[January-14-2026] Daily Cybersecurity Threat Report

This detailed report analyzes the cyber incidents recorded on January 14, 2026, based strictly on the provided dataset. The data indicates a high volume of activity involving ransomware campaigns, government data leaks, and the sale of initial access to corporate networks.

Executive Summary

The dataset covers 143 distinct incidents, primarily occurring on January 14, 2026. The landscape is dominated by three primary threats: aggressive ransomware groups targeting the construction and financial sectors, significant data leaks affecting government bodies in Russia and Indonesia, and a thriving black market for unauthorized network access (RDP/VPN).+2


1. Major Ransomware Campaigns

Ransomware groups were highly active, utilizing “name-and-shame” tactics on Tor leak sites.

Key Threat Actors

  • Qilin: This group was particularly aggressive against US-based entities, claiming victims such as Lunsford Capital (Financial Services) , Pathology Associates of St. Thomas (Medical) , and Radiant Remodeling (Construction).+2
  • Akira: This group showed a specific focus on the construction and industrial sectors, claiming victims like Rebars & Mesh, Inc. and Fechner Pump & Supply Inc. (Oil & Gas), exposing sensitive employee and client data.+1
  • Payouts King: This group listed multiple “unknown” victims (identified only by initials like Ml or As) across Spain, the UK, and Germany, threatening to release hundreds of gigabytes of data within 6 days.+2

Notable Ransomware Incidents

  • National Auto Loan Network (USA): The Nova ransomware group claims to have obtained 600GB of data, with a threat to publish in 8-9 days.
  • Rogers Capital (Mauritius): The The Gentlemen ransomware group targeted this financial service firm, threatening publication within 3-4 days.
  • Samson Equipment, Inc. (USA): Targeted by TENGU ransomware, with 35.7 GB of data allegedly stolen.

2. Government and Critical Infrastructure Breaches

A significant portion of the data relates to the leakage of highly sensitive government and military documents.

  • Russian Ministry of Defence (MoD): A threat actor named jrintel claimed to leak classified documentation, including blueprints for Borei-Class Nuclear Submarines.+1
  • Indonesian Government: There was a massive surge in leaks targeting Indonesia.
    • Ministry of Religious Affairs: Sensitive administrative data and personnel records were leaked.+1
    • National Tax Data: Leaks included NPWP (Taxpayer Identification) records.
    • Journalists: Data regarding 20,000 Indonesian journalists was exposed.
  • Indian Railways: Employee databases from the Carriage Workshop Lallaguda and South Central Railway zone were leaked, exposing HRMS IDs, Aadhaar numbers, and contact details.+1
  • Ukraine: Data was leaked from the Concern for Radio Broadcasting, Radio Communications and Television, including technical documentation.
  • US Law Enforcement: A leak allegedly contains documents detailing how US Police detect forged documents.

3. Financial and Commercial Data Leaks

Large-scale databases from banks and corporations were traded or leaked on open web forums.

Banking and Finance

  • First Iraqi Bank: A claim of 1 million leaked records including phone numbers and ID numbers.
  • Chilean Credit Cards: A leak of nearly 2,000 credit card records from PatrickStash.
  • Trade Republic (Germany): A data breach reportedly exposed customer names, emails, and phone numbers.
  • Global Bank Leak: A threat actor claimed to leak databases from banks across the USA, Japan, UAE, and UK.

Corporate and Retail

  • U-Haul (USA): A database containing customer PII (emails, physical addresses, driver’s licenses) is allegedly for sale.
  • Sinch Mailgun: A threat actor claimed to leak a CRM database containing extensive customer lead and billing information.
  • Asahi Shimbun (Japan): A dataset of 1.8 million rows, including registered user emails from the news organization, was offered for sale.

4. Initial Access and Malware Markets

Threat actors actively sold “keys” to corporate networks, allowing other criminals to deploy ransomware or steal data.

  • Access for Sale:
    • Fortinet VPN Access: Unauthorized access to a US chemical manufacturing company with Domain Admin privileges.
    • RDP Access: Access to a Japanese IT company (3.8 TB of data) and a Portuguese industrial equipment company.+1
    • Government Access: Sales included access to the Saudi Arabia Government Postal System and Nigerian government websites.+1
  • Malware Tools:
    • SCULPTOR v1.1: A SQL injection exploitation tool was shared for scanning vulnerable websites.
    • NightSpire RaaS: A new Ransomware-as-a-Service program announced affiliate recruitment.

5. Hacktivism and Website Defacement

A high volume of website defacements was recorded, particularly targeting educational and government sites in Asia.

  • Targeted Countries: The majority of defacements targeted Indonesia (e.g., Universitas Negeri Surabaya ), India (e.g., Sanskarcity College ), and Bangladesh (e.g., Employees Welfare Board ).+2
  • Active Groups: Prominent defacement groups included CyberOprationCulture , Z-BL4CX-H4T , and GHOSTNET-X.+4

Conclusion

The intelligence from January 14, 2026, reveals a volatile cyber threat landscape. Ransomware actors like Qilin and Akira are aggressively targeting the construction and financial supply chains in Western nations. Simultaneously, state-related data is highly vulnerable, evidenced by the severe leaks of Russian military blueprints and Indonesian government records. Finally, the commoditization of access is rampant, with threat actors freely trading VPN and RDP access to critical sectors, lowering the barrier to entry for severe future attacks.

Detected Incidents Draft Data

  1. Alleged Data leak of PatrickStash
    Category: Data Breach
    Content: The threat actor leaked data from the PatrickStash CL database, exposing approximately 1,980 Chilean credit card records. The dataset allegedly includes credit card numbers, expiration dates, CVV codes, cardholder names, country, state, city, ZIP code, address, email addresses, and phone numbers.
    Date: 2026-01-14T23:51:07Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273814/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3a827a9a-336a-47a1-899a-ef98c211e9b7.png
    Threat Actors: buzz
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: patrickstash
    Victim Site: Unknown
  2. Alleged Data Breach of Money Mart
    Category: Data Breach
    Content: Threat actor claims to have leaked an internal database associated with National Money Mart Company. According to the post, the exposed data contains personal and internal company data from multiple countries, primarily the United States and Canada, comprising more than 80,000 internal files.
    Date: 2026-01-14T23:49:58Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273821/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e75c46a9-6820-4d24-9923-2cd4969de8a9.png
    Threat Actors: Everestgroup
    Victim Country: Canada
    Victim Industry: Financial Services
    Victim Organization: money mart
    Victim Site: moneymart.ca
  3. Alleged data breach of First Iraqi Bank
    Category: Data Breach
    Content: The group claims to have leaked 1M records belonging to First Iraqi Bank. The compromised data reportedly includes Subscriber Name, Province, Activation Status, Phone Number, Date of Birth, ID Number.
    Date: 2026-01-14T23:34:23Z
    Network: telegram
    Published URL: https://t.me/c/3667951656/1531
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/91de626a-5962-44eb-ad2e-19e831ca64df.png
    Threat Actors: BFRepoV4Files
    Victim Country: Iraq
    Victim Industry: Financial Services
    Victim Organization: first iraqi bank
    Victim Site: fib.iq
  4. Alleged Data Breach of Notin.es
    Category: Data Breach
    Content: Threat actor claims to have leaked a large database associated with Notin.es, containing approximately 145 GB of sensitive data. The dataset reportedly includes scanned national identity documents (DNI), passports, foreign identification numbers (NIE), notarial deeds, tax documents, financial records, residential addresses, property and cadastral data, IBANs, invoices, wills, and other highly sensitive personal and legal information.
    Date: 2026-01-14T23:31:40Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273820/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ec442402-40a5-44bb-95f4-fa7c386a15db.png
    Threat Actors: Everestgroup
    Victim Country: Spain
    Victim Industry: Information Technology (IT) Services
    Victim Organization: notin.es
    Victim Site: notin.es
  5. Alleged sale of unauthorized admin access to an unidentified organization in Denmark
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to an unidentified organization in Denmark.
    Date: 2026-01-14T23:10:14Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273817/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e9e1b6be-8711-44df-b559-1213aa59e42b.png
    Threat Actors: personX
    Victim Country: Denmark
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged Data breach of Sinch Mailgun
    Category: Data Breach
    Content: The threat actor leaked data from a Sinch/Mailgun CRM database, exposing extensive customer and lead records. The dataset includes names, email addresses, phone numbers, company and job details, customer lifecycle and lead status information, marketing and campaign activity, engagement metrics, opt-in/opt-out preferences, billing and revenue fields, IP and location data, timestamps, and CRM automation data.

NB: Authenticity of claim is yet to be verified
Date: 2026-01-14T23:04:35Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/273815/
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/2da42022-60ec-455a-ae2a-6be33ebe672e.png
https://d34iuop8pidsy8.cloudfront.net/99feb95d-dae8-4943-926e-549a833331f7.png
Threat Actors: iwillneverlose
Victim Country: USA
Victim Industry: Software Development
Victim Organization: sinch mailgun
Victim Site: mailgun.com

