[May-12-2026] Daily Cybersecurity Threat Report

1. Executive Summary

This report provides an in-depth analysis of a vast array of cyber incidents primarily recorded between May 11 and May 12, 2026. The threat landscape detailed in the dataset is highly active, reflecting an escalating trend in credential harvesting, data leaks, hacktivist defacements, and the commoditization of cybercrime services.

The documented incidents fall broadly into several categories: the widespread distribution of “Combo Lists” intended for credential stuffing, initial access brokering, massive data breaches affecting millions of global citizens, hacktivist-driven website defacements, and the sale of sophisticated malware and fraud services. Threat actors operate with impunity across both the open web and dark web forums, utilizing platforms like Telegram for secondary negotiations and data transactions.

2. Threat Landscape Overview

The digital underground remains a robust economy where data is freely shared to build threat actor reputations or sold for direct financial gain. The sheer volume of compromised credentials—totaling hundreds of millions of rows across various dumps—highlights a severe risk to organizational perimeters and consumer accounts alike. The targeted industries are diverse, encompassing healthcare, education, retail, telecommunications, government, and finance, with a global victimology that spares no specific region.

3. Primary Attack Vectors & Categories

3.1. Combo Lists and Credential Stuffing

The most frequently observed incident type is the distribution of Combo Lists. These lists contain combinations of emails/usernames and passwords, often labeled as “URL:Login:Password” (ULP), which are heavily utilized in credential stuffing attacks.

  • Scale and Volume: Threat actors like DevelMakss distributed immense combo lists, including a massive 66 million ULP credential pair list, and another list containing 64,000 mixed email credentials intended for mail access. Actor mr_daadaa released an even larger list containing approximately 70 million credentials.
  • Targeted Services: Threat actors often segment these lists to target specific high-value platforms. For example, actor Ra-Zi sold 120,000 credentials explicitly targeting streaming and gaming platforms like Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. Adult entertainment platforms (XNXX, Pornhub) were also targeted by actor MetaCloud3 with 612,000 credentials.
  • Corporate vs. Personal: While many lists target personal accounts (like Hotmail, Yahoo, and Gmail), a significant portion targets corporate domains. AiCombo shared a list of 92,199 combinations specifically targeting business corporate domains.

3.2. Data Breaches and Data Leaks

Data breaches observed in this period affected millions of individuals, heavily leaning towards the exposure of Personally Identifiable Information (PII) and sensitive financial data.

  • Government & Healthcare: A massive breach alleged by XSVSHACKER involved an Indonesian COVID-19 antigen testing database containing approximately 20 million records, exposing Patient IDs, full names, national identification numbers, and test results.
  • Finance & Corporate: The Stormous Group (XOverStm) allegedly leaked 20GB of data from Arc Reinsurance Brokers, containing KYC documents, employee files, and financial records, purportedly after failed extortion negotiations. Additionally, an alleged leak from the UK contained payroll records with sensitive attributes such as ethnicity, religion, and sexual orientation.
  • Population Databases: Threat actor MisterD offered massive population databases for sale, including 20 million records from Japan and 9 million records from South Korea, containing national IDs, phone numbers, and residential addresses. Furthermore, an alleged 31 million records from RENIEC (Peru’s national civil registry) were leaked by ritok33000.

3.3. Website Defacements

Website defacements serve as a form of digital graffiti, often politically or ideologically motivated, or used to build hacker “clout.”

  • Mass Defacements in Indonesia: Actor lxrdk1773n executed a highly coordinated mass defacement campaign targeting multiple subdomains of MTsN 1 Ternate, an Indonesian state Islamic junior high school. The actor exploited a Linux-based server using a PHP shell (lol.php) to compromise attendance, e-learning, and archive portals.
  • Umbra Community Operations: A threat actor utilizing the alias Nicotine, affiliated with the Umbra Community, conducted widespread targeted defacements primarily against North American financial, real estate, and retail sites. Victims included Optimal Refinance, Quick Qualify Mortgages, Pick Realtors, and African Food Market.
  • Hidden Cyber Crime: The actor Inside Alone7 (part of Hidden Cyber Crime) compromised international sites, including targets in Tunisia (Magasins Fekih), Rwanda (cepurhuye.rw), Belgium (scribal.be), and France (PPS Security) by altering internal text files like 1000.txt.

3.4. Initial Access, Malware, and Logs Brokering

A thriving ecosystem exists for selling initial access, raw stealer logs, and sophisticated malware frameworks.

  • Stealer Logs: Threat actors routinely distribute gigabytes of raw info-stealer logs (from malware like RedLine), which contain session cookies, browser passwords, and cryptocurrency wallet data. Actor DevelMakss freely distributed 1.8GB of such logs.
  • Malware & Exploits: Actor GENERAL DARK advertised “AIRDC,” an AI-powered hidden remote desktop control application with kernel-level evasion and encrypted P2P tunneling via WireGuard/Tailscale. Additionally, Leakbase offered a cross-platform Remote Control System (RCS) exploit chain with zero-day kernel modules.
  • Initial Access: Threat actor Toton sold enterprise admin-level VPN access to a Japanese retail organization via Palo Alto GlobalProtect for a mere $25, while also brokering access to organizations in Turkey, Portugal, Brazil, Australia, and the UK.

4. Key Threat Actors Profile

Several threat actors and groups stand out due to their high volume of activity or the critical nature of their exploits:

  • MetaCloud3: Highly prolific in distributing themed combo lists, targeting everything from business emails (765K records) to streaming services (872K records), cryptocurrency platforms (503K records), and adult websites (612K records).
  • Nicotine (Umbra Community): Responsible for a sprawling defacement campaign targeting American mortgage, loan, and real estate agencies.
  • lxrdk1773n: Focused heavily on mass defacements of Indonesian educational infrastructure.
  • Leakbase: Operating at the higher end of the cybercrime spectrum, selling high-value zero-day exploits and premium databases, including alleged financial sector records from Hong Kong and an alleged Robinhood Crypto dump.
  • Fragtez & ZoneX404: Extremely active in distributing multi-million record ULP combo lists for free on forums to build reputation and drive traffic to private Telegram sales channels.

5. Victimology Analysis

5.1. By Industry

  • Finance & Cryptocurrency: Heavily targeted for direct monetization. Incidents include the sale of Softbank banking system source code targeting LATAM , an alleged OKX crypto exchange leak, and numerous mortgage company defacements.
  • Education: Indonesian Islamic schools were relentlessly defaced, while combo lists explicitly targeting .edu domains were distributed by actor CELESTIALHQ. Mansoura University in Egypt also allegedly suffered a 10GB breach of student records.
  • Healthcare: Medical data is highly sought after. Besides the 20 million Indonesian COVID records, Alameda_slim leaked data from 30 Mexican laboratories affiliated with Interlab.
  • Government & Defense: A highly alarming (though unverified) claim by mosad involved the sale of a classified DARPA AI/Autonomy Systems threat analysis report. Administrative access to Angolan government panels was sold for as low as $20.

5.2. By Country

  • Indonesia: A major hotspot for both massive data breaches (2.794 million PII records , 20 million COVID tests ) and localized hacktivist defacements.
  • United States: The primary target for financial defacements, PayPal credential requests, and leaks of platforms like City of Chicago Office data.
  • Europe (France, Germany, UK): Frequent targets for dedicated combo lists. E.g., HqComboSpace released 700,160 lines targeting German (.de) accounts , and French platforms like lasuite.numerique.gouv.fr were targeted for data exfiltration.

6. Detailed Incident Breakdown

6.1. High-Impact Data Breaches and Leaks

  • Indonesian COVID-19 Antigen Database: 20 million records exposed containing highly sensitive health and identity data, highlighting poor security controls in national health registries.
  • Hong Kong Financial Sector: 312,745 records of financial analysts and High-Net-Worth Individuals (HNWI) compiled from compromised CRM systems (HSBC, Morgan Stanley, Citi), demonstrating targeted espionage against the financial sector.
  • Robinhood & OKX Crypto Exchanges: Leaks of 6 million and 1 million records respectively, containing KYC documents (passports, selfies), credit cards, and portfolio data, representing a critical identity theft risk.
  • RENIEC (Peru): 31 million citizen records exposed, effectively compromising the digital identity of nearly the entire Peruvian population.

6.2. Website Defacement Campaigns

Defacements, while technically unsophisticated (often relying on simple PHP shell uploads or SQL injections), cause severe reputational damage.

  • Umbra Community’s Mortgage Targeting: Actor Nicotine systematically defaced US financial entities including Optimal Refinance, Quick Qualify Mortgages, VA Loans Pro, Strong Refinance Rates, Refisaver, Supra Mortgages, Stability Mortgages, and PreApprovalHub. This indicates a highly specific search dorking or vulnerability scanning campaign focused on the US real estate and loan sector.
  • Hidden Cyber Crime: Actor Inside Alone7 targeted diverse global domains like cepurhuye.rw (Rwanda), scribal.be (Belgium), and pps-security.fr (France), modifying the 1000.txt index files, indicating automated mass-exploitation tools.

6.3. The Industrialization of Credential Stuffing

The dataset reveals that credential stuffing is a highly organized, industrialized sector of cybercrime.

  • Combo List Segmentation: Threat actors no longer just dump random credentials. They parse and sort them using automated checkers (like OpenBullet) to create “premium” lists. We observed lists specifically parsed for Zalando , Riot Games , FuboTV , streaming services (Disney+, Hulu, HBO) , and payment processors (PayPal, Stripe, Revolut).
  • Volume Operations: Actors like ZoneX404 routinely drop lists ranging from 12 million to 39.9 million lines, effectively flooding the market with raw data to entice buyers into purchasing “unwrapped” (untested/fresh) premium lists via Telegram.

6.4. Fraud Services and Exploits

  • Forged Legal Documents: Actor convince sold forged court orders, MLAT requests, and subpoenas designed to bypass corporate Emergency Disclosure Requests (EDRs). This is paired with spoofed .gov emails and API buffer overflow exploits to force domain takedowns.
  • KYC Bypass & Verification Services: Fraudsters like PoolSearcher and Rasselkyc offer to bypass Know Your Customer (KYC) checks for $20-$1250 per account, enabling money laundering through cryptocurrency platforms.
  • Vishing Bots: The “BLACKP1” bot was sold to automate voice phishing (vishing), featuring Text-to-Speech script generation, SIP routing, and OTP (One-Time Password) interception to defeat Two-Factor Authentication (2FA).

7. Conclusion and Mitigation Recommendations

The cyber incidents documented in May 2026 present a highly commoditized and efficient cybercrime ecosystem. Threat actors are seamlessly bridging the gap between initial access, data exfiltration, and downstream fraud monetization. The sheer volume of Combo Lists being shared directly facilitates Account Takeover (ATO) attacks on a global scale.

Strategic Recommendations:

  1. Mandatory Multi-Factor Authentication (MFA): Given the hundreds of millions of credentials circulating freely, organizations must enforce phishing-resistant MFA (such as FIDO2 security keys) to neutralize the threat of credential stuffing and ULP log exploitation.
  2. Identity and KYC Verification Integrity: Financial institutions and cryptocurrency exchanges must enhance their KYC verification processes to detect deepfakes, forged documents, and accounts created by professional KYC-bypass services.
  3. Proactive Dark Web Monitoring: Organizations must actively monitor cybercrime forums and Telegram channels for mentions of their domains, executive emails, and exposed employee credentials within stealer logs.
  4. Vulnerability Management & Web Security: The mass defacements observed against educational and financial institutions highlight the need for rigorous patching, the deprecation of legacy PHP frameworks, and the implementation of Web Application Firewalls (WAF) to prevent basic shell uploads.
  5. Zero Trust Architecture: With initial access brokers selling enterprise VPN credentials for nominal fees, organizations must implement Zero Trust network models, ensuring that compromised perimeter credentials do not result in lateral movement and catastrophic data breaches.

