1. Executive Summary
This report details a series of recent global cyber incidents recorded on March 18 and 19, 2026, based strictly on provided draft data. The threat landscape during this period is characterized by a high volume of website defacements, significant data breaches exposing millions of records, and the illicit sale of initial access to corporate and government networks. No screenshots were available for any of the listed incidents.
Key findings include:
- Dominant Attack Vectors: Data breaches and website defacements constitute the vast majority of the recorded incidents.
- Prolific Threat Actors: The “BABAYO EROR SYSTEM” is responsible for the highest volume of individual attacks, primarily mass defacement campaigns.
- High-Impact Breaches: Critical infrastructure, government agencies, and large corporations suffered severe data leaks, including the exfiltration of 160 million records from Vietnam’s Credit Information Center and highly sensitive data from an Iranian nuclear facility.
- Geographic Spread: The attacks are globally distributed, with notable concentrations targeting Brazil, the United States, Israel, and Indonesia.
2. Threat Actor Profiles & Campaigns
2.1 BABAYO EROR SYSTEM
This threat group was highly active, executing numerous defacement operations targeting varied industries globally.
- Targets: Badhan Mart (Bangladesh) , Panim Holdings (Kenya) , lunaclothingstore.site , MAB TECH SRL (Romania) , and multiple Brazilian sites including Ribersol Aquecedores.
- Subdomain Targeting: The group explicitly targeted subdomains of Agencia Mesa Marcial & Agencia Sobremesa (Chile) and SMA Dulwich College School Tondano (Indonesia).
- Operators: Attack campaigns were noted to be carried out by specific operators, such as “Mr.XycanKing”.
2.2 BekasiRootSec
Operating out of or targeting Brazil, this group engaged in mass defacement campaigns.
- Operators: The attacks were executed by team member “MR.N43TXPLOIT”.
- Targets: Focused heavily on Brazilian technology company Acruz Tecnologia, defacing their active e-commerce platform , customer service portal , and other associated domains.
2.3 CyberOprationCulture
This group carried out isolated, single-target website defacements rather than mass campaigns.
- Operators: Attacks were conducted by the actor “CAC./Ohang”.
- Targets: slimarcane.com , slimlinker.com , and trimcorely.com.
2.4 Anonymous For Justice
This group targeted Israeli entities, specializing in destructive data breaches where data was allegedly deleted rather than just exfiltrated.
- Targets: Rafael Alberman Ltd , Groman & Co Law Firm (1 TB deleted) , Mosadot Rema (3 TB deleted) , and Insurance Agency Ltd (3 TB deleted).
2.5 Initial Access Brokers (Various)
Multiple actors were observed selling initial access to networks, acting as facilitators for future attacks.
- Pharaohs Team market: Selling shell-level access to UAE companies Dubai Interior Design and KLAUS EMIRATES.
- Z-PENTEST ALLIANCE: Claimed unauthorized root access to a Spanish industrial refrigeration SCADA system and remote access to the video surveillance system of Supafin Seafoods in Australia.
- convince: Selling access to government and law enforcement portals across Argentina, Brazil, Pakistan, Vietnam, Bosnia and Herzegovina, Nigeria, East Timor, Thailand, and Angola.
3. Incident Categorization and Analysis
3.1 Data Breaches and Leaks
Data breaches represented the most severe incidents in terms of potential real-world impact.
- Government & Military:
- Vietnam: Leak of 160 million records from the Credit Information Center (CIC) by actor “max987,” exposing national identification numbers, passport data, and financial details.
- Tanzania: Actor “Spirigatito” claimed to exfiltrate 10.2 million records (affecting 8 million individuals) from the Government of Tanzania, including tax and business records.
- Philippines: “KurdFemboys” claimed to leak 300GB of data from a Philippine government agency.
- Pakistan: “Op. Ghazab Ka Phuck” leaked 250+ personnel records from the Trade Development Authority of Pakistan.
- Military Intelligence: Actor “spectre123” sold confidential intelligence documents from 2014-2025 belonging to Indonesia, the Philippines, Russia, Taiwan, the UK, and the US.
- Bangladesh Navy: “WIZARDSEC” claimed to breach and subsequently wipe private databases and ten years of operational records from the Bangladesh Navy Submarine Branch.
- Israel / USA: “RuskiNet” claimed leaks of Israel Police and US Military data via Telegram.
- Corporate & Commercial:
- Hachette Collections: Actor “badnigger” sold 1.4 million customer records belonging to the French publisher.
- SUCCESS Magazine: “Databroque” breached 141,000 user records.
- Wolfe Eye Clinic: Actor “Tanaka” leaked 639,640 records including SSNs.
- Luxury Hotel Chain: “golovey_team” sold 450,000 booking records from a Central Reservation System.
- LinkedIn: “Dedale Office” claimed a leak of approximately one million rows of LinkedIn data in JSON format.
- Apple iCloud: “Spectre6272” claimed to sell 3.8 million records of U.S. consumer iCloud data.
3.2 Defacements
Defacements were utilized heavily, often as mass campaigns to spread political messages or demonstrate technical dominance.
- Actor “maw3six” performed a solo defacement of a Polish Linux-based server (cannibal.pl).
- “VinzXmodz” targeted the Indonesian government agency Badan Kepegawaian Negara.
- “THE ANONYMOUS BD” defaced the Indian non-profit site Mission Modi Again PM.
- “Banei Ishmael” targeted Teva Pharmaceuticals in Israel.
- “Rakyat Digital Crew” defaced the Vietnamese telecommunications site VTC NETVIET.
3.3 Initial Access Markets
The illicit sale of access to compromised networks remains a persistent threat.
- E-commerce: Sales of admin access to an unidentified Netherlands WordPress shop , a UK OpenCart shop , multiple US online stores , and a Canadian Shopify store via API.
- Corporate IT: “figure” sold admin/super-admin access to Ampere Computing (USA) , and “Big-Bro” sold RDWeb access to a Spanish professional services firm.
