1. Executive Summary
This report provides a factual account of 29 distinct operational and security incidents, derived directly from the provided dataset. Each incident is presented with its specific details, including the published_url for source reference and all associated screenshots for visual evidence. The report aims to offer a consolidated, data-driven overview of these documented events.
The incidents cover various categories, including Initial Access, Data Breach, Data Leak, and Defacement, originating from different networks such as openweb and telegram. They involve various threat actors and impact organizations and individuals across multiple countries and industries.
2. Incident Details
This section provides a dedicated entry for each incident, presenting all available data from the source in a clear and structured manner.
2.1. Incident 1: Alleged sale of unauthorized access to unidentified organizations worldwide
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized remote access including over 2,000 accesses across a mix of companies, stores, home PCs, and other systems.
- Date: 2025-07-20T15:35:38Z
- Network: openweb
- Threat Actors: Buddha12
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL: https://forum.exploit.in/topic/262797/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3518b8bc-d9c4-4852-9e30-5aa50416869c.png
2.2. Incident 2: Alleged sale of access to Cometoparis
- Category: Initial Access
- Content: Threat actor claims to be selling admin panel access to Cometoparis from France.
- Date: 2025-07-20T15:14:42Z
- Network: openweb
- Threat Actors: scorpion1337
- Victim Country: France
- Victim Industry: Hospitality & Tourism
- Victim Organization: cometoparis
- Victim Site: cometoparis.com
- Published URL: https://xss.is/threads/142237/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/e7356b7d-ac9b-4352-91e9-ceee7405aefb.png
- https://d34iuop8pidsy8.cloudfront.net/b5052700-9f85-4b8e-a816-f34c3111929c.png
2.3. Incident 3: Alleged data breach of Tawuniya
- Category: Data Breach
- Content: The threat actor claims to have leaked data from Tawuniya insurance platform. The compromised data reportedly include policy details such as name, gender, contact number, date of birth, insurance type and more. NB: The authenticity of the post is yet to be verified.
- Date: 2025-07-20T15:10:45Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victim Country: Saudi Arabia
- Victim Industry: Insurance
- Victim Organization: tawuniya
- Victim Site: tawuniya.com
- Published URL: https://t.me/aqj986/6462
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/23398ab5-5f71-41fb-b42d-3922df0db5ea.png
2.4. Incident 4: Alleged data breach of Tawuniya
- Category: Data Leak
- Content: The threat actor claims to have leaked data from Tawuniya insurance platform. The compromised data reportedly include policy details such as name, gender, contact number, date of birth, insurance type and more. NB: The authenticity of the post is yet to be verified.
- Date: 2025-07-20T15:09:54Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victim Country: Saudi Arabia
- Victim Industry: Insurance
- Victim Organization: tawuniya
- Victim Site: tawuniya.com
- Published URL: https://t.me/aqj986/6462
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/23398ab5-5f71-41fb-b42d-3922df0db5ea.png
2.5. Incident 5: Alleged data breach of Tawuniya
- Category: Data Leak
- Content: The threat actor claims to have leaked data from Tawuniya insurance platform. The compromised data reportedly include policy details such as name, gender, contact number, date of birth, insurance type and more.
- Date: 2025-07-20T15:00:01Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victim Country: Saudi Arabia
- Victim Industry: Insurance
- Victim Organization: tawuniya
- Victim Site: tawuniya.com
- Published URL: https://t.me/aqj986/6462
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/23398ab5-5f71-41fb-b42d-3922df0db5ea.png
2.6. Incident 6: Alleged data leak of Indeed Jobseekers in India
- Category: Data Leak
- Content: Threat actor claims to have leaked 710,000 job seekers information in India. NB: The authenticity of the post is yet to be verified
- Date: 2025-07-20T14:38:53Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victom Industry: Information Technology (IT) Services
- Victim Country: India
- Victim Organization: indeed
- Victim Site: indeed.com
- Published URL: https://t.me/aqj986/6463
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3516b5d5-d13c-4616-9c21-9f0e7370a9c7.png
2.7. Incident 7: Alleged data leak of Wells Fargo
- Category: Data Leak
- Content: Threat actor to have leaked 630,000 savings account deposit customers of Wells Fargo. NB: The authenticity of the post is yet to be verified
- Date: 2025-07-20T14:31:19Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victim Country: USA
- Victim Industry: Financial Services
- Victim Organization: wells fargo
- Victim Site: wellsfargo.com
- Published URL: https://t.me/aqj986/6464
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/eb47a4a9-cb3c-42f4-982a-75fad2ffd50a.png
2.8. Incident 8: Alleged Data Leak of Bank Mandiri
- Category: Data Breach
- Content: The threat actor claims to have leaked credit card customer data allegedly belonging to 750,000 individuals from Bank Mandiri, Indonesia, in July. The exposed data appears to include names, email addresses, phone numbers, credit card types, masked card numbers, and expiry dates.
