[July-30-2025] Daily Cybersecurity Threat Report

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data.

  1. Alleged sale of Business and Corporate leads
    • Category: Data Leak
    • Content: The threat actor claims to be selling a database about corporate business leads, The compromised data reportedly includes profiles such as business managers, directors, CFOs, CTOs, CEOs, marketing leads, and other senior professionals from industries like hospitality, retail, travel, education, real estate, and more.
    • Date: 2025-07-30T13:45:02Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-SELLING-Leads-Corporate-Business
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/45ee625c-f49b-4da5-b8bb-a558d0353c89.png
    • Threat Actors: R4S0Y4
    • Victim Country: Unknown
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  2. Alleged data breach of Cegid
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database from Cegid containing 74,000 records and a 100-line sample. The data reportedly includes customer ID, customer reference, company name, contact details, first name, last name, last connection, phone number, email, RIB, and bank invoice information.
    • Date: 2025-07-30T13:33:54Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-SELLING-FR-BE-ES-CEGID-COM-DATABASE-20K-RIB
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/b1411875-5e86-467d-b708-e9f78b9f2cd3.png
    • Threat Actors: kokabel
    • Victim Country: France
    • Victim Industry: Software Development
    • Victim Organization: cegid
    • Victim Site: cegid.com
  3. Alleged data leak of Indian Chronicle
    • Category: Data Leak
    • Content: The threat actor claims to have leaked data from Indian Chronicle. The compromised data reportedly includes 36K rows with names, email addresses, phone numbers, and physical addresses from the site’s MySQL database, potentially indicating a breach of user information from the news platform.
    • Date: 2025-07-30T12:12:31Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-Indian-Chronicle-DB
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/9443e6a4-48c1-42c8-97e8-8d4cc1a33958.png
    • Threat Actors: DataCommune
    • Victim Country: India
    • Victim Industry: Media & News
    • Victim Organization: indian chronicle
    • Victim Site: indianchronicle.com
  4. Alleged data sale of Boeing employee information
    • Category: Data Leak
    • Content: The threat actor claims to be selling data purportedly from Boeing, including information on employees and clients. The compromised data reportedly consists of 827,000 unique emails, 100,000 mobile numbers, and 100,000 company names, suggesting a significant exposure of corporate contact details related to Boeing.
    • Date: 2025-07-30T11:23:16Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-Boeing-Email-Mobile-and-Company-Name
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/55c8fa37-7629-449f-a1e4-5523848b0625.png
      • https://d34iuop8pidsy8.cloudfront.net/2d5ac7a6-17fb-46a8-a504-3001d67277f6.png
    • Threat Actors: JuiZer0
    • Victim Country: USA
    • Victim Industry: Aerospace & Defense
    • Victim Organization: boeing
    • Victim Site: boeing.com
  5. Alleged data breach of Chinook Salmon Genetic Information
    • Category: Data Breach
    • Content: The threat actor claims to have leaked data related to Chinook salmon’s genetic information. The breach reportedly affects entities like the University of California at Davis and NOAA, and the leaked dataset is said to include PacBio HiFi sequencing data along with Oxford Nanopore long read sequencing data, totaling approximately 60GB.
    • Date: 2025-07-30T11:17:20Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-Chinook-Salmon-Sequencing-Data-Leak
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/37cfa46c-a700-4632-b512-5e9c944ddcc8.png
      • https://d34iuop8pidsy8.cloudfront.net/71763409-93ea-4c8d-a804-be1261fa3905.png
    • Threat Actors: xtcmax
    • Victim Country: USA
    • Victim Industry: Education / Government (Research)
    • Victim Organization: ucdavis / noaa
    • Victim Site: ucdavis.edu / noaa.gov
  6. Alleged customer data leak of Spruzer
    • Category: Data Breach
    • Content: The threat actor claims to be selling a database identified as “users spruzer.com” with 100,000 records. The data reportedly includes email addresses, full names, phone numbers, hashed passwords, and IP addresses of customers of Spruzer, an online print shop.