- Critical Infrastructure: The claim of root access to a Spanish industrial refrigeration SCADA system highlights severe physical supply chain risks.
3.4 Vulnerability Exploitation and Malware
- Vulnerability Leaks: The group “Rakyat Digital Crew” claimed to leak a specific vulnerability (CVE-2025-48148) across multiple targets, including SharjahEvents (UAE) , MCBank (Luxembourg) , Peru Federal Savings Bank (USA) , and SLA Syndicat (France).
- Malware Sales: Actor “SectorD” listed “Sector Drainer” for sale, describing it as a crypto-draining toolkit utilizing a zero-day exploit to bypass wallet security.
3.5 Specific Cyber Attacks and Alerts
- Intuitive: The US medical equipment manufacturer suffered a cyberattack via targeted employee phishing, exposing limited corporate and customer data, though core platforms remained secure due to network segmentation.
- Lebanon: The “Fatimion cyber team” claimed a destructive attack on the Lebanese Ministry of Information, stating servers were deleted , and issued alerts targeting the Lebanese Ministry of Foreign Affairs and Qatari Ministry of Energy.
- Yemen Cyber Army Official: Issued an alert indicating they are providing resources to target Saudi Arabia.
- Botnets/Attack Infrastructure: Groups “BACKDOR-SQUAD” and “Pharaohs Team market” advertised lists of low-authority websites, likely to be utilized as infrastructure for future cyberattacks.
4. Conclusion
The cyber threat data from March 18-19, 2026, reveals a highly active and diverse ecosystem of malicious actors. Threat actors are successfully monetizing compromises through initial access brokering and data sales on the open web and dark forums. The prominent use of Telegram as a communication and distribution channel is evident among defacement groups and hacktivists. Organizations face a dual threat: financially motivated actors seeking to exfiltrate and sell high-value PII and intelligence , alongside ideologically motivated groups intent on destruction and disruption, as seen in the data wiping attacks against Israeli targets and the Bangladesh Navy. The continued targeting of vulnerable content management systems (WordPress, OpenCart, Shopify) and the specific exploitation of vulnerabilities like CVE-2025-48148 demand immediate patching and stringent access controls across all sectors.
Detected Incidents Draft Data
- Alleged Sale of Unauthorized Admin Access to an Unidentified WordPress Shop in Netherlands
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized admin access to an unidentified WordPress shop Netherlands.
Date: 2026-03-18T23:59:09Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278653/
Screenshots:
None
Threat Actors: UnitT
Victim Country: Netherlands
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Philippine Government Agency
Category: Data Breach
Content: The threat actor claims to have leaked 300GB of data from Philippine government agency, The dataset may include official documents, identification records, and administrative files, though the exact scope and number of affected records were not disclosed.
Date: 2026-03-18T22:30:27Z
Network: openweb
Published URL: https://darkforums.su/Thread-Document-Philippine-Government-Agency-batch-1-2-%E2%89%88300Gb
Screenshots:
None
Threat Actors: KurdFemboys
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of SUCCESS Magazine
Category: Data Breach
Content: The threat actor claims to have breached 141,000 users of data from SUCCESS Magazine,The compromised dataset exposed data includes user info, emails, phone numbers, company details, billing/shipping info, order details, and account data.
Date: 2026-03-18T22:27:40Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-Success-com-Database
Screenshots:
None
Threat Actors: Databroque
Victim Country: USA
Victim Industry: Social Media & Online Social Networking
Victim Organization: success magazine
Victim Site: success.com - Alleged data breach of Hachette Collections
Category: Data Breach
Content: A threat actor claims to be selling a large dataset allegedly sourced from Hachette Collections. The database contains approximately 1.4 million customer records, including detailed personal and account information. Exposed data reportedly includes full names, email addresses, phone numbers, dates of birth, and residential addresses, along with order history, subscription details, and customer profiling information such as preferences, membership levels, and loyalty data.
Date: 2026-03-18T22:24:44Z
Network: openweb
Published URL: https://breached.st/threads/1-4m-france-hachette-collections-com-customer-pii-emails-order-history-addresses-dobs.85603/
Screenshots:
None
Threat Actors: badnigger
Victim Country: France
Victim Industry: Publishing Industry
Victim Organization: hachette collections
Victim Site: hachette-collections.com - Alleged data breach of Wolfe Eye Clinic
Category: Data Breach
Content: The threat actor claims to have breached 639,640 records of data from Wolfe Eye Clinic. The compromised data includes Social Security Numbers (SSNs), full names, addresses, phone numbers, emails, and other sensitive personal info.
Date: 2026-03-18T22:16:37Z
Network: openweb
Published URL: https://darkforums.su/Thread-Wolfe-Eye-Clinic-2021-leak
Screenshots:
None
Threat Actors: Tanaka
Victim Country: USA
Victim Industry: Medical Practice
Victim Organization: wolfe eye clinic
Victim Site: wolfeeyeclinic.com - Website defacement of slimarcane.com by CAC./Ohang (CyberOprationCulture)
Category: Defacement
Content: The website slimarcane.com was defaced on March 19, 2026 by the attacker CAC./Ohang associated with the CyberOprationCulture team. This appears to be an isolated defacement incident rather than part of a mass campaign.
Date: 2026-03-18T21:54:49Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248020
Screenshots:
None
Threat Actors: CAC./Ohang, CyberOprationCulture
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: slimarcane.com - Website defacement of slimlinker.com by CyberOprationCulture team member CAC./Ohang
Category: Defacement
Content: The website slimlinker.com was defaced by attacker CAC./Ohang from the CyberOprationCulture team on March 19, 2026. This was a single-target defacement rather than a mass or repeated attack.
