[March-10-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data. The drafted data logs a wide array of malicious activities occurring primarily on March 10, 2026, across various networks, including the “openweb” and Telegram.

The recorded incidents span multiple distinct categories of cyber threats: Data Breaches, Defacements, Initial Access sales, direct Cyber Attacks, and preemptive Alerts issued by threat actors. Threat actors have demonstrated a global reach, compromising government institutions, military and intelligence sectors, financial services, healthcare providers, and private enterprises.

2. Threat Actor Profiling and Campaign Analysis

The data reveals highly active threat groups and individuals conducting coordinated campaigns.

2.1 UNDERGROUND-NET

This threat actor engaged in a massive, coordinated web defacement campaign primarily targeting the Indian manufacturing, electrical, and industrial sectors.

  • Target Locations: India (predominantly) and South Africa.
  • Victims: Shubham Hall, Savita Engineering, Bhaktia Adiveda, Bhagwati Enterprise, Sahara Machine, Anex Electricals, A.L. Birds Net, Neminath Instruments, Panchal Meditech Pvt. Ltd., COSTOR AUTOMATION, instrumentsexporter.com, divinesalon.co.in, World Wide Conveyor Exports (Pty) Ltd, KS Valves & Pumps, Veer Laser Fab, Bird ControlNet, JRP Enterprise, Thyrocare Lab, and S.P. bird Net.
  • Attack Type: Website Defacement.
  • Communication Channel: Telegram.

2.2 L4663R666H05T

This group executed a series of website defacements focusing heavily on the Middle East, specifically the UAE, Israel, Qatar, and Kuwait.

  • Target Industries: Retail, Luxury Goods, Healthcare, IT Services, and Cosmetics.
  • Victims: Syscom, Wonderbooks.ae, LifeCell International, AIGNER UAE, Stuck On You, LUCRIN Geneva, DermaCenter, Gait Kuwait, NARS Cosmetics (multiple regional domains), Babylon Park Israel, Personal Touch, and Mova Israel.

2.3 INDRAMAYU CHAOS SYSTEM

This group heavily targeted the government administration sector of Indonesia and educational institutions in Israel via data leaks and credential theft.

  • Targeted Entities: Berau Regency, Meteorology, Climatology, and Geophysics Agency, Pemerintah Provinsi Bengkulu, Regional Government of Pinrang Regency, Regional Government of Purwakarta Regency, Office of the President of the Republic of Indonesia, Regional Government of Lombok Tengah Regency, Kuningan Regency Government, South Kalimantan Provincial Government, North Kalimantan Regional Authority, Pemerintah Daerah Kabupaten Karawang, and Braude Academic College of Engineering.

2.4 Shadow Warrior

An actor specializing in large-scale data breaches across e-commerce, gaming, and marketing sectors globally.

  • Breach Victims: Souq.com (32,000 user records), WLT Group, TVLiftCabinet Inc (290,000 records), Tebex Limited (13K records), knowmycustomer.in (20K records), Subito Disponibile (300,000 records), and Gamekaking.

2.5 jrintel

A highly sensitive actor focusing on the exfiltration and sale of classified military and intelligence documentation.

  • USA Operations: Leaked a classified PDF containing hazardous material shipment instructions related to Lockheed Martin. Claimed to sell top-secret military and intelligence documents covering U.S. Space Force operations, CIA/DIA reports, and hypersonic weapons development. Leaked private U.S. Department of Defense CAT torpedo manuals.
  • China Operations: Claimed to sell top-secret Chinese military documents dated 2025–2026, including data on high-altitude UAVs, stealth enhancements, and Taiwan combat strategies.

3. Incident Analysis by Category

3.1 Data Breaches and Leaks

Data breaches constitute the overwhelming majority of the recorded events.

Government and Public Sector:

  • La Région Occitanie (France): Actor “DumpSec” breached the Carte Jeune program, exposing 310,000 records and 270,783 photos (41.7 GB in JSONL format).
  • Citizenship by Investment Programme (Saint Lucia): Actor “frog” breached approximately 1,116,935 records in SQL format.
  • Ministerio de Hacienda (Spain): “PoliceEspDoxedBF” leaked full names, DNIs, and IBAN bank details of government staff members.
  • Government of Israel: Actor “Noaharnaut” claimed to have breached and leaked government emails.
  • Chinese ID Cards: Actor “tonywab” leaked 9 million Chinese national ID card records containing PII. Tonywab also claimed to sell over 4,000 Russian passport photos and scans.
  • Indonesian Local Governments: Actor “MRLUCK” breached the South Solok Regency Tourism Office and Pemerintah Kota Tangerang. Actor “Shenira6core” breached the Cirebon Regency Government’s Industrial Relations division.
  • Pompiers des Bouches-du-Rhône (France): Actor “7ven” claimed to have breached the fire department’s database.
  • Ministry of Infrastructure and Transport (Italy): The “Infrastructure Destruction Squad” claimed to exploit security vulnerabilities in the current systems.

Healthcare and Medical:

  • Maple Respiratory Colombia: “NyxarGroup” sold 1.8 million patient records.
  • USA Clinic: Actor “Heiz” sold 150K patient records, including SSNs and diagnoses, for $10 per record.
  • Hospital Universitario Del Valle (Colombia): “delitospenales” sold a 25GB database with 264K records.

Financial and Telecommunications:

  • Indian Bank: Actor “dataPenetration” leaked a payment system dataset containing 2,000 unique records.
  • GlobalNet (Tunisia): Actor “Dark07xx” breached the internal database of the telecommunications company.
  • b2a (Tunisia): Actor “DARK 07x” fully compromised the internal servers and financial records of the firm.
  • Ericsson Inc (USA): A breach occurred via a third-party service provider between April 17–22, 2025, exposing employee and customer personal data.

Corporate and E-Commerce:

  • Steadfast Courier (Bangladesh): “adminxs” sold a database containing tracking IDs and internal logistics details.
  • Office Packaging (UK): Actor “MORPHEUS” leaked 1,192,802 lines of data, including PayPal transaction identifiers.
  • Jazeera Airways (Kuwait): Actor “TheAshborn” claimed to sell a 50GB database of 15 million passenger records.
  • MagicSlides: Actor “Sythe” sold a database containing 2.3 million emails.

3.2 Initial Access and System Compromise

Several actors monetized initial network footholds.

  • Unknown USA Targets: “savel987” claimed to sell unauthorized access to 68 databases and 7 shops in the USA.
  • Body Unit Academy (UK): “BROTHERHOOD CAPUNG INDONESIA” leaked login credentials.
  • FinTech Organization (Arab Country): Actor “remotedesktop” sold access to Jira (150+ projects) and Confluence (450 users) systems containing POS terminal systems data.
  • Dolphin Automatic 2.1 System (Ukraine): “NoName057(16)” claimed unauthorized access to a heating management project controlling gas valves and boilers.
  • Hosting DNS Access: Actor “blackwinter99” leaked access to AM CONCEPT (Portugal) and Ocean Digital Cable & Fiber Broadband (Pakistan).
  • Sri Lanka Hospitality: Actor “williamblack” sold SSH and CRM access to a hotel and wine shop.

3.3 Direct Cyber Attacks

Operational disruptions were noted against critical infrastructure and software supply chains.

  • AppsFlyer (Israel): A cyberattack targeted the SDK infrastructure via code injected into websdk.appsflyer.com, designed to steal cryptocurrency from affected users.
  • Bank Melli and Bank Sepah (Iran): Online services, including the Bam banking system, were disrupted by an attack.
  • Independent Public Regional Hospital (Poland): A night-time infection forced the facility to switch to paper-based patient records, though emergency services continued.
  • Community College of Beaver County (USA): A “cryptolocker” attack forced a lockdown of IT systems, restricting campus technology resources.

3.4 Website Defacements

Aside from the heavy activity by UNDERGROUND-NET and L4663R666H05T, other notable defacements included:

  • Malaysian Economic Association: Defaced by BROTHERHOOD CAPUNG INDONESIA.
  • Bedco and Diesel Kuwait Online Store: Defaced by the group Simsimi.
  • Breve Market (Argentina): Defaced by BROKENPIPE.
  • Secret Weapon 1948 (Israel): Defaced by Jav4nyM0uz Corp.
  • Auto1 (Israel): Defaced by FRK48.
  • Iranian IT Services: Actor DimasHxR defaced Darqomkoja, NILWP, and weblabs.

3.5 Threat Actor Alerts

Groups pre-announced targets, indicating ideological or geopolitical motivations.