- Date: 2025-07-20T14:31:00Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victim Country: Portugal
- Victim Industry: Financial Services
- Victim Organization: bank mandiri
- Victim Site: bankmandiri.co.id
- Published URL: https://t.me/aqj986/6466
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b9d14064-7ce6-4e4c-9a92-1f906ab48204.PNG
2.9. Incident 9: Alleged data breach of MyKOSPERA
- Category: Data Breach
- Content: The threat actor claims to have leaked data from MyKOSPERA, including names, membership dates, duty stations, shares, and more.
- Date: 2025-07-20T14:30:19Z
- Network: telegram
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Malaysia
- Victim Industry: Financial Services
- Victim Organization: mykospera
- Victim Site: mykospera.coop.my
- Published URL:(https://t.me/BabayoScteam/52)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/2b5618d7-3bd9-479d-96a9-a98b8f5f858c.png
2.10. Incident 10: Alleged Data Leak of Banco Comercial Português Private Banking Customers
- Category: Data Breach
- Content: The threat actor claims to have leaked data belonging to 710,000 high-balance and high-net-worth customers of Banco Comercial Português (BCP), a private banking institution in Portugal. The exposed data allegedly includes full names, email addresses, mobile numbers, and account types, with record
- Date: 2025-07-20T14:25:42Z
- Network: telegram
- Threat Actors: Aiqianjin
- Victim Country: Portugal
- Victim Industry: Banking & Mortgage
- Victim Organization: banco comercial português
- Victim Site: millenniumbcp.pt
- Published URL: https://t.me/aqj986/6465
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d151e17b-a2db-40a9-a9d8-db48fe773d4b.PNG
2.11. Incident 11: Alleged data leak of Saham Malaysia
- Category: Data Leak
- Content: The group claims to have leaked the data of Saham Malaysia.
- Date: 2025-07-20T14:02:13Z
- Network: telegram
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Malaysia
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://t.me/BabayoScteam/50)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/7f03be51-591c-46aa-86a4-272131d6c397.png
2.12. Incident 12: Alleged Sale of Unauthorized Access to Federal Aviation Administration
- Category: Initial Access
- Content: Threat actor claims to be selling unauthorized access to Federal Aviation Administration, including air traffic control, authorization records, and engineer dashboards. Compromised data allegedly includes names, addresses, emails, phone numbers, company info, job roles, access levels, flight records, and maintenance logs.
- Date: 2025-07-20T13:50:58Z
- Network: telegram
- Threat Actors: Infrastructure Destruction Squad
- Victim Country: USA
- Victim Industry: Aviation & Aerospace
- Victim Organization: federal aviation administration (faa)
- Victim Site: faa.gov
- Published URL:(https://t.me/n2LP_wVf79c2YzM0/580)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1a9d473c-ee60-432a-857e-157008633778.png
2.13. Incident 13: Alleged access to Unidentified CCTV Cameras in Canada
- Category: Initial Access
- Content: The threat actor claims to have accessed 18 unidentified CCTV cameras in Canada.
- Date: 2025-07-20T12:23:45Z
- Network: telegram
- Threat Actors: RuskiNet
- Victim Country: Canada
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL: https://t.me/ruskinet/46
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/a7f5f714-b60a-41a2-8a50-8a7a22e1664b.png
2.14. Incident 14: Alleged leak of 10 Million Chile database
- Category: Data Leak
- Content: The threat actor claims to be selling personal data from Chile. The compromised data reportedly contains over 10 Million lines and includes full names, and more.