    • Date: 2025-07-30T11:11:09Z
    • Network: openweb
    • Published URL: https://breachforums.hn/Thread-Spruzer-customer-database
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/8b50356f-bdcd-4e05-9a51-8c7121f1deeb.png
    • Threat Actors: JohnCarter
    • Victim Country: Unknown
    • Victim Industry: E-commerce
    • Victim Organization: spruzer
    • Victim Site: spruzer.com
  7. Alleged sale of access to Cron Associates (British CPA)
    • Category: Initial Access
    • Content: The threat actor claims to be selling access to Cron Associates, a UK-based CPA (accounting) firm. The sale reportedly includes an RDP (Remote Desktop Protocol) with Administrator privileges to the firm’s systems, and the company is said to have annual revenue around $225,000.
    • Date: 2025-07-30T10:11:34Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-SELLING-Cron-Associates-CPA-RDP
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/e0dbf636-b7fd-4c23-842f-4098deec109b.PNG
    • Threat Actors: SkyN3t
    • Victim Country: UK
    • Victim Industry: Accounting
    • Victim Organization: cron associates
    • Victim Site: cronassociates.co.uk
  8. Alleged sale of Hungarian chemical manufacturer data
    • Category: Data Leak
    • Content: The threat actor claims to be selling sensitive internal data from a Hungarian chemical manufacturing company. The compromised data reportedly includes internal company documents, chemical formulas, patents, project files, certificates, and other confidential information presumably stolen from the company’s network.
    • Date: 2025-07-30T09:44:11Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-SELLING-Hungarian-Chemical-Manufacturer
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/62162e8a-3d0c-46f2-a8c9-991f6dc5e926.png
      • https://d34iuop8pidsy8.cloudfront.net/1c6a4bca-917d-4f3d-acdf-dde18ffc96ab.png
    • Threat Actors: TheHell
    • Victim Country: Hungary
    • Victim Industry: Chemicals
    • Victim Organization: Unknown
    • Victim Site: Unknown
  9. Alleged sale of oil company data (Rusal/Aerospace)
    • Category: Data Leak
    • Content: The threat actor claims to be selling internal data and confidential documents from a major oil-related company (possibly Rusal or Aerospace). The compromised files reportedly include contracts, blueprints, financial documents, NDAs, and other sensitive information indicating a significant corporate data breach.
    • Date: 2025-07-30T09:39:19Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-SELLING-Oil-Company-Data-Rusal-Aerospace
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/69d8a5ad-2b73-4d9a-8bcb-392251094f97.png
      • https://d34iuop8pidsy8.cloudfront.net/cc62126b-2189-44f5-b050-ad0760989ec4.png
    • Threat Actors: TheHell
    • Victim Country: Unknown
    • Victim Industry: Oil & Energy
    • Victim Organization: Unknown
    • Victim Site: Unknown
  10. Alleged sale of Marriott credentials
    • Category: Credential Leak
    • Content: The threat actor claims to be selling employee login credentials for Marriott. The credentials reportedly include email addresses and passwords for employees of Marriott International, indicating a potential credential leak that could be used for unauthorized access.
    • Date: 2025-07-30T09:38:57Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-MARRIOTT-INTERNATIONAL-CREDENTIAL-LEAK
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/7212953b-8d63-4d90-941f-9f21f70d6776.png
    • Threat Actors: TheHell
    • Victim Country: USA
    • Victim Industry: Hospitality
    • Victim Organization: marriott international
    • Victim Site: marriott.com
  11. Alleged sale of LV personal accounts
    • Category: Credential Leak
    • Content: The threat actor claims to be offering personal account credentials belonging to residents of Latvia (LV). The data reportedly includes usernames and passwords, possibly from an unspecified breach or data collection, and is being sold on a hacking forum.
    • Date: 2025-07-30T09:34:21Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-LV-Personal-Accounts-Data
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/30d1e9fd-6b2a-4d18-9204-d34ddaa1eb4a.png
    • Threat Actors: premium1337
    • Victim Country: Latvia
    • Victim Industry: Unknown
    • Victim Organization: Unknown
    • Victim Site: Unknown
  12. Alleged defacement of Fact Republic
    • Category: Defacement
    • Content: The threat actor claims to have defaced the website of Fact Republic, a platform known for publishing fact lists and trivia. The attack reportedly involved unauthorized modification of the site’s content or appearance, indicating a compromise of the website’s integrity.
