[July-03-2025] Daily Cybersecurity Threat Report

1. Executive Summary

The past 24 hours have revealed a dynamic and persistent cyber threat landscape, characterized by large-scale data exfiltration, the continued sale of compromised information on illicit forums, and targeted attacks by politically motivated hacktivist groups. A significant volume of alleged data breaches and sales were advertised across various cybercrime forums and Telegram channels, spanning multiple geographies including the US, UK, Thailand, UAE, Israel, Russia, Argentina, Italy, Canada, Peru, South Korea, Taiwan, Germany, and Sweden. This global reach underscores the pervasive nature of cybercriminal operations, affecting diverse sectors from financial services and e-commerce to government and critical infrastructure.

Key trends observed indicate a sustained threat from financially motivated cybercrime, particularly through credential stuffing and extensive data brokering. Simultaneously, there is a clear escalation in the sophistication and impact of geopolitical hacktivism. A recurring theme is the exploitation of known vulnerabilities and outdated systems, highlighting fundamental weaknesses in cyber hygiene across many organizations. The incidents collectively point to an environment where cyber capabilities are increasingly being leveraged for both financial gain and as instruments of foreign policy.

Organizations must prioritize immediate and strategic actions to bolster their cyber resilience. Reinforcing patch management, mandating multi-factor authentication (MFA), and enhancing detection capabilities against automated attacks and supply chain vulnerabilities are paramount. Proactive monitoring of illicit online marketplaces for compromised data related to their operations is also essential for early threat detection and response.

2. Global Incident Overview: Last 24 Hours

The last 24 hours have seen a substantial volume of alleged cyber incidents, primarily manifesting as data breaches and the subsequent advertisement of stolen information on various cybercrime forums and Telegram channels. While many of the direct source links to these advertisements were inaccessible at the time of this analysis, the reported incident titles provide critical context regarding the scope and nature of the threats. These incidents indicate a broad spectrum of compromised entities and data types, reflecting the diverse motivations and capabilities of threat actors.

The geographic spread of these reported attacks is extensive, with notable concentrations in the United States, various European nations (including Italy, France, Germany, and Sweden), and the Middle East (specifically Israel and the UAE). This distribution suggests that threat actors are targeting regions based on their economic value and, in some cases, ongoing geopolitical tensions. The affected sectors are equally diverse, encompassing property services, financial institutions, e-commerce platforms, telecommunications providers, government bodies, educational institutions, and even critical infrastructure components such as hotel energy management systems and defense systems. This wide-ranging impact underscores that virtually no sector is immune to the evolving landscape of cyber threats.

The following table provides a high-level overview of the reported incidents, detailing the affected entities, the nature of the reported compromise, and the primary threat actors identified or inferred from the available information. The status column indicates whether the direct source link for the incident was accessible during the research phase, providing transparency regarding the verifiability of each claim.