  1. Alleged Data Breach of 3Commas Technologies
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of 3Commas Technologies in British Virgin Islands.
    Date: 2026-01-14T22:28:05Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273807/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0dd771dc-9e64-4c8e-b5fd-4dc789c818ad.png
    Threat Actors: iwillneverlose
    Victim Country: British Virgin Islands
    Victim Industry: Financial Services
    Victim Organization: 3commas technologies
    Victim Site: 3commas.io
  2. Alleged data breach of Sameday
    Category: Data Breach
    Content: The threat actor claims to be selling a database associated with Sameday, a Romanian courier and delivery services company. The allegedly compromised dataset reportedly contains approximately 46,000 records in TXT format. exposed data fields include full names, email addresses, phone numbers, user and internal IDs, postal codes, cities/localities, counties, full physical addresses, company names, tax identification numbers, trade registry numbers, bank names, and bank account identifiers.
    Date: 2026-01-14T22:22:52Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Sameday-Leaked-46k
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/04b39fb0-13c7-497e-8051-fdf7b66b4ae7.png
    Threat Actors: lemonhazed
    Victim Country: Romania
    Victim Industry: Transportation & Logistics
    Victim Organization: sameday
    Victim Site: sameday.ro
  3. Alleged data breach of Ministry of Defence of the Russian Federation (MoD)
    Category: Data Breach
    Content: The threat actor claims to have leaked classified documentation associated with the Ministry of Defence of the Russian Federation (MoD).The leaked The leak data containing highly sensitive national security information.
    Date: 2026-01-14T22:11:08Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DOCUMENTS-RUSSIA-STATE-SECRET-MoD-Borei-Class-Nuclear-Submarine-Blueprints-Docs-Leaked
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4ce9e3c-4e5c-4bd2-8384-c56551fbfbd8.png
    Threat Actors: jrintel
    Victim Country: Russia
    Victim Industry: Defense & Space
    Victim Organization: ministry of defence of the russian federation (mod)
    Victim Site: eng.mil.ru
  4. Alleged data breach of Rafeeg
    Category: Data Breach
    Content: The group claims to have leaked 40,000 records belonging to Rafeeg. The exposed data allegedly include provider names, provider phone numbers, client names, client phone numbers, service descriptions, city and address details, service types, and pricing information.
    Date: 2026-01-14T22:05:54Z
    Network: telegram
    Published URL: https://t.me/c/3667951656/1504
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9d6d1097-ae19-4f64-ac8d-7adea2082cda.png
    Threat Actors: BFRepoV4Files
    Victim Country: UAE
    Victim Industry: Professional Services
    Victim Organization: rafeeg
    Victim Site: news.rafeeg.ae
  5. Samson Equipment, Inc. falls victim to TENGU Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 35.7 GB of the organization’s data and they intend to publish it within 7-8 days.
    Date: 2026-01-14T22:01:37Z
    Network: tor
    Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/b15894372ddbb2ea10962a5ec4eaab9594a0406f9ce1d66c7db3c9e23ef52003/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f0bfaafe-0e43-46fc-bc00-9c1b4a721280.png
    https://d34iuop8pidsy8.cloudfront.net/6e320669-b249-4646-a6ed-d88762a489ae.png
    Threat Actors: TENGU
    Victim Country: USA
    Victim Industry: Sporting Goods
    Victim Organization: samson equipment, inc.
    Victim Site: samsonequipment.com
  6. Alleged leak of Russian MoD Borei-Class Submarine blueprints and documents
    Category: Data Breach
    Content: The group claims to have leaked blueprints and documents of Borei-Class Nuclear Submarine
    Date: 2026-01-14T21:58:18Z
    Network: telegram
    Published URL: https://t.me/topsecretdocumentsleaked/217
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2e794766-0767-4981-818d-19d30ed44b38.jpg
    Threat Actors: jrintel
    Victim Country: Russia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged data breach of Astral Hotels
    Category: Data Breach
    Content: The group claims to have leaked 80,000 records belonging to Astral Hotels in Israel. The exposed data allegedly include user information, hotel and room identifiers, pricing details, guest names, phone numbers, email addresses, country codes, and payment‑related fields such as credit card tokens and approval indicators.
    Date: 2026-01-14T21:53:12Z
    Network: telegram
    Published URL: https://t.me/c/3667951656/1211
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ac7fe7f9-1118-487c-921e-9f8401a5dd02.png
    Threat Actors: BFRepoV4Files
    Victim Country: Israel
    Victim Industry: Hospitality & Tourism
    Victim Organization: astral hotels
    Victim Site: astralhotels.co.il
  8. Rogers Capital falls victim to The Gentlemen Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organization’s data and intend to publish it within 3-4 days.
    Date: 2026-01-14T21:47:17Z
    Network: tor
    Published URL: http://tezwsse5czllksjb7cwp65rvnk4oobmzti2znn42i43bjdfd2prqqkad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eeaa3a28-e605-4d3f-9127-451c0885232d.png
    Threat Actors: The Gentlemen
    Victim Country: Mauritius
    Victim Industry: Financial Services
    Victim Organization: rogers capital
    Victim Site: rogerscapital.mu
  9. Alleged Sale of Unauthorized Fortinet VPN Access to a Chemical Manufacturing Company in USA
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized Fortinet VPN access to a U.S.-based manufacturing company in the chemicals and related products sector, allegedly providing Domain Administrator privileges.
    Date: 2026-01-14T21:35:33Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273804/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/266957fb-46a7-41f5-a297-47cb4c77bf7e.png
    Threat Actors: glebasik
    Victim Country: USA
    Victim Industry: Chemical Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged sale of unauthorized access to unidentified hotel in Yusa
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified hotel in Yusa.
    Date: 2026-01-14T21:06:11Z
    Network: openweb
    Published URL: https://forum.duty-free.cc/threads/6281/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/afc58869-62a5-464e-8dd9-1561cbefe7a6.png
    Threat Actors: Orpheus
    Victim Country: Unknown
    Victim Industry: Hospitality & Tourism
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Alleged data breach of Asahi Shimbun
    Category: Data Breach
    Content: The threat actor claims to be selling a high-quality database allegedly sourced from asahi.com, belonging to the Japanese news organization Asahi Shimbun. The dataset is described as containing approximately 1.8 million rows and includes registered user email addresses, along with metadata and internal news archive records.
    Date: 2026-01-14T20:59:25Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-1-8m-Japan-asahi-com-News-Archive-Internal-Backend-DB-Registered-User-Emails
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9181d293-77c5-44f5-96e6-e30994cd5824.png
    Threat Actors: Bestjpdata1
    Victim Country: Japan
    Victim Industry: Newspapers & Journalism
    Victim Organization: asahi shimbun
    Victim Site: asahi.com
  12. Alleged sale of unauthorized access to unidentified food distributor and retailer company
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified regional food production, distributor and retailer company.
    Date: 2026-01-14T20:48:37Z
    Network: openweb
    Published URL: https://forum.duty-free.cc/threads/6281/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ed0008f8-cd55-4a0d-a48d-f6dd8afd7a49.png
    Threat Actors: Orpheus
    Victim Country: Unknown
    Victim Industry: Food Production
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged data breach of Astore
    Category: Data Breach
    Content: The threat actor claims to be selling a database associated with Astore an e-commerce platform. The allegedly compromised dataset reportedly contains approximately 213,000 records in TXT format. The exposed data fields include email addresses, billing first and last names, phone and mobile numbers, city, ZIP/postal codes, state or province, physical addresses, and fax numbers.
    Date: 2026-01-14T20:42:39Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-ASTORE-Leaked-213k
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d94ee967-a00d-4a19-bec5-fcc5195b33cb.png
    Threat Actors: lemonhazed
    Victim Country: Pakistan
    Victim Industry: E-commerce & Online Stores
    Victim Organization: astore
    Victim Site: astore.pk
  14. Alleged sale of unauthorized access to unidentified organization from Iraq
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified non-profit organization from Iraq.
    Date: 2026-01-14T20:42:02Z
    Network: openweb
    Published URL: https://forum.duty-free.cc/threads/6281/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1a3aa4af-58e2-4e8b-83f2-6516509cdcf6.png
    Threat Actors: Orpheus
    Victim Country: Iraq
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged Data Leak of Hentairox
    Category: Data Breach
    Content: Threat Actor claims to have leaked the database of Hentairox, which contains 224271 lines of user, passhash and e-mails.
    Date: 2026-01-14T20:38:50Z
    Network: openweb
    Published URL: https://leakbase.la/threads/hentairox-com-224271-lines-user-passhash-e-mail.48189/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9c46f33c-9831-4458-b909-e81bec264288.png
    Threat Actors: impierator
    Victim Country: Unknown
    Victim Industry: Entertainment & Movie Production
    Victim Organization: hentairox
    Victim Site: hentairox.com
  16. Lunsford Capital
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-14T20:27:30Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=5b47567c-14d4-3f2f-9ce5-322925242ffc
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/229b8cac-3920-443d-8244-fbec83e794a5.png
    https://d34iuop8pidsy8.cloudfront.net/9b02a84a-c888-4c96-9e01-80592e0e572c.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: lunsford capital
    Victim Site: lunsfordcapital.com
  17. Payouts King Ransomware group adds an unknown victim (Ml)
    Category: Ransomware
    Content: The group claims to have obtained 218 GB of organization’s data and they intend to publish it within 6 days.
    Date: 2026-01-14T20:25:00Z
    Network: tor
    Published URL: https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a9dd8e24-466e-460c-b756-e4fc763821d8.png
    Threat Actors: Payouts King
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: ml
    Victim Site: w.es
  18. Alleged data sale of Mundivox Communications
    Category: Data Breach
    Content: Threat actor claims to be selling leaked database of Mundivox Communications, Brazil. The compromised data reportedly includes Internal emails , Employees, HR, Finances data and internal documents gathered from hosts and emails.
    Date: 2026-01-14T20:18:38Z
    Network: openweb
    Published URL: https://bhf.pro/threads/718338/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f4627706-407f-4618-84a1-87a6f22e81da.png
    https://d34iuop8pidsy8.cloudfront.net/34e92bb6-3941-4451-8a54-85a414571f36.png
    Threat Actors: bytetobreach
    Victim Country: Brazil
    Victim Industry: Network & Telecommunications
    Victim Organization: mundivox communications
    Victim Site: mundivox.com
  19. Alleged Data Leak of Bank Databases from Multiple Countries
    Category: Data Breach
    Content: Threat Actor claims to have leaked bank databases from multiple countries such as USA, Japan, UAE, UK, Switzerland, etc.
    Date: 2026-01-14T20:12:01Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273776/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0ee38c19-1a60-451a-b749-be51c1798e44.png
    Threat Actors: Ric1986
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged Sale of Health & Nutrition Customer Database in USA
    Category: Data Breach
    Content: Threat Actor claims to be selling Health & Nutrition Customer Database in USA. The dataset reportedly contains over 53,000 user records, including names, work email addresses, phone numbers, account creation details, and last activity timestamps.