    • Date: 2025-07-30T09:31:01Z
    • Network: telegram
    • Published URL: https://t.me/nxbbsec/1903
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/e2df8e90-41ea-43d0-babb-8d724265f198.jpg
      • https://d34iuop8pidsy8.cloudfront.net/71b7a678-0fe6-4dfd-88ae-fe4ec66b7a84.jpg
    • Threat Actors: NXBB.SEC
    • Victim Country: Unknown
    • Victim Industry: Media & News
    • Victim Organization: fact republic
    • Victim Site: factrepublic.com
  13. Alleged defacement of Google Singapore and others
    • Category: Defacement
    • Content: The threat actor (under the alias “XDSea”) claims responsibility for defacing multiple websites, including a subdomain of Google Singapore (csedu.google.com.sg) and other sites such as fsph.hu and acopy.net. The defacements suggest a security compromise on those domains, altering their web content.
    • Date: 2025-07-30T09:30:45Z
    • Network: openweb
    • Published URL: https://defaced.domains/attack/125236
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/f2cb3655-5ec2-4a20-b3f0-3b83e459b15c.png
      • https://d34iuop8pidsy8.cloudfront.net/ff5a7c88-4335-4a6e-b458-16b4096b4e88.png
    • Threat Actors: XDSea
    • Victim Country: Multiple (Singapore, Hungary, Unknown)
    • Victim Industry: Technology / Various
    • Victim Organization: google singapore, etc.
    • Victim Site: csedu.google.com.sg, fsph.hu, acopy.net
  14. Alleged sale of Hungarian manufacturer database
    • Category: Data Leak
    • Content: The threat actor claims to be selling a database allegedly belonging to a Hungarian automotive or manufacturing company. The data reportedly includes over 15,000 records with fields like customer names, addresses, emails, and telephone numbers, suggesting a compromise of the company’s customer or client information.
    • Date: 2025-07-30T09:30:43Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-Hungarian-Manufacturer-Database-15K
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/f8851e2b-df79-4d8a-b048-9e91a67665d5.png
      • https://d34iuop8pidsy8.cloudfront.net/81ae4706-e363-4339-b21c-bd9f62e4c970.png
    • Threat Actors: DataExpress
    • Victim Country: Hungary
    • Victim Industry: Manufacturing
    • Victim Organization: Unknown
    • Victim Site: Unknown
  15. Alleged data sale of Spanish IT firm
    • Category: Data Leak
    • Content: The threat actor claims to be selling data from a Spanish IT firm. The compromised dataset reportedly contains 39,000 client records along with customer invoices, as well as credentials (usernames and passwords) for the company’s servers and routers, indicating a severe breach of the firm’s internal systems and client information.
    • Date: 2025-07-30T09:29:30Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-Selling-Spanish-IT-Firm-Data
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/1b4f9532-b824-4f0d-8d74-4ff1ca028396.png
      • https://d34iuop8pidsy8.cloudfront.net/1f486c3a-070b-4b1a-8d2f-5602d3da3cae.png
    • Threat Actors: premium1337
    • Victim Country: Spain
    • Victim Industry: Information Technology
    • Victim Organization: Unknown
    • Victim Site: Unknown
  16. Alleged defacement of Mexican government sites
    • Category: Defacement
    • Content: The threat actor claims to have defaced multiple Mexican government websites. The defacements reportedly include altering the content of pages, possibly leaving messages or images, which indicates unauthorized access to those government web servers and a breach of their security.
    • Date: 2025-07-30T09:29:10Z
    • Network: openweb
    • Published URL: https://defaced.domains/attack/125208
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/0808d7d3-1b89-4d0e-aaef-6abce5055f41.png
      • https://d34iuop8pidsy8.cloudfront.net/8059bd5e-ea58-451c-96a2-5e61b447e707.png
    • Threat Actors: HAXXOR
    • Victim Country: Mexico
    • Victim Industry: Government
    • Victim Organization: Government of Mexico
    • Victim Site: Various (.gob.mx domains)
  17. NXBB.SEC targets the website of The Thai Health Promotion Foundation
    • Category: Defacement
    • Content: The group claims to have defaced the website of The Thai Health Promotion Foundation. NB: The authenticity of the claim is yet to be verified.