Table 1: Daily Incident Log

Incident TitleAffected Entity/SectorReported Data/ImpactPrimary Threat Actor(s)StatusPublished URLScreenshot Link
Alleged data leak of 1 million UK citizensU.S.-based title company1.02 TB property data, PII (names, addresses, SSNs, phone numbers, email, mortgage details, tax documents, court filings, survey maps)SentapDetails Availablehttps://www.zerofox.com/intelligence/flash-report-u-s-property-data-advertised-for-sale-on-dark-web-forum/https://leakbase.la/threads/1-million-uk-citizens-information-2025.39977/
Alleged data sale of Toyota Motor Thailand Co., Ltd.AutomotiveData sale (details unspecified)UnidentifiedSource Inaccessiblehttps://t.me/c/2448264156/991Not provided
Alleged Sale of AI-Powered Inbox Spamming SystemCybercrime ToolsAI-powered spamming systemUnidentified (Malware Author context)Source Inaccessiblehttps://forum.exploit.in/topic/261858/?tab=comments#comment-1579053Not provided
Alleged data sale of an unidentified hotel and restaurant in Dubai MarinaHospitalityDatabases for sale (details unspecified)UnidentifiedSource Inaccessiblehttp://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-UAE-Databases-for-SaleNot provided
Alleged data leak of Israeli defense personnelGovernment/DefenseData leak (details unspecified)USTINT / UNC4841 (Potential Link)Details Availablehttps://t.me/WeAreUst/359Not provided
Alleged Sale of U.S. Online Store Payment Form AccessE-commercePayment form accessUnidentifiedSource Inaccessiblehttps://forum.exploit.in/topic/261857/?tab=comments#comment-1579056Not provided
Alleged Admin Access Sale to Italian Online StoreE-commerceAdmin accessUnidentifiedSource Inaccessiblehttps://forum.exploit.in/topic/261856/?do=findComment&comment=1579044Not provided
Alleged data leak of Unified Information System for Public Procurement in RussiaGovernmentZAKUPKI.GOV.RU DATABASE (details unspecified)UnidentifiedSource Inaccessiblehttp://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-ZAKUPKI-GOV-RU-DATABASENot provided
Alleged data leak of NHI S.A. (Argentina)Healthcare Technology Provider300K database (details unspecified)UnidentifiedSource Inaccessiblehttp://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-Selling-nh-si-com-ar-Database-Argentina-300KNot provided
Alleged Data Leak of Harvard UniversityEducationData/Docs (details unspecified)UnidentifiedSource Inaccessiblehttp://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-Leak-Havard-University-Data-DocsNot provided
Alleged data sale of CodeCrew Infotech Pvt. Ltd.IT Services/Email MarketingDatabase Dump, Deface ProofUnidentifiedSource Inaccessiblehttp://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-FULL-COMPROMISE-CodeCrew-Infotech-Pvt-Ltd-%E2%80%94-Database-Dump-Deface-ProofNot provided
Alleged Data sale of Pan-Pacific MechanicalMechanical ContractingData sale (details unspecified)UnidentifiedSource Inaccessiblehttps://forum.exploit.in/topic/261851/?do=findComment&comment=1579032Not provided
Alleged database leak of Justdial Ltd (India)Local Search Service100 million users’ personal data (names, email, mobile, address, DOB, photo, occupation, company)UnidentifiedDetails Availablehttps://thehackernews.com/2019/04/justdial-hacked-data-breach.htmlhttps://leakbase.la/threads/justdial-100-million-people-information-leakage.39965/
Alleged data leak of InvestConsult Group Co., LtdConsultingDatabase (details unspecified)UnidentifiedSource Inaccessiblehttp://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-INVESTCOUNSULT-DATABASENot provided
Alleged data leak of City of Chattanooga (US)Government (City Services)Sensitive PII (names, addresses, DOB, SSNs, financial account info) of ~14,000 customersUnidentifiedDetails Availablehttps://www.herechattanooga.com/chattanooga-data-breach-action/http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-Chattanooga-gov-Service-Requests-Leaked-Download
Alleged data breach of VynopsisUnspecifiedData breach (details unspecified)Handala HackDetails Availablehttps://t.me/handala_hack27/67Not provided
Alleged data sale of doValue S.p.A.Financial ServicesData sale (details unspecified)UnidentifiedSource Inaccessiblehttps://xss.is/threads/141149/Not provided
Alleged access to the hotel’s automated energy and heating management system in ParisHospitality/OTAccess to energy/heating management systemZ-ALLIANCESource Inaccessiblehttps://t.me/Z_alliance_ru/321Not provided
Alleged sale of unauthorized access to Prestashop based French online storeE-commerceUnauthorized accessUnidentifiedSource Inaccessiblehttps://forum.exploit.in/topic/261844/?do=findComment&comment=1579011Not provided
Alleged data breach of eToro Group LtdFinancial ServicesDatabase (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-WWW-ETORO-COM-DATABASENot provided
Alleged leak of CryptBot Malware Source CodeCybercrime ToolsMalware source codeUnidentified (Malware Author context)Details Availablehttps://darkforums.st/Thread-Malware-sourcecode-2025-July-Leak-LatestNot provided
Alleged data breach of Ministry of Home Affairs of the Republic of IndonesiaGovernment337 million population data sets (NIK, birth info, religion, marital status, occupation, passport numbers)DigitalGhost / Ghost (Potential Link)Details Availablehttps://en.antaranews.com/news/288585/government-to-investigate-alleged-population-data-leakhttps://darkforums.st/Thread-LEAKED-IMPORTANT-DOCUMENTS-FROM-THE-MINISTRY-OF-HOME-AFFAIRS-SIZE-312-GB
Alleged sale of unauthorized access to an unidentified US Managed IT Solutions ProviderIT ServicesUnauthorized accessUnidentifiedSource Inaccessiblehttps://xss.is/threads/141148/Not provided
Liwaa Muhammad targets the website of IndustrywalaManufacturingWebsite defacementLiwaa MuhammadSource Inaccessiblehttps://t.me/liwaamohammad/434Not provided
Alleged data breach and unauthorized access of SB EngineersEngineeringData breach/unauthorized access (details unspecified)UnidentifiedSource Inaccessiblehttps://t.me/c/2438113342/410Not provided
Alleged leak of ECCP Credentials from Algeria postGovernment/Postal ServiceCredentials (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Eccp-Data-post-AlgeriaNot provided
LulzSec Resitance targets the website of Nebojsa MihaljevicIndividual/Public FigureWebsite defacementLulzSec ResitanceSource Inaccessiblehttps://t.me/c/2438113342/408Not provided
Alleged data breach of Algeria TelecomTelecommunicationsFull network infrastructure map, technical info, 13GB confidential filesPhantom AtlasDetails Availablehttps://www.moroccoworldnews.com/2025/06/210860/phantom-atlas-hackers-infiltrate-algerie-telecom-network-in-cyber-retaliation/https://darkforums.st/Thread-Algeria-Telecom
Alleged Leak of mPrest Systems Iron Dome DatabaseDefense Technology50K Iron Dome Database (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-50K-IRON-DOME-DATABASENot provided
Alleged Sale of Leads from ItalyBusiness ServicesLeads (details unspecified)UnidentifiedSource Inaccessiblehttps://forum.exploit.in/topic/261842/Not provided
Alleged unauthorized access to Ritta Company LimitedUnspecifiedUnauthorized accessNXBB.SECSource Inaccessiblehttps://t.me/nxbbsec/478Not provided
Alleged data breach of Beyond Space InteriorsBusiness InteriorsSensitive PII (name, SSN, address, driver’s license)Liwaa MuhammadDetails Availablehttps://straussborrelli.com/2025/07/01/business-interiors-data-breach-investigation/https://t.me/liwaamohammad/432
Alleged data leak of Job Seeker Profiles in South AfricaEmployment/RecruitmentExtensive information (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-South-Africa-Job-Seeker-Profiles-with-Extensive-InformationNot provided
Alleged data breach of Puma IsraelRetailDatabase (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-PUMA-ISRAEL-DATABASENot provided
Alleged sale of Lodge information from CanadaHospitality/TourismContact details, roles (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Canada-Lodge-Information-with-Contact-Details-and-RolesNot provided
Alleged data sale of French Motorcycling FederationSports OrganizationDatabase (details unspecified)UnidentifiedSource Inaccessiblehttps://demonforums.net/Thread-FR-463K-FEDERATION-FRANCAISE-MOTOCYCLISME-DATABASENot provided
Alleged sale of unauthorized access to Netbay Public Company LimitedTelecommunicationsUnauthorized accessNXBB.SECSource Inaccessiblehttps://t.me/nxbbsec/472Not provided
Alleged Data Leak of United States E-commerce Records with Payment InformationE-commerceUser details, payment info (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-United-States-E-commerce-User-Details-with-Payment-InfoNot provided
Alleged Data Leak of Turkey Online Food Delivery CustomersFood DeliveryCustomer data, cuisine preferences (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Turkey-Customer-Data-with-Cuisine-Preferences-from-Online-Food-Delivery-WebsiteNot provided
Alleged sale of U.S. business contact information databaseBusiness ServicesBusiness contacts, location info (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-United-States-Business-Contacts-with-Location-InfoNot provided
Alleged access to Siam InnoCity cloud platformCloud Services/Smart CityCloud platform accessNXBB.SECSource Inaccessiblehttps://t.me/nxbbsec/461Not provided
Alleged sale of user data from a United States based websiteE-commerce/Web ServicesUser details, contact info (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-United-States-Website-User-Details-with-Contact-InformationNot provided
Alleged Data Sale of E-commerce User Information with Banking Details in ThailandE-commerceUser info, banking details (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Thailand-User-Information-with-Banking-Details-from-E-commerce-WebsiteNot provided
Alleged sale of Customer Registration Details from CanadaUnspecifiedCustomer registration, feedback (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Canada-Customer-Registration-Details-with-FeedbackNot provided
Alleged Data Leak of Peru E-commerce Records with Contact DetailsE-commerceE-commerce records, contact details (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Peru-E-commerce-Records-with-Contact-DetailsNot provided
Alleged Sale of Business and Contact Data from South KoreaBusiness DirectoryFull info, contact details (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-South-Korea-Full-Info-from-Business-Directory-with-Contact-DetailsNot provided
Alleged sale of database containing full business and personal information from TaiwanBusiness/PersonalFull business and personal info (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Taiwan-Full-Business-Information-with-Personal-DetailsNot provided
Alleged data leak of Germany Website UsersWeb Services50K user info, IBAN, communication details (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-50k-German-Website-Users-Info-with-IBAN-and-Communication-DetailsNot provided
Alleged data leak of full user information from SwedenUnspecifiedFull user data (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-Selling-Sweden-Full-Info-with-User-DataNot provided
Alleged leak of access to Israeli infrastructure via Fortinet VPNCritical InfrastructureFortinet VPN access (details unspecified)UnidentifiedSource Inaccessiblehttps://t.me/c/2218423825/8008Not provided
NKRI EROR SYSTEM targets the website of Monolitos MTBSports/E-commerceWebsite defacementNKRI EROR SYSTEMSource Inaccessiblehttps://t.me/c/2506219167/25Not provided
Alleged data breach of izipayFinancial ServicesDatabase (details unspecified)UnidentifiedSource Inaccessiblehttps://darkforums.st/Thread-IZIPAY-DBNot provided

3. In-Depth Incident Analysis & Threat Actor Profiles

This section delves into specific incidents, providing detailed context on the reported breaches and the characteristics of the associated threat actors.