Detected Incidents Draft Data

  1. Combo list of 64K mixed email credentials shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 64,000 mixed email:password lines on a cracking forum. The credentials are marketed for mail access. No specific breached organization is identified.
    Date: 2026-05-11T23:43:39Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-64k-Mix-lines-Mail-Access
    Screenshots:
    None
    Threat Actors: WhiteMelly
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  2. Sale of 120,000 fresh email:password combo list targeting multiple streaming and gaming services
    Category: Combo List
    Content: A threat actor is distributing and selling a combo list of 120,000 email:password credentials marketed as fresh and high quality. The list is advertised as suitable for credential stuffing against services including Netflix, Minecraft, Uplay, Steam, Hulu, and Spotify. The actor also offers additional combo lists segmented by email provider and country via Telegram.
    Date: 2026-05-11T23:42:18Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-120k-Fresh-HQ-Combolist-Email-Pass-Netflix-Minecraft-Uplay-Steam-Hulu-spotify–203718
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  3. Alleged data breach of Indonesian COVID-19 antigen testing database
    Category: Data Breach
    Content: A threat actor known as XSVSHACKER is sharing what appears to be a large Indonesian COVID-19 antigen testing database containing approximately 20 million records. The exposed data includes Patient IDs, full names, national identification numbers (NICs), dates of birth, phone numbers, addresses, health facility names, and test results. The data appears to originate from multiple health facilities across Indonesia.
    Date: 2026-05-11T23:21:46Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-INDONESIAN-DATABASE-ANTIGEN-20M
    Screenshots:
    None
    Threat Actors: XSVSHACKER
    Victim Country: Indonesia
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: Unknown
  4. Alleged combo list targeting business corporate domains
    Category: Combo List
    Content: A combo list containing approximately 92,199 email and password combinations targeting business corporate domains was shared on a cracking forum. No additional details are available from the post content.
    Date: 2026-05-11T23:15:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-92-199-Bussines-Corp-DOmain
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  5. Combo List of Hotmail credentials with claimed valid access
    Category: Combo List
    Content: A forum user is distributing a combo list of 684 claimed valid Hotmail credentials. The content is gated behind registration or login on the forum. No breach of Hotmail is implied; these credentials are likely aggregated from prior breaches and tested against Hotmail.
    Date: 2026-05-11T23:14:37Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%A7%A9684-hotmail-valid-access-11-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  6. Sale of Hotmail credential combo list by threat actor NovaCloud0x
    Category: Combo List
    Content: A threat actor operating under the alias NovaCloud0x is distributing a combo list of 775 Hotmail credentials, marketed as fresh and private. The content is hosted externally and requires forum registration to access.
    Date: 2026-05-11T23:14:19Z
    Network: openweb
    Published URL: https://patched.to/Thread-775x-fresh-hotmail-prvt-by-nova
    Screenshots:
    None
    Threat Actors: NovaCloud0x
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  7. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list of 1,616 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits suitable for account access or credential stuffing.
    Date: 2026-05-11T23:14:13Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1616x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292752
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  8. Alleged sale of full access credentials and cookies database with inbox searching
    Category: Logs
    Content: Threat actor offering full access to mailpass and cookies database sourced from private cloud infrastructure. Claims to have valid webmail credentials and cookies for multiple countries (UK, DE, JP, NL, BR, PL, ES, US, IT) with inbox searching capability filtered by keywords. Targets include eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Mercari, Neosurf, Amazon, and Kleinanzeigen.
    Date: 2026-05-11T23:14:04Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79898
    Screenshots:
    None
    Threat Actors: Squad Chat Marketplace
    Victim Country: Multiple (United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy)
    Victim Industry: Multiple (e-commerce, payment, travel, social)
    Victim Organization: Unknown
    Victim Site: Unknown
  9. Alleged sale of stolen credit card data and compromised email accounts (UK, DE, JP, NL, BR, PL, ES, US, IT)
    Category: Combo List
    Content: Threat actor Num is advertising the sale of fresh stolen databases containing credit card data and compromised email accounts from multiple countries including UK, Germany, Japan, Netherlands, Brazil, Poland, Spain, US, and Italy. The seller claims to have access to accounts on platforms including eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and Neosurf. The seller also claims to operate a private cloud with valid webmail credentials and offers to verify card validity before purchase.
    Date: 2026-05-11T23:13:09Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79887
    Screenshots:
    None
    Threat Actors: Num
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy
    Victim Industry: Multiple (e-commerce, payment, email, booking platforms)
    Victim Organization: Unknown
    Victim Site: Unknown
  10. Alleged sale of mail access and credential lists
    Category: Combo List
    Content: Threat actor offering mail access credentials and combo lists (credential lists) across multiple countries including FR, BE, AU, CA, UK, US, NL, PL, DE, and JP. Also offering configs, scripts, tools, and hits. Contact via @DataxLogs.
    Date: 2026-05-11T23:11:29Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79874
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  11. Sale of clone cards, bank logs, CVVs, and fraudulent payment transfers
    Category: Carding
    Content: A threat actor is advertising clone cards, bank logs, CVVs/CCs with balances of $2,500–$10,000, and fraudulent transfers via PayPal, Cash App, Zelle, and Apple Pay at fixed price tiers. The seller directs buyers to contact via Telegram and accepts payment in BTC or USDT.
    Date: 2026-05-11T23:06:54Z
    Network: openweb
    Published URL: https://altenens.is/threads/free-buttonnever-lose-hope-since-what-i-got-here-stillhundred-points-legit-safe-just-tapn-24-7-wit-your-budget-youll-receive-your-deposit-within-3-5-minutes-on-teleg.2938082/unread
    Screenshots:
    None
    Threat Actors: Dhope
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  12. Combo List targeting European and German shopping services
    Category: Combo List
    Content: A combo list containing 489,444 email:password lines is being shared, marketed as targeting European and German shopping services. No additional details are available from the post content.
    Date: 2026-05-11T22:44:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-489-444-Lines-%E2%9C%85-Europa-Germany-Shopping-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  13. Distribution of 1.8GB stealer logs
    Category: Logs
    Content: A threat actor is freely distributing 1.8GB of stealer logs on a cybercrime forum. The post contains full logs likely including credentials, cookies, and session data harvested via info-stealer malware. No specific victim organization or country is identified.
    Date: 2026-05-11T22:44:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-1-8GB-%E2%AD%90%EF%B8%8F-STEALER-LOGS-FULL-LOGS-%E2%AD%90%EF%B8%8F–2092577
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  14. Sale of US email and password combo list with PII
    Category: Combo List
    Content: A threat actor is selling a combo list of approximately 480,000 lines targeting US-based email addresses, with 203,554 records containing valid credentials in plain text. The dataset reportedly includes full names, email addresses, IP addresses, physical addresses, and phone numbers. The seller is offering the list for $200 USD in Bitcoin via Telegram.
    Date: 2026-05-11T22:44:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Combo-Email-Pass-USA-2026
    Screenshots:
    None
    Threat Actors: ermukobar
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  15. Free distribution of 66 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 66 million URL:login:password credential pairs, marketed as high quality. The post appears to be a bump of a previous release thread on a cracking forum.
    Date: 2026-05-11T22:44:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-66M-%E2%9A%A1-URL-LOGIN-PASS-HQ-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  16. Combo List of 70K Hotmail Mix Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 70,000 Hotmail mixed credentials marketed as valid mail access. The post is shared on a public cracking forum and appears to be a free release.
    Date: 2026-05-11T22:44:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-70K-%E2%9C%A8-HOTMAIL-MIX-VALID-MAIL-ACCESS-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  17. Combo List: Hotmail credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 1,974 claimed valid Hotmail credentials on a cybercrime forum. The content is gated behind registration or login. Credentials are marketed as valid access dated May 10, 2026.
    Date: 2026-05-11T22:43:41Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%8A1974-hotmail-valid-access-10-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  18. Combo list targeting Indonesian accounts
    Category: Combo List
    Content: A combo list containing over 273,000 credential pairs purportedly associated with Indonesian accounts was shared freely via an external paste link. The post was made on April 27, 2026, and attributed to the handle Elite_Cloud1.
    Date: 2026-05-11T22:42:57Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-273-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Indonesia-%E2%9C%AA-27-APR-2026-%E2%9C%AA–2292723
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  19. Distribution of mixed email combo list
    Category: Combo List
    Content: A threat actor shared a mixed mail lines combo list via an external paste link on a cracking forum. The post provides no additional context regarding origin, volume, or targeted services.
    Date: 2026-05-11T22:42:48Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X850-Mixed-Mail-Lines–2292743
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  20. Sale of UHQ mixed combo list with 2 million credentials
    Category: Combo List
    Content: A threat actor is offering a mixed UHQ combo list containing approximately 2 million credentials via a cracking forum and Telegram channels. The post advertises both free and paid combo lists, directing interested parties to contact the seller on Telegram.
    Date: 2026-05-11T22:39:07Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74982/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  21. Combo list of 70 million credentials across mixed categories
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 70 million URL:login:password (ULP) credentials spanning mixed categories. The list is made available via an external file-sharing link.
    Date: 2026-05-11T22:38:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74983/
    Screenshots:
    None
    Threat Actors: mr_daadaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  22. Sale of German email combo list targeting GMX, T-Online, and Web.de
    Category: Combo List
    Content: A threat actor is offering German-targeted combo lists via Telegram, advertising credentials associated with GMX, T-Online, and Web.de email services. The post directs interested parties to a Telegram contact and two channels for free combo lists and tools.
    Date: 2026-05-11T22:38:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74984/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  23. Google Sheets automation and dashboard setup service offered on forum
    Category: Services
    Content: A forum member is advertising a commercial Google Sheets setup service, offering spreadsheet automation, dashboards, data analysis, and business workflow configuration. Pricing is variable based on client requirements. No threat activity is associated with this post.
    Date: 2026-05-11T22:35:38Z
    Network: openweb
    Published URL: https://hackforums.net/showthread.php?tid=6325265
    Screenshots:
    None
    Threat Actors: TheOlympus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  24. Alleged data leak of United Kingdom payroll records
    Category: Data Leak
    Content: A threat actor is distributing a dataset of 1,563 UK payroll records dated 2024. The data includes full names, national insurance numbers, birth dates, home addresses, bank account details (sort code, account number, bank name), and sensitive personal attributes such as ethnicity, religion, and sexual orientation. The source organization has not been identified.
    Date: 2026-05-11T22:16:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-1-5k-United-Kingdom-payroll-data
    Screenshots:
    None
    Threat Actors: Trezor
    Victim Country: United Kingdom
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  25. Alleged data breach of Lopesan Hotel
    Category: Data Leak
    Content: A threat actor has leaked a dataset allegedly belonging to Lopesan Hotel in Spain, containing 27,629 guest records. The data includes guest names, email addresses, country codes, arrival and departure dates, room numbers, and other stay-related fields. The content is distributed via a hidden reply-gated post on a dark web forum.
    Date: 2026-05-11T22:15:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-27k-Lopesan-Hotel-Spain
    Screenshots:
    None
    Threat Actors: Trezor
    Victim Country: Spain
    Victim Industry: Hospitality
    Victim Organization: Lopesan Hotel
    Victim Site: lopesan.com
  26. Combo list mix distributed for credential stuffing
    Category: Combo List
    Content: A threat actor shared a combo list titled Beast Mode 498 – Business on a cracking forum via an external paste link. The post contains email:password pairs marketed for credential stuffing against business accounts.
    Date: 2026-05-11T22:06:39Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Mix-Beast-Mode-498-Business-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  27. Free combo list distributed on cracking forum
    Category: Combo List
    Content: A combo list labeled Blaze 476 containing 476 email:password pairs was shared freely on a cracking forum. The credentials are marketed as valid and fresh. The list is hosted on an external paste service.
    Date: 2026-05-11T22:06:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Mix-Blaze-476-Valid-Fresh-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  28. Combo List: Mixed Email:Password credentials shared freely
    Category: Combo List
    Content: A threat actor known as MTB_cloud shared a mixed email:password combo list via an external paste link. The post is part of a recurring Combo King series and markets the credentials as fresh. No specific victim organization or record count is disclosed.
    Date: 2026-05-11T22:05:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Mix-Combo-King-498-Mix-Fresh-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  29. Combo List: Daily fresh mixed email:password combo list
    Category: Combo List
    Content: A threat actor shared a mixed email:password combo list containing 498 entries, marketed as fresh and valid. The list was made available via an external paste link on a cracking forum.
    Date: 2026-05-11T22:05:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Mix-Daily-Fresh-498-Mix-Valid-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  30. Combo list targeting Polish accounts distributed on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of 1,078 email:password credentials on a cracking forum, marketed as valid and fresh. The list is described as a mixed Polish combo and is hosted on an external paste site.
    Date: 2026-05-11T22:05:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Poland-Valid-Fresh-1078-Mix-Private-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  31. Sale of Telegram TData session files
    Category: Logs
    Content: A forum post by R0BIN1337 on Cracked.st advertises six Telegram TData session files. TData files contain Telegram session credentials and can be used to hijack accounts. No further details are available from the post content.
    Date: 2026-05-11T22:05:06Z
    Network: openweb
    Published URL: https://cracked.st/Thread-x6-Valid-TData-File
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  32. Combo List — Russian email:password mix (1,061 lines)
    Category: Combo List
    Content: A threat actor shared a Russian email:password combo list containing 1,061 lines, marketed as fresh and private. The list was made available via an external paste link on a cracking forum.
    Date: 2026-05-11T22:04:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Russia-Mix-Multi-1061-Fresh-Private-mtbcloud
    Screenshots:
    None
    Threat Actors: MTB_cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  33. KYC bypass service offered for any site at $20
    Category: Services
    Content: A threat actor is offering to complete Know Your Customer (KYC) verification on any site for $20 per submission. Contact is solicited via Telegram under the handle poolsearcher. This service likely facilitates identity fraud or account creation under false identities.
    Date: 2026-05-11T22:04:27Z
    Network: openweb
    Published URL: https://patched.to/Thread-nova-doing-kyc-any-site-20
    Screenshots:
    None
    Threat Actors: PoolSearcher
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  34. Combo list targeting Outlook and Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of 3,424 credentials targeting Outlook and Hotmail accounts on a public forum. The content is hidden behind a registration or login requirement.
    Date: 2026-05-11T22:04:09Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-3-424-good-logs-combo-outlook-hotmail
    Screenshots:
    None
    Threat Actors: cloudkaraoke
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  35. Free distribution of cracked Sendblaster Pro 4.1.13
    Category: Services
    Content: A forum user is distributing a cracked/activated version of Sendblaster Pro 4.1.13, a bulk email marketing tool, via an external paste link. The post does not reference a specific victim or breach.
    Date: 2026-05-11T22:03:47Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-Sendblaster-Pro-Version-4-1-13-Activated–2292685
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  36. Sale of 70K Mixed Domains Valid Combolist
    Category: Combo List
    Content: A threat actor shared a combolist containing approximately 70,000 mixed-domain credentials via an external paste link. The list is marketed as valid and spans multiple domains.
    Date: 2026-05-11T22:02:17Z
    Network: openweb
    Published URL: https://altenens.is/threads/70k-mixed-domains-valid-combolist.2938038/unread
    Screenshots:
    None
    Threat Actors: VegaM
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  37. Sale of UHQ Hotmail combo list with 902 entries
    Category: Combo List
    Content: A threat actor is offering a combo list of 902 Hotmail credentials marketed as UHQ (ultra-high quality) drops. The list is available via a free download link as well as through paid subscription tiers ranging from $3 for 24 hours to $100 for three months.
    Date: 2026-05-11T21:54:17Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74977/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  38. Distribution of 5 million URL:Log:Pass combo list
    Category: Combo List
    Content: A threat actor shared a combo list containing 5 million URL:login:password credential pairs on a cracking forum. The content is restricted to registered users. No specific victim organization or targeted service was identified.
    Date: 2026-05-11T21:53:57Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74979/
    Screenshots:
    None
    Threat Actors: Seaborg
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  39. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a combo list of 610 Hotmail credentials marketed as high-quality and fresh. The post advertises daily supply of 4,000–12,000 credentials through a private members-only network with encrypted access.
    Date: 2026-05-11T21:53:38Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74980/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  40. Sale of AI-powered hidden remote desktop control tool (AIRDC)