Date: 2026-03-18T21:54:21Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248021
Screenshots:
None
Threat Actors: CAC./Ohang, CyberOprationCulture
Victim Country: Unknown
Victim Industry: Technology
Victim Organization: SlimLinker
Victim Site: slimlinker.com - Website defacement of Trimcorely by CAC./Ohang (CyberOprationCulture team)
Category: Defacement
Content: The website trimcorely.com was defaced by attacker CAC./Ohang, affiliated with the CyberOprationCulture team, on March 19, 2026. This was reported as a single-site defacement rather than a mass or re-defacement incident.
Date: 2026-03-18T21:53:42Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/248022
Screenshots:
None
Threat Actors: CAC./Ohang, CyberOprationCulture
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Trimcorely
Victim Site: trimcorely.com - Website defacement of Acruz Tecnologia e-commerce platform by MR.N43TXPLOIT (BekasiRootSec)
Category: Defacement
Content: The BekasiRootSec group, through member MR.N43TXPLOIT, successfully defaced the Active E-commerce platform belonging to Brazilian technology company Acruz Tecnologia on March 19, 2026. The attack targeted a single website rather than being part of a mass defacement campaign.
Date: 2026-03-18T21:37:14Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/247983
Screenshots:
None
Threat Actors: MR.N43TXPLOIT, BekasiRootSec
Victim Country: Brazil
Victim Industry: Technology/E-commerce
Victim Organization: Acruz Tecnologia
Victim Site: activeecommerce.acruztecnologia.com.br - Mass defacement campaign by BekasiRootSec targeting Brazilian websites
Category: Defacement
Content: BekasiRootSec team member MR.N43TXPLOIT conducted a mass defacement campaign targeting multiple websites including A Cruz Tecnologias domain. The attack was part of a broader mass defacement operation affecting numerous sites simultaneously.
Date: 2026-03-18T21:36:40Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/247984
Screenshots:
None
Threat Actors: MR.N43TXPLOIT, BekasiRootSec
Victim Country: Brazil
Victim Industry: Technology
Victim Organization: A Cruz Tecnologia
Victim Site: agendadopaulo.acruztecnologia.com.br - Mass website defacement campaign by BekasiRootSec targeting Brazilian technology company
Category: Defacement
Content: BekasiRootSec threat group conducted a mass defacement campaign targeting multiple websites including A Cruz Tecnologias customer service portal. The attack was carried out by actor MR.N43TXPLOIT on March 19, 2026, affecting the Brazilian technology companys web infrastructure.
Date: 2026-03-18T21:36:13Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/247985
Screenshots:
None
Threat Actors: MR.N43TXPLOIT, BekasiRootSec
Victim Country: Brazil
Victim Industry: Technology
Victim Organization: A Cruz Tecnologia
Victim Site: atendimento.acruztecnologia.com.br - Alleged data leak of Israel Police
Category: Data Breach
Content: The group claims to have leaked data of Israel Police.
Date: 2026-03-18T21:11:21Z
Network: telegram
Published URL: https://t.me/ruskinetgroup/97
Screenshots:
None
Threat Actors: RuskiNet
Victim Country: Israel
Victim Industry: Law Enforcement
Victim Organization: israel police
Victim Site: police.gov.il - Alleged Leak of US Military Data
Category: Data Breach
Content: The group claims to have leaked the US Military Data.
Date: 2026-03-18T21:08:44Z
Network: telegram
Published URL: https://t.me/ruskinetgroup/98
Screenshots:
None
Threat Actors: RuskiNet
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Website defacement of cannibal.pl by maw3six
Category: Defacement
Content: Threat actor maw3six successfully defaced the cannibal.pl website on March 19, 2026. The attack was conducted as a solo operation without team affiliation and targeted a Linux-based server.
Date: 2026-03-18T19:42:10Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/247982
Screenshots:
None
Threat Actors: maw3six
Victim Country: Poland
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: cannibal.pl - Alleged Unauthorized Access to Industrial Refrigeration SCADA System
Category: Initial Access
Content: The threat group claims to have gained unauthorized root access to an industrial refrigeration SCADA system in Spain, with full control over temperature settings, compressors, defrost cycles, and airflow systems. This access could allow disruption of operations, equipment damage, and large-scale food spoilage, potentially impacting supply chains.
Date: 2026-03-18T19:36:45Z
Network: telegram
Published URL: https://t.me/c/3792806777/23
Screenshots:
None
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Yemen Cyber Army Official claims to target Saudi Arabia
Category: Alert
Content: A recent post by the group indicates that they are providing resources to target Saudi Arabi.
Date: 2026-03-18T19:06:57Z
Network: telegram
Published URL: https://t.me/YC_Army_Offical/461
Screenshots:
None
Threat Actors: Yemen Cyber Army Official
Victim Country: Saudi Arabia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized OpenCart Admin Access to an Unidentified Shop in the United Kingdom
Category: Initial Access
Content: The threat actor claims to be selling unauthorized OpenCart admin access to an unidentified shop in the United Kingdom, stating that access includes admin login credentials obtained by decrypting the admin password, with payments processed via a native payment form, an average bill of £200–£300, and approximately 15,000 orders recorded over the last 90 days.
Date: 2026-03-18T19:04:36Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278639/
Screenshots:
None
Threat Actors: bobby_killa
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM targets the website of Badhan Mart
Category: Defacement
Content: The group claims to have defaced the website of Badhan Mart.
Date: 2026-03-18T18:28:45Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/265
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Bangladesh
Victim Industry: E-commerce & Online Stores
Victim Organization: badhan mart
Victim Site: badhanmart.com.dhakasolution.com - Alleged cyberattack on Lebanese Ministry of Information
Category: Cyber Attack
Content: The group claims to have carried out a cyberattack on Lebanese Ministry of Information asserting that they gained unauthorized access to its website and that all servers were deleted and destroyed.
Date: 2026-03-18T18:25:43Z
Network: telegram
Published URL: https://t.me/hak994/5388
Screenshots:
None
Threat Actors: Fatimion cyber team
Victim Country: Lebanon
Victim Industry: Government Administration
Victim Organization: lebanese ministry of information
Victim Site: ministryinfo.gov.lb - Fatimion cyber team targets Lebanese Ministry of Foreign Affairs
Category: Alert
Content: A recent post by the group indicates that they are targeting Lebanese Ministry of Foreign Affairs.