Incident 1: Alleged Data Sale of 1 Million UK Citizens’ Information

Incident Details: An actor operating under the alias “Sentap” recently advertised the sale of a substantial 1.02 terabytes of property data on the Russian-speaking dark web forum xss.1 This extensive dataset is purportedly sourced from a U.S.-based title company specializing in property record search services. The compromised information is particularly sensitive and comprehensive, encompassing data from the 1990s up to 2025. It includes a wide array of Personally Identifiable Information (PII) such as names, addresses, dates of birth, Social Security numbers, phone numbers, email addresses, and mortgage details. Beyond basic PII, the leak also contains property ownership information, tax documents, court filings, and even survey maps.1

Threat Actor Profile: Sentap

Sentap is recognized as a financially motivated cybercriminal active on prominent dark web forums. Their activities extend beyond merely brokering data, indicating a more profound technical capability.1 Sentap has been observed engaging in sophisticated tactics, techniques, and procedures (TTPs), including website cloning, bypassing Web Application Firewalls (WAFs), and crypto draining.1 This suggests that Sentap is not simply a reseller of already breached data but is actively involved in the initial access and exploitation phases of cyberattacks. Such capabilities elevate their threat profile from a passive seller to a versatile and dangerous actor capable of direct system compromise. The use of automation for testing credentials, a common method for many threat actors, could be part of their broader operational toolkit.2 Sentap’s presence on the predominantly Russian-speaking dark web forum xss further indicates their operational sphere.1 The comprehensive and historical nature of the stolen property data makes it exceptionally valuable for various illicit activities. This includes enabling highly targeted social engineering campaigns, Business Email Compromise (BEC) schemes, identity theft, real estate fraud, and title theft. The data’s depth also allows for its potential use in high-payoff burglary opportunities or even for strategic intelligence gathering to inform misinformation/disinformation campaigns, political influencing, or market manipulation.1

Associated Links:

Incident 2: Alleged Data Leak of Israeli Defense Personnel

Incident Details: An alleged data leak concerning Israeli defense personnel has been reported.4 While the specific content and volume of the compromised data were not detailed in the provided source, the nature of the target—defense personnel—points to a highly sensitive compromise with significant national security implications.

Threat Actor Profile: USTINT / UNC4841 (Potential Link)

While “USTINT” is not directly identified as a specific threat actor in the available information, the targeting of Israeli defense personnel aligns strongly with the known activities of state-sponsored or politically motivated groups engaged in espionage. UNC4841, a well-resourced threat actor with suspected links to China, is known for conducting global espionage operations, primarily focusing on government and technology organizations.5 Furthermore, Iranian threat actors are explicitly documented as targeting U.S. defense companies with ties to Israel and are known for launching “hack-and-leak” campaigns in the context of the Israel-Hamas conflict.6 This type of specific targeting suggests a motivation beyond mere financial gain. It is characteristic of nation-state or state-sponsored hacktivist groups involved in espionage or information warfare. The research confirms that Iranian-backed actors are actively conducting “hack-and-leak” campaigns against Israeli-linked entities, aiming for both data theft and reputational damage. This incident fits directly into the broader geopolitical conflict, demonstrating that cyber operations are an integral component of modern statecraft and proxy conflicts.6 UNC4841 employs a wide array of malware, including SKIPJACK, SEASPRAY, WHIRLPOOL, SALTWATER, and SUBMARINE, along with purpose-built tools, deploying them selectively against high-priority targets. They have also exploited zero-day vulnerabilities, such as the Barracuda ESG (CVE-2023-2868).5 The leakage of defense personnel data presents severe national security risks, including potential for espionage, blackmail, and targeted social engineering attacks against individuals or their associates. Such data can also be weaponized for disinformation campaigns, further destabilizing the geopolitical environment.

Associated Links:

Incident 3: Alleged Data Breach of Ministry of Home Affairs of the Republic of Indonesia

Incident Details: A significant alleged data leak involving 337 million population data sets from a government database, specifically the Directorate General of Population and Civil Registration (Dukcapil) of the Home Affairs Ministry in Indonesia, has been reported.7 The compromised data is highly sensitive and comprehensive, including vital information such as population identification numbers (NIK), place of birth, religion, marital status, divorce certificates, mother’s names, occupations, and passport numbers.7 The sheer volume of records, exceeding the country’s population, indicates a potentially massive compromise of a critical national database.

Threat Actor Profile: DigitalGhost / Ghost (Potential Link)

This incident aligns with the indiscriminate targeting strategy often employed by financially motivated groups like DigitalGhost, also known by aliases such as Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture.8 DigitalGhost, a China-based actor, is known for targeting a wide array of sectors globally, including government networks, primarily for financial gain.8 DigitalGhost typically gains initial access by exploiting publicly available Common Vulnerabilities and Exposures (CVEs) in outdated internet-facing services, such as Fortinet FortiOS, Adobe ColdFusion, Microsoft SharePoint, and Microsoft Exchange.8 Many of these vulnerabilities have had patches available for over a decade, indicating a systemic failure in patch management within affected organizations.9 Once inside, they deploy web shells and Cobalt Strike Beacon, utilizing tools like Mimikatz for credential access. They are recognized for their rapid ransomware deployment, often proceeding from initial compromise to ransomware deployment within the same day, and for exfiltrating data for extortion purposes.8 The scale of this leak from a government entity, combined with the known methods of groups like DigitalGhost, strongly suggests that critical public sector infrastructure continues to suffer from fundamental cybersecurity weaknesses, particularly in patch management and vulnerability remediation. This points to a systemic issue where basic cyber hygiene failures are exploited by opportunistic, financially motivated actors, leading to severe national-level data compromises. The exposure of such extensive population data has profound and lasting societal implications. It creates a permanent resource for criminals to conduct various forms of fraud, not just immediately but for years to come. This type of breach erodes citizen trust in government’s ability to protect sensitive information and can lead to widespread, persistent financial and personal harm across the population, impacting national stability.

