[June-20-2025] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides a high-level overview of significant cybersecurity incidents observed over the last 24 hours, highlighting prevalent data breaches across diverse sectors and the varied motivations driving malicious actors. A recurring theme in the intelligence gathered is the widespread nature of data compromise, affecting organizations from entertainment and education to critical logistics and financial services. This underscores a persistent vulnerability across industries, where both opportunistic and highly targeted attacks continue to yield sensitive information.

A notable development within the cybercrime landscape is the observed inaccessibility of several dark web links associated with reported incidents. This phenomenon suggests potential disruptions, possibly due to law enforcement actions or internal conflicts within the cybercriminal ecosystem. Such instability, while potentially hindering some illicit activities temporarily, also prompts threat actors to adapt, often leading to the fragmentation of underground marketplaces or a strategic shift towards more private, encrypted communication channels.

The analysis of today’s events emphasizes the continued exploitation of fundamental cyber hygiene failures, even by sophisticated adversaries. Simultaneously, the dynamic evolution of dark web marketplaces and the increasing reliance on platforms like Telegram by malicious entities present new challenges for defenders. Organizations must prioritize foundational security controls and adapt to these evolving dynamics. Immediate considerations should include reinforcing basic security measures, enhancing threat intelligence capabilities to track shifting adversary behaviors, and ensuring robust incident response plans are in place.

2. Daily Incident Log

This section details each reported cybersecurity breach, providing essential information for a quick understanding of the event. The consistent inaccessibility of the direct dark web links for these incidents is a critical observation, indicating potential disruptions or takedowns of these cybercrime forums.1 This widespread unavailability suggests a significant, ongoing instability within the cybercrime underground, which, while potentially hindering some illicit activities, also forces malicious actors to adapt their operational methods.

Incident IDVictim OrganizationIndustryCountry (if known)Type of IncidentKey Data CompromisedThreat Actor (if identified)Published URLScreenshots URLStatus of Published URL
1JKT48Music & EntertainmentIndonesia/JapanData Breach10M Gmail, NIK, CP, Oshimen, HQ VerifiedUnidentifiedhttp://darkforums.st/Thread-Full-Database-JKT48-com-10M-Gmail-NIK-CP-Oshimen-HQ-Verified-%F0%9F%87%AE%F0%9F%87%A9[Placeholder]Inaccessible
2Iranian Military (implied)Government/DefenseIranData SaleIranian military databaseUnidentifiedhttp://darkforums.st/Thread-Selling-Iran-military-DB[Placeholder]Inaccessible
3First Choice Business BrokersBusiness BrokerageUSAData BreachSensitive financial records, client lists, deal negotiations, proprietary business informationUnidentifiedhttp://xss.is/threads/140231/[Placeholder]Inaccessible
4Instituto Técnico Boliviano Suizo (TBS)EducationBoliviaData LeakFull Academic Database (12k records)Unidentifiedhttp://darkforums.st/Thread-Instituto-T%C3%A9cnico-Boliviano-Suizo-%E2%80%93-TBS-Bolivia-Full-Academic-Database-12k[Placeholder]Inaccessible
5MAS HoldingsApparel & Textile ManufacturingSri LankaMassive Data BreachIntellectual property, supply chain logistics, employee/customer dataUnidentifiedhttp://sinister.ly/Thread-Leak-Massive-Data-Breach-at-Sri-Lanka-s-Largest-Apparel-Manufacturer[Placeholder]Inaccessible
6Kakatiya UniversityEducationIndiaData LeakStudent/faculty PII, academic recordsUnidentifiedhttp://darkforums.st/Thread-LEAKED-KUCOLLEGES-CO-IN[Placeholder]Inaccessible
7Manhattan Parking Group (MPG)Parking ServicesUSAData BreachCustomer payment info, reservation details, employee PIIUnidentifiedhttp://darkforums.st/Thread-Manhattan-Parking-Group-Data-Breach-Leaked-Download[Placeholder]Inaccessible
8FREIGHT LOGISTICS SERVICES USALogistics & Freight ForwardingUSAData BreachShipping manifests, client contracts, supply chain vulnerabilitiesUnidentifiedhttp://xss.is/threads/140218/[Placeholder]Inaccessible
9Canadian Tax CompanyFinancial Services (Tax)CanadaData LeakSensitive financial/personal tax dataUnidentifiedhttp://xss.is/threads/140221/[Placeholder]Inaccessible
10Unidentified Organization in CaliforniaUnspecifiedUSAData LeakUnspecified dataUnidentifiedhttp://xss.is/threads/140217/[Placeholder]Inaccessible
11Casino MaltaGaming ServicesMaltaData LeakCustomer financial data, PII, gambling habitsUnidentifiedhttp://xss.is/threads/140220/[Placeholder]Inaccessible
12Unidentified source of KYC dataCross-industry (Finance, Crypto)India/USA/EUData Sale70K KYC records (photo ID, selfie)Unidentifiedhttp://darkforums.st/Thread-Selling-70K-INDIA-USA-EU-KYCs-for-sale-PHOTO-ID-SELFIE–14076[Placeholder]Inaccessible

2.1. Incident 1: JKT48 Data Breach

The Indonesian-Japanese idol girl group JKT48, a prominent entity in the music and entertainment industry, has reportedly suffered a significant data breach. JKT48, established in 2011 and owned by IDN, is known for its “idols you can meet” concept and has a substantial fan base.13 The incident involves the alleged compromise of a “Full Database” containing approximately 10 million Gmail accounts, National Identity Numbers (NIK), contact numbers (CP), and “Oshimen HQ Verified” data.1 The exposure of such extensive Personally Identifiable Information (PII) poses a severe risk of identity theft and targeted phishing campaigns against both the group’s members and its dedicated fan community. The direct source for this information, a darkforums.st link, is currently inaccessible.1

2.2. Incident 2: Iranian Military Database Sale

Reports indicate the purported sale of an “Iran military DB” on a dark web forum. While the specifics of the breach remain unconfirmed due to the inaccessibility of the source link 2, the alleged compromise of data from a government/defense entity like the Iranian military carries profound national security implications. Such a breach could expose sensitive personnel data, intelligence, or operational details, potentially impacting geopolitical stability. The darkforums.st link advertising this sale is currently inaccessible.2

2.3. Incident 3: First Choice Business Brokers Data Breach

First Choice Business Brokers, a firm recognized as “The World’s Authority in Business Sales” and specializing in business brokerage, mergers, and acquisitions, has reportedly experienced a data breach.15 This organization handles confidential and high-value transactions, making any data compromise particularly sensitive. The breach could potentially expose highly sensitive financial records, proprietary business information, client lists, details of deal negotiations, and the PII of business owners and buyers.15 Such information is invaluable for corporate espionage, competitive disadvantage, and significant financial fraud. The xss.is link detailing this incident is currently inaccessible.3