    • Date: 2025-07-30T09:28:35Z
    • Network: telegram
    • Published URL: https://t.me/nxbbsec/1912
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/590cffe0-91df-4a11-a43a-18cfa491c1c5.JPG
      • https://d34iuop8pidsy8.cloudfront.net/ed6db071-c47e-4b3d-8409-6ccb707c1421.JPG
    • Threat Actors: NXBB.SEC
    • Victim Country: Thailand
    • Victim Industry: Government / Public Health
    • Victim Organization: thai health promotion foundation
    • Victim Site: thaihealth.or.th
  18. Alleged data breach of Thailand’s BMA Smart Service
    • Category: Data Breach
    • Content: The threat actor claims to have breached the BMA (Bangkok Metropolitan Administration) Smart Service system. The leak reportedly includes 2GB of data, comprising personal details and government documents such as Thai citizen ID numbers, house registration documents, driver’s licenses, and work permit cards, indicating a significant compromise of a Thai municipal service database.
    • Date: 2025-07-30T09:27:04Z
    • Network: telegram
    • Published URL: https://t.me/nxbbsec/1908
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/84f5f0c6-7c13-433b-9478-5ee52c2f991b.jpg
      • https://d34iuop8pidsy8.cloudfront.net/ab050be3-21ab-4be6-ae9e-e4e5d4b1f210.jpg
    • Threat Actors: NXBB.SEC
    • Victim Country: Thailand
    • Victim Industry: Government
    • Victim Organization: bangkok metropolitan administration (smart service)
    • Victim Site: smart.bangkok.go.th
  19. Alleged sale of Latch RDP Exploit
    • Category: Exploit Sale
    • Content: The threat actor is advertising an exploit for sale targeting Latch RDP (Remote Desktop Protocol). The exploit reportedly allows unauthorized access through RDP, which could enable attackers to bypass normal authentication or security controls on systems using Latch, presenting a severe security risk if it’s a zero-day or unpatched vulnerability.
    • Date: 2025-07-30T09:21:34Z
    • Network: openweb
    • Published URL: https://exploit.in/forum/thread259521
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/9b36f4f6-7b9d-4cc9-8975-4de26c063afc.png
    • Threat Actors: 4zt
    • Victim Country: N/A (Exploit)
    • Victim Industry: N/A (Exploit)
    • Victim Organization: N/A
    • Victim Site: N/A
  20. Alleged RCE vulnerability in Revolt (messaging platform)
    • Category: Vulnerability
    • Content: The user “XMPP” reports a Remote Code Execution (RCE) vulnerability in Revolt, an open-source alternative to Discord. The vulnerability allegedly allows an attacker to craft a malicious link such that when a user hovers over it, it triggers RCE on the user’s system, posing a critical security threat to Revolt’s user base.
    • Date: 2025-07-30T08:58:32Z
    • Network: openweb
    • Published URL: https://forum.openbugbounty.org/topic/21801
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/d9736030-f57a-449c-b059-8fe293197d67.png
    • Threat Actors: XMPP (researcher)
    • Victim Country: Unknown
    • Victim Industry: Technology (Messaging)
    • Victim Organization: Revolt
    • Victim Site: revolt.chat
  21. Alleged sale of Crypto-Related Databases
    • Category: Data Leak
    • Content: The threat actor, using the alias “c0mpass”, claims to be selling databases related to cryptocurrency. The leaked data reportedly includes user information from platforms or services in the crypto space, potentially affecting those platforms’ users’ privacy or account security.
    • Date: 2025-07-30T08:50:54Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-Selling-Crypto-related-DBs
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/13759ab8-b833-4901-8712-8960274f2c00.png
    • Threat Actors: c0mpass
    • Victim Country: Unknown
    • Victim Industry: Cryptocurrency
    • Victim Organization: Unknown
    • Victim Site: Unknown
  22. Alleged breach of PTCL & Ufone (Pakistan)
    • Category: Data Breach
    • Content: The threat actor claims to have breached systems of PTCL (Pakistan Telecommunication Company Limited) and Ufone (a Pakistani mobile network). The attack reportedly includes obtaining local administrator privileges and dumping password hashes from domain controllers, suggesting a major compromise of their IT infrastructure.
