1. Executive Summary
This report provides a detailed overview and analysis of 27 distinct cyber incidents, all reported on July 11, 2025, as described in the provided incident data. These incidents span a wide range of categories, with a significant prevalence of data breaches and data leaks, alongside instances of malware sales, initial access brokering, and website defacements. The affected entities and individuals are geographically diverse, impacting countries such as Thailand, Israel, Russia, Chile, USA, Algeria, Indonesia, Spain, Japan, France, Brazil, Saudi Arabia, Mexico, Georgia, and India, and spanning various sectors including government, banking, education, real estate, retail, and telecommunications.
A key feature of this report is the inclusion of direct links to the published sources and evidential screenshots for each incident, providing immediate access to the primary documentation. This consolidation aims to offer a clear, actionable snapshot of recent cyber threat activities, facilitating rapid assessment and informed decision-making for stakeholders. The analysis highlights the persistent and varied nature of cyber threats, emphasizing the critical need for continuous vigilance and robust security measures across all sectors.
2. Incident Overview Table
To provide a rapid, high-level summary of all documented incidents, a consolidated table has been prepared. This overview enables stakeholders to quickly grasp the scope and nature of events at a glance, serving as an efficient navigational aid to the more detailed incident reports that follow.
Table 1: Summary of Recorded Incidents (July 11, 2025)
Incident ID | Category | Title | Date (UTC) | Threat Actors | Victim Country | Victim Organization | Published URL |
INC001 | Malware | Alleged Sale of Shellcode-Based HTTP/DNS Loader Source Code | 2025-07-11 13:38:34 | n3byte | https://forum.exploit.in/topic/262267/ | ||
INC002 | Data Leak | Alleged leak of Israel citizen’s data | 2025-07-11 12:07:41 | sazz | Israel | https://darkforums.st/Thread-3-9M-Israel-Citizens-Data | |
INC003 | Data Breach | Alleged data breach of National Anti-Corruption Commission (NACC) | 2025-07-11 11:59:57 | H3C4KEDZ | Thailand | national anti-corruption commission (nacc) | https://t.me/We_H3c4kedz1/153 |
INC004 | Data Breach | Alleged Data Breach of Sovcom Bank | 2025-07-11 11:41:33 | sazz | Russia | sovcom bank | https://darkforums.st/Thread-Russian-Sovkcom-Bank-DataBase |
INC005 | Data Breach | Alleged data breach of Department of International Trade Promotion (DITP) | 2025-07-11 09:54:07 | H3C4KEDZ | Thailand | department of international trade promotion (ditp) | https://t.me/We_H3c4kedz1/101 |
INC006 | Data Breach | Alleged data breach of Rajamangala University of Technology Lanna, Chiang Rai | 2025-07-11 09:53:30 | H3C4KEDZ | Thailand | rajamangala university of technology lanna, chiang rai | https://t.me/We_H3c4kedz1/101 |
INC007 | Data Breach | Alleged data breach of Department of Climate Change and Environment | 2025-07-11 09:53:02 | H3C4KEDZ | Thailand | department of climate change and environment | https://t.me/We_H3c4kedz1/101 |
INC008 | Initial Access | Alleged Sale of 0-Day Auth Bypass Targeting Fortinet, Palo Alto, and Ivanti | 2025-07-11 09:19:35 | anongod | https://ramp4u.io/threads/0-day-auth-bypass-fortinet-palo-alto-ivanti-saml.3271 | ||
INC009 | Data Leak | Alleged Leak of Crypto and User Credentials | 2025-07-11 09:14:35 | Skydreammodz | https://leakbase.la/threads/database-leads-2025.40248 | ||
INC010 | Data Leak | Alleged Leak of Crypto User Data from Major Platforms | 2025-07-11 09:09:32 | Skydreammodz | https://leakbase.la/threads/database-leads-2025.40247 | ||
INC011 | Initial Access | Alleged unauthorized access to an unidentified organization | 2025-07-11 09:05:49 | CyberAv3ngers_supp | Israel | https://t.me/CyberAv3ngers/14 | |
INC012 | Data Breach | Alleged data sale of Gtd Teleductos | 2025-07-11 09:03:52 | DataVortexDB | Chile | gtd group | https://xss.is/threads/141713/ |