Date: 2026-03-18T18:23:49Z
Network: telegram
Published URL: https://t.me/hak994/5380
Screenshots:
None
Threat Actors: Fatimion cyber team
Victim Country: Lebanon
Victim Industry: Government Administration
Victim Organization: lebanese ministry of foreign affairs
Victim Site: mfa.gov.lb - Alleged Sale of iCloud USA Data
Category: Data Breach
Content: A threat actor claims to be selling iCloud data of U.S. consumers, with approximately 3.8 million records available.
Date: 2026-03-18T18:22:59Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/278635/
Screenshots:
None
Threat Actors: Spectre6272
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM targets the website of Panim Holdings
Category: Defacement
Content: The group claims to have defaced the website of Panim Holdings.
Date: 2026-03-18T18:22:25Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/265
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Kenya
Victim Industry: Transportation & Logistics
Victim Organization: panim holdings
Victim Site: eireney.co.ke.panimholdings.com - BABAYO EROR SYSTEM targets the website of lunaclothingstore.site
Category: Defacement
Content: The group claims to have defaced the website of lunaclothingstore.site.
Date: 2026-03-18T18:22:19Z
Network: telegram
Published URL: https://t.me/hak994/5380
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Retail Industry
Victim Organization: lunaclothingstore.site
Victim Site: lunaclothingstore.site - BABAYO EROR SYSTEM targets the website of MAB TECH SRL
Category: Defacement
Content: The group claims to have defaced the website of MAB TECH SRL.
Date: 2026-03-18T18:10:46Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/265
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Romania
Victim Industry: Information Technology (IT) Services
Victim Organization: mab tech srl
Victim Site: mabtech.ro - BABAYO EROR SYSTEM targets the subdomains of Agencia Mesa Marcial & Agencia Sobremesa
Category: Defacement
Content: The group claims to have defaced the subdomains of Agencia Mesa Marcial & Agencia Sobremesa. The subdomains include:atloverseas.agenciamesamarcial.clmonardd.agenciasobremesa.clrymar.agenciasobremesa.clpaulina.agenciasobremesa.clvogliotutto.agenciasobremesa.cljorgecampos.agenciasobremesa.clorgecampos.agenciasobremesa.clgrupotoso.agenciasobremesa.clmonardd.agenciasobremesa.cl
Date: 2026-03-18T17:58:51Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/265
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Chile
Victim Industry: Marketing, Advertising & Sales
Victim Organization: agencia mesa marcial & agencia sobremesa
Victim Site: atloverseas.agenciamesamarcial.cl - Fatimion cyber team claims to target Qatari Ministry of Energy
Category: Alert
Content: A recent post by the group indicates that they are targeting Qatari Ministry of Energy.
Date: 2026-03-18T17:50:10Z
Network: telegram
Published URL: https://t.me/hak994/5373
Screenshots:
None
Threat Actors: Fatimion cyber team
Victim Country: Qatar
Victim Industry: Government Administration
Victim Organization: qatari ministry of energy
Victim Site: qatarenergy.qa - Alleged data breach of Rafael Alberman Ltd
Category: Data Breach
Content: The group claims to have deleted data from Rafael Alberman Ltd.
Date: 2026-03-18T17:49:17Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/40
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Building and construction
Victim Organization: rafael alberman ltd
Victim Site: Unknown - Alleged data breach of Credit Information Center (CIC)
Category: Data Breach
Content: A threat actor claims to have leaked a large dataset allegedly obtained from Vietnam’s Credit Information Center (CIC). The data include over 160 million records in SQL and CSV formats, covering both individuals and companies. The exposed information reportedly contains highly sensitive personal and financial details such as full names, dates of birth, national identification numbers (CCCD/CMND), passport data, phone numbers, email addresses, and residential addresses
Date: 2026-03-18T17:31:43Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-VN-CIC-VIETNAM-160M-2025
Screenshots:
None
Threat Actors: max987
Victim Country: Vietnam
Victim Industry: Financial Services
Victim Organization: credit information center (cic)
Victim Site: cic.gov.vn - BABAYO EROR SYSTEM targets the subdomains of SMA Dulwich College School Tondano
Category: Defacement
Content: The group claims to have defaced the Subdomains of SMA Dulwich College School Tondano.Subdomains include:smadcs-tdo.sch.idsiu.smadcs-tdo.sch.idspmb.smadcs-tdo.sch.id
Date: 2026-03-18T17:10:29Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/264
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: sma dulwich college school tondano
Victim Site: smadcs-tdo.sch.id - Alleged Sale of Data from Unidentified Luxury Hotel Chain Database
Category: Data Breach
Content: A threat actor claims to have sale of a large dataset allegedly obtained from the Central Reservation System (CRS) of a luxury hotel chain. The database is claimed to contain approximately 450,000 booking records across more than 600 hotels worldwide, primarily involving high-end properties. The exposed data reportedly includes guest names, email addresses, phone numbers, residential addresses, booking details, and partially masked payment card information.
Date: 2026-03-18T17:07:26Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-450k-High-Net-Worth-data-from-Luxury-hotel-chain
Screenshots:
None
Threat Actors: golovey_team
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Mass website defacement campaign by BABAYO EROR SYSTEM targeting Brazilian sites
Category: Defacement
Content: The threat group BABAYO EROR SYSTEM, through operator Mr.XycanKing, conducted a mass defacement campaign targeting multiple websites including Brazilian solar heating company Ribersol Aquecedores. This incident represents a redefacement of previously compromised infrastructure as part of a broader coordinated attack campaign.