    Date: 2026-01-14T20:09:49Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273799/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/00224e07-4499-47a7-a6d3-2ccfcec20e1a.png
    Threat Actors: GeeksforGeeks
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Payouts King Ransomware group adds an unknown victim (As)
    Category: Ransomware
    Content: The group claims to have obtained 2.1 TB of organization’s data and they intend to publish it within 6 days.
    Date: 2026-01-14T20:00:58Z
    Network: tor
    Published URL: https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4d52fbe3-6c4e-4ae4-a235-667a88a254ad.png
    Threat Actors: Payouts King
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: as
    Victim Site: w.com
  22. Payouts King Ransomware group adds an unknown victim (Bp)
    Category: Ransomware
    Content: The group claims to have obtained 832 GB of organization’s data and they intend to publish it within 6 days.
    Date: 2026-01-14T19:59:12Z
    Network: tor
    Published URL: https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/03956587-ef2d-400c-8fac-8a3f90a0653b.png
    Threat Actors: Payouts King
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: bp
    Victim Site: w.uk
  23. Payouts King Ransomware group adds an unknown victim (Ag)
    Category: Ransomware
    Content: The group claims to have obtained 520 GB of organization’s data and they intend to publish it within 6 days.
    Date: 2026-01-14T19:56:00Z
    Network: tor
    Published URL: https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c94fd03e-c7cf-476f-a78a-a03db01e7b5e.png
    Threat Actors: Payouts King
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: ag
    Victim Site: w.de
  24. Payouts King Ransomware group adds an unknown victim (VS)
    Category: Ransomware
    Content: The group claims to have obtained 625 GB of organization’s data and they intend to publish it within 6 days.
    Date: 2026-01-14T19:55:52Z
    Network: tor
    Published URL: https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5002ee0f-51e5-4a98-856e-349bbb894fb1.png
    Threat Actors: Payouts King
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: vs
    Victim Site: v.com
  25. Alleged data leak of Learniverse
    Category: Data Breach
    Content: The threat actor leaked a data from Learniverse an online training and education platform. The compromised dataset allegedly includes user account and profile information. Exposed data fields shown in samples include user IDs, full names, first and last names, email addresses, occupations, user roles, account creation timestamps, internal authentication identifiers, academy or organization IDs, and profile metadata.
    Date: 2026-01-14T19:43:53Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-learniverse-app
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/3638dcc9-7283-4255-adc9-fcf34b75a569.png
    Threat Actors: p0ppin
    Victim Country: Unknown
    Victim Industry: E-Learning
    Victim Organization: learniverse
    Victim Site: learniverse.app
  26. Alleged data leak of Multiple French Sports Federations
    Category: Data Breach
    Content: The threat actor claims to be sharing a database related to multiple French sports federations. The exposed data allegedly includes personal information of athletes and members, such as full names, dates of birth, email addresses, postal addresses, phone numbers, sport affiliations, federation identifiers, and discipline-specific records.
    Date: 2026-01-14T19:31:00Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-French-Federation-of-sports
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6f3130f1-4482-4a93-b73f-0f5eadec037b.png
    Threat Actors: Meower201
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Alleged data sale of Indonesian passports
    Category: Data Breach
    Content: The threat actor is offering to sell 45 million Indonesian passports. The exposed data is said to include passport and document identifiers, document type and status, expiration dates, full names, dates of birth, gender, and record creation and update timestamps, with sample entries shared to demonstrate structure
    Date: 2026-01-14T19:28:19Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast3/70
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/50e1ce33-431a-4865-8af5-2059ca07c7ff.jpg
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Alleged Data Leak of Gambling Database in Thailand
    Category: Data Breach
    Content: Threat Actor claims to have leaked a gambling database in Thailand containing approximately 110,000 records, including source, username, last login info, name, status, contact number, email, date of birth, and country.
    Date: 2026-01-14T19:27:34Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273774/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c629f1ed-d9b6-4248-8111-eaadbb4891cf.png
    Threat Actors: Ric1986
    Victim Country: Thailand
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Payouts King Ransomware group adds an unknown victim (Lp)
    Category: Ransomware
    Content: The group claims to have obtained 411 GB of organization’s data and they intend to publish it within 6 days.
    Date: 2026-01-14T19:24:25Z
    Network: tor
    Published URL: https://payoutsgn7cy6uliwevdqspncjpfxpmzgirwl2au65la7rfs5x3qnbqd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cd725fca-608c-4751-aed8-f40b63fac205.png
    Threat Actors: Payouts King
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: lp
    Victim Site: l.com
  30. Alleged Sale of Unauthorized WP-Admin and Shell Access to Taiwanese E-Commerce Platform
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized shell and WordPress administrator access to a Taiwan-based e-commerce service described as a Shopify analogue. The access allegedly allows modification of shared source code used by 46 online shops, impacting all connected stores simultaneously.
    Date: 2026-01-14T19:06:36Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273791/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ca6c4f54-d54b-46de-8504-4addc2a3b5ac.png
    Threat Actors: room
    Victim Country: Taiwan
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data leak of Indonesian journalists data
    Category: Data Breach
    Content: A threat actor claims to have leaked data belonging to Indonesian journalists . The leaked dataset contains over 20,000 records and is distributed in CSV format the compromised information reportedly includes journalists’ full names, affiliated media organizations, certificate details, testing or accreditation institutions, and professional certification levels.
    Date: 2026-01-14T18:58:27Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-20-000-Indonesian-Journalists-Data-Breached
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/00719d05-38b5-4877-a714-72c0ad24679f.png
    Threat Actors: AYYUBI
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged Sale of Unauthorized RDP Access to IT & Software Company in Japan
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized RDP and shell access to an IT and software company in Japan, allegedly providing Domain Administrator and SYSTEM-level privileges across multiple hosts. The access reportedly includes control over file servers and NAS systems containing more than 3.8 TB of sensitive internal, personal, and client data.
    Date: 2026-01-14T18:56:07Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273772/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5d1aa81b-bcb0-411c-98bb-498828c59dcb.png
    Threat Actors: Saturned33
    Victim Country: Japan
    Victim Industry: Information Technology (IT) Services
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged leak of login credentials to Leverage Entrepreneur Program
    Category: Initial Access
    Content: The group claims to have leaked login credentials to the website of Leverage Entrepreneur Program in UK
    Date: 2026-01-14T18:53:50Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/681
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/445f4d42-6212-44ca-9482-baf815d00400.png
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: UK
    Victim Industry: Program Development
    Victim Organization: leverage entrepreneur program
    Victim Site: leverage.site.uk
  34. Alleged data breach of Dolce Care
    Category: Data Breach
    Content: The threat actor claims to be selling a database belonging to Dolce Care. The allegedly compromised data consists of approximately 51,000+ records and includes order and customer-related information.
    Date: 2026-01-14T18:53:01Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-dolcecare-pt-51-1K-users
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f0ce3956-bca1-47dd-b3d9-814e0fc1e7f9.png
    Threat Actors: rennn
    Victim Country: Portugal
    Victim Industry: E-commerce & Online Stores
    Victim Organization: dolce care
    Victim Site: dolcecare.pt
  35. Alleged data leak of Indian Railways
    Category: Data Breach
    Content: A threat actor claims to have exposed data associated with cwslgds.in, a railway maintenance facility operating under Indian Railways, specifically within the South Central Railway zone. The compromised data allegedly includes employee numbers, full names, HRMS IDs, UMID numbers, ticket numbers, employment type, designations, departments, pay groups, official and personal mobile numbers, email addresses, dates of birth, dates of appointment and retirement, gender, community, blood group, disability status, father’s name, permanent and present addresses, educational qualifications, Aadhaar numbers, PAN numbers, e-card details, and record creation timestamps.
    Date: 2026-01-14T18:30:50Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-cwslgds-in-2-7k-Indian-Railways
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c73a2279-df2d-47d8-a7a8-6314389d0551.png
    Threat Actors: colin
    Victim Country: Unknown
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged data breach of Cordogan Clark Group
    Category: Data Breach
    Content: A threat actor claims to have compromised a database belonging to Cordogan Clark Group. The exposed data is reportedly available in CSV and BIN formats, with sample files provided by the actor as proof of access.
    Date: 2026-01-14T18:22:06Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Cordogan-Clark-database-breach
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f2f2c82d-1e15-4009-8cee-187bc09c2014.png
    Threat Actors: AYYUBI
    Victim Country: USA
    Victim Industry: Architecture & Planning
    Victim Organization: cordogan clark group
    Victim Site: cordoganclark.com
  37. Alleged leak of login credentials to Sitenger Kabupaten Cirebon
    Category: Initial Access
    Content: The group claims to have leaked login credentials to the electronic signature platform of Sitenger Kabupaten Cirebon
    Date: 2026-01-14T18:18:00Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast3/41
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/23dfbff8-f26c-43ff-a389-d26db915c439.png
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: sitenger kabupaten cirebon
    Victim Site: sitenger.cirebonkab.go.id
  38. Alleged data breach of Almaex
    Category: Data Breach
    Content: A threat actor claims to have leaked a database belonging to Almaex, an Iran-based cryptocurrency exchange platform.
    Date: 2026-01-14T18:13:02Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-IRAN-almaex-net-Leaked-Download
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/81ca52e7-3748-44fe-839e-08b2fd424298.png
    Threat Actors: lulzintel
    Victim Country: Iran
    Victim Industry: Financial Services
    Victim Organization: almaex
    Victim Site: almaex.net
  39. Alleged leak of NPWP records from Indonesia
    Category: Data Breach
    Content: The group claims to have leaked multiple Indonesian NPWP (Nomor Pokok Wajib Pajak) records, containing unique taxpayer identification data tied to different regional tax offices. The exposed data also includes national identity numbers, full names, residential addresses, assigned tax offices, and registration metadata.
    Date: 2026-01-14T17:48:51Z
    Network: telegram
    Published URL: https://t.me/CinCauGhast3/42?single