INC013 | Defacement | Liwaa Muhammad targets multiple websites | 2025-07-11 08:40:24 | Liwaa Muhammad | India | battlefield gym | https://t.me/liwaamohammad/500 |
INC014 | Data Breach | Alleged data breach of The Providence Group | 2025-07-11 06:50:53 | _Sentap | Georgia | the providence group | https://xss.is/threads/141706 |
INC015 | Data Breach | Alleged data breach of DVD STORE SPAIN S.L. | 2025-07-11 06:35:52 | 108111118101 | Spain | dvd store spain s.l. | https://xss.is/threads/141705/ |
INC016 | Alert | Golden falcon claims to target Minneapolis-St. Paul International Airport | 2025-07-11 05:41:24 | Golden falcon | USA | minneapolis-st. paul international airport | https://t.me/Golden_falcon_team/427 |
INC017 | Defacement | Liwaa Muhammad targets the website of Merva Ads | 2025-07-11 05:03:36 | Liwaa Muhammad | India | merva ads | https://t.me/liwaamohammad/498 |
INC018 | Data Breach | Alleged data leak of Good Item Lab | 2025-07-11 04:53:37 | R0m4nce | Japan | good item lab | https://darkforums.st/Thread-FREE-www-shoppingpark-jp-Dumped-2025-7-11 |
INC019 | Data Breach | Alleged data breach of Algérie Poste | 2025-07-11 04:05:43 | Jokeir07x | Algeria | algérie poste | https://darkforums.st/Thread-A-huge-collection-of-13-245-poste-dz-current-accounts-for-Algerian-citizens |
INC020 | Data Breach | Alleged data breach of Khidmah LLC | 2025-07-11 03:54:41 | RL000 | UAE | khidmah llc | https://darkforums.st/Thread-khidmah-com-employees-DataBase-Leak |
INC021 | Data Leak | Alleged leak of Saudi Arabia Database | 2025-07-11 03:27:46 | RL000 | Saudi Arabia | https://darkforums.st/Thread-Saudi-Arabia-DataBase | |
INC022 | Data Breach | Alleged data breach of Rice Department of Thailand | 2025-07-11 02:52:25 | H3C4KEDZ | Thailand | rice department of thailand | https://t.me/We_H3c4kedz1/80 |
INC023 | Data Leak | Alleged Data Leak of ManoMano Site Leads | 2025-07-11 02:19:54 | Kavinsky | France | manomano | https://darkforums.st/Thread-Selling-manomano-Site-Leads |
INC024 | Data Breach | Alleged data breach of KREDITPLUS SERVICES | 2025-07-11 02:14:06 | DigitalGhost | Indonesia | kreditplus services | https://darkforums.st/Thread-900K-KREDITPLUS-DATABASE |
INC025 | Data Leak | Alleged Data Leak of Government Email Accounts | 2025-07-11 02:00:38 | nxe | Mexico | https://darkforums.st/Thread-Selling-GOVERNMENTAL-EMAILS | |
INC026 | Data Leak | Alleged leak of citizen data and various documents from Algeria | 2025-07-11 01:38:49 | sanji_shi5 | Algeria | https://darkforums.st/Thread-Data-on-Algerian-citizens-and-documents-related-to-one-of-the-states-in-Algeria | |
INC027 | Data Breach | Alleged data leak of Federal Bureau of Investigation (FBI) | 2025-07-11 01:31:48 | DigitalGhost | USA | federal bureau of investigation (fbi) | https://darkforums.st/Thread-Document-FBI-DEPARTMENT-OF-JUSTICE-DOCUMENT |
INC028 | Data Breach | Alleged access and data leak of Nakhonsawan Industrial and Community Education College | 2025-07-11 01:13:40 | NXBB.SEC | Thailand | nakhonsawan industrial and community education college | https://t.me/nxbbsec/716 |
INC029 | Data Leak | Alleged leak of JAKARTA BARAT ID card | 2025-07-11 01:12:45 | darknessX404 | Indonesia | https://darkforums.st/Thread-WEST-JAKARTA-ID-CARD-BY-DARKNESS-X404 | |
INC030 | Initial Access | Alleged sale of login credentials to two MySQL servers to an unidentified organization in Brazil | 2025-07-11 00:52:19 | Rui_Deidad | Brazil | https://darkforums.st/Thread-SALE-OF-CREDENTIALS-TO-TWO-MYSQL-SERVERS-BRAZIL | |
INC031 | Data Leak | Alleged sale of Databases from all over the world | 2025-07-11 00:43:06 | Intel_Data | https://darkforums.st/Thread-Databases-from-all-over-the-world |
3. Detailed Incident Reports
This section provides a dedicated entry for each incident, elaborating on its specifics, including direct links to published URLs and evidential screenshots.