2.4. Incident 4: Instituto Técnico Boliviano Suizo (TBS) Academic Database Leak

The Instituto Técnico Boliviano Suizo (TBS), a private technical university in Bolivia with multiple campuses, has reportedly suffered a data leak involving its “Full Academic Database” of 12,000 records.17 This institution emphasizes a practical, dual-training methodology, contributing significantly to human resource development in Bolivia. The compromised data likely includes student and staff PII, academic performance records, and enrollment details. This exposure could lead to identity theft, credential stuffing attacks, and reputational damage for the university. The darkforums.st link associated with this leak is currently inaccessible.4

2.5. Incident 5: MAS Holdings Data Breach

MAS Holdings, a leading Sri Lankan apparel manufacturer founded in 1987 and a major player in the global apparel supply chain, has reportedly experienced a “Massive Data Breach”.19 A compromise of this scale could expose sensitive intellectual property related to designs and manufacturing processes, critical supply chain logistics, and extensive employee or customer data. Such a breach carries significant risks of competitive theft, supply chain disruption, and substantial financial and reputational losses. The sinister.ly link detailing this incident is currently inaccessible.5

2.6. Incident 6: Kakatiya University Data Leak

Kakatiya University, a public university in Warangal, Telangana, India, established in 1976 with a large student body and an “A+” Grade accreditation, has reportedly suffered a data leak.21 As a major educational institution, the leak likely involves extensive student and faculty data, including PII and academic records, and potentially research data. This incident poses risks of identity theft, targeted scams against the university community, and potential disruption to academic operations. The darkforums.st link associated with this leak is currently inaccessible.6

2.7. Incident 7: Manhattan Parking Group Data Breach

The Manhattan Parking Group (MPG), a privately owned and operated leader in parking services across New York City for over 60 years, has reportedly experienced a data breach.23 MPG manages over 100 facilities and 20,000 parking spaces, serving diverse clients including real estate developers, luxury hotels, and hospitals. A data compromise could expose customer payment information, vehicle details, reservation data, and employee PII. Given their client base, there is a potential, though unconfirmed, risk of exposure of healthcare-related PII if integrated systems were affected. The darkforums.st link detailing this incident is currently inaccessible.7

2.8. Incident 8: FREIGHT LOGISTICS SERVICES USA Data Breach

FREIGHT LOGISTICS SERVICES USA, a full-service logistics provider based in Humble, Texas, with over 30 years of industry experience, has reportedly suffered a data breach.25 This organization is a crucial link in the supply chain, handling diverse cargo through air freight, sea freight, project cargo, trucking, and warehousing. A data breach could expose sensitive shipping manifests, client contracts, intellectual property related to logistics operations, and supply chain vulnerabilities. Such information can be leveraged by competitors, criminals for illicit trade, or nation-states for economic espionage. The xss.is link detailing this incident is currently inaccessible.8

2.9. Incident 9: Canadian Tax Company Data Leak

An unidentified Canadian Tax Company has reportedly experienced a data leak. As a financial services entity handling tax-related information, this incident is particularly severe. It is highly probable that the leak involves detailed financial records, Social Insurance Numbers (SINs), addresses, income details, and other PII, which are prime materials for identity theft, tax fraud, and sophisticated financial scams. The xss.is link associated with this leak is currently inaccessible.9

2.10. Incident 10: Unidentified Organization in California Data Leak

An unspecified organization located in California has reportedly suffered a data leak. While details are scarce due to the inaccessibility of the source link 10, any data leak from a California-based entity carries significant regulatory and reputational consequences, given the state’s large population and stringent privacy laws such as the CCPA. The xss.is link detailing this incident is currently inaccessible.10

2.11. Incident 11: Casino Malta Data Leak

Casino Malta, the largest casino in Malta and part of the Olympic Entertainment Group, has reportedly experienced a data leak.27 Malta is a significant global gaming hub, and operations within this highly regulated industry involve large volumes of financial transactions and sensitive customer data.29 A data leak from a casino is highly likely to expose customer financial data (e.g., credit card details, transaction history), PII (names, addresses, IDs), and potentially sensitive gambling habits. This information is highly valuable for financial fraud, blackmail, and targeted scams. The xss.is link detailing this incident is currently inaccessible.11

2.12. Incident 12: KYC Data Sale

Reports indicate the sale of 70,000 Know Your Customer (KYC) records originating from India, USA, and the EU, including photo IDs and selfies.12 The source organization(s) for this data remain unidentified. KYC data is critical for financial institutions, cryptocurrency exchanges, and other regulated entities to verify customer identities and prevent illicit activities. The sale of such comprehensive and sensitive identity verification data represents an extremely high-risk breach, enabling sophisticated account takeovers, loan fraud, and the bypassing of security checks across various online services. The broad geographical scope of the compromised data indicates a widespread threat. The darkforums.st link advertising this sale is currently inaccessible.12

Understanding the adversaries is paramount for effective defense. The diverse motivations observed among threat actors—ranging from pure financial gain to geopolitical objectives and ideological hacktivism—necessitate a multi-faceted and adaptable defense strategy. This variation means that a financially motivated group might be deterred by robust financial controls, while a nation-state actor, often highly skilled and persistent, requires advanced threat hunting capabilities. Hacktivists, on the other hand, might prioritize disruption or public embarrassment, demanding different response strategies. The following profiles detail some of the prominent actors identified in recent cybersecurity intelligence.

Threat Actor Name (Aliases)Primary MotivationKey Tactics, Techniques, and Procedures (TTPs)Notable Targets/ActivitiesCurrent Status
Night Sky RansomwareFinancial gain (multi-extortion)Malicious emails/websites, Cobalt Strike, Log4Shell exploitation, file encryption, data exfiltrationCorporate networks (indiscriminate)Active
Armageddon (Gamaredon)Cyberespionage, political/nationalisticPhishing (emails, SMS, Telegram), USB infection, GammaSteel malware, Telegram for C2Ukrainian government, security/defense services, information infrastructureActive
“Unsophisticated Cyber Actor(s)”Disruption, defacement, operational impact (implied political/retaliatory)Basic intrusion techniques, exploiting poor cyber hygiene (default passwords), exposed assets, reconnaissance-as-a-serviceUS critical infrastructure (Oil & Gas, Energy, Transportation Systems), ICS/SCADA technologyActive
Threat Actor 888 (888 Group)Financial gain (data breaches/sales)Breaching company databases, data leakingMicrosoft, BMW (Hong Kong), Kintetsu World Express, Shopify, DecathlonActive
Octo Tempest (Potentially related to “Okto Dark Cyber Squad”)Financial gain (ransomware, data exfiltration)Sophisticated social engineeringOrganizations susceptible to social engineering, aiming for ransomware deployment and data exfiltrationActive
ShinyHunters & IntelBrokerFinancial gain (data breaches, dark web forum operation)Data breaches, operating cybercrime forums, exploiting vulnerabilities (PHP zero-day)BreachForums users/infrastructure, numerous organizations via data leaksActive (ShinyHunters), Status unclear (IntelBroker)
Dark Storm TeamIdeological/Political (pro-Palestinian hacktivism)Distributed Denial-of-Service (DDoS) attacks, claims via TelegramBreachForums, X (Twitter), Hungarian Defense Ministry, Finnish Central BankActive
DarkSide RansomwareFinancial gain (ransomware, data extortion)Ransomware deployment, data exfiltrationGuess, Colonial PipelineDisbanded (but data exfiltrated remains a threat)
FIN9Financial gainPhishing campaigns, supply chain compromises, gift card/PII/credit card theft, cryptocurrency launderingUS companies (various sectors)Active (indicted)