    Category: Malware
    Content: A threat actor is selling a tool called AIRDC, described as an AI-powered hidden remote desktop control application for Windows. The tool features stealth capabilities including kernel-level input interception, Session 0/headless virtual desktop operation, Protected Process Light (PPL) persistence to evade task managers, and encrypted P2P tunneling via WireGuard/Tailscale. Licensing is offered at $279/month (Lite) or $351/two months (Elite), with payment accepted in cryptocurrency.
    Date: 2026-05-11T21:49:28Z
    Network: openweb
    Published URL: https://hackforums.net/showthread.php?tid=6325264
    Screenshots:
    None
    Threat Actors: GENERAL DARK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  41. Free distribution of 5,783 stealer logs via cloud storage
    Category: Logs
    Content: A threat actor shared a collection of 5,783 stealer logs via a Pixeldrain link, marketed as fresh and dated May 11. The logs were made available for free on a dark web forum specializing in stealer log distribution.
    Date: 2026-05-11T21:34:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%F0%9F%9A%80-5783-LOGS-CLOUD-%E2%98%81-11-MAY-%E2%9D%A4%EF%B8%8F-FRESH-LOGS%E2%9D%97%EF%B8%8F
    Screenshots:
    None
    Threat Actors: UP_DAISYCLOUD
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  42. Sale of 650K HQ Mix Email:Password Combo List
    Category: Combo List
    Content: A threat actor is offering a mixed email:password combo list containing approximately 650,000 credentials for sale via Telegram. The actor also advertises a Telegram group distributing free combo lists.
    Date: 2026-05-11T21:25:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-650K-HQ-MIX-DATA-2-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  43. Alert: Unintelligible or off-topic forum post
    Category: Alert
    Content: The forum post contains no actionable threat intelligence. The author appears to be soliciting flash tether on TON, likely referring to fraudulent cryptocurrency, but no structured threat data is present.
    Date: 2026-05-11T21:24:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Who-have-flash-tether-on-ton-write-me
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  44. Combo List: 381K UHQ Outlook credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 381,000 Outlook credentials, marketed as ultra-high quality and fresh. The list is intended for credential stuffing against Outlook/Microsoft accounts. The post is sponsored by an AIO tool service.
    Date: 2026-05-11T21:24:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-381K-UHQ-OUTLOOK-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  45. Sale of UHQ Yahoo combo list with 623K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 623K credentials marketed as UHQ and fresh, targeting Yahoo accounts. The post is sponsored by an AIO/checker tool service. Per combo list conventions, Yahoo is the credential-stuffing target, not the breach victim.
    Date: 2026-05-11T21:24:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-623K-UHQ-YAHOO-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  46. Combo List: 2.2 million UHQ mixed mail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 2.2 million mixed email credentials, marketed as fresh and high quality. The post is sponsored by a third-party AIO/checker service.
    Date: 2026-05-11T21:23:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-2-2M-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  47. Combo List: 8.5 million alleged UHQ Gmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 8.5 million alleged UHQ Gmail credentials marketed as fresh. The post is sponsored by a third-party AIO tool service. Per combo list conventions, Gmail is a credential-stuffing target, not the breach source.
    Date: 2026-05-11T21:23:24Z
    Network: openweb
    Published URL: https://cracked.st/Thread-8-5M-UHQ-GMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  48. Combo List: UHQ Hotmail credentials (1.2M)
    Category: Combo List
    Content: A threat actor shared a combo list of 1.2 million Hotmail credentials, marketed as UHQ and fresh. The post is sponsored by slateaio.com, suggesting the list is intended for credential stuffing use.
    Date: 2026-05-11T21:23:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-1-2M-UHQ-HOTMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  49. Sale of discounted YouTube Premium account upgrades
    Category: Services
    Content: A threat actor is selling YouTube Premium individual account upgrades for $28 per year, significantly below the standard retail price. The seller claims to activate the subscription directly on the buyers personal email account. The discounted pricing suggests the upgrades are likely obtained through fraudulent or unauthorized means.
    Date: 2026-05-11T21:22:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-28-%E2%9A%A1-YouTube-Premium-Individual-Upgrade-%E2%80%93-1-Year-on-Your-Email-%E2%9C%85
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  50. Sale of discounted AI model API access service
    Category: Services
    Content: A seller operating under the name CloseRouter is advertising a cheap API access service for major AI models including ChatGPT, Claude, and Gemini on a forum. The service offers per-token pricing significantly below standard rates, with a free $2 trial balance and a 30% bonus for top-ups over $100. The service is accessible via closerouter.dev and may rely on unauthorized or resold API keys.
    Date: 2026-05-11T21:22:19Z
    Network: openweb
    Published URL: https://patched.to/Thread-sellix-up-to-0-2-1%D0%BC-closerouter-cheap-api-for-ai-models-chatgpt-claude-gemini
    Screenshots:
    None
    Threat Actors: CloseRouter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  51. Sale of discounted API access service for AI models (ChatGPT, Claude, Gemini)
    Category: Services
    Content: A forum seller is advertising CloseRouter, a commercial API reseller service offering discounted access to AI models including OpenAI GPT, Anthropic Claude, Google Gemini, and others. Pricing is listed per million tokens with a promotional bonus for top-ups of $100 or more. The service operates via a dedicated website and Telegram support channel.
    Date: 2026-05-11T21:22:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-UP-TO-0-1-1%D0%9C-CloseRouter-CHEAP-API-FOR-AI-MODELS-CHATGPT-CLAUDE-GEMINI
    Screenshots:
    None
    Threat Actors: CloseRouter
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  52. Sale of VIP paid logs containing 1.6 million lines
    Category: Logs
    Content: A threat actor is selling a collection of stealer logs described as VIP paid logs containing approximately 1.6 million lines. The content is hidden behind a login/registration wall, limiting further detail. No specific victim organization or country is identified.
    Date: 2026-05-11T21:21:40Z
    Network: openweb
    Published URL: https://patched.to/Thread-vip-paid-logs-1-6-million-lines
    Screenshots:
    None
    Threat Actors: IGotABigDick
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  53. Combo List of Hotmail credentials
    Category: Combo List
    Content: A combo list of approximately 200 Hotmail email credentials is being shared on a forum. The content is hidden behind a registration or login requirement.
    Date: 2026-05-11T21:21:35Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-2k-hq-hotmail-mail-access-combolist-301391
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  54. Mass Defacement of Indonesian Islamic School by lxrdk1773n
    Category: Defacement
    Content: Threat actor lxrdk1773n conducted a mass defacement attack targeting the website of MTs Negeri 1 Ternate, an Indonesian state Islamic junior high school. The defacement was deployed via a PHP shell file (lol.php) on a Linux-based server. This incident is part of a broader mass defacement campaign attributed to the same actor.
    Date: 2026-05-11T21:17:10Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249165
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTs Negeri 1 Ternate
    Victim Site: pmbm.mtsn1ternate.sch.id
  55. Mass Website Defacement of Indonesian Islamic School by lxrdk1773n
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as lxrdk1773n conducted a mass defacement targeting the computer-based testing (CBT) subdomain of MTsN 1 Ternate, an Indonesian state Islamic junior high school. The attacker deployed a defacement page at the path /lol.php on a Linux-based server. This incident was part of a broader mass defacement campaign carried out by the attacker, as evidenced by the mass defacement flag.
    Date: 2026-05-11T21:16:02Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249163
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTsN 1 Ternate (State Islamic Junior High School 1 Ternate)
    Victim Site: cbt.mtsn1ternate.sch.id
  56. Mass Defacement of Indonesian Islamic School Website by lxrdk1773n
    Category: Defacement
    Content: On May 12, 2026, a threat actor operating under the alias lxrdk1773n conducted a mass defacement attack targeting the attendance subdomain of MTsN 1 Ternate, a state Islamic junior high school in Ternate, Indonesia. The defacement was deployed on a Linux-based server and was part of a broader mass defacement campaign. The incident was archived and mirrored via haxor.id.
    Date: 2026-05-11T21:15:01Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249160
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTsN 1 Ternate (State Islamic Junior High School 1 Ternate)
    Victim Site: absen2.mtsn1ternate.sch.id
  57. Website defacement of MTSN 1 Ternate by lxrdk1773n
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as lxrdk1773n defaced the attendance management subdomain of MTSN 1 Ternate, an Indonesian public Islamic junior high school. The attacker uploaded a defacement page (lol.php) to the Linux-based web server, targeting the schools attendance system. This was a single, targeted defacement with no affiliation to a known hacking group.
    Date: 2026-05-11T21:14:09Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249159
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: Madrasah Tsanawiyah Negeri 1 Ternate (MTSN 1 Ternate)
    Victim Site: absen.mtsn1ternate.sch.id
  58. Mass Defacement of Indonesian Islamic Junior High School E-Learning Platform by lxrdk1773n
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as lxrdk1773n conducted a mass defacement campaign targeting the e-learning portal of MTsN 1 Ternate, a state Islamic junior high school in Ternate, Indonesia. The attacker uploaded a defacement file (lol.php) to the Linux-based web server, compromising the educational platform. This incident was part of a broader mass defacement operation and has been archived by haxor.id.
    Date: 2026-05-11T21:12:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249164
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTsN 1 Ternate (Madrasah Tsanawiyah Negeri 1 Ternate)
    Victim Site: elearning.mtsn1ternate.sch.id
  59. Mass defacement of Indonesian Islamic school website by lxrdk1773n
    Category: Defacement
    Content: The threat actor lxrdk1773n conducted a mass defacement campaign targeting the subdomain of MTsN 1 Ternate, an Islamic state junior high school in Ternate, Indonesia. The defacement was identified on May 12, 2026, with a malicious file (lol.php) uploaded to the web server running on Linux. This incident is part of a broader mass defacement operation attributed to the same actor.
    Date: 2026-05-11T21:11:56Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249161
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTsN 1 Ternate (Islamic Junior High School)
    Victim Site: ard.mtsn1ternate.sch.id
  60. Sale of Hotmail combo list
    Category: Combo List
    Content: A forum user is offering a combo list of 1,450 high-quality Hotmail credentials. The post advertises fresh and untouched credentials supplied daily in quantities of 4,000–12,000, marketed as optimized for credential stuffing.
    Date: 2026-05-11T21:11:37Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74971/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  61. Combo List of 1.7 million URL:login:password credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1.7 million URL:login:password credentials via a Mega.nz link. The list was distributed freely on a cracking forum. No specific victim organization is identified.
    Date: 2026-05-11T21:11:18Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74972/
    Screenshots:
    None
    Threat Actors: WashingtonDC
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  62. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a combo list of 1,338 Hotmail credentials marketed as high-quality and fresh. The post advertises daily supply of 4,000–12,000 credentials through a private members-only network with encrypted access.
    Date: 2026-05-11T21:10:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74973/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  63. Mass defacement of Indonesian Islamic secondary school portal by lxrdk1773n
    Category: Defacement
    Content: On May 12, 2026, threat actor lxrdk1773n defaced the web portal of MTsN 1 Ternate, a state Islamic junior secondary school in Ternate, Indonesia. The incident was classified as a mass defacement, suggesting the attacker compromised multiple sites in the same campaign. The defacement was hosted on a Linux-based server and archived via haxor.id.
    Date: 2026-05-11T21:10:44Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249166
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTsN 1 Ternate (Madrasah Tsanawiyah Negeri 1 Ternate)
    Victim Site: portal.mtsn1ternate.sch.id
  64. Sale of mixed-access combo list targeting USA and Europe
    Category: Combo List
    Content: A threat actor is sharing a combo list of 3,380 credentials described as good and mixed access targeting users in the USA and Europe. The post includes a download link for the credential list.
    Date: 2026-05-11T21:10:40Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74974/
    Screenshots:
    None
    Threat Actors: karaokecloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  65. Sale of Hotmail combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a combo list of 576 Hotmail credentials marketed as high quality and fresh. The post advertises daily supply of 4,000–12,000 credentials through a private members-only network. The credentials appear intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T21:10:20Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74975/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  66. Mass Defacement of Indonesian Islamic Secondary School by lxrdk1773n
    Category: Defacement
    Content: On May 12, 2026, threat actor lxrdk1773n conducted a mass defacement attack targeting the archive subdomain of MTsN 1 Ternate, a state Islamic junior high school in Ternate, Indonesia. The attacker deployed a defacement page at the path /lol.php on a Linux-based server. This incident was part of a broader mass defacement campaign carried out by the same actor.
    Date: 2026-05-11T21:09:32Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249162
    Screenshots:
    None
    Threat Actors: lxrdk1773n
    Victim Country: Indonesia
    Victim Industry: Education
    Victim Organization: MTsN 1 Ternate (State Islamic Junior High School 1 Ternate)
    Victim Site: arsipku.mtsn1ternate.sch.id
  67. Free Hotmail credential hits shared on forum
    Category: Combo List
    Content: A forum user shared 1,269 valid Hotmail credential hits via an external paste service. The credentials are marketed as verified hits suitable for credential stuffing against Hotmail accounts.
    Date: 2026-05-11T21:06:42Z
    Network: openweb
    Published URL: https://altenens.is/threads/1269x-valid-hotmail-hits-_ebbi_cloud.2938025/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  68. Alleged sale of email credentials and combolists across multiple countries
    Category: Combo List
    Content: Threat actor offering for sale email:password combolists, mail access with cookies, and account credentials across multiple countries including US, UK, DE, FR, JP, NL, PL, BR, ES, IT, CA, and others. Seller claims to have private cloud hotmail UHQ access and combo lists with keyword searching capabilities for platforms including eBay, Amazon, Walmart, Kleinanzeigen, Poshmark, Depop, and Reddit. Prices mentioned starting at $1 for certain access types.
    Date: 2026-05-11T20:55:44Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79815
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Multiple countries
    Victim Industry: Multiple (email providers, e-commerce platforms)
    Victim Organization: Unknown
    Victim Site: Unknown
  69. Website Defacement of Optimal Refinance by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website optimalrefinance.com, a financial services domain likely offering refinancing products. The defacement was a targeted, single-site incident and does not appear to be part of a mass or repeated defacement campaign. Server and infrastructure details were not disclosed in the available intelligence.
    Date: 2026-05-11T20:52:19Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920337
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Optimal Refinance
    Victim Site: optimalrefinance.com
  70. Virtual SMS number rental service advertised on forum
    Category: Services
    Content: A seller is advertising a virtual SMS number rental service operated via a Telegram bot. The service offers temporary numbers from over 40 countries for up to 90 days, supporting unlimited SMS reception and one-time activations. Payment is accepted in cryptocurrency and Monero.
    Date: 2026-05-11T20:52:09Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Rent-virtual-numbers-for-SMS-via-telegram-bot
    Screenshots:
    None
    Threat Actors: LibrePass
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  71. Website Defacement of Quick Qualify Mortgages by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Quick Qualify Mortgages, a mortgage lending service. The incident was a targeted single-site defacement with no mass or repeat defacement indicators. The attackers motivation and technical exploitation method remain unknown.
    Date: 2026-05-11T20:51:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920341
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services / Mortgage Lending
    Victim Organization: Quick Qualify Mortgages
    Victim Site: quickqualifymortgages.com
  72. Website Defacement of Pick Realtors by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor operating under the alias Nicotine, affiliated with the group Umbra Community, defaced the website pickrealtors.com. The incident was a targeted, single-site defacement with no indication of mass or repeated compromise. The motive behind the attack remains unknown.
    Date: 2026-05-11T20:50:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920338
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Real Estate
    Victim Organization: Pick Realtors
    Victim Site: pickrealtors.com
  73. Website Defacement of VA Loans Pro by Nicotine (Umbra Community)
    Category: Defacement
    Content: On May 12, 2026, the website valoanspro.com was defaced by a threat actor known as Nicotine, operating under the group Umbra Community. The targeted domain suggests the victim is a financial services company specializing in VA (Veterans Affairs) loans in the United States. The incident was a single-target defacement, with a mirror of the defaced page archived at zone-xsec.com.
    Date: 2026-05-11T20:49:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920359
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: VA Loans Pro
    Victim Site: valoanspro.com
  74. Website Defacement of Veteran Loan Service by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website veteranloan.pro, a domain associated with veteran loan financial services. The defacement targeted a specific index file (index.txt) and was not classified as a mass or home page defacement. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T20:48:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920363
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Veteran Loan
    Victim Site: veteranloan.pro
  75. Website Defacement of Strong Refinance Rates by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website strongrefinancerates.com, a financial services platform likely offering mortgage or loan refinancing information. The attack was a singular, targeted defacement rather than a mass or repeated compromise. No specific motive or server details were disclosed in the available intelligence.
    Date: 2026-05-11T20:47:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920355
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Strong Refinance Rates
    Victim Site: strongrefinancerates.com
