Executive Summary
The provided dataset outlines a high volume of cyber incidents recorded on March 12, 2026. The incidents span a wide array of attack vectors, predominantly featuring Data Breaches, Initial Access sales or claims, and website Defacements. Targets include international government entities, retail corporations, educational institutions, critical infrastructure (including nuclear power plants and SCADA systems), and various software and e-commerce platforms. Key threat actors identified include groups like Rakyat Digital Crew, L4663R666H05T, Homeland Justice, and Team1722.
1. Critical Infrastructure and Government Compromises
A significant trend in the dataset is the targeting of critical infrastructure, government organizations, and highly sensitive state-level databases across multiple nations.
Government Administration and Services
- Albanian Parliament: The group Homeland Justice claimed to have breached and maintained long-term access to the internal cyber infrastructure of the Albanian Parliament, gaining months of communications involving parliament members. The group also claimed initial access to the Parliament and posted an alert targeting Albania generally.
- France: A threat actor named ExnExn claimed to leak French tax records (Impôts) containing names, email addresses, phone numbers, and dates of birth. Another actor, BlitzGroup, claimed to have breached the French Ministry of Health, exposing 174,989 lines of data including names, emails, and user certificates.
- Sweden: ByteToBreach leaked source code, staff databases, and citizen PII related to Sweden’s e-government platform through infrastructure belonging to CGI Sverige AB.
- Russia: The actor Shinchan offered 120,000 records from the State Traffic Safety Inspectorate (GIBDD), potentially exposing VIN details, IDs, addresses, and registration data.
- Ukraine: The group Perun Svaroga leaked data from the Khmelnytskyi City Council’s Administrative Services Center, compromising an MFC-like platform used for government services.
- Indonesia: Shenira6core breached the PPID Satpol PP Kalteng database, exposing contractor profiles and financial metrics.
- Thailand: Nullsec Philippines defaced the website of the Department of Probation.
- Germany & USA (Local Government): Stadt Herne in Germany shut down several IT systems preventatively due to a suspected cyber incident. Rusk County in Wisconsin, USA, reported a cyberattack affecting its network, though public websites remained accessible via third-party providers.
Critical Infrastructure (Energy, Nuclear, and SCADA)
- Nuclear Facilities: The group We are MONARCH claimed unauthorized access to operational components of Unit 2’s secondary coolant loop at the Golfech Nuclear Power Plant in France. The same group issued an alert targeting three European nuclear energy facilities. Furthermore, the group Cardinal claimed to have breached data from an Israeli Nuclear Power Plant’s infrastructure.
- SCADA Systems: * Romania:Z-PENTEST ALLIANCE claimed unauthorized access to an industrial SCADA/HMI system controlling pumping equipment and thermal processes, allowing modification of pump parameters and process control, which could affect operational safety.
- Ukraine: The actor OverFlame claimed control over a temperature-regulation SCADA system at a food-production facility, alleging they spoiled food products and damaged equipment by forcing sustained heating.
- Oil & Gas: The actor CVDEAD claimed to have leaked a dataset of roughly 68,000 employee records from Saudi Aramco, noting a previous breach on March 3, 2026. In Brazil, the actor Chucky claimed to have breached Consigaz Gas Distributor Ltd, leaking an 8GB dataset containing customer and operational records.
- Energy Access: DaveGrol91 offered access to Spain’s Family Energy.
Military and Surveillance
- Pakistan: ModernStealer claimed to be selling classified military documents belonging to the Pakistan Army, including correspondence from the COAS Secretariat and personnel information.
- Israel (NSO Group): A cyberattack targeted the infrastructure of the NSO Group. Attackers claimed unauthorized access to the development environment, sharing screenshots of IntelliJ IDEA and configuration artifacts referencing internal domains, though no customer data or full source code leaks were confirmed.
- Israel (Security Personnel): Handala Hack claimed to compromise the accounts and materials of Raz Zimmt, alleging access to over 50,000 emails, strategic plans regarding Iran, and communications with senior security officials.
2. Large-Scale Corporate & Platform Data Breaches
A massive volume of corporate data, customer PII, and financial information was reportedly exposed or offered for sale.
- Retail & E-commerce: * Loblaw Companies Limited (Canada): Suffered a low-level data breach in a non-critical IT segment. An unauthorized third party accessed names, phone numbers, and email addresses, though passwords and credit cards were not compromised. The security team secured the systems.
- Electronic City (Indonesia): CaoMa breached a database exposing 618,000 customers, releasing 54,000 rows of data.
- e-shop Ltd (Israel): Banei Ishmael penetrated backend systems, accessing information on over 1,000 companies and roughly 60 GB of private data, order records, and financial documents.
- Speedway (France): The database was offered for sale by vibrant00.
- Tech, Software, and Social Platforms:
- BreachForums: Actor Insider005 claimed to sell a database containing 346,323 user records from BreachForums itself, including private messages and escrow details.
- Doxbin: The1F breached the platform, leaking roughly 367,000 lines of data.
- Crunchyroll (USA): ExnExn leaked a small dataset of emails and IP addresses.
- WhatsApp (Indonesia): CyznetAdel leaked a dataset containing 21 million WhatsApp phone numbers of Indonesian citizens.
- Financial & Professional Services:
- Credit Freedom & Restoration (USA): Loki accessed a CRM database containing highly sensitive PII for over 30,000 members, including SSNs, driver’s licenses, and credit reports.
- MetaTrader Accounts: FFFV sold 547 verified trading accounts with email credentials and KYC/PII documents.
- Dukascopy Bank SA (Switzerland): Internal access was sold by actor admin.
- CGPEY (India): Sorb sold a database with payment processing logs and customer data.
- Centre d’Intégration Socioprofessionnelle (CIS): Dreamer8000 leaked financial records, employment contracts, NDAs, and correspondence from this Swiss non-profit.
- Education: Breaches affected the Cyber University of Uzbekistan , Nyaya Nagar Public School in India (651 MB stolen) , Izmir Institute of Technology in Turkey (600 GB of data sold) , and Chaoxin Xuexitong in China containing college student records.
- Healthcare: HexDex sold a database from French platform Medoucine, affecting roughly 813,866 registered users and practitioners.
3. Initial Access Brokering (IAB) Activity
Threat actors actively marketed initial access to various corporate networks, content management systems, and specialized software.
RDP & Administrative Access Sales
- sudo: Sold unauthorized RDP access to unidentified holding companies in Australia (1,000+ hosts using Windows Defender) , an unidentified US manufacturing company (approx. 160 hosts) , and another US manufacturing company.
- William Black: Sold full admin RDP access to multiple industries in Italy (including manufacturing), noting revenue under $5 million.
- ed1n1ca: Specialized in e-commerce access, selling unauthorized PrestaShop access in the UK (with recorded Stripe transactions) , PrestaShop admin access in France (noting hundreds of redirect transactions) , and unauthorized access to a WordPress shop in Japan.
- hubert: Sold admin access to an OpenCart platform in France and an unidentified logistics company in Malaysia.
- samy01: Sold RDWeb access to an Australian dental software provider.