3.1. Night Sky Ransomware

Night Sky is a China-based ransomware actor that emerged in late 2021, operating as a Ransomware-as-a-Service (RaaS).31 This RaaS model implies a network of affiliates, allowing for broader reach and impact. Their primary motivation is financial gain through multi-extortion, demanding payment for both decryption tools and the non-release of stolen data.31

Night Sky typically gains initial access through malicious emails containing attachments, links, or JavaScript code, or via malicious websites.31 More sophisticated infiltration methods observed include the exploitation of Log4Shell vulnerabilities and the use of Cobalt Strike.31 Once inside a network, they rapidly encrypt a wide array of files, including work reports, photos, and project notes, often appending new extensions to the locked files. Night Sky remains an active threat in 2025, continuously adapting its methods to evade new security patches and detection.31 Organizations are advised to prioritize patching against known vulnerabilities, implement robust email and web filtering, and conduct regular security awareness training to counter phishing attempts.

3.2. Armageddon / Gamaredon

Armageddon, also known as Gamaredon, is a Russian state-sponsored hacking group reportedly operating from the Russian-annexed Ukrainian Crimean peninsula.32 This group is believed to act on orders from Russia’s Federal Security Service (FSB), indicating a clear nation-state nexus and a motivation rooted in political and nationalistic objectives, primarily cyberespionage against Ukrainian security and defense services.32 They have also been linked to destructive cyberattacks against information infrastructure facilities, demonstrating a dual capability for intelligence gathering and disruption.

The group is characterized by its high activity, described as “bombarding Ukraine” with continuous waves of campaigns, prioritizing persistence over sheer technical sophistication.32 Their primary method for initial access involves phishing emails or text messages, often sent from previously compromised Telegram, WhatsApp, and Signal accounts.32 They also employ a USB infection technique to spread malware laterally within networks. Armageddon utilizes custom-made information stealer implants, such as GammaSteel, to exfiltrate specific file types, steal user credentials, and capture screenshots.32 A key tactical advantage for this group is their frequent use of Telegram for Command and Control (C2) and data exfiltration. Communicating through legitimate platforms like Telegram helps them “fly under the radar,” making their malicious communications harder for defenders to spot.32 Their focus on espionage differentiates them from other state-sponsored Russian groups like Sandworm, which are more focused on sabotage.32

3.3. “Unsophisticated Cyber Actor(s)”

This category refers to unnamed cyber actors employing “basic and elementary intrusion techniques”.33 While the specific origin is often unspecified, the context of recent advisories points to actors, potentially hacktivists or state-aligned groups, targeting critical infrastructure. For instance, Iranian actors have been observed targeting water utilities in response to geopolitical conflicts, often by exploiting devices with default passwords.33

Their motivations typically involve disruption, defacement, configuration changes, or causing more severe operational impacts. These actors capitalize on “poor cyber hygiene” and “exposed assets,” such as systems still using default passwords.33 They may also leverage “reconnaissance-as-a-service” to map out Operational Technology (OT) networks before deploying payloads. The continued success of these “unsophisticated” attacks highlights a critical vulnerability: even low-skilled attackers can cause significant damage when fundamental security weaknesses are present, reinforcing the importance of basic cybersecurity practices.

3.4. Threat Actor 888

Threat Actor 888, also known as the 888 Group, has been active in 2024, primarily motivated by financial gain through data breaches and subsequent data leaks or sales.34 While specific attack methods are not detailed in the available intelligence, their operations have been effective enough to compromise significant entities across various sectors.

Notable targets include Microsoft, BMW (Hong Kong), and other companies in the tech, freight, and oil & gas industries.34 They also claimed responsibility for breaching data from hundreds of clients of Kintetsu World Express (KWE), a major Japanese logistics provider, in April 2024.35 Additionally, the group has been associated with alleged data leaks from Shopify and Decathlon.34 Their activities underscore the persistent threat of financially motivated groups targeting diverse corporate entities for data monetization.

3.5. Octo Tempest

Octo Tempest is a significant threat actor tracked by Microsoft, known for sophisticated social engineering tactics.36 While their specific origin and broader affiliations are not detailed in the provided intelligence, their operations are clearly aimed at financial gain, as they are associated with ransomware deployment and the exfiltration of sensitive information.36

Their primary modus operandi involves social engineering to achieve “actions on objectives,” such as deploying ransomware and exfiltrating sensitive data. The discussion of “Octo Dark Cyber Squad” as a Telegram channel 37 suggests a potential, though unconfirmed, connection to broader cybercriminal communication networks. The group’s focus on social engineering highlights the critical need for robust security awareness training and multi-factor authentication to protect against credential compromise, especially for privileged accounts.36

3.6. ShinyHunters & IntelBroker

ShinyHunters is an English-speaking threat collective that has been operational in Deep/Dark Web (DDW) forums since approximately 2020, responsible for numerous data breaches.38 The group has been widely viewed as the owner of BreachForums, a prominent cybercrime marketplace, since March 2023.38 IntelBroker is a notorious threat actor known for publishing numerous data leaks and previously held a moderator role within BreachForums.39 Both actors are primarily motivated by financial gain through data breaches and the operation of platforms for selling stolen data.38

These actors are central figures in the operation and recent disruptions of BreachForums, a key platform for data leaks and cybercriminal coordination.38 ShinyHunters claimed a PHP vulnerability (a zero-day affecting MyBB software) caused the disruption of BreachForums in April 2025 and subsequently announced its relaunch.38 During the outage, many users migrated to peer domains like DarkForums, and opportunistic actors exploited the confusion by advertising fake “new domain” registrations to scam users for cryptocurrency.39 The continuous cycle of disruption and re-emergence involving these actors highlights the resilience of cybercriminal networks but also their vulnerability to external pressures.