3.1. Incident INC001: Alleged Sale of Shellcode-Based HTTP/DNS Loader Source Code
- Category: Malware
- Date: 2025-07-11T13:38:34Z
- Network: openweb
- Threat Actors: n3byte
- Content: The threat actor claims to be selling a custom C-based loader in shellcode format that acts as a resident loader and reverse shell, with support for HTTP or DNS communication and persistent system ID tracking. It gathers system info, runs PowerShell commands, captures screenshots, and supports multiple payload formats (EXE, DLL, MSI, shellcode). A control panel allows bot management, tasking, IP logging, and admin control.
- Published URL: https://forum.exploit.in/topic/262267/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/7d3519f0-f6fe-4a31-a3c5-d376e7b40b9d.PNG
- https://d34iuop8pidsy8.cloudfront.net/1a5bcaae-90e1-471e-9404-15c8c9e3abb1.PNG
3.2. Incident INC002: Alleged leak of Israel citizen’s data
- Category: Data Leak
- Date: 2025-07-11T12:07:41Z
- Network: openweb
- Threat Actors: sazz
- Victim Country: Israel
- Content: The threat actor claims to have leaked a database allegedly containing information on 3.9 million Israeli citizens. The compromised data reportedly includes phone numbers, email addresses, full names, gender, dates of birth, registration dates, hometowns, relationship statuses, education histories, employment details, group affiliations, and other personal information.
- Published URL: https://darkforums.st/Thread-3-9M-Israel-Citizens-Data
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d00131ab-950b-4697-92af-279d047ccb9e.png
- https://d34iuop8pidsy8.cloudfront.net/9b5153e7-621a-4d61-ae88-0d3fa2641e6c.png
3.3. Incident INC003: Alleged data breach of National Anti-Corruption Commission (NACC)
- Category: Data Breach
- Date: 2025-07-11T11:59:57Z
- Network: telegram
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Government & Public Sector
- Victim Organization: national anti-corruption commission (nacc)
- Victim Site: nacc.go.th
- Content: Threat actor claims to have obtained 3GB of organization’s data. Compromised data allegedly includes administrative documents, classified files, and internal communications.
- Published URL: https://t.me/We_H3c4kedz1/153
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/11077bbf-0a96-4ac4-b8b5-89915988ad9a.png
3.4. Incident INC004: Alleged Data Breach of Sovcom Bank
- Category: Data Breach
- Date: 2025-07-11T11:41:33Z
- Network: openweb
- Threat Actors: sazz
- Victim Country: Russia
- Victim Industry: Banking & Mortgage
- Victim Organization: sovcom bank
- Victim Site: sovcombank.ru
- Content: The threat actor claims to be selling a database allegedly belonging to Sovcombank. The compromised data reportedly includes 14.5GB of sensitive personal and confidential information, such as addresses, marital status, spouse details, phone numbers, pensions, and more.
- Published URL: https://darkforums.st/Thread-Russian-Sovkcom-Bank-DataBase
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/40c6d141-6a06-4c52-8c94-e246098fccd9.png
- https://d34iuop8pidsy8.cloudfront.net/e1161739-545f-4725-8584-7adcc82a9dc9.png
3.5. Incident INC005: Alleged data breach of Department of International Trade Promotion (DITP)
- Category: Data Breach
- Date: 2025-07-11T09:54:07Z
- Network: telegram
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: International Trade & Development
- Victim Organization: department of international trade promotion (ditp)
- Victim Site: ditp.go.th
- Content: Threat actor claims to have obtained 534.5 GB of the organization’s data and deleted it.
- Published URL: https://t.me/We_H3c4kedz1/101
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/13a8216e-fa7b-43e7-8d92-a0ef45aa3852.png
3.6. Incident INC006: Alleged data breach of Rajamangala University of Technology Lanna, Chiang Rai
- Category: Data Breach
- Date: 2025-07-11T09:53:30Z
- Network: telegram
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Higher Education/Acadamia
- Victim Organization: rajamangala university of technology lanna, chiang rai
- Victim Site: chiangrai.rmutl.ac.th
- Content: Threat actor claims to have obtained 19.88 GB of the organization’s data and deleted it.
