[July-15-2025] Daily Cybersecurity Threat Report

1. Introduction

This report provides a factual summary of incidents, derived exclusively from the provided JSON data. The objective is to present a direct, structured overview of each event, strictly adhering to the source material. This approach ensures that the report remains a precise transcription and presentation of incident details, including associated published_url and screenshots as recorded within the original data. No external analysis, interpretations, or hypothetical scenarios are included, aligning precisely with the requirements for unadulterated factual reporting.

2. Detailed Incident Records

This section provides a comprehensive record for each individual incident, presenting all available data points directly from the source material. Each incident is clearly delineated for ease of reference and detailed review.

Incident: Alleged leak of 18,496 emails of Israeli

  • Threat Actors: YK3
  • Victim Country: Israel
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Team insane Pakistan targets the website of Gauhati University

  • Threat Actors: Team insane Pakistan
  • Victim Country: India
  • Victim Industry: Education
  • Victim Organization: gauhati university
  • Victim Site: gauhati.ac.in

Incident: H3C4KEDZ targets the website of Community Development Department Ministry of Interior

  • Threat Actors: H3C4KEDZ
  • Victim Country: Thailand
  • Victim Industry: Government & Public Sector
  • Victim Organization: community development department ministry of interior
  • Victim Site: district.cdd.go.th

Incident: Alleged data leak of Unidentified databses from Multiple countries

  • Threat Actors: M_BgBang
  • Victim Country: Algeria
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data breach of multiple onion websites

  • Threat Actors: PELICAN HACKERS
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data sale of Regional Council of Physical Education of the 4th Region – State of Sao Paulo

  • Threat Actors: DataVortexDB
  • Victim Country: Brazil
  • Victim Industry: Government Relations
  • Victim Organization: regional council of physical education of the 4th region – state of sao paulo
  • Victim Site: grsinformatica.com.br

Incident: Alleged data sale of Bolivarian National Police

  • Threat Actors: izeeenn27
  • Victim Country: Venezuela
  • Victim Industry: Law Enforcement
  • Victim Organization: bolivarian national police
  • Victim Site: cpnb.com.ve

Incident: Alleged data sale of AhoraySiempre

  • Threat Actors: SebastianDAlex
  • Victim Country: Cuba
  • Victim Industry: Music
  • Victim Organization: ahoraysiempre
  • Victim Site:

Incident: Alleged Sale of Downloader Dropper with SmartScreen and Defender Bypass

  • Threat Actors: eDragon_x
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged Sale of OSINT API Keys & Government Emails

  • Threat Actors: combolists
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data leak of iGyno

  • Threat Actors: Bello123
  • Victim Country: Italy
  • Victim Industry: Health & Fitness
  • Victim Organization: igyno
  • Victim Site: igyno.it

Incident: Alleged sale of PHANTOM Windows 0-day RCE exploit and NIGHTFALL exploit suite

  • Category: Vulnerability
  • Content: The threat actor claims to be selling “PHANTOM” Windows 0Day RCE Exploit and “NIGHTFALL” Windows Zero-Day Exploit Suite, which they describe as “the most advanced Windows penetration tool ever developed outside nation-state programs.” This exploit suite reportedly offers kernel-level access, bypassing TPM 2.0, Pluton, and HVCI with novel attack vectors. It boasts perfect operational security, including GPU-powered persistence invisible to memory scanners. Furthermore, it features network dominance capabilities, self-propagating through RDP, SMB, and WSUS, and includes an SMBv3 worm module for improved propagation. Note : The authenticity of the claim is yet to be verified.
  • Date: 2025-07-15T10:07:34Z
  • Network: openweb
  • Published URL: https://forum.exploit.in/topic/262467/
  • Screenshots:
  • Threat Actors: user35
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged Sale of RDP Access to Chartered Institute of Bankers of Nigeria