3.7. Dark Storm Team

Dark Storm Team is identified as a pro-Palestinian hacktivist group.39 Their motivations are ideological and political, aiming to spread their message, raise awareness, or embarrass targets through disruptive cyber activities.41 Their primary tactic involves Distributed Denial-of-Service (DDoS) attacks, and they typically claim responsibility for their actions via Telegram channels.39

The group claimed DDoS attacks against BreachForums, the cybercrime marketplace, as well as against social media platform X (formerly Twitter), the Hungarian Defense Ministry, and the Finnish Central Bank.40 This demonstrates their willingness to target a wide range of entities to further their cause, highlighting the impact that ideologically motivated groups can have on both private and public sector operations.

3.8. DarkSide Ransomware

DarkSide was a ransomware group that gained significant notoriety for high-profile attacks.42 While the group formally ceased operations in May 2021 following its attack on Colonial Pipeline, which drew significant international condemnation and increased law enforcement scrutiny, the impact of their past activities continues to be felt.42 Their motivation was financial gain through ransomware deployment and data extortion, often engaging in “big game hunting” against large enterprises.42

DarkSide employed a double-extortion tactic, encrypting systems and exfiltrating large volumes of data. For instance, they boasted about stealing 200 GB of data from the fashion brand Guess.42 The attack on Guess resulted in the breach of sensitive employee data, including Social Security numbers, driver’s license numbers, passport numbers, and financial account numbers.42 The long-term implications of such data exfiltration persist even after a group disbands, as the stolen data can be used for identity theft and fraud for years to come.

3.9. FIN9

FIN9 refers to a group of Vietnamese hackers, including Ta Van Tai (aka Quynh Hoa, Bich Thuy), Nguyen Viet Quoc (aka Tien Nguyen), Nguyen Trang Xuyen, and Nguyen Van Truong (aka Chung Nguyen), who were recently indicted by the U.S. Department of Justice.44 Their primary motivation is financial gain, achieved through cyber attacks aimed at stealing non-public information, employee benefits, and funds.44

This group’s tactics include phishing campaigns and supply chain compromises to gain initial access to target networks.44 Once access is established, they steal sensitive data such as gift card information, PII, and credit card details from employees and customers. To evade detection and launder their illicit gains, they utilized stolen information to open online accounts at cryptocurrency exchanges and set up hosting servers. They also sold stolen gift cards to third parties, including via peer-to-peer cryptocurrency marketplaces, to conceal the source of the stolen money.44 Their activities targeted computer networks of victim companies throughout the United States from at least May 2018 through October 2021.44

4. Affected Industries & Organizations: Contextual Analysis

The wide range of industries affected by recent cyber incidents—including entertainment, business services, education, manufacturing, logistics, financial services, and even government/military—underscores a critical reality: no sector is immune to cyberattacks. This broad targeting indicates that threat actors are either highly adaptable with diverse capabilities, or they are opportunistic, exploiting common vulnerabilities wherever they are found.33 The value of compromised data, whether PII, financial details, or intellectual property, transcends specific industry boundaries, as it can be monetized in various ways. This necessitates that organizations, regardless of their industry, assume they are potential targets and implement robust, cross-industry security measures.

4.1. JKT48

JKT48 (PT Indonesia Musik Nusantara) is an Indonesian-Japanese idol girl group based in Jakarta, founded in 2011 and currently owned by IDN.13 As a prominent entertainment entity with a large and engaged fan base, the group is a significant target for data related to its members and extensive fan interactions. The reported “Full Database” leak includes Gmail accounts, National Identity Numbers (NIK), contact numbers (CP), and “Oshimen HQ Verified” data.1 This constitutes highly sensitive PII, which could lead to widespread identity theft, targeted phishing campaigns against fans and members, and significant reputational damage for the group and its management.

4.2. First Choice Business Brokers

First Choice Business Brokers positions itself as “The World’s Authority in Business Sales,” operating a national network specializing in business brokerage, mergers, and acquisitions, with offices in locations such as Las Vegas, NV, and Riverside, CA.15 This firm handles confidential and high-value transactions for businesses of all sizes. A data breach affecting such an entity could expose highly sensitive financial data, proprietary business information, client lists, details of deal negotiations, and the PII of business owners and buyers.15 This information is invaluable for corporate espionage, competitive disadvantage, and significant financial fraud, impacting the integrity of business transactions.

4.3. Instituto Técnico Boliviano Suizo (TBS)

The Instituto Técnico Boliviano Suizo (TBS) is a private technical university in Bolivia with campuses in major cities like La Paz and Potosí.17 It is known for its practical, dual-training methodology, making it a key educational institution contributing to human resource development in the nation. The reported leak of its “Full Academic Database,” comprising 12,000 records 4, likely contains student and staff Personally Identifiable Information (PII), academic performance data, and other sensitive educational records. The exposure of this data could lead to identity theft, credential stuffing attacks targeting individuals, and significant reputational damage for the institution.

4.4. MAS Holdings

MAS Holdings is a leading Sri Lankan apparel manufacturer, founded in 1987, providing concept-to-delivery solutions for various apparel categories.19 As a major player in the global apparel supply chain, a “Massive Data Breach” at MAS Holdings 5 could expose sensitive intellectual property, including designs and manufacturing processes, along with critical supply chain logistics and extensive employee or customer data. Such a breach could result in competitive theft, disruption to global supply chains, and substantial financial and reputational losses for the company.

4.5. Kakatiya University

Kakatiya University, a public university in Warangal, Telangana, India, established in 1976, is a large institution with over 90,000 undergraduate students and an “A+” Grade accreditation.21 As a major educational institution, a reported data leak from the university 6 likely involves extensive student and faculty data, including PII and academic records. This incident poses significant risks of identity theft, targeted scams against the university community, and potential disruption to academic operations and trust in the institution’s data security.

4.6. Manhattan Parking Group (MPG)

Manhattan Parking Group (MPG) is a privately owned and operated leader in parking services in New York City, managing over 100 facilities and 20,000 spaces across several boroughs.23 Their diverse client base includes real estate developers, luxury hotels, and hospitals. A data breach affecting MPG 7 could expose customer payment information, vehicle details, reservation data, and employee PII. Given their operations with hospitals, there is a potential, though not confirmed by the provided information, for exposure of healthcare-related PII if integrated systems were affected. This could lead to financial fraud and privacy violations for a large number of individuals.

4.7. FREIGHT LOGISTICS SERVICES USA

FREIGHT LOGISTICS SERVICES USA, a full-service logistics provider based in Humble, Texas, with over 30 years of industry experience, is a crucial link in the supply chain.25 A data breach impacting this organization 8 could expose sensitive shipping manifests, client contracts, intellectual property related to logistics operations, and critical supply chain vulnerabilities. Such information can be leveraged by competitors, criminals for illicit trade, or even nation-states for economic espionage, potentially disrupting trade and supply networks.