- Date: 2025-07-20T12:20:32Z
- Network: openweb
- Threat Actors: N4t0x
- Victim Country: Chile
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-Chile-DataBase-10M)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/7aa9aedd-fb44-4836-8a54-3a1188704743.png
2.15. Incident 15: Alleged leak of Chine real name
- Category: Data Leak
- Content: The threat actor claims to have leaked a database containing the real name of china.The data includes full names, birth details, addresses, phone numbers and more.
- Date: 2025-07-20T11:24:39Z
- Network: openweb
- Threat Actors: Digimon
- Victim Country: China
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-Chine-real-name-database)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/936ea80d-6571-47a1-9164-0dac59c9eee2.png
2.16. Incident 16: Alleged sale of rdp access to an unidentified company in usa
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized VPN access to a U.S.-based corporation.
- Date: 2025-07-20T11:08:39Z
- Network: openweb
- Threat Actors: 0xfluxsec
- Victim Country: USA
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL: https://xss.is/threads/142234/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/cef5781d-ef9d-419f-8d50-0ac320ccb6f5.png
2.17. Incident 17: Alleged sale of vpn access to an unidentified company in switzerland
- Category: Initial Access
- Content: The threat actor claims to be selling unauthorized Remote Desktop Protocol (RDP) access to a network based in Switzerland.
- Date: 2025-07-20T11:07:50Z
- Network: openweb
- Threat Actors: 0xfluxsec
- Victim Country: Switzerland
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL: https://xss.is/threads/142233/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f720dfd9-08b5-4103-ac1e-7517c2831b7c.png
2.18. Incident 18: Alleged leak of Indian jobs database
- Category: Data Leak
- Content: The threat actor claims to have leaked a database containing the personal information of indian jobs. The data includes full names, birth details, school records, addresses, phone numbers and more.
- Date: 2025-07-20T11:00:34Z
- Network: openweb
- Threat Actors: DigitalGhostt
- Victim Country: India
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-200K-INDIAN-JOBS-DATABASE)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6e1132aa-9e47-4f48-b6fc-594cede1c590.png
2.19. Incident 19: Alleged leak of telefónica germany gmbh & co. ohg
- Category: Data Breach
- Content: The threat actor claims to have leaked a back-end data containing personal informations of telefónica germany gmbh & co. ohg. The compromised records include full names, email addresses, phone numbers and more.
- Date: 2025-07-20T10:38:08Z
- Network: openweb
- Threat Actors: telecoms
- Victim Country: Germany
- Victim Industry: Network & Telecommunications
- Victim Organization: telefónica germany gmbh & co. ohg
- Victim Site: o2online.de
- Published URL: https://xss.is/threads/142231/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d051004b-259f-4b2e-9e84-a7ead7908143.png
2.20. Incident 20: Alleged data leak of Israeli Login Credentials from Unknown Organization
- Category: Data Leak
- Content: A threat actor claims to have leaked a file containing usernames and passwords from an unknown Israeli organization.
- Date: 2025-07-20T10:28:45Z
- Network: telegram
- Threat Actors: DigitalGhost
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL: https://t.me/c/2709967408/763
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1b1f13ca-15a3-4e37-930d-854993c87ecc.png
2.21. Incident 21: Alleged data breach of BOS
- Category: Data Breach
- Content: The threat actor claims to have leaked data from BOS. The compromised data reportedly includes personal information of participants from all congresses the company organized and thousands of user records.
- Date: 2025-07-20T10:27:34Z
- Network: telegram
- Threat Actors: Перун Сварога
- Victim Country: Czech Republic
- Victim Industry: Events Services
- Victim Organization: bos. org ltd
- Victim Site: bos-congress.cz
- Published URL: https://t.me/perunswaroga/296?single
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/84a7c6eb-2862-4a7a-b630-0afabe20e9ea.png
2.22. Incident 22: Alleged Data Breach of BOS
- Category: Data Breach
- Content: The threat actor claims to have breached BOS. org Ltd., a Czech-based professional organizer of congresses, conferences, symposiums, and workshops which reportedly exposed tens of thousands of user records.
