Executive Summary
This report details a series of recent cyber incidents, providing key information for each event, including published URLs and associated screenshots, strictly based on the provided data. The data encompasses 88 distinct draft incident reports detected on March 8, 2026. The incidents span a wide array of cyber threats, predominantly featuring data breaches, website defacements, unauthorized initial access sales, and general cyberattack alerts targeting various global entities and governments.
I. Data Breaches and Information Leaks
The most frequent category of incidents in the dataset is data breaches, involving the unauthorized extraction and exposure of sensitive databases, personally identifiable information (PII), and corporate records.
- Incident 2: US Georgia Driver’s License Database
- Overview: A threat actor named KYCMyASS claims to be selling scans of United States Georgia driver’s licenses.
- Data Compromised: The exposed data includes both front and back images of the licenses along with selfie verification photos.
- Victimology: The targeted country is the USA, though the specific industry and organization remain unknown. The incident was published on the openweb on 2026-03-08T22:33:52Z via darknetarmy.io.
- Incident 3: Israel’s Ministry of Defense
- Overview: The 404 CREW CYBER TEAM claims to have breached the database of Israel’s Ministry of Defense.
- Victimology: The victim is the ministry of defense in Israel, categorized under Government Administration, with the target site being mod.gov.il. The claim was published on Telegram on 2026-03-08T22:13:38Z.
- Incident 4: Israeli Government Database Leak
- Overview: The 404 CREW CYBER TEAM claims to have leaked a database allegedly linked to the Israeli government.
- Data Compromised: The exposed file reportedly contains personal and contact information of government employees, including names, email addresses, and phone numbers.
- Publication: The incident was posted to Telegram on 2026-03-08T22:12:17Z.
- Incident 7 & 8: Israel Passports and Mossad Data Leaks
- Overview: The 404 CREW CYBER TEAM claims to have leaked Israel passports. Separately, the same group claims to have leaked data associated with Mossad.
- Victimology: Both incidents target Israel, with the Mossad incident targeting the Military Industry via mossad.gov.il. The passport leak was published on 2026-03-08T22:05:45Z, and the Mossad leak on 2026-03-08T21:58:54Z, both on Telegram.
- Incident 10: Cyprus and Qatar Government Correspondence Leak
- Overview: The Fatimion cyber team claims to have leaked confidential government documents allegedly related to law enforcement activities and financial supervision.
- Data Compromised: The exposed material reportedly includes correspondence exchanged between the Cyprus Securities and Exchange Commission (CySEC) and the Economic Crimes Department in Qatar regarding oversight and investigative coordination in a financial fraud case.
- Victimology: The targeted country is Qatar, within the Government Administration sector. The data was published on Telegram on 2026-03-08T21:15:05Z.
- Incident 12: Mercedes-Benz Group
- Overview: A threat actor named xing claims to be selling a customer leads database allegedly sourced from a Mercedes-Benz dealership in California, United States.
- Data Compromised: The dataset reportedly contains approximately 27,000 unique records described as fresh automotive sales leads. The exposed data may include customer personal information and vehicle-related details, such as full names, addresses, phone numbers, email addresses, vehicle identification numbers (VIN), vehicle make and model, mileage, service history, recall status, warranty information, and dealership staff contact details.
- Victimology: The target is the mercedes-benz group in the USA Automotive industry, associated with the site mercedes-benz.com, published on the openweb on 2026-03-08T21:07:09Z.
- Incident 13: Argentine Citizens PII Databases
- Overview: A threat actor named overtosis4u claims to be selling a large private dataset allegedly containing sensitive personal information of Argentine citizens collected from multiple sectors, including electricity utilities, healthcare systems, and automotive registries.
- Data Compromised: The database reportedly includes more than 40,000 medical records, 300,000 utility billing records, and 328,000 vehicle registration and ownership records. The dataset contains full personally identifiable information (PII) such as names, DNI numbers, addresses, phone numbers, emails, billing records, and clinical details, along with vehicle ownership information and license plate linkages. The sale was published on the openweb on 2026-03-08T20:52:21Z.
- Incident 15: RAPiKOM Venezuela
- Overview: A threat actor named GordonFreeman claims to have leaked a database allegedly belonging to the RAPiKOM Venezuela platform.
- Data Compromised: The dataset reportedly contains around 5,000 business records associated with companies and affiliates that have used the platform. The exposed data allegedly includes account credentials, bank-related information, phone numbers, email addresses, and geographic location data of businesses.
- Victimology: The target is rapikom in Venezuela’s E-commerce & Online Stores industry (rapikom.com), published on the openweb on 2026-03-08T20:23:23Z.
- Incident 16: Canadian Private Leads Database
- Overview: Threat actor betway claims to be selling a database containing 6.5 million Canadian private leads allegedly collected through advertising campaigns.
- Data Compromised: The dataset includes client names, phone numbers, email addresses, and country information, indicating potential exposure and distribution of personal contact data. The sale was published on the openweb on 2026-03-08T19:58:11Z.
- Incident 17: French Boxing Club Database
- Overview: Threat actor CyberNox claims to have leaked a database containing information related to several boxing clubs in France.
- Data Compromised: The database includes details such as club names, locations, postal codes, phone numbers, email addresses, and website links. Published on the openweb on 2026-03-08T19:48:00Z.
- Incident 21: Corporate B2B Email Leads
- Overview: Threat actor Spectre2Data is selling corporate B2B lead databases and Office365-validated email lists.
- Data Compromised: It offers millions of business leads, including up to 20–30 million records, with filtered deliverable email addresses for services such as Office365, Gmail (Gsuite), Mimecast, Barracuda, Proofpoint, and others. Published on the openweb on 2026-03-08T17:40:58Z targeting the Marketing, Advertising & Sales industry.
- Incident 23: Team4Security
- Overview: Threat actor GhostCrawl claims to have leaked data from Team4Security and shared the first part. Targeting the IT Services industry in Israel (team4security.com), published on the openweb on 2026-03-08T17:34:25Z.
- Incident 24: Iranian Security Personnel (IRGC)
- Overview: Threat actor DORNA Iran claims to have released a sample dataset containing information on 240 personnel allegedly affiliated with special security units in Iran, including individuals linked to institutions associated with the Islamic Revolutionary Guard Corps (IRGC). Published on Telegram on 2026-03-08T17:16:28Z targeting the Military Industry.
- Incident 25: UAE Data Leak
- Overview: Threat actor Dedale Office claims to have leaked 374.9 MB of data from the UAE. Published on Telegram on 2026-03-08T16:28:53Z.
- Incident 31 & 32: Baked Games S.A. (Alaska Gold Fever)
- Overview: Threat actor Angel_Batista claims to have breached and is selling the Unity source code of the upcoming game “Alaska Gold Fever,” allegedly containing 49 GB of data belonging to Baked Games S.A..
- Victimology: The targeted organization is baked games s.a. (bakedgames.com) in Poland’s Gaming industry. The incidents were published on the openweb on 2026-03-08T14:32:58Z and 2026-03-08T14:30:32Z.
- Incident 40: Izeta Group
- Overview: Threat actor macaroni claims to have breached 5,904 records belonging to Izeta Group in Spain (izetagroup.com).
- Data Compromised: The data reportedly includes customer personal details, contact information, purchase history, and spending records. Published on the openweb on 2026-03-08T14:09:31Z.
- Incident 41: Le Temps des Cerises Jeans
- Overview: Threat actor DumpSec claims to be selling 900,000 lines of data from Le Temps des Cerises Jeans in France’s Manufacturing sector (letempsdescerises.com).
- Data Compromised: The dataset allegedly contains extracted data fields such as order link, gender, customer surname, customer first name, customer email, and more. Published on the openweb on 2026-03-08T14:09:25Z.
- Incident 42: FNATH
- Overview: Threat actor Angel_Batista claims to have breached 197 GB of data from FNATH in France’s Non-profit & Social Organizations sector (fnath.org).
- Data Compromised: The dataset allegedly contains 29,144 + 45,428 records with information such as birth name, email, ID, date of birth, and more. Published on the openweb on 2026-03-08T14:02:10Z.
- Incident 49: Laika Mascotas
- Overview: Dedale Office claims to have breached data from Laika Mascotas in Colombia (laika.com.co). Published on Telegram on 2026-03-08T11:56:50Z.
- Incident 52: Hakara
- Overview: Threat actor HighRisk claims to have leaked data related to Hakara in Vietnam’s Music industry (hakara.vn). Published on the openweb on 2026-03-08T11:29:14Z.
- Incident 53: West Kalimantan Provincial Government
- Overview: Threat actor Shenira6core claims to have leaked the database from the West Kalimantan Provincial Government in Indonesia.