Associated Links:

Incident 4: Alleged Data Breach of Algeria Telecom

Incident Details: Phantom Atlas, a hacker group, allegedly infiltrated Algérie Télécom’s internal network, gaining comprehensive access to the infrastructure map. They reportedly obtained detailed technical information, including network routes, central routers, content distribution rings, and interconnections between national and international links.10 This attack was claimed as a direct cyber retaliation in response to a previous breach attributed to the Algerian group Jabaroot DZ.10

Threat Actor Profile: Phantom Atlas

Phantom Atlas is identified as a Moroccan “shadowy digital warrior” group actively engaged in cyber retaliation against Algerian entities.10 Their primary motivation is geopolitical, driven by the ongoing cyber conflict between Morocco and Algeria. This incident is a clear demonstration of a tit-for-tat cyber conflict between nation-states (or their proxies), moving beyond simple data theft to direct attacks on critical national infrastructure. This signifies an escalation where cyber capabilities are actively used as instruments of foreign policy and retaliation, blurring the lines between traditional warfare and cyber warfare. It implies a need for nations to not only defend their own infrastructure but also to develop doctrines for cyber deterrence and response. Phantom Atlas’s TTPs involve deep infiltration of internal network infrastructure and the exfiltration of detailed technical and confidential files. They claimed to have extracted “over 13 gigabytes of confidential files” and “highly sensitive strategic documents” from the Algerian Ministry of Labor’s systems.10 The group is explicitly linked to Morocco and acts in direct response to Algerian hacker groups like Jabaroot DZ. They have issued stern warnings of “disproportionate” responses to provocations.10 The compromise of a national telecommunications backbone represents a critical infrastructure attack, potentially enabling widespread disruption of internet and telephone services, facilitating surveillance, and serving as a foundation for further strategic attacks. The exfiltration of strategic documents can provide significant intelligence advantages to the opposing side. This attack serves a dual purpose: immediate retaliation and long-term intelligence gathering. By mapping the telecom network, the attackers gain strategic insights that can be leveraged for future disruptive or espionage operations. This highlights how cyberattacks in geopolitical contexts are not merely about immediate impact but also about building a persistent advantage and understanding the adversary’s critical systems for future exploitation.

Associated Links:

Incident 5: Alleged Data Breach of Vynopsis

Incident Details: An alleged data breach of Vynopsis was reported by the Handala hacktivist group.11 While specific details regarding the nature or volume of the compromised data were not available through the provided source, the attribution to Handala places this incident within the context of politically motivated cyber operations against Israeli-linked entities.

Threat Actor Profile: Handala Hack

Handala is a pro-Palestinian hacktivist group, reportedly funded by Iran, that has been highly active since October 7, 2023.12 Their primary motivation is political, centered on targeting Israeli cybersecurity and critical infrastructure. Handala’s evolution from relatively low-impact disruptive acts, such as triggering school alarms and sending intimidating SMS messages, to sophisticated, large-scale data exfiltration and ransomware attacks demonstrates a significant increase in their technical capabilities and strategic ambition.12 This indicates that hacktivist groups, especially those with state backing, are evolving from nuisance actors to highly capable threats that can inflict substantial damage and gather sensitive intelligence, blurring the lines between hacktivism and state-sponsored Advanced Persistent Threats (APTs). Handala employs a range of sophisticated cyber-attacks, including phishing campaigns, ransomware, and website defacements. They frequently release partial evidence of their successes to maintain a reputation as a significant threat, even when the full extent of their claims is not verifiable.13 They have claimed massive data exfiltration, including 419GB from an Israeli recruitment firm, 11TB from a media and communications firm, and 4TB from a research institute, alongside ransomware attacks against various Israeli entities.13 The group is named after a character created by a Palestinian political cartoonist and maintains an active Telegram channel and a new website (handala.to).13 Attacks by Handala, particularly against Israeli entities, contribute to a climate of instability and can cause significant financial, reputational, and operational damage, aligning with broader geopolitical objectives. Handala’s deliberate strategy of leaking partial evidence and engaging in public messaging (SMS, Telegram) is not just about proving a breach but about controlling the narrative and inducing fear and uncertainty. This highlights that for state-backed hacktivist groups, the psychological and informational impact of an attack is as important as the technical compromise itself, making them key players in modern information warfare.

Associated Links:

Incident 6: Alleged Leak of CryptBot Malware Source Code

Incident Details: An alleged leak of the source code for CryptBot malware has been reported.15 CryptBot is identified as an infostealer, a type of malicious software designed to target and exfiltrate sensitive data such as browser cookies, credentials, and cryptocurrency wallets.16 This malware is commonly distributed through malicious URLs or via cracked software installers.16

Threat Actor Profile: Malware Author / Infraud Organization (General Context)

While no specific actor is named as responsible for this particular source code leak, the phenomenon of malware source code being leaked or sold is a critical component of the broader cybercrime ecosystem. The Infraud Organization serves as a historical example of a transnational cybercrime enterprise that specialized in the large-scale acquisition, sale, and dissemination of various illicit goods, including computer malware.17 Valerian Chiochiu, a member of Infraud, notably pleaded guilty to authoring “FastPOS” malware, illustrating the role of malware developers within such criminal syndicates.17 Malware authors develop malicious software for data harvesting (like infostealers such as CryptBot) or other illicit purposes. Their TTPs encompass the creation, distribution (often via malicious URLs or cracked software), and frequently the sale of their tools on cybercrime forums.16 The leaking or sale of malware source code, such as CryptBot, significantly lowers the barrier to entry for aspiring cybercriminals. It enables individuals with less technical expertise to acquire and deploy sophisticated tools, or even modify them for new attacks. This “democratization” of cybercrime tools leads to a broader and more diverse threat landscape, making it harder for defenders to anticipate and mitigate attacks as more actors gain access to potent capabilities. The leak of malware source code represents a supply chain risk within the cybercriminal ecosystem itself. Just as legitimate software supply chain compromises can have widespread ripple effects, a leaked malware source code can be integrated into new attack frameworks, sold to multiple groups, or used to create variants. This creates a cascading effect, where one initial compromise (the source code leak) can fuel numerous subsequent attacks across the digital landscape, making attribution and defense more complex.

Associated Links:

Incident 7: Alleged Data Leak of Unified Information System for Public Procurement in Russia (ZAKUPKI.GOV.RU DATABASE)

Incident Details: An alleged data leak from ZAKUPKI.GOV.RU, Russia’s Unified Information System for Public Procurement, has been reported.19 This system is central to government contracting and financial flows, making any compromise highly sensitive. Specific details regarding the scope or content of the leak were not available through the provided source, but the target itself indicates a significant potential impact.

Threat Actor Context: While no specific actor is named as responsible for this incident, the targeting of a government procurement system aligns with the objectives of both state-sponsored espionage and politically motivated hacktivism. Compromising a public procurement system extends beyond simple data theft; it can expose critical economic vulnerabilities, supply chain dependencies, and potentially even instances of corruption. This type of targeting is highly strategic, suggesting motivations related to economic espionage, disruption, or political leverage, rather than solely financial gain. It indicates a focus on undermining national economic stability or gaining competitive intelligence at a state level.