  76. Website Defacement of RealtorShopping.ai by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website realtorshopping.ai. The defacement targeted a real estate-related platform and was recorded as a single, non-mass, non-repeated defacement incident. The server details and specific motivation behind the attack remain unknown.
    Date: 2026-05-11T20:47:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920345
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Realtor Shopping
    Victim Site: realtorshopping.ai
  77. Website Defacement of Refisaver by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website refisaver.com. The attack targeted a file-level page (index.txt) rather than the homepage, indicating a targeted intrusion into the web server. The incident was recorded and mirrored by zone-xsec.com as a single-site defacement.
    Date: 2026-05-11T20:46:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920347
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: Refisaver
    Victim Site: refisaver.com
  78. Website Defacement of Supra Mortgages by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of Supra Mortgages at supramortgages.com. The defacement targeted the index page of the financial services company and was recorded as a singular, non-mass incident. A mirror of the defacement was archived via zone-xsec.com.
    Date: 2026-05-11T20:44:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920356
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Financial Services
    Victim Organization: Supra Mortgages
    Victim Site: supramortgages.com
  79. Website Defacement of PreApprovalHub by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website preapprovalhub.com. The defacement targeted a single page (index.txt) and was not classified as a mass or home page defacement. The incident was documented and mirrored via zone-xsec.com.
    Date: 2026-05-11T20:44:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920339
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services
    Victim Organization: PreApproval Hub
    Victim Site: preapprovalhub.com
  80. Website Defacement of Stability Mortgages by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Stability Mortgages, a mortgage lending organization. The attack targeted the sites index page and was recorded as a single, non-mass defacement. No specific motive or server details were disclosed in the available incident data.
    Date: 2026-05-11T20:43:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920351
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Financial Services / Mortgage Lending
    Victim Organization: Stability Mortgages
    Victim Site: stabilitymortgages.com
  81. Website Defacement of OnlineApprovals.net by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website onlineapprovals.net. The defacement targeted a single page (index.txt) and was not classified as a mass or home page defacement. Server and infrastructure details remain unknown, and no specific motive was disclosed.
    Date: 2026-05-11T20:42:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920336
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Online Approvals
    Victim Site: onlineapprovals.net
  82. Website Defacement of RateFriendly by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website ratefriendly.com by altering the index.txt file. The incident was a targeted, single-site defacement with no indication of mass or repeated defacement activity. The motive and technical details of the intrusion remain unknown.
    Date: 2026-05-11T20:41:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920342
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Finance / Rating Services
    Victim Organization: RateFriendly
    Victim Site: ratefriendly.com
  83. Free distribution of fresh cloud stealer logs
    Category: Logs
    Content: A forum user is freely distributing fresh stealer logs described as dorked cloud logs on a daily basis. No further details are available regarding the volume or origin of the logs.
    Date: 2026-05-11T20:40:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%98%81%EF%B8%8F-Free-Cloud-%E2%98%81%EF%B8%8F-Fresh-Dorkd-logs-daily–2092505
    Screenshots:
    None
    Threat Actors: kirkenyahu12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  84. Sale of combo list targeting PayPal, Stripe, and Revolut accounts
    Category: Combo List
    Content: A threat actor on Cracked is offering a combo list of approximately 678,000 email:password pairs marketed for use against PayPal, Stripe, and Revolut. The post claims the data is private and advertises an impressive hit rate. The credentials are described as fresh for 2026.
    Date: 2026-05-11T20:39:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-678K-%E3%80%8D%E2%9A%A1-PAYPAL-STRIPE-REVOLUT-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  85. Sale of combo list targeting shopping platforms
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 597,000 email and password pairs described as a private base suitable for credential stuffing against shopping platforms. The list is marketed as effective for general use across multiple services.
    Date: 2026-05-11T20:39:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1597K-SHOPPING%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  86. Sale of Zalando credential combo list with 528K records
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 528,000 email:password credentials marketed for use against Zalando. The post describes the base as private and suitable for various credential stuffing purposes.
    Date: 2026-05-11T20:37:59Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1528K-ZALANDO%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  87. Combo List: WorldCombo Education Mixed Target (113,962 lines)
    Category: Combo List
    Content: A combo list of 113,962 email:password lines targeting educational services has been shared on a cracking forum. The list is marketed as a mixed-target combo for credential stuffing against education-related platforms. No specific breached organization is identified.
    Date: 2026-05-11T20:37:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-113-962-Lines-%E2%9C%85-WorldCombo-Edu-Mixed-Target-2026
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  88. Sale of subscription-based stealer log cloud service with daily fresh logs
    Category: Logs
    Content: A threat actor is selling access to a private cloud service hosting stealer logs described as dorked and refreshed daily. Subscription tiers range from $7 for 3 days to $50 for lifetime access. A free tier is also advertised via a Telegram channel.
    Date: 2026-05-11T20:36:55Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%98%81%EF%B8%8F-Private-Cloud-%E2%98%81%EF%B8%8F-Fresh-Dorkd-logs-daily-all-hits
    Screenshots:
    None
    Threat Actors: kirkenyahu12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  89. Sale of IMAP email checker tool with anti-detection engine
    Category: Combo List
    Content: A threat actor is selling Heimdallr, an IMAP email credential checking tool priced at $75 lifetime. The tool supports up to 500 threads, proxy rotation, and includes an anti-detection engine designed to bypass fingerprinting on Microsoft, Gmail, Yahoo, and AOL platforms. It automatically accesses validated inboxes and exports per-account reports.
    Date: 2026-05-11T20:36:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8FHeimdallar-Email-checker-and-Imap-Viewer-17-Modules-LTS-fingerprint-bypass-live
    Screenshots:
    None
    Threat Actors: kirkenyahu12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  90. Sale of Fortnite external cheat software XANAX.AC with aimbot and ESP features
    Category: Malware
    Content: A threat actor is selling an external cheat for the game Fortnite under the brand XANAX.AC, advertised as undetected (UD) and tournament-safe. Features include aimbot, ESP, and radar. A 50% launch discount is offered sitewide with free test keys available on request.
    Date: 2026-05-11T20:36:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%A8XANAX-AC-FN-EXTERNAL%E2%9C%A850-LAUNCH-SALE%E2%9C%A8UD%E2%9C%A8-AIMBOT%E2%9C%A8-ESP%E2%9C%A8TOURNEY-SAFE%E2%9C%A8RADAR%E2%9C%A8
    Screenshots:
    None
    Threat Actors: Scream
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  91. Sale of game cheat software for Rust (XANAX.AC external cheat)
    Category: Services
    Content: A forum user is advertising a paid external cheat for the game Rust, branded as XANAX.AC, featuring aimbot, ESP, radar, and quality-of-life features, marketed as undetected (UD) with a 50% launch sale. No post content was available for further analysis.
    Date: 2026-05-11T20:35:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%A8XANAX-AC-RUST-EXTERNAL%E2%9C%A850-LAUNCH-SALE%E2%9C%A8UD%E2%9C%A8-AIMBOT%E2%9C%A8-ESP%E2%9C%A8RADAR%E2%9C%A8QOL%E2%9C%A8
    Screenshots:
    None
    Threat Actors: Scream
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  92. Sale of 872K streaming combo list
    Category: Combo List
    Content: A threat actor operating as MetaCloud3 is distributing a combo list of approximately 872,000 email:password credentials marketed for use against streaming services. The list is described as a private base suitable for credential stuffing across multiple platforms.
    Date: 2026-05-11T20:35:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1872K-STREAMING-%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  93. Website Defacement of Sultan Butchery by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website sultanbutchery.com by altering its index page. The defacement was a targeted single-site attack with no indication of mass or repeated defacement activity. No specific motive or additional technical indicators were disclosed in the available report.
    Date: 2026-05-11T20:35:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920113
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Food & Beverage / Retail
    Victim Organization: Sultan Butchery
    Victim Site: sultanbutchery.com
  94. Website Defacement of Ozzy Food on Wheels by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Ozzy Food on Wheels, a food service business. The attack targeted the index page of the domain ozzyfoodonwheels.com and was recorded as a single, non-mass defacement. The incident was mirrored and archived by zone-xsec.com.
    Date: 2026-05-11T20:34:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920108
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Food & Beverage
    Victim Organization: Ozzy Food on Wheels
    Victim Site: ozzyfoodonwheels.com
  95. Combo List of 685K Mixed Credentials
    Category: Combo List
    Content: A threat actor is distributing a mixed combo list of approximately 685,000 email:password credentials, marketed as private data with a high hit rate. The post advertises the list as fresh for 2026. No specific victim organization or breach source is identified.
    Date: 2026-05-11T20:33:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-685K-%E3%80%8D%E2%9A%A1-MIX-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  96. Website Defacement of 1000power.co by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website 1000power.co. The defacement targeted the index page of the domain and was recorded as a singular, non-mass incident. No specific motive or server details were disclosed in connection with this attack.
    Date: 2026-05-11T20:33:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920090
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: 1000 Power
    Victim Site: 1000power.co
  97. Free Hotmail combo list with 1,377 hits
    Category: Combo List
    Content: A threat actor has freely shared a combo list containing 1,377 Hotmail credential hits via an external paste service. The credentials are marketed as premium hits, suggesting they have been verified against Hotmail accounts.
    Date: 2026-05-11T20:32:54Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1377x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292632
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  98. Free combo list targeting Belgium distributed on forum
    Category: Combo List
    Content: A combo list containing over 101,000 credential pairs associated with Belgium was shared freely via an external paste link. The post was made on a cracking/dumping forum under the handle Fragtez.
    Date: 2026-05-11T20:32:34Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-101-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Belgium-%E2%9C%AA-25-APR-2026-%E2%9C%AA–2292663
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  99. Free USA email:password combo list
    Category: Combo List
    Content: A user on a cracking forum has freely shared a combo list of USA email:password credentials via an external paste link. The list is marketed as high quality and distributed without charge.
    Date: 2026-05-11T20:32:30Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-USA-EMAILPASS-COMBOLIST-SHROUD20-txt–2292623
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  100. Website Defacement of African Food Market by Nicotine (Umbra Community)
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website of African Food Market at africanfoodmarket.net. The incident was a targeted single-site defacement with no stated motive recorded. The attack details were archived via zone-xsec.com mirror.
    Date: 2026-05-11T20:32:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920091
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Food & Beverage Retail
    Victim Organization: African Food Market
    Victim Site: africanfoodmarket.net
  101. Website Defacement of Subtown by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the Canadian website subtown.ca. The defacement targeted the index page of the site, replacing its content with the attackers message. No specific motive was disclosed for the attack.
    Date: 2026-05-11T20:31:25Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920112
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Subtown
    Victim Site: subtown.ca
  102. Website Defacement of Bitmine Cellular by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of Bitmine Cellular, a Canadian telecommunications entity. The defacement targeted the index page of the domain bitminecellular.ca. No specific motive or proof of compromise details were disclosed in the available intelligence.
    Date: 2026-05-11T20:30:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920097
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Telecommunications
    Victim Organization: Bitmine Cellular
    Victim Site: bitminecellular.ca
  103. Website defacement of BDS Capital by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of BDS Capital, a Canadian financial/investment entity. The defacement targeted the index.txt file of the domain bdscapital.ca. This was a single-target, non-mass defacement with no redefacement history recorded.
    Date: 2026-05-11T20:29:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920095
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Canada
    Victim Industry: Finance/Investment
    Victim Organization: BDS Capital
    Victim Site: bdscapital.ca
  104. Website Defacement of Purohit Thali by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website purohitthali.com. The incident was a targeted single-site defacement, with the defaced page archived at zone-xsec.com. No specific motive or server details were disclosed.
    Date: 2026-05-11T20:29:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920084
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Food & Beverage / Restaurant
    Victim Organization: Purohit Thali
    Victim Site: purohitthali.com
  105. Website Defacement of Tague Mount Real Estate by Nicotine (Umbra Community)
    Category: Defacement
    Content: On May 12, 2026, the real estate website taguemountrealestate.com was defaced by a threat actor operating under the handle Nicotine, affiliated with the group Umbra Community. The attack was a single targeted defacement of the sites index page. Server and infrastructure details were not disclosed in the available reporting.
    Date: 2026-05-11T20:28:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920114
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: Tague Mount Real Estate
    Victim Site: taguemountrealestate.com
  106. Website Defacement of SoftSanitary by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website softsanitary.com. The attack targeted a single page (index.txt) and was not classified as a mass or home defacement. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T20:27:18Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920111
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Sanitation / Cleaning Products
    Victim Organization: Soft Sanitary
    Victim Site: softsanitary.com
  107. Alleged data leak of Arc Reinsurance Brokers
    Category: Data Leak
    Content: A threat actor affiliated with the Stormous Group claims to have leaked approximately 20GB of data from Arc Reinsurance Brokers (Lebanon and Dubai operations) for free via Mega. The dump allegedly includes KYC documents, employee files, financial records, executive files, and Emirates ID documents. The release is stated to follow a failure to reach a resolution with the company.
    Date: 2026-05-11T20:26:24Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DOCUMENTS-Arc-Reinsurance-Brokers-arc-reins-com-Lebanon-and-Dubai-FULL-DATA-DUMP-KYC
    Screenshots:
    None
    Threat Actors: XOverStm
    Victim Country: Lebanon
    Victim Industry: Finance
    Victim Organization: Arc Reinsurance Brokers
    Victim Site: arc-reins.com
  108. Website defacement of All Out Burger by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of All Out Burger, a food and beverage establishment. The defacement targeted the index page of the domain alloutburger.com and was not classified as a mass or home defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-11T20:26:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920092
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: United States
    Victim Industry: Food & Beverage / Restaurant
    Victim Organization: All Out Burger
    Victim Site: alloutburger.com
  109. Website Defacement of Juland by Ashura_mode (Night Root)
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as Ashura_mode, operating under the team Night Root, defaced the website juland.co.tz hosted on a Linux server. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity.
    Date: 2026-05-11T20:25:31Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249158
    Screenshots:
    None
    Threat Actors: Ashura_mode, Night Root
    Victim Country: Tanzania
    Victim Industry: Unknown
    Victim Organization: Juland
    Victim Site: juland.co.tz
  110. Website Defacement of Vrindavan Yatri Niwas by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Vrindavan Yatri Niwas, a hospitality or pilgrim accommodation service likely based in Vrindavan, India. The incident was a targeted single-site defacement with no mass or re-defacement indicators. The attack details were archived via zone-xsec.com mirror.
    Date: 2026-05-11T20:24:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920085
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Hospitality / Tourism
    Victim Organization: Vrindavan Yatri Niwas
    Victim Site: vrindavanyatriniwas.com
  111. Website Defacement of Sedal Construction by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Sedal Construction at sedalconstruction.com. The incident was a targeted, single-site defacement with no indication of mass or repeated defacement activity. Server and infrastructure details were not disclosed in the available reporting.
    Date: 2026-05-11T20:23:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/920110
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Construction
    Victim Organization: Sedal Construction
    Victim Site: sedalconstruction.com
  112. Alleged data breach of La Suite Numérique (lasuite.numerique.gouv.fr)
    Category: Data Breach
    Content: A threat actor claims to have exfiltrated over 18 million records from lasuite.gouv.fr, a French government digital services platform. The data is allegedly being offered for sale via Telegram, with samples of up to 5,000 lines available upon request.
    Date: 2026-05-11T20:22:31Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-lasuite-numerique-gouv-fr
    Screenshots:
    None
    Threat Actors: exclode
    Victim Country: France
    Victim Industry: Government
    Victim Organization: La Suite Numérique
    Victim Site: lasuite.numerique.gouv.fr
  113. Website Defacement of Sreenivas Invisible Grill by Nicotine (Umbra Community)
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Sreenivas Invisible Grill, an Indian home improvement and grill installation company. The incident was a targeted single-site defacement with no mass or repeated defacement indicators. The attack details were archived via zone-xsec.com mirror for record-keeping.
    Date: 2026-05-11T20:17:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919822