Credential Leaks by Rakyat Digital Crew
The group Rakyat Digital Crew was highly active in leaking login credentials across various sectors, primarily utilizing Telegram. Their targets included:
- Audio Club (USA)
- Integrative Psychiatry Institute (USA)
- University of Nairobi (UoN – Kenya)
- Needrom
- Penzitamu (Kenya)
- Mundo Programas
- Legion Programas
- Compartiendo Full
- lms.ays-plugins.com
- PetrPikora.com (Czech Republic)
4. Defacement Campaigns
Multiple threat actor groups engaged in mass website defacements, often relying on Telegram or Zone-H/Zone-Xsec for publication.
- L4663R666H05T: This actor heavily targeted e-commerce and retail sites in Chile and other locations, including: StoneCenter , Rip Curl (Chile & Peru) , Poste Italiane S.p.A. , Anticipa , Casaideas Chile , and A3D.
- Team1722: Targeted Iranian websites, including botikariya.ir , PosPars (Financial Services) , and Iran Part Lent (Automotive).
- Cyber Islamic resistance: Defaced seapearlsshipping.com and Purple Search (USA). They also issued an alert targeting Israel’s banking infrastructure and claimed a data breach of Meginim data services.
- BabayoErorSystem: Defaced metagatesinnovation.com , vbk.saurabhsakhuja.com , and cms.trueott.com.
- Indonesian Threat Actors: DEFACER INDONESIAN TEAM targeted Cart Rescue PRO (USA) and The Gardens Foundation (India). BROTHERHOOD CAPUNG INDONESIA targeted Spicy Web in India.
5. Additional Notable Incidents (Malware, Alerts, and Misc.)
- Malware Sale: The actor Jaxx advertised the Azury Modern Infostealer, a C#-based application designed to steal browser passwords, cookies, crypto wallets, and VPN tokens, which features anti-debug, anti-VM, and anti-antivirus protections.
- IoT/Camera Leaks: CVDEAD leaked a dataset containing 26,500 publicly accessible IoT devices and 3,000 RTSP-enabled cameras in Saudi Arabia, potentially exposing video streams due to misconfigurations.
- Large-Scale Chinese PII: ALTGIANT leaked an 11.7 GB dataset containing Chinese personal and financial information, including ID cards and credit cards.
- Anonymous For Justice (Israel Targeting): This group claimed destructive attacks, stating they deleted 2 TB of data from City Garden Management and 1 TB of data from Avodot Biuv VeMayim Ltd. They also issued an alert targeting Netanel Sharfi & Co legal offices.
- Combo Lists: Luntik sold email:password credential pairs for Swiss users of Ricardo.ch and Tutti.ch.
Conclusion
The data from March 12, 2026, reveals a highly active and fragmented cyber threat landscape. Threat actors are demonstrating significant capabilities against critical infrastructure, as evidenced by compromises affecting nuclear facilities in France and Israel, as well as SCADA systems in Romania and Ukraine. The proliferation of Initial Access Brokers (IABs) selling RDP, PrestaShop, and VPN access highlights the commercialization of network intrusions. Furthermore, politically or ideologically motivated groups (such as Homeland Justice, Anonymous For Justice, and Cyber Islamic resistance) continue to leverage data destruction, strategic data leaks, and website defacements to target specific nation-states (notably Albania, Israel, and Iran). Organizations across all sectors must prioritize securing exposed remote access points, enforcing robust multi-factor authentication, and segmenting operational technology (OT/SCADA) from standard IT networks.
Detected Incidents Draft Data
- Loblaw Companies Limited suffers Data Breach
Category: Data Breach
Content: Loblaw Companies Limited was reportedly subjected to a data breach after the company detected suspicious activity within a contained, non-critical segment of its IT network. According to the company’s statement, an unauthorized third party gained access to limited customer information, including names, phone numbers, and email addresses. The company stated that its security team secured the affected systems and initiated an investigation into the incident. Loblaw also noted that sensitive data such as passwords, health information, and credit card details were not compromised, and services related to PC Financial were not impacted by the breach.
Date: 2026-03-12T23:45:26Z
Network: openweb
Published URL: https://www.loblaw.ca/en/loblaw-notifies-customers-of-a-low-level-data-breach/
Screenshots:
None
Threat Actors: Unknown
Victim Country: Canada
Victim Industry: Retail Industry
Victim Organization: loblaw companies limited
Victim Site: loblaw.ca - Alleged leak of login credentials to Audio Club
Category: Initial Access
Content: The group claims to have leaked login credentials to Audio Club.
Date: 2026-03-12T22:31:21Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: USA
Victim Industry: Music
Victim Organization: audio club
Victim Site: audioclub.store - Alleged Data Breach of Consigaz Gas Distributor Ltd
Category: Data Breach
Content: Threat Actor claims to have breached the database of Consigaz Gas Distributor Ltd in Brazil. The dataset is approximately 8GB in size and contains around 500 files. The leaked data is reportedly provided in multiple formats including CSV, LOG, XLSX, and TXT files dated 2026, and includes customer-related information and operational records associated with the organization.
Date: 2026-03-12T22:21:29Z
Network: openweb
Published URL: https://leakbase.bz/threads/database-leaked-consigaz-com-br-8gb-500files.49277/
Screenshots:
None
Threat Actors: Chucky
Victim Country: Brazil
Victim Industry: Oil & Gas
Victim Organization: consigaz gas distributor ltd
Victim Site: consigaz.com.br - Alleged leak of login credentials to Integrative Psychiatry Institute
Category: Initial Access
Content: The group claims to have leaked login credentials to Integrative Psychiatry Institute.
Date: 2026-03-12T22:21:15Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: USA
Victim Industry: Education
Victim Organization: integrative psychiatry institute
Victim Site: psychiatryinstitute.com - Alleged access to University of Nairobi (UoN)
Category: Initial Access
Content: The group claims to have gained access to University of Nairobi (UoN).
Date: 2026-03-12T22:12:52Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Kenya
Victim Industry: Education
Victim Organization: university of nairobi (uon)
Victim Site: summerschool.uonbi.ac.ke - Alleged leak of login credentials to Needrom
Category: Initial Access
Content: The group claims to have leaked login credentials to Needrom.
Date: 2026-03-12T22:06:41Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Unknown
Victim Industry: Software
Victim Organization: needrom
Victim Site: needrom.com - Alleged leak of login credentials to Penzitamu
Category: Initial Access
Content: The group claims to have leaked login credentials to Penzitamu
Date: 2026-03-12T22:04:07Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Kenya
Victim Industry: Online Publishing
Victim Organization: penzitamu
Victim Site: penzitamu.com - Alleged Sale of Unauthorized RDP Access to unidentified multiple industries in Italy
Category: Initial Access
Content: The threat actor claims to be selling unauthorized full admin RDP access associated with unidentified organizations across multiple industries in Italy, including manufacturing and testing and measurement equipment, noting that the estimated revenue is less than $5 million.
Date: 2026-03-12T22:03:47Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278181/
Screenshots:
None
Threat Actors: William Black
Victim Country: Italy
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of login credentials to Mundo Programas
Category: Initial Access
Content: The group claims to have leaked login credentials to Mundo Programas.