- Data Compromised: The reportedly data includes personnel records, names, IDs, positions, and department assignments. Published on the openweb on 2026-03-08T11:19:04Z.
- Incident 55: Sofia Venturini PII Leak
- Overview: Threat actor dambss claims to have leaked the PII data from Sofia Venturini.
- Data Compromised: Includes alleged contact details, date of birth, location in Italy, and links to social media profiles. Published on the openweb on 2026-03-08T11:01:00Z.
- Incident 56: Sagent Pharmaceuticals
- Overview: Threat actor Worldleaks claims to have breached data from Sagent Pharmaceuticals (USA Healthcare industry, sagentpharma.com) and intends to publish it within 1-2 days. Published on the tor network on 2026-03-08T10:50:19Z.
- Incident 59: Pakistan Students Database
- Overview: Threat actor Off-Line claims to have leaked a Pakistani School student database.
- Data Compromised: The compromised data reportedly includes student names, student IDs, class details, section information, and other academic records. Published on Telegram on 2026-03-08T10:32:37Z.
- Incident 60: Medihelp Services
- Overview: Threat actor delitospenales claims to have breached the Medihelp Services database in Mexico’s Healthcare industry (clinicamedihelp.com).
- Data Compromised: The leaked sample allegedly contains patient-related information such as full names, document details, and medical-related records. Published on the openweb on 2026-03-08T10:32:07Z.
- Incident 62: WayzeSMS
- Overview: Threat actor obfuscatable claims to have leaked data advertised as WayzeSMS, in the USA Telecommunications industry (wayzesms.com).
- Data Compromised: The data reportedly includes WhatsApp, Facebook, Amazon, Instagram, Twitter, and Outlook. Published on the openweb on 2026-03-08T10:20:43Z.
- Incident 65: IndiHome
- Overview: Dedale Office claims to have leaked data from IndiHome in Indonesia’s Telecommunications sector (telkomsel.com).
- Data Compromised: The dataset contains personal details such as names, contact information, and national identity numbers. Published on Telegram on 2026-03-08T09:29:12Z.
- Incident 68: Denpasar Population Database
- Overview: Threat actor YanXploit claims to have leaked and shared the Denpasar population database.
- Data Compromised: The leak reportedly exposes resident demographic records and related personal information from Denpasar, Indonesia. Published on the openweb on 2026-03-08T08:59:52Z.
- Incident 69: Colombian Vaccination Database
- Overview: Threat actor ironatlas claims to have breached 223,330 Colombian identification records from a government vaccination website on 19 Feb 2026, reportedly exposing various personal identification details. Published on the openweb on 2026-03-08T08:20:09Z.
- Incident 71: Airclaim
- Overview: Threat actor HexDex claims to be selling 121 GB of data from Airclaim in Romania’s Airlines & Aviation sector (airclaim.com).
- Data Compromised: The dataset allegedly contains information on 55,867 people, including documents such as passports, signatures, boarding passes, and other personal information. Published on the openweb on 2026-03-08T07:43:00Z.
- Incident 74: IRGC Linked Files Leak
- Overview: Threat actor Anonymous claims to have leaked files related to the Islamic Revolutionary Guard Corps (IRGC) in Iran.
- Data Compromised: The information allegedly exposes individuals linked to IRGC operations. Published on Telegram on 2026-03-08T06:34:18Z.
- Incident 77: French Driving School Data
- Overview: Threat actor telaviv claims to be selling the database of a French driving school system.
- Data Compromised: The database contains personal documents and identification records. Published on the openweb on 2026-03-08T06:22:24Z.
- Incident 78: Dinas Kependudukan dan Pencatatan Sipil Provinsi DKI Jakarta
- Overview: Dedale Office claims to have breached 539,737 Rows of data from this Indonesian Government Administration entity. Published on Telegram on 2026-03-08T06:16:52Z.
- Incident 79: Pakistan Government Personnel Information
- Overview: Dedale Office claims to have leaked 2GB of data from the Pakistan Government.
- Data Compromised: The compromised data reportedly includes Department, Name, Address, Date of Birth, Blood Group, Email, Government ID and ID Photos. Published on Telegram on 2026-03-08T05:46:41Z.
- Incident 85: Municipal Government of Juárez
- Overview: Threat actor godislife69x claims to have breached the database of the Government of Juárez, Nuevo León, Mexico (soyjuarense.juarez-nl.gob.mx).
- Data Compromised: The dataset contains personal information, identification numbers, and administrative records associated with the Juárez municipal government platforms. Published on the openweb on 2026-03-08T02:27:56Z.
- Incident 87: Space42 Data Breach
- Overview: Space42 (UAE Defense & Space sector, space42.ai) was reportedly subjected to a data breach by a hacker group named Mobir.
- Details: The attack targeted Space42’s network in response to alleged cooperation between the company and Israeli and U.S. entities. Mobir stated that it gained access to internal systems and published screenshots of server management dashboards as evidence of the breach. The group also claimed to have leaked documents related to contracts between Yahsat—one of the companies that merged to form Space42—and the Israeli satellite communications company Gilat. Published on Telegram on 2026-03-08T00:10:03Z.
- Incident 88: Instituto Técnico Superior
- Overview: Threat actor Tanaka claims to have breached the database of Instituto Técnico Superior – MEC in Paraguay’s Education sector (caeff.com.py).
- Data Compromised: The dataset contains students’ personal information. Published on the openweb on 2026-03-08T00:02:45Z.
II. Website Defacements
Website defacements form another significant portion of the incidents, predominantly carried out by hacktivist groups seeking to alter the visual appearance of a site to display a message.
- Incident 1: Kurdistan Commando Force
- Overview: The 313 Team claims to have defaced the official website of the Kurdistan Commando Force in Iraq (cdokurd.com). Published on Telegram on 2026-03-08T23:46:45Z.
- Incident 28: Luachnet
- Overview: The group Z-BL4CX-H4T claims to have defaced the website of Luachnet in Israel’s Online Publishing sector (luachnet.co.il). Published on Telegram on 2026-03-08T15:33:10Z.
- Incident 33: Felicity Insurance
- Overview: Z-BL4CX-H4T claims to have defaced the website of Felicity Insurance in the USA (felicityinsure.com). Published on Telegram on 2026-03-08T14:28:12Z.
- Incident 34: Eagle First
- Overview: Z-BL4CX-H4T claims to have defaced the website of Eagle First in the USA Accounting industry (eagletaxpros.com). Published on Telegram on 2026-03-08T14:23:18Z.
- Incident 36: Simple Registration Solutions
- Overview: Z-BL4CX-H4T claims to have defaced the website of Simple Registration Solutions in the USA IT Services sector (simpletoregister.com). Published on Telegram on 2026-03-08T14:18:32Z.
- Incident 38: Culturevore
- Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Culturevore in the USA Philanthropy sector (culturevore.com). Published on Telegram on 2026-03-08T14:11:45Z.
- Incident 43: Casino4Live
- Overview: INDOHAXSEC claims to have defaced the website of Casino4Live in Costa Rica’s Gambling industry (casino4live.com). Published on Telegram on 2026-03-08T13:54:25Z.
- Incident 45: Party42nite
- Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Party42nite in South Africa’s Information Services industry (party42nite.com). Published on Telegram on 2026-03-08T13:33:58Z.
- Incident 46: Full Before Montauk
- Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Full Before Montauk in the USA Online Publishing sector (fullbeforemontauk.com). Published on Telegram on 2026-03-08T13:22:17Z.
- Incident 47: Alrama Films
- Overview: Threat actor L4663R666H05T claims to have defaced the website of Alrama Films in the UAE Automotive industry (alramafilms.ae). Published on the openweb on 2026-03-08T12:34:18Z.
- Incident 48: Dinas PUPR Provinsi Sumatera Utara
- Overview: The group Hax.or claims to have defaced the website of Dinas PUPR Provinsi Sumatera Utara in Indonesia’s Government Administration sector (dpupr.sumutprov.go.id). Published on Telegram on 2026-03-08T12:12:58Z.
- Incident 54: DILIGENT SEARCHES REALTY LLC
- Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of DILIGENT SEARCHES REALTY LLC in the USA Real Estate industry (diligentsearches.com). Published on Telegram on 2026-03-08T11:07:54Z.
- Incident 57: Grand Elm
- Overview: The DEFACER INDONESIAN TEAM claims to have defaced the website of Grand Elm in the USA Real Estate industry (grandelm.com). Published on Telegram on 2026-03-08T10:50:15Z.