  • DARK 07x: Indicated they are targeting Tunisia.
  • TEAM UCC OPERATIONS: Indicated they are targeting Pakistan.
  • Infrastructure Destruction Squad: Claimed to have targeted water stations in India.
  • fsociety 1337: Intended to target Israel and the USA within 24 hours.
  • Moroccan Soldiers: Stated they are targeting “Unofficial Websites”.

4. Geographic Victimology (Impacted Regions)

The dataset illustrates a highly distributed geographic attack surface:

  • North America: The USA faced severe military document leaks, pension data breaches (510,000 records), and ransomware attacks on education infrastructure. Mexico suffered a leak of 14,645 retired individuals’ records and a breach of 1 million manufacturing customer records.
  • Middle East: Israel was repeatedly targeted for defacements and government data breaches. The UAE and Kuwait experienced defacements and large-scale aviation data leaks.
  • Asia: India suffered a high volume of defacements against local manufacturing alongside a payment system breach. Indonesia’s local government and regency databases were systemically harvested and leaked.
  • Europe: Spain (Ministry of Finance), France (La Région Occitanie, Fire Departments), and Poland (Healthcare) suffered significant data loss and operational downtime.

5. Conclusion

The data provided outlines an intensely volatile threat landscape recorded in March 2026. Data breaches remain the dominant method of compromise, targeting high-volume PII for subsequent monetization. Geopolitically motivated actors and hacktivist groups (like INDRAMAYU CHAOS SYSTEM and UNDERGROUND-NET) are prioritizing mass-defacement and the unauthorized exposure of local government credentials. Most critically, the alleged leaking of classified military documents (USA and China) by actors like jrintel, alongside attacks on critical infrastructure such as Ukrainian gas systems and Polish hospitals, underscores a dangerous escalation from simple data theft to kinetic real-world impact and national security threats.