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Construction / Home Improvement
    Victim Organization: Sreenivas Invisible Grill
    Victim Site: sreenivasinvisiblegrill.com
  114. Website Defacement of Shrivara Hi Travels by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of Shrivara Hi Travels, an Indian travel company. The defacement targeted the index page of the site and was recorded as a single, non-mass defacement incident. The attack was mirrored and archived at zone-xsec.com for reference.
    Date: 2026-05-11T20:16:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919816
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Travel and Tourism
    Victim Organization: Shrivara Hi Travels
    Victim Site: shrivarahitravels.in
  115. Website Defacement of Creative Capture DVG by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website of Creative Capture DVG (creativecapturedvg.com). The incident was a single targeted defacement, not part of a mass or repeat defacement campaign. No specific motive, server details, or proof of concept were disclosed.
    Date: 2026-05-11T20:16:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919799
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Photography/Creative Services
    Victim Organization: Creative Capture DVG
    Victim Site: creativecapturedvg.com
  116. Website Defacement of Balaji Tours by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor identified as Nicotine, affiliated with the group Umbra Community, defaced the website of Balaji Tours, a travel and tourism company. The defacement targeted a single page (index.txt) and was not part of a mass or redefacement campaign. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-11T20:15:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919796
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Travel and Tourism
    Victim Organization: Balaji Tours
    Victim Site: balajitours.co
  117. Website Defacement of SLV Event Planner Rental Props by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of SLV Event Planner Rental Props, an Indian event planning and rental services company. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity. The attack details are documented via a mirror on zone-xsec.com.
    Date: 2026-05-11T20:14:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919820
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Event Planning & Rentals
    Victim Organization: SLV Event Planner Rental Props
    Victim Site: slveventplannerrentalprops.in
  118. Website Defacement of Skyroot Infra by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website skyrootinfra.com. The defacement targeted a single page and was not classified as a mass or redefacement incident. The attackers motivation and technical entry vector remain unknown at this time.
    Date: 2026-05-11T20:13:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919819
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Information Technology / Infrastructure
    Victim Organization: Skyroot Infra
    Victim Site: skyrootinfra.com
  119. Website Defacement of Khushi Ventures by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Khushi Ventures by altering the index page. The defacement was a targeted single-site attack with no mass or redefacement indicators. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-11T20:12:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919805
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Business Services
    Victim Organization: Khushi Ventures
    Victim Site: khushiventures.com
  120. Website Defacement of Siddi Tours and Travels by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of Siddi Tours and Travels, an Indian travel and tourism company. The attack targeted the index page of the domain sidditoursandtravels.in. The incident was a single targeted defacement, not part of a mass defacement campaign.
    Date: 2026-05-11T20:11:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919818
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Travel and Tourism
    Victim Organization: Siddi Tours and Travels
    Victim Site: sidditoursandtravels.in
  121. Website Defacement of OneGen Healthcare by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the group Umbra Community, defaced the website of OneGen Healthcare. The defacement targeted the index page of the healthcare organizations domain. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T20:10:50Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919810
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Healthcare
    Victim Organization: OneGen Healthcare
    Victim Site: onegenhealthcare.com
  122. Website Defacement of Bloom Balloons by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website bloomballoons.shop by altering the index.txt file. The attack was a targeted single-site defacement with no mass defacement or redefacement indicators noted. The motive and technical details of the intrusion remain unknown.
    Date: 2026-05-11T20:09:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919797
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Unknown
    Victim Industry: Retail / Event Supplies
    Victim Organization: Bloom Balloons
    Victim Site: bloomballoons.shop
  123. Sale of forged legal documents, EDR forgery services, and domain seizure methods
    Category: Services
    Content: A threat actor is selling forged legal documents including court orders, MLAT requests, and subpoenas designed to impersonate law enforcement and bypass corporate compliance for Emergency Disclosure Requests (EDRs). The offering includes .gov email addresses to lend authenticity to fraudulent submissions, as well as domain seizure and suspension services and a private method described as involving header-spoofing and buffer overflow exploitation of reporting APIs. Prices range from $100 per docu
    Date: 2026-05-11T20:09:12Z
    Network: openweb
    Published URL: https://breached.st/threads/forged-court-orders-domain-seizures-private-edr-method-gov-emails-included.87006/unread
    Screenshots:
    None
    Threat Actors: convince
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  124. Website Defacement of Sri Chowdeshwari Astrology by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, operating under the team Umbra Community, defaced the website of Sri Chowdeshwari Astrology, an Indian astrology services website. The incident was a targeted single-site defacement with no mass or redefacement indicators. A mirror of the defaced page was archived at zone-xsec.com.
    Date: 2026-05-11T20:08:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919823
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Astrology / Spiritual Services
    Victim Organization: Sri Chowdeshwari Astrology
    Victim Site: srichowdeshwariastrology.in
  125. Alleged data breach of Chinese Lions Club
    Category: Data Breach
    Content: A threat actor claims to have accessed the Chinese Lions Club (狮子会) national management platform via default admin credentials (admin/123qwe). Financial dumps from the platform are allegedly being distributed via a Telegram link. The exposed data volume and record count are not specified in the post.
    Date: 2026-05-11T20:08:19Z
    Network: openweb
    Published URL: https://breached.st/threads/271-leaked-financial-dumps-chinese-lions-club.87008/unread
    Screenshots:
    None
    Threat Actors: cc5ab
    Victim Country: China
    Victim Industry: Non-Profit
    Victim Organization: Chinese Lions Club
    Victim Site: api.cclions.org.cn
  126. Website Defacement of SMK Tours and Travels by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Nicotine, affiliated with the group Umbra Community, defaced the website of SMK Tours and Travels, an Indian travel and tourism company. The incident was a targeted single-site defacement rather than a mass or home page defacement. A mirror of the defaced page was archived via zone-xsec.com.
    Date: 2026-05-11T20:07:08Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919821
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: India
    Victim Industry: Travel and Tourism
    Victim Organization: SMK Tours and Travels
    Victim Site: smktoursandtravels.in
  127. Alleged data breach of Fédération Française de Ball-Trap (FFBT)
    Category: Data Breach
    Content: A forum post on SP – Databases references a database allegedly belonging to the Fédération Française de Ball-Trap (FFBT), a French clay shooting sports federation. No further details regarding the data contents, record count, or method of compromise are available from the post.
    Date: 2026-05-11T20:04:40Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-F??d??ration-Fran??aise-de-Ball-Trap-FFBT
    Screenshots:
    None
    Threat Actors: NormalLeVrai
    Victim Country: France
    Victim Industry: Sports
    Victim Organization: Fédération Française de Ball-Trap
    Victim Site: ffbt.fr
  128. Combo list targeting Riot Games Valorant accounts
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 783,000 email:password credentials marketed for use against Riot Games Valorant accounts. The post claims a high hit rate and describes the data as private and current as of 2026.
    Date: 2026-05-11T19:52:44Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-783K-%E3%80%8D%E2%9A%A1-RIOT-GAMES-VALORANT-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  129. Combo List of 765K business email credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 765,000 business email and password pairs, marketed as a private base suitable for credential stuffing across multiple services. The post is authored by MetaCloud3 and appears to be offered freely on a combolist forum.
    Date: 2026-05-11T19:52:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1765K-BUSINESS%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  130. Combo List: 872K email access credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 872,000 email:password credentials, marketed as a private base suitable for various credential stuffing purposes. The post was made on a public cracking forum and attributed to the user MetaCloud3.
    Date: 2026-05-11T19:51:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1872K-MAIL-ACCESS%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  131. Combo list targeting Disney+, DAZN, HBOGO, and Hulu streaming services
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 705,000 email:password credentials claimed to be effective against Disney+, DAZN, HBOGO, and Hulu streaming platforms. The post markets the list as private data with a high hit rate. These services are credential-stuffing targets, not the source of the breach.
    Date: 2026-05-11T19:51:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E3%80%8C-705K-%E3%80%8D%E2%9A%A1-DISNEY-DAZN-HBOGO-HULU-%E2%9A%A1-100-PRIVATE-DATA-%E2%9A%A1IMPRESSIVE-HITRATE%E2%9A%A1-2026-NEW%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  132. Sale of Gmail combo list by D4rkNetHub
    Category: Combo List
    Content: A threat actor known as D4rkNetHub is offering a combo list of over 100,000 Gmail credentials on a cracking forum. The post is associated with a price indicator. No further details are available from the post content.
    Date: 2026-05-11T19:51:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-100k-GMAIL-GOODS-D4RKNETHUB-8–2092467
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  133. Hotmail combo list of 3,666 credentials freely shared
    Category: Combo List
    Content: A threat actor shared a combo list of 3,666 Hotmail email and password pairs, marketed as fresh and private. The credentials are intended for credential stuffing against Hotmail/Outlook accounts. The post content is a bump, indicating the list was previously shared.
    Date: 2026-05-11T19:50:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%85%E2%9C%A8-3666-FRESH-HOTMAILS-COMBOLIST-%E2%9C%A8%E2%9C%85PRIVATE-COMBO%E2%9C%852026-FRESH-UHQ%E2%9C%85
    Screenshots:
    None
    Threat Actors: znx_hq
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  134. Combo list of URL:Login:Pass credentials shared on forum
    Category: Combo List
    Content: A forum user shared a combo list advertised as fresh URL:Login:Pass credentials. No further details are available from the post content.
    Date: 2026-05-11T19:50:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-FRESH-URL-LOG%C4%B0N-PASS-PRIVATE–2092489
    Screenshots:
    None
    Threat Actors: RobotxTR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  135. Free distribution of ULP combo list sourced from RedLine stealer logs
    Category: Combo List
    Content: A threat actor is distributing a URL:login:password (ULP) combo list purportedly sourced from RedLine stealer logs, dated 11-05-2026 and marketed as fresh and high quality. The post directs users to a private channel via Telegram for access. No specific victim organization or record count is identified.
    Date: 2026-05-11T19:50:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90%E2%AD%90FRESH-ULP-FROM-REDLINE-COUD-11-05-2026-UNRAPPED-UHQ-%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: kingdevl10
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  136. Sale of mixed email credential combo list with claimed valid hits
    Category: Combo List
    Content: A threat actor is sharing or distributing a mixed email credential combo list purportedly containing 17,000 valid hits. The post directs users to a private channel via Telegram handle @Redline_Support4 for access to additional data. The credentials are marketed as fully validated and sourced from private, unreleased data.
    Date: 2026-05-11T19:50:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%90%E2%AD%9017K-MIX-MAIL-ACCES-FULL-VALID-HITS%E2%AD%90-PRIVATE-UNRAPPED-DATA-%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: kingdevl10
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  137. Distribution of fresh RedLine stealer logs (1GB)
    Category: Logs
    Content: A threat actor is distributing approximately 1GB of stealer logs purportedly collected via RedLine on 11-05-2026, described as fresh and unprocessed. The post directs users to a private Telegram channel for access. No specific victim organization or country is identified.
    Date: 2026-05-11T19:49:53Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90%E2%AD%901GB-FRESH-UPP-LOGS%E2%AD%90-FROM-REDLINE-11-05-2026-UNRAPPED%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: kingdevl10
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  138. Combo List of mixed-country corporate email credentials
    Category: Combo List
    Content: A combo list containing 88,025 email:password credential pairs targeting mixed-country corporate accounts was shared on a cracking forum. The post was made by user AiCombo with no additional content available beyond the thread title.
    Date: 2026-05-11T19:49:49Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-88-025-Mixed-Country-Corp
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  139. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of 750 allegedly valid Hotmail credentials on a cracking forum. The post markets the credentials as verified mail access hits. No further details are available from the post content.
    Date: 2026-05-11T19:49:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8%E2%9A%9C%EF%B8%8F750X-VALID-Hotmail-MAIL-ACCESS-Cloucpr0-%E2%9A%9C%EF%B8%8F%E2%9C%A8-11-05
    Screenshots:
    None
    Threat Actors: cloudpr00
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  140. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is offering 750 valid Hotmail account credentials on a cybercrime forum. The content is gated behind registration or login. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-11T19:49:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%E2%9A%9C%EF%B8%8F750x-valid-hotmail-mail-access-cloucpr0-%E2%9A%9C%EF%B8%8F%E2%9C%A8-11-05
    Screenshots:
    None
    Threat Actors: ELJOKER1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  141. Sale of discounted Telegram Premium subscriptions
    Category: Services
    Content: A forum seller is offering Telegram Premium subscriptions at discounted prices for personal use, with plans ranging from 3 to 12 months. Contact is provided via Telegram handle.
    Date: 2026-05-11T19:49:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%AD%90Cheap-Telegram-Premium-Personal-Usage-No-Risks
    Screenshots:
    None
    Threat Actors: BjornIronSide
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  142. Combo List of 3,858 mixed mail credentials
    Category: Combo List
    Content: A combo list containing 3,858 mixed email credentials was shared on a forum. The content is hidden behind a registration or login wall. No specific breach source or target service is identified.
    Date: 2026-05-11T19:48:59Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85%E2%9A%A13858x-mixmail%E2%9A%A1%E2%9C%85
    Screenshots:
    None
    Threat Actors: NovaCloudx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  143. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A forum user is sharing a combo list advertised as 1,773 fresh Hotmail credential hits. The content is hidden behind a registration/login wall. No breach source or specific victim organization is identified.
    Date: 2026-05-11T19:48:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-x1773-fresh-hotmail-hits
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  144. Combo list allegedly containing 13K+ credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing over 13,000 credentials via an external paste link. The post is dated April 22, 2026 and references Micronesia in the title. No specific breached organization or service is identified.
    Date: 2026-05-11T19:48:01Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-13-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Micronesia-%E2%9C%AA-22-APR-2026-%E2%9C%AA–2292603
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  145. Free distribution of cookies and credentials for cPanel, GOG, Epic Games, and other platforms
    Category: Logs
    Content: A threat actor shared a paste link containing cookies and credentials for multiple platforms including cPanel, GOG, and Epic Games. The content was made available for free on a cracking forum. The post appears to distribute stealer log output containing session cookies and account credentials.
    Date: 2026-05-11T19:47:57Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-cookies-cpanel-gog-epicgames-more–2292594
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  146. Sale of Hotmail credential combo list with 750 valid entries
    Category: Combo List
    Content: A forum user is sharing a combo list of 750 validated Hotmail credentials, marketed as valid mail access. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T19:47:28Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%9C%A8%E2%9A%9C%EF%B8%8F750X-VALID-Hotmail-MAIL-ACCESS-%E2%9A%9C%EF%B8%8F%E2%9C%A8-11-05
    Screenshots:
    None
    Threat Actors: HOTMAILPR0
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  147. Sale of government email access and law enforcement portal credentials
    Category: Services
    Content: A threat actor is selling access to government email accounts and claims to provide access to law enforcement portals. The seller accepts middleman (MM) arrangements and directs interested buyers to contact via Telegram or Discord. No specific countries or agencies are identified.
    Date: 2026-05-11T19:44:49Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-sell-gov-mail
    Screenshots:
    None
    Threat Actors: ayowitty
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  148. Website defacement of maidenstride.qa by Nicotine of Umbra Community
    Category: Defacement
    Content: On May 12, 2026, a threat actor operating under the alias Nicotine, affiliated with the group Umbra Community, defaced the website maidenstride.qa hosted in Qatar. The defacement targeted a specific index page and was neither a mass nor a redefacement incident. No specific motivation or server details were disclosed in the available intelligence.
    Date: 2026-05-11T19:44:38Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919736
    Screenshots:
    None
    Threat Actors: Nicotine, Umbra Community
    Victim Country: Qatar
    Victim Industry: Unknown
    Victim Organization: Maiden Stride
    Victim Site: maidenstride.qa
  149. Sale of domain suspension and takedown service claiming registrar-level exploit method
    Category: Services
    Content: A threat actor operating under the alias convince is offering a commercial domain suspension and takedown service on Breachforums, claiming to force registrar-level administrative freezes on target domains. The actor alleges use of a proprietary method involving buffer overflow exploitation of registrar reporting APIs and header-spoofing scripts, priced at $500 per target or $2,000 for the full method. The technical claims are characteristic of social engineering or scam services commonly seen