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ea2e1552-dbdc-439b-a7e1-f3264dd028b6.png
    https://d34iuop8pidsy8.cloudfront.net/857560c3-31fd-4957-8260-7fa677721185.png
    https://d34iuop8pidsy8.cloudfront.net/22f8195f-eed8-4e1f-9377-58849d9bc303.png
    Threat Actors: CinCauGhast
    Victim Country: Indonesia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Nicotine targets the website of Dubai Safari Tours
    Category: Defacement
    Content: Group claims to have defaced the website of Dubai Safari Tours.
    Date: 2026-01-14T17:41:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/780953
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e13d53c4-1aae-4ac5-816e-5cb74d641770.png
    Threat Actors: Nicotine
    Victim Country: UAE
    Victim Industry: Hospitality & Tourism
    Victim Organization: dubai safari tours
    Victim Site: dubaisafaritours.ae
  41. Alleged leak of login credentials to RicBuy
    Category: Initial Access
    Content: The group claims to have leaked the login credentials to RicBuy
    Date: 2026-01-14T17:41:25Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/682
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0246f26e-cd7d-4b7f-b706-cea98e9c0a27.jpg
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: Spain
    Victim Industry: E-commerce & Online Stores
    Victim Organization: ricbuy
    Victim Site: ricbuy.com
  42. Alleged leak of login credentials to Utrainy
    Category: Initial Access
    Content: The group claims to have leaked the login credentials to Utrainy
    Date: 2026-01-14T17:25:20Z
    Network: telegram
    Published URL: https://t.me/c/2433981896/683
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fb8d9a30-c5b3-4506-863b-302c55405f1a.jpg
    Threat Actors: DEFACER INDONESIAN TEAM
    Victim Country: Algeria
    Victim Industry: Education
    Victim Organization: utrainy
    Victim Site: utrainy.com
  43. National Auto Loan Network falls victim to Nova Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 600GB of the organization’s data and intend to publish within 8 to 9 days.
    Date: 2026-01-14T17:23:47Z
    Network: tor
    Published URL: http://novadmrkp4vbk2padk5t6pbxolndceuc7hrcq4mjaoyed6nxsqiuzyyd.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2bfeb429-6a9f-474d-ae8b-27ca6aeb9bee.png
    Threat Actors: Nova
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: national auto loan network
    Victim Site: naln.com
  44. Alleged Sale of Unauthorized RDP Access to an Industrial Equipment Company in Portugal
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized RDP and shell access with Domain Administrator and SYSTEM-level privileges to an industrial equipment company in Portugal. The access reportedly includes control over file servers and NAS systems containing more than 8.7 TB of sensitive internal, personal, and client data.
    Date: 2026-01-14T17:17:55Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/273752/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d750f45e-f513-4579-91b7-51d7fb636a73.png
    Threat Actors: Saturned33
    Victim Country: Portugal
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: Unknown
    Victim Site: Unknown
  45. DimasHxR targets the website of Bhima Jewellers, UAE
    Category: Defacement
    Content: Group claims to have defaced the website of Bhima Jewellers, UAE.
    Date: 2026-01-14T17:12:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/777635
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/df9d40c6-870a-4544-ac0e-db86e4330846.png
    Threat Actors: DimasHxR
    Victim Country: UAE
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: bhima jewellers
    Victim Site: bhima.ae
  46. Pathology Associates of St. Thomas (PAST) falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-14T17:06:25Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=33fc705f-89ed-3b7b-8143-e38a6d5bb76f
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b0a3552f-7ded-4335-ad1a-93d909ed8f83.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Medical Practice
    Victim Organization: pathology associates of st. thomas (past)
    Victim Site: pastdermpath.com
  47. Radiant Remodeling falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-14T17:04:58Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=ae93eb76-94ee-3540-a58b-ff790710941f
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a9f03d2b-22b8-4770-b30c-b134d8428203.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: radiant remodeling
    Victim Site: radiantremodelingllc.com
  48. Alleged data leak of Coinspark.cc
    Category: Data Breach
    Content: A threat actor has reposted a dataset allegedly originating from Coinspark.cc. The leaked information reportedly includes IP addresses and details related to coins created on the platform.
    Date: 2026-01-14T17:04:23Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-Repost-Coinspark-cc
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9ea5e4d2-e5a4-42a9-92c0-9b07c31c8941.png
    Threat Actors: Glowie
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: coinspark.cc
  49. Designers Mirror and Glass, Inc. falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-14T17:03:25Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=e7061f15-969a-3769-a59b-90829dc37afc
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ff247ca2-10b8-4220-950d-350164e29166.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: designers mirror and glass, inc.
    Victim Site: designersmirror.com
  50. Z-BL4CX-H4T targets the website of EXPERT MAX INDIA (EMI)
    Category: Defacement
    Content: The group claims to have defaced the website of EXPERT MAX INDIA (EMI)
    Date: 2026-01-14T17:01:28Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/3
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/99c4066c-d6fc-4b11-bfcd-d3484187518f.png
    Threat Actors: Z-BL4CX-H4T
    Victim Country: India
    Victim Industry: Professional Training
    Victim Organization: expert max india (emi)
    Victim Site: emiorg.com
  51. Pre-Con Builders falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 515 GB of the organizations data.
    Date: 2026-01-14T16:52:49Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=4e08b6e9-f9b0-38ab-a337-306bfbaee812
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d1d31502-e310-4f33-8791-00595b55f4ab.png
    Threat Actors: Qilin
    Victim Country: Canada
    Victim Industry: Building and construction
    Victim Organization: pre-con builders
    Victim Site: preconbuilders.com
  52. Alleged data breach of Kementerian Agama Republik Indonesia
    Category: Data Breach
    Content: A threat actor claims to have leaked data allegedly originating from the Kementerian Agama Republik Indonesia (Ministry of Religious Affairs of Indonesia). The compromised database reportedly contains sensitive personal and administrative information related to ministry programs and services, including records associated with religious assistance programs, institutional data, educators and religious personnel, and other public religious services.
    Date: 2026-01-14T16:49:16Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-DATABASE-KEMENTERIAN-AGAMA-INDONESIA
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5760e53f-bb04-4181-8f41-68c58d2010ad.png
    Threat Actors: aiyewumi
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kementerian agama republik
    Victim Site: kemenag.go.id
  53. Ernest Maier, Inc falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-14T16:48:06Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=11f6e466-b8c7-3359-994b-7f7fe71db139
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/885886fe-1642-4c3f-b193-a7a577277556.png
    Threat Actors: Qilin
    Victim Country: USA
    Victim Industry: Wholesale
    Victim Organization: ernest maier, inc
    Victim Site: ernestmaier.com
  54. Gtech falls victim to Qilin Ransomware
    Category: Ransomware
    Content: The group claims to have obtained the organizations data.
    Date: 2026-01-14T16:45:09Z
    Network: tor
    Published URL: http://ijzn3sicrcy7guixkzjkib4ukbiilwc3xhnmby4mcbccnsd7j2rekvqd.onion/site/view?uuid=42e05b39-7cea-35c3-ba31-daddc518faae
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/eb529573-3340-4728-880b-b1571fb28b2e.png
    Threat Actors: Qilin
    Victim Country: UK
    Victim Industry: Electrical & Electronic Manufacturing
    Victim Organization: gtech
    Victim Site: gtech.co.uk
  55. Alleged data leak of Ministry of Religious Affairs of Indonesia
    Category: Data Breach
    Content: A threat actor claims to be selling data allegedly obtained from the Directorate of Islamic Education under the Ministry of Religious Affairs of Indonesia. The compromised data reportedly includes sensitive personal information such as National Identification Numbers (NIK), Family Card Numbers (KK), full names, residential addresses, email addresses, phone numbers, and related records associated with educators, institutions, and assistance programs.
    Date: 2026-01-14T16:39:19Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-DATABASE-KEMENTRIAN-AGAMA-INDONESIA
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6e7ee4c4-4cd6-4963-b87a-faed3181b5ed.png
    Threat Actors: LolForum
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  56. DimasHxR targets the website of Dubai Safari Tours
    Category: Defacement
    Content: Group claims to have defaced the website of Dubai Safari Tours.
    Date: 2026-01-14T16:39:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/780953
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e13d53c4-1aae-4ac5-816e-5cb74d641770.png
    Threat Actors: DimasHxR
    Victim Country: UAE
    Victim Industry: Hospitality & Tourism
    Victim Organization: dubai safari tours
    Victim Site: dubaisafaritours.ae
  57. Alleged unauthorized access to an unidentified chiller management system in the Czech Republic
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a chiller management system in the Czech Republic, allegedly used to control a central refrigeration unit supporting industrial and commercial cooling operations. According to the claim, the system (identified as a SINOP31 model) was observed operating in normal mode, with active control over cooling temperatures, load levels, compressor performance, energy consumption, pressure and temperature parameters, and operational statistics, with both local and remote control capabilities available
    Date: 2026-01-14T16:36:53Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3319
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4595ce73-6438-4532-91cc-55d97935487a.jpg
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Czech Republic
    Victim Industry: Industrial Automation
    Victim Organization: Unknown
    Victim Site: Unknown
  58. Alleged data breach of MOD Hospital
    Category: Data Breach
    Content: A threat actor claims to have leaked databases allegedly belonging to modhospital.kr, containing hospital patient and internal system records. The compromised data reportedly includes patient information, doctor records, appointment schedules, system and device logs, meal schedules, terminal data, and access logs.
    Date: 2026-01-14T16:34:49Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-MODHOSPITAL-KR-%E2%80%94-45K-KOREAN-HOSPITAL-PATIENT-SYSTEM-RECORDS-14-01-2026-Solonik-BF
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2d3e64b5-a617-44cd-8ca2-dec5ce8406b9.png
    Threat Actors: Solonik
    Victim Country: South Korea
    Victim Industry: Hospital & Health Care
    Victim Organization: mod hospital
    Victim Site: modhospital.kr
  59. Z-BL4CX-H4T targets the website of RLJ Electrical Limited
    Category: Defacement
    Content: The group claims to have defaced the website of RLJ Electrical Limited
    Date: 2026-01-14T16:33:16Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/3
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/174f36ab-3c39-4323-ae38-f0e24e990ca8.jpg
    Threat Actors: Z-BL4CX-H4T
    Victim Country: New Zealand
    Victim Industry: Facilities Services
    Victim Organization: rlj electrical limited
    Victim Site: rljelectrical.co.nz
  60. Alleged data breach of RAPY.GG
    Category: Data Breach