Detected Incidents Draft Data

  1. Alleged sale of unauthorized access to 68 databases and 7 shops
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to 68 databases and 7 shops in USA.
    Date: 2026-03-10T23:57:40Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277972/
    Screenshots:
    None
    Threat Actors: savel987
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Alleged Data Breach of GlobalNet
    Category: Data Breach
    Content: The threat actor claims to have breached the database of GlobalNet, the dataset contains internal database records extracted from the company’s systems, website content tables, configuration data, and potentially user or operational records.
    Date: 2026-03-10T23:44:07Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-We-announce-the-hacking-of-GlobalNet-a-Tunisian-company-operating-in-the-field-of-in
    Screenshots:
    None
    Threat Actors: Dark07xx
    Victim Country: Tunisia
    Victim Industry: Network & Telecommunications
    Victim Organization: globalnet
    Victim Site: globalnet.tn
  3. Alleged Data Leak of Classified Lockheed Martin Hazardous Material Shipment Instructions in USA
    Category: Data Breach
    Content: Threat actor claims to have leaked a classified PDF containing hazardous material shipment instructions related to Lockheed Martin, allegedly exposing documentation detailing packaging, handling, labeling, transportability, and shipment procedures for hazardous materials.
    Date: 2026-03-10T22:20:51Z
    Network: openweb
    Published URL: https://raidforums.wtf/threads/usa-classified-lockheed-martin-hazardous-material-shipment-instructions-pdf.639/
    Screenshots:
    None
    Threat Actors: jrintel
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged Sale of Military and Intelligence Documents in USA
    Category: Data Breach
    Content: Threat Actor claims to be selling alleged top secret military and intelligence documents in USA. The documents purportedly include information related to U.S. Space Force operations, CIA and DIA intelligence reports, cyber operations, hypersonic weapons development, AUKUS defense cooperation, and strategic assessments concerning Ukraine, Taiwan, North Korea, and Southeast Asia. It also includes advanced missile systems, anti-radiation missile programs, maritime anti-submarine warfare capabilities, and emerging military technologies.
    Date: 2026-03-10T22:18:46Z
    Network: openweb
    Published URL: https://raidforums.wtf/threads/usa-top-secret-military-intelligence-documents-for-sale.638/
    Screenshots:
    None
    Threat Actors: jrintel
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Alleged access to Body Unit Academy
    Category: Initial Access
    Content: The group claims to have leaked login credentials to Body Unit Academy.
    Date: 2026-03-10T22:15:29Z
    Network: telegram
    Published URL: https://t.me/c/3800744258/73
    Screenshots:
    None
    Threat Actors: BROTHERHOOD CAPUNG INDONESIA
    Victim Country: UK
    Victim Industry: Sports
    Victim Organization: body unit academy
    Victim Site: bodyunitacademy.com
  6. Alleged Data Leak of U.S. Department of Defense CAT Torpedo Manuals
    Category: Data Breach
    Content: Threat actor claims to have leaked private U.S. Department of Defense CAT torpedo manuals, allegedly exposing confidential military documentation related to torpedo systems and operational manuals.
    Date: 2026-03-10T22:13:28Z
    Network: openweb
    Published URL: https://raidforums.wtf/threads/usa-private-department-of-defense-cat-torpedo-manuals-leaked.636/
    Screenshots:
    None
    Threat Actors: jrintel
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Alleged data breach of La Région Occitanie
    Category: Data Breach
    Content: A threat actor claims to be selling a large dataset allegedly associated with the Carte Jeune program operated by La Région Occitanie. the dataset contains approximately 310,000 records and 270,783 photos, with a total reported size of 41.7 GB in JSONL format. which includes various personal and administrative fields such as full names, birth information, registration dates, addresses, phone numbers, email addresses, guardian details, school information, class level, and file numbers, along with stored profile photos and documents.
    Date: 2026-03-10T22:11:57Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-FR-Region-Occitanie-with-PICTURE-41-7%C2%A0Go
    Screenshots:
    None
    Threat Actors: DumpSec
    Victim Country: France
    Victim Industry: Government & Public Sector
    Victim Organization: la région occitanie
    Victim Site: laregion.fr
  8. Alleged Sale of Chinese Military Documents
    Category: Data Breach
    Content: Threat Actor claims to be selling alleged top secret Chinese military documents dated 2025–2026. The documents purportedly include information related to high-altitude long-endurance UAV systems, advanced ship solid-state radar, upgrades to the Jiaolong manned submersible, unmanned vessel technologies, stealth measurement systems, quantum sensing upgrades for the PLA Rocket Force, fifth-generation fighter jet prototype test data and stealth enhancement technologies, as well as intelligence analysis reports on Taiwan’s combat strategy and development plans.
    Date: 2026-03-10T22:10:36Z
    Network: openweb
    Published URL: https://raidforums.wtf/threads/china-top-secret-military-documents-2025-6-for-sale.637/
    Screenshots:
    None
    Threat Actors: jrintel
    Victim Country: China
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Alleged Sale of Indian Bank Payment System Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a database allegedly related to the payment system of Indian Bank. The dataset reportedly contains 2,000 unique records, which includes passenger names, payment types, mobile numbers, cities, booking days, and email addresses, along with record IDs.
    Date: 2026-03-10T22:04:07Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Indian-Bank-Payment-System-2K
    Screenshots:
    None
    Threat Actors: dataPenetration
    Victim Country: India
    Victim Industry: Financial Services
    Victim Organization: indian bank
    Victim Site: indianbank.in
  10. Alleged Data Breach of Citizenship by Investment Programme Saint Lucia
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Citizenship by Investment Programme Saint Lucia in Saint Lucia. The leaked data is provided in SQL format and reportedly contains approximately 1,116,935 records. The database is dated March 08, 2026, and it includes around 270 email addresses.
    Date: 2026-03-10T21:57:06Z
    Network: openweb
    Published URL: https://leakbase.bz/threads/cipsaintlucia-com-leak.49269/
    Screenshots:
    None
    Threat Actors: frog
    Victim Country: Saint Lucia
    Victim Industry: Government Administration
    Victim Organization: citizenship by investment programme saint lucia
    Victim Site: cipsaintlucia.com
  11. Alleged Data Breach of b2a
    Category: Data Breach
    Content: The group claims to have accessed the database b2 Business Expert, an accounting, auditing, and tax consulting firm, alleging a full system compromise that includes internal servers and databases including financial records, tax data, and client information.
    Date: 2026-03-10T21:53:30Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1694
    Screenshots:
    None
    Threat Actors: DARK 07x
    Victim Country: Tunisia
    Victim Industry: Financial Services
    Victim Organization: b2a
    Victim Site: b2a.com.tn
  12. Alleged data breach of Steadfast Courier
    Category: Data Breach
    Content: A threat actor claims to be selling the full database of Steadfast Courier. the database appears to contain parcel delivery and customer information, including tracking IDs, invoice references, customer names, phone numbers, and detailed delivery addresses. Additional fields suggest internal logistics information such as hub identifiers, delivery status, rider status, parcel weight, billing amounts, and timestamps related to order creation and approval.
    Date: 2026-03-10T21:52:46Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Stead-Fast-Courier-Bangladesh
    Screenshots:
    None
    Threat Actors: adminxs
    Victim Country: Bangladesh
    Victim Industry: Package & Freight Delivery
    Victim Organization: steadfast courier
    Victim Site: steadfast.com.bd
  13. Alleged Data Breach of Souq.com
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Souq.com in UAE, which contains 32000 user records.
    Date: 2026-03-10T21:51:18Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/arab-e-commerce-souq-com-32k-user.89803/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: UAE
    Victim Industry: E-commerce & Online Stores
    Victim Organization: souq.com
    Victim Site: souq.com
  14. Alleged data leak of Singapore Homeowner Personal Records
    Category: Data Breach
    Content: A threat actor claims to be leaked a database containing approximately 2,000 records of homeowners in Singapore. the dataset includes personal information such as surname, first name, mobile phone number, country, city, street address, floor, address type, zip code, building number, and building email address.
    Date: 2026-03-10T21:39:00Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Singapore-homeowner-2K
    Screenshots:
    None
    Threat Actors: globalData1
    Victim Country: Singapore
    Victim Industry: Real Estate
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged data breach of Office Packaging
    Category: Data Breach
    Content: A threat actor claims to have leaked the database of Office Packaging.it contains approximately 1,192,802 lines of data, which including billing and shipping details, customer names, email addresses, phone numbers, company names, addresses, payment method information, PayPal transaction identifiers, order totals, and user device details.
    Date: 2026-03-10T20:59:14Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-officepackaging-co-uk-DB
    Screenshots:
    None
    Threat Actors: MORPHEUS
    Victim Country: UK
    Victim Industry: E-commerce & Online Stores
    Victim Organization: office packaging
    Victim Site: officepackaging.co.uk
  16. Alleged data breach of The World Billiards
    Category: Data Breach
    Content: A threat actor claims to have leaked a database linked to The World Billiards. the dataset includes usernames, email addresses, password hashes, registration timestamps, activation keys, and other account-related fields.
    Date: 2026-03-10T20:53:08Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-carlos-teofilo-com-theworldbilliards-com-DB
    Screenshots:
    None
    Threat Actors: MORPHEUS
    Victim Country: Spain
    Victim Industry: E-commerce & Online Stores
    Victim Organization: the world billiards
    Victim Site: theworldbilliards.com
  17. Alleged data breach of Carlos Teofilo Billiards Shop
    Category: Data Breach
    Content: A threat actor claims to have leaked a database allegedly associated with Carlos Teofilo Billiards Shop. The leaked information reportedly contains user account details such as display names, usernames, email addresses, password hashes, activation keys, registration dates, and user status fields.