- Published URL: https://t.me/We_H3c4kedz1/101
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/fcd522f5-a716-463b-9293-8a07cd381733.png
3.7. Incident INC007: Alleged data breach of Department of Climate Change and Environment
- Category: Data Breach
- Date: 2025-07-11T09:53:02Z
- Network: telegram
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Government Administration
- Victim Organization: department of climate change and environment
- Victim Site: dcce.go.th
- Content: Threat actor claims to have obtained 619 GB of the organization’s data and deleted it.
- Published URL: https://t.me/We_H3c4kedz1/101
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3896a80f-8db6-463e-a32c-80d0046d55c1.png
3.8. Incident INC008: Alleged Sale of 0-Day Auth Bypass Targeting Fortinet, Palo Alto, and Ivanti
- Category: Initial Access
- Date: 2025-07-11T09:19:35Z
- Network: openweb
- Threat Actors: anongod
- Content: The threat actor claims to be selling exclusive access to a zero-day authentication bypass vulnerability exploiting SAML parser desynchronization. The flaw reportedly enables full administrative access on fully patched installations of Fortinet (FortiOS), Palo Alto Networks (PAN-OS/GlobalProtect), and Ivanti (Connect Secure).
- Published URL: https://ramp4u.io/threads/0-day-auth-bypass-fortinet-palo-alto-ivanti-saml.3271
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b71f8703-2b38-4bc7-97a8-2005c27625ea.PNG
- https://d34iuop8pidsy8.cloudfront.net/c544e5f2-0343-4c75-a7bf-4d0ada70ddb6.PNG
3.9. Incident INC009: Alleged Leak of Crypto and User Credentials
- Category: Data Leak
- Date: 2025-07-11T09:14:35Z
- Network: openweb
- Threat Actors: Skydreammodz
- Content: The threat actor claims to have leaked a collection named “Database Leads 2025,” which includes personal and financial data such as names, emails, phone numbers, and payment methods from major crypto platforms. The data reportedly includes 432K records from Coinbase, 76K from CoinMarketCap, 121K from Kraken, 20K from Ledger, over 1.4M from Binance, 1.8M from Crypto.com, and 46K from Gatehub. The post also advertises a separate leak of 16 billion records, allegedly containing 1.14 TB of credentials including usernames, emails, and passwords.
- Published URL: https://leakbase.la/threads/database-leads-2025.40248
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/0fae8172-1959-4b33-b38d-0a851b8566f2.PNG
3.10. Incident INC010: Alleged Leak of Crypto User Data from Major Platforms
- Category: Data Leak
- Date: 2025-07-11T09:09:32Z
- Network: openweb
- Threat Actors: Skydreammodz
- Content: The threat actor claims to have leaked a dataset titled “Database Leads 2025,” containing personal and financial details such as names, phone numbers, emails, dates of birth, and payment methods. The data reportedly includes 432K records from Coinbase, 76K from CoinMarketCap, 121K from Kraken, 20K from Ledger, over 1.4M from Binance, 1.8M from Crypto.com, and 46K from Gatehub.
- Published URL: https://leakbase.la/threads/database-leads-2025.40247
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1ed50cb4-d274-41cd-b452-766d8d81a0b6.PNG
3.11. Incident INC011: Alleged unauthorized access to an unidentified organization
- Category: Initial Access
- Date: 2025-07-11T09:05:49Z
- Network: telegram
- Threat Actors: CyberAv3ngers_supp
- Victim Country: Israel
- Content: The group claims to have access to an unidentified organization, disabling systems, deleting backups, and warning of more severe attacks ahead.
- Published URL: https://t.me/CyberAv3ngers/14
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/65af0c3d-e36b-420e-a3f2-6b712c99b459.png
3.12. Incident INC012: Alleged data sale of Gtd Teleductos
- Category: Data Breach
- Date: 2025-07-11T09:03:52Z
- Network: openweb
- Threat Actors: DataVortexDB
- Victim Country: Chile
- Victim Industry: Network & Telecommunications
- Victim Organization: gtd group
- Victim Site: gtdteleductos.com
- Content: The threat actor claims to be selling more than 17,678,394 records allegedly stolen from Gtd Teleductos.