Associated Links:

Incident 8: Alleged Data Breach of Justdial Ltd (India)

Incident Details: Over 100 million JustDial users’ personal data was reportedly exposed on the internet.20 JustDial, India’s largest local search service, experienced this compromise due to an unprotected, publicly accessible API endpoint. This vulnerable endpoint had existed since at least mid-2015 and was found to be fetching real-time information directly from the production server.20 The exposed data included names, email addresses, mobile numbers, physical addresses, gender, dates of birth, photos, occupations, and company names.20

Threat Actor Context: No specific threat actor was named as directly responsible for exploiting this vulnerability. However, the nature of the vulnerability—an unprotected API—and the massive scale of the exposed data make it a prime target for opportunistic, financially motivated actors. This includes groups involved in credential stuffing 2 or large-scale data brokering. This incident highlights a critical and often overlooked vulnerability: legacy systems and forgotten infrastructure. Even if an API is no longer actively used, if it remains connected to a production database and is unprotected, it poses a severe, long-term risk. This underscores the importance of thorough asset management, regular security audits that include deprecated systems, and comprehensive decommissioning processes to prevent such “ghost” vulnerabilities from leading to massive data breaches. The exposure of over 100 million user profiles, even without direct passwords, provides a massive dataset for credential stuffing attacks against

other services. Attackers can combine this PII with passwords from other breaches or use it for targeted phishing to acquire credentials.2 This incident, therefore, does not just impact JustDial users but significantly increases the attack surface for countless other online services where these users might have reused their information, creating a cascading security risk across the internet.

Associated Links:

Incident 9: Alleged Data Leak of City of Chattanooga (US)

Incident Details: The City of Chattanooga notified 836 residents about a data breach linked to Nationwide Recovery Services (NRS), a third-party vendor. This incident affected sensitive personal information of approximately 14,000 customers, including names, addresses, dates of birth, Social Security numbers, and financial account information.21 The breach itself occurred between July 5th and July 11th, 2024, but NRS reportedly failed to inform the city until February 2025, a significant delay.21

Threat Actor Context: No specific threat actor was named as responsible for this breach. The nature of the exposed data (PII, financial) and the apparent delay in notification suggest a financially motivated breach, likely opportunistic in nature. This incident underscores the critical and often underestimated risk posed by third-party vendors, particularly those handling sensitive data. The significant delay in breach notification by the vendor (NRS) to the primary entity (City of Chattanooga) severely hampered the ability to mitigate damage and protect affected individuals promptly. This highlights the urgent need for robust vendor risk management frameworks, including strict contractual obligations for timely incident reporting and clear accountability mechanisms, to ensure that third-party security failures do not become catastrophic for the primary organization and its constituents. Beyond the immediate data compromise, the delayed notification has triggered significant legal and reputational repercussions for NRS. The City Attorney is exploring legal action against NRS for failing to meet contractual obligations regarding timely notifications, and a lawsuit has already been filed by an affected patient.21 This demonstrates that non-compliance with notification requirements, even if not explicitly malicious, can lead to severe financial penalties, contract terminations, and a loss of public trust. It reinforces the notion that transparent and timely communication post-breach is not just a regulatory requirement but a critical component of maintaining stakeholder confidence and minimizing long-term damage.

Associated Links:

Other Noteworthy Incidents (Source Inaccessible/Limited Info)

A considerable number of other incidents were reported, though their primary source links (often dark web forums or Telegram channels) were inaccessible at the time of this analysis. These incidents provide further context to the current threat landscape:

  • Alleged Sale of AI-Powered Inbox Spamming System 22:
    The mention of “AI-powered spamming” suggests an emerging trend where cybercriminals leverage artificial intelligence to create more sophisticated and personalized social engineering and phishing attacks. This mirrors observations of cybercriminals weaponizing fake AI websites for malware distribution.23
  • Alleged Data Sale of Toyota Motor Thailand Co., Ltd. 24:
    This highlights the continued targeting of large corporations in the automotive sector, likely for corporate espionage or financial gain.
  • Alleged Data Sale of an Unidentified Hotel and Restaurant in Dubai Marina 25:
    Dubai has been identified as a hub for illicit transactions and money laundering.26 This incident could be linked to broader financial crime activities or opportunistic attacks on the hospitality sector.
  • Alleged Admin Access Sale to Italian Online Store 27, U.S. Online Store Payment Form Access 28, and Prestashop based French online store 29:
    These incidents point to common financially motivated attack vectors: gaining unauthorized access to e-commerce platforms to steal payment information or user data, or to facilitate various forms of fraud.
  • Alleged Data Leak of Harvard University 30:
    Universities are high-value targets due to the vast amounts of PII they hold (students, faculty, alumni), valuable research data, and significant financial information.31
  • Alleged Data Sale of CodeCrew Infotech Pvt. Ltd. 32:
    CodeCrew is an email marketing and consulting service.33 A breach here could lead to supply chain attacks, enabling threat actors to leverage compromised email infrastructure for phishing or spamming campaigns targeting CodeCrew’s clients.
  • Alleged Access to Hotel’s Automated Energy and Heating Management System in Paris 34:
    This is a significant incident as it targets Operational Technology (OT) or Building Management Systems (BMS), moving beyond traditional IT systems. Compromise of such systems can lead to physical disruption, safety issues, or even serve as a pivot point for further attacks on critical infrastructure.35
  • Alleged Data Breach of mPrest Systems Iron Dome Database 36:
    This is a highly sensitive target, indicating a potential nation-state or sophisticated hacktivist attack aimed at defense capabilities.
  • Alleged Data Breach of Puma Israel 37:
    Another example of targeting Israeli entities, likely by politically motivated groups.
  • Alleged Unauthorized Access to Ritta Company Limited 38, Netbay Public Company Limited 39, and Siam InnoCity cloud platform 40:
    These incidents, attributed to “NXBB.SEC” (for which no specific profile was found in the provided research), indicate a focus on corporate networks and cloud environments, likely for data exfiltration or financial gain.

The analysis of recent cyber incidents reveals several overarching trends that are shaping the current threat landscape. These trends highlight the evolving tactics of adversaries and the persistent vulnerabilities that organizations face.

  • Proliferation of Data Sales on Dark Web Forums: A consistent theme across many incidents is the advertisement and sale of stolen data on dark web marketplaces and Telegram channels. This underscores the maturity of the cybercrime economy, where data is treated as a commodity. The frequent inaccessibility of many of these links indicates the ephemeral and often clandestine nature of these illicit markets, making real-time intelligence gathering a challenging endeavor.
  • Credential Stuffing Remains a Preferred Attack Vector: Despite relatively low individual success rates (estimated between 0.2% and 2.0%), credential stuffing remains highly prevalent, accounting for over 80% of hacking-related breaches.2 Its low cost and reliance on automation make it an attractive method for threat actors to exploit widespread password reuse across multiple services.2
  • Exploitation of Known Vulnerabilities and Outdated Systems: Actors such as DigitalGhost consistently target internet-facing services that run outdated software and firmware, exploiting publicly available CVEs.8 Some of these vulnerabilities have had patches available for over a decade, pointing to a systemic failure in patch management across diverse sectors globally.9
  • Rise of Geopolitical Hacktivism and Information Operations: Groups like Handala and Cyber Fattah (linked to ZeroDayX) demonstrate a clear shift towards politically motivated attacks, often with suspected state backing (e.g., Iran).6 These groups engage in “hack-and-leak” campaigns, combining data theft with information operations, such as social media threats and propaganda amplification, to achieve broader geopolitical objectives beyond mere financial gain.6
  • Targeting of Operational Technology (OT) and Building Management Systems (BMS): The alleged access to a hotel’s energy management system in Paris illustrates a concerning expansion of attack surfaces beyond traditional IT networks into critical operational infrastructure.34 Compromise of such systems can lead to physical disruption, safety issues, or even serve as a pivot point for further attacks on interconnected critical infrastructure.
  • Resilience of Cybercrime Syndicates: The resurgence of groups like Scattered Spider (also known as Muddled Libra or UNC3944), despite arrests of some members, indicates the adaptive nature of these organizations.42 This resilience poses a continuous threat that necessitates sustained law enforcement efforts combined with robust defensive measures.
  • AI in Cybercrime: The alleged sale of an “AI-powered Inbox Spamming System” and the documented use of AI tools for disinformation by Iranian actors 6 suggest an emerging trend where cybercriminals are leveraging artificial intelligence to enhance the sophistication and scale of their attacks, particularly in social engineering and propaganda campaigns.23