- Incident 58: Ministry of Industry Thailand
- Overview: Nullsec Philippines claims to have defaced the website of the Ministry of Industry in Thailand (pdg.industry.go.th). Published on Telegram on 2026-03-08T10:34:02Z.
- Incident 66: IKIP PGRI Bojonegoro Library
- Overview: Hax.or claims to have defaced the website of IKIP PGRI Bojonegoro Library in Indonesia (smartlab.ikippgribojonegoro.ac.id). Published on Telegram on 2026-03-08T09:14:43Z.
- Incident 67: IKIP PGRI Bojonegoro
- Overview: Hax.or claims to have defaced the website of IKIP PGRI Bojonegoro in Indonesia’s Education sector (sim-asset.ikippgribojonegoro.ac.id). Published on Telegram on 2026-03-08T09:04:33Z.
- Incident 82: AvalAi
- Overview: The group r0ckin targets the website of AvalAi in Iran’s IT Services sector (avalai.ir). Published on the openweb on 2026-03-08T03:39:10Z.
- Incident 84: AsnaFlenjan
- Overview: The group /Rayzky_ claims to have defaced the website of AsnaFlenjan in Iran’s Law Practice sector (asnaflenjan.ir). Published on the openweb on 2026-03-08T03:30:22Z.
III. Initial Access Sales and Compromises
Initial Access brokers actively compromise networks and sell their access points to other threat actors. This dataset highlights numerous high-level access claims.
- Incident 6: Unauthorized AWS Access in Canada
- Overview: Threat actor williamblack claims to be selling unauthorized access to an AWS environment associated with a Canadian domain, reportedly accessible via SSH and AWS keys.
- Target Details: The compromised environment is linked to an organization operating in the Industrial IoT, Automated AI, and Software Development sectors. Published on the openweb on 2026-03-08T22:08:43Z.
- Incident 14: Industrial Control System (ICS) Access
- Overview: Threat group MAD GHOST claims to have gained unauthorized access to an Industrial Control System (ICS) interface.
- Target Details: The group allegedly obtained full control over system operations including heater, ventilation, temperature monitoring, and remote system controls. The victim is located in Israel. Published on Telegram on 2026-03-08T20:35:50Z.
- Incident 26: CCTV Camera Access in Israel
- Overview: The Team Bangladesh cyber squad claims to have gained unauthorized access to an unidentified D-Link CCTV camera in Israel. Published on Telegram on 2026-03-08T15:58:44Z.
- Incident 27: WordPress Shop Admin Access in UK
- Overview: Threat actor Shopify claims to be selling unauthorized admin access to a WordPress-based online shop located in the United Kingdom.
- Target Details: The access allegedly provides full administrative privileges and the ability to interact with the payment form, indicating potential control over the store’s transactions and order management system. Published on the openweb on 2026-03-08T15:33:53Z.
- Incident 37: Israeli Android TVs Access
- Overview: The Team Bangladesh cyber squad claims to have gained unauthorized access to multiple Android TV devices located in Israel, allegedly compromising more than eight devices. Published on Telegram on 2026-03-08T14:14:06Z.
- Incident 39: PGK Gallery Admin Access
- Overview: The group SILENT ERROR SYSTEM claims to have leaked admin login credentials of PGK Gallery in Indonesia’s Retail Industry (pgkgallery.com). Published on Telegram on 2026-03-08T14:11:11Z.
- Incident 44: Access to 700+ Compromised PCs
- Overview: Threat actor francogambino83 claims to have access to more than 700 compromised PCs, stating that the number of infected systems is increasing daily. Published on the openweb on 2026-03-08T13:54:01Z.
- Incident 50: Open UPS Access
- Overview: Threat actor networkbase claims to be offering access to multiple Open UPS systems, including both newly discovered and previously known accesses. Published on the openweb on 2026-03-08T11:33:10Z.
- Incident 51: ADFS & WHMCS Access Credentials
- Overview: Threat actor 3olotoi claims to possess approximately 2,700 ADFS and WHMCS access credentials allegedly obtained from various domains.
- Target Details: The actor states that each domain is unique and claims that more than 80% of the accesses are valid. The post suggests that these accesses were previously observed being sold in auctions a few months ago. Published on the openweb on 2026-03-08T11:31:41Z.
- Incident 61: Computer Source Bangladesh Admin Access
- Overview: The group Off-Line claims to have leaked admin login credentials belonging to Computer Source Bangladesh in the IT Services industry (computersource.com.bd). Published on Telegram on 2026-03-08T10:20:48Z.
- Incident 75: Coffee Shop Admin/Shell Access in Germany
- Overview: Threat actor Zimmer claims to be selling unauthorized admin and shell access to an unidentified coffee shop in Germany. Published on the openweb on 2026-03-08T06:32:31Z.
- Incident 76: Magento Accesses
- Overview: Threat actor Bakardi claims to be selling 500 unauthorized Magento accesses in multiple countries, targeting E-commerce & Online Stores. Published on the openweb on 2026-03-08T06:30:15Z.
- Incident 80: Argentine Judiciary Admin Panel Access
- Overview: Threat actor ORION claims to have access to an administrative panel linked to the Argentine Judicial Branch.
- Target Details: The panel allegedly contains sensitive information related to prosecutors and applicants for government positions. Published on the openweb on 2026-03-08T03:56:21Z.
- Incident 81: SCADA System Access in Ukraine
- Overview: The group OverFlame claims to have gained unauthorized access to a SCADA system in Ukraine. Published on Telegram on 2026-03-08T03:45:53Z.
IV. Cyberattacks, Malware, and Active Alerts
Several incidents involve direct cyberattacks (like DDoS or infrastructure disruption), malware sales, or generalized threat alerts indicating impending or ongoing operations against national interests or broad geographic regions.
- Incident 5: IP Cameras Across Israel and Gulf Countries Targeted
- Overview: Hacktivist led cyberattacks targeting internet connected IP cameras have been observed across Israel and several Gulf countries, including the UAE, Qatar, Bahrain, Kuwait, as well as Lebanon and Cyprus.
- Tactics: The attackers reportedly used VPN and VPS infrastructure to scan for and identify vulnerable devices across the region. Published on the openweb on 2026-03-08T22:10:58Z.
- Incident 9: Keymous Plus targets energy servers
- Overview: A recent post by Keymous Plus indicates that they are targeting unidentified energy servers. Published on Telegram on 2026-03-08T21:17:04Z.
- Incident 11: Fatimion Cyber Team Targets Qatari Ministry of Interior
- Overview: A recent post by the Fatimion cyber team indicates that they are targeting the Electronic Crimes Section in the Qatari Ministry of Interior. Published on Telegram on 2026-03-08T21:13:38Z.
- Incident 18: BROTHERHOOD CAPUNG INDONESIA targets Leona Raíces
- Overview: A post indicates they are targetting Leona Raíces in Costa Rica’s Real Estate sector (leonaraices.com). Published on Telegram on 2026-03-08T19:47:46Z.
- Incident 19: Sale of Silver Stealer Malware
- Overview: Threat actor SilverSupport is advertising a malware tool called Silver Stealer.
- Capabilities: The malware is designed to steal browser data and cookies from browsers such as Google Chrome, Microsoft Edge, Opera, Opera GX, and Mozilla Firefox. Published on the openweb on 2026-03-08T18:52:09Z.
- Incident 20: 313 Team targets Kuwait Servers
- Overview: A post from the 313 Team claims they are targeting all of Kuwait Servers, specifically mentioning the kuwaiti ministry of defense. Published on Telegram on 2026-03-08T18:18:57Z.
- Incident 22: LAPSUS Targets TAJ
- Overview: The group LAPSUS claims to be selling software tools and configuration files allegedly required to access a “TAJ” database, rather than the database itself.
- Tactics: The post states that sample materials, including certificates and tutorials, have been shared to demonstrate access capabilities. Published on Telegram on 2026-03-08T17:35:47Z.
- Incident 29: Cardinal Alert
- Overview: The group Cardinal indicates they are targeting an unidentified organisation. Published on Telegram on 2026-03-08T15:27:09Z.
- Incident 30: AnonGhost Targets Israel and USA
- Overview: A post by AnonGhost indicates infiltration of multiple digital systems in the United States and Israel, alleging access to SCADA environments, surveillance cameras, broadcast networks, and other critical infrastructure platforms.
- Capabilities: The group claims the capability to disrupt utilities such as water, power, and emergency communications systems, while also asserting extensive network reconnaissance across millions of IP addresses. Published on Telegram on 2026-03-08T14:45:35Z.
- Incident 35: Sale of Microsoft Office Cookie Scampage Tool (XCode)
- Overview: Threat actor HeizTs claims to be selling a Microsoft Office cookie scampage tool called XCode.