    Content: A threat actor claims to be selling data allegedly obtained from RAPY.GG, one of the largest Polish Minecraft servers. The compromised data reportedly includes player-related information such as Minecraft usernames and associated IP addresses.
    Date: 2026-01-14T16:14:19Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-rapy-pl-database
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0cce5fd5-e512-4753-a125-2bca6946435b.png
    Threat Actors: HEXROOTGROUP
    Victim Country: Poland
    Victim Industry: Gaming
    Victim Organization: rapy.gg
    Victim Site: rapy.gg
  61. Z-BL4CX-H4T targets the website of Advocate Deepak Aneja
    Category: Defacement
    Content: The group claims to have defaced the website of Advocate Deepak Aneja
    Date: 2026-01-14T16:10:27Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/3
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9a42cd53-c1b6-4165-b221-1146bc857670.jpg
    Threat Actors: Z-BL4CX-H4T
    Victim Country: India
    Victim Industry: Legal Services
    Victim Organization: Unknown
    Victim Site: advocatedeepakaneja.com
  62. Z-BL4CX-H4T targets the website of The Jatayu Gurukul
    Category: Defacement
    Content: The group claims to have defaced the website of The Jatayu Gurukul
    Date: 2026-01-14T16:06:43Z
    Network: telegram
    Published URL: https://t.me/c/3027611821/259
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f3ccbc2b-ef4e-41f3-a2e0-b9d0c4036340.jpg
    Threat Actors: Z-BL4CX-H4T
    Victim Country: India
    Victim Industry: Education
    Victim Organization: the jatayu gurukul
    Victim Site: thejatayagurukul.com
  63. Alleged access to DHIS2 Health Management System of Kurdistan Regional Government’s Ministry of Health
    Category: Initial Access
    Content: The group claims to have compromised the DHIS2 Health Management System operated by the Kurdistan Regional Government’s Ministry of Health in Iraq. According to the actor, the targeted server functions as a centralized database aggregating health data from hospitals and medical centers across the region.
    Date: 2026-01-14T15:54:36Z
    Network: telegram
    Published URL: https://t.me/SylhetGangSG1/7309
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2555a4cf-d49b-46bd-adc6-e31efa9a2bfd.png
    Threat Actors: mu6tx
    Victim Country: Iraq
    Victim Industry: Government Administration
    Victim Organization: kurdistan regional government – ministry of health
    Victim Site: dhis.moh.gov.krd
  64. rebars & mesh, inc. falls victim to akira ransomware
    Category: Ransomware
    Content: The threat actor claims to have obtained 15 GB of organization’s data. The data includes employee personal information (driver’s licenses, addresses, emails), client data, financial records, agreements, and technical drawings and specifications.
    Date: 2026-01-14T15:48:20Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d77439e1-a3a2-41e1-80f4-6626e7cd98a9.png
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: rebars & mesh, inc.
    Victim Site: rebarsandmesh.com
  65. ImageWorks Display falls victim to akira ransomware
    Category: Ransomware
    Content: The threat actor claims to have obtained 15 GB of organization’s data. The data includes employee personal information (W-9 forms and related records), client data, financial information, agreements and contracts, and NDAs.
    Date: 2026-01-14T15:22:37Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5e613067-5417-4f70-baae-7d9861ef0b27.png
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: imageworks display
    Victim Site: imageworksdisplay.com
  66. Alleged data breach of PT Comitrando Emporio
    Category: Data Breach
    Content: The group claims to have breached the databse of PT Comitrando Emporio leaking personally identifiable information of employees including full name, gender, regency or district, sub-district, village or urban ward, phone number, email address, family information, guardian or family member name, and guardian or family member phone number.
    Date: 2026-01-14T15:18:56Z
    Network: telegram
    Published URL: https://t.me/maul1337anon/458
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0bb4f989-1efd-4bf4-af02-48de574f04a8.jpg
    Threat Actors: maul1337
    Victim Country: Indonesia
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: pt comitrando emporio
    Victim Site: komitrando.com
  67. Alleged data sale of Thailand passports
    Category: Data Breach
    Content: The threat actor is offering to sell 33000 Thailand passports (11 GB), allegedly mentioning possibly 60% of the passports is past its expiration date.
    Date: 2026-01-14T14:30:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Thailand-passport-33000x-11gb
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/66d48329-7fea-477c-a071-5b750aed4fcc.JPG
    Threat Actors: DocLite
    Victim Country: Thailand
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged data leak of ClubDunes
    Category: Data Breach
    Content: The threat actor claims to have leaked data from ClubDunes, which was breached in 2023. The compromised dataset reportedly contains 292,938 records, including email addresses, usernames, photo ID status, and additional information.
    Date: 2026-01-14T14:23:14Z
    Network: openweb
    Published URL: https://leakbase.la/threads/uae-clubdunes-com-292-938-lines.27830/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6db114c0-ec78-4b96-beea-907015598fa1.png
    Threat Actors: HeartLeak
    Victim Country: UAE
    Victim Industry: Social Media & Online Social Networking
    Victim Organization: clubdunes
    Victim Site: clubdunes.com
  69. Alleged data leak of Kurdistan E-Residency System
    Category: Data Breach
    Content: Group claims to have leaked data from Kurdistan E-Residency System.
    Date: 2026-01-14T14:14:33Z
    Network: telegram
    Published URL: https://t.me/dienet3/66
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/281bf1f9-2d27-4749-a225-d70ed5d269ed.png
    https://d34iuop8pidsy8.cloudfront.net/3c0179a8-f671-44f9-ae8e-9699837adae9.png
    Threat Actors: DieNet
    Victim Country: Iraq
    Victim Industry: Government Administration
    Victim Organization: kurdistan e-residency system
    Victim Site: ebl.residency.gov.krd
  70. Qassim Health Services Association falls victim to TENGU Ransomware
    Category: Ransomware
    Content: The group claims to have obtained organization’s data and intend to publish within 5 to 6 days.
    Date: 2026-01-14T14:12:56Z
    Network: tor
    Published URL: http://longcc4fqrfcqt5lzceutylaxir6h66fp6df3oin6mvwvz6pfdbxc6qd.onion/blog/9194b5bee0d8552e9421cd7003d82a7861469b78856b501259d0c881519df3cf/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c05b5eef-884e-4b4f-b199-6886dc7f0f0c.png
    Threat Actors: TENGU
    Victim Country: Saudi Arabia
    Victim Industry: Hospital & Health Care
    Victim Organization: qassim health services association
    Victim Site: seha.org.sa
  71. Fechner Pump & Supply Inc. falls victim to akira ransomware
    Category: Ransomware
    Content: The threat actor claims to have obtained 157 GB of corporate data from the organisation, allegedly including employee personal information (SSN, address, phones, email, scans of personal documents and so on), projects, client information, financials, contracts and agreements, etc.
    Date: 2026-01-14T14:10:14Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/983ad8f4-5146-40e3-a660-b13c122ef43c.JPG
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Oil & Gas
    Victim Organization: fechner pump & supply inc.
    Victim Site: fechnerpump.com
  72. H2 Builders falls victim to akira ransomware
    Category: Ransomware
    Content: The threat actor claims to have obtained more than 20 GB of corporate data from the organisation, allegedly including client information, financials, contracts, agreements and more.
    Date: 2026-01-14T13:58:18Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/963c2df8-3072-437f-9c0e-a7b60bdea5eb.JPG
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: h2 builders
    Victim Site: h2builders.com
  73. TruGolf falls victim to akira Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 37 GB of the organization’s data. The compromised data reportedly includes employee personal information such as Social Security numbers, driver’s license details, addresses, and email addresses, as well as client information, financial data, contracts, and agreements.
    Date: 2026-01-14T13:55:51Z
    Network: tor
    Published URL: https://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/044d9b3d-7d4d-4b9a-ad7c-de7bb469ca15.png
    Threat Actors: akira
    Victim Country: USA
    Victim Industry: Software Development
    Victim Organization: trugolf
    Victim Site: trugolf.com
  74. Alleged leak of U.S. police documents related to forged document detection
    Category: Data Breach
    Content: The threat actor claims to have leaked U.S. police documents related to forged document detection
    Date: 2026-01-14T13:53:29Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Leaked-documents-on-how-the-PD-finds-forged-documents
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/bf9f7708-41dd-4b75-8615-2675854230c2.JPG
    Threat Actors: zvezdanwastaken
    Victim Country: USA
    Victim Industry: Law Enforcement
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Advanced Construction Southwest falls victim to INC RANSOM Ransomware
    Category: Ransomware
    Content: The Group Claims to have Obtained 1.5 TB of the Organization’s Data.
    Date: 2026-01-14T13:52:41Z
    Network: tor
    Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/696792498f1d14b743a9d829
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a628df04-316c-49be-98d6-ed1aa46fd3cc.png
    Threat Actors: INC RANSOM
    Victim Country: USA
    Victim Industry: Building and construction
    Victim Organization: advanced construction southwest
    Victim Site: acswinc.com
  76. Alleged access to unidentified CCTV cameras in USA
    Category: Initial Access
    Content: The group claims to have accessed unidentified CCTV cameras in Florida,USA.
    Date: 2026-01-14T13:49:31Z
    Network: telegram
    Published URL: https://t.me/zpentestalliance/965
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/328cf344-04c3-4026-9d1c-9b03f882ebaf.JPG
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  77. Alleged leak of data from the website of Concern for Radio Broadcasting, Radio Communications and Television
    Category: Data Breach
    Content: Group claims to have accessed and leaked data from the website of the Concern for Radio Broadcasting, Radio Communications and Television, an entity operating under the State Service for Special Communications and Information Protection of Ukraine, allegedly exposing technical broadcasting documentation dating from 2016 to 2026.
    Date: 2026-01-14T13:42:47Z
    Network: telegram
    Published URL: https://t.me/perunswaroga/1036
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6d2227c7-b2fc-4ad1-ab08-a5c9d336a060.png
    Threat Actors: Perun Svaroga
    Victim Country: Ukraine
    Victim Industry: Government & Public Sector
    Victim Organization: concern for radio broadcasting, radio communications and television
    Victim Site: rrt.ua
  78. NightSpire RaaS
    Category: Malware
    Content: The threat actor NightSpire claims to be promoting a Ransomware-as-a-Service (RaaS) program via its dark web platform. According to the announcement, the group has opened affiliate recruitment, allowing interested parties to register and collaborate in ransomware operations. This development may lead to an increase in affiliate-driven attacks and a higher number of reported victims in the near future.
    Date: 2026-01-14T13:24:16Z
    Network: openweb
    Published URL: https://x.com/stealthmole_iol/status/2011349161355211061?s=20
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f9d8a353-bd58-4ac2-a2ea-855c8a497ba2.png
    Threat Actors: NightSpire
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  79. Alleged data leak of Indonesian Journalists
    Category: Data Breach
    Content: The threat actor claims to have leaked the data of 20,000 Indonesian Journalists, allegedly including journalist name, media name, journalist certificate, testing institution, level.
    Date: 2026-01-14T13:05:22Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-20-000-Indonesian-Journalists-Data-Breached