Discussion of Specific Threat Actor Groups and their Evolving Methodologies

  • DigitalGhost: This group is characterized by its rapid, opportunistic ransomware deployment, leveraging well-known, unpatched vulnerabilities across a wide victim base.8 Their speed from initial access to ransomware deployment, often occurring within the same day, makes them a particularly agile and dangerous threat.8
  • Sentap: A versatile, financially motivated actor, Sentap engages in large-scale data brokering. Their demonstrated capabilities in bypassing Web Application Firewalls (WAFs) and crypto draining suggest a broader range of offensive skills beyond simple data acquisition, indicating active involvement in system compromise.1
  • Handala Hack: This group has evolved from engaging in disruptive hacktivism to executing sophisticated, large-scale data exfiltration and ransomware attacks. Often operating with suspected state-sponsored backing, Handala employs information operations as a core component of their strategy to achieve political impact.13
  • Infraud Organization (Malware Author Context): Historically, the Infraud Organization exemplified a highly organized, transnational cybercrime enterprise that professionalized the market for stolen data and malware.17 Their model demonstrates the long-term threat posed by such syndicates, which facilitate the commoditization of cybercrime tools and services.
  • Scattered Spider (Muddled Libra, UNC3944): This group represents a persistent and adaptive financially motivated entity that targets critical sectors such as aviation and transportation.42 Their continued operation despite law enforcement actions highlights the significant challenge in dismantling resilient cybercriminal organizations.
  • Phantom Atlas: A state-linked actor, Phantom Atlas engages in direct cyber retaliation against geopolitical adversaries. Their actions demonstrate the increasing use of cyber capabilities as an instrument of foreign policy, blurring the lines between traditional conflict and cyber warfare.10

The analysis reveals that the traditional clear-cut distinctions between financially motivated cybercriminals, hacktivists, and state-sponsored actors are increasingly blurring. State-backed groups may engage in financially disruptive attacks for political ends, and financially motivated groups adopt sophisticated TTPs previously associated with Advanced Persistent Threats (APTs). This convergence means organizations cannot simply categorize threats but must prepare for a wider array of sophisticated attacks driven by diverse motivations, requiring a more holistic and adaptive defense strategy.

The pervasive “as-a-service” model within the cybercriminal underground—including Ransomware-as-a-Service, Access-as-a-Service, and Data-as-a-Service—significantly lowers the technical barrier for entry into cybercrime.43 This allows individuals or smaller groups to leverage sophisticated tools and compromised data without needing to develop them from scratch. This professionalization and commoditization of cybercrime capabilities lead to an exponential increase in the volume, variety, and overall effectiveness of attacks, making the threat landscape more dynamic and challenging for defenders.

Table 2: Prominent Threat Actor TTPs & Characteristics

Threat Actor/GroupPrimary MotivationsKey TTPs (Tactics, Techniques, and Procedures)Common TargetsNoteworthy Affiliations/Aliases
SentapFinancial GainWebsite cloning, WAF bypass, crypto draining, large-scale data brokeringU.S. property services, various entities for data salesPosted on xss forum
USTINT / UNC4841Espionage, GeopoliticalWide range of malware (SKIPJACK, SEASPRAY, etc.), purpose-built tooling, zero-day exploitation (Barracuda ESG), global espionageGovernment, technology organizations, defense sectorSuspected links to China
DigitalGhost / GhostFinancial Gain (Ransomware)Exploiting public CVEs (Fortinet, Adobe ColdFusion, MS SharePoint/Exchange), web shells, Cobalt Strike Beacon, Mimikatz, rapid ransomware deployment, data exfiltration for extortionCritical infrastructure, schools, universities, healthcare, government networks, technology, manufacturing, SMBsCring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, Rapture (China-based)
Handala HackGeopolitical/HacktivismPhishing campaigns, ransomware, website defacements, large-scale data exfiltration, information operations (SMS, propaganda)Israeli cybersecurity, critical infrastructure, government, media, constructionPro-Palestinian, reportedly Iran-funded
Phantom AtlasGeopolitical/Cyber RetaliationInfiltration of internal network infrastructure, exfiltration of detailed technical information and confidential filesAlgerian telecommunications, government entitiesMoroccan “shadowy digital warrior” group
Infraud Organization (General Context)Financial GainLarge-scale acquisition, sale, and dissemination of stolen identities, credit cards, PII, financial info, malware (“FastPOS”)Financial institutions, merchants, private individualsTransnational cybercrime enterprise
Scattered SpiderFinancial GainTargeting aviation and transportation sectors (specific TTPs not detailed in snippets)Aviation, transportationMuddled Libra, UNC3944

Review of Inaccessible Source Material

It is important to note that a significant number of the reported incidents (as indicated by the S_B numbered entries in the research material) had inaccessible source URLs at the time of this analysis. These inaccessible links often pointed to dark web forums or private Telegram channels, which are inherently transient and clandestine environments. While the titles of these incidents provided valuable context regarding the types of threats observed, the inability to directly verify the claims or retrieve further details from the original sources impacts the depth of specific incident analysis for those particular entries. However, this limitation does not diminish the overall trends and threat actor behaviors inferred from the accessible and profiled incidents.