    Date: 2026-05-11T19:41:50Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-PRIVATE-DOMAIN-SUSPENSION-METHOD-REGISTRAR-LEVEL-TAKEDOWNS-SERVICE-AVAILABLE
    Screenshots:
    None
    Threat Actors: convince
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  150. Website Defacement of Al-Ahram Plastic by Vazzle07
    Category: Defacement
    Content: On May 12, 2026, the homepage of Al-Ahram Plastic (alahramplastic.com) was defaced by a threat actor operating under the handle Vazzle07. The attacker performed a single targeted homepage defacement with no team affiliation recorded. The incident represents an initial defacement with no prior redefacement history on this domain.
    Date: 2026-05-11T19:38:28Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919735
    Screenshots:
    None
    Threat Actors: Vazzle07
    Victim Country: Egypt
    Victim Industry: Manufacturing / Plastics
    Victim Organization: Al-Ahram Plastic
    Victim Site: alahramplastic.com
  151. Sale of stolen CVV/CC data, dumps with PIN, and carding methods across multiple countries
    Category: Carding
    Content: A threat actor is selling stolen credit card data (CVV/CCS, fullz, dumps with PIN) for the USA, UK, AU, and EU, advertised as high balance with a claimed 98% validity rate. The seller also offers BINs and carding methods targeting retailers such as Amazon, Nike, Argos, and Footasylum, as well as fraudulent loading of CashApp and PayPal accounts. Contact is facilitated via Telegram, Signal, and email.
    Date: 2026-05-11T19:33:33Z
    Network: openweb
    Published URL: https://altenens.is/threads/update-done-cvv-ccs-instock-hitting-good-and-high-balance-98-valid-rate-i-do-refund-for-dead-cards-aswells.2938009/unread
    Screenshots:
    None
    Threat Actors: Band7
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  152. Alleged sale of webshell access by Pharaohs Team
    Category: Initial Access
    Content: Pharaohs Team threat actor group advertising the sale of webshell access. Post indicates active exploitation and monetization of compromised systems. ShadowX signature present.
    Date: 2026-05-11T19:25:30Z
    Network: telegram
    Published URL: https://t.me/Pharaoh_e/9
    Screenshots:
    None
    Threat Actors: Pharaohs Team
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  153. Sale of 759K casino-themed combo list
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list of approximately 759,000 email:password credentials described as a private base sourced from casino-related accounts. The post claims the list is usable for credential stuffing across multiple services.
    Date: 2026-05-11T19:09:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1759K-CASINO%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  154. Free release of EDU-targeted combo list
    Category: Combo List
    Content: A threat actor known as CELESTIALHQ has released a combo list of 10,000 email:password credentials targeted at educational institutions. The credentials are marketed as verified hits and are distributed freely on the forum. The actor also offers personal purchases via direct contact.
    Date: 2026-05-11T19:08:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-legendary-%E2%9C%85email-pass%E2%9C%85-%E2%AD%9010k-edu-targeted-combos%E2%AD%90-%E2%9C%85hits-assured%E2%9C%85-%E2%9A%A1drop-by-celestial%E2%9A%A1-301339
    Screenshots:
    None
    Threat Actors: CELESTIALHQ
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  155. Free distribution of 10K education-targeted combo list
    Category: Combo List
    Content: A threat actor operating under the alias CELESTIAL is freely distributing a combo list of 10,000 email:password credentials targeted at educational institutions. The post advertises hits as assured and offers additional personal purchases. Victim organization is unknown as the list aggregates credentials across multiple sources.
    Date: 2026-05-11T19:08:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%85EMAIL-PASS%E2%9C%85-%E2%AD%9010K-EDU-TARGETED-COMBOS%E2%AD%90-%E2%9C%85HITS-ASSURED%E2%9C%85-%E2%9A%A1DROP-BY-CELESTIAL%E2%9A%A1–2092449
    Screenshots:
    None
    Threat Actors: CELESTIAL
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  156. Free release of mixed email access combo list
    Category: Combo List
    Content: A threat actor operating under the alias CELESTIALHQ has freely distributed a combo list of approximately 200 mixed email access credentials, described as SUHQ (super ultra high quality) valid hits. The post invites engagement in exchange for future drops and offers personal purchases via direct contact.
    Date: 2026-05-11T19:08:28Z
    Network: openweb
    Published URL: https://patched.to/Thread-legendary-%E2%9C%85mail-access%E2%9C%85-%E2%AD%90200x-full-suhq-mix-valids-%E2%AD%90-%E2%9A%A1drop-by-celestial-admin%E2%9A%A1
    Screenshots:
    None
    Threat Actors: CELESTIALHQ
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  157. Free distribution of corporate-targeted email:password combo list
    Category: Combo List
    Content: A threat actor known as CELESTIAL is freely distributing a combo list of 20,000 email:password pairs described as corporate-targeted. The post markets the credentials as verified hits and offers additional personal purchases via direct message.
    Date: 2026-05-11T19:08:23Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%85EMAIL-PASS%E2%9C%85-%E2%AD%9020K-CORP-TARGETED-COMBOS%E2%AD%90-%E2%9C%85HITS-ASSURED%E2%9C%85-%E2%9A%A1DROP-BY-CELESTIAL%E2%9A%A1
    Screenshots:
    None
    Threat Actors: CELESTIAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  158. Free distribution of private email combo list
    Category: Combo List
    Content: A threat actor operating under the alias CELESTIALHQ has freely distributed a combo list of approximately 30,000 email:password credential pairs, marketed as private and anti-public. The post encourages engagement in exchange for additional drops and offers personal bulk purchases.
    Date: 2026-05-11T19:08:12Z
    Network: openweb
    Published URL: https://patched.to/Thread-legendary-%E2%9C%85email-pass%E2%9C%85-%E2%AD%9030k-full-anti-public-private-mail%E2%AD%90-%E2%9A%A1drop-by-celestial-admin%E2%9A%A1-301337
    Screenshots:
    None
    Threat Actors: CELESTIALHQ
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  159. Free release of private email:password combo list
    Category: Combo List
    Content: A forum user known as CELESTIAL has freely distributed a combo list of approximately 30,000 email:password credential pairs described as private and anti-public. The post encourages engagement and mentions the option for a personal purchase, suggesting additional private stock may be available.
    Date: 2026-05-11T19:08:06Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%85EMAIL-PASS%E2%9C%85-%E2%AD%9030K-FULL-ANTI-PUBLIC-PRIVATE-MAIL%E2%AD%90-%E2%9A%A1DROP-BY-CELESTIAL-ADMIN%E2%9A%A1–2092447
    Screenshots:
    None
    Threat Actors: CELESTIAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  160. Sale of combo list targeting Zalando, eBay, and Etsy
    Category: Combo List
    Content: A threat actor is offering a 677K combo list marketed for credential stuffing against Zalando, eBay, and Etsy. The post advertises a high hit rate and claims the data is private. The seller also promotes an ongoing combo cloud service.
    Date: 2026-05-11T19:07:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-shopping-%E3%80%8C-677k-%E3%80%8D%E2%9A%A1-zalando-ebay-etsy-%E2%9A%A1-100-private-data-%E2%9A%A1impressive-hitrate%E2%9A%A1-2026-new%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  161. Free release of 400K username:login:password combo list
    Category: Combo List
    Content: A forum user known as CELESTIAL has publicly released a combo list containing approximately 400,000 username:login:password credential pairs. The post markets the list as private and assures hits, indicating the credentials may have been tested. The author also offers personal purchases via direct contact.
    Date: 2026-05-11T19:07:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85U-L-P%E2%9C%85-%E2%AD%90400K-FULL-PRIVATE-U-L-P%E2%AD%90-%E2%9C%85HITS-ASSURED%E2%9C%85-%E2%9A%A1DROP-BY-CELESTIAL-ADMIN%E2%9A%A1–2092446
    Screenshots:
    None
    Threat Actors: CELESTIAL
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  162. Alleged combo list targeting cryptocurrency services
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 503,000 credentials marketed as a private base suitable for use against cryptocurrency services. The post is associated with a self-described combo cloud service offering high-quality data and private lines.
    Date: 2026-05-11T19:07:14Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A1503k-crypto%E2%9A%A1private-base-good-on-anything-you-need%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  163. Combo List: 10K HQ Hotmail Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 10,000 alleged high-quality Hotmail credentials. The list is marketed as containing verified hits suitable for credential stuffing. No additional details are available from the post content.
    Date: 2026-05-11T19:07:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%85-10K-HQ-HOTMAIL-HIT-%E2%9C%85–2091915
    Screenshots:
    None
    Threat Actors: THISNEW12
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  164. Combo list of 794K United States credentials offered for free
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 794,000 US-based credentials, marketed as a private base suitable for credential stuffing across multiple services. The content is hidden behind registration or login. The actor advertises a broader combo cloud service in their signature.
    Date: 2026-05-11T19:06:54Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A1794k-usa%E2%9A%A1private-base-good-on-anything-you-need%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  165. Sale of cryptocurrency user leads including wallet addresses and account data
    Category: Data Breach
    Content: A threat actor is selling a large quantity of cryptocurrency user leads claimed to be from a fresh, private source. The dataset allegedly includes email addresses, wallet addresses, referral codes, points balances, and account activity. No specific victim organization or volume is disclosed in the post.
    Date: 2026-05-11T19:06:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-SELLING-LARGE-AMOUNT-OF-CRYPTO-LEADS-FRESH-PRIVATE-AND-EXTREMELY-HIGH-QUALITY
    Screenshots:
    None
    Threat Actors: KuroCracks
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  166. Sale of 723K mixed credential combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 723,000 mixed credentials, described as a private base suitable for credential stuffing across multiple services. The post promotes an associated combo cloud service offering high-quality data and private lines.
    Date: 2026-05-11T19:06:20Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1723k-mix%E2%9A%A1private-base-good-on-anything-you-need%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  167. Sale of BLACKP1 Press-1 Bot with OTP and Vishing Capabilities
    Category: Phishing
    Content: A threat actor is selling BLACKP1, a web-based Press-1 (vishing) bot service featuring TTS script generation, multiple voice profiles, SIP routing, campaign management, and full API access for resale. The tool is marketed for conducting hyper-realistic fraudulent support calls and is advertised with a planned built-in OTP bot for credential interception. The service is accessible via blackp1.com and targets operators running phishing or social engineering call campaigns.
    Date: 2026-05-11T19:06:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-BLACKP1-PRESS-1-BOT-FEATURE-RICH-GET-YOUR-PICKUPS-TODAY
    Screenshots:
    None
    Threat Actors: KuroCracks
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  168. Sale of HQ mixed mail access combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 900 high-quality mixed mail credentials on a cybercrime forum. The content is gated behind registration or login. No specific victim organization or country is identified.
    Date: 2026-05-11T19:05:43Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-9k-hq-mixed-mail-access-combolist-301357
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  169. Sale of discounted YouTube Premium subscriptions
    Category: Services
    Content: A forum seller is offering YouTube Premium 1-year individual plan activations for $14 via activation codes applied to buyers own accounts. The seller claims the service works in any country and advertises via Telegram and Discord.
    Date: 2026-05-11T19:05:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%8E%9D%E2%9A%A1-YOUTUBE-PREMIUM-1YEAR-14-INDIVIDUAL-PLAN-OWN-ACCOUNT-NO-LOGIN-NEEDED-%E2%9A%A1%E2%8E%A0
    Screenshots:
    None
    Threat Actors: Totopi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  170. Sale of combo list targeting adult content platforms including XNXX, Xvideos, and Pornhub
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 612,000 credentials marketed as private data with a high hit rate against adult content platforms XNXX, Xvideos, and Pornhub. The post promotes the actors combo cloud service offering high-quality data and private lines.
    Date: 2026-05-11T19:05:26Z
    Network: openweb
    Published URL: https://patched.to/Thread-porn-%E3%80%8C-612k-%E3%80%8D%E2%9A%A1-xnxx-xvideos-pornhub-%E2%9A%A1-100-private-data-%E2%9A%A1impressive-hitrate%E2%9A%A1-2026-new%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  171. Combo List: Mixed Mail Access Credentials (2,938 entries)
    Category: Combo List
    Content: A threat actor shared a combo list of 2,938 mixed mail access credentials on a public forum. The content is hidden behind a registration/login wall and requires user engagement to access. No specific breach source or targeted service is identified.
    Date: 2026-05-11T19:04:54Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5-2938x-mix-mail-access-vault-%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: RyuuMaster
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  172. Combo list targeting Hotmail accounts (3,067 credentials)
    Category: Combo List
    Content: A threat actor shared a combo list of 3,067 Hotmail credentials on a leak forum. The content is hidden behind a registration or login wall. No breach of Microsoft or Hotmail is implied; the credentials are likely sourced from prior breaches and tested against Hotmail.
    Date: 2026-05-11T19:04:34Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%EF%B8%8F-3067x-Verity-Vault-Hotmail-Drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Verityyyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  173. Free distribution of Singapore email:password combo list
    Category: Combo List
    Content: A threat actor leaked a combo list of approximately 12,000 Singapore-based email and password pairs, marketed as fresh and dated April 24, 2026. The credentials were made available via an external paste link at no stated cost.
    Date: 2026-05-11T19:04:18Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-12-K-%E2%9C%A6-Singapore-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-24-4-2026-%E2%9C%A6%E2%9C%A6–2292530
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  174. Combo List: 1.3K Mix Mail Drop
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 1,300 email and password pairs described as a mixed mail drop. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T19:04:11Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%EF%B8%8F-1-3K-Verity-Vault-Mix-Mail-Drop-%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Verityyyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  175. Combo List of Nepalese Email:Password Credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list of over 10,000 email:password credential pairs purportedly associated with Nepal. The credentials are marketed as fresh, dated May 10, 2026, and distributed via an external paste site.
    Date: 2026-05-11T19:03:58Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-10-K-%E2%9C%A6-Nepal-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-10-5-2026-%E2%9C%A6%E2%9C%A6–2292559
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  176. Combo List: 2,871 Hotmail Credentials
    Category: Combo List
    Content: A forum user is sharing a combo list containing 2,871 Hotmail credentials, referred to as an Access Vault. The content is hidden behind a login/registration wall and like requirement. This appears to be a credential stuffing list targeting Hotmail accounts.
    Date: 2026-05-11T19:03:49Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-2871x-Hotmail-Access-Vault
    Screenshots:
    None
    Threat Actors: RyuuLord
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  177. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 3,900 Hotmail credentials. The content is hidden behind a forum registration or login requirement. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-11T19:03:32Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%AD%90%EF%B8%8F3-9k-HOTMAIL-ACCESS%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  178. Free Russian email:password combo list shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a Russian email:password combo list via an external paste link on a cracking forum. The post contains no details on record count or source. The credentials appear to be targeting Russian email accounts for credential stuffing purposes.
    Date: 2026-05-11T19:03:28Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-RUSSIA-EMAILPASS-COMBOLIST-txt–2292580
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  179. Sale of 4K Mix Mail Access Combo List
    Category: Combo List
    Content: A threat actor is sharing a mixed mail access combo list containing approximately 4,000 credentials. The content is gated behind forum registration or login. No specific breach source or targeted service is identified.
    Date: 2026-05-11T19:03:05Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%AD%90%EF%B8%8F4k-MIX-MAIL-ACCESS%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Cl0ud0wner
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  180. Sale of 144K targeted corporate combo list
    Category: Combo List
    Content: A threat actor is selling a combo list of approximately 144,000 credentials marketed as corporate-targeted, containing EMAIL:PASS and USER:PASS pairs across multiple countries including the USA, UK, France, Germany, Italy, Canada, and Australia. The list includes coverage across multiple email providers such as AOL, Yahoo, Hotmail, and Outlook. The seller is directing buyers to contact them via Telegram.
    Date: 2026-05-11T19:02:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-144K-CORPS-TARGETED-COMBOLIST
    Screenshots:
    None
    Threat Actors: Ra-Zi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  181. Alleged vulnerability or bypass for AI services including ChatGPT shared for free
    Category: Vulnerability
    Content: A forum user claims to have found a vulnerability and AI bypass affecting ChatGPT and other services, offering the content for free. The actual content is hidden behind a registration or login wall, so no further details are available. The post is unverified and the nature of the claimed vulnerability is unclear.
    Date: 2026-05-11T19:02:30Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Im-fund-vuln-ai-bypass-chatgpt-and-more-for-free-%E2%AD%95%EF%B8%8F
    Screenshots:
    None
    Threat Actors: LukasWeber
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: OpenAI
    Victim Site: chatgpt.com
  182. Alleged data leak of logitgc.fr login credentials
    Category: Data Leak
    Content: A threat actor has freely shared login credentials for logitgc.fr, claiming the account provides access to customer personally identifiable information. A single username and password pair was posted publicly on the forum.
    Date: 2026-05-11T18:48:32Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-https-logitgc-fr-login-credentials
    Screenshots:
    None
    Threat Actors: phas3lock
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Logit GC
    Victim Site: logitgc.fr
  183. Sale of fresh credit cards, fullz, and dumps across multiple regions
    Category: Carding
    Content: A threat actor operating under the Telegram handle @Veefromdhood is selling stolen payment card data including Visa, Mastercard, Amex, and Discover cards, BINs, DOBs, fullz, and card dumps with Track 1 & 2 data across the US, UK, Canada, Australia, and EU. Prices range from $37 for DOB data to $235 per card dump with PIN. The post advertises fresh credit cards and ATM dumps for sale via Telegram.
    Date: 2026-05-11T18:45:06Z
    Network: openweb
    Published URL: https://xforums.st/threads/list-price-for-fresh-credit-trusted-telegram-user-veefromdhood.613720/
    Screenshots:
    None
    Threat Actors: McRich
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  184. Sale of stolen payment cards, EBT cards, and dumps with PIN via fraud marketplace
    Category: Carding