- Capabilities: It is allegedly capable of harvesting Microsoft Office account session cookies, including accounts protected with 2FA. The tool reportedly supports hosting via cPanel or AAPanel, includes anti-bot and VPN protection, and provides visit protection. Target is microsoft (microsoft.com). Published on the openweb on 2026-03-08T14:22:27Z.
- Incident 63: THE GARUDA EYE targets Egypt
- Overview: A recent post indicates they are targeting Egypt. Published on Telegram on 2026-03-08T10:19:47Z.
- Incident 64: Cyberattack on Israeli Weather Station Infrastructures
- Overview: Handala Hack claims responsibility for conducting a cyberattack and breaching the main servers of Israeli weather station infrastructure. Published on Telegram on 2026-03-08T09:54:33Z.
- Incident 70: Cyberattack Hit Middlesex-London Health Unit
- Overview: A cybersecurity incident affected the Middlesex-London Health Unit in London (Canada), forcing the organization to shut down some phone lines and internal software systems as a precaution.
- Response: The health unit reported the incident to the privacy commissioner and the Ministry of Health while an investigation was launched to determine the cause and scope of the attack. Officials stated that certain services were temporarily disrupted while technical teams worked to secure the network and restore systems. At the time of reporting, authorities had not confirmed whether any sensitive data had been compromised. Published on the openweb on 2026-03-08T07:46:22Z via cbc.ca.
- Incident 72: Cyberattack on Surveillance Cameras in Tel Aviv and Haifa
- Overview: UniT 313 claims to have targeted surveillance camera systems in Tel Aviv and Haifa, Israel, alleging that the cameras were disrupted and taken out of service during the operation. Published on Telegram on 2026-03-08T07:28:29Z.
- Incident 73: UniT 313 targets Israel
- Overview: An alert from UniT 313 indicating they are targeting Israel. Published on Telegram on 2026-03-08T07:14:26Z.
- Incident 83: DieNet targets USA
- Overview: A recent post by DieNet indicates that they are targeting the USA. Published on Telegram on 2026-03-08T03:30:25Z.
- Incident 86: DieNet targets Kuwait and Other Gulf States
- Overview: DieNet indicates that they are targeting Digital Systems in Kuwait and Other Gulf States. Published on Telegram on 2026-03-08T01:56:17Z.
Conclusion
The cyber threat landscape on March 8, 2026, as detailed by the 88 draft incidents, highlights a highly active and geographically diverse series of attacks. Israel and the USA were frequently targeted by both state-aligned hacktivists and financially motivated threat actors, experiencing data leaks (including government and defense data), critical infrastructure probing, and website defacements. The proliferation of unauthorized accesses sold on dark web and open web forums indicates a sustained threat of secondary attacks such as ransomware or deeper network espionage. The utilization of Telegram as an announcement and data distribution platform remains a dominant trend for threat actors claiming responsibility for operations ranging from defacements to massive PII leaks.
Detected Incidents Draft Data
- 313 Team targets the official website of Kurdistan Commando Force
Category: Defacement
Content: Group claims to have defaced the official website of Kurdistan Commando Force.
Date: 2026-03-08T23:46:45Z
Network: telegram
Published URL: https://t.me/xX313XxTeam/686
Screenshots:
None
Threat Actors: 313 Team
Victim Country: Iraq
Victim Industry: Military Industry
Victim Organization: kurdistan commando force
Victim Site: cdokurd.com - Alleged Sale of US Georgia Driver’s License Database
Category: Data Breach
Content: Threat Actor claims to be selling scans of United States Georgia driver’s licenses, including both front and back images along with selfie verification photos.
Date: 2026-03-08T22:33:52Z
Network: openweb
Published URL: https://darknetarmy.io/threads/%F0%9F%87%BA%F0%9F%87%B8-georgia-dl-front-back-selfie.80238/
Screenshots:
None
Threat Actors: KYCMyASS
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Israels Ministry of Defense
Category: Data Breach
Content: The group claims to have breached database of Israels Ministry of Defense.
Date: 2026-03-08T22:13:38Z
Network: telegram
Published URL: https://t.me/crewcyber/953
Screenshots:
None
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Government Administration
Victim Organization: ministry of defense
Victim Site: mod.gov.il - Alleged Data Leak of Israeli Government Database
Category: Data Breach
Content: A threat group claims to have leaked a database allegedly linked to the Israeli government. The exposed file reportedly contains personal and contact information of government employees, including names, email addresses, and phone numbers.
Date: 2026-03-08T22:12:17Z
Network: telegram
Published URL: https://t.me/crewcyber/954
Screenshots:
None
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - IP Cameras Across Israel and Gulf Countries Targeted in Cyberattacks
Category: Cyber Attack
Content: Hacktivist led cyberattacks targeting internet connected IP cameras have been observed across Israel and several Gulf countries, including the UAE, Qatar, Bahrain, Kuwait, as well as Lebanon and Cyprus. The attackers reportedly used VPN and VPS infrastructure to scan for and identify vulnerable devices across the region.
Date: 2026-03-08T22:10:58Z
Network: openweb
Published URL: https://securityaffairs.com/189069/cyber-warfare-2/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence.html
Screenshots:
None
Threat Actors: Unknown
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized AWS Access via SSH to Multiple Organizations in Canada
Category: Initial Access
Content: Threat Actor claims to be selling unauthorized access to an AWS environment associated with a Canadian domain, reportedly accessible via SSH and AWS keys. The compromised environment is linked to an organization operating in the Industrial IoT, Automated AI, and Software Development sectors.
Date: 2026-03-08T22:08:43Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277842/
Screenshots:
None
Threat Actors: williamblack
Victim Country: Canada
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of israel passports
Category: Data Breach
Content: The group claims to have leaked israel passports.
Date: 2026-03-08T22:05:45Z
Network: telegram
Published URL: https://t.me/crewcyber/952
Screenshots:
None
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Mossad
Category: Data Breach
Content: The group claims to have leaked data associated with Mossad.
Date: 2026-03-08T21:58:54Z
Network: telegram
Published URL: https://t.me/crewcyber/951
Screenshots:
None
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Military Industry
Victim Organization: mossad
Victim Site: mossad.gov.il - Keymous Plus claims to target energy servers
Category: Alert
Content: A recent post by the group indicates that they are targeting unidentified energy servers.
Date: 2026-03-08T21:17:04Z
Network: telegram
Published URL: https://t.me/KeymousTG/867
Screenshots:
None
Threat Actors: Keymous Plus
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of Confidential Government Correspondence Related to Law Enforcement and Financial Supervision
Category: Data Breach
Content: The threat group claims to have leaked confidential government documents allegedly related to law enforcement activities and financial supervision. The exposed material reportedly includes correspondence exchanged between the Cyprus Securities and Exchange Commission (CySEC) and the Economic Crimes Department in Qatar regarding oversight and investigative coordination in a financial fraud case.
Date: 2026-03-08T21:15:05Z
Network: telegram
Published URL: https://t.me/hak994/5108
Screenshots:
None
Threat Actors: Fatimion cyber team
Victim Country: Qatar
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Fatimion cyber team claims to target Electronic Crimes Section in the Qatari Ministry of Interior
Category: Alert
Content: A recent post by the group indicates that they are targeting Electronic Crimes Section in the Qatari Ministry of Interior.
Date: 2026-03-08T21:13:38Z
Network: telegram
Published URL: https://t.me/hak994/5106
Screenshots:
None
Threat Actors: Fatimion cyber team
Victim Country: Qatar
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Mercedes-Benz Group
Category: Data Breach
Content: The threat actor claims to be selling a customer leads database allegedly sourced from a Mercedes-Benz dealership in California, United States. the dataset reportedly contains approximately 27,000 unique records described as fresh automotive sales leads.the exposed data may include customer personal information and vehicle-related details, such as full names, addresses, phone numbers, email addresses, vehicle identification numbers (VIN), vehicle make and model, mileage, service history, recall status, warranty information, and dealership staff contact details.
Date: 2026-03-08T21:07:09Z
Network: openweb
Published URL: https://breachforums.as/Thread-Mercedes-Benz-2026
Screenshots:
None
Threat Actors: xing
Victim Country: USA
Victim Industry: Automotive
Victim Organization: mercedes-benz group
Victim Site: mercedes-benz.com - Alleged Sale of Citizens PII Databases Across Multiple Sectors in Argentina
Category: Data Breach
Content: Threat Actor claims to be selling a large private dataset allegedly containing sensitive personal information of Argentine citizens collected from multiple sectors, including electricity utilities, healthcare systems, and automotive registries. The database reportedly includes more than 40,000 medical records, 300,000 utility billing records, and 328,000 vehicle registration and ownership records. The dataset contains full personally identifiable information (PII) such as names, DNI numbers, addresses, phone numbers, emails, billing records, and clinical details, along with vehicle ownership information and license plate linkages.