4.8. Canadian Tax Company

An unidentified Canadian Tax Company has reportedly suffered a data leak. This incident is particularly severe due to the highly sensitive nature of the data handled by tax companies. It is highly probable that the leak involves detailed financial records, Social Insurance Numbers (SINs), addresses, income details, and other PII.9 This type of data is extremely valuable for identity theft, tax fraud, and sophisticated financial scams, posing long-term risks to affected individuals.

4.9. Unidentified Organization in California

A data leak has been reported from an unspecified organization located in California.10 While specific details about the organization or the data compromised are unavailable, any significant breach from a California-based entity carries substantial regulatory and reputational consequences. California’s large population and stringent privacy laws, such as the CCPA, mean that a breach could impact a significant number of individuals and result in considerable legal and financial penalties.

4.10. Casino Malta

Casino Malta, located in St. Julian’s, is the largest casino in Malta and part of the Olympic Entertainment Group, a leading gaming services provider.27 Malta is a significant global gaming hub, and the gaming industry handles vast volumes of financial transactions and sensitive customer data.29 A data leak from Casino Malta 11 is highly likely to expose customer financial data (e.g., credit card details, transaction history), PII (names, addresses, IDs), and potentially sensitive gambling habits. This information is highly valuable for financial fraud, blackmail, and targeted scams, posing significant risks to customer trust and regulatory compliance.

4.11. KYC Data Sale

The reported sale of 70,000 Know Your Customer (KYC) records from India, USA, and the EU, including photo IDs and selfies 12, represents an extremely high-risk breach. While the source organization(s) remain unidentified, KYC data is crucial for financial institutions, cryptocurrency exchanges, and other regulated entities to verify customer identities and prevent illicit activities. This data is the “gold standard” for identity theft, enabling sophisticated account takeovers, loan fraud, and bypassing security checks across various online services. The broad geographical scope of the compromised data indicates a widespread threat to identity security across multiple regions. The consistent targeting and sale of Personally Identifiable Information (PII), financial data, and highly sensitive KYC data highlights data monetization as a primary driver for many cybercriminal operations, fueling a thriving underground economy.45

Organization NamePrimary IndustryCountry/RegionType of Data CompromisedPotential Impact
JKT48Music & EntertainmentIndonesia/JapanPII (Gmail, NIK, CP, Oshimen)Identity Theft, Targeted Phishing, Reputational Damage
Iranian Military (implied)Government/DefenseIranMilitary Database (details unspecified)National Security Implications, Espionage
First Choice Business BrokersBusiness BrokerageUSAFinancial Records, Client Lists, Deal Terms, PIICorporate Espionage, Financial Fraud, Competitive Disadvantage
Instituto Técnico Boliviano Suizo (TBS)EducationBoliviaAcademic Database (PII, academic records)Identity Theft, Credential Stuffing, Reputational Damage
MAS HoldingsApparel & Textile ManufacturingSri LankaIntellectual Property, Supply Chain Logistics, Employee/Customer DataCompetitive Theft, Supply Chain Disruption, Financial/Reputational Loss
Kakatiya UniversityEducationIndiaStudent/Faculty PII, Academic RecordsIdentity Theft, Targeted Scams, Operational Disruption
Manhattan Parking Group (MPG)Parking ServicesUSACustomer Payment Info, Reservation Details, Employee PIIFinancial Fraud, Privacy Violations
FREIGHT LOGISTICS SERVICES USALogistics & Freight ForwardingUSAShipping Manifests, Client Contracts, Supply Chain VulnerabilitiesCorporate Espionage, Illicit Trade, Supply Chain Disruption
Canadian Tax CompanyFinancial Services (Tax)CanadaSensitive Financial/Personal Tax DataIdentity Theft, Tax Fraud, Financial Scams
Unidentified Organization in CaliforniaUnspecifiedUSAUnspecified DataRegulatory Penalties, Reputational Damage
Casino MaltaGaming ServicesMaltaCustomer Financial Data, PII, Gambling HabitsFinancial Fraud, Blackmail, Privacy Violations
Unidentified source of KYC dataCross-industryIndia/USA/EU70K KYC records (Photo ID, Selfie)Widespread Identity Theft, Account Takeovers, Financial Fraud

5. Dark Web & Cybercrime Ecosystem Insights

The dark web continues to serve as a clandestine marketplace, facilitating a wide array of illicit activities that directly impact cybersecurity. These hidden online markets, accessible through anonymized networks like Tor, are hubs for the trade of stolen data, malware-as-a-service (MaaS), exploit kits, counterfeit documents, and even serve as recruitment grounds for cybercriminal organizations.45

5.1. The Role of Dark Web Marketplaces

Cybercriminals leverage these platforms to sell data obtained from breaches, including credit card details (CVVs), bank account logins, stealer logs, and Personally Identifiable Information (PII).46 This readily available data fuels credential stuffing, phishing, and account takeover attacks. Beyond data, MaaS and exploit kits are widely available, enabling even less-skilled attackers to launch sophisticated cyberattacks.46 Dark web forums also serve as critical venues for discussions about system vulnerabilities and the trading of exploits, fostering collaboration among malicious actors.46 Prominent examples of active markets include Abacus Market, Russian Market, BriansClub, Exodus Marketplace, Torzon Market, FreshTools, and BidenCash, each specializing in various illicit items.47 Despite the resilience of these markets, law enforcement agencies, such as Europol, actively work to dismantle them, as demonstrated by the recent takedown of ‘Archetyp Market,’ a major dark web drug hub, which involved seizing infrastructure and making arrests.45

5.2. BreachForums and DarkForums: A Case Study in Instability

The recent disruptions experienced by BreachForums, a popular deep web hacking forum, illustrate the continuous cat-and-mouse game between law enforcement and cybercriminals, leading to persistent instability and adaptation within the cybercrime ecosystem.38 On April 15, 2025, BreachForums became inaccessible, with its domain displaying an error.39 Conflicting claims emerged regarding the cause: the pro-Palestinian hacktivist group Dark Storm claimed responsibility via DDoS attacks 39, while speculation also pointed to law enforcement involvement, including alleged arrests of prominent actors like “IntelBroker”.39

Despite the disruption, actor “ShinyHunters,” known for data breaches and as the owner of BreachForums since 2023, announced a relaunch of the forum via new clearnet and onion domains.38 ShinyHunters attributed the previous disruption to a PHP vulnerability.38 During the outage, many users migrated to peer domains like DarkForums.38 This period of confusion was also exploited by opportunistic, financially motivated threat actors who advertised fake “new domain” registrations to scam users for cryptocurrency.39 This cycle of takedown and re-establishment demonstrates the inherent resilience of the cybercrime underground; while law enforcement actions create temporary vacuums, the demand for illicit services quickly leads to new solutions, making continuous monitoring of new platforms crucial for threat intelligence.