    Content: A threat actor operating under the name JAXXJ1 Team is advertising a fraud marketplace offering daily-updated stolen EBTs with PIN, credit cards with CVV2, and dumps with PIN covering all US states. The seller claims over 30,000 existing customers and is actively recruiting additional sellers via Telegram and Discord.
    Date: 2026-05-11T18:40:22Z
    Network: openweb
    Published URL: https://altenens.is/threads/big-american-fraud-market-high-quality-we-update-daily-thousands-of-ebts-dumps-pin-ccs-cvv2-we-have-more-than-30-000-customers-already-with.2937990/unread
    Screenshots:
    None
    Threat Actors: K9S2A
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  185. Alleged data breach of Directorate General of Drug Administration, Bangladesh
    Category: Data Breach
    Content: A threat actor is offering for sale a database dump allegedly obtained from the Directorate General of Drug Administration (DGDA) of Bangladesh. The leaked data includes personally identifiable information such as names, emails, mobile numbers, designations, and hashed passwords of government drug administration personnel. Sample data provided includes user account records with bcrypt-hashed passwords and registration details.
    Date: 2026-05-11T18:38:35Z
    Network: openweb
    Published URL: https://breached.st/threads/directorate-general-of-drug-administration-government-of-bangladesh.87005/unread
    Screenshots:
    None
    Threat Actors: wh6ami
    Victim Country: Bangladesh
    Victim Industry: Government
    Victim Organization: Directorate General of Drug Administration
    Victim Site: dgdagov.info
  186. Alleged data leak of UniCredit
    Category: Data Leak
    Content: A threat actor posted a link to what is claimed to be a leaked dataset associated with UniCredit, a major Italian banking group. The data is being shared freely via an external file-hosting service. No further details regarding record count or specific data fields were provided in the post.
    Date: 2026-05-11T18:31:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-UNICREDIT-LEAK-DATA-2026
    Screenshots:
    None
    Threat Actors: Disease
    Victim Country: Italy
    Victim Industry: Finance
    Victim Organization: UniCredit
    Victim Site: unicredit.com
  187. Combo list of 670,000 email:password credentials marketed for streaming services
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 670,000 email and password pairs described as UHQ and marketed as suitable for credential stuffing against streaming services. The credentials are advertised as fresh data.
    Date: 2026-05-11T18:22:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%90-670-000-%E2%AD%90-MAILPASS-%E2%9A%A1UHQ-DATABASE-GOOD-FOR-STREAMING%E2%9A%A1-FRESH-DATA
    Screenshots:
    None
    Threat Actors: ZEWS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  188. Germany Mixed Target Combo List with 700,160 Lines
    Category: Combo List
    Content: A combo list of 700,160 email:password lines targeting German (.de) accounts across mixed services has been shared on a cracking forum. The credentials are marketed for credential stuffing against multiple unspecified targets.
    Date: 2026-05-11T18:22:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-700-160-Lines-%E2%9C%85-Germany-de-Combolist-Mixed-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  189. Sale of Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering 3,500 alleged fresh valid Hotmail credentials via a Telegram channel. The post also advertises a private cloud service for purchase via direct message.
    Date: 2026-05-11T18:22:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85%E2%9C%A8-3-5K-HQ-FRESH-VALID-HOTMAILS-%E2%9C%85%E2%9C%A8
    Screenshots:
    None
    Threat Actors: wasifurkchut
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  190. Sale of combo list targeting streaming and gaming services
    Category: Combo List
    Content: A threat actor is distributing a combo list of 3.6 million email and password pairs marketed as high-quality and fresh, targeting accounts on services including Spotify, Hulu, Steam, Minecraft, and Netflix. The post was shared on a public cracking forum. No further details are available as the post contained no body content.
    Date: 2026-05-11T18:21:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-3-6M-COMBOS-HQ-FRESH-Spotify-Hulu-Steam-Minecraft-Netflix
    Screenshots:
    None
    Threat Actors: Nuttela
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  191. Sale of Hotmail credential combo list (600 entries)
    Category: Combo List
    Content: A threat actor is sharing a combo list of 600 Hotmail login credentials, marketed as UHQ (ultra-high quality). The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T18:21:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-600x-hotmail-login-uhq-301327
    Screenshots:
    None
    Threat Actors: BuggracK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  192. Sale of discounted Coursera Plus subscription access
    Category: Services
    Content: A threat actor is selling Coursera Plus 1-year subscription access for $29.99, significantly below the official price of $399/year. The offer includes access to professional courses and certificates. The nature of the access (whether from compromised accounts or unauthorized resale) is not explicitly stated.
    Date: 2026-05-11T18:21:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-29%E2%9A%A1-Coursera-Plus-%E2%80%93-1-Year-Learning-Access-%E2%9C%85
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  193. Combo List of HQ Hotmail Credentials
    Category: Combo List
    Content: A threat actor is sharing 2,077 allegedly high-quality Hotmail credentials on a combolist forum. The post advertises daily supply of 4,000–12,000 fresh credentials, marketed as optimized for high-performance credential stuffing.
    Date: 2026-05-11T18:20:45Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-2077x-hq-hotmail-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  194. Sale of discounted ChatGPT Business team access invites
    Category: Services
    Content: A threat actor is selling ChatGPT Business team invite access at $19.99, advertised as below the official per-user price. The offering includes access to advanced AI models and priority features. Buyers are directed to contact the seller via Telegram.
    Date: 2026-05-11T18:20:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-19-99-%E2%9A%A1-ChatGPT-Business-Invite-%E2%80%93-Premium-Team-AI-Access-%E2%9C%85
    Screenshots:
    None
    Threat Actors: secur3rat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  195. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum member is sharing a combo list marketed as fresh Hotmail credentials. The content is hidden behind a registration or login wall, limiting further analysis.
    Date: 2026-05-11T18:20:22Z
    Network: openweb
    Published URL: https://patched.to/Thread-fresh-hotmail-301330
    Screenshots:
    None
    Threat Actors: ZAMPARA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  196. Nigerian email:password combo list freely shared
    Category: Combo List
    Content: A threat actor known as Fragtez has freely shared a combo list of approximately 19,000 email:password credential pairs purportedly sourced from Nigerian accounts. The list is marketed as fresh and dated April 29, 2026. The credentials are hosted on an external paste service.
    Date: 2026-05-11T18:19:41Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-19-K-%E2%9C%A6-Nigeria-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-29-4-2026-%E2%9C%A6%E2%9C%A6–2292501
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Nigeria
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  197. Free Hotmail combo list of 1,816 credentials
    Category: Combo List
    Content: A threat actor shared a free combo list containing 1,816 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits, suggesting they have been verified against Hotmail accounts.
    Date: 2026-05-11T18:19:38Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1816x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292521
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  198. Sale of mail:pass combo list for multiple countries including Belarus, Mongolia, and others
    Category: Combo List
    Content: A threat actor is offering a mail:pass combo list covering multiple countries including Belarus, Mongolia, Nepal, Bhutan, Bangladesh, Sri Lanka, Malaysia, Singapore, Philippines, New Zealand, Chile, Peru, Colombia, Venezuela, Cuba, and Jamaica. The credentials are available via Telegram channel and group. No record count or pricing details are specified in the post.
    Date: 2026-05-11T18:10:45Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74912/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  199. Sale of Office combo list
    Category: Combo List
    Content: A threat actor is offering an Office combo list via a Telegram channel and group. The post promotes free combo lists and tools through associated Telegram channels. No record count or specific data fields were disclosed.
    Date: 2026-05-11T18:10:25Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74915/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  200. Sale of mixed credential combo list with 474 entries
    Category: Combo List
    Content: A threat actor is selling a mixed credential combo list containing 474 entries. The post offers tiered subscription pricing and links to external download and cloud storage channels. No specific victim organization or service is identified.
    Date: 2026-05-11T18:10:03Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74922/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  201. Sale of educational email and password combo list
    Category: Combo List
    Content: A threat actor operating under the alias CODER is distributing educational sector email and password combo lists, marketed as fresh. The credentials are being shared via Telegram channels and available upon request.
    Date: 2026-05-11T18:09:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74933/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  202. Sale of Hotmail combo list with 603 credentials
    Category: Combo List
    Content: A threat actor is selling a combo list of 603 Hotmail credentials marketed as fresh drops. The post offers tiered pricing from $3 for a 24-hour trial up to $100 for three months of access, with download links provided via external paste and Telegram channels.
    Date: 2026-05-11T18:09:10Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74938/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  203. Sale of combo list targeting Reddit and other forums (8 million records)
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 8 million credentials purportedly targeting Reddit and other online forums. The list is being offered via Telegram channels, with both free and contact-based distribution advertised.
    Date: 2026-05-11T18:08:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74944/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  204. Sale of stealer logs by threat actor EchoCloud
    Category: Combo List
    Content: A threat actor operating as EchoCloud shared a download link to stealer logs via a file-hosting service. Access to the password is gated through a Telegram channel, suggesting the logs are being distributed to followers or customers.
    Date: 2026-05-11T18:08:23Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74949/
    Screenshots:
    None
    Threat Actors: EchoCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  205. Sale of alleged WordPress credentials or database dump
    Category: Combo List
    Content: A forum user is offering content related to WordPress on a cracking forum, with access gated behind registration and a password shared via Telegram. The full content of the post is not visible, but based on the forum context (Combolists & Dumps), it likely contains WordPress-related credentials or a database dump.
    Date: 2026-05-11T18:07:54Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74959/
    Screenshots:
    None
    Threat Actors: zod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  206. Sale of HQ mix combo list by threat actor s2lender
    Category: Combo List
    Content: Threat actor s2lender is offering a high-quality mixed combo list advertised as containing approximately 201,860 credential pairs. The listing claims daily supply of 4,000–12,000 fresh entries distributed through a private members-only network. The credentials are marketed as untouched and optimized for credential stuffing operations.
    Date: 2026-05-11T18:07:31Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74964/
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  207. Sale of personal data including SSNs, ID documents, and financial records
    Category: Carding
    Content: A threat actor is offering for sale a variety of personal data types including government-issued ID documents (drivers licenses, passports), Social Security Numbers (SSNs), bank card data, and consumer databases. The seller advertises access via Telegram and claims to have large-site database dumps and citizen records. No specific victim organization or country is identified.
    Date: 2026-05-11T18:05:44Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74921/
    Screenshots:
    None
    Threat Actors: jannatmirza11
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  208. Alleged illegal marketplace offering stolen payment cards and unauthorized access services
    Category: Initial Access
    Content: Multiple threat actors advertising illegal services in Squad Chat Marketplace: Pepecard offering stolen credit/debit cards (US $1, international $1.50) with 75-95% validity rates; DataxLogs offering mail access and combo lists across multiple countries; PORTAL offering RDP rental for cloud services (Azure, AWS, DigitalOcean) at $200, domain mail accounts, and GitHub student accounts.
    Date: 2026-05-11T18:05:11Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79743
    Screenshots:
    None
    Threat Actors: Pepecard
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  209. Sale of Indonesia loan data
    Category: Data Breach
    Content: A threat actor is offering Indonesian loan data for sale via Telegram. The post includes a sample image link but does not specify the source organization or record count.
    Date: 2026-05-11T18:02:30Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Indonesia-Loan-Data-Available
    Screenshots:
    None
    Threat Actors: Mikhel
    Victim Country: Indonesia
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  210. Sale of cracked DAZN accounts
    Category: Combo List
    Content: A forum post in the Cracked Accounts section advertises DAZN account credentials. No further details regarding record count, price, or data origin were provided in the post.
    Date: 2026-05-11T17:57:18Z
    Network: openweb
    Published URL: https://breached.st/threads/dazn.87003/unread
    Screenshots:
    None
    Threat Actors: jpaco69
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  211. Alleged data breach of 1win Casino Brazil
    Category: Data Breach
    Content: A threat actor is advertising an alleged database from 1win Casinos Brazil operations on a cybercrime forum. The post invites interested parties to contact the seller via Telegram for further details. No record count or sample data was provided.
    Date: 2026-05-11T17:56:13Z
    Network: openweb
    Published URL: https://breached.st/threads/brazil-1win-casino-database.87004/unread
    Screenshots:
    None
    Threat Actors: Kevin Williams
    Victim Country: Brazil
    Victim Industry: Gambling
    Victim Organization: 1win Casino
    Victim Site: 1win.com
  212. Website Defacement of Magasins Fekih by Inside Alone7 (Hidden Cyber Crime)
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, defaced a file on the domain magasinsfekih.com. The defacement targeted a specific file path rather than the homepage, suggesting a targeted file-level intrusion. The incident was recorded and mirrored by zone-xsec.com, a known defacement tracking platform.
    Date: 2026-05-11T17:51:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919730
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Tunisia
    Victim Industry: Retail
    Victim Organization: Magasins Fekih
    Victim Site: magasinsfekih.com
  213. Website Defacement of cepurhuye.rw by Inside Alone7 (Hidden Cyber Crime)
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, defaced a file on the Rwandan domain cepurhuye.rw. The defacement targeted a specific text file (1000.txt) rather than the homepage, indicating a targeted or opportunistic file-level intrusion. No specific motive or technical details regarding the server environment were disclosed.
    Date: 2026-05-11T17:49:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919732
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Rwanda
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: cepurhuye.rw
  214. Sale of Softbank Banking System Source Code targeting LATAM
    Category: Malware
    Content: A threat actor is offering for sale source code written in C# for a banking system attributed to Softbank, reportedly implemented across Latin American countries including Panama, Peru, Colombia, and Ecuador. Contact is provided via a Session messaging handle.
    Date: 2026-05-11T17:48:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Sistema-Bancario-Softbank
    Screenshots:
    None
    Threat Actors: V0lt4r0x
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Softbank
    Victim Site: Unknown
  215. Website Defacement of Scribal.be by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, defaced a file hosted on the Belgian website scribal.be. The defacement targeted a specific text file (1000.txt) rather than the sites homepage, indicating a targeted file-level intrusion. No additional technical details such as server software or IP address were disclosed.
    Date: 2026-05-11T17:47:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919728
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Belgium
    Victim Industry: Unknown
    Victim Organization: Scribal
    Victim Site: scribal.be
  216. Website defacement of PPS Security by Inside Alone7 (Hidden Cyber Crime)
    Category: Defacement
    Content: On May 12, 2026, a threat actor known as Inside Alone7, affiliated with the group Hidden Cyber Crime, defaced the website of PPS Security, a French security services company. The defacement targeted the domain pps-security.fr and was recorded as a single, non-mass and non-redefacement incident. No specific motive or proof of concept was disclosed.
    Date: 2026-05-11T17:45:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919729
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: France
    Victim Industry: Security Services
    Victim Organization: PPS Security
    Victim Site: pps-security.fr
  217. Combo List of Mixed Domain Credentials
    Category: Combo List
    Content: A combo list of approximately 1.5 million email:password pairs from mixed domains has been shared on a cracking forum. The credentials are marketed as fresh leaks. No further details are available from the post content.
    Date: 2026-05-11T17:44:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-519-236-Mixed-Domain-Fresh-Leaks
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  218. El proveedor de TI de notarías Notin, víctima de un nuevo ataque de ransomware cinco meses después
    Category: Cyber Attack
    Content: Le fournisseur de services informatiques Notin.es a été victime dune nouvelle attaque par rançongiciel, cette fois menée par le groupe Crypto24 utilisant le ransomware de Lockbit 5.0. Cette cyberattaque a affecté au moins quinze offices notariaux en Espagne, entraînant linterruption de leurs services et de leur messagerie électronique.
    Date: 2026-05-11T17:43:55Z
    Network: openweb
    Published URL: https://www.escudodigital.com/ciberseguridad/notin-proveeedor-ti-notarias-ataque-ransomware.html
    Screenshots:
    None
    Threat Actors: Everest
    Victim Country: Spain
    Victim Industry: Unknown
    Victim Organization: Notin
    Victim Site: notin.es
  219. Sale of mixed corporate and personal email credentials combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of 2,800 claimed valid mixed personal and corporate email credentials with full mailbox access. The credentials are marketed as fresh and high quality. No specific victim organization or breach source is identified.
    Date: 2026-05-11T17:43:50Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-2800-VALID-MIX-CORP-MAILPASS-FULL-MAIL-ACCES
    Screenshots:
    None
    Threat Actors: CloudBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  220. Sale of URL:Log:Pass combo list with 1.8 million records
    Category: Combo List
    Content: A threat actor operating under the name NapoleonCorp is offering a combo list of approximately 1.8 million URL:log:pass credential pairs, described as private. The list is formatted with associated URLs, usernames/logins, and passwords, consistent with stealer log-derived credential sets packaged for credential stuffing use.