  • Threat Actors: голиа
  • Victim Country: Nigeria
  • Victim Industry: Financial Services
  • Victim Organization: chartered institute of bankers of nigeria
  • Victim Site: cibn.org

Incident: Alleged leak of an Unknown Indian database

  • Threat Actors: Dzvy
  • Victim Country: India
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged Leak of Shopify Customer Database from Homestretch

  • Threat Actors: Shopify
  • Victim Country: USA
  • Victim Industry: E-commerce & Online Stores
  • Victim Organization: homestretch
  • Victim Site: homestretch.com

Incident: Liwaa Muhammad targets the website of UpCloud Global Solutions

  • Category: Defacement
  • Content: The threat actor claims to have defaced and gained root access to a cloud server hosting 44 domains and accessed 12 GB of sensitive data, including site files, database dumps, configuration files, SSL keys, and emails.
  • Date: 2025-07-15T09:31:03Z
  • Network: telegram
  • Published URL: https://t.me/liwaamohammad/510
  • Screenshots:
  • Threat Actors: Liwaa Muhammad
  • Victim Country: India
  • Victim Industry: Software Development
  • Victim Organization: upcloud global solutions
  • Victim Site: upcloudglobal.com

Incident: Alleged Sale of a Fileless Stealer Log

  • Threat Actors: zcloudx
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged sale of The chartered institute of bankers of nigeria

  • Category: Initial Access
  • Content: The threat actor claims to be selling RDP access to The Chartered Institute of Bankers of Nigeria. The server allegedly contains sensitive data of Nigerian bankers, including personal and financial details.
  • Date: 2025-07-15T09:23:49Z
  • Network: openweb
  • Published URL: https://xss.is/threads/141946/
  • Screenshots:
  • Threat Actors: Golia
  • Victim Country: Nigeria
  • Victim Industry: Banking & Mortgage
  • Victim Organization: cibn
  • Victim Site: cibng.org

Incident: Alleged Leak of 100K Corporate Email Credentials

  • Threat Actors: Domainstore
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged Leak of VanEck Individual Investor Emails

  • Category: Data Breach
  • Content: The threat actor claims to have leaked a list of email addresses belonging to individual retail investors allegedly associated with VanEck. The post contains dozens of personal emails, phone numbers, and names, shared freely for any potential misuse.
  • Date: 2025-07-15T08:59:36Z
  • Network: openweb
  • Published URL: https://forum.exploit.in/topic/262473/
  • Screenshots:
  • Threat Actors: btcokiz
  • Victim Country: USA
  • Victim Industry: Financial Services
  • Victim Organization: vaneck
  • Victim Site: vaneck.com

Incident: Alleged sale of USA B-2 Spirit Classified Blueprints

  • Category: Data Leak
  • Content: The threat actor claims to be selling a full technical package of USA B-2 Spirit Stealth Bomber blueprints, described as the most comprehensive non-governmental technical dossier ever assembled. The leaked data reportedly includes core documentation for the advanced strategic bomber, with details on radar-absorbent material, a Flight Control System Master Key, and structural engineering secrets. Note : The authenticity of this claim has not yet been verified.
  • Date: 2025-07-15T08:53:28Z
  • Network: openweb
  • Published URL: https://forum.exploit.in/topic/262467/
  • Screenshots:
  • Threat Actors: user35
  • Victim Country: USA
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged Sale of USA B-2 Spirit Bomber Blueprints and Windows 0-Day Exploit

  • Category: Malware
  • Content: The threat actor claims to be selling classified documents related to the B-2 “SPECTER” stealth bomber. These include radar-absorbent material formulas, flight control system code, structural engineering data, and a 2023 avionics upgrade package. They also claim to offer a powerful Windows zero-day exploit suite called “PHANTOM.” This tool allegedly bypasses TPM 2.0, Pluton, and HVCI protections to gain full SYSTEM access within seconds.
  • Date: 2025-07-15T08:50:08Z
  • Network: openweb
  • Published URL: https://forum.exploit.in/topic/262467/
  • Screenshots:
  • Threat Actors: user35
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Anonymous Moroccan targets the website of Decor Furniture