Date: 2026-03-08T20:52:21Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277838/
Screenshots:
None
Threat Actors: overtosis4u
Victim Country: Argentina
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Unauthorized Access to Industrial Control System (ICS)
Category: Initial Access
Content: Threat group claims to have gained unauthorized access to an Industrial Control System (ICS) interface, allegedly obtaining full control over system operations including heater, ventilation, temperature monitoring, and remote system controls.
Date: 2026-03-08T20:35:50Z
Network: telegram
Published URL: https://t.me/ARABIAN_GHOSTS/1849
Screenshots:
None
Threat Actors: MAD GHOST
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Rapikom
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly belonging to the RAPiKOM Venezuela platform. the dataset reportedly contains around 5,000 business records associated with companies and affiliates that have used the platform.The exposed data allegedly includes account credentials, bank-related information, phone numbers, email addresses, and geographic location data of businesses. .
Date: 2026-03-08T20:23:23Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-FREE-RAPIKOM-Venezuela-DB-5K-business-records-bank-accounts-phone-numbers-emails
Screenshots:
None
Threat Actors: GordonFreeman
Victim Country: Venezuela
Victim Industry: E-commerce & Online Stores
Victim Organization: rapikom
Victim Site: rapikom.com - Alleged Sale of 6.5 Million Canadian Private Leads Database
Category: Data Breach
Content: Threat Actor claims to be selling a database containing 6.5 million Canadian private leads allegedly collected through advertising campaigns. The dataset includes client names, phone numbers, email addresses, and country information, indicating potential exposure and distribution of personal contact data.
Date: 2026-03-08T19:58:11Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277828/
Screenshots:
None
Threat Actors: betway
Victim Country: Canada
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of French Boxing Club Information Database
Category: Data Breach
Content: A threat actor claims to have leaked a database containing information related to several boxing clubs in France. which includes details such as club names, locations, postal codes, phone numbers, email addresses, and website links.
Date: 2026-03-08T19:48:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-Liste-club-boxing
Screenshots:
None
Threat Actors: CyberNox
Victim Country: France
Victim Industry: Sports
Victim Organization: Unknown
Victim Site: Unknown - BROTHERHOOD CAPUNG INDONESIA claims to target Leona Raíces
Category: Alert
Content: A recent post by the group indicates that they are targetting Leona Raíces.
Date: 2026-03-08T19:47:46Z
Network: telegram
Published URL: https://t.me/c/3800744258/50
Screenshots:
None
Threat Actors: BROTHERHOOD CAPUNG INDONESIA
Victim Country: Costa Rica
Victim Industry: Real Estate
Victim Organization: leona raíces
Victim Site: leonaraices.com - Alleged sale of Silver Stealer
Category: Malware
Content: A threat actor is advertising a malware tool called Silver Stealer .The malware is designed to steal browser data and cookies from browsers such as Google Chrome, Microsoft Edge, Opera, Opera GX, and Mozilla Firefox.
Date: 2026-03-08T18:52:09Z
Network: openweb
Published URL: https://breachforums.as/Thread-Silver-Stealer
Screenshots:
None
Threat Actors: SilverSupport
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - 313 Team claims to target all of Kuwait Servers
Category: Alert
Content: A recent post from the group claims that they are targeting all of Kuwait Servers.
Date: 2026-03-08T18:18:57Z
Network: telegram
Published URL: https://t.me/xX313XxTeam/684
Screenshots:
None
Threat Actors: 313 Team
Victim Country: Kuwait
Victim Industry: Unknown
Victim Organization: kuwaiti ministry of defense
Victim Site: Unknown - Alleged Sale of Corporate B2B Email Leads and Office365-Validated Databases
Category: Data Breach
Content: The threat actor selling corporate B2B lead databases and Office365-validated email lists. It offers millions of business leads, including up to 20–30 million records, with filtered deliverable email addresses for services such as Office365, Gmail (Gsuite), Mimecast, Barracuda, Proofpoint, and others.
Date: 2026-03-08T17:40:58Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-Sell-Leads-sorter-for-OFFICE365-Valid-Deliverable-and-others-webmails
Screenshots:
None
Threat Actors: Spectre2Data
Victim Country: Unknown
Victim Industry: Marketing, Advertising & Sales
Victim Organization: Unknown
Victim Site: Unknown - LAPSUS claims to target TAJ
Category: Alert
Content: The group claims to be selling software tools and configuration files allegedly required to access a “TAJ” database, rather than the database itself. The post states that sample materials, including certificates and tutorials, have been shared to demonstrate access capabilities.
Date: 2026-03-08T17:35:47Z
Network: telegram
Published URL: https://t.me/group_LAPSUS/33
Screenshots:
None
Threat Actors: LAPSUS
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Team4Security
Category: Data Breach
Content: The threat actor claims to have leaked data from Team4Security and shared the first part.
Date: 2026-03-08T17:34:25Z
Network: openweb
Published URL: https://breachforums.as/Thread-team4security-com-Data-Breach-PART-1-Download
Screenshots:
None
Threat Actors: GhostCrawl
Victim Country: Israel
Victim Industry: Information Technology (IT) Services
Victim Organization: team4security
Victim Site: team4security.com - Alleged data leak of Iranian Security Personnel from Special Unit
Category: Data Breach
Content: The group claims to have released a sample dataset containing information on 240 personnel allegedly affiliated with special security units in Iran, including individuals linked to institutions associated with the Islamic Revolutionary Guard Corps (IRGC).
Date: 2026-03-08T17:16:28Z
Network: telegram
Published URL: https://t.me/dornairan_en/125
Screenshots:
None
Threat Actors: DORNA Iran
Victim Country: Iran
Victim Industry: Military Industry
Victim Organization: islamic revolutionary guard corps
Victim Site: Unknown - Alleged leak of UAE data
Category: Data Breach
Content: The group claims to have leaked 374.9 MB of data from UAE.
Date: 2026-03-08T16:28:53Z
Network: telegram
Published URL: https://t.me/DedaleOffice/534
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: UAE
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to an unidentified CCTV camera in Israel
Category: Initial Access
Content: The group claims to have gained unauthorized access to unidentified D-Link CCTV camera in Israel/
Date: 2026-03-08T15:58:44Z
Network: telegram
Published URL: https://t.me/teambcs404/346
Screenshots:
None
Threat Actors: Team Bangladesh cyber squad
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Admin Access to a WordPress Shop in UK
Category: Initial Access
Content: The threat actor claims to be selling unauthorized admin access to a WordPress-based online shop located in the United Kingdom, allegedly providing full administrative privileges and the ability to interact with the payment form, indicating potential control over the store’s transactions and order management system.
Date: 2026-03-08T15:33:53Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277819/
Screenshots:
None
Threat Actors: Shopify
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Z-BL4CX-H4T targets the website of Luachnet
Category: Defacement
Content: The group claims to have defaced the website of Luachnet.
Date: 2026-03-08T15:33:10Z
Network: telegram
Published URL: https://t.me/c/3027611821/440
Screenshots:
None
Threat Actors: Z-BL4CX-H4T
Victim Country: Israel
Victim Industry: Online Publishing
Victim Organization: luachnet
Victim Site: luachnet.co.il - Cardinal claims to target an unidentified organisation
Category: Alert
Content: A recent post by the group indicates that they are targeting an unidentified organisation.
Date: 2026-03-08T15:27:09Z
Network: telegram
Published URL: https://t.me/c/2869875394/346
Screenshots:
None
Threat Actors: Cardinal
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - AnonGhost claims to target Israel and USA
Category: Alert
Content: A recent post by the group indicates infiltration of multiple digital systems in the United States and Israel, alleging access to SCADA environments, surveillance cameras, broadcast networks, and other critical infrastructure platforms. The group claims the capability to disrupt utilities such as water, power, and emergency communications systems, while also asserting extensive network reconnaissance across millions of IP addresses.
Date: 2026-03-08T14:45:35Z
Network: telegram
Published URL: https://t.me/c/1806562122/14377
Screenshots:
None
Threat Actors: AnonGhost
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Alaska Gold Fever Game Source Code from Baked Games S.A.
Category: Data Breach
Content: The threat actor claims to be selling the Unity source code of the upcoming game “Alaska Gold Fever,” allegedly containing 49 GB of data belonging to Baked Games S.A..