Date: 2026-03-18T14:57:20Z
Network: openweb
Published URL: https://haxor.id/archive/mirror/247981
Screenshots:
None
Threat Actors: Mr.XycanKing, BABAYO EROR SYSTEM
Victim Country: Brazil
Victim Industry: Solar Energy/Heating Systems
Victim Organization: Ribersol Aquecedores
Victim Site: ribersolaquecedores.com.br - Alleged sale of Government and Law Enforcement portal access across Multiple Countries
Category: Initial Access
Content: The threat actor claims to be selling access to government and law enforcement email accounts and official portals across multiple countries, including Argentina, Brazil, Pakistan, Vietnam, Bosnia and Herzegovina, Nigeria, East Timor, Thailand, and Angola.
Date: 2026-03-18T14:38:23Z
Network: openweb
Published URL: https://breached.st/threads/selling-govmails-police-emails-law-enforcement-portals-for-edrs-guide.43428/
Screenshots:
None
Threat Actors: convince
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data sale of Smart Financial Solutions EAD
Category: Data Breach
Content: The threat actor claims to have breached data from Smart Financial Solutions EAD, containing sensitive financial and personal information. The compromised data include company records, email addresses, Bulgarian ID details (front and back), phone numbers, and other personal data associated with individuals and entities based in Bulgaria.
Date: 2026-03-18T14:15:35Z
Network: openweb
Published URL: https://xss.pro/threads/146471/
Screenshots:
None
Threat Actors: nightly
Victim Country: Bulgaria
Victim Industry: Financial Services
Victim Organization: smart financial solutions ead
Victim Site: Unknown - VinzXmodz targets the website of Badan Kepegawaian Negara
Category: Defacement
Content: Proof of downtime : https://check-host.net/check-report/3bfe561ak1a
Date: 2026-03-18T14:14:46Z
Network: telegram
Published URL: https://t.me/mmkanjkontl/5397
Screenshots:
None
Threat Actors: VinzXmodz
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: badan kepegawaian negara
Victim Site: bkn.go.id - Alleged database leak of REX REGUM QEON TEAM
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly tied to Team RRQ. The compromised dataset purportedly includes personal information such as full names, social media accounts, phone numbers, physical addresses, ZIP codes, and email addresses of individuals associated with the group.
Date: 2026-03-18T13:54:54Z
Network: telegram
Published URL: https://t.me/DedaleOffice/1158
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: Indonesia
Victim Industry: Gaming
Victim Organization: rex regum qeon team
Victim Site: teamrrq.com - BABAYO EROR SYSTEM targets the website of visionarioempreendedor.com.br.eaglesnet.com.br
Category: Defacement
Content: The group claims to have defaced the website of visionarioempreendedor.com.br.eaglesnet.com.br.
Date: 2026-03-18T13:46:45Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: visionarioempreendedor.com.br.eaglesnet.com.br - Alleged data leak of LinkedIn database
Category: Data Breach
Content: The threat actor claims to have obtained and leaked a large dataset allegedly associated with LinkedIn. The actor states that the leak contains approximately one million rows in JSON format
Date: 2026-03-18T13:45:41Z
Network: telegram
Published URL: https://t.me/DedaleOffice/1157
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: Austria
Victim Industry: Social Media & Online Social Networking
Victim Organization: linkedin
Victim Site: linkedin.com - BABAYO EROR SYSTEM targets the website of lojaelevese.com.br.eaglesnet.com.br
Category: Defacement
Content: The group claims to have defaced the website of lojaelevese.com.br.eaglesnet.com.br.
Date: 2026-03-18T13:43:50Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: lojaelevese.com.br.eaglesnet.com.br - Alleged data sale of Government of the United Republic of Tanzania
Category: Data Breach
Content: The threat actor claims to have compromised the Government of Tanzania infrastructure linked to BRELA and exfiltrated approximately 10.2 million records, including data on around 8 million individuals, allegedly containing containing business registrations, personal profiles, tax identification numbers and government related records.
Date: 2026-03-18T13:38:37Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Government-of-Tanzania-tanzaniangovisgay-lol
Screenshots:
None
Threat Actors: Spirigatito
Victim Country: Tanzania
Victim Industry: Government Administration
Victim Organization: government of the united republic of tanzania
Victim Site: tanzania.go.tz - Alleged Data Breach of Groman & Co Law Firm
Category: Data Breach
Content: The group claims to have deleted 1 TB of data from Groman & Co Law Firm.
Date: 2026-03-18T13:32:46Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/39
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Law Practice & Law Firms
Victim Organization: groman & co law firm
Victim Site: Unknown - Alleged sale of shell access to Dubai Interior Design
Category: Initial Access
Content: Group claims to be selling shell-level access to Dubai Interior Design.
Date: 2026-03-18T13:19:08Z
Network: telegram
Published URL: https://t.me/phteammarket/369
Screenshots:
None
Threat Actors: Pharaohs Team market
Victim Country: UAE
Victim Industry: Design
Victim Organization: dubai interior design
Victim Site: interiorcompanydubai.com - Alleged sale of shell access to KLAUS EMIRATES
Category: Initial Access
Content: The threat actor claims to be selling shell-level access to KLAUS EMIRATES.
Date: 2026-03-18T13:19:03Z
Network: telegram
Published URL: https://t.me/phteammarket/369
Screenshots:
None
Threat Actors: Pharaohs Team market
Victim Country: UAE
Victim Industry: Information Technology (IT) Services
Victim Organization: klaus emirates
Victim Site: klausemirates.com - Alleged sale of confidential intelligence documents
Category: Data Breach
Content: The threat actor claims to be selling highly confidential intelligence documents allegedly sourced from multiple countries, including Indonesia, the Philippines, Russia, Taiwan, the United Kingdom, and the United States, covering the period from 2014 to 2025.
Date: 2026-03-18T13:12:00Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Indonesian-intel-agency-Philippines-MOD-FSB-TW-UK-US-intel-documents
Screenshots:
None
Threat Actors: spectre123
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of Sector Drainer
Category: Malware
Content: The threat actor claims to be selling “Sector Drainer,” a crypto-draining toolkit using a 0-day exploit to bypass wallet security and enable hidden, automated asset theft. The tool allegedly supports multiple wallets and blockchains, with features like spoofing, security bypass, and phishing infrastructure, along with hosting services and flexible revenue-sharing terms.