- Published URL: https://xss.is/threads/141713/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1472a148-e1d9-47aa-9e53-862cab714fa4.png
3.13. Incident INC013: Liwaa Muhammad targets multiple websites
- Category: Defacement
- Date: 2025-07-11T08:40:24Z
- Network: telegram
- Threat Actors: Liwaa Muhammad
- Victim Country: India
- Victim Industry: Health & Fitness
- Victim Organization: battlefield gym
- Victim Site: battlefieldgym.com
- Content: Group claims to have defaced multiple websites.
- Published URL: https://t.me/liwaamohammad/500
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3f5c1278-f3c2-450d-ba5a-39378ffc07dc.png
3.14. Incident INC014: Alleged data breach of The Providence Group
- Category: Data Breach
- Date: 2025-07-11T06:50:53Z
- Network: openweb
- Threat Actors: _Sentap
- Victim Country: Georgia
- Victim Industry: Real Estate
- Victim Organization: the providence group
- Victim Site: theprovidencegroup.com
- Content: The threat actor claims to have data breach of The Providence Group of Georgia. The compromised data consists of Architectural and Engineering Plans, Geotechnical Reports, Interior Design, etc.
- Published URL: https://xss.is/threads/141706
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/5ac34b9b-8870-4b79-bf6d-c84a9fa5f6e9.png
3.15. Incident INC015: Alleged data breach of DVD STORE SPAIN S.L.
- Category: Data Breach
- Date: 2025-07-11T06:35:52Z
- Network: openweb
- Threat Actors: 108111118101
- Victim Country: Spain
- Victim Industry: Retail Industry
- Victim Organization: dvd store spain s.l.
- Victim Site: dvdstorespain.es
- Content: The threat actor claims to have leaked a 9.5GB SQL database from DVD STORE SPAIN S.L., allegedly containing customer or transaction data.
- Published URL: https://xss.is/threads/141705/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b2493a2c-67b6-4af8-8450-67e83b05ee8a.png
3.16. Incident INC016: Golden falcon claims to target Minneapolis-St. Paul International Airport
- Category: Alert
- Date: 2025-07-11T05:41:24Z
- Network: telegram
- Threat Actors: Golden falcon
- Victim Country: USA
- Victim Industry: Transportation & Logistics
- Victim Organization: minneapolis-st. paul international airport
- Victim Site: mspairport.com
- Content: A recent post by the group indicates that they are targeting the refueling system at Minneapolis-St. Paul International Airport
- Published URL: https://t.me/Golden_falcon_team/427
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/414ac5f8-a725-4250-86a6-3f441b2fb995.png
3.17. Incident INC017: Liwaa Muhammad targets the website of Merva Ads
- Category: Defacement
- Date: 2025-07-11T05:03:36Z
- Network: telegram
- Threat Actors: Liwaa Muhammad
- Victim Country: India
- Victim Industry: Marketing, Advertising & Sales
- Victim Organization: merva ads
- Victim Site: mervaads.com
- Content: The group claims to have defaced the website of Merva Ads
- Published URL: https://t.me/liwaamohammad/498
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f82724b6-8984-40ab-b796-cfaac2cd8b76.png
3.18. Incident INC018: Alleged data leak of Good Item Lab
- Category: Data Breach
- Date: 2025-07-11T04:53:37Z
- Network: openweb
- Threat Actors: R0m4nce
- Victim Country: Japan
- Victim Industry: E-commerce & Online Stores
- Victim Organization: good item lab
- Victim Site: shoppingpark.jp
- Content: The threat actor claims to be selling a free data dump of e commerce platform Good Item Lab, allegedly breached on July 11, 2025
- Published URL: https://darkforums.st/Thread-FREE-www-shoppingpark-jp-Dumped-2025-7-11
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/fae620e9-fe4b-439e-b436-f16ef55dbfad.png
3.19. Incident INC019: Alleged data breach of Algérie Poste
- Category: Data Breach
- Date: 2025-07-11T04:05:43Z
- Network: openweb
- Threat Actors: Jokeir07x
- Victim Country: Algeria
- Victim Industry: Consumer Services
- Victim Organization: algérie poste
- Victim Site: poste.dz
- Content: The threat actor claims to have leaked data from 13,245 current accounts belonging to Algerian citizens.