- Date: 2025-07-20T10:11:56Z
- Network: telegram
- Threat Actors: Перун Сварога
- Victim Country: Czech Republic
- Victim Industry: Events Services
- Victim Organization: bos. org ltd
- Victim Site: bos-congress.cz
- Published URL: https://t.me/perunswaroga/296?single
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/84a7c6eb-2862-4a7a-b630-0afabe20e9ea.png
2.23. Incident 23: Alleged data leak of Israeli Usernames and Passwords
- Category: Data Breach
- Content: Threat actor claims to have leaked a file containing Israeli Usernames and Passwords.
- Date: 2025-07-20T09:42:10Z
- Network: telegram
- Threat Actors: DigitalGhost
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL: https://t.me/c/2709967408/763
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1b1f13ca-15a3-4e37-930d-854993c87ecc.png
2.24. Incident 24: Alleged unauthorized access to Pakistan Telecommunication Company Limited (PTCL)
- Category: Initial Access
- Content: Threat actor claims to have gained unauthorized access to internal systems belonging to Pakistan Telecommunication Company Limited (PTCL).
- Date: 2025-07-20T09:03:58Z
- Network: telegram
- Threat Actors: PELICAN HACKERS
- Victim Country: Pakistan
- Victim Industry: Network & Telecommunications
- Victim Organization: pakistan telecommunication company limited (ptcl)
- Victim Site: ptcl.com.pk
- Published URL: https://t.me/PelicanHackers/33
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d2cc29d2-1c17-49a8-bc1e-3a4eea2a8ec9.png
2.25. Incident 25: Alleged access to Automation Software
- Category: Initial Access
- Content: The threat actor claims to have gained access to Automation Software.
- Date: 2025-07-20T08:18:15Z
- Network: telegram
- Threat Actors: CYBER GRAY WOLF
- Victim Country: Thailand
- Victim Industry: Software Development
- Victim Organization: automation software
- Victim Site: autosoft.co.th
- Published URL:(https://t.me/CYBER_GRAY_WOLF_KH/13)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/daacac49-edb8-4529-84da-9e3e32760629.png
2.26. Incident 26: BABAYO EROR SYSTEM targets the website of SPMI Bandung Culinary Academy
- Category: Defacement
- Content: The group claims to have defaced the website of SPMI Bandung Culinary Academy.
- Date: 2025-07-20T07:43:47Z
- Network: telegram
- Threat Actors: BABAYO EROR SYSTEM
- Victim Country: Indonesia
- Victim Industry: Education
- Victim Organization: spmi bandung culinary academy
- Victim Site: spmi.atb-bandung.ac.id
- Published URL:(https://t.me/BabayoScteam/47)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/80489f3e-81c1-43b5-8673-ce1ba8c826da.png
2.27. Incident 27: Alleged leak of korean military databse
- Category: Data Breach
- Content: The threat actor claims to be selling a database allegedly containing military databse data from 2003 to 2025, including names, weapon strategy, phone numbers, email ID’s and more.
- Date: 2025-07-20T07:00:54Z
- Network: openweb
- Threat Actors: DigitalGhostt
- Victim Country: South Korea
- Victim Industry: Military Industry
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-Document-KOREAN-MILITARY-20GB-DATABASE)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/978845d2-bcc7-44c2-a570-31e6eb00b0a9.png
2.28. Incident 28: Alleged Data Leak of U.S. Police Records
- Category: Data Leak
- Content: The threat actor claims to have leaked a database of 90,000 U.S. police personnel records in CSV format, including names, contact details, agency info, and training data.