Date: 2026-03-08T14:32:58Z
Network: openweb
Published URL: https://breachforums.as/Thread-Alaska-Gold-Fever-Source-Code-unreleased-game
Screenshots:
None
Threat Actors: Angel_Batista
Victim Country: Poland
Victim Industry: Gaming
Victim Organization: baked games s.a.
Victim Site: bakedgames.com - Alleged data breach of Baked Games S.A.
Category: Data Breach
Content: The threat actor claims to have breached the Unity source code of the upcoming game Alaska Gold Fever, allegedly containing 49 GB of data from Baked Games S.A.
Date: 2026-03-08T14:30:32Z
Network: openweb
Published URL: https://breachforums.as/Thread-Alaska-Gold-Fever-Source-Code-unreleased-game
Screenshots:
None
Threat Actors: Angel_Batista
Victim Country: Poland
Victim Industry: Gaming
Victim Organization: baked games s.a.
Victim Site: bakedgames.com - Z-BL4CX-H4T targets the website of Felicity Insurance
Category: Defacement
Content: The group claims to have defaced the website of Felicity Insurance.
Date: 2026-03-08T14:28:12Z
Network: telegram
Published URL: https://t.me/c/3027611821/439
Screenshots:
None
Threat Actors: Z-BL4CX-H4T
Victim Country: USA
Victim Industry: Insurance
Victim Organization: felicity insurance
Victim Site: felicityinsure.com - Z-BL4CX-H4T targets the website of Eagle First
Category: Defacement
Content: The group claims to have defaced the website of Eagle First.
Date: 2026-03-08T14:23:18Z
Network: telegram
Published URL: https://t.me/c/3027611821/439
Screenshots:
None
Threat Actors: Z-BL4CX-H4T
Victim Country: USA
Victim Industry: Accounting
Victim Organization: eagle first
Victim Site: eagletaxpros.com - Alleged sale of Microsoft Office cookie scampage tool XCode
Category: Malware
Content: The threat actor claims to be selling a Microsoft Office cookie scampage tool called XCode, allegedly capable of harvesting Microsoft Office account session cookies, including accounts protected with 2FA. The tool reportedly supports hosting via cPanel or AAPanel, includes anti-bot and VPN protection, provides visit protection
Date: 2026-03-08T14:22:27Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-XCode-Microsoft-Office-Cooke-Scampage
Screenshots:
None
Threat Actors: HeizTs
Victim Country: USA
Victim Industry: Software Development
Victim Organization: microsoft
Victim Site: microsoft.com - Z-BL4CX-H4T targets the website of Simple Registration Solutions
Category: Defacement
Content: The group claims to have defaced the website of Simple Registration Solutions.
Date: 2026-03-08T14:18:32Z
Network: telegram
Published URL: https://t.me/c/3027611821/439
Screenshots:
None
Threat Actors: Z-BL4CX-H4T
Victim Country: USA
Victim Industry: Information Technology (IT) Services
Victim Organization: simple registration solutions
Victim Site: simpletoregister.com - Alleged unauthorized access to multiple Israeli Android TVs
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to multiple Android TV devices located in Israel, allegedly compromising more than eight devices.
Date: 2026-03-08T14:14:06Z
Network: telegram
Published URL: https://t.me/teambcs404/345
Screenshots:
None
Threat Actors: Team Bangladesh cyber squad
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - DEFACER INDONESIAN TEAM targets the website of Culturevore
Category: Defacement
Content: The group claims to have defaced the website of Culturevore.
Date: 2026-03-08T14:11:45Z
Network: telegram
Published URL: https://t.me/c/2433981896/1204
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: USA
Victim Industry: Philanthropy
Victim Organization: culturevore
Victim Site: culturevore.com - Alleged leak of admin access to PGK Gallery
Category: Initial Access
Content: The group claims to have leaked admin login credentials of PGK Gallery.
Date: 2026-03-08T14:11:11Z
Network: telegram
Published URL: https://t.me/silenterrorsystem/120
Screenshots:
None
Threat Actors: SILENT ERROR SYSTEM
Victim Country: Indonesia
Victim Industry: Retail Industry
Victim Organization: pgk gallery
Victim Site: pgkgallery.com - Alleged data breach of Izeta Group
Category: Data Breach
Content: The threat actor claims to be breached 5,904 records belonging to Izeta Group, The data reportedly includes customer personal details, contact information, purchase history, and spending records.
Date: 2026-03-08T14:09:31Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-IZETA-GROUP-5-904-CUSTOMER-RECORDS-LIVE-WOOCOMMERCE-KEYS-ERP-ACCESS
Screenshots:
None
Threat Actors: macaroni
Victim Country: Spain
Victim Industry: Other Industry
Victim Organization: izeta group
Victim Site: izetagroup.com - Alleged data sale of LE TEMPS DES CERISES JEANS
Category: Data Breach
Content: The threat actor claims to be selling 900,000 lines of data from Le Temps des Cerises Jeans, allegedly containing extracted data fields such as order link, gender, customer surname, customer first name, customer email, and more.
Date: 2026-03-08T14:09:25Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FR-Le-Temp-des-cerises
Screenshots:
None
Threat Actors: DumpSec
Victim Country: France
Victim Industry: Manufacturing
Victim Organization: le temps des cerises jeans
Victim Site: letempsdescerises.com - Alleged data breach of FNATH
Category: Data Breach
Content: The threat actor claims to have breached 197 GB of data from FNATH, allegedly containing 29,144 + 45,428 records with information such as birth name, email, ID, date of birth, and more.
Date: 2026-03-08T14:02:10Z
Network: openweb
Published URL: https://breachforums.as/Thread-197GO-FNATH-org-Association-des-accident%C3%A9s-de-la-vie
Screenshots:
None
Threat Actors: Angel_Batista
Victim Country: France
Victim Industry: Non-profit & Social Organizations
Victim Organization: fnath
Victim Site: fnath.org - INDOHAXSEC targets the website of Casino4Live
Category: Defacement
Content: The group claims to have defaced the website of Casino4Live.
Date: 2026-03-08T13:54:25Z
Network: telegram
Published URL: https://t.me/IndoHaxSec3/67
Screenshots:
None
Threat Actors: INDOHAXSEC
Victim Country: Costa Rica
Victim Industry: Gambling & Casinos
Victim Organization: casino4live
Victim Site: casino4live.com - Alleged Sale of Access to Over 700 Compromised PCs
Category: Initial Access
Content: A threat actor claims to have access to more than 700 compromised PCs, stating that the number of infected systems is increasing daily.
Date: 2026-03-08T13:54:01Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277807/
Screenshots:
None
Threat Actors: francogambino83
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - DEFACER INDONESIAN TEAM targets the website of Party42nite
Category: Defacement
Content: The group claims to have defaced the website of Party42nite
Date: 2026-03-08T13:33:58Z
Network: telegram
Published URL: https://t.me/c/2433981896/1202
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: South Africa
Victim Industry: Information Services
Victim Organization: party42nite
Victim Site: party42nite.com - DEFACER INDONESIAN TEAM targets the website of Full Before Montauk
Category: Defacement
Content: The group claims to have defaced the website of Full Before Montauk.
Date: 2026-03-08T13:22:17Z
Network: telegram
Published URL: http://t.me/c/2433981896/1198
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: USA
Victim Industry: Online Publishing
Victim Organization: full before montauk
Victim Site: fullbeforemontauk.com - L4663R666H05T targets the website of Alrama Films
Category: Defacement
Content: The threat actor claims to have defaced the website of Alrama Films.
Date: 2026-03-08T12:34:18Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/804872
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Automotive
Victim Organization: alrama films
Victim Site: alramafilms.ae - Hax.or targets the website of Dinas PUPR Provinsi Sumatera Utara
Category: Defacement
Content: The group claims to have defaced the website of Dinas PUPR Provinsi Sumatera Utara.
Date: 2026-03-08T12:12:58Z
Network: telegram
Published URL: https://t.me/ctifeeds/129045
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: dinas pupr provinsi sumatera utara
Victim Site: dpupr.sumutprov.go.id - Alleged data breach of Laika Mascotas
Category: Data Breach
Content: The group claims to have breached data from Laika Mascotas.
Date: 2026-03-08T11:56:50Z
Network: telegram
Published URL: https://t.me/DedaleOffice/522
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: Colombia
Victim Industry: Other Industry
Victim Organization: laika mascotas
Victim Site: laika.com.co - Alleged Sale of Open UPS Access
Category: Initial Access
Content: The threat actor claims to be offering access to multiple Open UPS systems, including both newly discovered and previously known accesses.