Date: 2026-03-12T21:58:49Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Unknown
Victim Industry: Software
Victim Organization: mundo programas
Victim Site: mundoprogramas.net - Alleged leak of login credentials to Legion Programas
Category: Initial Access
Content: The group claims to have leaked login credentials to Legion Programas.
Date: 2026-03-12T21:51:43Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Unknown
Victim Industry: Software
Victim Organization: legion programas
Victim Site: legionprogramas.org - Alleged leak of login credentials to Compartiendo Full
Category: Initial Access
Content: The group claims to have leaked login credentials to Compartiendo Full.
Date: 2026-03-12T21:51:32Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/84
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Unknown
Victim Industry: Media Production
Victim Organization: compartiendo full
Victim Site: compartiendofull.org - Team1722 targets the website of botikariya.ir
Category: Defacement
Content: The group claims to have defaced the website of botikariya.ir
Date: 2026-03-12T20:52:21Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41118320
Screenshots:
None
Threat Actors: Team1722
Victim Country: Iran
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: botikariya.ir - Alleged Sale of Unauthorized PrestaShop Access to an Unidentified Shop in the United Kingdom
Category: Initial Access
Content: The threat actor claims to be selling unauthorized PrestaShop access to a unidentified shop in the United Kingdom, stating that the site has recorded credit card Stripe (frame) transactions with reported counts of 142 in February and 122 in January.
Date: 2026-03-12T20:46:57Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278165/
Screenshots:
None
Threat Actors: ed1n1ca
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized PrestaShop Admin Access to an Unidentified Shop in France
Category: Initial Access
Content: The threat actor claims to be selling unauthorized PrestaShop access to an unidentified shop in France, stating that the site has recorded credit card redirect activity with reported counts of 723 transactions in February, 880 in January, and 700 in December.
Date: 2026-03-12T20:43:09Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278170/
Screenshots:
None
Threat Actors: ed1n1ca
Victim Country: France
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to an unidentified industrial SCADA/HMI system in Romania
Category: Initial Access
Content: The group claims to have gained unauthorized access to an industrial SCADA/HMI system in Romania responsible for monitoring and controlling pumping equipment and thermal processes. The system monitors operational parameters such as temperature, pressure, and the status of pumps and valves, while allowing real-time configuration of equipment. Access to the interface enables modification of pump parameters, monitoring of alarm signals, and direct process control, which could potentially affect operational stability and safety.
Date: 2026-03-12T20:42:15Z
Network: telegram
Published URL: https://t.me/c/3792806777/17
Screenshots:
None
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Romania
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Team1722 targets the website of PosPars
Category: Defacement
Content: The group claims to have defaced the website of Iran PosPars.
Date: 2026-03-12T20:35:38Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41118319
Screenshots:
None
Threat Actors: Team1722
Victim Country: Iran
Victim Industry: Financial Services
Victim Organization: pospars
Victim Site: pospars.ir/1722.html - Alleged Sale of Unauthorized Access to an Unidentified WordPress Shop in Japan
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to an unidentified WordPress shop in Japan.
Date: 2026-03-12T20:34:20Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278168/
Screenshots:
None
Threat Actors: ed1n1ca
Victim Country: Japan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Team1722 targets the website of Iran Part Lent
Category: Defacement
Content: The group claims to have defaced the website of Iran Part Lent.
Date: 2026-03-12T20:31:54Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41118315
Screenshots:
None
Threat Actors: Team1722
Victim Country: Iran
Victim Industry: Automotive
Victim Organization: iran part lent
Victim Site: iranpartlent.ir/1722.html - Cyber Islamic resistance claims to target Israel
Category: Alert
Content: A recent post by the group indicates that they are targeting banking infrastructure of Israel.
Date: 2026-03-12T19:11:33Z
Network: telegram
Published URL: https://t.me/CIR48/1712
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of French tax records
Category: Data Breach
Content: A threat actor claims to have leaked a dataset allegedly related to French tax records (Impôts). The leaked data contains personal information such as names, email addresses, phone numbers, postal codes, cities, and dates of birth.
Date: 2026-03-12T19:11:10Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-French-Impot
Screenshots:
None
Threat Actors: ExnExn
Victim Country: France
Victim Industry: Government & Public Sector
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Crunchyroll
Category: Data Breach
Content: A threat actor claims to have leaked a small dataset allegedly linked to Crunchyroll users. The leaked data reportedly includes email addresses and associated IP addresses.
Date: 2026-03-12T18:58:10Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Crunchyroll-email-and-IP
Screenshots:
None
Threat Actors: ExnExn
Victim Country: USA
Victim Industry: Entertainment & Movie Production
Victim Organization: crunchyroll
Victim Site: crunchyroll.com - Alleged sale of 547 Verified MetaTrader Trading Accounts
Category: Data Breach
Content: A threat actor claims to be selling 547 verified trading accounts linked to MetaTrader. the dataset includes email and password credentials, as well as KYC/PII documents such as ID cards, passports, and proof of address.
Date: 2026-03-12T18:43:47Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-547-Verified-Trading-Accounts-%E2%80%93-140K-Total-Equity
Screenshots:
None
Threat Actors: FFFV
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of Azury Modern Infostealer
Category: Malware
Content: A threat actor is advertising the sale of a malware tool called Azury Modern Infostealer. The actor claims the stealer is a C#-based application designed to run on victim machines and collect sensitive data such as browser passwords, cookies, cryptocurrency wallets, VPN/FTP credentials, messaging platform tokens, and system information.which includes anti-debug, anti-VM, anti-sandbox, and anti-antivirus protections.
Date: 2026-03-12T18:31:57Z
Network: openweb
Published URL: https://breachforums.as/Thread-MALWARE-Azury-Modern-Infostealer-BEST-CHEAP-STEALER
Screenshots:
None
Threat Actors: Jaxx
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged access to The Parliament of Albania
Category: Initial Access
Content: The group claims to have gained access to The Parliament of Albania.
Date: 2026-03-12T18:29:47Z
Network: telegram
Published URL: https://t.me/JusticeHomeland1/571
Screenshots:
None
Threat Actors: Homeland Justice
Victim Country: Albania
Victim Industry: Government Administration
Victim Organization: the parliament of albania
Victim Site: parlament.al - Alleged data breach of CGI Sverige AB
Category: Data Breach
Content: A threat actor claims to have leaked source code and internal data related to Sweden’s e-government platform through infrastructure belonging to CGI Sverige AB. The leaked data includes staff databases, citizen PII, and electronic document-signing files.
Date: 2026-03-12T18:25:21Z
Network: openweb
Published URL: https://darkforums.su/Thread-Source-Code-SE-Sweden-E-Gov-CGI-Sverige-AB–68829
Screenshots:
None
Threat Actors: ByteToBreach
Victim Country: Sweden
Victim Industry: Information Technology (IT) Services
Victim Organization: cgi sverige ab
Victim Site: cgi.com - Homeland Justice claims to target Albania
Category: Alert
Content: A recent post by the group indicates that they are targeting Albania.