- Date: 2025-07-20T06:13:33Z
- Network: openweb
- Threat Actors: hgfshgfdshgfdhgfd
- Victim Country: USA
- Victim Industry: Law Enforcement
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-USA-POLICE-90K-CSV)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/cd586e05-34e1-4b03-84b8-aac081a5c12f.jpg
2.29. Incident 29: Alleged leak of 1.9 million Chinese records
- Category: Data Leak
- Content: The threat actor claims to have leaked a Chinese database containing 1.9 million records. The exposed data includes ID, name, gender, ethnicity, hometown, organization, national ID number, address, mobile and phone numbers, and education level. The records appear to originate from various party branches and residential communities in Shanghai’s Xuhui District, and contain detailed personally identifiable information (PII). A sample of the data is provided in CSV format
- Date: 2025-07-20T06:04:33Z
- Network: openweb
- Threat Actors: hgfshgfdshgfdhgfd
- Victim Country: China
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-Chinese-Data-Leak)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1c2061a8-d8f1-4b33-adba-7f70d1a17959.png
2.30. Incident 30: Alleged Data Leak of Israeli Police Records
- Category: Data Breach
- Content: The threat actor claims to have leaked a database containing over 100,000 records from the Israeli Police. The compromised data includes names, IDs, ranks, emails, phone numbers, and internal information.
- Date: 2025-07-20T05:50:47Z
- Network: openweb
- Threat Actors: Oblivion71
- Victim Country: Israel
- Victim Industry: Law Enforcement
- Victim Organization: israeli police
- Victim Site: gov.il
- Published URL:(https://darkforums.st/Thread-Document-%F0%9F%92%A5-Israeli-Police-Database-For-Sale-High-Value-Dox-Leak-50)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/9ece2a68-09bc-430e-945e-2e1ea247449c.jpg
2.31. Incident 31: Alleged Data Leak of Israeli Police Records
- Category: Data Leak
- Content: The threat actor claims to have leaked a database containing over 100,000 records from the Israeli Police. The compromised data includes names, IDs, ranks, emails, phone numbers, and internal information.
- Date: 2025-07-20T05:40:50Z
- Network: openweb
- Threat Actors: Oblivion71
- Victim Country: Israel
- Victim Industry: Law Enforcement
- Victim Organization: israeli police
- Victim Site: gov.il
- Published URL:(https://darkforums.st/Thread-Document-%F0%9F%92%A5-Israeli-Police-Database-For-Sale-High-Value-Dox-Leak-50)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/9ece2a68-09bc-430e-945e-2e1ea247449c.jpg
2.32. Incident 32: Alleged data breach of National Police of the Dominican Republic
- Category: Data Breach
- Content: The threat actor claims to have breached the Dominican Republic National Police system, stealing sensitive user credentials and internal law enforcement data.
- Date: 2025-07-20T05:12:30Z
- Network: openweb
- Threat Actors: floodhacking
- Victim Country: Dominican Republic
- Victim Industry: Law Enforcement
- Victim Organization: national police of the dominican republic
- Victim Site: policianacional.gob.do
- Published URL:(https://darkforums.st/Thread-database-of-the-National-Police-of-the-Dominican-Republic)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/62093d01-c412-4a29-a56f-fefd3f3905a1.png
- https://d34iuop8pidsy8.cloudfront.net/e639788e-9a10-4756-b143-7fb2770c2d16.png
2.33. Incident 33: Alleged data breach of OKX
- Category: Data Breach
- Content: The threat actor claims to have insider access to OKX, a major cryptocurrency exchange, and is claiming for sale parts of a leaked database containing over 37 million user records. The exposed data allegedly includes user email, password hash, full name, address, registration date, and last login IP.
- Date: 2025-07-20T04:29:53Z
- Network: openweb
- Threat Actors: gmail
- Victim Country: USA
- Victim Industry: Information Technology (IT) Services
- Victim Organization: okx
- Victim Site: okx.com
- Published URL: https://xss.is/threads/142215/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/5921cb85-8220-414a-bc3f-4c926d7f0f2b.png
2.34. Incident 34: Alleged personal data leak of 1 million individuals in Israel
- Category: Data Leak
- Content: The threat actor claims to have leaked the personal data of 1 million individuals in Israel. The exposed information includes full name, email, password, national ID number, age, street address, house number, city, ZIP code, mobile number, and RavKav (public transport card) details.