    Date: 2026-03-10T20:52:33Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-carlos-teofilo-com-theworldbilliards-com-DB
    Screenshots:
    None
    Threat Actors: MORPHEUS
    Victim Country: Spain
    Victim Industry: E-commerce & Online Stores
    Victim Organization: carlos teofilo billiards shop
    Victim Site: carlos-teofilo.com
  18. Alleged Data Breach of WLT Group
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of WLT Group in UK.
    Date: 2026-03-10T20:36:49Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/wlt-com-leading-brands-and-agencies-crm-backup.89801/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: UK
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: wlt group
    Victim Site: wlt.com
  19. Alleged Data Breach of TVLiftCabinet Inc
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of TVLiftCabinet Inc in USA. The exposed data is provided in SQL format and reportedly contains approximately 290,000 records, including around 19,000 customer entries. It include fields such as email addresses, names, account-related details, and hashed passwords. The database is to originate from 2023 and is reportedly around 100 MB in size.
    Date: 2026-03-10T20:29:48Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/database-leaked-tvliftcabinet-com.89804/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: USA
    Victim Industry: Furniture
    Victim Organization: tvliftcabinet inc
    Victim Site: tvliftcabinet.com
  20. Alleged Data Leak of 2.4M Chile Leads
    Category: Data Breach
    Content: Threat actor claims to be selling 2.4M private leads from Chile, allegedly collected from advertising campaigns. The exposed data reportedly includes client names, phone numbers, mobile numbers, personal email addresses, and country information.
    Date: 2026-03-10T20:21:35Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278006/
    Screenshots:
    None
    Threat Actors: betway
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. DARK 07x claims to target Tunisia
    Category: Alert
    Content: A recent post by the group indicates that they are targetting Tunisia.
    Date: 2026-03-10T20:06:09Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1693
    Screenshots:
    None
    Threat Actors: DARK 07x
    Victim Country: Tunisia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. L4663R666H05T targets the website of Syscom
    Category: Defacement
    Content: The group claims to have defaced the website of Syscom.
    Date: 2026-03-10T19:59:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/809539
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Information Technology (IT) Services
    Victim Organization: syscom
    Victim Site: sysllc.com
  23. Alleged Sale of Unauthorized Access to Confluence and Jira Systems of an Unidentified FinTech Organization in an Arab Country
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to the Confluence and Jira systems of an unidentified fintech organization in an Arab country. The environment allegedly includes approximately 450 Confluence users, POS terminal systems, and applications related to money transfers. The Jira instance contains more than 150 projects, including CRM, CMS, API management, and Digital Wallet projects, along with internal passwords and a large amount of internal information.
    Date: 2026-03-10T19:55:22Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277998/
    Screenshots:
    None
    Threat Actors: remotedesktop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged Sale of Unauthorized RDP and Domain Admin Access to an Unidentified Organization in Argentina
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized RDP and domain admin access to an unidentified organization in Argentina.
    Date: 2026-03-10T19:39:46Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277991/
    Screenshots:
    None
    Threat Actors: Big-Bro
    Victim Country: Argentina
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. L4663R666H05T targets the Website of Wonderbooks.ae
    Category: Defacement
    Content: The group claims to have defaced the website of Wonderbooks.ae.
    Date: 2026-03-10T19:28:37Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808910
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Retail Industry
    Victim Organization: wonderbooks.ae
    Victim Site: test.wonderbooks.ae/media/customer_address/c/r
  26. Alleged data breach of Maple Respiratory Colombia
    Category: Data Breach
    Content: A threat actor claims to be selling a database allegedly belonging to Maple Respiratory Colombia. the dataset reportedly contains approximately 1.8 million records extracted from the organization’s systems. which includes patient details such as names, phone numbers, email addresses, identification numbers, and secondary contact numbers.
    Date: 2026-03-10T19:28:33Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-CO-1-8-MILLION-MAPLERESPIRATORY-CO
    Screenshots:
    None
    Threat Actors: NyxarGroup
    Victim Country: Colombia
    Victim Industry: Hospital & Health Care
    Victim Organization: maple respiratory colombia
    Victim Site: maplerespiratory.co
  27. L4663R666H05T targets the Website of LifeCell International
    Category: Defacement
    Content: The group claims to have defaced the website of LifeCell International.
    Date: 2026-03-10T19:24:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808757
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Hospital & Health Care
    Victim Organization: lifecell international
    Victim Site: lifecell.ae/media/customer_address/c/r/
  28. Alleged data breach of Islamic University of North Sumatra
    Category: Data Breach
    Content: A threat actor claims to have leaked the database of the Islamic University of North Sumatra
    Date: 2026-03-10T19:14:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-UISU-Islamic-University-of-North-Sumatra-INDONESIA–68716
    Screenshots:
    None
    Threat Actors: YUKA
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: islamic university of north sumatra
    Victim Site: uisu.ac.id
  29. BROTHERHOOD CAPUNG INDONESIA targets the website of Malaysian Economic Association
    Category: Defacement
    Content: The group claims to have defaced the website of Malaysian Economic Association.
    Date: 2026-03-10T19:03:32Z
    Network: telegram
    Published URL: https://t.me/c/3800744258/64
    Screenshots:
    None
    Threat Actors: BROTHERHOOD CAPUNG INDONESIA
    Victim Country: Malaysia
    Victim Industry: Education
    Victim Organization: malaysian economic association
    Victim Site: pem.org.my
  30. Alleged data leak of Security Service of Ukraine Special Operations Unit
    Category: Data Breach
    Content: The group claims to have leaked information allegedly related to transport vehicles used by the Security Service of Ukraine Special Operations Unit SBU Alfa Unit in Ukraine. According to the statement, the exposed data reportedly includes vehicle numbers, brands, and VIN codes associated with assets assigned to the unit.
    Date: 2026-03-10T19:03:15Z
    Network: telegram
    Published URL: https://t.me/perunswaroga/1260?single
    Screenshots:
    None
    Threat Actors: Perun Svaroga
    Victim Country: Ukraine
    Victim Industry: Military Industry
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data leak of American Business Database
    Category: Data Breach
    Content: A threat actor claims to have leaked a database related to American businesses.
    Date: 2026-03-10T18:32:41Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-DATABASE-BUSINESS-AMERICA–190951
    Screenshots:
    None
    Threat Actors: 1LH4MZXSEC
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Simsimi targets the website of Bedco
    Category: Defacement
    Content: The group claims to have defaced the website of Bedco.
    Date: 2026-03-10T18:08:48Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603353
    Screenshots:
    None
    Threat Actors: Simsimi
    Victim Country: UAE
    Victim Industry: Retail Industry
    Victim Organization: bedco
    Victim Site: bedco.ae/media/customer_address
  33. Alleged Data Breach Database of Tebex Limited
    Category: Data Breach
    Content: Threat actor claims to have breached the Tebex Limited database, allegedly exposing 13K records containing data such as usernames, email addresses, IP addresses, and account-related details.
    Date: 2026-03-10T18:02:32Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/database-tebex-io-13k.89809/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: UK
    Victim Industry: Gaming
    Victim Organization: tebex limited
    Victim Site: tebex.io
  34. L4663R666H05T targets the Website of AIGNER UAE
    Category: Defacement
    Content: The group claims to have defaced the website of AIGNER UAE.
    Date: 2026-03-10T18:01:59Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603191
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: aigner uae
    Victim Site: aignermunich.ae
  35. L4663R666H05T targets the Website of Stuck On You
    Category: Defacement
    Content: The group claims to have defaced the website of Stuck On You.
    Date: 2026-03-10T17:54:38Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603279
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Arts & Crafts
    Victim Organization: stuck on you
    Victim Site: stuckonyou.ae/media/customer_address/c/r/
  36. L4663R666H05T targets the Website of LUCRIN Geneva
    Category: Defacement
    Content: The group claims to have defaced the website of LUCRIN Geneva
    Date: 2026-03-10T17:47:02Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603287
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: lucrin geneva
    Victim Site: lucrin.ae
  37. Alleged Data leak of knowmycustomer.in
    Category: Data Breach
    Content: Threat actor claims to have leaked the database of Knowmycustomer.in in India, allegedly exposing 20K records containing data such as region, PMR email, PMR name, product details, account numbers, customer names, company names, emails, phone numbers, addresses, state, city, and pincode.
    Date: 2026-03-10T17:46:36Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/knowmycustomer-in-tata-tele-business-indias-leadin-20kk.89806/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: knowmycustomer.in
  38. L4663R666H05T targets the website of DermaCenter
    Category: Defacement
    Content: The group claims to have defaced the website of DermaCenter.
    Date: 2026-03-10T17:30:27Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603204
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Qatar
    Victim Industry: Retail Industry
    Victim Organization: dermacenter
    Victim Site: dermacenter.qa
  39. Alleged Sale of Driving License Data in UK
    Category: Data Breach
    Content: Threat Actor claims to be selling driving license data in UK, which allegedly contains front and back photo.