    • Date: 2025-07-30T08:06:38Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowDataLeaks/1386
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/ef8fa257-f620-468c-a030-f4d9bf4478b1.jpg
      • https://d34iuop8pidsy8.cloudfront.net/a4e2d923-549e-44ab-8e0c-f3d03e80be09.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: Pakistan
    • Victim Industry: Telecommunications
    • Victim Organization: PTCL & Ufone
    • Victim Site: ptcl.com.pk, ufone.com
  23. Alleged defacement of Subarnarekha Port Trust (India)
    • Category: Defacement
    • Content: The threat actor claims to have defaced the website of Subarnarekha Port Trust in India. The defacement likely involves unauthorized alterations to the website’s pages, indicating a security breach of the port trust’s web server or content management system.
    • Date: 2025-07-30T06:29:25Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowClub/787
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/2592b111-99b4-4da3-b96a-66cb3c8c708d.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: India
    • Victim Industry: Government / Port Authority
    • Victim Organization: subarnarekha port trust
    • Victim Site: subarnarekhaport.in
  24. Alleged breach of Abu Dhabi Judicial Department
    • Category: Data Breach
    • Content: The threat actor known as “Mysterious Team Bangladesh” claims to have breached the Abu Dhabi Judicial Department. The breach reportedly involves dumping data from the organization’s systems or databases, suggesting a serious compromise of sensitive information within the judicial department.
    • Date: 2025-07-30T06:07:16Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowDataLeaks/1376
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/ef3120ab-1393-4389-85ba-2ebc07a2fc1d.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: UAE (Abu Dhabi)
    • Victim Industry: Government / Judicial
    • Victim Organization: abu dhabi judicial department
    • Victim Site: adjd.gov.ae
  25. Alleged breach of Indonesian education sector sites
    • Category: Data Breach
    • Content: The threat actor asserts they have breached websites related to the Indonesian education sector. The leaked data reportedly includes login credentials and potentially personal data from multiple educational portals or databases, indicating a widespread compromise across various education-related systems.
    • Date: 2025-07-30T05:10:12Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowDataLeaks/1366
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/77efb79b-c604-4831-8053-0edfa125cc09.jpg
      • https://d34iuop8pidsy8.cloudfront.net/63c21797-3ca5-421b-8b9b-52951b36af1b.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: Indonesia
    • Victim Industry: Education
    • Victim Organization: Multiple (education sector)
    • Victim Site: Various (.ac.id domains)
  26. Alleged sensitive data leak from Arnold Clark
    • Category: Data Leak
    • Content: The threat actor claims to have leaked sensitive data from Arnold Clark, a large car dealership chain. The leaked files reportedly include scanned copies of customer identification documents (passports, driver’s licenses, etc.), loan agreements, finance calculations, and bank statements, indicating a significant data breach affecting customer privacy and financial information.
    • Date: 2025-07-30T04:16:36Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowDataLeaks/1359
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/dd41c90b-a327-4c31-8025-9a500240bc86.jpg
      • https://d34iuop8pidsy8.cloudfront.net/c0c5ff80-36ff-49fa-aaca-1648197ebf9f.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: UK
    • Victim Industry: Automotive (Retail)
    • Victim Organization: arnold clark
    • Victim Site: arnoldclark.com
  27. Alleged data breach of North Macedonia Ministry of Interior
    • Category: Data Breach
    • Content: The threat actor alleges a data breach involving North Macedonia’s Ministry of Interior (MVR). The breach reportedly includes an archive of documents and emails (around 90MB, with 6000 documents) stolen from the ministry’s network, suggesting a significant compromise of government communications and internal records.
    • Date: 2025-07-30T04:00:50Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowDataLeaks/1357
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/ffd69c2e-7245-41b4-b1ca-4518f62e549e.jpg
      • https://d34iuop8pidsy8.cloudfront.net/a90f80e2-8c85-449e-868a-c5ef5b8a4705.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: North Macedonia
    • Victim Industry: Government / Law Enforcement
    • Victim Organization: ministry of interior (north macedonia)
    • Victim Site: mvr.gov.mk
  28. Alleged sale of access to UK Healthcare Portal
    • Category: Initial Access
    • Content: The threat actor claims to be selling admin access to a UK-based online healthcare portal. The portal is described as patient-focused (with ~53,000 patients), suggesting it might be a system for clinic or health services management, and access is being sold possibly for malicious use or data extraction.