5.3. Shift to Encrypted Messaging Platforms

A significant tactical adaptation observed among threat actors is their increasing reliance on encrypted messaging platforms like Telegram for Command and Control (C2) and coordination.32 Groups like Armageddon actively use Telegram to send instructions to compromised devices and receive exfiltrated information.32 The presence of numerous CTI Telegram Threat Actor Channels further confirms this trend.37

This shift presents a considerable challenge for defenders. Unlike dedicated dark web forums, Telegram is a widely used, legitimate communication platform. This makes it significantly harder for network defenders to distinguish malicious traffic from legitimate traffic, and for law enforcement to monitor communications without substantial legal hurdles. The ability to “fly under the radar” by using legitimate servers provides a direct tactical advantage for malicious entities.32 This development necessitates that threat intelligence efforts adapt, focusing on different collection methods, such as open-source intelligence on public channels, and advanced behavioral analytics to detect suspicious patterns within seemingly legitimate traffic.

Marketplace/Forum NamePrimary Focus/PurposeKey Actors/OperatorsRecent Activity/StatusNoteworthy Events
Darkforums.stData leaks, illicit goods/servicesVarious (e.g., threat actors selling data)Active, but specific incident links inaccessibleHosting various data breaches, potential migration from other disrupted forums
XSS.isHacking forum, data leaksVarious (e.g., threat actors selling data)Active, but specific incident links inaccessibleHosting various data breaches
Sinister.lyData leaks, illicit goods/servicesVarious (e.g., threat actors selling data)Active, but specific incident links inaccessibleHosting various data breaches
BreachForumsHacking forum, data leaksShinyHunters, IntelBrokerDisrupted (April 2025), purportedly relaunchedDDoS attacks by Dark Storm, alleged LE takedown, ShinyHunters relaunch
Archetyp MarketDrug trafficking, illicit goodsUnidentified administrator (arrested)Dismantled (Europol operation Deep Sentinel)Major drug marketplace takedown, €250M transactions, 600k users
Abacus MarketDrugs, counterfeit documents, stolen credit cards, hacking toolsUnidentifiedActiveMajor English-language dark web market, 40k+ listings
Russian MarketStolen credit cards, PII, SSH credentialsUnidentifiedActiveFocus on stolen credit card data, promotional data dumps
Torzon MarketNarcotics, fraud tools, hacking software, counterfeit documentsUnidentifiedActiveOver 20k listings, Tor network exclusive
BidenCashStolen credit card data, PII, SSH credentialsUnidentifiedActiveGained attention through promotional data dumps

6. Mitigation & Defensive Recommendations

The consistent recurrence of basic attack vectors like phishing and the exploitation of poor cyber hygiene across various threat actors, including Night Sky, Armageddon, and “unsophisticated actors,” indicates that fundamental security practices remain critically important, even amidst the rise of sophisticated threats.31 Despite discussions of nation-state actors and advanced Ransomware-as-a-Service operations, these basic vulnerabilities continue to be highly effective entry points. This means that organizations, regardless of their perceived threat level, must prioritize and rigorously enforce foundational security controls.

The increasing complexity of the cyber landscape and the growing capabilities of cybercriminals necessitate a strategic shift from purely reactive security postures to proactive, intelligence-driven defense mechanisms.52 Simply reacting to alerts or breaches is no longer sufficient. Organizations must actively seek out threats, leverage threat intelligence to anticipate attacks, and continuously adapt their defenses. This requires not just technological investment but also skilled human expertise and a culture of continuous improvement, moving towards a more resilient and anticipatory security posture.54

Strategy CategorySpecific Action/RecommendationRationale/BenefitRelevant Threat Actors/Incidents Addressed
Foundational Cybersecurity HygieneEmployee Education & AwarenessReduces human error, improves identification of phishing/social engineeringNight Sky, Armageddon, FIN9, general cybercrime 31
Strong Password Policies & Multi-Factor Authentication (MFA)Reduces credential compromise, enhances protection for privileged accountsNight Sky, FIN9, general cybercriminals 31
Regular System Updates & Patch ManagementCloses known vulnerabilities, reduces attack surfaceNight Sky (Log4Shell), “Unsophisticated Actors,” general exploitation 31
Anti-Malware & Endpoint Detection and Response (EDR) SolutionsDetects/blocks malware, provides real-time protectionNight Sky, DarkSide, general malware threats 31
Proactive Threat Detection & ResponseNetwork Monitoring & IoC DetectionEarly detection of anomalous activity, identifies C2 communicationsNight Sky, Armageddon, general advanced threats 31
Threat HuntingProactively seeks out hidden threats, reduces dwell timeAll threat actors, especially persistent ones 49
Zero Trust ArchitectureLimits lateral movement, minimizes breach impactAll threat actors, especially those targeting privileged access 36
Data Protection & Incident PreparednessData Backup & Disaster RecoveryEnsures business continuity, facilitates data recovery from ransomware/breachesNight Sky, DarkSide, general data loss incidents 31
Input Validation & Output Encoding for Web ApplicationsPrevents injection attacks like XSS, protects user accounts/dataThreats exploiting web application vulnerabilities 56
Dark Web MonitoringDetects exposed credentials/data, enables rapid response to data leaksThreat Actor 888, ShinyHunters, IntelBroker, KYC data sales 46
Comprehensive Incident Response PlanEnsures organized, effective response to minimize damageAll cyberattacks 53
Reporting CybercrimeReport to Internet Crime Complaint Center (IC3) / FBIAids investigations, supports fund recovery, contributes to intelligenceAll cyber-enabled crimes/national security threats 51

6.1. Foundational Cybersecurity Hygiene: The First Line of Defense

Fundamental security practices remain the cornerstone of any robust defense. Employee education and awareness are paramount, as human error is a significant factor in breaches, particularly through phishing and social engineering.49 Regular, comprehensive cybersecurity training can equip employees to identify and report suspicious activities, thereby reducing the attack surface.

Enforcing strong, unique passwords for all accounts and mandating Multi-Factor Authentication (MFA) wherever possible, especially for privileged accounts, is critical.31 MFA significantly reduces the risk of credential compromise, making brute-force attacks and phishing less effective, especially since privileged accounts are prime targets for adversaries.50

A rigorous patching schedule for all software, operating systems, and network devices is essential.31 Threat actors frequently exploit known vulnerabilities in unpatched software, as seen with Log4Shell exploitation by Night Sky or “unsophisticated” actors exploiting exposed assets.31 Prompt patching closes these common entry points. Finally, deploying robust anti-malware software and Endpoint Detection and Response (EDR) solutions across all endpoints is vital.31 These tools detect and block known ransomware variants and other malicious software, providing real-time protection against evolving threats.