- Date: 2025-07-20T04:09:25Z
- Network: openweb
- Threat Actors: DigitalGhostt
- Victim Country: Israel
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-Document-1-Million-Israel-Country-Data-DOCUMENT-DATABASE)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d1f9313e-9515-4a3e-9ff5-a21506005941.png
2.35. Incident 35: Alleged data breach of Congelados DECA
- Category: Data Breach
- Content: The threat actor claims to has leaked a database allegedly from the Spanish company Congelados DECA. The dataset, in CSV format and approximately 1.77 MB in size, contains detailed business-related information such as tax identification numbers (CIF/DNI), company names, email addresses, phone numbers, physical addresses, payment methods, and internal client or company codes.
- Date: 2025-07-20T03:12:49Z
- Network: openweb
- Threat Actors: RL000
- Victim Country: Spain
- Victim Industry: Food Production
- Victim Organization: congelados deca
- Victim Site: congeladosdeca.com
- Published URL:(https://darkforums.st/Thread-Spain-DataBase-Leak)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/7117ac37-8a32-4c69-80e4-8aea3c2cf190.png
2.36. Incident 36: Alleged data breach of SOAT
- Category: Data Breach
- Content: The threat actor claims to be selling a leaked database containing 7 million records from Peru’s SOAT (Seguro Obligatorio de Accidentes de Tránsito), a mandatory vehicle insurance program. The leaked data includes sensitive insurance-related information such as document numbers, license plates, insurance company names, coverage start and end dates, certificate numbers, usage type, vehicle class, geographic location, and insurance status (mostly expired). The database is in.sql format, approximately 1.11 GB in size (110 MB compressed), and contains historical data primarily from early 2000s to 2012.
- Date: 2025-07-20T03:00:01Z
- Network: openweb
- Threat Actors: hannibalmaa
- Victim Country: Peru
- Victim Industry: Insurance
- Victim Organization: soat
- Victim Site: soat.com.pe
- Published URL:(https://darkforums.st/Thread-SOAT-PERU-DATABASE-LEAK-7M)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/0c603dae-9948-44d4-95ad-386be2f5374e.png
- https://d34iuop8pidsy8.cloudfront.net/e6344adb-62aa-4c0f-95f3-7b3e73e76436.png
2.37. Incident 37: Alleged sale of root access to VMWare ESXi server
- Category: Initial Access
- Content: The threat actor claims to be selling initial access to a VMWare ESXi server with root SSH and web interface access. The compromised server hosts multiple virtual machines and large volumes of data. Server specs include 6 Intel Xeon E-2276G CPUs, 63.9 GB RAM, 10 VM networks, and 2 TB storage
- Date: 2025-07-20T02:36:17Z
- Network: openweb
- Threat Actors: dcadcwacd
- Victim Country: Unknown
- Victim Industry: Unknown
- Victim Organization: Unknown
- Victim Site: Unknown
- Published URL:(https://darkforums.st/Thread-Selling-VMWare-ESXI-Initial-Access-Big-Server)
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b580b753-f49f-4e26-af00-aa9eb5d8d795.png
3. Summary of Incidents
This section provides a consolidated tabular overview of all documented incidents, offering a quick reference for key details.