Date: 2026-03-12T18:23:36Z
Network: telegram
Published URL: https://t.me/JusticeHomeland1/572
Screenshots:
None
Threat Actors: Homeland Justice
Victim Country: Albania
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Nyaya Nagar Public School
Category: Data Breach
Content: The threat actor claims to have hacked and defaced the website of Nyaya Nagar Public School. The threat actor claims to have stolen about 651 MB of data and gave the school 48 hours to respond.
Date: 2026-03-12T18:15:52Z
Network: openweb
Published URL: https://darkforums.su/Thread-ShadowByt3-Defaces-and-Hacks-School
Screenshots:
None
Threat Actors: BlackVortex1
Victim Country: India
Victim Industry: Education
Victim Organization: nyaya nagar public school
Victim Site: nyayanagarpublicschool.in - Alleged data breach of Cyber University of Uzbekistan
Category: Data Breach
Content: A threat actor claims to have breached systems belonging to the Cyber University of Uzbekistan.
Date: 2026-03-12T18:09:43Z
Network: openweb
Published URL: https://darkforums.su/Thread-Cyber-University-Of-UZ-Hacked
Screenshots:
None
Threat Actors: tocyber
Victim Country: Uzbekistan
Victim Industry: Education
Victim Organization: cyber university of uzbekistan
Victim Site: csu.uz - Alleged data breach of Credit Freedom & Restoration
Category: Data Breach
Content: A threat actor claims to have breached Credit Freedom & Restoration and accessed a Vtiger CRM 6.4.0 database allegedly containing information on more than 30,000 U.S. members. the compromised data includes highly sensitive personally identifiable information (PII) such as driver’s licenses, Social Security numbers (including images), credit card details (both images and plaintext), utility bills, and credit reports.
Date: 2026-03-12T18:02:28Z
Network: tor
Published URL: http://dzkxxcsbrg7bwnlwwer563yuxd5pesr42dx634w5xvofm5z6qjw72ayd.onion/
Screenshots:
None
Threat Actors: Loki
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: credit freedom & restoration
Victim Site: creditfreedomrestoration.com - Alleged data breach of Centre d’Intégration Socioprofessionnelle (CIS)
Category: Data Breach
Content: A threat actor claims to have leaked data belonging to Centre d’Intégration Socioprofessionnelle (CIS), a Swiss non-profit organization that supports people with disabilities and individuals seeking employment integration in Switzerland.The leaked data includes financial records, bank statements, employment contracts containing personal details, business case files, employer agreements, client and partner databases, NDAs, confidential documents, and internal as well as external email correspondence.
Date: 2026-03-12T17:50:45Z
Network: openweb
Published URL: https://breachforums.as/Thread-Data-exposure-involving-Centre-d%E2%80%99Int%C3%A9gration-Socioprofessionnelle-CIS
Screenshots:
None
Threat Actors: Dreamer8000
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: centre d’intégration socioprofessionnelle (cis)
Victim Site: creditfreedomrestoration.com - DEFACER INDONESIAN TEAM targets the website of Cart Rescue PRO
Category: Defacement
Content: The group claims to have defaced the website of Cart Rescue PRO.
Date: 2026-03-12T17:30:59Z
Network: telegram
Published URL: https://t.me/c/2433981896/1219
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: USA
Victim Industry: Software
Victim Organization: cart rescue pro
Victim Site: cartrescuepro.com - Alleged data leak of Hans Brantner & Sohn Fahrzeugbaugesellschaft m.b.H Database
Category: Data Breach
Content: A threat actor claims that Hans Brantner & Sohn Fahrzeugbaugesellschaft m.b.H. suffered a data breach in which attackers allegedly exfiltrated sensitive corporate information. The reportedly compromised data includes customer data, internal emails, NDAs, vehicle documentation, and confidential technical drawings and files. The exposed information could reveal internal operations and business relationships, potentially affecting partners, customers, employees, and contractors.
Date: 2026-03-12T17:30:52Z
Network: openweb
Published URL: https://breachforums.as/Thread-Hans-Brantner-Sohn-Fahrzeugbaugesellschaft-breach-Cybersecurity-Ignored
Screenshots:
None
Threat Actors: Dreamer8000
Victim Country: Austria
Victim Industry: Manufacturing
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Meginim data services
Category: Data Breach
Content: The group claims to have breached the database of Meginim data services.
Date: 2026-03-12T17:22:08Z
Network: telegram
Published URL: https://t.me/CIR48/1709
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BROTHERHOOD CAPUNG INDONESIA targets the website of Spicy Web
Category: Defacement
Content: The group claims to have defaced the website of Spicy Web.
Date: 2026-03-12T17:02:33Z
Network: telegram
Published URL: https://t.me/c/3800744258/88
Screenshots:
None
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: India
Victim Industry: Information Technology (IT) Services
Victim Organization: spicy web
Victim Site: spicyweb.in - Alleged Data Breach of BreachForums
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly belonging to BreachForums. The dataset reportedly contains 346,323 user records, including user information, private messages, logs, posts, threads, invoices, and escrow transaction details.
Date: 2026-03-12T16:41:59Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278148/
Screenshots:
None
Threat Actors: Insider005
Victim Country: Unknown
Victim Industry: Social Media & Online Social Networking
Victim Organization: breachforums
Victim Site: breachforums.as - Alleged Data Breach of Emotis
Category: Data Breach
Content: Threat Actor claims to have breached the database of Emotis in France. The dataset is in SQL format and reportedly contains approximately 300 tables and around 35,000 user records, with the database size being about 87 MB.
Date: 2026-03-12T16:40:50Z
Network: openweb
Published URL: https://darknetarmy.io/threads/database-emotis-fr-full-dump-shop-35k-customer.89450/
Screenshots:
None
Threat Actors: Shadow Warrior
Victim Country: France
Victim Industry: Information Technology (IT) Services
Victim Organization: emotis
Victim Site: emotis.fr - Alleged Sale of Unauthorized RDP Access to Unidentified Holding Companies in Australia
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized RDP access to unidentified holding companies in Australia. The environment uses Windows Defender as antivirus and allegedly includes access to more than 1,000 hosts.
Date: 2026-03-12T16:32:15Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278151/
Screenshots:
None
Threat Actors: sudo
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - DARK 07x claims to target Tunisia
Category: Alert
Content: A recent post by the group indicates that they are targetting Tunisia.
Date: 2026-03-12T16:30:37Z
Network: telegram
Published URL: https://t.me/DarK07xxxxxxx/1720
Screenshots:
None
Threat Actors: DARK 07x
Victim Country: Tunisia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Khmelnytskyi City Council’s Administrative Services Center
Category: Data Breach
Content: A recent post by the group indicates that they have leaked data from Khmelnytskyi City Council’s Administrative Services Center of Ukraine by compromising a system described as similar to a Multi-Functional Center (MFC) platform used for government service delivery.
Date: 2026-03-12T16:28:28Z
Network: telegram
Published URL: https://t.me/perunswaroga/1272
Screenshots:
None
Threat Actors: Perun Svaroga
Victim Country: Ukraine
Victim Industry: Government Relations
Victim Organization: khmelnytskyi city council’s administrative services center
Victim Site: cnap.khm.gov.ua - Alleged Sale of Unauthorized RDP Access to an Unidentified Manufacturing Company in USA
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized RDP access to an unidentified manufacturing company in USA. The network environment includes around 160 hosts, with antivirus protection present and access providing user-level privileges.