Date: 2026-03-18T13:06:24Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Sector-Drainer-%E2%80%93-0-day-Bypass-2026-Hidden-Drain-Autowithdraw-Free-Hosting
Screenshots:
None
Threat Actors: SectorD
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of low-authority websites list
Category: Cyber Attack
Content: The group claims to be selling a list of low-authority websites likely intended for use in future cyberattacks.
Date: 2026-03-18T13:06:06Z
Network: telegram
Published URL: https://t.me/c/2758066065/1124
Screenshots:
None
Threat Actors: BACKDOR-SQUAD
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Trade Development Authority of Pakistan
Category: Data Breach
Content: The threat actor claims to have leaked a database from the Trade Development Authority of Pakistan containing 250+ personnel records. The exposed dataset reportedly includes sensitive personally identifiable information such as names, father names, CNIC numbers, pay scales, dates of birth, email addresses, mobile numbers, designations, salary details , outstanding amounts, and home addresses.
Date: 2026-03-18T12:39:31Z
Network: telegram
Published URL: https://t.me/opghazabkafuck/45
Screenshots:
None
Threat Actors: Op. Ghazab Ka Phuck
Victim Country: Pakistan
Victim Industry: Government Administration
Victim Organization: trade development authority of pakistan
Victim Site: tdap.gov.pk - BABAYO EROR SYSTEM targets the website of moveisplanejadostop.com.br.eaglesnet.com.br
Category: Defacement
Content: The group claims to have defaced the website of moveisplanejadostop.com.br.eaglesnet.com.br
Date: 2026-03-18T11:29:01Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Brazil
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: moveisplanejadostop.com.br.eaglesnet.com.br - BABAYO EROR SYSTEM targets the website of printbd.mstertelecom.xyz
Category: Defacement
Content: The group claims to have defaced the website of printbd.mstertelecom.xyz
Date: 2026-03-18T11:26:45Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: printbd.mstertelecom.xyz - BABAYO EROR SYSTEM targets the website of kota.agenciasobremesa.cl
Category: Defacement
Content: The group claims to have defaced the website of kota.agenciasobremesa.cl.
Date: 2026-03-18T11:25:31Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: eireney.co.ke.panimholdings.com - Banei Ishmael targets the website of Teva Pharmaceuticals
Category: Defacement
Content: Group claims to have deface the website of Teva Pharmaceuticals.
Date: 2026-03-18T11:25:27Z
Network: telegram
Published URL: https://t.me/BaneiIshmael4/256
Screenshots:
None
Threat Actors: Banei Ishmael
Victim Country: Israel
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: teva pharmaceuticals
Victim Site: myteva.com - Alleged sale of low-authority websites list
Category: Cyber Attack
Content: The group claims to be selling a list of low-authority websites likely intended for use in future cyberattacks.
Date: 2026-03-18T11:05:16Z
Network: telegram
Published URL: https://t.me/phteammarket/368
Screenshots:
None
Threat Actors: Pharaohs Team market
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - BABAYO EROR SYSTEM targets the website of paulina.agenciasobremesa.cl
Category: Defacement
Content: The group claims to have defaced the website of paulina.agenciasobremesa.cl.
Date: 2026-03-18T11:05:13Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: paulina.agenciasobremesa.cl - BABAYO EROR SYSTEM targets the website of smartphonesaqui.com.br.eaglesnet.com.br
Category: Defacement
Content: The group claims to have defaced the website of smartphonesaqui.com.br.eaglesnet.com.br
Date: 2026-03-18T11:01:26Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Brazil
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: smartphonesaqui.com.br.eaglesnet.com.br - BABAYO EROR SYSTEM targets the website of MAB TECH
Category: Defacement
Content: The group claims to have defaced the website of MAB TECH.
Date: 2026-03-18T10:54:10Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Romania
Victim Industry: Information Technology (IT) Services
Victim Organization: mab tech
Victim Site: mabtech.ro - BABAYO EROR SYSTEM targets the website of syedumairjafri.lunaclothingstore.site
Category: Defacement
Content: The group claims to have defaced the website of syedumairjafri.lunaclothingstore.site.
Date: 2026-03-18T10:42:03Z
Network: telegram
Published URL: https://t.me/BabayoErorSyteam/259
Screenshots:
None
Threat Actors: BABAYO EROR SYSTEM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: syedumairjafri.lunaclothingstore.site - Rakyat Digital Crew targets the website of VTC NETVIET
Category: Defacement
Content: The group claims to have defaced the website of VTC NETVIET.
Date: 2026-03-18T10:29:48Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/112
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Vietnam
Victim Industry: Network & Telecommunications
Victim Organization: vtc netviet
Victim Site: baichay.vtcnetviet.com - Alleged Data Breach of Mosadot Rema
Category: Data Breach
Content: The group claims to have deleted 3 TB of data from Mosadot Rema.
Date: 2026-03-18T09:38:24Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/38
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Religious Institutions
Victim Organization: mosadot rema
Victim Site: Unknown - Alleged vulnerability leak of SharjahEvents
Category: Vulnerability
Content: Group claims to have leaked a vulnerability (CVE-2025-48148) in SharjahEvents.
Date: 2026-03-18T09:19:55Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/111
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: UAE
Victim Industry: Events Services
Victim Organization: sharjahevents
Victim Site: cms.sharjahevents.ae/wp-content/plugins/storekeeper-for-woocommerce - Alleged vulnerability leak of MCBank
Category: Vulnerability
Content: Group claims to have leaked a vulnerability (CVE-2025-48148) in MCBank.