Incident Title | Category | Date (UTC) | Threat Actors | Victim Organization | Victim Country | Published URL |
Alleged sale of unauthorized access to unidentified organizations worldwide | Initial Access | 2025-07-20T15:35:38Z | Buddha12 | Unknown | Unknown | https://forum.exploit.in/topic/262797/ |
Alleged sale of access to Cometoparis | Initial Access | 2025-07-20T15:14:42Z | scorpion1337 | cometoparis | France | https://xss.is/threads/142237/ |
Alleged data breach of Tawuniya | Data Breach | 2025-07-20T15:10:45Z | Aiqianjin | tawuniya | Saudi Arabia | https://t.me/aqj986/6462 |
Alleged data breach of Tawuniya | Data Leak | 2025-07-20T15:09:54Z | Aiqianjin | tawuniya | Saudi Arabia | https://t.me/aqj986/6462 |
Alleged data breach of Tawuniya | Data Leak | 2025-07-20T15:00:01Z | Aiqianjin | tawuniya | Saudi Arabia | https://t.me/aqj986/6462 |
Alleged data leak of Indeed Jobseekers in India | Data Leak | 2025-07-20T14:38:53Z | Aiqianjin | indeed | India | https://t.me/aqj986/6463 |
Alleged data leak of Wells Fargo | Data Leak | 2025-07-20T14:31:19Z | Aiqianjin | wells fargo | USA | https://t.me/aqj986/6464 |
Alleged Data Leak of Bank Mandiri | Data Breach | 2025-07-20T14:31:00Z | Aiqianjin | bank mandiri | Portugal | https://t.me/aqj986/6466 |
Alleged data breach of MyKOSPERA | Data Breach | 2025-07-20T14:30:19Z | BABAYO EROR SYSTEM | mykospera | Malaysia | (https://t.me/BabayoScteam/52) |
Alleged Data Leak of Banco Comercial Português Private Banking Customers | Data Breach | 2025-07-20T14:25:42Z | Aiqianjin | banco comercial português | Portugal | https://t.me/aqj986/6465 |
Alleged data leak of Saham Malaysia | Data Leak | 2025-07-20T14:02:13Z | BABAYO EROR SYSTEM | Unknown | Malaysia | (https://t.me/BabayoScteam/50) |
Alleged Sale of Unauthorized Access to Federal Aviation Administration | Initial Access | 2025-07-20T13:50:58Z | Infrastructure Destruction Squad | federal aviation administration (faa) | USA | (https://t.me/n2LP_wVf79c2YzM0/580) |
Alleged access to Unidentified CCTV Cameras in Canada | Initial Access | 2025-07-20T12:23:45Z | RuskiNet | Unknown | Canada | https://t.me/ruskinet/46 |
Alleged leak of 10 Million Chile database | Data Leak | 2025-07-20T12:20:32Z | N4t0x | Unknown | Chile | (https://darkforums.st/Thread-Chile-DataBase-10M) |
Alleged leak of Chine real name | Data Leak | 2025-07-20T11:24:39Z | Digimon | Unknown | China | (https://darkforums.st/Thread-Chine-real-name-database) |
Alleged sale of rdp access to an unidentified company in usa | Initial Access | 2025-07-20T11:08:39Z | 0xfluxsec | Unknown | USA | https://xss.is/threads/142234/ |
Alleged sale of vpn access to an unidentified company in switzerland | Initial Access | 2025-07-20T11:07:50Z | 0xfluxsec | Unknown | Switzerland | https://xss.is/threads/142233/ |
Alleged leak of Indian jobs database | Data Leak | 2025-07-20T11:00:34Z | DigitalGhostt | Unknown | India | (https://darkforums.st/Thread-200K-INDIAN-JOBS-DATABASE) |
Alleged leak of telefónica germany gmbh & co. ohg | Data Breach | 2025-07-20T10:38:08Z | telecoms | telefónica germany gmbh & co. ohg | Germany | https://xss.is/threads/142231/ |
Alleged data leak of Israeli Login Credentials from Unknown Organization | Data Leak | 2025-07-20T10:28:45Z | DigitalGhost | Unknown | Israel | https://t.me/c/2709967408/763 |
Alleged data breach of BOS | Data Breach | 2025-07-20T10:27:34Z | Перун Сварога | bos. org ltd | Czech Republic | https://t.me/perunswaroga/296?single |
Alleged Data Breach of BOS | Data Breach | 2025-07-20T10:11:56Z | Перун Сварога | bos. org ltd | Czech Republic | https://t.me/perunswaroga/296?single |
Alleged data leak of Israeli Usernames and Passwords | Data Breach | 2025-07-20T09:42:10Z | DigitalGhost | Unknown | Israel | https://t.me/c/2709967408/763 |
Alleged unauthorized access to Pakistan Telecommunication Company Limited (PTCL) | Initial Access | 2025-07-20T09:03:58Z | PELICAN HACKERS | pakistan telecommunication company limited (ptcl) | Pakistan | https://t.me/PelicanHackers/33 |
Alleged access to Automation Software | Initial Access | 2025-07-20T08:18:15Z | CYBER GRAY WOLF | automation software | Thailand | (https://t.me/CYBER_GRAY_WOLF_KH/13) |