Date: 2026-03-12T16:14:29Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278146/
Screenshots:
None
Threat Actors: sudo
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of JDI Global PII Inventory Database from Multiple Countries
Category: Data Breach
Content: A threat actor claiming affiliation with Jaysx Digital Insurgency (JDI), announced the availability of multiple PII datasets allegedly containing personal information from several countries.
Date: 2026-03-12T16:04:36Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-OFFICIAL-JDI-GLOBAL-PII-INVENTORY-DATA-RELEASE-IL-ID-US-IN
Screenshots:
None
Threat Actors: 053o
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Doxbin Website Database
Category: Data Breach
Content: A threat actor claims to have breached the platform Doxbin and leaked a dataset containing approximately 367,000 lines of data.
Date: 2026-03-12T15:33:03Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-2025-Doxbin-367k-lines
Screenshots:
None
Threat Actors: The1F
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Medoucine
Category: Data Breach
Content: A threat actor claims to be selling a database allegedly belonging to Medoucine. the dataset contains information on approximately 813,866 registered users, including patients associated with thousands of practitioners on the platform.the leaked data include personal details such as names, email addresses, phone numbers, and reservation counts.
Date: 2026-03-12T15:10:40Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FR-Medoucine-com-813K
Screenshots:
None
Threat Actors: HexDex
Victim Country: France
Victim Industry: Health & Fitness
Victim Organization: medoucine
Victim Site: medoucine.com - Cyberattack hits Stadt Herne IT Systems
Category: Cyber Attack
Content: Stadt Herne in Germany has preventively shut down several IT systems following a suspected cyber incident, resulting in restrictions to certain public services for citizens. Authorities stated that the move was taken as a precaution while technical teams investigate the situation and analyze recovery measures.
Date: 2026-03-12T15:00:09Z
Network: openweb
Published URL: https://www.waz.de/lokales/herne-wanne-eickel/article411437410/cyberangriff-stadt-herne-schaltet-it-systeme-ab-buergerservice-eingeschraenkt.html
Screenshots:
None
Threat Actors: Unknown
Victim Country: Germany
Victim Industry: Government Administration
Victim Organization: stadt herne
Victim Site: herne.de - Cyberattack Hits Rusk County
Category: Cyber Attack
Content: Rusk County in northwest Wisconsin reported a cyberattack affecting its network and has engaged forensic experts to investigate and assist with recovery. While the county’s public website and online payment services remain accessible through third-party providers, officials have not yet confirmed which systems were impacted or whether any data was compromised.
Date: 2026-03-12T14:55:03Z
Network: openweb
Published URL: https://dysruptionhub.com/rusk-county-cyber-incident-wisconsin/
Screenshots:
None
Threat Actors: Unknown
Victim Country: USA
Victim Industry: Government Administration
Victim Organization: rusk county
Victim Site: ruskcountywi.com - L4663R666H05T targets the website of StoneCenter.
Category: Defacement
Content: The group claims to have defaced the website of StoneCenter.
Date: 2026-03-12T14:33:42Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808995
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Chile
Victim Industry: E-commerce & Online Stores
Victim Organization: stonecenter.
Victim Site: tienda.stonecenter.cl - Alleged data breach of Electronic City
Category: Data Breach
Content: The threat actor claims to have breached Electronic City database (March 10, 2026), exposing 618,000 customers. 54,000 rows released with internal customer and order data.
Date: 2026-03-12T14:27:57Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-eci-id-Indonesia-electronic-city-website-customer-breach-database
Screenshots:
None
Threat Actors: CaoMa
Victim Country: Indonesia
Victim Industry: Consumer Electronics
Victim Organization: electronic city
Victim Site: eci.id - Alleged Sale of Unauthorized RDP Access to US Manufacturing Company
Category: Initial Access
Content: The threat actor claims to be selling unauthorized RDP access to a U.S.-based manufacturing company.
Date: 2026-03-12T14:25:52Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278146/
Screenshots:
None
Threat Actors: sudo
Victim Country: USA
Victim Industry: Manufacturing
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the website of Rip Curl
Category: Defacement
Content: The group claims to have defaced the website of Rip Curl.
Date: 2026-03-12T14:25:42Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/802687
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Chile
Victim Industry: E-commerce & Online Stores
Victim Organization: rip curl
Victim Site: ripcurl.cl - Alleged sale of Izmir Institute of Technology
Category: Data Breach
Content: The group claims to be selling 600 GB of data from Izmir Institute of Technology.
Date: 2026-03-12T14:16:25Z
Network: telegram
Published URL: https://t.me/c/2705921599/207
Screenshots:
None
Threat Actors: Z-Root
Victim Country: Turkey
Victim Industry: Higher Education/Acadamia
Victim Organization: izmir institute of technology
Victim Site: iyte.edu.tr - L4663R666H05T targets the website of Poste Italiane S.p.A.
Category: Defacement
Content: The group claims to have defaced the website of Poste Italiane S.p.A.
Date: 2026-03-12T14:12:41Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/800545
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: poste italiane s.p.a.
Victim Site: filatelia.poste.it - L4663R666H05T targets the website of Rip Curl. Ltd.
Category: Defacement
Content: The group claims to have defaced the website of Rip Curl. Ltd.
Date: 2026-03-12T14:04:34Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/802688
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: rip curl. ltd.
Victim Site: ripcurl.com.pe - Alleged breach of Albanian Parliament communications
Category: Data Breach
Content: The threat actor claims to have breached and maintained access to the internal cyber infrastructure of Albanian Parliament, asserting long-term access to months of communications and correspondence involving Albanian parliament members. They further state that the stolen data is being leaked in parts, with additional releases expected as their extraction process continues.
Date: 2026-03-12T14:01:09Z
Network: telegram
Published URL: https://t.me/JusticeHomeland1/548
Screenshots:
None
Threat Actors: Homeland Justice
Victim Country: Albania
Victim Industry: Government Administration
Victim Organization: albanian parliament
Victim Site: parlament.al - Alleged leak of publicly accessible IoT devices and RTSP cameras in Saudi Arabia
Category: Initial Access
Content: The threat actor claims to have leaked a dataset allegedly containing a list of publicly accessible IoT devices and RTSP cameras in Saudi Arabia, reportedly including approximately 26,500 IoT systems and 3,000 RTSP-enabled cameras that may expose video streams and administrative interfaces due to unsecured or misconfigured services.
Date: 2026-03-12T13:58:45Z
Network: openweb
Published URL: https://breachforums.as/Thread-Saudi-Arabia-26-5K-IoT-3K-RTSP-CAM
Screenshots:
None
Threat Actors: CVDEAD
Victim Country: Saudi Arabia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of French Ministry of Health
Category: Data Breach
Content: The threat actor claims to have breached data of French Ministry of Health, exposing 174,989 lines of data including names, emails, units, and user certs.