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0b40ae66-9dc1-4425-bfdd-41666e2f8db4.JPG
    Threat Actors: AYYUBI
    Victim Country: Indonesia
    Victim Industry: Newspapers & Journalism
    Victim Organization: persatuan wartawan indonesia
    Victim Site: dewanpers.or.id
  80. Alleged data breach of Textitute
    Category: Data Breach
    Content: The threat actor claims to have breached 2.8 million+ rows of data from the organisation, allegedly including contacts, sms leads, users, tokens, clients and more.
    Date: 2026-01-14T12:25:51Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-TEXTITUTE-COM-%E2%80%94-SMS-CONTACT-PLATFORM-CLIENT-DB-13-01-2026-Solonik-BF
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/988c215b-d4b8-48e3-929d-6af22bba4d58.JPG
    https://d34iuop8pidsy8.cloudfront.net/d5a1e3a9-e643-43dc-98ba-fe04c2130782.JPG
    Threat Actors: Solonik
    Victim Country: Canada
    Victim Industry: Network & Telecommunications
    Victim Organization: textitute
    Victim Site: textitute.com
  81. Alleged data breach of Horus Integrated Solutions
    Category: Data Breach
    Content: The threat actor claims to have breached 1.97 million rows of data from the organisation. allegedly including taxpayer records, NFSe invoices, declarations, access logs, payment guides, and more.
    Date: 2026-01-14T11:55:35Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-HORUSDM-COM-BR-%E2%80%94-MUNICIPAL-TAX-SYSTEM-DATABASES-BRAZIL-2M-RECORDS-14-01-2026
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e93b94c8-1d3a-4690-bce1-4740b92ecd67.JPG
    https://d34iuop8pidsy8.cloudfront.net/a9feca44-ecd4-4290-8b59-a4ca2a106a4a.JPG
    Threat Actors: Solonik
    Victim Country: Brazil
    Victim Industry: Software Development
    Victim Organization: horus integrated solutions
    Victim Site: horusdm.com.br
  82. Alleged data leak of Carriage Workshop Lallaguda
    Category: Data Breach
    Content: The threat actor claims to have leaked an employee database linked to Carriage Workshop Lallaguda, a major railway maintenance facility under Indian Railways’ South Central Railway zone. The alleged dataset, shared as a text file containing 2,778 records, reportedly includes highly sensitive personal and employment-related information such as employee numbers, names, HRMS and UMID IDs, designations, departments, contact details, dates of birth and service, addresses, Aadhaar and PAN numbers, blood group, and other HR records.
    Date: 2026-01-14T11:49:19Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-cwslgds-in-2-7k-Indian-Railways
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/f6e427c3-4516-4280-81c5-ff4081c95711.png
    Threat Actors: colin
    Victim Country: India
    Victim Industry: Government Relations
    Victim Organization: carriage workshop lallaguda
    Victim Site: cwslgds.in
  83. Alleged Unauthorized Access to a Construction and Contract Management System in Libya
    Category: Initial Access
    Content: The group claims to have accessed a construction and contracting management system of a Libyan company, reportedly exposing project details, client and contractor records, contracts, and financial data.
    Date: 2026-01-14T11:47:40Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3304
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/e35959aa-394e-4818-8e63-a3a16fa5d91e.png
    https://d34iuop8pidsy8.cloudfront.net/977f9ed0-2161-4059-b0ce-c575b8f14f96.png
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Libya
    Victim Industry: Building and construction
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Alleged Unauthorized Access to an Industrial Control or Management System in poland
    Category: Initial Access
    Content: Group claims to have gained unauthorized access to an industrial control or management system operated by an unidentified indoor snow facility in Poland, which is reportedly using TechnoAlpin Indoor Snow Division system.
    Date: 2026-01-14T11:37:04Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/1622
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/66681f04-d614-481a-b693-d9f0482bd7ef.png
    Threat Actors: NoName057(16)
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Global Error System targets the website of Maria Vocational School
    Category: Defacement
    Content: The group claims to have defaced the website of Maria Vocational School
    Date: 2026-01-14T11:22:09Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/227440
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c3c81a6e-9024-497b-9800-a48749dbfabe.JPG
    Threat Actors: Global Error System
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: maria vocational school
    Victim Site: skripsiiku.my.id
  86. Alleged unauthorized access to Al Badr Uniforms
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to the admin panel of Al Badr Uniforms in Syria. The compromised system allows controls full administrative access, providing complete control over the website’s frontend, backend, content, files, and internal management systems and also defaced the organizations website.
    Date: 2026-01-14T11:15:13Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3298
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9baf531d-2a13-41ab-a5cb-467cf49d5c99.jpg
    https://d34iuop8pidsy8.cloudfront.net/7e27a056-838d-4dd0-8c0e-4b8ff647aa64.jpg
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Syria
    Victim Industry: Fashion & Apparel
    Victim Organization: al badr uniforms
    Victim Site: albadr-uniforms.com
  87. Hazardous Cyber Team targets the website of dbcollege.ac.in
    Category: Defacement
    Content: The group claims to have defaced the website of dbcollege.ac.in
    Date: 2026-01-14T11:12:31Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/227441
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/abd12c0f-8a2c-4074-98bc-3834b153da18.JPG
    Threat Actors: Hazardous Cyber Team
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: dbcollege.ac.in
  88. Alleged sale of access to Nigerian government websites
    Category: Initial Access
    Content: The group claims to be selling unauthorized access to Nigerian government websites.
    Date: 2026-01-14T10:52:53Z
    Network: telegram
    Published URL: https://t.me/Team_Cy8er_N4ti0n/14
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c6ee062-5b51-4114-af66-4ffcf15e422a.png
    Threat Actors: CY8ER N4TI0N
    Victim Country: Nigeria
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: gov.ng
  89. ./RAZOR targets the website of Maldives Bureau of Statistics
    Category: Defacement
    Content: The group claims to have defaced the website of Maldives Bureau of Statistics.
    Date: 2026-01-14T10:27:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/777864
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a5d187e7-c76e-461f-a1cf-8c6d8c1adf9f.png
    Threat Actors: ./RAZOR
    Victim Country: Maldives
    Victim Industry: Government Administration
    Victim Organization: maldives bureau of statistics
    Victim Site: bids.stats.gov.mv
  90. Boss Ranzen targets the website of World Psychology
    Category: Defacement
    Content: Group claims to have defaced the website of World Psychology.
    Date: 2026-01-14T10:19:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/782146
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/477865ae-8e60-4da6-b5eb-10972c482180.png
    Threat Actors: Boss Ranzen
    Victim Country: Indonesia
    Victim Industry: Publishing Industry
    Victim Organization: world psychology
    Victim Site: ejournal.staialhikmahpariangan.ac.id
  91. ./Outsiders targets the website of Sanskarcity College of Education
    Category: Defacement
    Content: Group claims to have defaced the website of Sanskarcity College of Education.
    Date: 2026-01-14T10:10:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/780900
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/87106e95-b512-45eb-a936-8dc3a94946ca.png
    Threat Actors: ./Outsiders
    Victim Country: India
    Victim Industry: Education
    Victim Organization: sanskarcity college of education
    Victim Site: scisedu.in
  92. Imkey7 targets the website of Federal Government Staff Housing Loans Board in Nigeria
    Category: Defacement
    Content: The group claims to have defaced the website of Federal Government Staff Housing Loans Board in Nigeria.
    Date: 2026-01-14T10:05:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/777611
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d69df786-cadd-406d-bc60-dc2f92c405e1.png
    Threat Actors: Imkey7
    Victim Country: Nigeria
    Victim Industry: Government Administration
    Victim Organization: federal government staff housing loans board
    Victim Site: fgshlb.gov.ng
  93. MR-4PEAJE targets the website of AES’ Vanita Vinayalaya Junior College of Education
    Category: Defacement
    Content: The group claims to have defaced the organization’s website.
    Date: 2026-01-14T09:55:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/782148
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b265631b-645b-4371-a4c6-ae879b46152a.png
    Threat Actors: MR-4PEAJE
    Victim Country: India
    Victim Industry: Education
    Victim Organization: aes’ vanita vinayalaya junior college of education
    Victim Site: aesvanitadted.edu.in
  94. Boss Ranzen targets the website of Scientax
    Category: Defacement
    Content: The group claims to have defaced the organization’s website.
    Date: 2026-01-14T09:41:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/782145
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/670f08e2-2c47-4ac7-9181-4eccfbebab63.png
    Threat Actors: Boss Ranzen
    Victim Country: Indonesia
    Victim Industry: Government Relations
    Victim Organization: scientax
    Victim Site: ejurnal.pajak.go.id
  95. D0R4H4X0R targets the website of Bangladesh Employees Welfare Board
    Category: Defacement
    Content: The group claims to have defaced the website of Bangladesh Employees Welfare Board
    Date: 2026-01-14T09:39:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/780906
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1139cc66-2c19-4a02-9520-0466dcd4d18f.JPG
    Threat Actors: D0R4H4X0R
    Victim Country: Bangladesh
    Victim Industry: Government Administration
    Victim Organization: bangladesh employees welfare board
    Victim Site: welfare.bkkb.gov.bd
  96. Nicotine targets the website of BookSouk
    Category: Defacement
    Content: Group claims to have defaced the website of BookSouk.
    Date: 2026-01-14T09:29:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/781013
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/2252a19c-28cf-4c84-93fe-7982f3b6cbb0.png
    Threat Actors: Nicotine
    Victim Country: Qatar
    Victim Industry: Retail Industry
    Victim Organization: booksouk
    Victim Site: booksouk.qa
  97. Boss Ranzen targets the website of Universitas Negeri Surabaya
    Category: Defacement
    Content: The group claims to have defaced the organization’s website.
    Date: 2026-01-14T09:28:44Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/782141
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/40593d11-77f9-445e-aeba-7d2f2c71bdd1.png
    Threat Actors: Boss Ranzen
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: universitas negeri surabaya
    Victim Site: unesa.ac.id
  98. GENESIS Ransomware group adds an unknown victim (*)
    Category: Ransomware
    Content: The group claims to have obtained approximately 700 GB of the organization’s data. The compromised data reportedly includes company customer data, business development data, confidential files and non-disclosure agreements, user folders, operational data, and data from the company’s file server.
    Date: 2026-01-14T09:19:21Z
    Network: tor
    Published URL: http://genesis6ixpb5mcy4kudybtw5op2wqlrkocfogbnenz3c647ibqixiad.onion/a540b155da0a63b229ca/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5d10ea41-8b73-47ff-bb85-25c1323d3cdc.png
    https://d34iuop8pidsy8.cloudfront.net/de2ef3f2-45f9-49ff-bbb4-1e2f9b80dfc3.png
    Threat Actors: GENESIS
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: Unknown
    Victim Site: Unknown
  99. maul1337 targets the website of GRENZE Scientific Society
    Category: Defacement
    Content: The group claims to have defaced the website of GRENZE Scientific Society.