    Date: 2026-03-10T17:26:36Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/%F0%9F%87%AC%F0%9F%87%A7-uk-driving-license-front-and-back.80166/
    Screenshots:
    None
    Threat Actors: KYCMyASS
    Victim Country: UK
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged Data Breach of Subito Disponibile
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Subito Disponibile in Italy, allegedly containing around 300,000 records. The exposed data contains customer information such as email addresses, names, dates of birth, and other account-related details.
    Date: 2026-03-10T17:17:40Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/database-leaked-subitodisponibile-com-300k.89805/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: Italy
    Victim Industry: E-commerce & Online Stores
    Victim Organization: subito disponibile
    Victim Site: subitodisponibile.com
  41. Alleged Data Breach of Gamekaking
    Category: Data Breach
    Content: A threat actor claims to have breached the database of Gamekaking in India, allegedly exposing data including usernames, email addresses, passwords, and other database details associated with the platform
    Date: 2026-03-10T17:17:13Z
    Network: openweb
    Published URL: https://darknetarmy.io/threads/gamekaking-com-apps-web-games.89807/
    Screenshots:
    None
    Threat Actors: Shadow Warrior
    Victim Country: India
    Victim Industry: Gaming
    Victim Organization: gamekaking
    Victim Site: gamekaking.com
  42. Alleged data leak of 44K Job-Seekers Database
    Category: Data Breach
    Content: A threat actor claims to be selling a database of job seekers allegedly collected from a Canadian job search website. the dataset reportedly contains information on approximately 44,000 users.The exposed data is said to include first and last names, email addresses, phone numbers, and country information.
    Date: 2026-03-10T17:08:22Z
    Network: openweb
    Published URL: https://xss.pro/threads/146349/
    Screenshots:
    None
    Threat Actors: Galaher
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. L4663R666H05T targets the Website of Gait Kuwait
    Category: Defacement
    Content: The group claims to have defaced the website of Gait Kuwait.
    Date: 2026-03-10T17:00:50Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603422
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Kuwait
    Victim Industry: Consumer Electronics
    Victim Organization: gait kuwait
    Victim Site: gait.com.kw/media/customer_address/c/r/
  44. Alleged unauthorized access to an unidentified Dolphin Automatic 2.1 system used in Ukraine
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to the Dolphin Automatic 2.1 system in Ukraine’s “Dovzhenko” heating management project, which controls gas valves with emergency shutdown capability, boilers, heating pumps, and real-time monitoring of pressure, temperature, and system alerts for residential and public buildings.
    Date: 2026-03-10T16:58:52Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2810
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. BROKENPIPE targets the website of Breve Market
    Category: Defacement
    Content: The group claims to have defaced the website of Breve Market.
    Date: 2026-03-10T16:58:10Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41603369?hz=1
    Screenshots:
    None
    Threat Actors: BROKENPIPE
    Victim Country: Argentina
    Victim Industry: Retail Industry
    Victim Organization: breve market
    Victim Site: brevemarket.com.ar
  46. Alleged data breach of Ministerio de Hacienda
    Category: Data Breach
    Content: A threat actor claims to have leaked data allegedly belonging to employees of the Spanish Ministry of Finance. the dataset contains personal information related to government staff members. the exposed data reportedly includes full names, national ID numbers (DNI), phone numbers, email addresses, IBAN bank details, and residential addresses.
    Date: 2026-03-10T16:57:33Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SPAIN-HACIENDA-GOB-ES-EMPLEADOS
    Screenshots:
    None
    Threat Actors: PoliceEspDoxedBF
    Victim Country: Spain
    Victim Industry: Government & Public Sector
    Victim Organization: ministerio de hacienda
    Victim Site: hacienda.gob.es
  47. Alleged Sale of 150K USA Clinic Patient Records
    Category: Data Breach
    Content: A threat actor claims to be selling a database of 150K patients from a USA clinic, allegedly containing SSN, date of birth, full name, phone number, email, diagnoses, medications, and physicians. The data is stored in a 460 MB SQLite file and is being sold in full or in parts for $10 per record.
    Date: 2026-03-10T15:33:10Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/277982/
    Screenshots:
    None
    Threat Actors: Heiz
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Alleged leak of login access to thegardens.co.in.anchor.net.in
    Category: Initial Access
    Content: The group claims to have leaked login access to thegardens.co.in.anchor.net.in.
    Date: 2026-03-10T14:04:10Z
    Network: telegram
    Published URL: https://t.me/c/3800744258/62
    Screenshots:
    None
    Threat Actors: BROTHERHOOD CAPUNG INDONESIA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: thegardens.co.in.anchor.net.in
  49. TEAM UCC OPERATIONS claims to target Pakistan
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Pakistan.
    Date: 2026-03-10T14:00:46Z
    Network: telegram
    Published URL: https://t.me/c/2256516942/168
    Screenshots:
    None
    Threat Actors: TEAM UCC OPERATIONS
    Victim Country: Pakistan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Cyberattack hit AppsFlyer
    Category: Cyber Attack
    Content: A cyberattack reportedly targeted the SDK infrastructure of AppsFlyer, an Israeli mobile analytics and attribution company, after attackers allegedly injected malicious code into the domain websdk.appsflyer.com. The compromised SDK is said to have been used to deploy code designed to steal cryptocurrency from affected users.
    Date: 2026-03-10T13:58:18Z
    Network: telegram
    Published URL: https://t.me/TheGhostITM/351
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Israel
    Victim Industry: Software
    Victim Organization: appsflyer
    Victim Site: websdk.appsflyer.com
  51. Alleged data breach of Government of Israel
    Category: Data Breach
    Content: The threat actor claims to have breached data from the Government of Israel, posting it on March 10, 2026.
    Date: 2026-03-10T13:54:03Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-ISR-Gov-il-emails-Leaked
    Screenshots:
    None
    Threat Actors: Noaharnaut
    Victim Country: Israel
    Victim Industry: Government Administration
    Victim Organization: government of israel
    Victim Site: gov.il
  52. Alleged data leak of Department Of Food In Bangladesh
    Category: Data Breach
    Content: The group claims to have leaked data from Department Of Food In Bangladesh.
    Date: 2026-03-10T13:45:25Z
    Network: telegram
    Published URL: https://t.me/c/2256516942/168
    Screenshots:
    None
    Threat Actors: TEAM UCC OPERATIONS
    Victim Country: Bangladesh
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Infrastructure Destruction Squad claims to have targeted water stations in India
    Category: Alert
    Content: The group claims to have targeted water stations in India.
    Date: 2026-03-10T12:52:28Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3893
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged data leak of Motor Sich JSC
    Category: Data Breach
    Content: The group claims to have leaked a unique document of the Motor Sich JSC company.
    Date: 2026-03-10T12:37:31Z
    Network: telegram
    Published URL: https://t.me/hackberegini/3199
    Screenshots:
    None
    Threat Actors: Beregini
    Victim Country: Ukraine
    Victim Industry: Aviation & Aerospace
    Victim Organization: motor sich jsc
    Victim Site: motorsich.com
  55. Cyberattack hit Bank Melli and Bank Sepah
    Category: Cyber Attack
    Content: A cyberattack was initially rumored after disruptions affected some online services of Bank Melli Iran and Bank Sepah, including the Bam banking system.
    Date: 2026-03-10T11:41:27Z
    Network: telegram
    Published URL: https://t.me/cyberbannews_ir/20415
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  56. Alleged data breach of Antichi Sapori dellIrpinia di Zuccardi
    Category: Data Breach
    Content: The group claims to have breached data from Antichi Sapori dellIrpinia di Zuccardi
    Date: 2026-03-10T11:24:18Z
    Network: telegram
    Published URL: https://t.me/c/3745504505/968
    Screenshots:
    None
    Threat Actors: scattered LAPSUS$ hunters 7.0
    Victim Country: Italy
    Victim Industry: Supermarkets
    Victim Organization: antichi sapori dellirpinia di zuccardi
    Victim Site: zuccardi.it
  57. Alleged data breach of South Solok Regency Tourism Office
    Category: Data Breach
    Content: The threat actor claims to have breached South Solok Regency Tourism Office. The exposed dataset allegedly include National Identification Numbers (NIK), names, birth details, salaries, start dates, NPWP, phone numbers, and admin codes of govt personnel.
    Date: 2026-03-10T10:43:08Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-data-tkd-dinas-pariwisata-kabupaten-solok-selatan
    Screenshots:
    None
    Threat Actors: MRLUCK
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: south solok regency tourism office
    Victim Site: disparbud.solokkab.go.id
  58. Alleged data breach of Pemerintah Kota Tangerang
    Category: Data Breach
    Content: The threat actor claims to have breached Pemerintah Kota Tangerang, The dataset include names, dates of birth, NIK (National Identification Numbers), NIP numbers, job positions, teacher categories, and validation or verification status from education authorities.
    Date: 2026-03-10T10:25:22Z
    Network: openweb
    Published URL: http://breachforums.as/Thread-data-guru-tanggerang
    Screenshots:
    None
    Threat Actors: MRLUCK
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: pemerintah kota tangerang
    Victim Site: tangerangkota.go.id
  59. Alleged data leak of Chinese ID card information
    Category: Data Breach
    Content: The threat actor claims to have leaked 9 million Chinese national ID card records. The dataset reportedly includes personally identifiable information (PII) such as full names, national ID numbers, addresses, and related identification details.
    Date: 2026-03-10T10:06:53Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-9M-CN-Id-card-information
    Screenshots:
    None
    Threat Actors: tonywab
    Victim Country: China
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  60. Alleged leak of unauthorized access to AM CONCEPT
    Category: Initial Access
    Content: The threat actor claims to have leaked unauthorized access to AM CONCEPT.
    Date: 2026-03-10T10:02:40Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-%E2%AD%90Portugal%E2%AD%90-amconcept-pt-hosting-dns-access
    Screenshots:
    None
    Threat Actors: blackwinter99
    Victim Country: Portugal