Date: 2026-03-12T13:53:01Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-Database-sante-gouv-fr-related
Screenshots:
None
Threat Actors: BlitzGroup
Victim Country: France
Victim Industry: Government Administration
Victim Organization: french ministry of health
Victim Site: sante.gouv.fr - Alleged data breach of PPID Satpol PP Kalteng
Category: Data Breach
Content: The threat actor claims to have breached the database of PPID Satpol PP Kalteng, exposing contractor profiles, financial metrics for consultative services, and site-supervision reports.
Date: 2026-03-12T13:42:02Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-EXPOSURE-APBD-PROCUREMENT-AUDIT-SATPOL-PP-KALTENG
Screenshots:
None
Threat Actors: Shenira6core
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: ppid satpol pp kalteng
Victim Site: satpolpp.kalteng.go.id - L4663R666H05T targets the website of Anticipa
Category: Defacement
Content: The group claims to have defaced the website of Anticipa.
Date: 2026-03-12T13:38:42Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808984
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Chile
Victim Industry: E-commerce & Online Stores
Victim Organization: anticipa
Victim Site: tienda.anticipa.cl - Alleged sale of access to Family Energy
Category: Initial Access
Content: Threat actor claims to be selling access to Family Energy.
Date: 2026-03-12T13:20:48Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278133/
Screenshots:
None
Threat Actors: DaveGrol91
Victim Country: Spain
Victim Industry: Energy & Utilities
Victim Organization: family energy
Victim Site: familyenergy.com - Alleged leak of login access to lms.ays-plugins.com
Category: Initial Access
Content: The group claims to have leaked login access to lms.ays-plugins.com
Date: 2026-03-12T13:07:57Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/82
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: lms.ays-plugins.com - Alleged leak of login access to PetrPikora.com
Category: Initial Access
Content: The group claims to have leaked login access to PetrPikora.com
Date: 2026-03-12T13:04:04Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/80
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Czech Republic
Victim Industry: Information Technology (IT) Services
Victim Organization: petrpikora.com
Victim Site: petrpikora.com - L4663R666H05T targets the website of Casaideas Chile
Category: Defacement
Content: Group claims to have defaced the website of Casaideas Chile.
Date: 2026-03-12T12:59:49Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/801582
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Chile
Victim Industry: Retail Industry
Victim Organization: casaideas chile
Victim Site: casaideas.cl - L4663R666H05T targets the website of A3D
Category: Defacement
Content: Group claims to have defaced the website of A3D.
Date: 2026-03-12T12:56:15Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808523
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Chile
Victim Industry: Retail Industry
Victim Organization: a3d
Victim Site: a3d.cl - Alleged breach of the Golfech Nuclear Power Plant
Category: Data Breach
Content: The threat actor claims to have infiltrated systems at the Golfech Nuclear Power Plant. They assert unauthorized access to operational components tied to Unit 2’s secondary coolant loop, claiming that engineers remained unaware during the intrusion.
Date: 2026-03-12T12:56:01Z
Network: telegram
Published URL: https://t.me/c/2869875394/364
Screenshots:
None
Threat Actors: We are MONARCH
Victim Country: France
Victim Industry: Energy & Utilities
Victim Organization: golfech nuclear power plant
Victim Site: edf.fr - Alleged leak of login access to The Gardens Foundation
Category: Initial Access
Content: The group claims to have leaked login access to The Gardens Foundation.
Date: 2026-03-12T12:36:05Z
Network: telegram
Published URL: https://t.me/c/2433981896/1218
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: India
Victim Industry: E-Learning
Victim Organization: the gardens foundation
Victim Site: thegardens.co.in.anchor.net.in - Cyber Islamic resistance targets the website of seapearlsshipping.com
Category: Defacement
Content: The group claims to have defaced the website of seapearlsshipping.com
Date: 2026-03-12T11:53:06Z
Network: telegram
Published URL: https://t.me/CIR48/1706?single
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: seapearlsshipping
Victim Site: seapearlsshipping.com - Alleged sale of combolist from Ricardo
Category: Combo List
Content: The threat actor claims to be selling email:password credential pairs associated with Ricardo.ch accounts, reportedly targeting users from Switzerland.
Date: 2026-03-12T11:44:19Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278131/
Screenshots:
None
Threat Actors: Luntik
Victim Country: Switzerland
Victim Industry: E-commerce & Online Stores
Victim Organization: ricardo
Victim Site: ricardo.ch - Alleged sale of combolist from Tutti.ch
Category: Combo List
Content: The threat actor claims to be selling email:password credential pairs associated with Tutti.ch accounts, reportedly targeting users from Switzerland.
Date: 2026-03-12T11:42:05Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278131/
Screenshots:
None
Threat Actors: Luntik
Victim Country: Switzerland
Victim Industry: Other Industry
Victim Organization: tutti.ch
Victim Site: tutti.ch - Cyber Islamic resistance targets the website of Purple Search
Category: Defacement
Content: The group claims to have defaced the website of Purple Search.
Date: 2026-03-12T11:39:46Z
Network: telegram
Published URL: https://t.me/CIR48/1706
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: USA
Victim Industry: Information Technology (IT) Services
Victim Organization: purple search
Victim Site: purplesearchinc.com - Alleged breach of Raz Zimmt’s accounts and confidential Data
Category: Alert
Content: The threat actor claims to have compromised the accounts and confidential materials of Raz Zimmt, alleging access to over 50,000 emails and sensitive documents. They assert possession of budget information, strategic plans related to Iran, communications with senior security officials, and details of reported collaborators.
Date: 2026-03-12T10:53:39Z
Network: openweb
Published URL: https://handala-hack.to/raz-zimmt-hacked-head-of-the-iran-desk-at-israeli-security-institutes/
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - We are MONARCH claims to target European nuclear facilities
Category: Alert
Content: A recent post by the group indicating that they are targeting three nuclear energy facilities in Europe.
Date: 2026-03-12T10:52:54Z
Network: telegram
Published URL: https://t.me/c/2869875394/359
Screenshots:
None
Threat Actors: We are MONARCH
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of State Traffic Safety Inspectorate (GIBDD)
Category: Data Breach
Content: The threat actor claims to have breached of 120,000 State Traffic Safety Inspectorate (GIBDD) records, potentially exposing VIN details, personal IDs, birth dates, addresses, vehicle info, and registration data.
Date: 2026-03-12T10:49:00Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-RUSSIA-120K-PERSONAL-INFORMATION-DATA-OF-VEHICLE-OWNERS-IN-RUSSIA
Screenshots:
None
Threat Actors: Shinchan
Victim Country: Russia
Victim Industry: Government Administration
Victim Organization: state traffic safety inspectorate (gibdd)
Victim Site: gibdd.ru - BabayoErorSystem targets the website of metagatesinnovation.com
Category: Defacement
Content: The group claims to have defaced the website of metagatesinnovation.com
Date: 2026-03-12T10:20:18Z
Network: telegram
Published URL: https://t.me/c/3865526389/135
Screenshots:
None
Threat Actors: BabayoErorSystem
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: metagatesinnovation.com - Alleged sale of classified military documents of Pakistan Army
Category: Data Breach
Content: The threat actor claims to be selling classified military documents allegedly belonging to the Pakistan Army, including correspondence from the COAS Secretariat, personnel information of officers, materials from the Senior Command and Staff Course, and reports related to the Composite Air Defence Task Force of Pakistan.