- Published URL: https://darkforums.st/Thread-A-huge-collection-of-13-245-poste-dz-current-accounts-for-Algerian-citizens
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d0571726-b0bc-452e-a2fa-9b8386eadcf0.png
- https://d34iuop8pidsy8.cloudfront.net/114c33d9-ada1-42a6-be0b-219f596a8d07.png
3.20. Incident INC020: Alleged data breach of Khidmah LLC
- Category: Data Breach
- Date: 2025-07-11T03:54:41Z
- Network: openweb
- Threat Actors: RL000
- Victim Country: UAE
- Victim Industry: Facilities Services
- Victim Organization: khidmah llc
- Victim Site: khidmah.com
- Content: The threat actor claims to have breached Khidmah LLC and leaked a database containing sensitive information of approximately 3,000 employees. The leaked data includes full names, email addresses, job titles, departments, hire dates, and other internal HR fields.
- Published URL: https://darkforums.st/Thread-khidmah-com-employees-DataBase-Leak
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/78828a45-da52-43de-8403-7ee84ff1b992.png
3.21. Incident INC021: Alleged leak of Saudi Arabia Database
- Category: Data Leak
- Date: 2025-07-11T03:27:46Z
- Network: openweb
- Threat Actors: RL000
- Victim Country: Saudi Arabia
- Content: The threat actor claims to have leaked a Saudi Arabia database containing around 30,000 entries in CSV format with a total file size of 3 MB. The leaked data includes sensitive personal information such as full names, gender, mobile numbers, email addresses, dates of birth, nationality, points, and barcode identifiers.
- Published URL: https://darkforums.st/Thread-Saudi-Arabia-DataBase
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/cc991eb5-8151-43e1-a9c5-382711bff668.png
3.22. Incident INC022: Alleged data breach of Rice Department of Thailand
- Category: Data Breach
- Date: 2025-07-11T02:52:25Z
- Network: telegram
- Threat Actors: H3C4KEDZ
- Victim Country: Thailand
- Victim Industry: Government Administration
- Victim Organization: rice department of thailand
- Victim Site: ricethailand.go.th
- Content: The threat actor claims to have breached Thailand’s Rice Department, leaking internal network diagrams that expose critical infrastructure details
- Published URL: https://t.me/We_H3c4kedz1/80
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/bcfcd335-211c-4a62-8312-c00247045aca.png
- https://d34iuop8pidsy8.cloudfront.net/e53b4ba3-1557-470c-9448-fa0aad572688.png
3.23. Incident INC023: Alleged Data Leak of ManoMano Site Leads
- Category: Data Leak
- Date: 2025-07-11T02:19:54Z
- Network: openweb
- Threat Actors: Kavinsky
- Victim Country: France
- Victim Industry: E-commerce & Online Stores
- Victim Organization: manomano
- Victim Site: manomano.com
- Content: The threat actor claims to have leaked and is selling ManoMano site leads, including business names, tax IDs, phone numbers, and emails from various European countries.
- Published URL: https://darkforums.st/Thread-Selling-manomano-Site-Leads
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6731c147-6428-488f-ae6d-cd6f51503f43.jpg
3.24. Incident INC024: Alleged data breach of KREDITPLUS SERVICES
- Category: Data Breach
- Date: 2025-07-11T02:14:06Z
- Network: openweb
- Threat Actors: DigitalGhost
- Victim Country: Indonesia
- Victim Industry: Financial Services
- Victim Organization: kreditplus services
- Victim Site: kreditplus.com
- Content: A threat actor claims to have breached KREDITPLUS, leaking a database of 900,000 records. The data reportedly includes names, contact details, gender, birthplace, religion, nationality, and full address information. It also contains company and spouse details.