  • Threat Actors: Anonymous Moroccan
  • Victim Country: India
  • Victim Industry: Furniture
  • Victim Organization: decor furniture
  • Victim Site: decorfurnitures.in

Incident: Alleged Sale of databases from MMM, Cashberry, and Finico

  • Threat Actors: smwin24
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data breach of Network of International Cooperation for Education

  • Threat Actors: NXBB.SEC
  • Victim Country: Thailand
  • Victim Industry: Education
  • Victim Organization: nice (network of international cooperation for education)
  • Victim Site: office.nice.ac.th

Incident: Alleged sale of 11.2TB Brazil Telecom and Personal data

  • Threat Actors: injectioninferno2
  • Victim Country: Brazil
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged Data breach of AXA

  • Threat Actors: Aiqianjin
  • Victim Country: France
  • Victim Industry: Insurance
  • Victim Organization: axa
  • Victim Site: axa.com

Incident: Alleged sale of access to webmail credentials of an unidentified.gov domain

  • Category: Initial Access
  • Content: The threat actor claims to be selling access to webmail credentials for a.gov domain. The compromised webmail reportedly contains thousands of contacts across various government departments, including police, finance, and education
  • Date: 2025-07-15T05:17:21Z
  • Network: openweb
  • Published URL:(https://darkforums.st/Thread-WEBMAIL-CREDS-SALE)
  • Screenshots:
  • https://d34iuop8pidsy8.cloudfront.net/68ebe74a-a3ba-4e49-a5ea-f1d88cd6b755.png
  • Threat Actors: Rui_Deidad
  • Victim Country:
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data leak of multiple Mexican fintech and voucher companies

  • Threat Actors: DarkNikon
  • Victim Country: Mexico
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data breach of Department of Government Printing

  • Threat Actors: econzero
  • Victim Country: Sri Lanka
  • Victim Industry: Government Administration
  • Victim Organization: department of government printing
  • Victim Site: documents.gov.lk

Incident: Alleged data leak of Ministry of Agriculture Indonesia

  • Threat Actors: yourdre4m7
  • Victim Country: Indonesia
  • Victim Industry: Government Administration
  • Victim Organization: ministry of agriculture indonesia
  • Victim Site: pertanian.go.id

Incident: Alleged data leak of Directorate of Education of the government of New Caledonia

  • Category: Data Breach
  • Content: The threat actor claiming they exploited a vulnerability in a government education tool of French New Caledonia, managed by the Directorate of Education. By abusing an IDOR (Insecure Direct Object Reference) flaw, they escalated access from 15 student records to over 130,000 records, allegedly covering about 48% of New Caledonia’s population. They also exploited a misconfigured “class-admin” endpoint to extract emails and phone numbers.
  • Date: 2025-07-15T03:19:52Z
  • Network: openweb
  • Published URL:(https://darkforums.st/Thread-Selling-FR-NC-ENSEIGNEMENT-GOUV-NOUVELLE-CALEDONIE)
  • Screenshots:
  • https://d34iuop8pidsy8.cloudfront.net/b596b624-c316-44c4-b256-ab51728f5df1.png
  • Threat Actors: rampant
  • Victim Country: France
  • Victim Industry: Government Administration
  • Victim Organization: directorate of education of new caledonia
  • Victim Site: ac-noumea.nc

Incident: Alleged data breach of the PGI Seguros

  • Threat Actors: alcachivato
  • Victim Country: Spain
  • Victim Industry: Insurance
  • Victim Organization: pgi seguros
  • Victim Site:

