[March-11-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report details a series of recent cyber incidents, providing key information for each event, strictly based on the provided draft data. The dataset contains 87 distinct cybersecurity events recorded on March 11, 2026. The incidents span a global footprint, affecting multiple continents and industries. The primary attack vectors and incident categories identified include Data Breaches, Initial Access sales and claims, Website Defacements, targeted Alerts, and Malware deployment.

The data indicates a highly active threat landscape where both financially motivated actors (selling data and access) and ideologically/geopolitically motivated hacktivists (targeting specific nations like Israel, Iran, and the USA) are operating simultaneously. The exposure of sensitive medical records, classified government documents, and control over cyber-physical systems highlights the severe physical and privacy risks associated with these breaches.

2. Threat Landscape Analysis

2.1. Geographic Distribution of Victims

The cyber incidents recorded on this date show a wide geographic distribution, with certain nations experiencing concentrated targeting:

  • Israel: Israel was a highly targeted nation, facing numerous data breach claims, defacements, and direct alerts from threat actors. Threat actors specifically claiming to target Israel include Investigation Anonymous, Mysterious Team Bangladesh, Cardinal, Handala Hack, and Anonymous For Justice.
  • United States of America (USA): The USA faced significant data breaches and access sales, impacting companies like Aura Group, Inc., Staples, Peak Toolworks, Stryker, Verifone, and CareerLab.
  • Iran: Iran was specifically targeted by the “KTX TEAM,” which claimed multiple website defacements against Iranian media and event organizations.
  • Indonesia: Indonesian targets included government entities, banking, and human resources, with actors breaching the West Java Provincial Government, Magelang Regency Citizens, Bank Central Asia, and BSDM.
  • Europe: Multiple European nations were targeted, including France (CCTV access, Le Caillebotis Diamond, JDC, Région Occitanie) , Spain (IBAN data sale) , Austria (HB Brantner) , Poland (PrestaShop access) , Finland (Viking Line) , Italy (Cargo Bike Retailer) , and Germany (BMW).
  • Middle East & North Africa (MENA): Beyond Israel and Iran, incidents were recorded in the UAE (Ministry of Defense, defacements) , Tunisia (Ministry of Health, CVPT Education) , Saudi Arabia , and Morocco (CCTV access).

2.2. Categorical Breakdown of Incidents

The incidents can be categorized into the following primary types based on the threat actors’ claims:

  • Data Breaches (The overwhelming majority): Actors claimed to have stolen, leaked, or deleted data. Targets included government databases, corporate networks, and healthcare providers. Notably, some breaches involved massive datasets, such as the “SkyBase V2” leak allegedly containing over 5.08 billion records (4.47TB) aggregated from major past breaches like Facebook, Equifax, and LinkedIn.
  • Initial Access Brokers: Actors offered unauthorized access to various systems for sale or claimed to have established access. Examples include AWS SES SMTP Accounts , Brazilian Police Investigation Panels , South Korean government servers , and multiple e-commerce admin panels.
  • Defacement: Websites were visually altered by attackers. This was a common tactic for groups like KTX TEAM and L4663R666H05T.
  • Alerts: Threat actors issued public statements indicating their intent to target specific countries or organizations, such as the Middle East Observer targeting Gulf countries or Handala Hack targeting Stryker.
  • Malware: One specific instance of malware/downtime was recorded against the Cyprus Ports Authority by NoName057(16).

3. Threat Actor Profiling

Several threat actors and groups demonstrated high activity levels or significant claims on March 11, 2026:

3.1. Anonymous For Justice

This group engaged in a highly targeted, destructive campaign against Israeli organizations, consistently claiming to have “deleted data” rather than merely exfiltrating it.

  • Targets: Itzik Haimov Law Firm , Mommy Care , Ofikim , Highway 6 , Soha Zidan , and Shem Shaham (claiming 3 terabytes of deleted data).
  • Stated Intent: The group explicitly posted an alert indicating they are targeting Israel and the USA.

3.2. Handala Hack

Handala Hack claimed responsibility for several high-profile attacks, blending defacement and massive data breaches.

  • Key Incidents: * Claimed a large-scale cyberattack against Stryker (USA), alleging that over 200,000 systems and devices were wiped and approximately 50 terabytes of internal data were extracted, causing operational shutdowns.
    • Claimed a breach of Verifone (USA), alleging disruptions to payment systems and extraction of financial data.
    • Defaced the Academy of the Hebrew Language website (Israel).

3.3. KTX TEAM

This group focused entirely on defacing Iranian online infrastructure.

  • Targets: Iran International , Mehr News Agency , Iran Trade Fair , and Iran Telecom.

3.4. Whale Hunters Groups

A highly prolific group claiming data breaches and access leaks across diverse geographic locations.

  • Targets: Christian China Mission Holy Way School (China) , Breathalyzers in Moscow (Russia) , İstihdam Ofis (Turkey) , ACME Silver & Gold Jewellery Manufactory (China) , and an unspecified leak of Saudi Arabia data.

3.5. Initial Access Brokers (Various)

Multiple actors operated as Initial Access Brokers, selling footholds into corporate and government networks:

  • JamieQuinn: Selling AWS SES SMTP Accounts with limits up to 10 million.
  • edr & kodexseller: Both actors claimed to sell unauthorized access to a law enforcement investigation platform linked to the Civil Police of the State of São Paulo (Brazil).
  • zSenior: Claimed unauthorized access to a South Korea Government server, pivoting to 42 internal hosts and gaining PostgreSQL SuperUser access.

4. Sector-Specific Incident Review

4.1. Government and Public Sector

Government entities were prime targets for data exfiltration and access brokering.

  • UAE Ministry of Defense: “JRINTEL FREE DATA V3” claimed to leak classified documents from the Cyber Center.
  • Yucatán Government (Mexico): Two separate actors (“wht” and “frog”) claimed breaches involving the yucatan.gob.mx domain. The leaked data reportedly contains patient medical information, including CURP numbers, diagnoses, and personal identifiers.
  • Tunisian Government: “dark07xxxx” and “DARK 07x” claimed breaches of the domain rns.tn and specifically the Ministry of Health, leaking database information.
  • Indonesian Local Government: “CyznetAdel” claimed a breach of Magelang Regency Citizens’ data (NIK, names, addresses) , while “BabayoErorSystem” claimed to leak 37,350 records from the West Java Provincial Government.
  • French Ministry of Armed Forces: Actor “7ven” claimed to breach the Journée Défense et Citoyenneté (JDC) program, exposing personal info of French users.
  • National Public Database: Actor “debian” claimed to leak a 50GB dataset from an unknown national public database.

4.2. Healthcare and Medical Data Exposure

The exposure of Protected Health Information (PHI) was a recurring and critical theme.

  • Yucatán Government Health System: As noted, medical records including diagnoses and prescriptions were leaked.
  • Unidentified US Gastroenterology Clinic: “StealMan” claimed to leak 167,000 patient medical records, including SSNs, DOBs, and diagnoses.
  • Tunisian Ministry of Public Health: Databases were allegedly accessed by multiple threat actors.

4.3. Cyber-Physical Systems and IoT

A highly concerning trend in the data is the unauthorized access to cyber-physical systems, allowing threat actors to manipulate real-world environments.

  • Romanian Smart Home: “Z-PENTEST ALLIANCE” claimed full control over a smart home management system in Romania. The actor reported the ability to remotely adjust heating, lighting, ventilation, and window blinds across multiple zones of the residence.
  • Ukrainian Industrial Refrigeration: “NoName057(16)” claimed access to an industrial refrigeration climate control system in Ukraine. They alleged visibility and control over compressors, fans, humidifiers, and temperature settings, stating the ability to manually manage cooling which could affect temperature-sensitive goods.
  • CCTV Systems: Unauthorized access to CCTV systems was claimed in France (by MORNING STAR) and Morocco (by BlackMaskers Army).

4.4. Corporate, Financial, and Retail

Financially motivated attacks targeted corporate data, consumer PII, and financial infrastructure.

  • Aura Group, Inc.: ShinyHunters claimed to compromise over 2 million records containing PII and internal corporate data.
  • Staples: CoinbaseCartel claimed a breach of the Staples database.
  • Financial Data Sales: Actors sold credit card records from Australia (500 records) and Europe (373 records) , as well as a Spanish database containing 8.15 million records with IBANs. Verified trading accounts with sensitive KYC documents (IDs, proof of residence) and $140,000 in equity were also offered for sale.
  • Manufacturing and Automotive: Alleged breaches impacted BMW (internal data leaked by IntelChipX) , HB Brantner (confidential technical drawings and engineering docs) , and Peak Toolworks.
  • Telecommunications: A massive dataset containing 18,653,476 WhatsApp phone numbers belonging to Indian citizens was allegedly leaked by CyznetAdel.

5. Strategic Geopolitical Threats & Alerts

The dataset features several proactive alerts and targeting claims by hacktivist groups, highlighting the intersection of geopolitics and cybersecurity:

  • Anti-Israel Campaigns: Multiple groups issued alerts targeting Israel. “Investigation Anonymous” , “Mysterious Team Bangladesh” , “Cardinal” , and “Anonymous For Justice” all explicitly stated their intent to attack Israeli infrastructure. “Cardinal” additionally claimed to leak a document containing names, call signs, and positions of Israeli service personnel.
  • Middle East Targeting: The “Middle East Observer” issued an alert targeting four Gulf countries: Bahrain, Saudi Arabia, the UAE, and Kuwait. Furthermore, “mehwargun” claimed to target an Iranian bank, as well as Google, Microsoft, and Nvidia infrastructure in the Middle East.

6. Conclusion

Based strictly on the provided draft data from March 11, 2026, the cybersecurity landscape is characterized by a high volume of diverse and severe threats. The data reveals a dual-threat environment: highly motivated hacktivist groups conducting disruptive operations and defacements (particularly focused on Middle Eastern geopolitical tensions involving Israel and Iran) , operating alongside sophisticated cybercriminal entities focused on data theft and initial access brokering.

The most critical risks identified in this report include the exposure of sensitive medical and government databases (such as those in the UAE, Mexico, and Tunisia) , and the alarming compromise of cyber-physical systems (HVAC and refrigeration controls in Romania and Ukraine), which bridge the gap between digital intrusion and real-world physical consequences. The aggregation of massive datasets, exemplified by the 5 billion-record SkyBase V2 leak, further demonstrates the compounding risk of historical data breaches. Organizations across all sectors—particularly Government, Healthcare, and Manufacturing—must recognize that both their proprietary data and their physical operational technology are actively being targeted and traded on open and dark web forums.

Detected Incidents Draft Data

  1. Alleged leak of UAE Ministry of Defense Cyber Center
    Category: Data Breach
    Content: The group claims to have leaked data from classified documents from UAE Ministry of Defense Cyber Center.
    Date: 2026-03-11T23:27:18Z
    Network: telegram
    Published URL: https://t.me/topsecretdocumentsleaked/234
    Screenshots:
    None
    Threat Actors: JRINTEL FREE DATA V3
    Victim Country: UAE
    Victim Industry: Government Administration
    Victim Organization: uae ministry of defense cyber center
    Victim Site: mod.gov.ae
  2. Alleged data breach of Aura Group, Inc.
    Category: Data Breach
    Content: A threat actor claims to have compromised the systems of Aura Group, Inc., alleging that over 2 million records containing personally identifiable information (PII) and internal corporate data have been obtained.
    Date: 2026-03-11T22:04:19Z
    Network: tor
    Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
    Screenshots:
    None
    Threat Actors: ShinyHunters
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: aura group, inc.
    Victim Site: auragrp.com
  3. InDoM1nus Team targets the website of BSDM
    Category: Defacement
    Content: The group claims to have defaced the website of BSDM.
    Date: 2026-03-11T21:51:15Z
    Network: telegram
    Published URL: https://t.me/InDoM1nusTe4m/106
    Screenshots:
    None
    Threat Actors: InDoM1nus Team
    Victim Country: Indonesia
    Victim Industry: Human Resources
    Victim Organization: bsdm
    Victim Site: bsdm.co.id
  4. Alleged data breach of Yucatán Government Health System
    Category: Data Breach
    Content: A threat actor claims to have leaked medical records from systems associated with the Yucatán government domain (yucatan.gob.mx). The exposed data patient medical information, including personal identifiers, names, CURP numbers, birth dates, gender, addresses, consultation details, diagnoses, prescriptions, and healthcare provider information.
    Date: 2026-03-11T21:39:09Z
    Network: openweb
    Published URL: https://hydraforums.io/Threads-mexico-medical-records-yucatan-gob-mx
    Screenshots:
    None
    Threat Actors: wht
    Victim Country: Mexico
    Victim Industry: Hospital & Health Care
    Victim Organization: yucatán government health system
    Victim Site: yucatan.gob.mx
  5. Allleged data leak of National Public Database
    Category: Data Breach
    Content: The threat actor claims to have leaked a 50GB dataset from a national public database.
    Date: 2026-03-11T21:17:27Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-National-Public-Database-50GiB
    Screenshots:
    None
    Threat Actors: debian
    Victim Country: Unknown
    Victim Industry: Government & Public Sector
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Alleged data breach of Tunisian Ministry of Health
    Category: Data Breach
    Content: A threat actor claims to have breached the government domain rns.tn, which is reportedly associated with the Tunisian Ministry of Health and its affiliated institutions.
    Date: 2026-03-11T21:10:46Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-Breach-Statement-Tunisian-Government-Domain-rns-tn
    Screenshots:
    None
    Threat Actors: dark07xxxx
    Victim Country: Tunisia
    Victim Industry: Government & Public Sector
    Victim Organization: tunisian ministry of health
    Victim Site: rns.tn
  7. Alleged Data Breach of Government of Yucatán
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Government of Yucatán in Mexico. The dataset contains medical records and is provided in JSON format dated March 2026. The data includes two files, one containing 15,529 user records and another containing 6,943 rows of data.
    Date: 2026-03-11T20:54:18Z
    Network: openweb
    Published URL: https://leakbase.bz/threads/mexico-medical-records-yucatan-gob-mx.49274/
    Screenshots:
    None
    Threat Actors: frog
    Victim Country: Mexico
    Victim Industry: Government Administration
    Victim Organization: government of yucatán
    Victim Site: yucatan.gob.mx
  8. Alleged data breach of Staples
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Staples.
    Date: 2026-03-11T20:44:56Z
    Network: tor
    Published URL: http://fjg4zi4opkxkvdz7mvwp7h6goe4tcby3hhkrz43pht4j3vakhy75znyd.onion/companies/staples
    Screenshots:
    None
    Threat Actors: CoinbaseCartel
    Victim Country: USA
    Victim Industry: Retail Industry
    Victim Organization: staples
    Victim Site: staples.com
  9. Alleged Sale of Unauthorized Multiple Access to an Unidentified PrestaShop in Poland
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to a PrestaShop-based website located in Poland. The access includes shell access, MySQL database access, and administrator privileges. It also includes several PrestaShop payment modules, including Przelewy24, CashOnDelivery, WirePayment, and x13allegro, along with associated transaction counts from different months.
    Date: 2026-03-11T20:36:40Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278095/
    Screenshots:
    None
    Threat Actors: marcomouly
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged Data Breach of Ministry of Public Health
    Category: Data Breach
    Content: The group claims to have accessed database of the Tunisian government domain, Ministry of Public Health.
    Date: 2026-03-11T20:21:38Z
    Network: telegram
    Published URL: https://t.me/DarK07xxxxxxx/1708
    Screenshots:
    None
    Threat Actors: DARK 07x
    Victim Country: Tunisia
    Victim Industry: Hospital & Health Care
    Victim Organization: ministry of public health
    Victim Site: santetunisie.rns.tn
  11. Alleged data leak of Peleg, Sharon & Co
    Category: Data Breach
    Content: The group claim to have gained 2 TB of data from Peleg, Sharon & Co.
    Date: 2026-03-11T20:17:03Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/22
    Screenshots:
    None
    Threat Actors: Investigation Anonymous
    Victim Country: Israel
    Victim Industry: Law Practice & Law Firms
    Victim Organization: peleg, sharon & co
    Victim Site: Unknown
  12. Alleged unauthorized access to unidentified CCTV Systems in France
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to unidentified CCTV Systems in France.
    Date: 2026-03-11T20:03:28Z
    Network: telegram
    Published URL: https://t.me/op_morningstar/523
    Screenshots:
    None
    Threat Actors: MORNING STAR
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Alleged access to MunicipalNET
    Category: Initial Access
    Content: The group claims to have gained access to MunicipalNET.
    Date: 2026-03-11T19:46:47Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/76
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Brazil
    Victim Industry: Government Administration
    Victim Organization: municipalnet
    Victim Site: municipalnet.com.br
  14. Alleged unauthorized access to an unidentified smart home management system in Romania
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a smart home management system in Romania, allegedly obtaining full control over components responsible for heating, lighting, ventilation, and window blinds across multiple zones of the residence. According to the statement, the actor reports the ability to adjust temperature settings, manipulate lighting parameters, control blinds, and operate ventilation systems remotely while navigating between different floors and rooms.
    Date: 2026-03-11T19:36:50Z
    Network: telegram
    Published URL: https://t.me/c/3792806777/16
    Screenshots:
    None
    Threat Actors: Z-PENTEST ALLIANCE
    Victim Country: Romania
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Alleged data breach of AIBuilderClub
    Category: Data Breach
    Content: A threat actor claims to have leaked the database of AIBuilderClub. The exposed dataset reportedly contains several types of user information, including email addresses, full names, user IDs (UIDs), profile images, customer IDs, price IDs, account creation and update timestamps, metadata, and access status fields.
    Date: 2026-03-11T19:31:43Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-AIBuilderClub-com-Database
    Screenshots:
    None
    Threat Actors: korea
    Victim Country: USA
    Victim Industry: Information Technology (IT) Services
    Victim Organization: aibuilderclub
    Victim Site: aibuilderclub.com
  16. Alleged Data Breach of Christian China Mission Holy Way School
    Category: Data Breach
    Content: The group claims to have obtained database access and leaked admin credentials to Christian China Mission Holy Way School.
    Date: 2026-03-11T19:27:38Z
    Network: telegram
    Published URL: https://t.me/c/3772103374/3218
    Screenshots:
    None
    Threat Actors: Whale Hunters Groups
    Victim Country: China
    Victim Industry: Education
    Victim Organization: christian china mission holy way school
    Victim Site: holyword.edu.hk
  17. Alleged Data Leak of SkyBase V2 Database
    Category: Data Breach
    Content: A threat actor claims to have leaked SkyBase V2, a 4.47TB dataset. which includes over 5.08 billion records and a main text file containing 25 million+ lines of aggregated data. The dataset allegedly compiles data from several major breaches, including Ashley Madison, Equifax, Facebook, Marriott International, Yahoo, Adobe, eBay, LinkedIn, MyFitnessPal, Canva, and Dubsmash.
    Date: 2026-03-11T19:26:01Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-SkybaseV2-4-47-TB
    Screenshots:
    None
    Threat Actors: The1F
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Alleged Data Leak of Breathalyzers in Moscow
    Category: Data Breach
    Content: The group claims to have leaked data which includes phone numbers, email addresses, FIO from Breathalyzers in Moscow.
    Date: 2026-03-11T19:22:41Z
    Network: telegram
    Published URL: https://t.me/c/3772103374/3204
    Screenshots:
    None
    Threat Actors: Whale Hunters Groups
    Victim Country: Russia
    Victim Industry: Retail Industry
    Victim Organization: breathalyzers in moscow
    Victim Site: alkotestery.ru
  19. Investigation Anonymous claims to target Israel
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Israel.
    Date: 2026-03-11T19:19:47Z
    Network: telegram
    Published URL: https://t.me/investigationAnonYmous0/13304
    Screenshots:
    None
    Threat Actors: Investigation Anonymous
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Alleged data breach of İstihdam Ofis
    Category: Data Breach
    Content: The group claims to have breached the database of İstihdam Ofis.
    Date: 2026-03-11T18:50:05Z
    Network: telegram
    Published URL: https://t.me/c/3772103374/3235
    Screenshots:
    None
    Threat Actors: Whale Hunters Groups
    Victim Country: Turkey
    Victim Industry: Staffing/Recruiting
    Victim Organization: istihdam ofis
    Victim Site: stihdamofisi.net
  21. Alleged admin access to ACME Silver & Gold Jewellery Manufactory (China) Limited
    Category: Initial Access
    Content: The group claims to have leaked admin credentials to ACME Silver & Gold Jewellery Manufactory (China) Limited.
    Date: 2026-03-11T18:46:20Z
    Network: telegram
    Published URL: https://t.me/c/3772103374/3219
    Screenshots:
    None
    Threat Actors: Whale Hunters Groups
    Victim Country: China
    Victim Industry: Luxury Goods & Jewelry
    Victim Organization: acme silver & gold jewellery manufactory (china) limited
    Victim Site: acmejewels.com.hk
  22. Mysterious Team Bangladesh claims to target Israel
    Category: Alert
    Content: A recent post by the group indicates that they are targeting online infrastructures of Israel.
    Date: 2026-03-11T18:37:21Z
    Network: telegram
    Published URL: https://t.me/MysteriousTeamO/31
    Screenshots:
    None
    Threat Actors: Mysterious Team Bangladesh
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Alleged leak of Saudi Arabia data
    Category: Data Breach
    Content: The group claims to have leaked data belonging to Saudi Arabia.
    Date: 2026-03-11T18:31:33Z
    Network: telegram
    Published URL: https://t.me/c/3772103374/3215
    Screenshots:
    None
    Threat Actors: Whale Hunters Groups
    Victim Country: Saudi Arabia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Handala Hack claims to target
    Category: Alert
    Content: A recent post by the group indicates that they targeting Stryker.
    Date: 2026-03-11T18:09:37Z
    Network: telegram
    Published URL: https://t.me/HANDALA_HPR2/47
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Medical Equipment Manufacturing
    Victim Organization: stryker
    Victim Site: stryker.com
  25. Alleged Sale of AWS SES SMTP Accounts
    Category: Initial Access
    Content: Threat Actor claims to be selling AWS SES SMTP Accounts. They provide accounts with random or unknown limits, as well as specific limits starting from 50,000 emails and higher, including 100,000, 200,000, 1 million, and up to 10 million sending limits.
    Date: 2026-03-11T18:08:44Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278071/
    Screenshots:
    None
    Threat Actors: JamieQuinn
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  26. KTX TEAM targets the website of Iran International
    Category: Defacement
    Content: The group claims to have defaced the website of Iran International .
    Date: 2026-03-11T17:41:59Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41604372
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Online Publishing
    Victim Organization: iran international
    Victim Site: iranintl.com/en
  27. Alleged access to Acacia Consulting & Research
    Category: Initial Access
    Content: The group claims to have leaked access to Acacia Consulting & Research.
    Date: 2026-03-11T17:41:56Z
    Network: telegram
    Published URL: https://t.me/Rakyat_DigitalCrew/75
    Screenshots:
    None
    Threat Actors: Rakyat Digital Crew
    Victim Country: Canada
    Victim Industry: Research Industry
    Victim Organization: acacia consulting & research
    Victim Site: acaciaconsulting.ca
  28. Alleged Sale of Unauthorized Sitrix and VPN Access to an Unidentified Company in USA
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized access to an unidentified company in USA. The access allegedly includes Sitrix and VPN entry points.
    Date: 2026-03-11T17:33:30Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278077/
    Screenshots:
    None
    Threat Actors: SantaAd
    Victim Country: USA
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. KTX TEAM targets the website of Mehr News Agency
    Category: Defacement
    Content: The group claims to have defaced the website of Mehr News Agency.
    Date: 2026-03-11T17:33:01Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41604371
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Online Publishing
    Victim Organization: mehr news agency
    Victim Site: tr.mehrnews.com
  30. Alleged Sale of Business Corporate Data Leads from Netherlands and Belgium
    Category: Data Breach
    Content: Threat Actor claims to be selling fresh 2025 business datasets from the Netherlands and Belgium, covering companies across more than 10 business sectors. The dataset allegedly includes company name, full address (street, postcode, city, state, country), email address, website, phone and mobile numbers, CEO or company leader name, latest reported annual revenue, number of employees, legal company form, year established, financial holding status, eco activity status, and main business activity or sector.
    Date: 2026-03-11T17:24:00Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278067/
    Screenshots:
    None
    Threat Actors: bootje167
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Alleged data leak of 18.6 Million WhatsApp Numbers of Indian Citizens
    Category: Data Breach
    Content: A threat actor claims to have leaked a dataset containing 18,653,476 WhatsApp phone numbers belonging to Indian citizens.
    Date: 2026-03-11T16:51:24Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-18-653-476-WhatsApp-Numbers-of-Indian-Citizens-have-been-leaked-by-Adellnism
    Screenshots:
    None
    Threat Actors: CyznetAdel
    Victim Country: India
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. KTX TEAM targets the website of Iran Trade Fair
    Category: Defacement
    Content: The group claims to have defaced the website of Iran Trade Fair.
    Date: 2026-03-11T16:49:46Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41604376
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Events Services
    Victim Organization: iran trade fair
    Victim Site: irantradefair.com/iran-telecom
  33. KTX TEAM targets the website of Iran Telecom
    Category: Defacement
    Content: The group claims to have defaced the website of Iran Telecom
    Date: 2026-03-11T16:42:48Z
    Network: openweb
    Published URL: https://www.zone-h.org/mirror/id/41604377
    Screenshots:
    None
    Threat Actors: KTX TEAM
    Victim Country: Iran
    Victim Industry: Network & Telecommunications
    Victim Organization: iran telecom
    Victim Site: iran-telecom.info
  34. Alleged Sale of Unauthorized Magento Admin Access in Netherlands
    Category: Initial Access
    Content: Threat Actor claims to be selling unauthorized Magento admin access in Netherlands.
    Date: 2026-03-11T16:40:32Z
    Network: openweb
    Published URL: https://forum.exploit.biz/topic/278066/
    Screenshots:
    None
    Threat Actors: hubert
    Victim Country: Netherlands
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Alleged data leak of Verifone
    Category: Data Breach
    Content: The group claims to have breached Verifone, a global provider of payment solutions and point-of-sale (POS) terminals. The group alleges that the compromise caused disruptions to payment systems and terminals and that transaction-related and financial data associated with the company’s infrastructure was extracted.
    Date: 2026-03-11T16:18:30Z
    Network: openweb
    Published URL: https://handala-hack.to/verifone-hacked/
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Financial Services
    Victim Organization: verifone
    Victim Site: verifone.com
  36. Alleged data breach of HB Brantner
    Category: Data Breach
    Content: Threat Actor claims to have breached the database of Hans Brantner & Sohn Fahrzeugbaugesellschaft m.b.H. in Austria. The exposed data reportedly includes customer records, internal correspondence, vehicle documentation, non-disclosure agreements, confidential technical drawings, engineering documentation, and other corporate materials related to agricultural transport trailers and equipment manufacturing
    Date: 2026-03-11T14:59:30Z
    Network: tor
    Published URL: http://nleakk6sejx45jxtk7x6iyt65hwvfrkifc5v7ertdlwm3gttbpvlvxqd.onion/view_article.php?article=QZjdSV4DYe8UEAUi4LXjEq7mx6tQv0M05SJtPkU7l4lkPaVvEjVpbURzgV4R1WP7
    Screenshots:
    None
    Threat Actors: Leaknet
    Victim Country: Austria
    Victim Industry: Machinery Manufacturing
    Victim Organization: hb brantner
    Victim Site: hb-brantner.at
  37. Alleged data breach of Viking Line
    Category: Data Breach
    Content: A threat actor claims to have leaked data allegedly belonging to Viking Line Ferries. the dataset reportedly contains a database with travelers’ personal information, including passenger details and vehicle registration plates.
    Date: 2026-03-11T14:46:18Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-FI-Viking-Line-Ferries–191050
    Screenshots:
    None
    Threat Actors: bytetobreach
    Victim Country: Finland
    Victim Industry: Transportation & Logistics
    Victim Organization: viking line
    Victim Site: vikingline.com
  38. Alleged Unauthorized Access to CVPT Education
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to CVPT Education.
    Date: 2026-03-11T14:11:35Z
    Network: telegram
    Published URL: https://t.me/firewirBackupChannel/226
    Screenshots:
    None
    Threat Actors: Fire Wire
    Victim Country: Tunisia
    Victim Industry: Professional Training
    Victim Organization: cvpt education
    Victim Site: education.cvpt.tn
  39. Alleged leak of document on Israeli service personnel
    Category: Data Breach
    Content: The threat actor claims to have obtained a document allegedly containing detailed information on individuals described as Israeli service personnel. The document reportedly includes names, call signs, workplaces, positions, contact details, and additional personal data.
    Date: 2026-03-11T14:05:07Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/355
    Screenshots:
    None
    Threat Actors: Cardinal
    Victim Country: Israel
    Victim Industry: Military Industry
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Alleged data breach of Peak Toolworks
    Category: Data Breach
    Content: The threat actor claims to have breached data from Peak Toolworks and intends to publish it within 1-2 days.
    Date: 2026-03-11T13:54:50Z
    Network: tor
    Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/4402916269/overview
    Screenshots:
    None
    Threat Actors: Worldleaks
    Victim Country: USA
    Victim Industry: Manufacturing & Industrial Products
    Victim Organization: peak toolworks
    Victim Site: peaktoolworks.com
  41. Alleged data breach of Stryker
    Category: Data Breach
    Content: The threat actor claims to have conducted a large-scale cyberattack against Stryker, alleging that over 200,000 systems and devices were wiped and approximately 50 terabytes of internal data were extracted. The actor asserts that the breach forced operational shutdowns across Stryker’s global offices.
    Date: 2026-03-11T13:44:39Z
    Network: openweb
    Published URL: https://handala-hack.to/stryker-corporation-hacked/
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: USA
    Victim Industry: Medical Equipment Manufacturing
    Victim Organization: stryker
    Victim Site: stryker.com
  42. Alleged data breach of Itzik Haimov Law Firm
    Category: Data Breach
    Content: Group claims to have deleted data from the systems of Itzik Haimov Law Firm.
    Date: 2026-03-11T13:22:09Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/20
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Law Practice & Law Firms
    Victim Organization: itzik haimov law firm
    Victim Site: Unknown
  43. Alleged data breach of Mommy Care
    Category: Data Breach
    Content: Group claims to have deleted data from the systems of Mommy Care.
    Date: 2026-03-11T13:15:42Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/21
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: mommy care
    Victim Site: Unknown
  44. Alleged data breach of Ofikim
    Category: Data Breach
    Content: Group claims to have deleted data from the systems of Ofikim.
    Date: 2026-03-11T13:14:34Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/19
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Human Resources
    Victim Organization: ofikim
    Victim Site: Unknown
  45. Alleged data breach of LakMobile Technology
    Category: Data Breach
    Content: The threat actor claims to have breached the source codes from LakMobile Technology.
    Date: 2026-03-11T12:54:27Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SOURCE-CODE-Lakmobile-com-Data-Breach-Leaked-Download
    Screenshots:
    None
    Threat Actors: 888
    Victim Country: Sri Lanka
    Victim Industry: Information Technology (IT) Services
    Victim Organization: lakmobile technology
    Victim Site: lakmobile.com
  46. Alleged Unauthorized Access to Industrial Refrigeration Climate Control System in Ukraine
    Category: Initial Access
    Content: The group claims to have accessed an industrial refrigeration chamber climate control system in Ukraine developed by M.A.S. Systems, reportedly gaining visibility into and control over compressors, fans, humidifiers, ventilation, and temperature and humidity settings. They allege the ability to modify operational parameters and manually manage cooling and air exchange processes, which could affect the storage conditions of temperature-sensitive goods.
    Date: 2026-03-11T12:53:58Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2826
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Ukraine
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Cyber ​​Islamic resistance targets the website of Vegan Recipes
    Category: Defacement
    Content: The group claims to have defaced the website of Vegan Recipes.
    Date: 2026-03-11T12:20:46Z
    Network: telegram
    Published URL: https://t.me/CIR48/1699
    Screenshots:
    None
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Unknown
    Victim Industry: Food & Beverages
    Victim Organization: vegan recipes
    Victim Site: veganrecipes101.com
  48. Cyber ​​Islamic resistance targets the website of PAKTOTO
    Category: Defacement
    Content: The group claims to have defaced the website of PAKTOTO
    Date: 2026-03-11T12:09:08Z
    Network: telegram
    Published URL: https://t.me/CIR48/1699
    Screenshots:
    None
    Threat Actors: Cyber ​​Islamic resistance
    Victim Country: Unknown
    Victim Industry: Gaming
    Victim Organization: paktoto
    Victim Site: diamondfinancepvt.com
  49. Alleged Sale of Corporate Access data
    Category: Data Breach
    Content: The threat actor claims to be selling unauthorized access and internal data from multiple companies across Spain, the UK, Brazil, Guatemala, Mexico, and India, including developer repositories, SSO configurations, and customer databases.
    Date: 2026-03-11T11:58:49Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/278049/
    Screenshots:
    None
    Threat Actors: BugMakeSoap
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Alleged data breach of Magelang Regency Citizens
    Category: Data Breach
    Content: The threat actor claims to have breached citizens data belonging to residents of Magelang Regency. The dataset allegedly include National Identification Numbers (NIK), full names, addresses, marital status, occupations, and other demographic details.
    Date: 2026-03-11T11:43:27Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-DATABASE-DATA-WARGA-KABUPATEN-MAGELANG
    Screenshots:
    None
    Threat Actors: CyznetAdel
    Victim Country: Indonesia
    Victim Industry: Government Administration
    Victim Organization: magelang regency government
    Victim Site: magelangkab.go.id
  51. Alleged unauthorized access to south korea government server
    Category: Initial Access
    Content: The threat actor claims have gained unauthorized access to South Korea Govt server, pivoted to 42 internal hosts, gained PostgreSQL SuperUser access on 192.168.0.147, exposing PII. Claims RCE access on other internal systems.
    Date: 2026-03-11T11:32:55Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-South-Korea-Gov-Root-Access-Lateral-Movement
    Screenshots:
    None
    Threat Actors: zSenior
    Victim Country: South Korea
    Victim Industry: Government Administration
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Alleged sale of verified trading accounts
    Category: Data Breach
    Content: The threat actor claims to be selling a collection of verified trading accounts with a reported total equity of $140,000. the leak allegedly contains sensitive KYC docs for account holders, including names, DOBs, mobile numbers, and scans of IDs and proof of residence.
    Date: 2026-03-11T11:13:52Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-547-Verified-Trading-Accounts-%E2%80%93-140K-Total-Equity
    Screenshots:
    None
    Threat Actors: FFFV
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Cardinal claims to target Israel
    Category: Alert
    Content: A recent post by the group indicating that they are targeting Israel.
    Date: 2026-03-11T10:47:49Z
    Network: telegram
    Published URL: https://t.me/c/2869875394/354
    Screenshots:
    None
    Threat Actors: Cardinal
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Alleged sale of low-authority websites list
    Category: Cyber Attack
    Content: The group claims to be selling a list of low-authority websites likely intended for use in future cyberattacks.
    Date: 2026-03-11T10:20:33Z
    Network: telegram
    Published URL: https://t.me/phteammarket/335
    Screenshots:
    None
    Threat Actors: Pharaohs Team market
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  55. INDOHAXSEC targets the website of CareerLab
    Category: Defacement
    Content: The group claims to have defaced the website of CareerLab.
    Date: 2026-03-11T09:48:08Z
    Network: telegram
    Published URL: https://t.me/IndoHaxSec3/70
    Screenshots:
    None
    Threat Actors: INDOHAXSEC
    Victim Country: USA
    Victim Industry: Professional Training
    Victim Organization: careerlab
    Victim Site: careerlab.com
  56. Handala Hack targts the website of Academy of the Hebrew Language
    Category: Defacement
    Content: Group claims to have defaced the website of Academy of the Hebrew Language.
    Date: 2026-03-11T09:43:47Z
    Network: telegram
    Published URL: https://t.me/HANDALA_HPR2/27
    Screenshots:
    None
    Threat Actors: Handala Hack
    Victim Country: Israel
    Victim Industry: Education
    Victim Organization: academy of the hebrew language
    Victim Site: hebrew-academy.org.il
  57. Alleged unauthorized access to Unidentified CCTV of Moroccan home
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to Unidentified CCTV of Moroccan home.
    Date: 2026-03-11T09:12:05Z
    Network: telegram
    Published URL: https://t.me/TheBlackMaskers/288
    Screenshots:
    None
    Threat Actors: BlackMaskers Army
    Victim Country: Morocco
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  58. L4663R666H05T targets the website of Bevarabia UAE
    Category: Defacement
    Content: The group claims to have defaced the website of Bevarabia UAE.
    Date: 2026-03-11T08:41:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/809069
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Food & Beverages
    Victim Organization: bevarabia uae
    Victim Site: uae.bevarabia.com
  59. Anonymous For Justice claims to target Israel and USA
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Israel and USA.
    Date: 2026-03-11T08:38:06Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/14
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  60. L4663R666H05T targets the website of Vapes UAE
    Category: Defacement
    Content: The group claims to have defaced the website of Vapes UAE.
    Date: 2026-03-11T08:36:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/808924
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: E-commerce & Online Stores
    Victim Organization: vapes uae
    Victim Site: vapesuae.com
  61. Alleged data breach of Highway 6
    Category: Data Breach
    Content: Group claims to have deleted data from the systems of Highway 6.
    Date: 2026-03-11T08:27:21Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/16
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Transportation & Logistics
    Victim Organization: highway 6
    Victim Site: Unknown
  62. Alleged sale of unauthorized access to Civil Police of the State of São Paulo
    Category: Initial Access
    Content: The threat actor claims to be selling alleged full-access credentials to a law enforcement investigation platform linked to the Civil Police of the State of São Paulo, including internal VPN access, an institutional webmail account.
    Date: 2026-03-11T08:23:00Z
    Network: openweb
    Published URL: https://breached.st/threads/full-access-investigation-brazilian-police-panel-law-enforcement-webmail.1164/
    Screenshots:
    None
    Threat Actors: edr
    Victim Country: Brazil
    Victim Industry: Government Administration
    Victim Organization: civil police of the state of são paulo
    Victim Site: policiacivil.sp.gov.br
  63. Alleged data breach of Soha Zidan
    Category: Data Breach
    Content: Group claims to have deleted data from the systems of Soha Zidan.
    Date: 2026-03-11T08:19:50Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/17
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: soha zidan
    Victim Site: Unknown
  64. Alleged data breach of Shem Shaham
    Category: Data Breach
    Content: The group claims to have deleted 3 terabytes of data from the systems of Shem Shaham.
    Date: 2026-03-11T08:10:46Z
    Network: telegram
    Published URL: https://t.me/Anon_Israel35/18
    Screenshots:
    None
    Threat Actors: Anonymous For Justice
    Victim Country: Israel
    Victim Industry: Accounting
    Victim Organization: shem shaham
    Victim Site: Unknown
  65. NoName targets the website of Cyprus Ports Authority
    Category: Malware
    Content: Proof of downtime: http://check-host.net/check-report/3b784fcak404
    Date: 2026-03-11T07:47:52Z
    Network: telegram
    Published URL: https://t.me/c/2787466017/2817
    Screenshots:
    None
    Threat Actors: NoName057(16)
    Victim Country: Cyprus
    Victim Industry: Government Administration
    Victim Organization: cyprus ports authority
    Victim Site: cpa.gov.cy
  66. Alleged sale of IBAN data from Spain
    Category: Data Breach
    Content: The threat actor claims to be selling data from Spain. Dataset includes 8.15 million records of names, addresses, phone numbers, emails, IBANs, and financial institution operating.
    Date: 2026-03-11T07:43:38Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-LEADS-IBAN-SPAIN
    Screenshots:
    None
    Threat Actors: injectioninferno
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  67. Alleged data breach of Palestine Memory
    Category: Data Breach
    Content: The threat actor claims to have breached a 172.8 GB database archive allegedly belonging to the Palestine Memory Project, reportedly containing archival materials documenting the history of Palestine, including documents, memoirs, correspondence, photographs, and publications spanning from the early 1900s to the present.
    Date: 2026-03-11T07:30:59Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-PS-IL-172-8-GB-palestine-memory-org-Full-Archive-Since-1900s
    Screenshots:
    None
    Threat Actors: CVDEAD
    Victim Country: Unknown
    Victim Industry: Non-profit & Social Organizations
    Victim Organization: palestine memory
    Victim Site: palestine-memory.org
  68. L4663R666H05T targets the website of SYS LLC
    Category: Defacement
    Content: The group claims to have defaced the website of SYS LLC
    Date: 2026-03-11T07:23:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/809539
    Screenshots:
    None
    Threat Actors: L4663R666H05T
    Victim Country: UAE
    Victim Industry: Other Industry
    Victim Organization: sys llc
    Victim Site: sysllc.ae
  69. Alleged Data breach of Bank Central Asia (BCA)
    Category: Data Breach
    Content: The threat actor claims to have leaked data from Bank Central Asia (BCA). The compromised data reportedly contains 1,753 records, The exposed data fields allegedly include ID, password, password (hash), username, domain, phone, email information.
    Date: 2026-03-11T06:11:16Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-ID-1k-BCA-accounts
    Screenshots:
    None
    Threat Actors: VFVCT
    Victim Country: Indonesia
    Victim Industry: Banking & Mortgage
    Victim Organization: bank central asia (bca)
    Victim Site: bca.co.id
  70. Middle East Observer Claims to Target multiple middle east countries
    Category: Alert
    Content: A recent post by the group indicates that they are targeting 4 Gulf countries, attacks on Bahrain, Saudi Arabia, the UAE, and Kuwait.
    Date: 2026-03-11T05:52:43Z
    Network: telegram
    Published URL: https://t.me/me_observer_TG/829522
    Screenshots:
    None
    Threat Actors: Middle East Observer
    Victim Country: Bahrain
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. InDoM1nuS Team targets the website of CelloCard
    Category: Defacement
    Content: The group claims to have defaced the website of CelloCard
    Date: 2026-03-11T05:50:30Z
    Network: telegram
    Published URL: https://t.me/InDoM1nusTe4m/105
    Screenshots:
    None
    Threat Actors: InDoM1nuS Team
    Victim Country: Israel
    Victim Industry: Marketing, Advertising & Sales
    Victim Organization: cellocard
    Victim Site: cellocard.co.il
  72. Alleged leak of Patient Medical Records from Unidentified Gastroenterology (GI) Clinic
    Category: Data Breach
    Content: The threat actor claims to be leaked 167,000 Patient Medical Records from undefined Gastroenterology (GI) Clinic. The exposed data fields allegedly include SSNs, DOBs, names, diagnoses information.
    Date: 2026-03-11T05:13:58Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-US-GI-clinic-167k-patients-fullz-phone-email-diagnoses-medications
    Screenshots:
    None
    Threat Actors: StealMan
    Victim Country: USA
    Victim Industry: Hospital & Health Care
    Victim Organization: Unknown
    Victim Site: Unknown
  73. Alleged Unauthorized Access to American Outlets website
    Category: Initial Access
    Content: The group claims to have gained unauthorized access to a user account on the Israeli online shopping site American Outlets. The allegedly compromised account data includes personal information such as the user’s name, date of birth, national ID number, email address, password, phone number, and default billing and shipping addresses associated with the account.
    Date: 2026-03-11T05:05:01Z
    Network: telegram
    Published URL: https://t.me/IndoHaxSec3/68
    Screenshots:
    None
    Threat Actors: INDOHAXSEC
    Victim Country: Israel
    Victim Industry: E-commerce & Online Stores
    Victim Organization: american outlets
    Victim Site: americanoutlets.co.il
  74. Alleged sale of 500 credit card records
    Category: Data Breach
    Content: Threat actor claims to be selling 500 credit card records from Australia. The compromised data reportedly includes card number, expiry, cvv, full name, address, city, state, zip, country etc.
    Date: 2026-03-11T04:39:00Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277984/
    Screenshots:
    None
    Threat Actors: old_pirat
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  75. Alleged Unauthorized Access to Italian Cargo Bike Retailer
    Category: Initial Access
    Content: The threat actor claims to have gained unauthorized access to Italian Cargo Bike Retailer.
    Date: 2026-03-11T04:37:19Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-Access-Italian-Cargo-Bike-Retailer
    Screenshots:
    None
    Threat Actors: fluffyduck
    Victim Country: Italy
    Victim Industry: E-commerce & Online Stores
    Victim Organization: Unknown
    Victim Site: Unknown
  76. Alleged Sale of Thai Petroleum & Trading Co., Ltd.
    Category: Data Breach
    Content: The threat actor claims to be selling 512 GB data from Thai Petroleum & Trading Co., Ltd.
    Date: 2026-03-11T04:35:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Thai-Petroleum-Trading-Co-Ltd-512-GB
    Screenshots:
    None
    Threat Actors: Gunra
    Victim Country: Thailand
    Victim Industry: Oil & Gas
    Victim Organization: thai petroleum & trading co., ltd.
    Victim Site: tpt.co.th
  77. Alleged sale of 373 credit card records
    Category: Data Breach
    Content: Threat actor claims to be selling 373 credit card records from Europe. The compromised data reportedly includes card number, expiry, cvv, address, zip, city, state, country etc.
    Date: 2026-03-11T04:32:50Z
    Network: openweb
    Published URL: https://forum.exploit.in/topic/277958/
    Screenshots:
    None
    Threat Actors: infamous
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  78. Alleged Sale of Le Caillebotis Diamond
    Category: Data Breach
    Content: The threat actor claims to be selling 413 GB data from Le Caillebotis Diamond.
    Date: 2026-03-11T04:25:59Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Le-Caillebotis-Diamond
    Screenshots:
    None
    Threat Actors: Gunra
    Victim Country: France
    Victim Industry: Building and construction
    Victim Organization: le caillebotis diamond
    Victim Site: le-caillebotis-diamond.fr
  79. Alleged Sale of unauthorized access to Brazilian Police Investigation Panel
    Category: Initial Access
    Content: Threat actor claims to be selling unauthorized access to Brazilian Police Investigation Panel.
    Date: 2026-03-11T04:19:48Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-Full-Access-Investigation-Brazilian-Police-Panel-Law-Enforcement-Webmail
    Screenshots:
    None
    Threat Actors: kodexseller
    Victim Country: Brazil
    Victim Industry: Government Administration
    Victim Organization: polícia civil do estado de são paulo
    Victim Site: policiacivil.sp.gov.br
  80. Alleged Sale of Région Occitanie
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Région Occitanie, the dataset contains including user records and a large collection of pictures.
    Date: 2026-03-11T04:03:01Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-SELLING-FR-Region-Occitanie-with-PICTURE-41-7%C2%A0Go
    Screenshots:
    None
    Threat Actors: DumpSec
    Victim Country: France
    Victim Industry: Government Relations
    Victim Organization: région occitanie
    Victim Site: laregion.fr
  81. mehwargun Claims to Target Iranian bank
    Category: Alert
    Content: A recent post by the group indicates that they are targeting Iranian target bank that includes Google, Microsoft, and Nvidia in the Middle East
    Date: 2026-03-11T03:37:01Z
    Network: telegram
    Published URL: https://t.me/mehwargun/6699?single
    Screenshots:
    None
    Threat Actors: mehwargun
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  82. Alleged Leak of BMW Internal Data
    Category: Data Breach
    Content: The threat actor claims to have leaked the data of bmw.
    Date: 2026-03-11T03:31:34Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-COLLECTION-REPOST-Complete-BMW-Leak-13-Parts-Released
    Screenshots:
    None
    Threat Actors: IntelChipX
    Victim Country: Germany
    Victim Industry: Automotive
    Victim Organization: bmw group
    Victim Site: bmw.com
  83. Z-BL4CX-H4T-ID targets the website of mydang.kr
    Category: Defacement
    Content: The group claims to have defaced the website of mydang.kr
    Date: 2026-03-11T03:24:57Z
    Network: telegram
    Published URL: https://t.me/z_bl4cx_h4t_id/79
    Screenshots:
    None
    Threat Actors: Z-BL4CX-H4T-ID
    Victim Country: South Korea
    Victim Industry: Real Estate
    Victim Organization: Unknown
    Victim Site: mydang.kr
  84. Alleged Data Breach of JDC
    Category: Data Breach
    Content: The threat actor claims to have breached the database of Journée Défense et Citoyenneté (JDC)(French Ministry of Armed Forces), and the dataset allegedly contains personal information of French users who completed the JDC program.
    Date: 2026-03-11T03:11:47Z
    Network: openweb
    Published URL: https://breachforums.as/Thread-FR-JDC-presaje-sga-defense-gouv-fr
    Screenshots:
    None
    Threat Actors: 7ven
    Victim Country: France
    Victim Industry: Defense & Space
    Victim Organization: journée défense et citoyenneté (jdc)
    Victim Site: presaje.sga.defense.gouv.fr
  85. Alleged Data Leak of NR CAPITAL CO ,LTD
    Category: Data Breach
    Content: Threat actor claims to be selling a CSV database allegedly associated with NR Capital Loan linked to the domain NR Capital.The listing advertises approximately 2TB of data, reportedly originating from a South Korean loan service.
    Date: 2026-03-11T02:03:48Z
    Network: openweb
    Published URL: https://leakbase.bz/threads/nrcapital-co-kr.49272/#post-277175
    Screenshots:
    None
    Threat Actors: FantancyHacker
    Victim Country: South Korea
    Victim Industry: Financial Services
    Victim Organization: nr capital co ,ltd
    Victim Site: nrcapital.co.kr
  86. Alleged Sale of Australia Ledger
    Category: Data Breach
    Content: The threat actor claims to have selling 3000 Australia Ledger .The exposed data fields allegedly include Customer name, email id, order id, country and much more information.
    Date: 2026-03-11T01:39:46Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Australia-Ledger-Private-3k-Leads
    Screenshots:
    None
    Threat Actors: Donleads
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Alleged Data breach of West Java Provincial Government
    Category: Data Breach
    Content: The threat actor claims to have leaked data from West Java Provincial Government. The compromised data reportedly contains 37,350 records, The exposed data fields allegedly include Name, DOB, Employee Identification Number, Rank, Address, Email, Phone number and much more information.
    Date: 2026-03-11T00:04:14Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DATA-BASE-SELURUH-PEGAWAI-PROV-JABAR-37-35-THOUSAND
    Screenshots:
    None
    Threat Actors: BabayoErorSystem
    Victim Country: Indonesia
    Victim Industry: Government & Public Sector
    Victim Organization: west java provincial government
    Victim Site: jabarprov.go.id