6.2. Proactive Threat Detection & Response

Beyond foundational hygiene, a proactive approach to security is increasingly necessary. Continuous monitoring of network traffic for unusual patterns or communication with known Command and Control (C2) servers is crucial for early detection of anomalous activity, which can help identify and contain breaches before significant damage occurs.31

Adopting a human-powered, proactive approach to threat hunting involves actively seeking out, investigating, and neutralizing malware and unusual activity within the network.49 This moves beyond reactive defenses, significantly reducing dwell time and minimizing impact. Furthermore, implementing Zero Trust principles, including least privilege access, continuous verification, and micro-segmentation, is vital.36 This architecture minimizes the impact of a successful breach by limiting lateral movement and access to critical assets, even if initial access is gained.50

6.3. Data Protection & Incident Preparedness

Robust data protection and comprehensive incident preparedness are indispensable. Regularly backing up critical data to isolated, immutable storage locations and establishing a comprehensive disaster recovery plan is crucial for mitigating the effects of ransomware attacks and data breaches, ensuring business continuity and data recovery.31

For web applications, rigorously validating all user input and properly encoding all output to the browser is essential.56 These practices prevent Cross-Site Scripting (XSS) attacks, which can lead to account hijacking, data theft, and remote browser control.57 Utilizing dark web monitoring tools to continuously scan for mentions of the organization’s name, domain, or other predefined keywords, as well as exposed credentials, is also critical.46 Proactive monitoring helps detect potential security incidents or data breaches as soon as they appear on the dark web, allowing for rapid response and mitigation of credential-based attacks.

Finally, developing, regularly testing, and refining a comprehensive incident response plan is paramount.53 This plan should include clear processes for reporting incidents, containing breaches, and communicating with stakeholders and law enforcement, ensuring an organized and effective response to cyberattacks, minimizing damage, and facilitating recovery.

6.4. Reporting Cybercrime

Victims of cyber-enabled crime or fraud are strongly encouraged to file a report with the Internet Crime Complaint Center (IC3) as soon as possible.51 For ongoing crimes, threats to life, or national security threats, contacting the local FBI field office is advised.51 Rapid reporting aids investigations, supports fund recovery, and contributes to broader intelligence efforts against cybercriminals, helping to build a more comprehensive picture of the threat landscape.

7. Conclusion

The cybersecurity landscape remains exceptionally dynamic, as evidenced by the diverse array of incidents over the past 24 hours, impacting sectors from entertainment and education to critical infrastructure and financial services. This report highlights the persistent threat of data breaches, driven by a spectrum of motivations ranging from pure financial gain by groups like Night Sky and FIN9, to geopolitical objectives pursued by nation-state actors such as Armageddon, and ideological hacktivism demonstrated by Dark Storm Team.

A significant observation is the instability within the cybercrime ecosystem, particularly the repeated disruption and re-emergence of major dark web forums like BreachForums. This ongoing struggle between law enforcement and cybercriminals, while creating temporary hindrances for illicit activities, also drives malicious actors to adapt, seeking new, often more clandestine, operational methods, such as increased reliance on encrypted messaging platforms like Telegram for Command and Control. This adaptation poses new challenges for threat intelligence and defensive operations, as adversaries become harder to track.

Despite the increasing sophistication of some threats, the continued success of basic attack vectors like phishing and the exploitation of fundamental cyber hygiene failures underscore a critical vulnerability across all organizations. This reinforces that foundational security practices are not merely checkboxes but essential defenses that, when neglected, can be exploited by both highly skilled and “unsophisticated” actors alike.

In this complex and interconnected world, organizations must adopt a multi-layered, intelligence-driven, and adaptive cybersecurity strategy. This includes not only robust technical controls, such as strong authentication and continuous patching, but also an unwavering commitment to continuous employee education, proactive threat hunting, and well-rehearsed incident response capabilities. Continuous vigilance, strategic investment in both technology and human expertise, and collaborative information sharing are imperative to safeguard digital assets and maintain resilience against an ever-evolving threat landscape.