    Victim Industry: Architecture & Planning
    Victim Organization: am concept
    Victim Site: amconcept.pt
  61. Alleged leak of unauthorized access to Ocean Digital Cable & Fiber Broadband
    Category: Initial Access
    Content: The threat actor claims to have leaked unauthorized access to Ocean Digital Cable & Fiber Broadband.
    Date: 2026-03-10T09:58:36Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-%E2%AD%90Pakistan%E2%AD%90-oceancableandbroadband-pk-hosting-dns-access
    Screenshots:
    None
    Threat Actors: blackwinter99
    Victim Country: Pakistan
    Victim Industry: Network & Telecommunications
    Victim Organization: ocean digital cable & fiber broadband
    Victim Site: oceancableandbroadband.pk
  62. Alleged source code and domain sale of AniZen
    Category: Data Breach
    Content: The group claims to be selling domain and source code of AniZen.
    Date: 2026-03-10T09:32:38Z
    Network: telegram
    Published URL: https://t.me/c/1867326321/567
    Screenshots:
    None
    Threat Actors: TBDF
    Victim Country: Unknown
    Victim Industry: Broadcast Media
    Victim Organization: anizen
    Victim Site: anizen.tr
  63. Alleged data breach of Cirebon Regency Government
    Category: Data Breach
    Content: The threat actor claims to have breached the database related to the Industrial Relations division of Cirebon Regency, the allegedly includes govt decrees on 2025 membership, union reps, employer associations, and internal labor federation correspondence.
    Date: 2026-03-10T09:07:06Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DOCUMENTS-LEAKED-Cirebon-Government-Industrial-Relations-Internal-Data-2025
    Screenshots:
    None
    Threat Actors: Shenira6core
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: cirebon regency government
    Victim Site: cirebonkab.go.id
  64. fsociety 1337 claims to target Israel and USA
    Category: Alert
    Content: A recent post by the group indicates that they intends to target Israel and the USA in the next 24 hours.
    Date: 2026-03-10T08:37:42Z
    Network: telegram
    Published URL: https://t.me/fsosiety1337/7
    Screenshots:
    None
    Threat Actors: fsociety 1337
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Alleged Data Breach SEGWAY INC.
    Category: Data Breach
    Content: Threat actor claims to have leaked data from SEGWAY INC.
    Date: 2026-03-10T08:35:10Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277939/
    Screenshots:
    None
    Threat Actors: HighRisk
    Victim Country: USA
    Victim Industry: Other Industry
    Victim Organization: segway inc.
    Victim Site: segway.com
  66. Alleged data leak of Berau Regency
    Category: Data Breach
    Content: The group claims to have leaked data from Berau Regency.
    Date: 2026-03-10T08:33:03Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/501
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: berau regency
    Victim Site: beraukab.go.id
  67. Alleged data leak of Meteorology, Climatology, and Geophysics Agency
    Category: Data Breach
    Content: The group claims to have leaked data from Meteorology, Climatology, and Geophysics Agency.
    Date: 2026-03-10T08:28:50Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/494
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: meteorology, climatology, and geophysics agency
    Victim Site: bmkg.go.id
  68. UNDERGROUND-NET targets the website of Shubham Hall
    Category: Defacement
    Content: The group claims to have defaced the website of Shubham Hall.
    Date: 2026-03-10T08:25:58Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Events Services
    Victim Organization: shubham hall
    Victim Site: shubhamhall.in
  69. UNDERGROUND-NET targets the website of Savita Engineering
    Category: Defacement
    Content: The group claims to have defaced the website of Savita Engineering
    Date: 2026-03-10T08:23:57Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: savita engineering
    Victim Site: savitaengineering.com
  70. Alleged data breach of Pemerintah Provinsi Bengkulu
    Category: Data Breach
    Content: The group claims to have breached data from Pemerintah Provinsi Bengkulu.
    Date: 2026-03-10T08:22:56Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/493
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: pemerintah provinsi bengkulu
    Victim Site: bengkuluprov.go.id
  71. UNDERGROUND-NET targets the website of Bhaktia Adiveda
    Category: Defacement
    Content: The group claims to have defaced the website of Bhaktia Adiveda.
    Date: 2026-03-10T07:53:17Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Health & Fitness
    Victim Organization: bhaktia adiveda
    Victim Site: bhaktiaadiveda.com
  72. UNDERGROUND-NET targets the website of Bhagwati Enterprise
    Category: Defacement
    Content: The group claims to have defaced the website of Bhagwati Enterprise.
    Date: 2026-03-10T07:52:00Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Other Industry
    Victim Organization: bhagwati enterprise
    Victim Site: bhagwati-enterprise.in
  73. UNDERGROUND-NET targets the website of Sahara Machine
    Category: Defacement
    Content: The group claims to have defaced the website of Sahara Machine.
    Date: 2026-03-10T07:49:46Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Other Industry
    Victim Organization: sahara machine
    Victim Site: saharamachine.com
  74. UNDERGROUND-NET targets the website of Anex Electricals
    Category: Defacement
    Content: The group claims to have defaced the website of Anex Electricals.
    Date: 2026-03-10T07:48:59Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Electrical & Electronic Manufacturing
    Victim Organization: anex electricals
    Victim Site: anexelectricals.com
  75. UNDERGROUND-NET targets the website of A.L. Birds Net
    Category: Defacement
    Content: The group claims to have defaced the website of A.L. Birds Net.
    Date: 2026-03-10T07:46:44Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Other Industry
    Victim Organization: a.l. birds net
    Victim Site: albirdnet.in
  76. UNDERGROUND-NET targets the website of Neminath Instruments
    Category: Defacement
    Content: The group claims to have defaced the website of Neminath Instruments.
    Date: 2026-03-10T07:46:13Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Machinery Manufacturing
    Victim Organization: neminath instruments
    Victim Site: neminathinstruments.com
  77. UNDERGROUND-NET targets the website of Panchal Meditech Pvt. Ltd.
    Category: Defacement
    Content: The group claims to have defaced the website of Panchal Meditech Pvt. Ltd.
    Date: 2026-03-10T07:44:07Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Medical Equipment Manufacturing
    Victim Organization: panchal meditech pvt. ltd.
    Victim Site: panchalmeditech.in
  78. UNDERGROUND-NET targets the website of COSTOR AUTOMATION
    Category: Defacement
    Content: The group claims to have defaced the website of COSTOR AUTOMATION.
    Date: 2026-03-10T07:37:23Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Machinery Manufacturing
    Victim Organization: costor automation
    Victim Site: liftpart.in
  79. Alleged Data Breach of Ericsson Inc
    Category: Data Breach
    Content: Threat actor claims to havebreached the data of Ericsson Inc., the U.S. subsidiary of Swedish telecommunications company Ericsson, after compromising a third-party service provider. The breach reportedly exposed personal data of an undisclosed number of employees and customers. The incident occurred between April 17–22, 2025, and was discovered on April 28, 2025. Ericsson stated the compromise happened in the vendor’s systems, not its internal infrastructure, and the FBI has been notified.
    Date: 2026-03-10T07:35:29Z
    Network: openweb
    Published URL: https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: USA
    Victim Industry: Network & Telecommunications
    Victim Organization: ericsson inc
    Victim Site: ericsson.com
  80. UNDERGROUND-NET targets the website of instrumentsexporter.com
    Category: Defacement
    Content: The group claims to have defaced the website of instrumentsexporter.com.
    Date: 2026-03-10T07:35:24Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: instrumentsexporter.com
  81. UNDERGROUND-NET targets the website of divinesalon.co.in
    Category: Defacement
    Content: The group claims to have defaced the website of divinesalon.co.in.
    Date: 2026-03-10T07:34:00Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: divinesalon.co.in
  82. UNDERGROUND-NET targets the website of World Wide Conveyor Exports (Pty) Ltd
    Category: Defacement
    Content: The group claims to have defaced the website of World Wide Conveyor Exports (Pty) Ltd.
    Date: 2026-03-10T07:32:33Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: South Africa
    Victim Industry: Import & Export
    Victim Organization: world wide conveyor exports (pty) ltd
    Victim Site: conveyorexporters.com
  83. UNDERGROUND-NET targets the website of KS Valves & Pumps
    Category: Defacement
    Content: The group claims to have defaced the website of KS Valves & Pumps.
    Date: 2026-03-10T07:30:26Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: ks valves & pumps
    Victim Site: ksvalves.in
  84. UNDERGROUND-NET targets the website of Veer Laser Fab
    Category: Defacement
    Content: The group claims to have defaced the website of Veer Laser Fab.
    Date: 2026-03-10T07:29:33Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: veer laser fab
    Victim Site: veerlaserfab.in
  85. UNDERGROUND-NET targets the website of Bird ControlNet
    Category: Defacement
    Content: The group claims to have defaced the website of Bird ControlNet.
    Date: 2026-03-10T07:28:02Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Environmental Services
    Victim Organization: bird controlnet
    Victim Site: birdscontrolnet.in
  86. UNDERGROUND-NET targets the website of JRP Enterprise
    Category: Defacement
    Content: The group claims to have defaced the website of JRP Enterprise.
    Date: 2026-03-10T07:24:03Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Manufacturing
    Victim Organization: jrp enterprise
    Victim Site: jrpenterprise.in
  87. UNDERGROUND-NET targets the website of Thyrocare Lab
    Category: Defacement
    Content: The group claims to have defaced the website of Thyrocare Lab.
    Date: 2026-03-10T07:24:00Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Hospital & Health Care
    Victim Organization: thyrocare lab
    Victim Site: thyrocareahmedabad.in
  88. UNDERGROUND-NET targets the website of S.P. bird Net
    Category: Defacement
    Content: The group claims to have defaced the website of S.P. bird Net
    Date: 2026-03-10T07:21:13Z
    Network: telegram
    Published URL: https://t.me/c/2195292966/1296
    Screenshots:
    None
    Threat Actors: UNDERGROUND-NET
    Victim Country: India
    Victim Industry: Building and construction
    Victim Organization: s.p. bird net
    Victim Site: spbirdscontrol.in
  89. Alleged data leak of retired individuals from Mexico