- Published URL: https://darkforums.st/Thread-900K-KREDITPLUS-DATABASE
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/dfddc0e8-5fa5-444b-892b-a141c495b397.png
- https://d34iuop8pidsy8.cloudfront.net/f53a13e6-136b-4103-a229-dc21e1a9f01a.png
3.25. Incident INC025: Alleged Data Leak of Government Email Accounts
- Category: Data Leak
- Date: 2025-07-11T02:00:38Z
- Network: openweb
- Threat Actors: nxe
- Victim Country: Mexico
- Victim Industry: Government Administration
- Content: The threat actor claims to have leaked Palestinian and Mexican government emails
- Published URL: https://darkforums.st/Thread-Selling-GOVERNMENTAL-EMAILS
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/8d72fd11-7ea7-4fda-ba1d-4267bfe0a36a.jpg
3.26. Incident INC026: Alleged leak of citizen data and various documents from Algeria
- Category: Data Leak
- Date: 2025-07-11T01:38:49Z
- Network: openweb
- Threat Actors: sanji_shi5
- Victim Country: Algeria
- Content: The threat actor claims to have leaked Algerian citizen data and various official documents related to one of Algeria’s states. The leak includes sensitive items such as driving licenses, government papers, and financial statements.
- Published URL: https://darkforums.st/Thread-Data-on-Algerian-citizens-and-documents-related-to-one-of-the-states-in-Algeria
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/5fb80bf7-80fd-4911-a929-c4edcc4de22b.png
3.27. Incident INC027: Alleged data leak of Federal Bureau of Investigation (FBI)
- Category: Data Breach
- Date: 2025-07-11T01:31:48Z
- Network: openweb
- Threat Actors: DigitalGhost
- Victim Country: USA
- Victim Industry: Law Enforcement
- Victim Organization: federal bureau of investigation (fbi)
- Victim Site: fbi.gov
- Content: The threat actor claims to have leaked a collection of FBI U.S. Department of Justice related email addresses, names, birthdates, and documents. The post lists dozens of @fbi.gov and @ic.fbi.gov email addresses along with links to numerous FBI public documents and Excel files, many of which are hosted on official FBI domains. These documents appear to relate to crime statistics, hate crime data, and internal forms, primarily from the early 2000s to 2011
- Published URL: https://darkforums.st/Thread-Document-FBI-DEPARTMENT-OF-JUSTICE-DOCUMENT
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6bac256f-f301-4149-ae29-b885a6dc5be7.png
3.28. Incident INC028: Alleged access and data leak of Nakhonsawan Industrial and Community Education College
- Category: Data Breach
- Date: 2025-07-11T01:13:40Z
- Network: telegram
- Threat Actors: NXBB.SEC
- Victim Country: Thailand
- Victim Industry: Education
- Victim Organization: nakhonsawan industrial and community education college
- Victim Site: office.nice.ac.th
- Content: A threat actor claims to have access and leaked data from Nakhonsawan Industrial and Community Education College.
- Published URL: https://t.me/nxbbsec/716
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d92bc5be-ca97-445f-a510-ba97d6a8b2bb.png
- https://d34iuop8pidsy8.cloudfront.net/397437f0-63cd-43ab-84bd-8e16b025cfc3.png
3.29. Incident INC029: Alleged leak of JAKARTA BARAT ID card
- Category: Data Leak
- Date: 2025-07-11T01:12:45Z
- Network: openweb
- Threat Actors: darknessX404
- Victim Country: Indonesia
- Content: The threat actor claims to have leaked jakarta barat id card
- Published URL: https://darkforums.st/Thread-WEST-JAKARTA-ID-CARD-BY-DARKNESS-X404
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/432b8e7d-2b22-489f-b8cb-d496e5e7b58b.png
3.30. Incident INC030: Alleged sale of login credentials to two MySQL servers to an unidentified organization in Brazil
- Category: Initial Access
- Date: 2025-07-11T00:52:19Z
- Network: openweb
- Threat Actors: Rui_Deidad
- Victim Country: Brazil
- Victim Industry: Health & Fitness
- Content: The threat actor claims to be selling login credentials to two MySQL servers belonging to a Brazilian company that specializes in dietary supplements and natural wellness products. Sample data shared includes full names, email addresses, registration dates, cities, and postal codes of Brazilian individuals.
- Published URL: https://darkforums.st/Thread-SALE-OF-CREDENTIALS-TO-TWO-MYSQL-SERVERS-BRAZIL
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/73dc57f3-ab0e-4caf-af60-103f8e552677.png
3.31. Incident INC031: Alleged sale of Databases from all over the world
- Category: Data Leak
- Date: 2025-07-11T00:43:06Z
- Network: openweb
- Threat Actors: Intel_Data
- Content: The threat actor claims to be selling a vast collection of over 50TB of personal data from nearly every country worldwide. The seller claims to have spent 20 years collecting and trading this data, primarily with international data and marketing firms. The data reportedly includes names, addresses, zip codes, phone numbers, dates of birth, national IDs, and more excluding passwords.