Date: 2026-03-08T11:33:10Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277801/
Screenshots:
None
Threat Actors: networkbase
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of ADFS & WHMCS Access Credentials
Category: Initial Access
Content: A threat actor claims to possess approximately 2,700 ADFS and WHMCS access credentials allegedly obtained from various domains. The actor states that each domain is unique and claims that more than 80% of the accesses are valid. The post suggests that these accesses were previously observed being sold in auctions a few months ago.
Date: 2026-03-08T11:31:41Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277797/
Screenshots:
None
Threat Actors: 3olotoi
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Hakara
Category: Data Breach
Content: The threat actor claims to have leaked data related to Hakara.
Date: 2026-03-08T11:29:14Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277798/
Screenshots:
None
Threat Actors: HighRisk
Victim Country: Vietnam
Victim Industry: Music
Victim Organization: hakara
Victim Site: hakara.vn - Alleged data leak West Kalimantan Provincial Government
Category: Data Breach
Content: The threat actor claims to have leaked the database from West Kalimantan Provincial Government. the reportedly data includes personnel records, names, IDs, positions, and department assignments.
Date: 2026-03-08T11:19:04Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-DATABASE-EXPOSED-INDONESIA-WEST-KALIMANTAN-PROVINCIAL-GOVT-INTERNAL-ASSET
Screenshots:
None
Threat Actors: Shenira6core
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - DEFACER INDONESIAN TEAM targets the website of DILIGENT SEARCHES REALTY LLC
Category: Defacement
Content: The group claims to have defaced the website of DILIGENT SEARCHES REALTY LLC.
Date: 2026-03-08T11:07:54Z
Network: telegram
Published URL: https://t.me/c/2433981896/1196
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: USA
Victim Industry: Real Estate
Victim Organization: diligent searches realty llc
Victim Site: diligentsearches.com - Alleged leak of PII data of Sofia Venturini
Category: Data Breach
Content: The threat actor claims to have leaked the PII data from Sofia Venturini, including alleged contact details, date of birth, location in Italy, and links to social media profiles.
Date: 2026-03-08T11:01:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-Sofia-Venturini-Dox
Screenshots:
None
Threat Actors: dambss
Victim Country: Italy
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Sagent Pharmaceuticals
Category: Data Breach
Content: The threat actor claims to have breached data from Sagent Pharmaceuticals and intends to publish it within 1-2 days.
Date: 2026-03-08T10:50:19Z
Network: tor
Published URL: https://worldleaksartrjm3c6vasllvgacbi5u3mgzkluehrzhk2jz4taufuid.onion/companies/4963154147/overview
Screenshots:
None
Threat Actors: Worldleaks
Victim Country: USA
Victim Industry: Healthcare & Pharmaceuticals
Victim Organization: sagent pharmaceuticals
Victim Site: sagentpharma.com - DEFACER INDONESIAN TEAM targets the website of Grand Elm
Category: Defacement
Content: The group claims to have defaced the website of Grand Elm.
Date: 2026-03-08T10:50:15Z
Network: telegram
Published URL: https://t.me/c/2433981896/1194
Screenshots:
None
Threat Actors: DEFACER INDONESIAN TEAM
Victim Country: USA
Victim Industry: Real Estate
Victim Organization: grand elm
Victim Site: grandelm.com - Nullsec Philippines targets the website of Ministry of Industry
Category: Defacement
Content: Group claims to have deface the website of Ministry of Industry.
Date: 2026-03-08T10:34:02Z
Network: telegram
Published URL: https://t.me/nullsechackers/842
Screenshots:
None
Threat Actors: Nullsec Philippines
Victim Country: Thailand
Victim Industry: Government & Public Sector
Victim Organization: ministry of industry
Victim Site: pdg.industry.go.th - Alleged data leak of Pakistan students database
Category: Data Breach
Content: The group claims to have leaked Pakistani School student database. The compromised data reportedly includes student names, student IDs, class details, section information, and other academic records
Date: 2026-03-08T10:32:37Z
Network: telegram
Published URL: https://t.me/ZeroCertHackers/1260
Screenshots:
None
Threat Actors: Off-Line
Victim Country: Pakistan
Victim Industry: Education
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Medihelp Services
Category: Data Breach
Content: The threat actor claims to have breached Medihelp Services database, The leaked sample allegedly contains patient-related information such as full names, document details, and medical-related records.
Date: 2026-03-08T10:32:07Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FREE-LEAK-clinicamedihelp-com
Screenshots:
None
Threat Actors: delitospenales
Victim Country: Mexico
Victim Industry: Hospital & Health Care
Victim Organization: medihelp services
Victim Site: clinicamedihelp.com - Alleged leak of admin access to Computer Source Bangladesh
Category: Initial Access
Content: The group claims to have leaked admin login credentials belonging to Computer Source Bangladesh.
Date: 2026-03-08T10:20:48Z
Network: telegram
Published URL: https://t.me/ZeroCertHackers/1259
Screenshots:
None
Threat Actors: Off-Line
Victim Country: Bangladesh
Victim Industry: Information Technology (IT) Services
Victim Organization: computer source bangladesh
Victim Site: computersource.com.bd - Alleged data breach of WayzeSMS
Category: Data Breach
Content: The threat actor claims to have leaked advertised WayzeSMS, the reportedly include WhatsApp, Facebook, Amazon, Instagram, Twitter, and Outlook.
Date: 2026-03-08T10:20:43Z
Network: openweb
Published URL: https://breachforums.as/Thread-WayzeSMS-com-USA-SMS-RCS-iMessage-Data-Checking
Screenshots:
None
Threat Actors: obfuscatable
Victim Country: USA
Victim Industry: Network & Telecommunications
Victim Organization: wayzesms
Victim Site: wayzesms.com - THE GARUDA EYE claims to target Egypt
Category: Alert
Content: A recent post by the group indicating that they are targeting Egypt.
Date: 2026-03-08T10:19:47Z
Network: telegram
Published URL: https://t.me/GarudaEye/1240
Screenshots:
None
Threat Actors: THE GARUDA EYE
Victim Country: Egypt
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged cyberattack on Israeli weather station infrastructures
Category: Cyber Attack
Content: The group claims responsibility for conducting a cyberattack and breaching the main servers of Israeli weather station infrastructure.
Date: 2026-03-08T09:54:33Z
Network: telegram
Published URL: https://t.me/HANDALA_HPR2/9
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of IndiHome
Category: Data Breach
Content: The group claims to have leaked data from IndiHome. The dataset contains including personal details such as names, contact information, and national identity numbers.
Date: 2026-03-08T09:29:12Z
Network: telegram
Published URL: https://t.me/DedaleOffice/520
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: Indonesia
Victim Industry: Network & Telecommunications
Victim Organization: indihome
Victim Site: telkomsel.com - Hax.or targets the website of IKIP PGRI Bojonegoro Library
Category: Defacement
Content: The group claims to have defaced the website of IKIP PGRI Bojonegoro Library.
Date: 2026-03-08T09:14:43Z
Network: telegram
Published URL: https://t.me/ctifeeds/129044
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Indonesia
Victim Industry: Library
Victim Organization: ikip pgri bojonegoro library
Victim Site: smartlab.ikippgribojonegoro.ac.id - Hax.or targets the website of IKIP PGRI Bojonegoro
Category: Defacement
Content: The group claims to have defaced the website of IKIP PGRI Bojonegoro.
Date: 2026-03-08T09:04:33Z
Network: telegram
Published URL: https://t.me/ctifeeds/129043
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Indonesia
Victim Industry: Education
Victim Organization: ikip pgri bojonegoro
Victim Site: sim-asset.ikippgribojonegoro.ac.id - Alleged data leak of Denpasar population database
Category: Data Breach
Content: The threat actor claims to have leaked and shared the Denpasar population database, reportedly exposing resident demographic records and related personal information from Denpasar, Indonesia.
Date: 2026-03-08T08:59:52Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Database-Share-By-YanXploit
Screenshots:
None
Threat Actors: YanXploit
Victim Country: Indonesia
Victim Industry: Government Relations
Victim Organization: denpasar population registry
Victim Site: Unknown - Alleged data breach of Colombian vaccination database
Category: Data Breach
Content: The threat actor claims to have breached 223,330 Colombian identification records from a government vaccination website on 19 Feb 2026, reportedly exposing various personal identification details.