    Category: Data Breach
    Content: The threat actor claims to have leaked the data of 14,645 retired individuals from Mexico, allegedly containing full name, paternal surname, surname, phone number, address information (colony, street, exterior and interior numbers), postal code, gender, folio, RFC, CURP, NIR, and more.
    Date: 2026-03-10T07:20:34Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-M%C3%89XICO-PERSONAS-JUBILADAS-14-645
    Screenshots:
    None
    Threat Actors: MagoSpeak
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Alleged data leak of Hotel Booking Customers from the United States, Canada, and
    Category: Data Breach
    Content: The threat actor claims to have leaked a hotel booking customers database allegedly containing information on 60,000 individuals from United States, Canada, and Brazil. The compromised data includes name, email, phone number, address, city, region, country, and fax.
    Date: 2026-03-10T07:15:07Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Hotel-Booking-Customers-Info-USA-Canada-Brasil-60k-record
    Screenshots:
    None
    Threat Actors: sexyskin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Cyberattack Hit Independent Public Regional Hospital in Szczecin
    Category: Cyber Attack
    Content: A hospital in the western Polish city of Szczecin was hit by a cyberattack that disrupted its IT systems, forcing the facility to temporarily switch to a paper-based system for handling patient records and operations. The attack infected the hospital’s network during the night, blocking access to digital systems used by staff. Hospital officials confirmed that emergency services and patient care continued despite the disruption, while cybersecurity specialists worked to restore systems and investigate the incident. Authorities also launched an inquiry to determine the source and extent of the attack.
    Date: 2026-03-10T07:07:13Z
    Network: openweb
    Published URL: https://tvpworld.com/91986106/hospital-in-western-poland-hit-by-cyberattack
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Poland
    Victim Industry: Hospital & Health Care
    Victim Organization: independent public regional hospital in szczecin
    Victim Site: spwsz.szczecin.pl
  92. Cyberattack Hit Community College of Beaver County
    Category: Cyber Attack
    Content: A cyberattack targeted the Community College of Beaver County (CCBC) in Pennsylvania, forcing the institution to lock down its IT systems to contain the incident. Officials warned that attackers were carrying out an encryption-based “cryptolocker” attack on the college’s data and instructed staff not to turn on laptops or other devices to prevent further spread of the malware. As a precaution, campus technology resources were restricted while the college investigated the scope of the attack and worked to limit damage. At the time of reporting, it was unclear which systems were affected or whether any data had been accessed or stolen.
    Date: 2026-03-10T06:58:31Z
    Network: openweb
    Published URL: https://dysruptionhub.com/ccbc-cyberattack-it-lockdown-pa/
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: USA
    Victim Industry: Education
    Victim Organization: community college of beaver county
    Victim Site: ccbc.edu
  93. Alleged Sale of Iranian Nationals Residency Data
    Category: Data Breach
    Content: The threat actor claims to be selling the database ofIranian Nationals Residenc , allegedly including detailed records.
    Date: 2026-03-10T06:28:40Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-UAE-180-000-Iranian-Nationals-residence-of-UAE
    Screenshots:
    None
    Threat Actors: TheAshborn
    Victim Country: UAE
    Victim Industry: Government Relations
    Victim Organization: Unknown
    Victim Site: Unknown
  94. Alleged data breach of Universidad Mayor de San Simón (UMSS)
    Category: Data Breach
    Content: The threat actor claims to be leaked data from Universidad Mayor de San Simón (UMSS). The compromised data reportedly includes National identification numbers (DNI), Phone numbers, Email addresses, Physical addresses, First and last names, Dates of birth, Usernames, Additional sensitive personal information
    Date: 2026-03-10T06:00:51Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Universidad-Mayor-de-San-Sim%C3%B3n-UMSS-Bolivia-Data-Leak-%E2%80%94-Millions-of-Records-Exposed
    Screenshots:
    None
    Threat Actors: ExploitBolivia
    Victim Country: Bolivia
    Victim Industry: Education
    Victim Organization: universidad mayor de san simón (umss)
    Victim Site: umss.edu.bo
  95. Alleged Data Leak of Regional Government of Pinrang Regency
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Regional Government of Pinrang Regency.
    Date: 2026-03-10T05:46:42Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/488
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: regional government of pinrang regency
    Victim Site: pinrang.go.id
  96. Alleged Leak of Russian Passport data
    Category: Data Breach
    Content: The threat actor claims to be selling the Russian Passport data, the dataset contains over 4,000 sets of Russian passport photos and scan.
    Date: 2026-03-10T05:46:32Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Supplementary-file-A-mixture-of-over-4-000-sets-of-Russian-passport-photos-and-scann
    Screenshots:
    None
    Threat Actors: tonywab
    Victim Country: Russia
    Victim Industry: Government Relations
    Victim Organization: Unknown
    Victim Site: Unknown
  97. Alleged Data Leak of Regional Government of Purwakarta Regency
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Regional Government of Purwakarta Regency.
    Date: 2026-03-10T05:44:53Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/485
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: regional government of purwakarta regency
    Victim Site: purwakartakab.go.id
  98. Alleged data leak of Office of the President of the Republic of Indonesia
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Office of the President of the Republic of Indonesia.
    Date: 2026-03-10T05:41:25Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/486
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: office of the president of the republic of indonesia
    Victim Site: presiden.go.id
  99. Jav4nyM0uz Corp targets the Website of Secret Weapon 1948
    Category: Defacement
    Content: The group claims to have defaced the website of Secret Weapon 1948
    Date: 2026-03-10T05:38:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808508
    Screenshots:
    None
    Threat Actors: Jav4nyM0uz Corp
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: secret weapon 1948
    Victim Site: secret-weapon-1948.co.il
  100. Alleged Sale of Jazeera Airways Passenger Database
    Category: Data Breach
    Content: The threat actor claims to be selling the database of Jazeera Airways, the dataset contains 15 million passenger records.
    Date: 2026-03-10T05:34:29Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Kuwait-15-000-000-Airline-Passengers-Data-jazeeraairways-com-50-GB
    Screenshots:
    None
    Threat Actors: TheAshborn
    Victim Country: Kuwait
    Victim Industry: Airlines & Aviation
    Victim Organization: jazeera airways
    Victim Site: jazeeraairways.com
  101. L4663R666H05T targets the Website of NARS Cosmetics
    Category: Defacement
    Content: The group claims to have defaced the website of NARS Cosmetics
    Date: 2026-03-10T05:30:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/806550
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Cosmetics
    Victim Organization: nars cosmetics
    Victim Site: narscosmetics.co.il
  102. L4663R666H05T targets the website of Babylon Park Israel
    Category: Defacement
    Content: The group claims to have defaced the website of Babylon Park Israel
    Date: 2026-03-10T05:24:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/807919
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Business and Economic Development
    Victim Organization: babylon park israel
    Victim Site: shop.babylonpark.co.il
  103. Alleged Sale of Qatar Security Force Lekhwiya
    Category: Data Breach
    Content: The threat actor claims to be selling the database of Qatar Security Force Lekhwiya, the dataset contains 1900 personnel data.
    Date: 2026-03-10T05:22:42Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Qatar-1900X-Personnel-Data-of-Security-Forces
    Screenshots:
    None
    Threat Actors: TheAshborn
    Victim Country: Qatar
    Victim Industry: Government Administration
    Victim Organization: lekhwiya
    Victim Site: lekhwiya.gov.qa
  104. Alleged data leak of Regional Government of Lombok Tengah Regency
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Regional Government of Lombok Tengah Regency.
    Date: 2026-03-10T05:22:38Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/473
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: regional government of lombok tengah regency
    Victim Site: lomboktengahkab.go.id
  105. L4663R666H05T targets the Website of Personal Touch
    Category: Defacement
    Content: The group claims to have defaced the website of Personal Touch
    Date: 2026-03-10T05:22:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/807108
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Cosmetics
    Victim Organization: personal touch
    Victim Site: personal-touch.co.il
  106. L4663R666H05T targets the website of Mova Israel
    Category: Defacement
    Content: The group claims to have defaced the website of Mova Israel
    Date: 2026-03-10T05:21:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/806449
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Consumer Electronics
    Victim Organization: mova israel
    Victim Site: mova-tech.co.il
  107. Alleged data leak of Kuningan Regency Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Kuningan Regency Government.
    Date: 2026-03-10T05:17:48Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/482
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: kuningan regency government
    Victim Site: kuningankab.go.id
  108. L4663R666H05T targets the website of NARS Cosmetics
    Category: Defacement
    Content: The group claims to have defaced the website of NARS Cosmetics
    Date: 2026-03-10T05:05:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/806549
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: Israel
    Victim Industry: Cosmetics
    Victim Organization: nars cosmetics
    Victim Site: nars.stg.fisha.co.il
  109. Alleged Sale of MagicSlides Database
    Category: Data Breach
    Content: The threat actor claims to be selling the database of MagicSlides, containing millions of email records and user-related data.
    Date: 2026-03-10T04:47:16Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-MagicSlides-App-Database-2-3-million-emails
    Screenshots:
    None
    Threat Actors: Sythe
    Victim Country: Unknown
    Victim Industry: Information Technology (IT) Services
    Victim Organization: magicslides
    Victim Site: magicslides.app
  110. FRK48 Targets the Website of Auto1