- Published URL: https://darkforums.st/Thread-Databases-from-all-over-the-world
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/a4cb42cc-8a72-4947-9eb6-643cdd817240.png
4. Key Observations
The analysis of the 27 incidents reported on July 11, 2025, reveals several critical observations about the current cyber threat landscape:
- Prevalence of Data-Related Incidents: The overwhelming majority of incidents fall under “Data Breach” and “Data Leak” categories. This indicates a strong focus by threat actors on acquiring and monetizing sensitive information, whether through direct breaches of organizational systems or the leakage of previously compromised datasets.
- Diverse Victimology: Incidents affect a wide array of victims, including government entities (Thailand’s NACC, Rice Department, Department of Climate Change and Environment, FBI, Algerian and Mexican government emails), financial institutions (Sovcombank, KREDITPLUS, Algérie Poste), educational institutions (Rajamangala University, Nakhonsawan Industrial and Community Education College), and various private sector organizations (Real Estate, Retail, E-commerce, Telecommunications, Health & Fitness, Marketing). This broad targeting underscores that no sector is immune to cyber threats.
- Global Reach: The victim countries span across multiple continents, including Asia (Thailand, Japan, UAE, Saudi Arabia, Indonesia), Europe (Russia, Spain, France), North America (USA, Mexico), South America (Brazil), and Africa (Algeria), as well as Israel and Chile. This highlights the global and borderless nature of cybercrime.
- Variety of Threat Actors: A multitude of distinct threat actors are identified, such as H3C4KEDZ, sazz, Liwaa Muhammad, RL000, Skydreammodz, DigitalGhost, and others. Some actors, like H3C4KEDZ, appear to be highly active, targeting multiple entities within a single day. This suggests a fragmented yet highly active threat actor ecosystem.
- Common Attack Vectors and Objectives:
- Data Exfiltration/Sale: The primary objective for many incidents is the exfiltration and subsequent sale or leakage of databases containing personal, financial, and organizational data.
- Initial Access Brokering: The sale of access credentials, including zero-day vulnerabilities and MySQL server logins, indicates a market for initial footholds into target networks.
- Defacement: While less impactful in terms of data loss, website defacements continue to be used by groups like Liwaa Muhammad for reputational damage or ideological messaging.
- Malware Sales: The offering of custom loaders and reverse shells on underground forums signifies the continuous development and trade of offensive cyber tools.
- Prominent Networks for Activity: “Openweb” (likely referring to public forums and marketplaces) and “Telegram” channels are frequently cited as the networks where these incidents are announced, data is leaked, or tools are sold. This points to these platforms as key intelligence sources for monitoring cybercriminal activity.
- Snapshot of Recent Activity: All incidents are dated July 11, 2025, providing a concentrated view of very recent cyber activity. This high volume within a single day underscores the constant and rapid pace of cyber threats.
5. Conclusion
The comprehensive review of the 27 cyber incidents reported on July 11, 2025, paints a clear picture of a dynamic and aggressive threat landscape. The sheer volume and diversity of these events, particularly the overwhelming focus on data breaches and leaks, underscore the persistent value of sensitive information to threat actors. From individual citizen data to critical government infrastructure diagrams and corporate financial records, virtually all types of data are targets.
The global reach of these incidents, affecting numerous countries and a wide array of industries, demonstrates that cyber threats are not confined by geographical or sectoral boundaries. The presence of multiple, active threat actors, some operating with high frequency, further emphasizes the pervasive nature of this challenge. The consistent use of open web forums and Telegram channels as platforms for announcing and trading compromised data and tools highlights key areas for intelligence gathering and monitoring.
This report, by consolidating detailed information including published URLs and evidential screenshots for each incident, serves as a vital resource for understanding the immediate cyber threat environment. It reinforces the critical need for organizations and governments worldwide to maintain robust, multi-layered cybersecurity defenses, engage in continuous threat intelligence monitoring, and prioritize proactive measures to protect their digital assets and the privacy of their constituents. The constant evolution and high volume of these threats necessitate an adaptive and resilient security posture to mitigate risks effectively.