Mirror : https://zone-xsec.com/mirror/782152
Date: 2026-01-14T07:14:42Z
Network: telegram
Published URL: https://t.me/maul1337anon/449
Screenshots:
https://d34iuop8pidsy8.cloudfront.net/81d02f9e-91b2-40ff-86de-948c10661d42.png
Threat Actors: maul1337
Victim Country: India
Victim Industry: Research Industry
Victim Organization: grenze scientific society
Victim Site: thegrenze.com

  1. Alleged Database Breach of Ultramail
    Category: Data Breach
    Content: ​The threat actor claims to have successfully executed a database breach against the Brazilian email service provider, Ultramail.
    ​The attacker asserts that they bypassed security via Remote Code Execution (RCE) to gain full access to the company’s internal infrastructure. ​As a result of this intrusion, the actor claims to have exfiltrated a database containing 34,733 sensitive user records. ​The breach reportedly includes the theft of user credentials, which the actor claims to have already cracked into plaintext format.
    Date: 2026-01-14T07:09:03Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-ultramail-com-br-Full-Infrastructure-Access-RCE-Adminer-Cracked-DB
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/10db26c6-7cd1-41f6-b92f-a10f16947ded.jpg
    Threat Actors: asfkdj3229tg43ejg
    Victim Country: Brazil
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: ultramail
    Victim Site: ultramail.com.br
  2. Alleged Data Breach of Kejaksaan Republik Indonesia
    Category: Data Breach
    Content: The threat actor claims an alleged data breach of Kejaksaan Republik Indonesia, the dataset reportedly includes 63 database files in SQL/CSV format originating from various Indonesian government institutions, including law enforcement and regional government systems.
    Date: 2026-01-14T06:23:47Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-Big-Pack-Indonesian-Government-go-id-Databases-43-9GB-2025
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/dd01e30f-b0d7-418d-bac2-fe0a9d86ed3d.png
    Threat Actors: timcookapple
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kejaksaan republik indonesia
    Victim Site: Unknown
  3. Alleged data breach of Sagolink
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Sagolink. The compromised data reportedly contain 12k records including Full names, phone numbers, genders, Email addresses, birth dates
    Date: 2026-01-14T05:59:58Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-sagolink-ai
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/c93c81bd-b6bc-443a-b055-d4a6408ad3e8.png
    https://d34iuop8pidsy8.cloudfront.net/6c40a9b4-5e74-4ec1-bba4-d52c9aeafc12.png
    Threat Actors: p0ppin
    Victim Country: South Korea
    Victim Industry: Insurance
    Victim Organization: sagolink
    Victim Site: sagolink.ai
  4. GHOSTNET-X targets the website of Pico
    Category: Defacement
    Content: The group claims to have defaced the website of Pico
    Date: 2026-01-14T05:54:50Z
    Network: telegram
    Published URL: https://t.me/c/3560880038/113
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/64ae241b-2cda-49d1-811d-5fc5bdd0fca7.png
    Threat Actors: GHOSTNET-X
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: pico
    Victim Site: pico-mail.net
  5. Alleged leak of random personally identifiable documents
    Category: Data Breach
    Content: The threat actor claims to have leaked a collection of random personally identifiable documents, the dataset includes a variety of government-issued identity documents, vehicle records, insurance papers, passports, visas, and social security cards from multiple countries.
    Date: 2026-01-14T05:35:46Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-COLLECTION-RANDOM-PII-DOCUMENTS
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/ae78aa74-97f9-4e52-9d90-af40a1861268.png
    Threat Actors: zvezdanwastaken
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged Data Leak of French Job Portal Data
    Category: Data Breach
    Content: The threat actor claims to be leaked 600k French Job Portal Data
    Date: 2026-01-14T05:31:36Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-FR-Portail-emploi-600k
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8372772b-54ca-4679-a916-83073f3de1cc.png
    Threat Actors: MoNkEySdAnCiNiNg
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. CyberOprationCulture targets the website of Al-modina Battery House
    Category: Defacement
    Content: The group claims to have defaced the website of Al-modina Battery House
    Date: 2026-01-14T05:26:51Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/69
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5f99db26-b9ac-4dbd-9c36-e6d890d49b6e.png
    Threat Actors: CyberOprationCulture
    Victim Country: Bangladesh
    Victim Industry: Electrical & Electronic Manufacturing
    Victim Organization: al-modina battery house
    Victim Site: almodinabatteryhouse.com
  8. CyberOprationCulture targets the website of echofreshlife
    Category: Defacement
    Content: The group claims to have defaced the website of echofreshlife
    Date: 2026-01-14T05:12:52Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/69
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/94037427-3ff5-4b88-8256-2e53fc6b7509.png
    Threat Actors: CyberOprationCulture
    Victim Country: Japan
    Victim Industry: Consumer Goods
    Victim Organization: echofreshlife
    Victim Site: echofreshlife.com
  9. Alleged data leak of Iranian online medical platform
    Category: Data Breach
    Content: The threat actor claims an alleged data leak of Iranian online medical platform. According to the post, the exposed database contains information on 700,000+ citizens.
    Date: 2026-01-14T04:54:08Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-SELLING-IRAN-IRAN-ONLINE-MEDICAL-PLATFORM–183963
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/463b79b7-d315-4335-8f1d-0d506e0d14dc.png
    Threat Actors: xploitleaks
    Victim Country: Iran
    Victim Industry: Hospital & Health Care
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged data breach of Max Messenger
    Category: Data Breach
    Content: The threat actor claims to have fully compromised Max Messenger, the dataset allegedly includes ~154 million user records with names, usernames, phone numbers, plus auth tokens, session keys, hashed passwords, metadata logs, and internal infrastructure data.
    Date: 2026-01-14T04:46:48Z
    Network: openweb
    Published URL: https://darkforums.io/Thread-DATABASE-DATABASE-LEAK-Max-Messenger-Full-User-Infrastructure-SQL-Dump
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/092cd1a5-975a-40de-b46c-cf31a0d9723f.png
    Threat Actors: CamelliaBtw
    Victim Country: Unknown
    Victim Industry: Information Technology (IT) Services
    Victim Organization: max messenger
    Victim Site: Unknown
  11. GHOSTNET-X targets the website of Municipalidad de General San Martín
    Category: Defacement
    Content: The group claims to have defaced the website of Municipalidad de General San Martín
    Date: 2026-01-14T04:28:52Z
    Network: telegram
    Published URL: https://t.me/c/3560880038/112
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a1b47804-3ee1-4d12-9a87-38f8cf015227.png
    Threat Actors: GHOSTNET-X
    Victim Country: Argentina
    Victim Industry: Government Administration
    Victim Organization: municipalidad de general san martín
    Victim Site: sanmartinlapampa.com.ar
  12. EIGHT-SIX ROOT targets the website of Charamchalanda Girl’s High School
    Category: Defacement
    Content: The group claims to have defaced the website of Charamchalanda Girl’s High School
    Date: 2026-01-14T04:18:42Z
    Network: telegram
    Published URL: https://t.me/eightsixroot/177
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/837907cf-8541-4eab-8825-35cd56490b77.png
    Threat Actors: EIGHT-SIX ROOT
    Victim Country: Bangladesh
    Victim Industry: Education
    Victim Organization: charamchalanda girl’s high school
    Victim Site: chghs.edu.bd
  13. Alleged data sale of unidentified companies in USA
    Category: Data Breach
    Content: Threat actor claims to be selling a 600GB data dump allegedly sourced from four US-based companies. According to the post, the dataset mainly relates to law firms and construction companies and reportedly includes internal corporate documents and accounting files, including QuickBooks data.
    Date: 2026-01-14T03:35:05Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273740/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/36fb807f-a030-4b4e-8810-5eab42578c98.png
    Threat Actors: Omerta
    Victim Country: USA
    Victim Industry: Legal Services
    Victim Organization: Unknown
    Victim Site: Unknown
  14. CyberOprationCulture targets the website of Universitas Ekasakti Padang
    Category: Defacement
    Content: The group claims to have defaced the website of Universitas Ekasakti Padang
    Date: 2026-01-14T03:33:26Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/68
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/00df24d4-0116-4afb-b8c5-592b5fc2ef74.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: universitas ekasakti padang
    Victim Site: pustaka.unespadang.ac.id
  15. Alleged data leak of Syrian Ministry of Defense
    Category: Data Breach
    Content: The threat actor claims to leaked data from Syrian Ministry of Defense. The Compromised Data Reportedly Includes First name, Father name, Mother name, Date of birth, Nationality, Mobile number, Email address, Gender
    Date: 2026-01-14T03:28:18Z
    Network: openweb
    Published URL: https://breachforums.bf/Forum-Databases?sortby=started
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/fe4e55df-c385-47e5-bf01-a4a6498f915d.png
    https://d34iuop8pidsy8.cloudfront.net/9088acf3-29c8-448b-8027-9f488f7b94e9.png
    Threat Actors: MR3B1915KURD
    Victim Country: Syria
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  16. CyberOprationCulture targets the website of STIE Pembangunan
    Category: Defacement
    Content: The group claims to have defaced the website of STIE Pembangunan
    Date: 2026-01-14T03:21:00Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/68
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/1a640bb8-9003-490c-9a6d-58318eaaa3aa.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: stie pembangunan
    Victim Site: pustaka.stie-pembangunan.ac.id
  17. Alleged sale of SCULPTOR v1.1
    Category: Malware
    Content: The threat actor shared SCULPTOR v1.1, a SQL injection exploitation tool. The tool is advertised as a multi-module SQL injection framework used to scan vulnerable websites and extract database information.
    Date: 2026-01-14T03:19:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Sculptor-v1-1-%E2%80%93-SQL-Injection
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/568050bd-32de-43f4-bc17-c30dbdf78d35.png
    Threat Actors: Starip
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. CyberOprationCulture targets the website of SMAN 2 Metro
    Category: Defacement
    Content: The group claims to have defaced the website of SMAN 2 Metro