Examples of inaccessible incident links include:

Disambiguation of Threat Actor Names from Research Material

During the analysis, some terms appearing in the initial query or associated with incidents did not correspond to specific, identifiable threat actors within the provided research material. To maintain clarity and accuracy, these terms are clarified below:

  • “flirt cybercrime”: The available information 44 describes “romance scam, cyber crime” and “sexting” as categories or forms of cybercrime, rather than identifying a specific threat actor or group named “flirt.” This term denotes a type of illicit activity.
  • “b0nd cybercrime”: The research material 46 defines cybercrime broadly and discusses aspects like bail bonds related to cybercrime charges. However, it does not identify “b0nd” as a specific cyber threat actor or group.
  • “Deadman dark web”: The provided snippets 48 refer to a DC Comics character and a “dead man’s switch” concept in the context of blockchain and online identity management. Neither of these references identifies “Deadman” as a cyber threat actor.
  • “Liwaa Muhammad”: The research material 50 refers to an Islamic flag (“Liwaa”) and a football player (“Liwaa Adnan Mohammed”). While an incident in the provided JSON suggests “Liwaa Muhammad targets the website of Industrywala,” the accompanying research does not yield a direct cyber threat actor profile for a group explicitly named “Liwaa Muhammad.” The nature of its reported activities (website targeting) suggests hacktivism, but specific details about the group’s origins, motivations, or TTPs are absent from the provided information.
  • “Z-ALLIANCE”: No specific threat actor profile was found for “Z-ALLIANCE” in the provided research material. The incident associated with this name (access to a hotel’s energy management system) suggests a potentially sophisticated actor targeting Operational Technology (OT) or Building Management Systems (BMS).
  • “NXBB.SEC”: No specific threat actor profile was found for “NXBB.SEC” in the provided research material. The incidents attributed to this name (unauthorized access to companies and cloud platforms) suggest activities typically associated with financially motivated cybercriminals or those engaged in corporate espionage.
  • “NKRI EROR SYSTEM”: No specific threat actor profile was found for “NKRI EROR SYSTEM” in the provided research material. The incident associated with this name (website targeting) suggests defacement or disruption as its primary objective.
  • “yanguatess cybercrime”, “HIME666 cybercrime”, “abidjonka cybercrime”, “janson2025 cybercrime”, “mecrobyte cybercrime”, “gangalf61 cybercrime”, “Yudgin cybercrime”, “JakartaCyberPsychos_s”: No specific threat actor profiles were found in the provided research material for these aliases.

For incidents associated with these unprofiled or disambiguated terms, the report infers their likely nature based on the type of incident they are linked to, acknowledging the absence of specific threat actor information.

5. Recommendations for Enhanced Cyber Resilience

To navigate the complex and evolving cyber threat landscape, organizations must adopt a multi-layered and proactive approach to cybersecurity. The trends observed in the past 24 hours, from large-scale data brokering to sophisticated geopolitical hacktivism and attacks on operational technology, necessitate robust strategic and tactical responses.

Strategic Recommendations

  • Comprehensive Risk Assessment: Organizations should regularly assess and update their risk profiles, paying particular attention to often-overlooked areas such as third-party vendors, legacy systems, and operational technology (OT) environments. The incident involving the City of Chattanooga and its third-party vendor highlights the cascading risk posed by external dependencies.21 Understanding and mitigating these extended risks is crucial.
  • Intelligence-Driven Defense: Integrating current threat intelligence feeds into security operations is paramount. This allows security teams to understand the latest tactics, techniques, and procedures (TTPs) of active threat actors, especially those known to target their specific sector or geographic region. Staying informed about groups like Sentap, DigitalGhost, and Handala can help prioritize defensive efforts.1
  • Proactive Incident Response Planning: Developing and regularly testing incident response plans is essential. These plans must account for rapid-fire attacks, such as DigitalGhost’s quick ransomware deployment, and politically motivated “hack-and-leak” campaigns, which require not only technical containment but also strategic communication strategies.8
  • Supply Chain Security: Implementing stringent security requirements and conducting thorough audit processes for all third-party vendors and software suppliers is critical. Organizations must recognize that compromises within their supply chain can directly impact their own security posture, as exemplified by the City of Chattanooga incident.21
  • Investment in OT/ICS Security: Given the emerging trend of targeting Operational Technology (OT) and Building Management Systems (BMS), organizations with such infrastructure must invest in specialized security solutions and expertise. Protecting these systems is vital to prevent physical disruption and ensure safety.34

Tactical Recommendations

  • Robust Patch Management: Prioritize and aggressively patch all internet-facing systems and applications, especially those with publicly known Common Vulnerabilities and Exposures (CVEs). Implementing automated vulnerability scanning and patch deployment processes can significantly reduce the attack surface exploited by opportunistic groups like DigitalGhost.8
  • Multi-Factor Authentication (MFA) and Strong Password Policies: Mandating MFA for all accounts, particularly for remote access and critical systems, is a fundamental defense. Enforcing strong, unique password policies helps mitigate the widespread impact of credential stuffing attacks, even if user credentials are leaked from other services.2
  • Continuous Monitoring and User Behavior Analytics (UEBA): Deploying Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA) tools is crucial for detecting suspicious login patterns, rapid-fire login attempts, and unusual traffic origins (e.g., from VPNs or proxy networks) that indicate credential stuffing or other automated attacks.3
  • Endpoint Detection and Response (EDR) and Antivirus: Ensuring that up-to-date EDR and antivirus solutions are deployed across all endpoints is vital for detecting and blocking malicious software. This includes infostealers like CryptBot and Cobalt Strike Beacon implants, which are commonly used by various threat groups.8
  • Data Protection and Backup: Implementing robust data backup strategies is non-negotiable. Backups should be immutable, air-gapped, and regularly tested to facilitate swift recovery from ransomware attacks and data deletion incidents. Encrypting data both at rest and in transit adds an additional layer of protection.52
  • Employee Awareness Training: Regular training on phishing, social engineering, and the importance of password hygiene is essential. Employees should be educated on the risks of credential reuse and the dangers of clicking on unsolicited links, especially those potentially leveraging AI-generated lures for increased sophistication.23
  • Dark Web Monitoring: Proactively monitoring deep and dark web forums for mentions of your organization, compromised credentials, or data being brokered for sale can provide early warning of potential threats and allow for timely mitigation efforts.1
  • Network Segmentation and Access Control: Implementing strict network segmentation limits lateral movement within the network should a breach occur. Applying the principle of least privilege for all user and system accounts minimizes the potential impact of compromised credentials.