Works cited

  1. accessed January 1, 1970, https://darkforums.st/Thread-Full-Database-JKT48-com-10M-Gmail-NIK-CP-Oshimen-HQ-Verified-%F0%9F%87%AE%F0%9F%87%A9
  2. accessed January 1, 1970, https://darkforums.st/Thread-Selling-Iran-military-DB
  3. accessed January 1, 1970, https://xss.is/threads/140231/
  4. accessed January 1, 1970, https://darkforums.st/Thread-Instituto-T%C3%A9cnico-Boliviano-Suizo-%E2%80%93-TBS-Bolivia-Full-Academic-Database-12k
  5. accessed January 1, 1970, https://sinister.ly/Thread-Leak-Massive-Data-Breach-at-Sri-Lanka-s-Largest-Apparel-Manufacturer
  6. accessed January 1, 1970, https://darkforums.st/Thread-LEAKED-KUCOLLEGES-CO-IN
  7. accessed January 1, 1970, https://darkforums.st/Thread-Manhattan-Parking-Group-Data-Breach-Leaked-Download
  8. accessed January 1, 1970, https://xss.is/threads/140218/
  9. accessed January 1, 1970, https://xss.is/threads/140221/
  10. accessed January 1, 1970, https://xss.is/threads/140217/
  11. accessed January 1, 1970, https://xss.is/threads/140220/
  12. accessed January 1, 1970, https://darkforums.st/Thread-Selling-70K-INDIA-USA-EU-KYCs-for-sale-PHOTO-ID-SELFIE–14076
  13. en.wikipedia.org, accessed June 20, 2025, https://en.wikipedia.org/wiki/JKT48#:~:text=PT%20Indonesia%20Musik%20Nusantara%20(JKT48,from%20Superball%20(a%20subsidiary%20of
  14. JKT48 – Wikipedia, accessed June 20, 2025, https://en.wikipedia.org/wiki/JKT48
  15. First Choice Business Brokers | Buy or Sell a Business, accessed June 20, 2025, https://fcbb.com/
  16. First Choice Business Brokers Riverside, accessed June 20, 2025, https://riverside.fcbb.com/
  17. Quienes somos – Instituto Técnico Boliviano Suizo – TBS, accessed June 20, 2025, https://tbs.edu.bo/quienes-somos/
  18. Instituto Técnico Boliviano Suizo – TBS – Carreras universitarias y universidades online en Bolivia, accessed June 20, 2025, https://www.universidadesonline.com.bo/universidades/instituto-tecnico-boliviano-suizo
  19. tracxn.com, accessed June 20, 2025, https://tracxn.com/d/companies/mas-holdings/__oY7eLpnO4DDx3ginFkD5FgWo8w9s-y3j2pvFNv08rLU#:~:text=MAS%20Holdings%20company%20profile&text=MAS%20Holdings%20is%20an%20unfunded,not%20raised%20any%20funding%20yet.
  20. MAS Holdings – Wikipedia, accessed June 20, 2025, https://en.wikipedia.org/wiki/MAS_Holdings
  21. Kakatiya University Admission, Courses Offered, Fees, Ranking, Campus Placement, accessed June 20, 2025, https://www.aajtakcampus.in/college/kakatiya-university
  22. Kakatiya University – Wikipedia, accessed June 20, 2025, https://en.wikipedia.org/wiki/Kakatiya_University
  23. About – MPG Parking, accessed June 20, 2025, https://mpgparking.com/about
  24. New York City Parking – Manhattan Parking Group, accessed June 20, 2025, https://mpgparking.com/
  25. leadiq.com, accessed June 20, 2025, https://leadiq.com/c/freight-logistics-services-usa/5a1dacf02300005b00a2811e#:~:text=Freight%20Logistics%20Services%20USA%20is,a%20world%20of%20logistics%20providers.
  26. FREIGHT LOGISTICS SERVICES USA Company Overview, Contact Details & Competitors, accessed June 20, 2025, https://leadiq.com/c/freight-logistics-services-usa/5a1dacf02300005b00a2811e
  27. Casino Malta | Alfred – Jobs, accessed June 20, 2025, https://alfred.com.mt/brands/casino-malta
  28. Olympic Entertainment Group – Wikipedia, accessed June 20, 2025, https://en.wikipedia.org/wiki/Olympic_Entertainment_Group
  29. A Comprehensive Guide to Casinos in Malta – DestinationBCN, accessed June 20, 2025, https://destinationbcn.com/pages/a-comprehensive-guide-to-casinos-in-malta_1.html
  30. MALTA ONLINE CASINO > LOCATED TO THE SOUTH OF, accessed June 20, 2025, https://allstrongservices.ca/malta-online-casino/
  31. Night Sky – SentinelOne, accessed June 20, 2025, https://www.sentinelone.com/anthology/night-sky/
  32. Russian hacking group Armageddon increasingly targets Ukrainian state services, accessed June 20, 2025, https://therecord.media/armageddon-gamaredon-russian-hacking-group-increasingly-targeting-ukraine-government
  33. ‘Unsophisticated’ hackers targeting systems used by oil and gas industry, CISA says, accessed June 20, 2025, https://therecord.media/oil-gas-industries-cisa-warning-unsophisticated-cyberthreats
  34. Threat Actor 888 (Threat Actor) – Malpedia, accessed June 20, 2025, https://malpedia.caad.fkie.fraunhofer.de/actor/threat_actor_888
  35. Japanese global logistics company confirms ransomware attack – The Record, accessed June 20, 2025, https://therecord.media/kintetsu-world-express-ransomware-attack-japan
  36. New Era Threat Actor: A Year Battling Octo Tempest | BRK266 – YouTube, accessed June 20, 2025, https://www.youtube.com/watch?v=KSEAvAVZMlA
  37. Telegram Cyber Threat Intelligence (CTI) Threat Actor channels – Breachsense, accessed June 20, 2025, https://www.breachsense.com/threat-actor-channels/
  38. BreachForums and Notorious Actors Announce Re-emergence | ZeroFox, accessed June 20, 2025, https://www.zerofox.com/intelligence/breachforums-and-notorious-actors-announce-re-emergence/
  39. Flash Report: Dark Web Discussion Centers on BreachForums Outage | ZeroFox, accessed June 20, 2025, https://www.zerofox.com/intelligence/flash-report-dark-web-discussion-centers-on-breachforums-outage/
  40. BreachForums purportedly disrupted by pro-Palestinian hackers | SC Media, accessed June 20, 2025, https://www.scworld.com/brief/breachforums-purportedly-disrupted-by-pro-palestinian-hackers
  41. Threat Actor | BlackFog, accessed June 20, 2025, https://www.blackfog.com/cybersecurity-101/threat-actor/
  42. Guess announces breach of employee SSNs and financial data after DarkSide ransomware attack | ZDNET, accessed June 20, 2025, https://www.zdnet.com/article/guess-announces-breach-of-employee-ssns-and-financial-data-after-darkside-attack/
  43. 5 Critical Threat Actors You Need to Know About – ReliaQuest, accessed June 20, 2025, https://reliaquest.com/blog/5-critical-threat-actors-you-need-to-know-about/
  44. 4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree, accessed June 20, 2025, https://thehackernews.com/2024/06/4-fin9-linked-vietnamese-hackers.html
  45. Europol Dismantles ‘Archetyp’ Dark Web Drug Market – Bitdefender, accessed June 20, 2025, https://www.bitdefender.com/en-us/blog/hotforsecurity/europol-dismantles-archetyp-dark-web-drug-market
  46. Dark web secrets: exploring the cyber threats – Prey, accessed June 20, 2025, https://preyproject.com/blog/dark-web-cyber-threats
  47. Top 10 Dark Web Markets – SOCRadar® Cyber Intelligence Inc., accessed June 20, 2025, https://socradar.io/top-10-dark-web-markets/
  48. Darknet Markets Explained: Navigating the Hidden Web – KELA Cyber Threat Intelligence, accessed June 20, 2025, https://www.kelacyber.com/blog/darknet-markets-explained-navigating-the-hidden-web/
  49. What is a Cyber Threat Actor? | CrowdStrike, accessed June 20, 2025, https://www.crowdstrike.com/en-us/cybersecurity-101/threat-intelligence/threat-actor/
  50. Types of Threats Privileged Accounts Face – Keeper Security, accessed June 20, 2025, https://www.keepersecurity.com/blog/2023/06/05/types-of-threats-privileged-accounts-face/
  51. Cybercrime | Federal Bureau of Investigation – FBI, accessed June 20, 2025, https://www.fbi.gov/investigate/cyber
  52. Global Cybersecurity Outlook 2025 – World Economic Forum, accessed June 20, 2025, https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2025.pdf
  53. 4 Cybersecurity Major Issues in Malaysia – Skillet, accessed June 20, 2025, https://skillet.com.my/4-current-cybersecurity-issues-in-malaysia/
  54. Threat Actor – Silobreaker, accessed June 20, 2025, https://www.silobreaker.com/glossary/threat-actor/
  55. What is a Threat Actor? Types & Examples – SentinelOne, accessed June 20, 2025, https://www.sentinelone.com/cybersecurity-101/threat-intelligence/threat-actor/
  56. What is XSS | Stored Cross Site Scripting Example | Imperva, accessed June 20, 2025, https://www.imperva.com/learn/application-security/cross-site-scripting-xss-attacks/
  57. XSS: Understanding Cross-Site Scripting Attacks – Veracode, accessed June 20, 2025, https://www.veracode.com/security/xss/