victim Industry: Management Consulting
    Victim Organization: gallagher consulting group inc.
    Victim Site: gallagherinc.com
  20. TELSTAR CORPORATION falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained 194 GB of the organisations data.
    Date: 2026-01-08T11:01:49Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=bbf112b7-ebd3-38ab-8942-bf0dac31dcad
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5dc41aa2-69f2-45fd-9271-a4c3b274f2ad.JPG
    Threat Actors: Qilin
    Victim Country: South Korea
    Victim Industry: Mechanical or Industrial Engineering
    Victim Organization: telstar corporation
    Victim Site: telstar-hommel.com
  21. Hyfresh falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 240 GB of the organization’s data.
    Date: 2026-01-08T10:58:03Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=65d076c0-adba-3d45-874d-9e641a5d730d
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a4a31e22-b55b-415c-ba5f-9deeb176c2bf.jpg
    Threat Actors: Qilin
    Victim Country: Malaysia
    Victim Industry: Wholesale
    Victim Organization: hyfresh
    Victim Site: hyfresh.com.my
  22. Cressi falls victim to Qilin ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organisations data.
    Date: 2026-01-08T10:41:25Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=2fa58507-6b0f-3f07-8eed-42d7b1c952e5
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/78e2993e-7ea1-4245-b1ef-7a16744d2db9.JPG
    Threat Actors: Qilin
    Victim Country: Italy
    Victim Industry: Manufacturing
    Victim Organization: cressi
    Victim Site: cressi.com
  23. Alleged Unauthorised Access to the system in the Czech Republic
    Category: Initial Access
    Content: The group claims to have gained alleged unauthorised access to an unidentified heating management system in the Czech Republic, The compromised system allegedly allows to control monitor and control the building’s heating system, including adjusting temperature settings manually via a digital control panel and viewing real-time operational data for each boiler, such as outdoor temperature, indoor room temperature, estimated outdoor temperature, and water temperature in the pipeline after the boiler.
    Date: 2026-01-08T10:37:14Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3211
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/33bddc02-3d4c-478e-bc43-8f2559d79206.JPG
    https://d34iuop8pidsy8.cloudfront.net/78555e0b-cb40-4645-ac77-edeb8e78fe72.JPG
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Czech Republic
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged data breach of ASI
    Category: Data Breach
    Content: The threat actor claims to have leaked 8.4 million data from ASI
    Date: 2026-01-08T10:15:15Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-asi-fr-2024
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8173650d-2a54-4db8-86a4-8b875c3f49d0.png
    Threat Actors: Aimbot
    Victim Country: France
    Victim Industry: Information Technology (IT) Services
    Victim Organization: asi
    Victim Site: asi.fr
  25. Alleged Unauthorized Access to an Industrial HVAC Management System in the Czech Republic
    Category: Initial Access
    Content: The group claims to have accessed a HVAC management system at a large industrial facility in the Czech Republic, reportedly enabling control over temperature regulation, ventilation and airflow distribution, heating and cooling units, fans, thermal valves, and air disinfection modes used across production areas.
    Date: 2026-01-08T09:23:37Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3205
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e33d15c3-6ea4-42ad-9b5c-54ee363a65b8.png
    https://d34iuop8pidsy8.cloudfront.net/00fd1c08-3355-4ced-93ad-0d74c4ab3315.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Czech Republic
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. Alleged Unauthorized Access to One Window Service Office (OWSO) Administrative Systems in Cambodia
    Category: Initial Access
    Content: The group claims to have accessed the centralized administrative service system of a One Window Service Office (OWSO) in Cambodia, reportedly gaining visibility into systems supporting residency registration, ID card issuance, nationality services, and other citizen and small-business administrative functions.
    Date: 2026-01-08T09:21:07Z
    Network: telegram
    Published URL: https://t.me/EagleGodSEC/24
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cc23a7c4-1bbb-4640-859c-5e6984249358.png
    Threat Actors: EagleGodSEC
    Victim Country: Cambodia
    Victim Industry: Government Administration
    Victim Organization: one window service office
    Victim Site: owso.gov.kh
  27. Alleged data breach of Rucha Engineering Excellence
    Category: Data Breach
    Content: The threat actor claims to have breached data from Rucha Engineering Excellence
    Date: 2026-01-08T09:17:59Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SOURCE-CODE-Rucha-Engineers-Data-Breach-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0b1f6730-3bd7-451c-9cd8-d41c8588385f.png
    https://d34iuop8pidsy8.cloudfront.net/20a07bd6-10f2-4184-a664-f83f969eae67.png
    Threat Actors: 888
    Victim Country: India
    Victim Industry: Automotive
    Victim Organization: rucha engineering excellence
    Victim Site: rucha.co.in
  28. HonkSec targets the website of PTSN Vishwavidyalaya
    Category: Defacement
    Content: The group claims to have defaced the website of PTSN Vishwavidyalaya
    Date: 2026-01-08T09:09:36Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224436
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bc706954-c18b-4e73-a130-907469943839.JPG
    Threat Actors: HonkSec
    Victim Country: India
    Victim Industry: Information Technology (IT) Services
    Victim Organization: ptsn vishwavidyalaya
    Victim Site: ptsnsuonline.com
  29. Infrastructure Destruction Squad claims to target hospitals in Czech Republic
    Category: Alert
    Content: A recent post by the group indicates that they’re targeting hospitals in Czech Republic.