Date: 2026-03-18T08:03:20Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/111
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Luxembourg
Victim Industry: Financial Services
Victim Organization: mcbank
Victim Site: mc.bank - Alleged vulnerability leak of Peru Federal Savings Bank
Category: Vulnerability
Content: Group claims to have leaked a vulnerability (CVE-2025-48148) in Peru Federal Savings Bank.
Date: 2026-03-18T08:02:21Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/111
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: USA
Victim Industry: Financial Services
Victim Organization: peru federal savings bank
Victim Site: perufederalsavings.com/component/storekeeper - Alleged vulnerability leak of SLA Syndicat
Category: Vulnerability
Content: Group claims to have leaked a vulnerability (CVE-2025-48148) in SLA Syndicat.
Date: 2026-03-18T07:55:23Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/111
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: France
Victim Industry: Sports
Victim Organization: sla syndicat
Victim Site: sla-syndicat.org - Alleged data breach of Bangladesh Navy Submarine Branch
Category: Data Breach
Content: The threat actor claims to have infiltrated the internal servers of the Bangladesh Navy Submarine Branch, stating that they accessed private databases and roughly ten years of operational records. They further assert that the obtained data was wiped following the intrusion.
Date: 2026-03-18T07:28:59Z
Network: telegram
Published URL: https://t.me/deadalreadybitchhhh/41
Screenshots:
None
Threat Actors: WIZARDSEC
Victim Country: Bangladesh
Victim Industry: Military Industry
Victim Organization: bangladesh navy
Victim Site: navy.mil.bd - Alleged Sale of Sensitive Iranian Nuclear Facility data
Category: Data Breach
Content: The threat actor claims to be selling highly sensitive data allegedly exfiltrated from a nuclear facility. The dataset contains confidential data.
Date: 2026-03-18T06:42:32Z
Network: openweb
Published URL: https://darkforums.su/Forum-Sellers-Place?sortby=started&order=desc&datecut=9999&prefix=0
Screenshots:
None
Threat Actors: Jondata1
Victim Country: Venezuela
Victim Industry: Aviation & Aerospace
Victim Organization: quo vadis airline
Victim Site: quovadis.com.ve - THE ANONYMOUS BD targets the website of Mission Modi Again PM
Category: Defacement
Content: The group claims to have defaced the website of Mission Modi Again PM
Date: 2026-03-18T06:21:40Z
Network: telegram
Published URL: https://t.me/tgray_hacker/687
Screenshots:
None
Threat Actors: THE ANONYMOUS BD
Victim Country: India
Victim Industry: Non-profit & Social Organizations
Victim Organization: mission modi again pm
Victim Site: missionmodi.org - Alleged Sale of daryn.online User Database
Category: Data Breach
Content: The threat actor claims to be selling a dataset allegedly extracted from daryn.online systems. The dataset contains user personal information.
Date: 2026-03-18T06:21:24Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-4M-USER-PERSONAL-INFORMATION-DATA-FROM-daryn-online
Screenshots:
None
Threat Actors: Shinchan
Victim Country: Kazakhstan
Victim Industry: Education
Victim Organization: daryn
Victim Site: daryn.online - Alleged Sale of Sensitive Iranian Nuclear Facility data
Category: Data Breach
Content: The threat actor claims to be selling highly sensitive data allegedly exfiltrated from a nuclear facility.
Date: 2026-03-18T06:15:54Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Secret-Iranian-nuclear-reactor
Screenshots:
None
Threat Actors: Jondata1
Victim Country: Iran
Victim Industry: Energy & Utilities
Victim Organization: Unknown
Victim Site: Unknown - MORNING STAR claims to target Top Print
Category: Alert
Content: The group claims to have gained access to the CCTV system of the Canadian company Top Print.
Date: 2026-03-18T05:58:46Z
Network: telegram
Published URL: https://t.me/op_morningstar/555
Screenshots:
None
Threat Actors: MORNING STAR
Victim Country: Canada
Victim Industry: Printing
Victim Organization: top print
Victim Site: topprints.ca - Alleged unauthorized access to Rasam Innovation Agency
Category: Initial Access
Content: Threat actor claims to have leaked unauthorized admin access to Rasam Innovation Agency.
Date: 2026-03-18T05:54:40Z
Network: openweb
Published URL: https://xforums.st/threads/clam-ir-admin-wp-login.536412/
Screenshots:
None
Threat Actors: X Forum Bot
Victim Country: Iran
Victim Industry: Information Technology (IT) Services
Victim Organization: rasam innovation agency
Victim Site: clam.ir - Alleged Sale of data from Fédération Française de Rugby (FFR)
Category: Data Breach
Content: The threat actor claims to be selling 654K individuals records from Fédération Française de Rugby (FFR) with personal, contact, identification, medical , and sports records, along with 1M player photos and thousands of club/stadium documents and much more information.
Date: 2026-03-18T05:54:10Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-FR-FFrugby
Screenshots:
None
Threat Actors: CyberNox
Victim Country: France
Victim Industry: Sports
Victim Organization: fédération française de rugby (ffr)
Victim Site: ffr.fr - Alleged Leak of Iraqi Electoral Register Database
Category: Data Breach
Content: The threat actor claims to be leaked Iraqi Electoral Register Database. The exposed data fields includes Usernames, residential addresses, phone, email addresses and much more information.
Date: 2026-03-18T05:01:13Z
Network: openweb
Published URL: https://darkforums.su/Thread-iraqi-databaes
Screenshots:
None
Threat Actors: Jondata1
Victim Country: Iraq
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin Access to Ampere Computing
Category: Initial Access
Content: The threat actor claims to be selling admin and super-admin level access to systems associated with Ampere Computing.
Date: 2026-03-18T04:49:03Z
Network: openweb
Published URL: https://spear.cx/Thread-Selling-ampere-computing-admin-superadmin-accounts
Screenshots:
None
Threat Actors: figure
Victim Country: USA
Victim Industry: Semiconductors
Victim Organization: ampere computing
Victim Site: amperecomputing.com - Alleged Leak of Cryptocurrency Trading Platform Data
Category: Data Breach
Content: The threat actor claims to be leaked Cryptocurrency Trading Platform Data. The exposed data fields Usernames, residential addresses, phone, email addresses, passwords and much more information.