    • Date: 2025-07-30T03:57:14Z
    • Network: telegram
    • Published URL: https://t.me/CyberKnowClub/780
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/03e028c0-14b3-4b8e-9bc2-b8d9455dd910.jpg
    • Threat Actors: Mysterious Team Bangladesh
    • Victim Country: UK
    • Victim Industry: Healthcare
    • Victim Organization: Unknown (Healthcare Portal)
    • Victim Site: Unknown
  29. Alleged sale of GameDev.net user database
    • Category: Data Leak
    • Content: The threat actor claims to be selling a user database from GameDev.net, a community site for game developers. The database reportedly contains account information for 579,000 users, including usernames, email addresses, hashed passwords, and possibly other profile details, indicating a major breach of the platform’s user data.
    • Date: 2025-07-30T03:57:11Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-GAMEDEV-NET-database-579K
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/4b67f514-8af6-4253-9488-396d6c37324b.png
    • Threat Actors: hoan
    • Victim Country: USA
    • Victim Industry: Online Community (Gaming/Development)
    • Victim Organization: gamedev.net
    • Victim Site: gamedev.net
  30. Alleged sale of Saudi fund and Philippine noontalk data
    • Category: Data Leak
    • Content: The threat actor is selling data purportedly from two separate sources: a Saudi fund (possibly a financial or investment fund in Saudi Arabia) and “Noontalk” (likely a forum or platform in the Philippines). Details are scarce, but the sale suggests that databases or sensitive user information from these entities have been compromised and are being offered on a hacking forum.
    • Date: 2025-07-30T03:52:42Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-Saudi-Fund-Philippines-NoonTalk-DBs
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/c1524717-9f41-40f7-b6e3-b0d63ff62d94.png
    • Threat Actors: TorchLeaker
    • Victim Country: Saudi Arabia / Philippines
    • Victim Industry: Finance / Online Community
    • Victim Organization: Unknown (Saudi fund), noontalk
    • Victim Site: Unknown
  31. Alleged breach of PathPartner Technology
    • Category: Data Breach
    • Content: The threat actor claims to have breached PathPartner Technology, which is an Indian technology company. The leak reportedly includes internal company documents or data, totaling 4.2GB, implying a substantial compromise of proprietary or sensitive information belonging to the company.
    • Date: 2025-07-30T03:47:12Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-PathPartner-Technology-Data-Leak
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/91fcba97-089e-4ffb-9d8a-e984f33b34d1.png
    • Threat Actors: TorchLeaker
    • Victim Country: India
    • Victim Industry: Technology / Software
    • Victim Organization: pathpartner technology
    • Victim Site: pathpartnertech.com
  32. Alleged sale of iRShell credentials
    • Category: Credential Leak
    • Content: The threat actor claims to be selling login credentials (usernames and passwords) for accounts on iRShell, which is described as an enterprise private cloud service. The leak of such credentials suggests unauthorized access to corporate cloud resources, potentially exposing sensitive business data or services if buyers misuse the credentials.
    • Date: 2025-07-30T03:43:39Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-iRShell-Enterprise-Private-Cloud-Credentials
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/7ad0a3ae-c83c-4869-9f08-4d785a9532c4.png
    • Threat Actors: TorchLeaker
    • Victim Country: Unknown
    • Victim Industry: Cloud Services / Enterprise
    • Victim Organization: irshell
    • Victim Site: irshell.com
  33. Alleged sale of University of Milan credentials
    • Category: Credential Leak
    • Content: The threat actor is offering for sale account credentials associated with the University of Milan (Università degli Studi di Milano). The credentials likely pertain to student or faculty accounts (emails and passwords), suggesting a breach or data leak involving the university’s user database and raising concerns about unauthorized access to university systems.
    • Date: 2025-07-30T03:30:45Z
    • Network: openweb
    • Published URL: https://breached.vc/Thread-UNIVERSITY-OF-MILAN-CREDENTIALS
    • Screenshots:
      • https://d34iuop8pidsy8.cloudfront.net/49840b57-8e5c-4d5c-ac21-2890c171d506.png
    • Threat Actors: TorchLeaker
    • Victim Country: Italy
    • Victim Industry: Education
    • Victim Organization: university of milan
    • Victim Site: unimi.it