    Date: 2026-01-14T03:12:11Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/68
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/a6ecb6f2-9d52-468b-84de-9d5bf2744f03.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: sman 2 metro
    Victim Site: laboratorium.sman2metro.sch.id
  19. CyberOprationCulture targets the website of Universitas Widya Kartika
    Category: Defacement
    Content: The group claims to have defaced the website of Universitas Widya Kartika
    Date: 2026-01-14T03:07:03Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/68
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4b8b3d14-6d27-4dfa-be48-c2982cef0b1e.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Higher Education/Acadamia
    Victim Organization: universitas widya kartika
    Victim Site: pustaka.widyakartika.ac.id
  20. Alleged Sale of Admin panel Access to Game Landing Page
    Category: Initial Access
    Content: Threat actor claims to be selling access to an admin panel for a game/software landing page platform. The panel reportedly includes features such as landing page management, traffic redirection controls, selectable software versions, regular and advanced operation modes, integrated search functionality, and management of fabricated download and review statistics.
    Date: 2026-01-14T03:05:46Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273735/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/cf3faa91-ffc8-455b-a753-75e40f324a9c.png
    Threat Actors: Relay
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. 6ickzone targets the website of Kode Tech Solutions
    Category: Defacement
    Content: Group claims to have defaced the website of Kode Tech Solutions
    Date: 2026-01-14T03:01:01Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/226655
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/6764e7be-6ee4-43e8-9368-9f7565ee4e64.png
    Threat Actors: 6ickzone
    Victim Country: India
    Victim Industry: Software Development
    Victim Organization: kode tech solutions
    Victim Site: datingtime.kodetechsolutions.com
  22. Alleged Data breach of U-Haul
    Category: Data Breach
    Content: The threat actor claims to be selling a database allegedly associated with U-Haul. The exposed data reportedly includes customer email addresses, full names, phone numbers, physical addresses, and driver’s license information. Sample records shared by the actor appear to contain personally identifiable information (PII) from multiple individuals.
    Date: 2026-01-14T02:56:34Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273738/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/d43ed7ea-abb1-4223-9724-72c72816c291.png
    Threat Actors: iwillneverlose
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: u-haul
    Victim Site: uhaul.com
  23. CyberOprationCulture targets the website of UIN Saifuddin Zuhri Purwokerto
    Category: Defacement
    Content: The group claims to have defaced the website of UIN Saifuddin Zuhri Purwokerto
    Date: 2026-01-14T02:56:09Z
    Network: telegram
    Published URL: https://t.me/c/3421269527/68
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5b8edada-310b-4d50-8217-7cfde4f77c1d.png
    Threat Actors: CyberOprationCulture
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: uin saifuddin zuhri purwokerto
    Victim Site: perpusfit.uinsaid.ac.id
  24. 6ickzone targets the website of Sunshine Paints
    Category: Defacement
    Content: Group claims to have defaced the website of Sunshine Paints
    Date: 2026-01-14T02:48:40Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/226665
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/35ce58a6-4820-4611-b498-acf91cba8cb3.png
    Threat Actors: 6ickzone
    Victim Country: Pakistan
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: sunshine paints
    Victim Site: sunshinepaints.com.pk
  25. Alleged data breach of Trade Republic
    Category: Data Breach
    Content: Threat actor claims to have leaked data from Trade Republic. The compromised data reportedly includes full name, email, and phone number.
    Date: 2026-01-14T02:45:11Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273729/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/8c7492ad-92f1-467d-bc71-4f6e5c391393.png
    Threat Actors: Michaelberg
    Victim Country: Germany
    Victim Industry: Banking & Mortgage
    Victim Organization: trade republic
    Victim Site: traderepublic.com
  26. Merit Group plc Falls Victim for Sinobi Ransomware
    Category: Ransomware
    Content: The group claims to have obtained 300GB of the organization’s data. They intend to publish it within 13-14 days.
    Date: 2026-01-14T02:41:17Z
    Network: tor
    Published URL: http://sinobi6rlec6f2bgn6rd72xo7hvds4a5ajiu2if4oub2sut7fg3gomqd.onion/leaks/6963f8c26387a4c9a21c0f7a
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4aa58516-d561-4e36-a1de-99c5e50f0ab6.png
    Threat Actors: Sinobi
    Victim Country: UK
    Victim Industry: Information Services
    Victim Organization: merit group plc
    Victim Site: meritgroupplc.com
  27. 404 crew cyber team targets the website of Bang189
    Category: Defacement
    Content: Group claims to have defaced the website of Bang189
    Date: 2026-01-14T02:39:50Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/226666
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/365d0518-828d-4e6b-8318-bcf266aba467.png
    Threat Actors: 404 crew cyber team
    Victim Country: Indonesia
    Victim Industry: Gambling & Casinos
    Victim Organization: bang189
    Victim Site: bang189.org
  28. Alleged Data Breach of JobsGo
    Category: Data Breach
    Content: The threat actor claims to be leaked data from JobsGo. The compromised data reportedly contain 2.32 million user records including full names, genders, dates of birth, job titles, companies, physical addresses, education details
    Date: 2026-01-14T02:27:56Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-DATABASE-JobsGo-jobsgo-vn-2026-2-32M-Users
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/9c688adc-2234-4111-a18f-f29f4e1685c7.png
    Threat Actors: thelastwhitehat
    Victim Country: Vietnam
    Victim Industry: Human Resources
    Victim Organization: jobsgo
    Victim Site: jobsgo.vn
  29. Alleged sale of WordPress access checking tool
    Category: Malware
    Content: Threat actor claims to be selling a WordPress bulk access-checking tool capable of validating site credentials at scale, a functionality commonly linked to unauthorized access and credential-stuffing activity.
    Date: 2026-01-14T02:06:05Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273657/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/85f561ed-66e1-4e3b-b941-5caeebe2b5b3.png
    Threat Actors: toladollar
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. 404 crew cyber team targets the website of Diana138
    Category: Defacement
    Content: Group claims to have defaced the website of Diana138
    Date: 2026-01-14T02:03:04Z
    Network: openweb
    Published URL: https://defacer.id/mirror/id/226667
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/50f34df4-a853-421f-af6d-e6065542ac71.png
    Threat Actors: 404 crew cyber team
    Victim Country: Indonesia
    Victim Industry: Gambling & Casinos
    Victim Organization: diana138
    Victim Site: diana138.com
  31. Alleged sale of access to Tax service department in USA
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to tax service department in USA.
    Date: 2026-01-14T01:43:24Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273712/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/4c1f32c1-a21d-479f-b6b6-578d318255af.png
    Threat Actors: budda12
    Victim Country: USA
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Alleged sale of admin access to unidentified store in Germany
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized admin access to an unidentified online store in Germany.
    Date: 2026-01-14T01:37:05Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273718/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0097248f-5027-47e5-971f-3f1b6ec32db1.png
    Threat Actors: Reve
    Victim Country: Germany
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  33. Alleged sale of unauthorized access to unidentified store in Australia
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in Australia.
    Date: 2026-01-14T01:36:24Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273724/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/5c355c09-3604-4453-b4da-6e03297bfab4.png
    Threat Actors: ed1n1ca
    Victim Country: Australia
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Alleged sale of unauthorized access to unidentified store in Denmark
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in Denmark.
    Date: 2026-01-14T01:32:27Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273727/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/b9887a40-25f6-4871-b612-0ac4347c1c61.png
    Threat Actors: ed1n1ca
    Victim Country: Denmark
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged sale of unauthorized access to an unidentified online store in Chile
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in Chile.
    Date: 2026-01-14T01:27:09Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273726/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/91fdb7b8-ed38-4dea-b112-01e943de9010.png
    Threat Actors: ed1n1ca
    Victim Country: Chile
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Alleged sale of unauthorized access to unidentified shop in Bangladesh
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to an unidentified online store in Bangladesh.
    Date: 2026-01-14T01:22:17Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/273725/
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/0e51a766-f4de-4019-879d-3d1324aa7511.png
    Threat Actors: ed1n1ca
    Victim Country: Bangladesh
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Alleged Sale of Unauthorized Access to Saudi Government System
    Category: Initial Access
    Content: The threat actor claims to be selling unauthorized Access to Saudi Arabia Government Postal System Domain Controller
    Date: 2026-01-14T01:21:47Z
    Network: openweb
    Published URL: https://breachforums.bf/Thread-Saudi-Arabia-Government-Postal-System-Domain-Controller
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/86e7883f-ca47-49c1-8679-0ca3942c99e3.png
    Threat Actors: miya
    Victim Country: Saudi Arabia
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Alleged data breach of Ligue de Football Professionnel
    Category: Data Breach
    Content: The group claims to have breached data from Ligue de Football Professionnel. It includes extracting the database and obtaining all the datas
    Date: 2026-01-14T00:07:47Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/429
    Screenshots:
    https://d34iuop8pidsy8.cloudfront.net/21e2cc4f-91f9-460e-ad43-a0811e41c675.png
    Threat Actors: DARK 07x
    Victim Country: Algeria
    Victim Industry: Sports
    Victim Organization: ligue de football professionnel
    Victim Site: lfp.dz