BABAYO EROR SYSTEM targets the website of SPMI Bandung Culinary Academy | Defacement | 2025-07-20T07:43:47Z | BABAYO EROR SYSTEM | spmi bandung culinary academy | Indonesia | (https://t.me/BabayoScteam/47) |
Alleged leak of korean military databse | Data Breach | 2025-07-20T07:00:54Z | DigitalGhostt | Unknown | South Korea | (https://darkforums.st/Thread-Document-KOREAN-MILITARY-20GB-DATABASE) |
Alleged Data Leak of U.S. Police Records | Data Leak | 2025-07-20T06:13:33Z | hgfshgfdshgfdhgfd | Unknown | USA | (https://darkforums.st/Thread-USA-POLICE-90K-CSV) |
Alleged leak of 1.9 million Chinese records | Data Leak | 2025-07-20T06:04:33Z | hgfshgfdshgfdhgfd | Unknown | China | (https://darkforums.st/Thread-Chinese-Data-Leak) |
Alleged Data Leak of Israeli Police Records | Data Breach | 2025-07-20T05:50:47Z | Oblivion71 | israeli police | Israel | (https://darkforums.st/Thread-Document-%F0%9F%92%A5-Israeli-Police-Database-For-Sale-High-Value-Dox-Leak-50) |
Alleged Data Leak of Israeli Police Records | Data Leak | 2025-07-20T05:40:50Z | Oblivion71 | israeli police | Israel | (https://darkforums.st/Thread-Document-%F0%9F%92%A5-Israeli-Police-Database-For-Sale-High-Value-Dox-Leak-50) |
Alleged data breach of National Police of the Dominican Republic | Data Breach | 2025-07-20T05:12:30Z | floodhacking | national police of the dominican republic | Dominican Republic | (https://darkforums.st/Thread-database-of-the-National-Police-of-the-Dominican-Republic) |
Alleged data breach of OKX | Data Breach | 2025-07-20T04:29:53Z | gmail | okx | USA | https://xss.is/threads/142215/ |
Alleged personal data leak of 1 million individuals in Israel | Data Leak | 2025-07-20T04:09:25Z | DigitalGhostt | Unknown | Israel | (https://darkforums.st/Thread-Document-1-Million-Israel-Country-Data-DOCUMENT-DATABASE) |
Alleged data breach of Congelados DECA | Data Breach | 2025-07-20T03:12:49Z | RL000 | congelados deca | Spain | (https://darkforums.st/Thread-Spain-DataBase-Leak) |
Alleged data breach of SOAT | Data Breach | 2025-07-20T03:00:01Z | hannibalmaa | soat | Peru | (https://darkforums.st/Thread-SOAT-PERU-DATABASE-LEAK-7M) |
Alleged sale of root access to VMWare ESXi server | Initial Access | 2025-07-20T02:36:17Z | dcadcwacd | Unknown | Unknown | (https://darkforums.st/Thread-Selling-VMWare-ESXI-Initial-Access-Big-Server) |
4. Conclusion
The comprehensive review of the 29 documented incidents reveals a dynamic and varied landscape of cyber threats and security challenges. The incidents, ranging from initial access attempts and data breaches to data leaks and website defacements, highlight the persistent and evolving nature of risks faced by organizations and individuals globally.
A significant portion of the incidents involves the alleged sale or leak of sensitive data, including personal information, financial details, and internal credentials, impacting various sectors such as financial services, law enforcement, and telecommunications across numerous countries. This underscores the critical importance of robust data protection measures and continuous monitoring for unauthorized access and data exfiltration.
Furthermore, the presence of incidents related to initial access, such as unauthorized VPN or RDP access and compromised admin panels, emphasizes the ongoing need for strong access management controls, multi-factor authentication, and vigilance against social engineering tactics like phishing. The defacement incident also serves as a reminder of the impact of web-based attacks on an organization’s public image and operational integrity.
Overall, the data presented in this report provides a factual snapshot of recent security incidents, reinforcing the necessity for comprehensive cybersecurity strategies that encompass proactive threat intelligence, strong preventative controls, rapid detection capabilities, and effective incident response mechanisms to mitigate potential impacts. The report strictly adheres to the provided data, offering an objective and factual account for all relevant stakeholders.