Incident: Alleged data breach of NOZAX AD

  • Category: Data Breach
  • Content: The threat actor claims to have breached the database of NOZAX AD, exposing the personal and trading information of 53,585 clients. The leaked data includes full names, contact details, IP addresses, account balances, identity document references, and login history.
  • Date: 2025-07-15T02:50:00Z
  • Network: openweb
  • Published URL:(https://darkforums.st/Thread-Selling-53-585-MT5-Clients-of-NOZAX-AD-Regulated-Multi-Asset-Neo-Broker)
  • Screenshots:
  • https://d34iuop8pidsy8.cloudfront.net/9c62a59f-269c-4223-b1a0-e140ce04a7da.png
  • Threat Actors: erezd
  • Victim Country: Montenegro
  • Victim Industry: Financial Services
  • Victim Organization: nozax ad
  • Victim Site: nozax.com

Incident: Alleged sale of SQLMap Pro v2.0 tool

  • Category: Malware
  • Content: The threat actor claims to be selling SQLMap Pro v2.0, a Windows-based toolkit designed for ethical hackers, freelancers, and bug bounty hunters. The tool automates SQL injection scanning, performs smart crawling to find hidden admin/login panels, conducts port and service enumeration, and provides detailed professional reports.
  • Date: 2025-07-15T02:20:36Z
  • Network: openweb
  • Published URL:(https://darkforums.st/Thread-Source-Code-Introducing-SQLMap-Pro-v2-0-%F0%9F%92%BB%F0%9F%9B%A1%EF%B8%8F)
  • Screenshots:
  • https://d34iuop8pidsy8.cloudfront.net/6f0c9ca1-9e7c-4486-9aff-108ea9db646b.png
  • Threat Actors: Mr_king
  • Victim Country:
  • Victom Industry:
  • Victim Organization:
  • Victim Site:

Incident: H3C4KEDZ targets the website of District Portal of Thailand’s Community Development Department (CDD)

  • Threat Actors: H3C4KEDZ
  • Victim Country: Thailand
  • Victim Industry: Government Administration
  • Victim Organization: district portal of thailand’s community development department
  • Victim Site: district.cdd.go.th

Incident: Alleged database leak Argentina

  • Category: Data Leak
  • Content: The threat actor claims to be selling a massive 432GB Argentina Mega Database, claiming it to be the most comprehensive and up-to-date dataset (from 2024). The data is segmented by region, industry, age, and socioeconomic status. It includes sensitive information from financial institutions (like Banco Galicia, Banco Nacion, and Credi Argentina), telecom companies (such as Claro and Personal), businesses (including HR records and import/export registries), and government bodies (e.g., RENAPER and Ministry of Health). The package contains over 32 million verified phone numbers and 32 million+ emails, with formats compatible with CRM systems.
  • Date: 2025-07-15T00:35:53Z
  • Network: openweb
  • Published URL:(https://darkforums.st/Thread-Selling-%F0%9F%94%A5-ARGENTINA-MEGA-DATABASE-432GB-%F0%9F%87%A6%F0%9F%87%B7)
  • Screenshots:
  • Threat Actors: injectioninferno2
  • Victim Country: Argentina
  • Victim Industry:
  • Victim Organization:
  • Victim Site:

Incident: Alleged data breach of the Pedagogical University

  • Category: Data Breach
  • Content: The threat actor claims to be selling stolen data from University Pedagogian of Bolivia.
  • Date: 2025-07-15T00:10:22Z
  • Network: openweb
  • Published URL:(https://darkforums.st/Thread-UNIVERSITY-PEDAGOGIAN-OF-BOLIVIA)
  • Screenshots:
  • Threat Actors: honey_salt
  • Victim Country: Bolivia
  • Victim Industry: Education
  • Victim Organization: the pedagogical university
  • Victim Site: upedagogica.edu.bo

3. Conclusion

This report serves as a factual summary of incidents, adhering strictly to the data provided in the original JSON source. It has been meticulously compiled to present a direct and unadulterated log of events, devoid of any external analysis, interpretations, or hypothetical content, in full accordance with the stated requirements. This disciplined approach ensures that the document functions as a single source of truth for the documented incidents, without the potential for human bias or misinterpretation.