    Category: Defacement
    Content: The group claims to have defaced the website of Auto1
    Date: 2026-03-10T04:35:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808461
    Screenshots:
    None
    Threat Actors: FRK48
    Victim Country: Israel
    Victim Industry: Automotive
    Victim Organization: auto1
    Victim Site: auto1.co.il
  111. DimasHxR Targets the Website of Darqomkoja
    Category: Defacement
    Content: The group claims to have defaced the website of Darqomkoja.
    Date: 2026-03-10T04:28:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808475
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: darqomkoja
    Victim Site: darqomkoja.ir
  112. DimasHxR Targets the Website of NILWP
    Category: Defacement
    Content: The group claims to have defaced the website of NILWP.
    Date: 2026-03-10T04:20:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808484
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: nilwp
    Victim Site: nilwp.ir
  113. Simsimi targets the website of Diesel Kuwait Online Store
    Category: Defacement
    Content: The group claims to have defaced the website of Diesel Kuwait Online Store
    Date: 2026-03-10T04:17:57Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41594485
    Screenshots:
    None
    Threat Actors: Simsimi
    Victim Country: Kuwait
    Victim Industry: E-commerce & Online Stores
    Victim Organization: diesel kuwait online store
    Victim Site: kw.diesel.com
  114. DimasHxR targets the website of weblabs
    Category: Defacement
    Content: The group claims to have defaced the website of weblabs.
    Date: 2026-03-10T04:10:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808503
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Iran
    Victim Industry: Information Technology (IT) Services
    Victim Organization: weblabs
    Victim Site: weblabs.ir
  115. Alleged sale of customers personal data from an unidentified Mexican manufacturing company
    Category: Data Breach
    Content: The threat actor claims to be leaked customers personal data from an unidentified Mexican manufacturing company. The compromised data reportedly contain 1 million records including customer names, addresses, phone numbers, tax identification numbers (RFC), region codes, contract numbers, site numbers, delivery unit details, city, state, ZIP codes, and record creation dates.
    Date: 2026-03-10T03:47:21Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-MEXICO-1M-DATA-OF-PERSONAL-INFORMATION-OF-MANUFACTURING-COMPANY-CUSTOMERS
    Screenshots:
    None
    Threat Actors: Shinchan
    Victim Country: Mexico
    Victim Industry: Manufacturing
    Victim Organization: Unknown
    Victim Site: Unknown
  116. Alleged Sale of Hospital Universitario Del Valle Database
    Category: Data Breach
    Content: The threat actor claims to be selling a dataset allegedly belonging to Hospital Universitario Del Valle, containing hundreds of thousands of records including personal and medical-related information.
    Date: 2026-03-10T03:36:37Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-SELLING-Hospital-Universitario-Del-Valle-264K-25GB
    Screenshots:
    None
    Threat Actors: delitospenales
    Victim Country: Colombia
    Victim Industry: Hospital & Health Care
    Victim Organization: hospital universitario del valle
    Victim Site: huv.gov.co
  117. Alleged sale of data from TicketToGo
    Category: Data Breach
    Content: The threat actor claims to be leaked data from TicketToGo. The compromised data reportedly contain 20,000 customer records including names, phone numbers, email addresses, password hashes, birth dates, user roles, authentication tokens, confirmation tokens, and account creation dates.
    Date: 2026-03-10T03:16:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-MEXICO-20K-PERSONAL-CUSTOMER-INFORMATION-DATA-tickettogo-com-mx
    Screenshots:
    None
    Threat Actors: Shinchan
    Victim Country: Mexico
    Victim Industry: Entertainment & Movie Production
    Victim Organization: tickettogo
    Victim Site: tickettogo.com.mx
  118. Alleged Data Breach of Pompiers des Bouches-du-Rhône
    Category: Data Breach
    Content: The threat actor claims to have breached database of Pompiers des Bouches-du-Rhône.
    Date: 2026-03-10T03:08:12Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-SDIS13-POMPIER13
    Screenshots:
    None
    Threat Actors: 7ven
    Victim Country: France
    Victim Industry: Government Administration
    Victim Organization: sdis13 – service départemental d’incendie et de secours des bouches-du-rhône
    Victim Site: sdis13.fr
  119. Alleged Data breach of Instituto de Capacitación para el Trabajo del Estado de Sonora (ICATSON)
    Category: Data Breach
    Content: The threat actor claims to have leaked data from Instituto de Capacitación para el Trabajo del Estado de Sonora (ICATSON). The exposed data fields allegedly include Students records and much more information.
    Date: 2026-03-10T02:50:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-MEXICO-INSTITUTO-DE-CAPACITACI%C3%93N-PARA-EL-TRABAJO-DEL-ESTADO-DE-SONORA–68656
    Screenshots:
    None
    Threat Actors: Alz_157s
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: instituto de capacitación para el trabajo del estado de sonora (icatson)
    Victim Site: icatson.sonora.gob.mx
  120. Alleged Data breach of Naval Store Sub Depo Dhaka (NSSD) Bangladesh Navy
    Category: Data Breach
    Content: The threat actor claims to have leaked data from Naval Store Sub Depo Dhaka (NSSD) Bangladesh Navy. The exposed data fields allegedly include Name, Email ID, Address, Telephone, and much more information.
    Date: 2026-03-10T02:37:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-NSSD-Bangladesh-Navy-FULL-DATABASE-EXPORT-SQL-FILE
    Screenshots:
    None
    Threat Actors: Lei
    Victim Country: Bangladesh
    Victim Industry: Government & Public Sector
    Victim Organization: naval store sub depo dhaka (nssd) bangladesh navy
    Victim Site: nssd.navy.mil.bd
  121. Alleged data leak of South Kalimantan Provincial Government
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of South Kalimantan Provincial Government.
    Date: 2026-03-10T02:31:36Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/470
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: south kalimantan provincial government
    Victim Site: kalselprov.go.id
  122. Alleged data leak of North Kalimantan Regional Authority
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of North Kalimantan Regional Authority
    Date: 2026-03-10T02:27:21Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/471
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: north kalimantan regional authority
    Victim Site: kaltara.go.id
  123. Alleged data breach of Ministry of Infrastructure and Transport (MIT)
    Category: Data Breach
    Content: The group claims to have compromised systems of the Ministry of Infrastructure and Transport in Italy, allegedly exploiting security vulnerabilities in the current systems.
    Date: 2026-03-10T02:19:12Z
    Network: telegram
    Published URL: https://t.me/n2LP_wVf79c2YzM0/3891
    Screenshots:
    None
    Threat Actors: Infrastructure Destruction Squad
    Victim Country: Italy
    Victim Industry: Government & Public Sector
    Victim Organization: ministry of infrastructure and transport (mit)
    Victim Site: mit.gov.it
  124. Alleged data leak of Pemerintah Daerah Kabupaten Karawang
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Pemerintah Daerah Kabupaten Karawang.
    Date: 2026-03-10T02:16:41Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/464
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: pemerintah daerah kabupaten karawang
    Victim Site: karawangkab.go.id
  125. Alleged data leak of Braude Academic College of Engineering
    Category: Data Breach
    Content: Threat Actor claims to have leaked the login credentials of Braude Academic College of Engineering.
    Date: 2026-03-10T02:03:12Z
    Network: telegram
    Published URL: https://t.me/c/3427600175/595
    Screenshots:
    None
    Threat Actors: INDRAMAYU CHAOS SYSTEM
    Victim Country: Israel
    Victim Industry: Higher Education/Acadamia
    Victim Organization: braude academic college of engineering
    Victim Site: braude.ac.il
  126. Alleged Data Leak of Government Pension System in USA
    Category: Data Breach
    Content: Threat actor claims to be selling a dataset containing over 510,000 records of U.S. fullz, allegedly sourced from a government retirement or pension system. The exposed data fields reportedly include SSN, first name, last name, date of birth, and ZIP code.
    Date: 2026-03-10T02:01:51Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277931/
    Screenshots:
    None
    Threat Actors: agcash6
    Victim Country: USA
    Victim Industry: Government Relations
    Victim Organization: Unknown
    Victim Site: Unknown
  127. Alleged Data Breach of CAEFF
    Category: Data Breach
    Content: Threat actor claims to have leaked a SQL database associated with Instituto Técnico Superior – MEC, reportedly linked to the domain CAEFF caeff.com.py. The shared dataset is described as an SQL dump dated March 06, 2026, allegedly containing approximately 143,692 rows and around 1,000 email records. Sample data indicates fields such as user ID, username, email address, hashed password, remember token, full name, role permissions, department, and designation.
    Date: 2026-03-10T01:45:55Z
    Network: openweb
    Published URL: https://leakbase.bz/threads/caeff-com-py-leak.49259/
    Screenshots:
    None
    Threat Actors: frog
    Victim Country: Paraguay
    Victim Industry: Education
    Victim Organization: caeff
    Victim Site: caeff.com.py
  128. Moroccan Soldiers Claims to Target Unofficial Websites
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Unofficial Websites
    Date: 2026-03-10T01:45:23Z
    Network: telegram
    Published URL: https://t.me/MOROCCANSOLDIERS2/521
    Screenshots:
    None
    Threat Actors: Moroccan Soldiers
    Victim Country: Unknown
    Victim Industry: Information Technology (IT) Services
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Alleged sale of 100 USA credit cards records
    Category: Data Breach
    Content: Threat actor claims to be selling 100 credit card records from USA. The compromised data reportedly includes card number, month, year, cvv, first name, last name, telephone number, email etc.
    Date: 2026-03-10T00:36:08Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277911/
    Screenshots:
    None
    Threat Actors: urbsnv
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Alleged sale of unauthorized SSH and CRM access to hotel and wine shop
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized SSH and CRM access to unidentified hotel and wineshop in Sri Lanka.
    Date: 2026-03-10T00:16:17Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277926/
    Screenshots:
    None
    Threat Actors: williamblack
    Victim Country: Sri Lanka
    Victim Industry: Restaurants
    Victim Organization: Unknown
    Victim Site: Unknown