Works cited

  1. Flash Report: U.S. Property Data Advertised for Sale on Dark Web Forum | ZeroFox, accessed July 3, 2025, https://www.zerofox.com/intelligence/flash-report-u-s-property-data-advertised-for-sale-on-dark-web-forum/
  2. Credential Stuffing 101: What It Is and How to Prevent It | Wiz, accessed July 3, 2025, https://www.wiz.io/academy/credential-stuffing
  3. What Is Credential Stuffing? – Definition & More on Attacks | Proofpoint US, accessed July 3, 2025, https://www.proofpoint.com/us/threat-reference/credential-stuffing
  4. accessed January 1, 1970, https://t.me/WeAreUst/359
  5. UNC4841 (Threat Actor) – Malpedia, accessed July 3, 2025, https://malpedia.caad.fkie.fraunhofer.de/actor/unc4841
  6. Iran-backed hackers may target US defense companies tied to Israel, agencies warn, accessed July 3, 2025, https://www.defenseone.com/threats/2025/06/iran-backed-hackers-may-target-us-defense-companies-tied-israel-agencies-warn/406435/
  7. Government to investigate alleged population data leak – ANTARA News, accessed July 3, 2025, https://en.antaranews.com/news/288585/government-to-investigate-alleged-population-data-leak
  8. #StopRansomware: Ghost (Cring) Ransomware | CISA, accessed July 3, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a
  9. Ghost ransomware: What you need to know and immediate actions to take – Cohesity, accessed July 3, 2025, https://www.cohesity.com/blogs/ghost-ransomware-gang/
  10. Phantom Atlas Hackers Infiltrate Algérie Télécom Network in Cyber Retaliation, accessed July 3, 2025, https://www.moroccoworldnews.com/2025/06/210860/phantom-atlas-hackers-infiltrate-algerie-telecom-network-in-cyber-retaliation/
  11. accessed January 1, 1970, https://t.me/handala_hack27/67
  12. Israel: Pro-Palestinian Hacktivists Trigger Alarms in Schools – INCYBER NEWS, accessed July 3, 2025, https://incyber.org/en/article/israel-pro-palestinian-hacktivists-trigger-alarms-in-schools/
  13. Handala Hack: What We Know About the Rising Threat Actor – Cyberint, accessed July 3, 2025, https://cyberint.com/blog/threat-intelligence/handala-hack-what-we-know-about-the-rising-threat-actor/
  14. Breaking Cyber News From Cyberint, accessed July 3, 2025, https://cyberint.com/news-feed/
  15. accessed January 1, 1970, https://darkforums.st/Thread-Malware-sourcecode-2025-July-Leak-Latest
  16. Cryptbot malware – Broadcom Inc., accessed July 3, 2025, https://www.broadcom.com/support/security-center/protection-bulletin/cryptbot-malware
  17. Malware Author Pleads Guilty for Role in Transnational Cybercrime Organization Responsible for more than $568 Million in Losses – Department of Justice, accessed July 3, 2025, https://www.justice.gov/archives/opa/pr/malware-author-pleads-guilty-role-transnational-cybercrime-organization-responsible-more-568
  18. Malware Author Admits Role in $568m Cyber-Fraud – Infosecurity Magazine, accessed July 3, 2025, https://www.infosecurity-magazine.com/news/malware-author-admits-role-in-568m/
  19. accessed January 1, 1970, http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-ZAKUPKI-GOV-RU-DATABASE
  20. Over 100 Million JustDial Users’ Personal Data Found Exposed On the Internet – The Hacker News, accessed July 3, 2025, https://thehackernews.com/2019/04/justdial-hacked-data-breach.html
  21. Chattanooga Data Breach: City Takes Action, accessed July 3, 2025, https://www.herechattanooga.com/chattanooga-data-breach-action/
  22. accessed January 1, 1970, https://forum.exploit.in/topic/261858/?tab=comments#comment-1579053
  23. Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites | Google Cloud Blog, accessed July 3, 2025, https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
  24. accessed January 1, 1970, https://t.me/c/2448264156/991
  25. accessed January 1, 1970, http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-UAE-Databases-for-Sale
  26. Leaked Dubai property files link luxury flats to OneCoin crypto scammers – ICIJ, accessed July 3, 2025, https://www.icij.org/news/2024/05/leaked-dubai-property-files-link-luxury-flats-to-onecoin-crypto-scammers/
  27. accessed January 1, 1970, https://forum.exploit.in/topic/261856/?do=findComment&comment=1579044
  28. accessed January 1, 1970, https://forum.exploit.in/topic/261857/?tab=comments#comment-1579056
  29. accessed January 1, 1970, https://forum.exploit.in/topic/261844/?do=findComment&comment=1579011
  30. accessed January 1, 1970, http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-Leak-Havard-University-Data-Docs
  31. Breach of Data Security: What to Do | Office of the General Counsel, accessed July 3, 2025, https://ogc.harvard.edu/book/breach-data-security-what-do
  32. accessed January 1, 1970, http://qeei4m7a2tve6ityewnezvcnf647onsqbmdbmlcw4y5pr6uwwfwa35yd.onion/Thread-FULL-COMPROMISE-CodeCrew-Infotech-Pvt-Ltd-%E2%80%94-Database-Dump-Deface-Proof
  33. CodeCrew: Full Service Email Marketing Agency, accessed July 3, 2025, https://codecrew.us/
  34. accessed January 1, 1970, https://t.me/Z_alliance_ru/321
  35. Hotel Energy Management – Vingcard, accessed July 3, 2025, https://www.vingcard.com/en/solutions/guest-room-management/energy-management
  36. accessed January 1, 1970, https://darkforums.st/Thread-50K-IRON-DOME-DATABASE
  37. accessed January 1, 1970, https://darkforums.st/Thread-PUMA-ISRAEL-DATABASE
  38. accessed January 1, 1970, https://t.me/nxbbsec/478
  39. accessed January 1, 1970, https://t.me/nxbbsec/472
  40. accessed January 1, 1970, https://t.me/nxbbsec/461
  41. Cyber Fattah Leaks Data from Saudi Games in Alleged Iranian Operation, accessed July 3, 2025, https://www.infosecurity-magazine.com/news/cyber-fattah-leaks-data-saudi-games/
  42. Risky Bulletin: Scattered Spider goes after aviation sector, accessed July 3, 2025, https://risky.biz/risky-bulletin-scattered-spider-goes-after-aviation-sector/
  43. Law enforcement takes down two largest cybercrime forums in the world – Europol, accessed July 3, 2025, https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-takes-down-two-largest-cybercrime-forums-in-world
  44. 119 Cyber Flirt Stock Vectors and Vector Art – Shutterstock, accessed July 3, 2025, https://www.shutterstock.com/search/cyber-flirt?image_type=vector
  45. Internet and Cyber Crimes | Boston Criminal Lawyer Law Offices of Stephen Neyman, accessed July 3, 2025, https://www.neymanlaw.com/practice-areas/miscellaneous-crimes/internet-and-cyber-crimes/
  46. List of cybercriminals – Wikipedia, accessed July 3, 2025, https://en.wikipedia.org/wiki/List_of_cybercriminals
  47. Cybercrime Bail Bonds DFW, accessed July 3, 2025, https://www.awayoutbonds.com/criminal-cases/cyber-crime/
  48. Deadman (character) – Wikipedia, accessed July 3, 2025, https://en.wikipedia.org/wiki/Deadman_(character)
  49. Dead man’s switch – DFINITY Forum, accessed July 3, 2025, https://forum.dfinity.org/t/dead-mans-switch/23538
  50. Black Standard – Wikipedia, accessed July 3, 2025, https://en.wikipedia.org/wiki/Black_Standard
  51. Liwaa Adnan Mohammed – Player profile – Transfermarkt, accessed July 3, 2025, https://www.transfermarkt.com/liwaa-adnan-mohammed/profil/spieler/485146
  52. Cyble finds escalating cyber threats in software supply chains across critical sectors, accessed July 3, 2025, https://industrialcyber.co/supply-chain-security/cyble-finds-escalating-cyber-threats-in-software-supply-chains-across-critical-sectors/
  53. Cybercrime – FBI, accessed July 3, 2025, https://www.fbi.gov/investigate/cyber