Date: 2026-03-08T08:20:09Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-database-extraida-Colombia-2026-223-330-Identificaciones
Screenshots:
None
Threat Actors: ironatlas
Victim Country: Colombia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cyberattack Hit Middlesex-London Health Unit
Category: Cyber Attack
Content: A cybersecurity incident affected the Middlesex-London Health Unit in London, forcing the organization to shut down some phone lines and internal software systems as a precaution. The health unit reported the incident to the privacy commissioner and the Ministry of Health while an investigation was launched to determine the cause and scope of the attack. Officials stated that certain services were temporarily disrupted while technical teams worked to secure the network and restore systems. At the time of reporting, authorities had not confirmed whether any sensitive data had been compromised.
Date: 2026-03-08T07:46:22Z
Network: openweb
Published URL: https://www.cbc.ca/news/canada/london/health-unit-cyber-9.7118051
Screenshots:
None
Threat Actors:
Victim Country: Canada
Victim Industry: Hospital & Health Care
Victim Organization: middlesex-london health unit
Victim Site: healthunit.com - Alleged data sale of Airclaim
Category: Data Breach
Content: The threat actor claims to be selling 121 GB of data from Airclaim, allegedly containing information on 55,867 people, including documents such as passports, signatures, boarding passes, and other personal information.
Date: 2026-03-08T07:43:00Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-EU-Airclaim-com-121GB
Screenshots:
None
Threat Actors: HexDex
Victim Country: Romania
Victim Industry: Airlines & Aviation
Victim Organization: airclaim
Victim Site: airclaim.com - Alleged cyberattack on surveillance cameras in Tel Aviv and Haifa
Category: Cyber Attack
Content: The threat actor claims to have targeted surveillance camera systems in Tel Aviv and Haifa, alleging that the cameras were disrupted and taken out of service during the operation.
Date: 2026-03-08T07:28:29Z
Network: telegram
Published URL: https://t.me/UniTcyber313/215
Screenshots:
None
Threat Actors: UniT 313
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - UniT 313 claims to target Israel
Category: Alert
Content: A recent post by the group indicating that they are targeting Israel.
Date: 2026-03-08T07:14:26Z
Network: telegram
Published URL: https://t.me/UniTcyber313/214
Screenshots:
None
Threat Actors: UniT 313
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of Islamic Revolutionary Guard Corps (IRGC) linked files from Iran.
Category: Data Breach
Content: The threat actor claims to have leaked files related to the Islamic Revolutionary Guard Corps (IRGC) in Iran, including information allegedly exposing individuals linked to IRGC operations.
Date: 2026-03-08T06:34:18Z
Network: telegram
Published URL: https://t.me/youranon_storm/1308
Screenshots:
None
Threat Actors: Anonymous
Victim Country: Iran
Victim Industry: Government Administration
Victim Organization: islamic revolutionary guard corps
Victim Site: Unknown - Alleged sale of unauthorized admin and shell access to an unidentified coffee shop
Category: Initial Access
Content: Threat actor claims to be selling unauthorized admin and shell access to an unidentified coffee shop in Germany.
Date: 2026-03-08T06:32:31Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277755/
Screenshots:
None
Threat Actors: Zimmer
Victim Country: Germany
Victim Industry: Restaurants
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of unauthorized magento accesses
Category: Initial Access
Content: Threat actor claims to be selling 500 unauthorized magento accesses in multiple countries.
Date: 2026-03-08T06:30:15Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277748/
Screenshots:
None
Threat Actors: Bakardi
Victim Country: Unknown
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of French Driving School Data
Category: Data Breach
Content: The threat actor claims to be selling the database of French driving school system, the database contains personal documents and identification records.
Date: 2026-03-08T06:22:24Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-FR-French-driving-school-CNI-etc
Screenshots:
None
Threat Actors: telaviv
Victim Country: France
Victim Industry: Education
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Dinas Kependudukan dan Pencatatan Sipil Provinsi DKI Jakarta
Category: Data Breach
Content: The group claims to have breached 539,737 Rows data from Dinas Kependudukan dan Pencatatan Sipil Provinsi DKI Jakarta.
Date: 2026-03-08T06:16:52Z
Network: telegram
Published URL: https://t.me/DedaleOffice/517
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: dinas kependudukan dan pencatatan sipil provinsi dki jakarta
Victim Site: Unknown - Alleged Data Leak of Pakistan Government Personnel Information
Category: Data Breach
Content: The group claims to have leaked 2GB data from Pakistan Government. The compromised data reportedly includes Department, Name, Address, Date of Birth, Blood Group, Email, Government ID and ID Photos.
Date: 2026-03-08T05:46:41Z
Network: telegram
Published URL: https://t.me/DedaleOffice/515
Screenshots:
None
Threat Actors: Dedale Office
Victim Country: Pakistan
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to Argentine Judiciary Admin Panel
Category: Initial Access
Content: The threat actor claims to have access to an administrative panel linked to the Argentine Judicial Branch, allegedly containing sensitive information related to prosecutors and applicants for government positions.
Date: 2026-03-08T03:56:21Z
Network: openweb
Published URL: https://breachforums.as/Thread-Gov-admin-panel-linked-to-the-Argentine-judiciary
Screenshots:
None
Threat Actors: ORION
Victim Country: Argentina
Victim Industry: Government Administration
Victim Organization: argentine judicial branch
Victim Site: Unknown - Alleged unauthorized access to SCADA system in Ukraine
Category: Initial Access
Content: The group claims to have gained unauthorized access to SCADA system
Date: 2026-03-08T03:45:53Z
Network: telegram
Published URL: https://t.me/privetOTof223/527
Screenshots:
None
Threat Actors: OverFlame
Victim Country: Ukraine
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - r0ckin targets the website of AvalAi
Category: Defacement
Content: The group targets the website of AvalAi.
Date: 2026-03-08T03:39:10Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41594289
Screenshots:
None
Threat Actors: r0ckin
Victim Country: Iran
Victim Industry: Information Technology (IT) Services
Victim Organization: avalai
Victim Site: avalai.ir - DieNet claims to target USA
Category: Alert
Content: A recent post by the group indicates that they are targeting USA.
Date: 2026-03-08T03:30:25Z
Network: telegram
Published URL: https://t.me/dienet3/407
Screenshots:
None
Threat Actors: DieNet
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - /Rayzky_ targets the website of AsnaFlenjan
Category: Defacement
Content: The group claims to have defaced the website of AsnaFlenjan.
Date: 2026-03-08T03:30:22Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41593928
Screenshots:
None
Threat Actors: /Rayzky_
Victim Country: Iran
Victim Industry: Law Practice & Law Firms
Victim Organization: asnaflenjan
Victim Site: asnaflenjan.ir - Alleged Data Breach of Municipal Government of Juárez
Category: Data Breach
Content: The threat actor claims to have breached the database of Government of Juárez, Nuevo León, the dataset contains including personal information, identification numbers, and administrative records associated with the Juárez municipal government platforms.
Date: 2026-03-08T02:27:56Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Gobierno-Juarez-Nuevo-leon-MX-dbs
Screenshots:
None
Threat Actors: godislife69x
Victim Country: Mexico
Victim Industry: Government Administration
Victim Organization: municipal government of juárez
Victim Site: soyjuarense.juarez-nl.gob.mx - DieNet claims to target Digital Systems in Kuwait and Other Gulf States
Category: Alert
Content: A recent post by the group indicates that they are targeting Digital Systems in Kuwait and Other Gulf States
Date: 2026-03-08T01:56:17Z
Network: telegram
Published URL: https://t.me/dienet3/409
Screenshots:
None
Threat Actors: DieNet
Victim Country: Kuwait
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Space42 Suffers Data Breach
Category: Data Breach
Content: Space42 was reportedly subjected to a data breach by the hacker group Mobir, According to statements released by the group, the attack targeted Space42’s network in response to alleged cooperation between the company and Israeli and U.S. entities.Mobir stated that it gained access to internal systems and published screenshots of server management dashboards as evidence of the breach.The group also claimed to have leaked documents related to contracts between Yahsat one of the companies that merged to form Space42—and the Israeli satellite communications company Gilat.
Date: 2026-03-08T00:10:03Z
Network: telegram
Published URL: https://t.me/cyberbannews_ir/20266
Screenshots:
None
Threat Actors: Unknown
Victim Country: UAE
Victim Industry: Defense & Space
Victim Organization: space42
Victim Site: space42.ai - Alleged Data Breach of Instituto Técnico Superior
Category: Data Breach
Content: The threat actor claims to have breached the database of Instituto Técnico Superior – MEC, the dataset contains students personal informations.
Date: 2026-03-08T00:02:45Z
Network: openweb
Published URL: https://breachforums.as/Thread-caeff-com-py%C2%A0-leak
Screenshots:
None
Threat Actors: Tanaka
Victim Country: Paraguay
Victim Industry: Education
Victim Organization: técnico superior – mec
Victim Site: caeff.com.py