Date: 2026-03-12T10:14:00Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-PAKISTAN-CLASSIFIED-MILITARY-DOCUMENTS
Screenshots:
None
Threat Actors: ModernStealer
Victim Country: Pakistan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BabayoErorSystem targets the website of vbk.saurabhsakhuja.com
Category: Defacement
Content: The group claims to have defaced the website of vbk.saurabhsakhuja.com
Date: 2026-03-12T10:13:30Z
Network: telegram
Published URL: https://t.me/c/3865526389/135
Screenshots:
None
Threat Actors: BabayoErorSystem
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: vbk.saurabhsakhuja.com - BABAYO EROR SYSTEM targets the website of cms.trueott.com
Category: Defacement
Content: The group claims to have defaced the website of cms.trueott.com
Date: 2026-03-12T10:07:37Z
Network: telegram
Published URL: https://t.me/c/3865526389/135
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: cms.trueott.com - Alleged data breach of City Garden Management
Category: Data Breach
Content: Group claims to have deleted 2 TB of data from the systems of City Garden Management.
Date: 2026-03-12T09:49:33Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/25
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Real Estate
Victim Organization: city garden management
Victim Site: Unknown - Alleged data leak a pack of 33 invoice templates
Category: Data Breach
Content: The threat actor claims to have leaked of 33 invoice templates (PSD/PDF), editable via Canva, Photoshop, or Photopea.
Date: 2026-03-12T09:25:09Z
Network: openweb
Published URL: https://breachforums.as/Thread-PACK-FACTURE-30-PSD-PDF-MODIFIABLE
Screenshots:
None
Threat Actors: Nzo91
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to Ukrainian food-facility SCADA system
Category: Initial Access
Content: The threat actor claims to have gained unauthorized control over a SCADA system used for temperature regulation at a Ukrainian food-production facility. They allege that by forcing the system into sustained heating mode, food products were spoiled and climate-control equipment was damaged.
Date: 2026-03-12T08:53:07Z
Network: telegram
Published URL: https://t.me/privetOTof223/530
Screenshots:
None
Threat Actors: OverFlame
Victim Country: Ukraine
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of TekTreeInc
Category: Data Breach
Content: The threat actor claims to have breached a database belonging to TekTreeInc. The compromised data includes names, emails, job titles, resumes, skills, education, experience, work auth status, gender, location, and geographic coordinates.Note: it was previously breached by the threat actor Cipherforce on February 23, 2026.
Date: 2026-03-12T08:45:43Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-TekTreeInc-com-552K
Screenshots:
None
Threat Actors: cachecat
Victim Country: USA
Victim Industry: Information Technology (IT) Services
Victim Organization: tektree inc
Victim Site: tektreeinc.com - Alleged data breach of Avodot Biuv VeMayim Ltd
Category: Data Breach
Content: Group claims to have deleted 1TB of data from the systems of Avodot Biuv VeMayim Ltd.
Date: 2026-03-12T07:11:06Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/24
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Renewables & Environment
Victim Organization: avodot biuv vemayim ltd.
Victim Site: Unknown - Alleged breach of e-shop Ltd
Category: Data Breach
Content: The threat actor claims to have penetrated the servers and backend systems of e-shop Ltd. The actor states that the intrusion yielded information on more than 1,000 companies and their customers, including access to website-management databases of multiple Israel-based e-commerce brands. The data set allegedly includes over 1,300 SQL backup files and approximately 60 GB of private data, order records, financial documents, and customer-payment information.
Date: 2026-03-12T06:54:04Z
Network: telegram
Published URL: https://t.me/BaneiIshmael4/254
Screenshots:
None
Threat Actors: Banei Ishmael
Victim Country: Israel
Victim Industry: E-commerce & Online Stores
Victim Organization: e-shop ltd
Victim Site: e-shop.co.il - Alleged data leak of 21 million WhatsApp Numbers of Indian Citizens
Category: Data Breach
Content: A threat actor claims to have leaked a dataset containing 21 million WhatsApp phone numbers belonging to Indonesian citizens.
Date: 2026-03-12T06:12:33Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-21-Million-Indonesian-WhatsApp-Number-Data
Screenshots:
None
Threat Actors: CyznetAdel
Victim Country: Indonesia
Victim Industry: Social Media & Online Social Networking
Victim Organization: Unknown
Victim Site: Unknown - Nullsec Philippines targets the website of Department of Probation
Category: Defacement
Content: The group claims to have defaced the website of Department of Probation
Date: 2026-03-12T05:58:20Z
Network: telegram
Published URL: https://t.me/nullsechackers/851
Screenshots:
None
Threat Actors: Nullsec Philippines
Victim Country: Thailand
Victim Industry: Government Administration
Victim Organization: department of probation
Victim Site: probation.go.th - Alleged sale of 500 credit card records
Category: Data Breach
Content: Threat actor claims to be selling 500 credit card records from Australia. The compromised data reportedly includes card number, expiry, cvv, full name, address, city etc.
Date: 2026-03-12T05:56:05Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278080/
Screenshots:
None
Threat Actors: old_pirat
Victim Country: Australia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of 1000 credit card records
Category: Data Breach
Content: Threat actor claims to be selling 1000 credit card records from USA.
Date: 2026-03-12T05:54:10Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278065/
Screenshots:
None
Threat Actors: kasap
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of data from AR Controls Ltd
Category: Data Breach
Content: The threat actor claims to have selling data from AR Controls Ltd . The compromised data reportedly includes employee details, including national insurance number, customer details, company details and supplier credits information.
Date: 2026-03-12T05:42:05Z
Network: openweb
Published URL: https://breachforums.as/Thread-AR-CONTROLS-LTD-Database
Screenshots:
None
Threat Actors: fluffyduck
Victim Country: UK
Victim Industry: Industrial Automation
Victim Organization: ar controls ltd
Victim Site: arcontrols.com - Alleged sale of database from wedding planning platform in USA
Category: Data Breach
Content: Threat actor claims to have leaked a database from an unidentified U.S.-based wedding planning platform. The compromised dataset reportedly contains approximately 22 million records, including first names, last names, email addresses, partner names, partner last names, and wedding dates.
Date: 2026-03-12T05:39:21Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278041/
Screenshots:
None
Threat Actors: NewMember
Victim Country: USA
Victim Industry: Events Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Speedway Database
Category: Data Breach
Content: The threat actor claims to be selling the database of Speedway.
Date: 2026-03-12T05:16:10Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-speedway-fr-360K
Screenshots:
None
Threat Actors: vibrant00
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: speedway
Victim Site: speedway.fr - Anonymous For Justice claims to target Netanel Sharfi & Co
Category: Alert
Content: A recent post by the group indicating that they are targeting Netanel Sharfi & Co legal offices in Israel
Date: 2026-03-12T05:14:31Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/23
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Legal Services
Victim Organization: netanel sharfi & co
Victim Site: Unknown - Alleged data breach of Saudi Aramco
Category: Data Breach
Content: The threat actor claims to have leaked workforce data from Saudi Aramco, the compromised dataset reportedly containing approximately 68,000 employee records, including employee identification numbers, names, corporate email addresses, nationality information, residential country details, and hiring dates.Note: Aramco was previously breached on March 3, 2026
Date: 2026-03-12T05:13:18Z
Network: openweb
Published URL: https://breachforums.as/Thread-SA-ARAMCO-68K-workforce
Screenshots:
None
Threat Actors: CVDEAD
Victim Country: Saudi Arabia
Victim Industry: Oil & Gas
Victim Organization: saudi aramco
Victim Site: aramco.com - Alleged sale of unauthorized RDWeb access to unidentified dental software provider network
Category: Initial Access
Content: Threat actor claims to be selling unauthorized RDWeb access to an unidentified dental software provider network.
Date: 2026-03-12T04:45:29Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278054/
Screenshots:
None
Threat Actors: samy01
Victim Country: Australia
Victim Industry: Hospital & Health Care
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified shop
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified shop in Taiwan.
Date: 2026-03-12T04:32:35Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278052/
Screenshots:
None
Threat Actors: Zimmer
Victim Country: Taiwan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified store
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified online store in France.
Date: 2026-03-12T04:14:36Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278050/
Screenshots:
None
Threat Actors: TreeWater
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified Logistics company
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified logistics company in Malaysia.
Date: 2026-03-12T04:07:26Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278048/
Screenshots:
None
Threat Actors: hubert
Victim Country: Malaysia
Victim Industry: Transportation & Logistics
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of personal and financial information from China.
Category: Data Breach
Content: The threat actor claims to be leaked a large data set containing 11.7 GB of Chinese personal and financial information.
Date: 2026-03-12T04:06:55Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-Part-2-CHINA-ID-Cards-Credit-Cards-Business-Information-11-7-GB
Screenshots:
None
Threat Actors: ALTGIANT
Victim Country: China
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyberattack hit NSO Group
Category: Cyber Attack
Content: A cyberattack has reportedly targeted the infrastructure of NSO Group, an Israel-based software development company known for producing surveillance technologies. Attackers claim to have gained unauthorized access to the company’s development environment, with shared screenshots allegedly showing instances of IntelliJ IDEA and related license information, along with configuration artifacts referencing internal NSO-related domains and identifiers. These materials suggest a potential compromise of the company’s development and licensing infrastructure; however, no exploit code, customer data, or full source code leaks have been confirmed so far, though the alleged exposure of developer-level accounts or tools could represent a significant security concern if verified.
Date: 2026-03-12T02:54:26Z
Network: openweb
Published URL: https://x.com/vxunderground/status/2031870122982273184
Screenshots:
None
Threat Actors: Unknown
Victim Country: Israel
Victim Industry: Software Development
Victim Organization: nso group
Victim Site: nsogroup.com - Alleged Sale of Unauthorized Admin Access to OpenCart in France
Category: Initial Access
Content: Threat Actor claims to be selling Admin Access to OpenCart in France
Date: 2026-03-12T02:16:45Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278107/
Screenshots:
None
Threat Actors: hubert
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Chaoxin Xuexitong
Category: Data Breach
Content: The threat actor claims to have breached the dataset of Chaoxin Xuexitong, and the dataset contains college student records.
Date: 2026-03-12T01:59:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-Chaoxin-Xuexitong-2022-140M-Leak
Screenshots:
None
Threat Actors: Tink3rTech
Victim Country: China
Victim Industry: E-Learning
Victim Organization: chaoxin
Victim Site: chaoxing.com - Alleged Sale of Dukascopy Bank Internal Access
Category: Data Breach
Content: The threat actor claims to be selling the Dukascopy Bank Internal Access.
Date: 2026-03-12T01:45:03Z
Network: openweb
Published URL: https://breachforums.as/Thread-VERIFIED-Dukascopy-Bank-SA-Online-Forex-Broker
Screenshots:
None
Threat Actors: admin
Victim Country: Switzerland
Victim Industry: Banking & Mortgage
Victim Organization: dukascopy bank sa
Victim Site: dukascopy.com - Alleged Sale of Cisco Intranet Portal Access
Category: Initial Access
Content: The threat actor claims to be selling the Intranet Portal Access of Cisco.
Date: 2026-03-12T01:34:22Z
Network: openweb
Published URL: https://breachforums.as/Thread-VERIFIED-CISCO-INTRANET-PORTAL
Screenshots:
None
Threat Actors: admin
Victim Country: USA
Victim Industry: Network & Telecommunications
Victim Organization: cisco
Victim Site: cisco.com - Alleged Sale of CGPEY Database
Category: Data Breach
Content: The threat actor claims to be selling the database of CGPEY, and the dataset containing payment processing logs and customer-related data from various merchants.
Date: 2026-03-12T01:22:43Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-cgpey-com-India-3-850-000
Screenshots:
None
Threat Actors: Sorb
Victim Country: India
Victim Industry: Financial Services
Victim Organization: cgpey international private limited
Victim Site: cgpey.com - Alleged Leak of Email Database
Category: Data Breach
Content: The threat actor claims to have leaked a dataset containing thousands of email addresses.
Date: 2026-03-12T01:10:51Z
Network: openweb
Published URL: https://breachforums.as/Thread-7-6k-Emails
Screenshots:
None
Threat Actors: formousny
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Oticket
Category: Data Breach
Content: The threat actor claims to have breached the database of Oticket, and the dataset contains user personal informations.
Date: 2026-03-12T01:05:21Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-oticket-com-br-dumped-users
Screenshots:
None
Threat Actors: lula
Victim Country: Brazil
Victim Industry: Events Services
Victim Organization: oticket
Victim Site: oticket.com.br - Alleged data breach of Israeli Nuclear Power Plant infrastructure
Category: Data Breach
Content: The group claims to have breached data from Israeli Nuclear Power Plant infrastructure
Date: 2026-03-12T00:59:24Z
Network: telegram
Published URL: https://t.me/c/2869875394/358
Screenshots:
None
Threat Actors: Cardinal
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Ninebot
Category: Data Breach
Content: The threat actor claims to have breached the database of Ninebot, and the dataset contains user account information like user id, username, email address, and passwords.
Date: 2026-03-12T00:55:58Z
Network: openweb
Published URL: https://breachforums.as/Thread-ninebot-cn
Screenshots:
None
Threat Actors: Wadjet
Victim Country: China
Victim Industry: Consumer Electronics
Victim Organization: ninebot
Victim Site: ninebot.cn - Alleged Data Breach of EURL CONEXLOG
Category: Data Breach
Content: The threat actor claims to have breached the database of EURL CONEXLOG.
Date: 2026-03-12T00:35:21Z
Network: openweb
Published URL: https://breachforums.as/Thread-Algeria-EURL-CONEXLOG-All-Databases-Download
Screenshots:
None
Threat Actors: V1rusNo1r
Victim Country: Algeria
Victim Industry: Transportation & Logistics
Victim Organization: eurl conexlog
Victim Site: conexlog.com