Date: 2026-03-18T04:33:02Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-BITCOIN-OTC-FX-instacoins-hugosway-all-databases
Screenshots:
None
Threat Actors: web3hacker
Victim Country: Unknown
Victim Industry: Financial Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized admin and shell access to unidentified stores
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to unidentified online stores in USA.
Date: 2026-03-18T04:16:15Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278501/
Screenshots:
None
Threat Actors: JustAnon69
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Cyberattack Hits Intuitive
Category: Cyber Attack
Content: A cybersecurity incident affected the internal IT systems of Intuitive after an employee account was compromised through a targeted phishing attack. The unauthorized access exposed limited customer contact information along with employee and corporate data. The company confirmed that core platforms, were not impacted due to network segmentation. No operational disruption was reported, and the incident has been contained with an ongoing investigation.
Date: 2026-03-18T04:12:21Z
Network: openweb
Published URL: https://www.intuitive.com/en-us/about-us/newsroom/Intuitive-statement-on-cybersecurity-incident
Screenshots:
None
Threat Actors: Unknown
Victim Country: USA
Victim Industry: Medical Equipment Manufacturing
Victim Organization: intuitive
Victim Site: intuitive.com - Alleged data leak of Grayhat Eksportir Garmen
Category: Data Breach
Content: The threat actor claims to be leaked data from Grayhat Eksportir Garmen. The data allegedly include Company Name, Factory Address, Office Address, Factory Area/Location, Email Address, Mobile Number and much more information.
Date: 2026-03-18T04:06:40Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-Leaked-By-XZeeone-Grayhat-eksportir-garmen-Bangladesh-india
Screenshots:
None
Threat Actors: XZeeoneOfc
Victim Country: Bangladesh
Victim Industry: Textiles
Victim Organization: grayhat eksportir garmen
Victim Site: Unknown - Alleged sale of unauthorized RDWeb access to unidentified Business service organization
Category: Initial Access
Content: Threat actor claims to be selling unauthorized RDWeb access to an unidentified Business service organization in Spain.
Date: 2026-03-18T04:04:09Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278513/
Screenshots:
None
Threat Actors: Big-Bro
Victim Country: Spain
Victim Industry: Professional Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Insurance Agency Ltd
Category: Data Breach
Content: The group claims to have deleted 3 terabytes of data from Insurance Agency Ltd
Date: 2026-03-18T03:43:10Z
Network: telegram
Published URL: https://t.me/Anon_Israel35/37
Screenshots:
None
Threat Actors: Anonymous For Justice
Victim Country: Israel
Victim Industry: Insurance
Victim Organization: insurance agency ltd
Victim Site: Unknown - Alleged unauthorized access to Logit E.D.s camera servers
Category: Initial Access
Content: The group claims to have gained unauthorized access to Logit E.D.s camera servers
Date: 2026-03-18T03:39:12Z
Network: telegram
Published URL: https://t.me/CIR48/1751
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Unknown
Victim Industry: Transportation & Logistics
Victim Organization: logit e.d
Victim Site: Unknown - Alleged sale of unauthorized admin access to unidentified store
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin access to an unidentified online store in USA.
Date: 2026-03-18T03:11:59Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278568/
Screenshots:
None
Threat Actors: cosmodrome
Victim Country: USA
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of unauthorized API Access to Shopify in Canada
Category: Initial Access
Content: Threat actor claims to be selling API Access to a Shopify shop in Canada
Date: 2026-03-18T01:54:22Z
Network: openweb
Published URL: https://forum.exploit.in/topic/278583/
Screenshots:
None
Threat Actors: JustAnon69
Victim Country: Canada
Victim Industry: E-commerce & Online Stores
Victim Organization: shopify
Victim Site: shopify.com - Alleged Data breach of Knownsec
Category: Data Breach
Content: The threat actor claims to have leaked data from Knownsec. The compromised data reportedly contains internal documents, offensive cyber tools, and much more information.
Date: 2026-03-18T00:56:35Z
Network: openweb
Published URL: https://darkforums.su/Thread-Document-PARTIALLY-China-knownsec-com-Cloud-Network-Security-Company-CorpDocs-2025
Screenshots:
None
Threat Actors: Blastoize
Victim Country: China
Victim Industry: Information Technology (IT) Services
Victim Organization: knownsec
Victim Site: knownsec.com - Alleged Unauthorized Access to Video Surveillance System of Supafin Seafoods
Category: Initial Access
Content: The group claims to have gained remote access to the video surveillance system of Supafin Seafoods located at 21 Henricks Street, Hemmant, QLD 4174, Australia.
Date: 2026-03-18T00:41:34Z
Network: telegram
Published URL: https://t.me/c/3792806777/19
Screenshots:
None
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: Australia
Victim Industry: Restaurants
Victim Organization: video surveillance system of supafin seafoods
Victim Site: supafinseafoods.com.au - Alleged data breach of Yantai International Labor Service Co., Ltd.
Category: Data Breach
Content: The threat actor claims to have leaked data from Yantai International Labor Service Co., Ltd.
Date: 2026-03-18T00:35:31Z
Network: openweb
Published URL: https://darkforums.su/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1263
Screenshots:
None
Threat Actors: SnowSoul
Victim Country: China
Victim Industry: Human Resources
Victim Organization: yantai international labor service co., ltd.
Victim Site: yantaiinternational.com - Alleged data leak of unidentified personal records from Thailand
Category: Data Breach
Content: The threat actor claims to be leaked Passport and photo data from unidentified personal records from Thailand.
Date: 2026-03-18T00:27:34Z
Network: openweb
Published URL: https://darkforums.su/Thread-Thailand-Passport-Selfie-FRESH
Screenshots:
None
Threat Actors: Databroque
Victim Country: Thailand
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown