1. Executive Summary
This report details a concentrated series of cybersecurity incidents primarily recorded on March 9, 2026. The threat landscape during this period is characterized by massive, coordinated data breach campaigns targeting government infrastructures, high-volume credential leaks, and targeted defacement operations. The data highlights a severe vulnerability in regional government portals, particularly within Indonesia, and sustained hacktivist or state-aligned targeting of Israeli institutions.
2. Threat Actor Landscape & Major Campaigns
The incidents are dominated by several highly active threat actors and syndicates, each demonstrating distinct targeting preferences and methodologies.
The INDRAMAYU CHAOS SYSTEM Campaign
The most prolific threat actor in the provided dataset is the “INDRAMAYU CHAOS SYSTEM.” This group executed a massive, coordinated campaign aimed almost exclusively at the Republic of Indonesia.
- Target Profile: The group focused entirely on government administration, specifically regional regencies, provincial governments, and national ministries.
- Attack Vector: The incidents are uniformly categorized as “Data Breaches,” specifically involving the leaking of login credentials.
- Key Victims: Compromised entities include the Ministry of National Development Planning , Ministry of Finance , Ministry of Home Affairs , and the Supreme Court of the Republic of Indonesia.
Hacktivism and Targeted Attacks on Israel
Israel faced a multi-faceted assault from several distinct threat actors, blending hacktivism with severe data exfiltration.
- Academic Targeting: INDRAMAYU CHAOS SYSTEM expanded its targets to include Israeli educational institutions, leaking credentials from the University of Haifa , Hebrew University of Jerusalem , and Reichman University.
- Military and Security Data: The “404 CREW CYBER TEAM” allegedly leaked a dataset linked to Israeli Soldiers, including names, addresses, and phone numbers. Furthermore, “Handala Hack” claimed to leak personal information of 50 Israeli Air Force officers, including fighter pilots and drone operators , and also claimed unauthorized access to security cameras in Jerusalem.
- Critical Infrastructure: The group “Cardinal” claimed unauthorized access to systems associated with a nuclear facility in Dimona, Israel, alleging manipulation of internal control components.
Defacement Operations by L4663R666H05T
The threat actor “L4663R666H05T” engaged in a widespread website defacement campaign.
- Victims: Targets were geographically and industrially diverse, including ACE Network Ltd in Israel , Entel Chile , and multiple organizations in the UAE such as Showracks Trading LLC and Hard Disk Direct.
3. High-Impact Data Breaches & Corporate Compromises
Several incidents stand out due to the sheer volume of data compromised or the sensitivity of the organizations involved.
- Infutor (USA): A threat actor named “Spirigatito” claimed to sell a database containing 676,798,866 records of American citizens, exposing full names, dates of birth, addresses, phone numbers, and Social Security Numbers.
- Sunrise Communications (Switzerland): The actor “Niphra” advertised a database of over 6 million customer records, including payment-related data, usernames, and addresses.
- Vertex Inc. (USA): The group “ShinyHunters” claimed to have compromised over 2 million records containing personally identifiable information (PII) and internal corporate data.
- SoundCloud (USA): A leak allegedly exposed 896,470 records of U.S. users, including names, emails, and profile URLs.
- Isrotel Hotel Chain & Israeli Infrastructure: The actor “Ashborn” claimed to sell a massive 3 GB compilation of 36 databases containing 9.2 million records from Israeli sources, including Isrotel , Arkia Israeli airlines , and Bezeq.
4. Operational Technology (OT) and Initial Access Sales
Beyond data exfiltration, the report indicates active threats against physical infrastructure and the commercialization of network access.
- Industrial Control Systems (ICS): The “Armenian code” group claimed unauthorized access to a residential heating control system in Azerbaijan, allegedly switching it to gas mode, disabling pumps, and pushing pressure and temperature to maximum levels to trigger emergency alerts. Additionally, “Shadow ClawZ 404” claimed access to an unidentified industrial pumping control system.
- Initial Access Brokering: Threat actors actively sold access to compromised networks. Examples include SSH access to a Vietnamese live football streaming site containing over 10 servers , unauthorized Magento admin access in the UK , and access to a compromised Mexican e-commerce shop processing payments via OpenPay.
5. Conclusion
The cybersecurity events detailed in this dataset reveal a highly volatile digital environment. The overarching theme is the stark vulnerability of government administrative systems, best evidenced by the systemic compromise of Indonesian public sector credentials. Furthermore, the dataset underscores that geopolitical tensions continue to manifest in cyberspace, as seen in the targeted harassment and data exposure of Israeli military personnel and critical infrastructure.
Finally, the commodification of cybercrime remains robust. The sale of massive citizen databases (such as the Infutor breach), initial access to corporate networks, and the advertisement of specialized malware like “NFCRipper” demonstrate a mature, profit-driven underground economy that poses a continuous threat to global data privacy and operational stability.
Detected Incidents Draft Data
- Alleged Unauthorized Access to French customs portal.
Category: Data Breach
Content: The group claims to have gained unauthorized access to French customs portal.
Date: 2026-03-09T23:55:28Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-Douane-gouv-fr-Panel-acces
Screenshots:
None
Threat Actors: M4nifest
Victim Country: France
Victim Industry: Government Administration
Victim Organization: direction générale des douanes et droits indirects
Victim Site: douane.gov.fr - Alleged Data Breach of Rheinhessen-Bräu
Category: Data Breach
Content: The threat actor claims to have breached the data related to Rheinhessen-Bräu, the data includes WordPress login credentials allegedly belonging to a user of the website.
Date: 2026-03-09T23:38:03Z
Network: openweb
Published URL: https://breachforums.as/Thread-Leak-Rheinhessen-Br%C3%A4u
Screenshots:
None
Threat Actors: hades1800
Victim Country: Germany
Victim Industry: Food & Beverages
Victim Organization: rheinhessen-bräu
Victim Site: rheinhessen-braeu.de - Alleged data breach of SPUTNIK
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly associated with SPUTNIK. the leaked dataset contains approximately 119,957 lines of data in TXT format, including personal information such as names, phone numbers, dates of birth, and other details.
Date: 2026-03-09T22:59:11Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-sputnik64-ru
Screenshots:
None
Threat Actors: X0Frankenstein
Victim Country: Russia
Victim Industry: Supermarkets
Victim Organization: sputnik
Victim Site: sputnik64.ru - Alleged data breach of Saint Lucia Citizenship by Investment Programme
Category: Data Breach
Content: The threat actor claims to have leaked a database allegedly belonging to the Saint Lucia Citizenship by Investment Programme website. the dataset is provided in SQL format and reportedly contains 1,116,935 rows of data. which inclludes usernames, hashed passwords, full names, addresses, phone numbers, emails, passport numbers, and other identification-related information.
Date: 2026-03-09T22:49:13Z
Network: openweb
Published URL: https://breachforums.as/Thread-cipsaintlucia-com-leak
Screenshots:
None
Threat Actors: Tanaka
Victim Country: Saint Lucia
Victim Industry: Government Administration
Victim Organization: saint lucia citizenship by investment programme
Victim Site: cipsaintlucia.com - L4663R666H05T targets the website of ACE Network Ltd
Category: Defacement
Content: The Group claims to have defaced the website of ACE Network Ltd.
Date: 2026-03-09T22:07:50Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41594486
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Israel
Victim Industry: Retail Industry
Victim Organization: ace network ltd
Victim Site: mcstaging3.ace.co.il - Alleged unauthorized access to CCTV Systems in USA
Category: Initial Access
Content: The group claims to have gained unauthorized access to multiple CCTV Systems in USA
Date: 2026-03-09T21:56:20Z
Network: telegram
Published URL: https://t.me/op_morningstar/515
Screenshots:
None
Threat Actors: MORNING STAR
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - L4663R666H05T targets the website of Entel Chile
Category: Defacement
Content: The Group claims to have defaced the website of Entel Chile.
Date: 2026-03-09T21:46:07Z
Network: openweb
Published URL: https://www.zone-h.org/mirror/id/41598789
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: Chile
Victim Industry: Network & Telecommunications
Victim Organization: entel chile
Victim Site: tiendaempresas.entel.cl - Alleged Sale of Unauthorized Access to a Live Football Streaming Website in Vietnam
Category: Initial Access
Content: The threat actor claims to be selling access via SSH to the infrastructure of a live football streaming site in Vietnam, stating that the access includes about 10 servers and more than 100 redirect domains.
Date: 2026-03-09T21:39:18Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277923/
Screenshots:
None
Threat Actors: William Black
Victim Country: Vietnam
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Cardinal claims to target an unidentified nuclear facility systems in Israel
Category: Alert
Content: The group claims to have gained unauthorized access to systems associated with a nuclear facility in Dimona, Israel, alleging manipulation of internal control components and monitoring logs during a specified time window.
Date: 2026-03-09T21:20:30Z
Network: telegram
Published URL: https://t.me/c/2869875394/350
Screenshots:
None
Threat Actors: Cardinal
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Bandung Regency Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Bandung Regency Government in Indonesia.
Date: 2026-03-09T20:57:19Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: bandung regency government
Victim Site: bandungkab.go.id - Alleged Data Leak from Gresik Regency Government
Category: Data Breach
Content: The group claims to have leaked the login credentials from Gresik Regency Government.
Date: 2026-03-09T20:55:55Z
Network: telegram
Published URL: https://t.me/c/3427600175/535
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: gresik regency government
Victim Site: gresikkab.go.id - Alleged Data Leak of Bangkalan Regency Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Bangkalan Regency Government in Indonesia.
Date: 2026-03-09T20:53:29Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: bangkalan regency government
Victim Site: bangkalankab.go.id - Alleged Data Leak from Government of Gunungkidul Regency
Category: Data Breach
Content: The group claims to have leaked the login credentials from Government of Gunungkidul Regency.
Date: 2026-03-09T20:52:30Z
Network: telegram
Published URL: https://t.me/c/3427600175/537
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of gunungkidul regency
Victim Site: gunungkidulkab.go.id - Alleged Data Leak of Bangli Regency Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Bangli Regency Government in Indonesia.
Date: 2026-03-09T20:49:43Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: bangli regency government
Victim Site: banglikab.go.id - Alleged Data Leak of Banten Provincial Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Banten Provincial Government in Indonesia.
Date: 2026-03-09T20:45:31Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: banten provincial government
Victim Site: bantenprov.go.id - Alleged Data Leak from University of Haifa
Category: Data Breach
Content: The group claims to have leaked the login credentials from University of Haifa.
Date: 2026-03-09T20:44:14Z
Network: telegram
Published URL: https://t.me/c/3427600175/536
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: university of haifa
Victim Site: haifa.ac.il - Alleged Data Leak of Bantul Regency Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Bantul Regency Government in Indonesia.
Date: 2026-03-09T20:42:13Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: bantul regency government
Victim Site: bantulkab.go.id - Alleged Data Leak of Ministry of National Development Planning (BAPPENAS)
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Ministry of National Development Planning in Indonesia.
Date: 2026-03-09T20:38:22Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: ministry of national development planning
Victim Site: bappenas.go.id - Alleged Data Leak from Herzog Academic College
Category: Data Breach
Content: The group claims to have leaked the login credentials from Herzog Academic College.
Date: 2026-03-09T20:38:13Z
Network: telegram
Published URL: https://t.me/c/3427600175/536
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: herzog academic college
Victim Site: herzog.ac.il - Alleged leak of Israeli Soldiers data
Category: Data Breach
Content: The group claims to have leaked a dataset allegedly linked to Israeli Soldiers Personal Information, Name, Address, Phone number.
Date: 2026-03-09T20:30:55Z
Network: telegram
Published URL: https://t.me/crewcyber/962
Screenshots:
None
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak from Hebrew University of Jerusalem
Category: Data Breach
Content: The group claims to have leaked the login credentials from Hebrew University of Jerusalem.
Date: 2026-03-09T20:30:05Z
Network: telegram
Published URL: https://t.me/c/3427600175/535
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: hebrew university of jerusalem
Victim Site: new.huji.ac.il - Alleged leak of Israel data
Category: Data Breach
Content: The group claims to have leaked a dataset allegedly linked to individuals in Israel, reportedly containing account information, phone numbers, and IP addresses associated with surveillance cameras.
Date: 2026-03-09T20:25:08Z
Network: telegram
Published URL: https://t.me/crewcyber/959
Screenshots:
None
Threat Actors: 404 CREW CYBER TEAM
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak from Provincial Government of West Java
Category: Data Breach
Content: The group claims to have leaked the login credentials from Provincial Government of West Java.
Date: 2026-03-09T20:21:10Z
Network: telegram
Published URL: https://t.me/c/3427600175/535
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: provincial government of west java
Victim Site: jabarprov.go.id - Alleged Data Leak of Kabupaten Maros
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Kabupaten Maros
Date: 2026-03-09T20:15:07Z
Network: telegram
Published URL: https://t.me/c/3427600175/550
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kabupaten maros
Victim Site: maroskab.go.id - Alleged Data Leak from Reichman University
Category: Data Breach
Content: The group claims to have leaked the login credentials from Reichman University.
Date: 2026-03-09T20:10:32Z
Network: telegram
Published URL: https://t.me/c/3427600175/537
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: reichman university
Victim Site: runi.ac.il - Alleged Data Leak of Majelis Permusyawaratan Rakyat Republik Indonesia
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Majelis Permusyawaratan Rakyat Republik Indonesia.
Date: 2026-03-09T19:58:14Z
Network: telegram
Published URL: https://t.me/c/3427600175/547
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: majelis permusyawaratan rakyat republik indonesia
Victim Site: mpr.go.id - Alleged Data Leak of The Academic College of Tel-Aviv, Yaffo
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of The Academic College of Tel-Aviv, Yaffo
Date: 2026-03-09T19:48:15Z
Network: telegram
Published URL: https://t.me/c/3427600175/547
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: the academic college of tel-aviv, yaffo
Victim Site: mta.ac.il - Alleged Data Leak from Indramayu Regency Government
Category: Data Breach
Content: The group claims to have leaked the login credentials from Indramayu Regency Government.
Date: 2026-03-09T19:48:01Z
Network: telegram
Published URL: https://t.me/c/3427600175/537
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: indramayu regency government
Victim Site: indramayukab.go.id - Alleged Data Leak of National Search and Rescue Agency (BASARNAS)
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of National Search and Rescue Agency in Indonesia.
Date: 2026-03-09T19:47:29Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: national search and rescue agency
Victim Site: basarnas.go.id - Alleged Data Leak of Election Supervisory Agency of Indonesia
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Election Supervisory Agency of Indonesia in Indonesia.
Date: 2026-03-09T19:40:20Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: election supervisory agency of indonesia
Victim Site: bawaslu.go.id - ShinyHunters Threaten Data Breaches in Salesforce Aura Campaign
Category: Alert
Content: threat actor has announced a campaign claiming that several hundred companies are at risk of having their data published if they fail to comply with the group’s demands.
Date: 2026-03-09T19:36:46Z
Network: tor
Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
Screenshots:
None
Threat Actors: ShinyHunters
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Bekasi Regency Government
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Government of Bekasi Regency Government in Indonesia.
Date: 2026-03-09T19:35:45Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: bekasi regency government
Victim Site: bekasikab.go.id - Alleged Data Leak of Government of Bengkulu Province
Category: Data Breach
Content: Threat Actor claims to have leaked the login credentials of Government of Bengkulu Province in Indonesia.
Date: 2026-03-09T19:32:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/503
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of bengkulu province
Victim Site: bengkulu.go.id - Alleged data leak of Ciamis Regency Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Ciamis Regency Government.
Date: 2026-03-09T19:31:59Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: ciamis regency government
Victim Site: ciamiskab.go.id - Alleged data leak of Cianjur Regency Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Cianjur Regency Government.
Date: 2026-03-09T19:28:41Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: cianjur regency government
Victim Site: cianjurkab.go.id - Alleged data leak of Regional Representative Council of Indonesia (DPD RI)
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Regional Representative Council of Indonesia (DPD RI).
Date: 2026-03-09T19:25:44Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: regional representative council of indonesia (dpd ri)
Victim Site: dpd.go.id - Alleged data leak of House of Representatives of the Republic of Indonesia (DPR RI)
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the House of Representatives of the Republic of Indonesia (DPR RI).
Date: 2026-03-09T19:22:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: house of representatives of the republic of indonesia (dpr ri)
Victim Site: dpr.go.id - Alleged data leak of Fakfak Regency Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Fakfak Regency Government.
Date: 2026-03-09T19:18:34Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: fakfak regency government
Victim Site: fakfakkab.go.id - Alleged data leak of Garut Regency Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Garut Regency Government.
Date: 2026-03-09T19:15:32Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: garut regency government
Victim Site: garutkab.go.id - Alleged data leak of Gianyar Regency Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Gianyar Regency Government.
Date: 2026-03-09T19:13:01Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: gianyar regency government
Victim Site: gianyarkab.go.id - Alleged Unauthorized Access to Azerbaijani Heating Control System
Category: Initial Access
Content: Threat group claims to have gained unauthorized access to another heating control system in Azerbaijan, allegedly affecting a residential heating infrastructure. According to the actor, the system was switched to gas mode, and the operational settings were modified. The attacker claims they disabled pumps and increased system pressure and temperature values to maximum levels, which reportedly triggered multiple system alerts and emergency notifications.
Date: 2026-03-09T19:10:42Z
Network: telegram
Published URL: https://t.me/armeniancode_eng/63
Screenshots:
None
Threat Actors: Armenian code
Victim Country: Azerbaijan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Gorontalo City Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Gorontalo City Government.
Date: 2026-03-09T19:10:38Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: gorontalo city government
Victim Site: gorontalo.go.id - Alleged Data Breach of Vertex Inc.
Category: Data Breach
Content: A threat actor claims to have compromised over 2 million records containing personally identifiable information (PII) and other internal corporate data.
Date: 2026-03-09T19:09:08Z
Network: tor
Published URL: http://toolatedhs5dtr2pv6h5kdraneak5gs3sxrecqhoufc5e45edior7mqd.onion/
Screenshots:
None
Threat Actors: ShinyHunters
Victim Country: USA
Victim Industry: Software Development
Victim Organization: vertex inc.
Victim Site: vertexinc.com - Alleged data leak of Gorontalo Provincial Government
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Gorontalo Provincial Government.
Date: 2026-03-09T19:08:01Z
Network: telegram
Published URL: https://t.me/c/3427600175/585
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: gorontalo provincial government
Victim Site: gorontaloprov.go.id - Alleged Leak of 896K U.S. User Records from SoundCloud Database
Category: Data Breach
Content: A threat actor claims to have leaked U.S. user data from a SoundCloud database, allegedly containing 896,470 user records. The dataset reportedly includes fields such as user ID, account creation date, last modified date, username, first name, last name, full name, email address, country code, permalink, profile URL, follower count, and following count.
Date: 2026-03-09T18:43:49Z
Network: openweb
Published URL: https://breachforums.as/Thread-US-Soundcloud-US-Users
Screenshots:
None
Threat Actors: hirohero89
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Netanya Academic College
Category: Data Breach
Content: The group claims to have leaked login credentials to Netanya Academic College.
Date: 2026-03-09T18:29:15Z
Network: telegram
Published URL: https://t.me/c/3427600175/548
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: netanya academic college
Victim Site: netanya.ac.il - Alleged Sale of Unauthorized WordPress Admin Access in USA
Category: Initial Access
Content: The threat actor claims to be selling unauthorized WordPress admin panel access to a website in the United States. The listing indicates recent transaction activity, including hundreds of debit/credit card Stripe payments across multiple months, suggesting active order processing through the platform.
Date: 2026-03-09T18:03:56Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277905/
Screenshots:
None
Threat Actors: manofworld
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Unauthorized Magento Admin Access in UK
Category: Initial Access
Content: The threat actor claims to be selling unauthorized Magento admin access to a website in the United Kingdom, noting recent order activity and the use of a credit card iframe for payments.
Date: 2026-03-09T18:03:38Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277904/
Screenshots:
None
Threat Actors: manofworld
Victim Country: UK
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of 267K Records from Exposed Government Servers
Category: Data Breach
Content: A threat actor claims to have exported data from exposed government servers. The leaked archive allegedly contains 267,462 lines of data with a total size of 18.85 MB.
Date: 2026-03-09T17:45:32Z
Network: openweb
Published URL: https://breachforums.as/Thread-COLLECTION-Exposed-Government-Data
Screenshots:
None
Threat Actors: The1F
Victim Country: Unknown
Victim Industry: Government & Public Sector
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Région Pays de la Loire Mobility Observatory Transport Database
Category: Data Breach
Content: Threat Actor claims to be selling a dataset allegedly associated with the Région Pays de la Loire Mobility Observatory in France. The dataset includes multimodal transportation and mobility data covering regional transport networks such as rail stations, bus stops, routes, timetables, and network topology. The data is provided in formats including NetEx and GTFS, along with CSV and Parquet exports, and contains historical and operational information related to passenger flows, origin–destination movement patterns, and transportation infrastructure within the region.
Date: 2026-03-09T17:41:57Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277908/
Screenshots:
None
Threat Actors: rythem
Victim Country: France
Victim Industry: Government Administration
Victim Organization: région pays de la loire
Victim Site: paysdelaloire.fr - Alleged data leak of Nusa Tenggara Timur
Category: Data Breach
Content: The group claims to have leaked login credentials to Nusa Tenggara Timur.
Date: 2026-03-09T17:39:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/547
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: nusa tenggara timur
Victim Site: nttprov.go.id - Alleged data breach of Hotel Lucerna Tijuana
Category: Data Breach
Content: A threat actor claims have leaked the data from hotel management system of Hotel Lucerna Tijuana.The exposed data allegedly includes live guest names, room numbers, guest stay details, housekeeping status, and more than two years of internal wake-up call logs.
Date: 2026-03-09T17:38:57Z
Network: openweb
Published URL: https://breachforums.as/Thread-LEAK-Hotel-Lucerna-Tijuana-78-Live-Guests-2-Years-Call-Logs-Mexico-2026
Screenshots:
None
Threat Actors: macaroni
Victim Country: Mexico
Victim Industry: Hospitality & Tourism
Victim Organization: hotel lucerna tijuana
Victim Site: hotellucernatijuana.com - Alleged data breach of Sunrise Communications
Category: Data Breach
Content: A threat actor claims to be selling a database containing over 6 million customer records allegedly from Sunrise. The data reportedly includes usernames, passwords, phone numbers, addresses, subscription plans, and other personal information, with payment-related data.
Date: 2026-03-09T17:29:53Z
Network: openweb
Published URL: https://breachforums.as/Thread-VERIFIED-Switzerland-Sunrise-ch-Data-Breach-6M
Screenshots:
None
Threat Actors: Niphra
Victim Country: Switzerland
Victim Industry: Network & Telecommunications
Victim Organization: sunrise communications
Victim Site: sunrise.ch - Alleged data breach of Le Matin
Category: Data Breach
Content: A threat actor claims to have leaked the second part of the database from lematin.ma. The exposed data allegedly includes user IDs, names, email addresses, and account details from the website’s user database.
Date: 2026-03-09T17:23:31Z
Network: openweb
Published URL: https://breachforums.as/Thread-lematin-ma-leak-data-PART-2
Screenshots:
None
Threat Actors: p1radox
Victim Country: Morocco
Victim Industry: Newspapers & Journalism
Victim Organization: le matin
Victim Site: lematin.ma - Alleged Data Leak of Bezala in Finland
Category: Data Breach
Content: Threat Actor claims to have leaked the database of Bezala in Finland. The exposed information includes employee details such as names, email addresses, roles, account identifiers, employment information, and system configuration data. The leaked records also includes company information, tax settings, and address details.
Date: 2026-03-09T17:22:15Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/69
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Finland
Victim Industry: Financial Services
Victim Organization: bezala
Victim Site: app.bezala.com - Alleged leak of Israel data
Category: Data Breach
Content: The group claims to have leaked data from Israel.
Date: 2026-03-09T17:22:05Z
Network: telegram
Published URL: https://t.me/Akatsukiyberteam/712
Screenshots:
None
Threat Actors: Akatsuki cyber team (official)
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Instituto Colombiano del Dolor
Category: Data Breach
Content: A threat actor claims to be selling a database of 750,000 Colombian individuals allegedly linked to INCODOL. The leaked data reportedly includes identification numbers, full names, birth dates, gender, marital status, addresses, phone numbers, occupation, and workplace details.
Date: 2026-03-09T17:16:18Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-CO-750K-INCODOL
Screenshots:
None
Threat Actors: NyxarGroup
Victim Country: Colombia
Victim Industry: Hospital & Health Care
Victim Organization: instituto colombiano del dolor
Victim Site: incodol.com - Alleged Leak of Malang City Citizen Population Data
Category: Data Breach
Content: A threat actor claims to have leaked citizen population data from Malang City. The exposed dataset allegedly contains names, national ID numbers (NIK), and addresses of residents.
Date: 2026-03-09T17:12:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-DATA-PENDUDUK-KOTA-MALANG
Screenshots:
None
Threat Actors: CyznetAdel
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of East Lombok Regency Government
Category: Data Breach
Content: The group claims to have leaked login credentials to East Lombok Regency Government
Date: 2026-03-09T17:05:00Z
Network: telegram
Published URL: https://t.me/c/3427600175/551
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: east lombok regency government
Victim Site: lomboktimurkab.go.id - Alleged data leak of Israeli Air Force Officers
Category: Data Breach
Content: The group claims to have leaked personal information allegedly belonging to 50 officers associated with the Israeli Air Force in Israel. The exposed dataset reportedly includes full names, identification numbers, phone numbers, addresses, photographs, and professional roles, including fighter pilots, drone operators, maintenance technicians, and airstrike planning personnel.
Date: 2026-03-09T16:59:57Z
Network: telegram
Published URL: https://t.me/HANDALA_HPR2/21
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data breach of Kejaksaan Negeri Gowa
Category: Data Breach
Content: The threat actor claims to have leaked login credentials for the Kejari Gowa website.
Date: 2026-03-09T16:58:46Z
Network: telegram
Published URL: https://t.me/c/3427600175/588
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Law Enforcement
Victim Organization: kejaksaan negeri gowa
Victim Site: kejari-gowa.go.id - Alleged data leak of North Lombok Regency Government
Category: Data Breach
Content: The group claims to have leaked login credentials to North Lombok Regency Government.
Date: 2026-03-09T16:52:24Z
Network: telegram
Published URL: https://t.me/c/3427600175/551
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: north lombok regency government
Victim Site: lombokutarakab.go.id - Alleged data leak of Indonesia Deposit Insurance Corporation (LPS)
Category: Data Breach
Content: The group claims to have leaked login credentials to Indonesia Deposit Insurance Corporation (LPS)
Date: 2026-03-09T16:47:55Z
Network: telegram
Published URL: https://t.me/c/3427600175/551
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: indonesia deposit insurance corporation (lps)
Victim Site: lps.go.id - Alleged data leak of Supreme Court of the Republic of Indonesia
Category: Data Breach
Content: The group claims to have leaked login credentials to Supreme Court of the Republic of Indonesia.
Date: 2026-03-09T16:45:32Z
Network: telegram
Published URL: https://t.me/c/3427600175/551
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Judiciary
Victim Organization: supreme court of the republic of indonesia
Victim Site: mahkamahagung.go.id - Alleged data leak of Majalengka Regency Government
Category: Data Breach
Content: The group claims to have leaked login credentials to Majalengka Regency Government.
Date: 2026-03-09T16:45:28Z
Network: telegram
Published URL: https://t.me/c/3427600175/558
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: majalengka regency government
Victim Site: majalengkakab.go.id - Alleged data leak of Malang Regency Government
Category: Data Breach
Content: The group claims to have leaked login credentials to Malang Regency Government.
Date: 2026-03-09T16:39:59Z
Network: telegram
Published URL: https://t.me/c/3427600175/547
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: malang regency government
Victim Site: malangkab.go.id - Kementerian Perindustrian Republik Indonesia
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Perindustrian Republik Indonesia.
Date: 2026-03-09T16:38:38Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kementerian perindustrian republik indonesia
Victim Site: kemenperin.go.id - Alleged Sale of 4 Billion Israeli Phone Numbers and Police Contact Information
Category: Data Breach
Content: Threat Actor claims to be selling a massive dataset allegedly containing up to 4 billion Israeli phone numbers, including contact numbers associated with Israeli police.
Date: 2026-03-09T16:36:19Z
Network: telegram
Published URL: https://t.me/c/2878397916/540
Screenshots:
None
Threat Actors: Hider_Nex
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Kementerian Pemuda dan Olahraga Republik Indonesia
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Pemuda dan Olahraga Republik Indonesia.
Date: 2026-03-09T16:34:26Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kementerian pemuda dan olahraga republik indonesia
Victim Site: kemenpora.go.id - Alleged Data Leak of Indonesia Ministry of Education Credentials
Category: Data Breach
Content: A threat actor claims to have leaked login credentials associated with multiple platforms under the Indonesia Ministry of Education, Culture, Research, and Technology. The exposed data allegedly includes emails, usernames, IDs, and passwords linked to various education portals such as SSO Datadik, GTK, BOS, ANBK, PIP, and other internal systems.
Date: 2026-03-09T16:30:34Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of education, culture, research, and technology
Victim Site: kemdikbud.go.id - Alleged data leak of Kementerian Pemberdayaan Perempuan dan Perlindungan Anak
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Pemberdayaan Perempuan dan Perlindungan Anak.
Date: 2026-03-09T16:28:05Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kementerian pemberdayaan perempuan dan perlindungan anak
Victim Site: kemenpppa.go.id - Alleged data leak of Otoritas Jasa Keuangan
Category: Data Breach
Content: The group claims to have leaked login credentials to Otoritas Jasa Keuangan.
Date: 2026-03-09T16:27:39Z
Network: telegram
Published URL: https://t.me/c/3427600175/547
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Financial Services
Victim Organization: otoritas jasa keuangan
Victim Site: ojk.go.id - Kementerian Pertahanan Republik Indonesia
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Pertahanan Republik Indonesia.
Date: 2026-03-09T16:25:44Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Defense & Space
Victim Organization: kementerian pertahanan republik indonesia
Victim Site: kemhan.go.id - Alleged data leak of Kementerian Sosial Republik Indonesia
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Sosial Republik Indonesia.
Date: 2026-03-09T16:21:22Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kementerian sosial republik indonesia
Victim Site: kemensos.go.id - Alleged Data Leak of Indonesia Ministry of Religious Affairs Credentials
Category: Data Breach
Content: A threat actor claims to have leaked login credentials associated with multiple platforms under the Indonesia Ministry of Religious Affairs. The exposed data allegedly includes usernames, emails, and passwords linked to various government education and administrative portals such as EMIS, Madrasah systems, BOS, and internal services
Date: 2026-03-09T16:21:00Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of religious affairs of the republic of indonesia
Victim Site: kemenag.go.id - Alleged data leak of Kementerian Kesehatan Republik Indonesia
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Kesehatan Republik Indonesia.
Date: 2026-03-09T16:19:52Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kementerian kesehatan republik indonesia
Victim Site: kemkes.go.id - Alleged Sale of 40K Land Registry Records in Israel
Category: Data Breach
Content: Threat Actor claims to be selling a database allegedly containing approximately 40,000 land registry records in Israel. The dataset includes details such as identity information, category, company names, email addresses, state, city, phone numbers, and website information.
Date: 2026-03-09T16:15:37Z
Network: telegram
Published URL: https://t.me/c/2878397916/540
Screenshots:
None
Threat Actors: Hider_Nex
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of
Category: Data Breach
Content: The group claims to have leaked login credentials to The Open University of Israel.
Date: 2026-03-09T16:15:29Z
Network: telegram
Published URL: https://t.me/c/3427600175/546
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: the open university of israel
Victim Site: openu.ac.il - Alleged Sale of 10k Email Accounts in Israel
Category: Data Breach
Content: Threat Actor claims to be selling a database containing more than 10,000 email accounts allegedly associated with individuals or entities in Israel.
Date: 2026-03-09T16:15:24Z
Network: telegram
Published URL: https://t.me/c/2878397916/540
Screenshots:
None
Threat Actors: Hider_Nex
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Sale of Bioterrorism Data in Israel
Category: Data Breach
Content: Threat Actor claims to be selling a database containing bioterrorism data in Israel.
Date: 2026-03-09T16:13:58Z
Network: telegram
Published URL: https://t.me/c/2878397916/540
Screenshots:
None
Threat Actors: Hider_Nex
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Maluku Provincial Government
Category: Data Breach
Content: The group claims to have leaked login credentials to Maluku Provincial Government.
Date: 2026-03-09T16:11:47Z
Network: telegram
Published URL: https://t.me/c/3427600175/554
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: maluku provincial government
Victim Site: malukuprov.go.id - Alleged Sale of Occupation Data in Israel
Category: Data Breach
Content: Threat Actor claims to be selling a database containing occupation data in Israel.
Date: 2026-03-09T16:09:57Z
Network: telegram
Published URL: https://t.me/c/2878397916/540
Screenshots:
None
Threat Actors: Hider_Nex
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Leak of Indonesia Ministry of Trade Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Trade. The exposed data allegedly includes usernames, email addresses, company accounts, and passwords linked to multiple trade, export, licensing, and procurement portals, indicating potential unauthorized access to ministry systems.
Date: 2026-03-09T16:09:34Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of trade of the republic of indonesia
Victim Site: kemendag.go.id - Alleged Data Leak of Indonesia Ministry of Villages and Rural Development Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Villages, Development of Disadvantaged Regions, and Transmigration. The exposed data allegedly includes usernames, identification numbers, email addresses, phone numbers, and passwords linked to multiple government portals and internal systems, indicating potential unauthorized access to ministry services and administrative platforms.
Date: 2026-03-09T16:08:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of villages, development of disadvantaged regions, and transmigration
Victim Site: kemendesa.go.id - Alleged data leak of Government of North Maluku Province
Category: Data Breach
Content: The group claims to have leaked login credentials to Government of North Maluku Province.
Date: 2026-03-09T16:07:36Z
Network: telegram
Published URL: https://t.me/c/3427600175/560
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of north maluku province
Victim Site: malut.go.id - Alleged Data Leak of Indonesia Ministry of Home Affairs Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Home Affairs. The exposed data allegedly includes usernames, identification numbers, emails, and passwords linked to multiple government systems and regional administrative portals.
Date: 2026-03-09T16:04:13Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of home affairs
Victim Site: kemendagri.go.id - Alleged data leak of Pemerintah Kabupaten Pamekasan
Category: Data Breach
Content: The group claims to have leaked login credentials to Pemerintah Kabupaten Pamekasan.
Date: 2026-03-09T16:01:10Z
Network: telegram
Published URL: https://t.me/c/3427600175/544
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: pemerintah kabupaten pamekasan
Victim Site: pamekasankab.go.id - Alleged data leak of Riau Islands Provincial Communication and Information Office
Category: Data Breach
Content: The group claims to have leaked login credentials to Riau Islands Provincial Communication and Information Office.
Date: 2026-03-09T15:56:28Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: riau islands provincial communication and information office
Victim Site: kepriprov.go.id - Alleged Data Leak of Indonesia Ministry of Finance Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Finance. The exposed data allegedly includes usernames, email addresses, identification numbers, and passwords linked to multiple government portals and internal systems, indicating potential unauthorized access to financial and administrative services.
Date: 2026-03-09T15:53:53Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of finance of the republic of indonesia
Victim Site: kemenkeu.go.id - Alleged data leak of Kementerian Komunikasi dan Digital RI
Category: Data Breach
Content: The group claims to have leaked login credentials to Kementerian Komunikasi dan Digital RI.
Date: 2026-03-09T15:51:09Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kementerian komunikasi dan digital ri
Victim Site: kominfo.go.id - Alleged Data Leak of Indonesia Ministry of Cooperatives and SMEs Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked multiple login credentials associated with platforms under the Indonesian Ministry of Cooperatives and Small and Medium Enterprises . The exposed data allegedly includes usernames, email addresses, and passwords linked to several ministry portals and services, indicating potential unauthorized access to government systems.
Date: 2026-03-09T15:48:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of cooperatives and small and medium enterprises
Victim Site: kemenkopukm.go.id - Alleged data leak of Komisi Nasional Hak Asasi Manusia
Category: Data Breach
Content: The group claims to have leaked login credentials to Komisi Nasional Hak Asasi Manusia.
Date: 2026-03-09T15:41:04Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: komisi nasional hak asasi manusia
Victim Site: komnasham.go.id - Alleged Data Leak of Indonesia Ministry of Law and Human Rights Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked numerous login credentials associated with platforms under the Indonesian Ministry of Law and Human Rights. The exposed data allegedly includes account usernames, email addresses, and passwords linked to various government portals and internal systems, indicating potential unauthorized access to multiple ministry services.
Date: 2026-03-09T15:40:28Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: ministry of law and human rights of the republic of indonesia
Victim Site: kemenkumham.go.id - Alleged data leak of Komisi Pemberantasan Korupsi
Category: Data Breach
Content: The group claims to have leaked login credentials to Komisi Pemberantasan Korupsi.
Date: 2026-03-09T15:38:38Z
Network: telegram
Published URL: https://t.me/c/3427600175/561
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: komisi pemberantasan korupsi
Victim Site: kpk.go.id - Alleged Data Leak of Indonesia Ministry of Tourism and Creative Economy Accounts
Category: Data Breach
Content: Threat Actor claims to have leaked multiple login credentials associated with platforms under the Indonesian Ministry of Tourism and Creative Economy (kemenparekraf.go.id). The exposed data allegedly includes numerous account credentials linked to various ministry services and portals, indicating potential unauthorized access to government-related systems and user accounts.
Date: 2026-03-09T15:35:20Z
Network: telegram
Published URL: https://t.me/c/3427600175/571
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government & Public Sector
Victim Organization: indonesian ministry of tourism and creative economy
Victim Site: kemenparekraf.go.id - Alleged leak of data related to Basij Forces
Category: Data Breach
Content: Group claims to have leaked personal data of about 40,000 Basij forces across Iran.
Date: 2026-03-09T15:32:52Z
Network: telegram
Published URL: https://t.me/youranon_storm/1319
Screenshots:
None
Threat Actors: Anonymous
Victim Country: Iran
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of North Maluku Provincial Government
Category: Data Breach
Content: The group claims to have leaked login credentials to North Maluku Provincial Government.
Date: 2026-03-09T15:17:27Z
Network: telegram
Published URL: https://t.me/c/3427600175/554
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: north maluku provincial government
Victim Site: malutprov.go.id - Alleged data leak of Manokwari Regency Government
Category: Data Breach
Content: The group claims to have leaked login credentials to Manokwari Regency Government.
Date: 2026-03-09T15:11:41Z
Network: telegram
Published URL: https://t.me/c/3427600175/554
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: manokwari regency government
Victim Site: manokwarikab.go.id - Alleged Leak of Admin and Login Credentials to Arty.mn
Category: Data Breach
Content: The group claims to have leaked Admin and Login Credentials to Arty.mn.
Date: 2026-03-09T15:08:12Z
Network: telegram
Published URL: https://t.me/Rakyat_DigitalCrew/70
Screenshots:
None
Threat Actors: Rakyat Digital Crew
Victim Country: Mongolia
Victim Industry: E-commerce & Online Stores
Victim Organization: arty.mn
Victim Site: arty.mn - Alleged data breach of Slavia Pojišťovna
Category: Data Breach
Content: A threat actor claims to have leaked 150GB of insurance data from Slavia Pojišťovna. The data allegedly includes insurance documents, claims, and client communications.
Date: 2026-03-09T14:56:08Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-CZ-Slavia-Pojistovna-Insurance
Screenshots:
None
Threat Actors: bytetobreach
Victim Country: Czech Republic
Victim Industry: Insurance
Victim Organization: slavia pojišťovna
Victim Site: slavia-pojistovna.cz - Alleged data leak of National Defence University, Pakistan
Category: Data Breach
Content: National Defence UniversityThe threat actor claims to have leaked data from National Defence University (NDU). the exposed information include details of officers affiliated with or associated with the university,
Date: 2026-03-09T14:37:52Z
Network: openweb
Published URL: https://darkforums.su/Thread-Leak-Data-National-Defence-University-Pakistan
Screenshots:
None
Threat Actors: Jon1234
Victim Country: Pakistan
Victim Industry: Government Administration
Victim Organization: national defence university
Victim Site: ndu.edu.pk - Alleged data sale of Isrotel Hotel Chain
Category: Data Breach
Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including Isrotel Hotel Chain, along with data from multiple Israeli hotel websites.
Date: 2026-03-09T14:33:36Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
Screenshots:
None
Threat Actors: Ashborn
Victim Country: Israel
Victim Industry: Hospitality & Tourism
Victim Organization: isrotel hotel chain
Victim Site: isrotel.com - Alleged data sale of Arkia Israeli airlines
Category: Data Breach
Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including Arkia Israeli airlines, along with data from multiple Israeli hotel websites.
Date: 2026-03-09T14:25:21Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
Screenshots:
None
Threat Actors: Ashborn
Victim Country: Israel
Victim Industry: Airlines & Aviation
Victim Organization: arkia israeli airlines
Victim Site: arkia.co.il - Alleged data breach of Ministry of Health of Mexico
Category: Data Breach
Content: The threat actor claims to have breached the database from Ministry of Health of Mexico, reportedly containing 22,077 files. The leaked materials allegedly include official letters, emails, internal documentation, and administrative records.
Date: 2026-03-09T14:24:33Z
Network: openweb
Published URL: https://darkforums.su/Thread-Document-Mexico-Secretaria-de-Salud-Tamaulipas-22-077-files
Screenshots:
None
Threat Actors: Straightonumberone
Victim Country: Mexico
Victim Industry: Government Administration
Victim Organization: ministry of health of mexico
Victim Site: tamaulipas.gob.mx - Alleged data sale of Bezeq
Category: Data Breach
Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including Bezeq, along with data from multiple Israeli hotel websites.
Date: 2026-03-09T14:18:17Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
Screenshots:
None
Threat Actors: Ashborn
Victim Country: Israel
Victim Industry: Network & Telecommunications
Victim Organization: bezeq
Victim Site: bezeq.co.il - Alleged data sale of Israel Post
Category: Data Breach
Content: The threat actor claims to be selling a compilation of 36 databases allegedly containing 9.2 million records (3 GB) of data from Israeli sources, including IsraelPost, along with data from multiple Israeli hotel websites.
Date: 2026-03-09T14:17:24Z
Network: openweb
Published URL: https://darkforums.su/Thread-Selling-Israel-combination-of-36-DBs-9-200-000-rows-3GB
Screenshots:
None
Threat Actors: Ashborn
Victim Country: Israel
Victim Industry: Government Administration
Victim Organization: israel post
Victim Site: israelpost.co.il - Alleged data breach of Jambi Provincial Government
Category: Data Breach
Content: The group claims to have breached data from Jambi Provincial Government.
Date: 2026-03-09T14:11:07Z
Network: telegram
Published URL: https://t.me/c/3427600175/521
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: jambi provincial government
Victim Site: jambiprov.go.id - Alleged Sale of Casino Data from Brazil and China
Category: Data Breach
Content: The threat actor claims to be selling casino-related data allegedly sourced from organizations in Brazil and China.
Date: 2026-03-09T13:56:17Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277879/
Screenshots:
None
Threat Actors: faqwe789
Victim Country: China
Victim Industry: Gambling & Casinos
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Government of the Province of Bangka Belitung Islands
Category: Data Breach
Content: The group claims to have leaked data from Government of the Province of Bangka Belitung Islands.
Date: 2026-03-09T13:56:13Z
Network: telegram
Published URL: https://t.me/c/3427600175/516
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of the province of bangka belitung islands
Victim Site: babelprov.go.id - Alleged data breach of Lev Academic Center
Category: Data Breach
Content: The group claims to have breached data from Lev Academic Center.
Date: 2026-03-09T13:42:51Z
Network: telegram
Published URL: https://t.me/c/3427600175/521
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: lev academic center
Victim Site: jct.ac.il - Alleged Advertisement of NFC Payment Emulation Tool “NFCRipper”
Category: Malware
Content: The threat actor claims to be advertising an Android-based application named NFCRipper, which is designed for NFC relay, capture, replay, and contactless payment emulation. The tool supports features such as recording NFC sessions, replaying captured data, cloning cards, and emulating contactless payments at POS or ATM terminals. The application can operate using two phones or an external chip reader and includes a web panel for managing devices, monitoring logs, and controlling relay sessions. The post also mentions capabilities such as CVM bypass and session tracking, with access reportedly secured through a server-side TOTP system.
Date: 2026-03-09T13:42:36Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277888/
Screenshots:
None
Threat Actors: jinkusu01
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: nfccripper.su - Alleged data leak of jogja.go.id
Category: Data Breach
Content: The group claims to have leaked data from jogja.go.id
Date: 2026-03-09T13:41:45Z
Network: telegram
Published URL: https://t.me/c/3427600175/521
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: jogja.go.id - Alleged unauthorized access to a remote heating system in Baku
Category: Initial Access
Content: Group claims to have gained unauthorized access to an unidentified remote heating system in Baku.
Date: 2026-03-09T13:37:25Z
Network: telegram
Published URL: https://t.me/armeniancode_eng/59
Screenshots:
None
Threat Actors: Armenian code
Victim Country: Azerbaijan
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of jatim.go.id
Category: Data Breach
Content: The group claims to have leaked data from jatim.go.id
Date: 2026-03-09T13:34:40Z
Network: telegram
Published URL: https://t.me/c/3427600175/521
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: jatim.go.id - Alleged Sale of Spain PrestaShop Order Redirect Access
Category: Initial Access
Content: The threat actor claims to be selling access to a Spain-based PrestaShop redirect associated with 3,216 orders generated over a three-month period (from 2025-12-08 to 2026-03-08), allegedly processed via Redsys.
Date: 2026-03-09T13:30:46Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277886/
Screenshots:
None
Threat Actors: WOC
Victim Country: Spain
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Government of Kulon Progo Regency
Category: Data Breach
Content: The group claims to have leaked data from Government of Kulon Progo Regency.
Date: 2026-03-09T13:28:08Z
Network: telegram
Published URL: https://t.me/c/3427600175/482
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of kulon progo regency
Victim Site: kulonprogokab.go.id - Alleged Sale of Compromised Mexican E-commerce Shop Access
Category: Initial Access
Content: The threat actor claims to be selling access to a compromised Mexico-based online shop that sells Xiaomi electronics. The actor allegedly obtained database access through an SQL injection vulnerability in the ECSHOP CMS and claims to have administrative panel access with full admin permissions. The actor states that this access allows running SQL queries and uploading plugins and themes. The shop processes credit card payments via OpenPay redirect and reportedly has over 580,000 total orders, with hundreds of credit card transactions recorded in recent months
Date: 2026-03-09T13:24:05Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277883/
Screenshots:
None
Threat Actors: savel987
Victim Country: Mexico
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Government of Kutai Kartanegara Regency
Category: Data Breach
Content: The group claims to have leaked data from Government of Kutai Kartanegara Regency.
Date: 2026-03-09T13:22:53Z
Network: telegram
Published URL: https://t.me/c/3427600175/482
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of kutai kartanegara regency
Victim Site: kutaikartanegarakab.go.id - Alleged data leak of Government of Lampung Province
Category: Data Breach
Content: The group claims to have leaked data from Government of Lampung Province.
Date: 2026-03-09T13:20:58Z
Network: telegram
Published URL: https://t.me/c/3427600175/482
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: government of lampung province
Victim Site: lampungprov.go.id - Alleged Sale of 330 U.S. Credit Card Records
Category: Data Breach
Content: The threat actor claims to be selling 330 U.S.-based credit card records, allegedly with a 70% valiaddresses. The actor states that the dataset includes sensitive financial and personal information such as credit card numbers, expiration dates, CVV2 codes, full names, addresses, emails, and phone numbers
Date: 2026-03-09T13:20:11Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277882/
Screenshots:
None
Threat Actors: corptoday
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged leak of AID receipt database
Category: Data Breach
Content: The threat actor claims to have leaked an AID receipt database containing personal records, including names, national identification numbers (NIK), addresses, and related registration details.
Date: 2026-03-09T13:19:02Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Aid-Receipt-Database-Share-By-YanXploit
Screenshots:
None
Threat Actors: YanXploit
Victim Country: Indonesia
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged data leak of Lembaga Administrasi Negara
Category: Data Breach
Content: The group claims to have leaked data from Lembaga Administrasi Negara.
Date: 2026-03-09T13:05:04Z
Network: telegram
Published URL: https://t.me/c/3427600175/473
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: lembaga administrasi negara
Victim Site: lan.go.id - Alleged data breach of Tabanan Regency Government
Category: Data Breach
Content: The group claims to have breached data from Tabanan Regency Government.
Date: 2026-03-09T13:04:47Z
Network: telegram
Published URL: https://t.me/c/3427600175/433
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: tabanan regency government
Victim Site: tabanankab.go.id - Alleged data leak of LKPP
Category: Data Breach
Content: The group claims to have leaked data from LKPP.
Date: 2026-03-09T12:59:34Z
Network: telegram
Published URL: https://t.me/c/3427600175/474
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: lkpp
Victim Site: lkpp.go.id - Alleged data leak of Badung Regency Government
Category: Data Breach
Content: The group claims to have leaked data from Badung Regency Government.
Date: 2026-03-09T12:58:49Z
Network: telegram
Published URL: https://t.me/c/3427600175/515
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: badung regency government
Victim Site: badungkab.go.id - Alleged data leak of Subang Regency Government
Category: Data Breach
Content: The group claims to have leaked data from Subang Regency Government.
Date: 2026-03-09T12:53:12Z
Network: telegram
Published URL: https://t.me/c/3427600175/453
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: subang regency government
Victim Site: subang.go.id - Ministry of State Secretariat of the Republic of Indonesia
Category: Data Breach
Content: Ministry of State Secretariat of the Republic of Indonesia.
Date: 2026-03-09T12:51:58Z
Network: telegram
Published URL: https://t.me/c/3427600175/458
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: ministry of state secretariat of the republic of indonesia
Victim Site: setneg.go.id - Alleged data leak of Central Lombok Regency Government
Category: Data Breach
Content: The group claims to have leaked data from Central Lombok Regency Government.
Date: 2026-03-09T12:51:05Z
Network: telegram
Published URL: https://t.me/c/3427600175/473
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: central lombok regency government
Victim Site: lomboktengahkab.go.id - Alleged data leak of Sidrap Regency Government
Category: Data Breach
Content: The group claims to have leaked data from Sidrap Regency Government
Date: 2026-03-09T12:50:26Z
Network: telegram
Published URL: https://t.me/c/3427600175/456
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: sidrap regency government
Victim Site: sidrapkab.go.id - Alleged data breach of Tel-Hai University of Kiryat Shmona in the Galilee
Category: Data Breach
Content: The group claims to have breached data from Tel-Hai University of Kiryat Shmona in the Galilee.
Date: 2026-03-09T12:50:23Z
Network: telegram
Published URL: https://t.me/c/3427600175/433
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: tel-hai university of kiryat shmona in the galilee
Victim Site: telhai.ac.il - Alleged data leak of West Kalimantan Provincial Government
Category: Data Breach
Content: Group claims to have leaked data from West Kalimantan Provincial Government.
Date: 2026-03-09T12:49:09Z
Network: telegram
Published URL: https://t.me/c/3427600175/469
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: west kalimantan provincial government
Victim Site: kalbarprov.go.id - Alleged data leak of Provincial Government of North Kalimantan
Category: Data Breach
Content: Group claims to have leaked data from Provincial Government of North Kalimantan.
Date: 2026-03-09T12:47:44Z
Network: telegram
Published URL: https://t.me/c/3427600175/469
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: provincial government of north kalimantan
Victim Site: kaltaraprov.go.id - Alleged data leak of Sekretariat Kabinet Republik Indonesia
Category: Data Breach
Content: The group claims to have leaked data from Sekretariat Kabinet Republik Indonesia
Date: 2026-03-09T12:47:04Z
Network: telegram
Published URL: https://t.me/c/3427600175/459
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: sekretariat kabinet republik indonesia
Victim Site: setkab.go.id - Alleged data leak of Kabupaten Lombok Barat
Category: Data Breach
Content: The group claims to have leaked data from Kabupaten Lombok Barat.
Date: 2026-03-09T12:43:27Z
Network: telegram
Published URL: https://t.me/c/3427600175/475
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kabupaten lombok barat
Victim Site: lombokbaratkab.go.id - Alleged data leak of Sleman Regency Government
Category: Data Breach
Content: The group claims to have leaked data from Sleman Regency Government.
Date: 2026-03-09T12:42:11Z
Network: telegram
Published URL: https://t.me/c/3427600175/455
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: sleman regency government
Victim Site: sleman.go.id - Alleged leak of data from the official Portal of the Riau Provincial Government
Category: Data Breach
Content: The threat actor claims to have leaked data from the official Portal of the Riau Provincial Government.
Date: 2026-03-09T12:40:13Z
Network: telegram
Published URL: https://t.me/c/3427600175/483
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: official portal of the riau provincial government
Victim Site: riau.go.id - Alleged data leak of Sorong Regency Government
Category: Data Breach
Content: The group claims to have leaked data from Sorong Regency Government.
Date: 2026-03-09T12:39:39Z
Network: telegram
Published URL: https://t.me/c/3427600175/454
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: sorong regency government
Victim Site: sorongkab.go.id - Alleged data leak of Kejaksaan Agung Republik Indonesia
Category: Data Breach
Content: Group claims to have leaked data from Kejaksaan Agung Republik Indonesia.
Date: 2026-03-09T12:37:15Z
Network: telegram
Published URL: https://t.me/c/3427600175/467
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: kejaksaan agung republik indonesia
Victim Site: kejaksaan.go.id - Alleged data leak of SCE – Shamoon College of Engineering
Category: Data Breach
Content: The group claims to have leaked data from SCE – Shamoon College of Engineering.
Date: 2026-03-09T12:35:32Z
Network: telegram
Published URL: https://t.me/c/3427600175/460
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Higher Education/Acadamia
Victim Organization: sce – shamoon college of engineering
Victim Site: sce.ac.il - Alleged data leak of Ruppin Academic Center
Category: Data Breach
Content: The group claims to have leaked data from Ruppin Academic Center.
Date: 2026-03-09T12:33:52Z
Network: telegram
Published URL: https://t.me/c/3427600175/462
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Israel
Victim Industry: Education
Victim Organization: ruppin academic center
Victim Site: ruppin.ac.il - Alleged data leak of Sukabumi Regency
Category: Data Breach
Content: The group claims to have leaked data from Sukabumi Regency.
Date: 2026-03-09T12:32:56Z
Network: telegram
Published URL: https://t.me/c/3427600175/452
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: sukabumi regency
Victim Site: sukabumikab.go.id - Alleged data leak of West Sulawesi Provincial Government
Category: Data Breach
Content: The group claims to have leaked data from West Sulawesi Provincial Government.
Date: 2026-03-09T12:21:22Z
Network: telegram
Published URL: https://t.me/c/3427600175/451
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: west sulawesi provincial government
Victim Site: sulbarprov.go.id - Alleged data breach of Yantai Dehe Labor Service Co., Ltd.
Category: Data Breach
Content: The threat actor claims to have breached the databse from Yantai Dehe Labor Service Co., Ltd. the reportedly include files related to employment contracts, employee resumes, contact details, business reports, and internal administrative records.
Date: 2026-03-09T12:18:59Z
Network: openweb
Published URL: https://breachforums.as/Thread-Chinese-data-%E4%B8%AD%E5%9B%BD%E6%95%B0%E6%8D%AE-SnowSoul-ID-1263
Screenshots:
None
Threat Actors: SnowSoul
Victim Country: China
Victim Industry: Information Services
Victim Organization: yantai dehe labor service co., ltd.
Victim Site: yttrade.com - Alleged data leak of Regional Government of Sumenep Regency
Category: Data Breach
Content: The group claims to have leaked data from Regional Government of Sumenep Regency.
Date: 2026-03-09T12:13:47Z
Network: telegram
Published URL: https://t.me/c/3427600175/444
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: regional government of sumenep regency
Victim Site: sumenepkab.go.id - Alleged data leak of Southeast Sulawesi Province
Category: Data Breach
Content: The group claims to have leaked data from Southeast Sulawesi Province.
Date: 2026-03-09T12:09:22Z
Network: telegram
Published URL: https://t.me/c/3427600175/447
Screenshots:
None
Threat Actors: INDRAMAYU CHAOS SYSTEM
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: southeast sulawesi province
Victim Site: sultraprov.go.id - SYLHET GANG-SG claims to target unidentified web cameras in Israel
Category: Alert
Content: A recent post by the group indicates that they are targeting unidentified web cameras in Israel .
Date: 2026-03-09T11:42:17Z
Network: telegram
Published URL: https://t.me/SylhetGangSG1/7503
Screenshots:
None
Threat Actors: SYLHET GANG-SG
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged sale of MBoster Traffic V4
Category: Malware
Content: The threat actor claims to be selling a malware tool called MBoster Traffic V4, allegedly designed to automate international web traffic and manipulate SEO metrics, featuring Advanced HTTP Injection and a video/browser engine to simulate real user activity.
Date: 2026-03-09T11:40:45Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-RELEASE-AND-LATEST-MBOSTER-TRAFFIC-V4-AUTO-ADVANCED-INTERNATIONAL-VISIT-AND-SEO
Screenshots:
None
Threat Actors: sxxone
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - XYZ targets the website stanleyoil.ae
Category: Defacement
Content: The threat actor claims to have defaced the website stanleyoil.ae
Date: 2026-03-09T10:16:57Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808460
Screenshots:
None
Threat Actors: XYZ
Victim Country: UAE
Victim Industry: Unknown
Victim Organization: stanleyoil
Victim Site: stanleyoil.ae - L4663R666H05T targets the website of Showracks Trading LLC
Category: Defacement
Content: The group claims to have defaced the website of Showracks Trading LLC.
Date: 2026-03-09T10:12:27Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/808139
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Professional Services
Victim Organization: showracks trading llc
Victim Site: showrack.ae - Alleged data breach of Lycée Déodat de Séverac
Category: Data Breach
Content: The threat actor claims to have breached the database from Lycée Déodat de Séverac, The dataset contains 6,227 student records.
Date: 2026-03-09T10:12:16Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-Lyc%C3%A9e-D%C3%A9odat-de-S%C3%A9verac-deodat-mon-ent-occitanie-fr-6227-kids
Screenshots:
None
Threat Actors: GenesisGroup
Victim Country: France
Victim Industry: Education
Victim Organization: lycée déodat de séverac
Victim Site: deodat.mon-ent-occitanie.fr - L4663R666H05T targets the website of Satraj
Category: Defacement
Content: Group claims to have defaced the website of Satraj.
Date: 2026-03-09T10:09:02Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/807789
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: E-commerce & Online Stores
Victim Organization: satraj
Victim Site: satraj.ae - L4663R666H05T targets the website of Hard Disk Direct
Category: Defacement
Content: The group claims to have defaced the website Hard Disk Direct.
Date: 2026-03-09T10:08:03Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/807029
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Computer Hardware
Victim Organization: hard disk direct
Victim Site: harddiskdirect.ae - L4663R666H05T targets the website of Homes r Us
Category: Defacement
Content: Group claims to have deface the website of Homes r Us.
Date: 2026-03-09T10:07:43Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/806108
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: Furniture
Victim Organization: homes r us
Victim Site: mcstaging2.homesrus.ae - L4663R666H05T targets the website ITProduts.ae
Category: Defacement
Content: The group claims to have defaced the website ITProduts.ae
Date: 2026-03-09T10:07:00Z
Network: openweb
Published URL: https://zone-xsec.com/mirror/id/807478
Screenshots:
None
Threat Actors: L4663R666H05T
Victim Country: UAE
Victim Industry: E-commerce & Online Stores
Victim Organization: itproduts.ae
Victim Site: itproduts.ae - Alleged data breach of ASPTT Omnisports Federation
Category: Data Breach
Content: The threat actor claims to have breached 1,005,361 unique records from ASPTT Omnisports Federation, registration data from 2014 to 2026. The dataset reportedly includes email addresses, phone numbers, and club-related information.
Date: 2026-03-09T09:58:46Z
Network: openweb
Published URL: https://breachforums.as/Thread-SELLING-FR-F%C3%A9d%C3%A9ration-Omnisports-ASPTT
Screenshots:
None
Threat Actors: HexDex
Victim Country: France
Victim Industry: Sports
Victim Organization: asptt omnisports federation
Victim Site: asptt.com - Alleged data breach of Côte Sushi
Category: Data Breach
Content: The threat actor claims to have breached 1,101,303 records from Côte Sushi, The dataset reportedly includes personal information such as first and last names, dates of birth, email addresses, and phone numbers belonging to customers.
Date: 2026-03-09T09:56:28Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-Cote-Sushi-cotesushi-com-1-101-303-users
Screenshots:
None
Threat Actors: GenesisGroup
Victim Country: France
Victim Industry: Food & Beverages
Victim Organization: côte sushi
Victim Site: cotesushi.com - Alleged data breach of Earth Telecommunication Pvt Ltd
Category: Data Breach
Content: The group claims to have compromised systems associated with Earth Telecommunication Pvt. Ltd. and disclosed login credentials along with references to a large database allegedly exceeding 300 GB. The compromised data reportedly contains device and tracking-related information such as IMEI numbers, tracker IDs, device types, location data, and decoded messaging records.
Date: 2026-03-09T09:45:44Z
Network: telegram
Published URL: https://t.me/Solo_apt_by_kafir/2
Screenshots:
None
Threat Actors: SOLO APT by Kafir
Victim Country: Bangladesh
Victim Industry: Network & Telecommunications
Victim Organization: earth telecommunication pvt ltd
Victim Site: earth.net.bd - Alleged unauthorized access to unidentified industrial pumping control system
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to an industrial control system (ICS) associated with pumping equipment.
Date: 2026-03-09T09:21:29Z
Network: telegram
Published URL: https://t.me/ShadowClawZ404/49
Screenshots:
None
Threat Actors: Shadow ClawZ 404
Victim Country: Unknown
Victim Industry: Industrial Automation
Victim Organization: Unknown
Victim Site: Unknown - Hax.or targets the website of dailyplanner.w3inventor.pw
Category: Defacement
Content: The group claims to have defaced the website of dailyplanner.w3inventor.pw.
Date: 2026-03-09T08:20:38Z
Network: telegram
Published URL: https://t.me/ctifeeds/129064
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: dailyplanner.w3inventor.pw - Alleged data breach of Calai
Category: Data Breach
Content: The threat actor claims to have breached the database of Calai, The compressed 1.49GB file reportedly contains sensitive information for 3 million users. The allegedly dataset Includes emails, DOBs, names, height, weight, gender, subscription details, meal tracking, exercise goals, referrals, and transaction IDs.
Date: 2026-03-09T08:01:24Z
Network: openweb
Published URL: https://breachforums.as/Thread-calai-app-Vibecoded-Slop-Calorie-Tracking-App-3M-Subscribers-FRESH-RELEASE
Screenshots:
None
Threat Actors: vibecodelegend
Victim Country: USA
Victim Industry: Health & Fitness
Victim Organization: calai
Victim Site: calai.app - Hax.or targets the websites of GEO-SUD
Category: Defacement
Content: The group claims to have defaced the websites of GEO-SUD.
Date: 2026-03-09T08:00:36Z
Network: telegram
Published URL: https://t.me/ctifeeds/129066
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Morocco
Victim Industry: Civil Engineering
Victim Organization: geo-sud
Victim Site: geosud.ma - Hax.or targets the website of heavy.stagingweb.net
Category: Defacement
Content: The group claims to have defaced the website of heavy.stagingweb.net
Date: 2026-03-09T07:48:47Z
Network: telegram
Published URL: https://t.me/ctifeeds/129063
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: heavy.stagingweb.net - Hax.or targets the website of Tapteng Regency
Category: Defacement
Content: The group claims to have defaced the website of Tapteng Regency.
Date: 2026-03-09T07:44:47Z
Network: telegram
Published URL: https://t.me/ctifeeds/129062
Screenshots:
None
Threat Actors: Hax.or
Victim Country: Indonesia
Victim Industry: Government Administration
Victim Organization: tapteng regency
Victim Site: terangdinaskb.tapteng.go.id - Alleged unauthorized access to security cameras in Jerusalem
Category: Initial Access
Content: Group claims to have gained unauthorized access to security cameras in the city of Jerusalem, Israel.
Date: 2026-03-09T07:37:19Z
Network: openweb
Published URL: https://x.com/HPRSEC/status/2030903146248019975
Screenshots:
None
Threat Actors: Handala Hack
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to unidentified music system in Israel
Category: Initial Access
Content: The threat actor claims to have gained unauthorized access to an unidentified music system in Israel, alleging control over parts of the platform’s infrastructure and the ability to monitor internal operations.
Date: 2026-03-09T07:32:03Z
Network: telegram
Published URL: https://t.me/teambcs404/347
Screenshots:
None
Threat Actors: Team Bangladesh cyber squad
Victim Country: Israel
Victim Industry: Music
Victim Organization: Unknown
Victim Site: Unknown - Alleged login access to A.J. Plast Public Company Limited
Category: Initial Access
Content: The group claims to have gained login access to A.J. Plast Public Company Limited
Date: 2026-03-09T06:22:50Z
Network: telegram
Published URL: https://t.me/blueshadow67/221
Screenshots:
None
Threat Actors: Blue Shadow
Victim Country: Thailand
Victim Industry: Plastics
Victim Organization: a.j. plast public company limited
Victim Site: ajplast.co.th - Alleged Data Breach of Be Yeu
Category: Data Breach
Content: Threat actor claims to have leaked data associated with beyeu.com.Beyeu.com was a Vietnam-based e-commerce platform focused on baby and family products and later transitioned into the Bé Yêu pregnancy and baby care application.
Date: 2026-03-09T05:44:01Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277861/?tab=comments#comment-1660753
Screenshots:
None
Threat Actors: HighRisk
Victim Country: Vietnam
Victim Industry: E-commerce & Online Stores
Victim Organization: be yeu
Victim Site: beyeu.com - Alleged Sale of Besox Bank Customer Information
Category: Data Breach
Content: The threat actor claims to be selling the database of Besox Bank, the dataset contains bank customer informations. The dataset with a stated price of $5,000, described as negotiable.
Date: 2026-03-09T05:31:55Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Besox-Bank-Customer-Info
Screenshots:
None
Threat Actors: Yrmnxcro
Victim Country: Switzerland
Victim Industry: Banking & Mortgage
Victim Organization: besox bank
Victim Site: besox.be - Alleged sale of unauthorized Multiple accesses to unidentified Presta shop in Portugal
Category: Initial Access
Content: Threat actor claims to be selling administrator access, including webshell access, to a Portugal-based PrestaShop e-commerce store. The listing reports approximately 141,218 total orders, with recent transactions reportedly processed via card payments through a redirect to Vivapayments. The access is offered via auction starting at USD 400 with a buy-now price of USD 1,000.
Date: 2026-03-09T05:25:37Z
Network: openweb
Published URL: https://forum.exploit.in/topic/277863/
Screenshots:
None
Threat Actors: Matteo
Victim Country: Portugal
Victim Industry: E-commerce & Online Stores
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Free Mobile Panel Access
Category: Data Breach
Content: The threat actor claims to have breached the database of Free Mobile; the dataset contains login credentials providing access to internal Free Mobile panels.
Date: 2026-03-09T05:15:09Z
Network: openweb
Published URL: https://breachforums.as/Thread-FREE-MOBILE-PANEL-LOGIN-FRANCE
Screenshots:
None
Threat Actors: M4nifest
Victim Country: France
Victim Industry: Network & Telecommunications
Victim Organization: free mobile
Victim Site: mobile.free.fr - Alleged data breach of Auchan
Category: Data Breach
Content: The threat actor claims to be leaked data from Auchan. The compromised data reportedly contain 1,087,650 records including Customer ID, Customer Name, First name, Last name, Phone number, Email, Card Number, Address, Zip code information.
Date: 2026-03-09T04:51:54Z
Network: openweb
Published URL: https://breachforums.as/Thread-VERIFIED-FR-AUCHAN-FR-BREACH
Screenshots:
None
Threat Actors: keta
Victim Country: France
Victim Industry: E-commerce & Online Stores
Victim Organization: auchan
Victim Site: auchan.fr - Alleged Data Breach of Yummy Rides
Category: Data Breach
Content: The threat actor claims to have breached the database of Yummy Rides, the dataset includes photos of drivers alongside their full names, suggesting the data may originate from driver profiles or internal platform records.
Date: 2026-03-09T04:17:29Z
Network: openweb
Published URL: https://darkforums.su/Thread-DATABASE-FREE-DB-YUMMY-RIDES-Venezuela-30k-Images-With-Full-Names-Of-The-Drivers
Screenshots:
None
Threat Actors: GordonFreeman
Victim Country: Venezuela
Victim Industry: Transportation & Logistics
Victim Organization: yummy rides
Victim Site: yummyrides.com - Alleged Unauthorized Access to a Bar Video Surveillance System in the USA
Category: Initial Access
Content: The group claims to have gained remote access to the video surveillance system of a bar located in Palmerton, Pennsylvania, USA.
Date: 2026-03-09T03:54:46Z
Network: telegram
Published URL: https://t.me/c/3792806777/12
Screenshots:
None
Threat Actors: Z-PENTEST ALLIANCE
Victim Country: USA
Victim Industry: Food & Beverages
Victim Organization: Unknown
Victim Site: Unknown - Alleged Leak of UK Consumer Leads Dataset
Category: Data Breach
Content: The threat actor claims to have leaked UK Consumer Leads Dataset, the dataset contains personal contact information such as names, email addresses, phone numbers, dates of birth, and full residential addresses within the United Kingdom.
Date: 2026-03-09T03:53:39Z
Network: openweb
Published URL: https://breachforums.as/Thread-DOCUMENTS-UK-FULL-INFO-CONSUMER-LEADS-1M
Screenshots:
None
Threat Actors: smokethislist
Victim Country: UK
Victim Industry: Consumer Services
Victim Organization: Unknown
Victim Site: Unknown - Alleged unauthorized access to National Center of Informatics
Category: Initial Access
Content: The group claims to have allegedly gained unauthorized access to National Center of Informatics.
Date: 2026-03-09T02:48:07Z
Network: telegram
Published URL: https://t.me/TheBlackMaskers/268
Screenshots:
None
Threat Actors: BlackMaskers Army
Victim Country: Tunisia
Victim Industry: Government & Public Sector
Victim Organization: national center of informatics
Victim Site: cni.tn - THE GHOSTS IN THE MACHINE claims to target Israel Defense Forces
Category: Alert
Content: A recent post by the group indicates that they are targeting Israel Defense Forces
Date: 2026-03-09T02:27:26Z
Network: telegram
Published URL: https://t.me/TheGhostITM/339
Screenshots:
None
Threat Actors: THE GHOSTS IN THE MACHINE
Victim Country: Israel
Victim Industry: Defense & Space
Victim Organization: israel defense forces
Victim Site: Unknown - Cyber Islamic Resistance targets the website of University of Business and Technology
Category: Defacement
Content: The group claims to have defaced the website of University of Business and Technology.
Date: 2026-03-09T02:09:57Z
Network: telegram
Published URL: https://t.me/c/1651470668/1696
Screenshots:
None
Threat Actors: Cyber Islamic resistance
Victim Country: Saudi Arabia
Victim Industry: Higher Education/Acadamia
Victim Organization: university of business and technology
Victim Site: staging.ubt.edu.sa - Alleged unauthorized access to yayasan-wahdini.or.id
Category: Initial Access
Content: The group claims to have gained unauthorized access to yayasan-wahdini.or.id
Date: 2026-03-09T02:07:18Z
Network: telegram
Published URL: https://t.me/c/2622575053/1591
Screenshots:
None
Threat Actors: NOTRASEC TEAM
Victim Country: Unknown
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: yayasan-wahdini.or.id - Alleged Data Breach of Agencia Tributaria
Category: Data Breach
Content: The threat actor claims to have breached the database of Agencia Tributaria , the dataset contains personal information of employees.
Date: 2026-03-09T01:49:24Z
Network: openweb
Published URL: https://breachforums.as/Thread-SPAIN-AGENCIA-TRIBUTARIA-AEAT
Screenshots:
None
Threat Actors: PoliceEspDoxedBF
Victim Country: Spain
Victim Industry: Government Administration
Victim Organization: agencia estatal de administración tributaria (aeat)
Victim Site: agenciatributaria.es - Alleged leak of Israel database
Category: Data Breach
Content: The group claims to have leaked passports and birth certificates of 120 Israeli citizens.
Date: 2026-03-09T01:37:01Z
Network: telegram
Published URL: https://t.me/Akatsukiyberteam/705
Screenshots:
None
Threat Actors: Akatsuki cyber team (official)
Victim Country: Israel
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown - Alleged Data Breach of Weizmann Institute of Science
Category: Data Breach
Content: The threat actor claims to have breached the database of Weizmann Institute of Science. The dataset contains information related to students, researchers, and academic staff.
Date: 2026-03-09T01:36:53Z
Network: telegram
Published URL: https://t.me/MR_X10_SY/100—
Screenshots:
None
Threat Actors: MRX10-SY
Victim Country: Israel
Victim Industry: Education
Victim Organization: weizmann institute of science
Victim Site: weizmann.ac.il - 313 Team targets the official website of Specialized Medical Care Center
Category: Defacement
Content: Group claims to have defaced the official website of Specialized Medical Care Center.
Date: 2026-03-09T01:21:22Z
Network: telegram
Published URL: https://t.me/xX313XxTeam/687
Screenshots:
None
Threat Actors: 313 Team
Victim Country: Saudi Arabia
Victim Industry: Hospital & Health Care
Victim Organization: specialized medical care center
Victim Site: smcc.sa - Alleged Sale of Infutor Database
Category: Data Breach
Content: Threat actor claims to be selling the database of Infutor. The dataset contains 676,798,866 records of American citizens, including information such as full names, dates of birth, addresses, phone numbers, and Social Security Numbers.
Date: 2026-03-09T00:30:52Z
Network: openweb
Published URL: https://breachforums.as/Thread-DATABASE-Infutor-com-676M
Screenshots:
None
Threat Actors: Spirigatito
Victim Country: USA
Victim Industry: Consumer Services
Victim Organization: infutor
Victim Site: infutor.com - Alleged Data Breach of Pompiers 13
Category: Data Breach
Content: The threat actor claims to have breached the database of Pompiers 13, the dataset contains 6,841 records.
Date: 2026-03-09T00:16:29Z
Network: openweb
Published URL: https://breachforums.as/Thread-FR-Pompier-du-13-SDIS13
Screenshots:
None
Threat Actors: GenesisGroup
Victim Country: France
Victim Industry: Government Relations
Victim Organization: pompiers 13
Victim Site: pompiers13.fr - Alleged Sale of Stripe Accounts in USA
Category: Initial Access
Content: Threat actor claims to be selling five ID-verified Stripe accounts registered in the United States. The seller states each account includes a USD 10 clean charge and is ready for card processing. The listing is offered via auction starting at USD 1,600 with a buy-now price of USD 2,200.
Date: 2026-03-09T00:03:53Z
Network: openweb
Published URL: https://forum.exploit.biz/topic/277848/
Screenshots:
None
Threat Actors: Cuatro
Victim Country: USA
Victim Industry: Unknown
Victim Organization: Unknown
Victim Site: Unknown