    Date: 2026-01-08T09:09:14Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3204
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7ab89e0d-df6f-428f-9aeb-48a8bf581d8e.jpg
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Czech Republic
    Victim Industry: Hospital & Health Care
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Alleged data breach of Grupo Red Salud
    Category: Data Breach
    Content: The group claims to have breached the data of Grupo Red Salud, allegedly including files, documents, including personal customer data (PII) and other important data.
    Date: 2026-01-08T08:19:35Z
    Network: telegram
    Published URL: https://t.me/Frontier_channel/232
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/28ca09c0-ae0a-4497-b1ef-f4f3521b917b.JPG
    Threat Actors: FRONTIER
    Victim Country: Peru
    Victim Industry: Insurance
    Victim Organization: grupo red salud
    Victim Site: gruporedsalud.com
  31. Alleged leak of Indonesian citizen pii data
    Category: Data Breach
    Content: The threat actor claims to have leaked the PII data of Nadiem Anwar Makarim, an Indonesian citizen, allegedly containing his name, address, NIK, province, and other personal details.
    Date: 2026-01-08T08:14:15Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-Re-NADIEM-ANWAR-MAKARIM
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ca1813c8-e8ee-440f-b4d7-6fbad2e25f21.png
    Threat Actors: KX7
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. WOLF CYBER ARMY targets the website of KangBagus.com
    Category: Defacement
    Content: The group claims to have defaced the website of KangBagus.com
    Mirror: https://defacer.id/mirror/id/224461
    Date: 2026-01-08T07:49:58Z
    Network: telegram
    Published URL: https://t.me/c/2670088117/412
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d00d21be-8fe3-42e4-ba7d-a62c41e51c34.png
    Threat Actors: WOLF CYBER ARMY
    Victim Country: Indonesia
    Victim Industry: Gambling & Casinos
    Victim Organization: kangbagus.com
    Victim Site: kangbagus.com
  33. Alleged access to unidentified surveillance cameras in USA
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to unidentified surveillance cameras in USA.
    Date: 2026-01-08T07:21:17Z
    Network: telegram
    Published URL: https://t.me/Golden_falcon_team/587
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6a52bc1e-aae5-424a-8fe2-ee439017b9af.jpg
    Threat Actors: Golden falcon
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged sale of 1200 CCs from Unidentified Hotel in Spain
    Category: Data Breach
    Content: The threat actor is offering to sell 1200 credit card records allegedly obtained from a hotel in Spain. The seller claims first-hand access, with the data linked to European cardholders and including standard card and holder details.
    Date: 2026-01-08T05:03:26Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273350/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/14956646-821e-459a-8d6b-e1f487e9c0fe.png
    Threat Actors: s4sori
    Victim Country: Spain
    Victim Industry: Hospitality & Tourism
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged Access to Wuhan University of Technology
    Category: Initial Access
    Content: The group claims to have gained access to Wuhan University of Technology
    Date: 2026-01-08T04:53:40Z
    Network: telegram
    Published URL: https://t.me/HackShyen/9
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c43b819d-5f7c-48d9-b95d-8f807cfe1b04.png
    Threat Actors: HackShyen
    Victim Country: China
    Victim Industry: Higher Education/Acadamia
    Victim Organization: wuhan university of technology
    Victim Site: whut.edu.cn
  36. Alleged Breach of OpenLoop Health
    Category: Data Breach
    Content: The threat actor claims to be leaked data from OpenLoop Health. The compromised data reportedly contain 1.6 million patients records including Full names, Email addresses, Phone numbers, Physical addresses, Dates of birth, IP addresses.
    Date: 2026-01-08T04:43:14Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-OpenLoopHealth-United-States-1-6M-Patients
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/36fc6d2f-a1d3-46c4-b85d-81cbe28fa239.png
    Threat Actors: stuckin2019
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: openloop health
    Victim Site: openloophealth.com
  37. Alleged Data Breach of THE STATE COUNCIL OF THE PEOPLE’S REPUBLIC OF CHINA
    Category: Data Breach
    Content: Threat actor claims to be leaking database of 1.2 billion Chinese citizen records, described as a full real-name registry compiled between 2016–2024. The dataset allegedly contains names, national IDs, phone numbers, addresses, dates of birth, GPS coordinates, and residence registration data. The actor claims the data originates from china.gov.cn–related systems, indicating potential exposure of government-linked infrastructure.
    Date: 2026-01-08T04:38:34Z
    Network: openweb
    Published URL: https://leakbase.la/threads/china-citizen-database-1-2b-records-with-names-ids-gps-mobile.48021/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/88301def-f83f-4c6e-8a33-1800d403b94a.png
    Threat Actors: show_more
    Victim Country: China
    Victim Industry: Government Administration
    Victim Organization: the state council of the people’s republic of china
    Victim Site: china.gov.cn
  38. PhantomSec1337 targets the website of D and D Custom Solutions
    Category: Defacement
    Content: The group claims to have defaced the website of D and D Custom Solutions
    Date: 2026-01-08T04:27:19Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224406
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e5cf4a25-cf38-462f-9ead-341e9f84dd13.png
    Threat Actors: PhantomSec1337
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: d and d custom solutions
    Victim Site: dndcustomsolutionsms.com
  39. Applied LNG falls victim to Black Nevas Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organization’s data.
    Date: 2026-01-08T04:03:39Z
    Network: tor
    Published URL: http://ctyfftrjgtwdjzlgqh4avbd35sqrs6tde4oyam2ufbjch6oqpqtkdtid.onion/publications/details/ece05613-086b-49db-a756-cc2e4f20bb89
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/7de52c80-37dc-4fd5-a82e-782f50f0f36f.png
    https://d34iuop8pidsy8.cloudfront.net/2bd47428-d4bf-4cba-bdf8-b7dc2da0be80.png
    https://d34iuop8pidsy8.cloudfront.net/84e86aae-2aa7-4556-98d4-b7fd22c77e8f.png
    https://d34iuop8pidsy8.cloudfront.net/fe333d20-7385-4b54-a051-7c2c7d9fe3df.png
    Threat Actors: Black Nevas
    Victim Country: USA
    Victim Industry: Oil & Gas
    Victim Organization: applied lng
    Victim Site: appliedlng.com
  40. PhantomSec1337 targets the website of B and K Hardwood Floor
    Category: Defacement
    Content: The group claims to have defaced the website of B and K Hardwood Floor
    Date: 2026-01-08T03:54:30Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224404
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8b513008-5401-46da-80a6-df25c6d982b6.png
    Threat Actors: PhantomSec1337
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: b and k hardwood floor
    Victim Site: bkhardwoodfloor.com
  41. SCHNEIDER PROTOTYPING INDIA PVT. LTD falls victim to BlackShrantac Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 1TB of organization’s data. The data include Human Resource and Account data, Financial Data,etc.
    Date: 2026-01-08T03:54:24Z
    Network: tor
    Published URL: http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/41
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ca4f9497-4e0d-4230-b9c2-a85b1391d941.png
    https://d34iuop8pidsy8.cloudfront.net/092dbe4a-db9d-4727-a47f-e9e8cd7465a5.png
    https://d34iuop8pidsy8.cloudfront.net/5ba77088-4022-49c7-a14e-ca3d047a7660.png
    Threat Actors: BlackShrantac
    Victim Country: India
    Victim Industry: Computer Software/Engineering
    Victim Organization: schneider prototyping india pvt. ltd
    Victim Site: si-smart.net
  42. National Water Authority falls victim to BlackShrantac Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 2 TB of organization’s data.
    Date: 2026-01-08T03:53:22Z
    Network: tor
    Published URL: http://jvkpexgkuaw5toiph7fbgucycvnafaqmfvakymfh5pdxepvahw3xryqd.onion/targets/40
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9e5e3f17-c0b0-45ed-92b2-63042c70d56b.png
    https://d34iuop8pidsy8.cloudfront.net/20660a81-0999-496f-99dc-f38381752107.png
    Threat Actors: BlackShrantac
    Victim Country: Peru
    Victim Industry: Government Administration
    Victim Organization: national water authority
    Victim Site: ana.gob.pe
  43. Alleged data leak of Ciputra‑owned private university network in Indonesia.
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Ciputra owned private university network in Indonesia. The compromised data reportedly contain 20,573 students records including Username, passwords, Full name, Birth dates, gender, religion, nationality, Email addresses, phone numbers.
    Date: 2026-01-08T03:42:32Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-Selling-Students-of-private-university-network-owned-by-Ciputra-in-Indonesia
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d648b7f5-d0a6-4636-a403-2ff04a3e3ad8.png
    Threat Actors: femboy
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  44. PhantomSec1337 targets the website of Black Flag Construction
    Category: Defacement
    Content: The group claims to have defaced the website of Black Flag Construction
    Date: 2026-01-08T03:17:35Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224403
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/81056a6d-6837-4a10-b1aa-f489fddaf18b.png
    Threat Actors: PhantomSec1337
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: black flag construction
    Victim Site: blackflagconstruction.com
  45. CyberOprationCulture targets the website of Para Service
    Category: Defacement
    Content: The group claims to have defaced the website of Para Service
    Date: 2026-01-08T02:53:43Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/34
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1ac7c81a-577e-4336-834f-318379c99d39.png
    Threat Actors: CyberOprationCulture
    Victim Country: Iran
    Victim Industry: Consumer Electronics
    Victim Organization: para service
    Victim Site: paraserviceco.com
  46. PhantomSec1337 targets the website of Brother Flooring Contractor
    Category: Defacement
    Content: The group claims to have defaced the website of Brother Flooring Contractor
    Date: 2026-01-08T02:45:21Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224405
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9a09cc20-1729-4bfb-b207-e1d104206435.png
    Threat Actors: PhantomSec1337
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: brother flooring contractor
    Victim Site: brotherflooringcontractor.com
  47. PhantomSec1337 targets the website of B & B Carpentry Inc
    Category: Defacement
    Content: The group claims to have defaced the website of B & B Carpentry Inc
    Date: 2026-01-08T01:46:42Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/224402
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ee8407ad-4ef8-49cd-84dd-2dbba56202e5.png
    Threat Actors: PhantomSec1337
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: b & b carpentry inc
    Victim Site: bandbcarpentryincma.com
  48. Alleged sale of Twitch account cookies
    Category: Data Breach
    Content: Threat actor claims to selling Twitch account cookies.
    Date: 2026-01-08T01:16:17Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-COLLECTION-TWITCH-ACCOUNT-COOKIE
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/54c0cf90-efa6-49ff-b778-09f63d069e7e.png
    Threat Actors: Bytefalco
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: twitch
    Victim Site: twitch.tv
  49. Alleged data leak of Indian students data
    Category: Data Breach
    Content: Threat actor claims to have leaked data of Indian students. The compromised data includes UserID, UserFirstName, FirstName, UserProfileImage, UserCoverPhoto, UserLastName, UserEmail, UserContactNo, UserPassword, UserAuthorizationToken, UserAccountActivationToken, UserGender, UserLocationName, UserCityName, Country, etc.
    Date: 2026-01-08T01:00:14Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-INDIAN-students-data
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0c3bcfc4-a514-4474-bc78-0789f636f3d9.png
    Threat Actors: crazyboy68
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged data breach of Lacoste S.A.
    Category: Data Breach
    Content: Threat actor claims to have leaked 12200 Line of source code and windows host file from Lacoste S.A.
    Date: 2026-01-08T00:56:34Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-LACOSTE-DATA-S
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5708a23d-9883-4f99-a4f0-fdd8ca43a7a5.png
    Threat Actors: LAPSUS-GROUP
    Victim Country: France
    Victim Industry: Fashion & Apparel
    Victim Organization: lacoste s.a.
    Victim Site: lacoste.com
  51. Alleged data breach of INPI
    Category: Data Breach
    Content: Threat actor claims to have leaked data from INPI. The compromised data reportedly contain 26 million records of Company Information and 6.5 million records of financial reports including Company registrations and identifiers, Legal status and modifications, Annual financial reports, Business activity classifications.
    Date: 2026-01-08T00:50:02Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-FR-180GB-26M-French-Company
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3492c1f5-5722-4173-a0a8-53977dc7be3c.png
    https://d34iuop8pidsy8.cloudfront.net/72dcb4fa-b0a1-47a8-8861-9d4f932696e8.png
    Threat Actors: HexDex2
    Victim Country: France
    Victim Industry: Other Industry
    Victim Organization: inpi
    Victim Site: inpi.fr
  52. Alleged data leak of Hanarologis
    Category: Data Breach
    Content: Threat actor claims to have leaked data from Hanarologis. The compromised data reportedly include Usernames, Passwords, IP addresses, Registration dates.
    Date: 2026-01-08T00:20:37Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-New-Leak-in-South-Korea-Database-hanarologis-co-kr%E2%AD%90%EF%B8%8F
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ef43f484-93af-43f2-b433-c3d66d9ace4c.png
    Threat Actors: AshleyWood2022
    Victim Country: South Korea
    Victim Industry: E-commerce & Online Stores
    Victim Organization: hanarologis
    Victim Site: hanarologis.co.kr