    Date: 2026-05-11T17:43:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-1-8KK-NAPOLEON-CORP-UP-466-URL-LOG-PASS-PRIVATE
    Screenshots:
    None
    Threat Actors: NapoleonCorp
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  221. Sale and distribution of mixed mail access combo list
    Category: Combo List
    Content: A threat actor is distributing mixed mail access credentials described as private and fresh via a Telegram channel, with free drops available and private cloud access offered for sale. The post promotes contact via Telegram handles for purchasing or obtaining the combo list.
    Date: 2026-05-11T17:43:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1Mix-Mail-Access-Full-Private-Fresh
    Screenshots:
    None
    Threat Actors: wasifurkchut
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  222. Sale of discounted Manus Pro subscription credits
    Category: Services
    Content: A forum seller is offering Manus Pro 4,000 credits (12-month subscription) for $70, discounted from $240, advertised as requiring no login. The seller directs buyers to Discord and Telegram for purchase via Sellix.
    Date: 2026-05-11T17:42:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-Manus-Pro-4-000-Credits-12-Months-240-70-NO-LOGIN-%E2%9C%85
    Screenshots:
    None
    Threat Actors: Lamboproxy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  223. Sale of Hotmail combo list with 2,584 credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 2,584 Hotmail credentials, marketed as high quality and fresh. The post advertises a private members-only network supplying 4,000–12,000 credentials daily, optimized for credential stuffing use.
    Date: 2026-05-11T17:42:20Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-2584x-hq-hotmail-by-s2lender-txt-301317
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  224. Sale of upgraded/premium accounts for ChatGPT, Netflix, Steam and other services
    Category: Services
    Content: A forum seller is advertising a marketplace offering discounted premium account upgrades for services including ChatGPT, Netflix, and Steam. The post promotes a discount code and directs potential buyers to an external website and Discord server. No specific victim organization or breach is identified.
    Date: 2026-05-11T17:41:55Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-%E2%AD%90-UPGRADE-ACCOUNTS-%E2%AD%90CHEAPEAST-MARKET-CHAT-GPT-NETFLIX-STEAM-ETC-%E2%AD%90
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  225. Combo List of 1,464 Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 1,464 Hotmail credentials marketed as valid hits. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T17:41:49Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85%E2%9A%A11464x-good-hotmail%E2%9A%A1%E2%9C%85
    Screenshots:
    None
    Threat Actors: NovaCloudx
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  226. Sale of HQ mix combo list with 6,845 credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 6,845 mixed credentials marketed as high quality and fresh. The post advertises daily supply of 4K–12K credentials described as untouched and optimized for credential stuffing use.
    Date: 2026-05-11T17:41:32Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-6845x-hq-mix-by-s2lender-txt
    Screenshots:
    None
    Threat Actors: s2lender
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  227. Combo List — 2,152 Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 2,152 Hotmail login credentials marketed as UHQ (ultra-high quality). The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T17:41:15Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-2152x-hotmail-login-uhq
    Screenshots:
    None
    Threat Actors: BuggracK
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  228. Outlook.com email:password combo list shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of Outlook.com email and password pairs via an external paste link on a cracking forum. The credentials are marketed as high quality and intended for credential stuffing use.
    Date: 2026-05-11T17:41:07Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-OUTLOOK-COM-EMAILPASS-COMBOLIST-SHROUD20-txt–2292422
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  229. Sale of URL:Log:Pass combo list with 24.91 million records
    Category: Logs
    Content: A threat actor is sharing a URL:LOG:PASS stealer log dataset containing approximately 24.91 million records, advertised as UHQ (ultra-high quality). The logs are hosted on an external paste site and appear to be associated with the daxus.pro service.
    Date: 2026-05-11T17:40:46Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-24-91-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F–2292455
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  230. Combo list targeting Chile distributed on paste site
    Category: Combo List
    Content: A combo list containing over 94,000 credential pairs, described as targeting Chile, has been shared via an external paste site. The post was published on May 1, 2026, and the credentials are freely distributed without a listed price.
    Date: 2026-05-11T17:40:36Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-94-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Chile-%E2%9C%AA-1-MAY-2026-%E2%9C%AA–2292464
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  231. Sale of URL:Log:Pass combo list targeting daxus.pro
    Category: Combo List
    Content: A threat actor is sharing a URL:LOG:PASS combo list containing approximately 6.01 million records, marketed as UHQ (ultra-high quality) and associated with daxus.pro. The list was posted on a cracking forum and linked to an external paste service.
    Date: 2026-05-11T17:40:25Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-6-01-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F–2292484
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  232. Sale of 22K mixed mail access combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 22,000 mixed email and password credentials, marketed as fresh. The content is gated behind forum registration or login.
    Date: 2026-05-11T17:39:53Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-22K-FRESH-MIX-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: StrawHatBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  233. Sale of Hotmail combo list with 2,519 fresh hits
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as containing 2,519 fresh Hotmail credential hits. The content is gated behind a reply requirement. These credentials are likely intended for credential stuffing against Hotmail/Outlook accounts.
    Date: 2026-05-11T17:36:30Z
    Network: openweb
    Published URL: https://altenens.is/threads/check-mark-buttoncheck-mark-button-2519x-fresh-private-hotmail-hits-check-mark-button-check-mark-button.2937950/unread
    Screenshots:
    None
    Threat Actors: Angiecrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  234. Combo list of mixed mail credentials with claimed valid Hotmail hits
    Category: Combo List
    Content: A threat actor distributed a combo list of 3,858 mixed email credentials, claiming valid Hotmail hits. The list is made available via a download link and promoted through a Telegram contact.
    Date: 2026-05-11T17:31:21Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-%E2%9A%A1%E2%9A%A1-3858x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: xdalphaa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  235. Alleged data breach of Vietnamese gambling organization
    Category: Data Breach
    Content: A threat actor is offering what they claim is gambling-related data from Vietnam for sale. The post provides minimal details and directs interested parties to contact via Telegram for more information. No specific organization, record count, or data fields have been disclosed.
    Date: 2026-05-11T17:22:30Z
    Network: openweb
    Published URL: https://breached.st/threads/vietnam-gambling-data-available.87000/unread
    Screenshots:
    None
    Threat Actors: Kevin Williams
    Victim Country: Vietnam
    Victim Industry: Gambling
    Victim Organization: Unknown
    Victim Site: Unknown
  236. Sale of alleged Poland citizen database
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database of Polish citizens via a forum post. The seller advertises trial and premium data packages and directs interested buyers to a Telegram contact. No specific record count, data fields, or source organization are disclosed in the post.
    Date: 2026-05-11T17:21:59Z
    Network: openweb
    Published URL: https://breached.st/threads/poland-citizen-database.87001/unread
    Screenshots:
    None
    Threat Actors: Kevin Williams
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  237. Sale of PII database allegedly containing 2.794 million Indonesian individuals
    Category: Data Breach
    Content: A threat actor is offering for sale a dataset allegedly containing personally identifiable information of approximately 2.794 million Indonesian individuals. The data includes full names, email addresses, phone numbers, and employer/occupation details, with sample records indicating affiliation with Indonesian agricultural government bodies and universities. The seller is advertising the dataset on a cybercrime forum with contact details provided for purchase.
    Date: 2026-05-11T17:21:28Z
    Network: openweb
    Published URL: https://breached.st/threads/sell-pii-indonesia-2794k-include-name-gmail-number.87002/unread
    Screenshots:
    None
    Threat Actors: 053o
    Victim Country: Indonesia
    Victim Industry: Agriculture
    Victim Organization: Unknown
    Victim Site: Unknown
  238. Alleged data breach of Edge.app
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database from edge.app containing approximately 175,000 email addresses. The actor is directing interested buyers to contact them via Telegram for samples.
    Date: 2026-05-11T17:17:21Z
    Network: openweb
    Published URL: https://spear.cx/Thread-edge-app
    Screenshots:
    None
    Threat Actors: empathy101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Edge.app
    Victim Site: edge.app
  239. Distribution of URL:Login:Password credential logs
    Category: Logs
    Content: A forum user is distributing a collection of URL:Login:Password (ULP) formatted credential logs, marketed as high quality and private. The post does not specify targeted organizations, record counts, or geographic scope.
    Date: 2026-05-11T17:16:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-%E2%AD%90%EF%B8%8F%E2%98%81URL-LOGIN-PASS%E2%AD%90%EF%B8%8F-ULP-%E2%AD%90%EF%B8%8FHQ-PRIVATE%E2%AD%90%EF%B8%8F–76010
    Screenshots:
    None
    Threat Actors: MonkeyBase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  240. Free distribution of 350K stealer log credentials
    Category: Logs
    Content: A threat actor on a darknet forum leaked a dataset of 350,000 lines of stealer log credentials in URL:LOGIN:PASS format, totaling 24.6MB. The logs were made available for free download and are attributed to the Vermion Cloud log channel.
    Date: 2026-05-11T17:15:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-350K-vermionlogs-VERMION-CLOUD
    Screenshots:
    None
    Threat Actors: scandal
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  241. Alleged leak of administrative credentials for Nicaraguas public procurement system (NicaraguaCompra)
    Category: Logs
    Content: A threat actor shared an administrative account credential for Nicaraguas public procurement platform SISCAE (NicaraguaCompra), which manages state acquisition and contracting processes. The post includes a username and password for what is claimed to be an administrative-level account. The credential was distributed freely on a stealer logs forum.
    Date: 2026-05-11T17:14:54Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-administrative-account-to-gestion-nicaraguacompra-gob-ni
    Screenshots:
    None
    Threat Actors: Ranssi
    Victim Country: Nicaragua
    Victim Industry: Government
    Victim Organization: NicaraguaCompra (SISCAE)
    Victim Site: gestion.nicaraguacompra.gob.ni
  242. Sale of undetected PC malware
    Category: Malware
    Content: A threat actor is offering undetected PC malware for sale at $50. No specific malware type or target is specified in the post.
    Date: 2026-05-11T17:14:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-any-type-of-malware-for-50
    Screenshots:
    None
    Threat Actors: sharpie787
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  243. Sale of initial access to undisclosed Argentine SaaS shop management platform
    Category: Initial Access
    Content: A threat actor is selling database access and an active session token to an unnamed Argentine SaaS platform providing shop management services. The platform reportedly has 138 total shops with 26 active paying stores and a largest customer revenue of 104K USD. The offering includes database access and a session credential.
    Date: 2026-05-11T17:13:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Argentinan-SaaS-Platform-Shop-Management
    Screenshots:
    None
    Threat Actors: KurdishWorm
    Victim Country: Argentina
    Victim Industry: Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  244. Sale of initial access to undisclosed Japanese retail/e-commerce company via GlobalProtect VPN
    Category: Initial Access
    Content: A threat actor is selling enterprise admin-level VPN access (Palo Alto GlobalProtect) to an undisclosed Japanese retail/e-commerce organization with estimated revenue of $25M–$50M and approximately 1,000 hosts. The access is listed at $25 and was verified within the last 48 hours. The listing is cross-posted from the SiberianShelves darknet marketplace.
    Date: 2026-05-11T17:12:54Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-VPN-GlobalProtect-Retail-E-Commerce-Japan-25M-50M-revenue
    Screenshots:
    None
    Threat Actors: Toton
    Victim Country: Japan
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  245. Sale of initial access to multiple organizations across Turkey, Portugal, Brazil, Australia, and United Kingdom
    Category: Initial Access
    Content: A threat actor is offering for sale initial access to five organizations across multiple countries and sectors, including manufacturing (Turkey), telecommunications (Portugal), technology/SaaS (Brazil), energy/utilities (Australia), and insurance (United Kingdom). Access types include Cisco AnyConnect VPN, Exchange OWA, RDP, Citrix Gateway, and GlobalProtect VPN, with privilege levels ranging from domain user to root and network admin. The actor is accepting Bitcoin only.
    Date: 2026-05-11T17:12:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Accessess-fresh-new-listings
    Screenshots:
    None
    Threat Actors: Toton
    Victim Country: Unknown
    Victim Industry: Multiple
    Victim Organization: Unknown
    Victim Site: Unknown
  246. Sale of alleged Hong Kong financial sector database containing analyst and HNWI investor profiles
    Category: Data Breach
    Content: A threat actor is selling an alleged database of 312,745 records sourced from Hong Kongs financial sector, claimed to have been obtained via targeted network infiltration between April 18–22, 2026. The dataset purportedly includes profiles of financial analysts, HNWI investors, family offices, and VC/PE principals, with data aggregated from private CRM systems attributed to institutions such as HSBC Wealth, Morgan Stanley Asia-Pacific, and Citi Private Bank. The seller is offering segmented pur
    Date: 2026-05-11T17:11:19Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-PREMIUM-SALE-Exclusive-April-2026-Hong-Kong-Financial-Analysts-HNWI-Investors-DB–75984
    Screenshots:
    None
    Threat Actors: Leakbase
    Victim Country: Hong Kong
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  247. Sale of cross-platform RCS exploit chain with zero-day kernel modules and FUD crypter
    Category: Malware
    Content: A threat actor is selling a full Remote Control System (RCS) exploit chain targeting Windows 10/11, Android 12–16, and macOS, advertised as fully undetected (FUD) with an optional rootkit add-on. The package includes zero-day kernel modules, a custom crypter with nightly stub updates, multiple delivery vectors (PDF, DOCX, browser zero-click, SMS), and compatibility with common C2 frameworks including Cobalt Strike and Mythic. Pricing ranges from $700 for a demo sample to $9,000 for an unlimited-
    Date: 2026-05-11T17:10:45Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-%F0%9F%92%A5-WTS-Premium-RCS-Exploit-%E2%80%94-0-Day-Remote-Access-Chain-FUD-Cross-Platform-2026–75985
    Screenshots:
    None
    Threat Actors: Leakbase
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  248. Alleged data breach of Robinhood Crypto
    Category: Data Breach
    Content: A threat actor is selling an alleged dataset from Robinhood Crypto purportedly stemming from an April 2026 security incident. The 6 million-record compilation is claimed to include user profiles, 3.5 million credit card records with CVVs, KYC verification documents (passports, drivers licenses), crypto portfolio data, transaction histories, and password hashes. The complete dataset is priced at $8,000 in cryptocurrency, with segmented subsets available upon inquiry.
    Date: 2026-05-11T17:10:01Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-PREMIUM-EXCLUSIVE-Robinhood-Crypto-April-2026-Database-Leak-6M-Records-CCs-KYC–75986
    Screenshots:
    None
    Threat Actors: Leakbase
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Robinhood Crypto
    Victim Site: robinhood.com
  249. Alleged data breach of OKX crypto exchange with KYC, financial, and payment card data offered for sale
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump attributed to OKX, a major global cryptocurrency exchange, priced at $5,000. The dataset purportedly contains approximately 1 million full user profiles including full names, email addresses, phone numbers, residential addresses, government ID numbers, KYC documents (ID scans, selfies), credit card details (BIN, expiry, CVV), transaction histories, and account balances. The seller claims the dump is dated April 2026, has not been previously sold
    Date: 2026-05-11T17:09:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-OKX-Crypto-Database-Full-Info-IDs-Credit-Cards-Fresh-Private-Dump-2026-%F0%9F%9B%91
    Screenshots:
    None
    Threat Actors: Leakbase
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: OKX
    Victim Site: okx.com
  250. Sale of 20,000 alleged US Coinbase user leads
    Category: Data Breach
    Content: A threat actor is selling approximately 20,000 alleged Coinbase user leads sourced from the United States. The dataset reportedly includes first name, last name, email, phone number, source, and country fields. The seller claims the data originates from a private source.
    Date: 2026-05-11T17:08:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-20kFresh-US-CB-Leads-Private-Souce
    Screenshots:
    None
    Threat Actors: vegitaxi
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Coinbase
    Victim Site: coinbase.com
  251. Alleged sale of classified DARPA AI/Autonomy Systems threat analysis report
    Category: Data Breach
    Content: A threat actor is claiming to sell a 199-page alleged classified DARPA technical report (SECRET//NOFORN), purportedly dated February 14, 2026, detailing vulnerabilities in U.S. AI-driven autonomous weapons, ISR systems, and command infrastructure. The post includes claimed financial impact figures, exploitation vectors, and geolocated facility data attributed to the document. The authenticity of the document has not been verified.
    Date: 2026-05-11T17:08:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-DARPA-AI-AUTONOMY-SYSTEMS-THREAT-ANALYSIS-2026-Full-Technical-Report–76049
    Screenshots:
    None
    Threat Actors: mosad
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: DARPA
    Victim Site: darpa.mil
  252. Alleged data breach of Mansoura University, Egypt
    Category: Data Breach
    Content: A threat actor is selling approximately 10GB of data allegedly stolen from Mansoura University in Egypt. The dataset reportedly includes a CSV of ~989,000 student records spanning 2006 to 2026 with fields such as national IDs, passwords, and enrollment details, as well as thousands of research documents, internal documents, and student images.
    Date: 2026-05-11T17:07:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Egypt-Mansoura-University-10GB-1M-pii-images-docs
    Screenshots:
    None
    Threat Actors: INT3X
    Victim Country: Egypt
    Victim Industry: Education
    Victim Organization: Mansoura University
    Victim Site: Unknown
  253. Sale of initial access to Packeta (packeta.ro)
    Category: Initial Access
    Content: A threat actor is offering full access to Packeta, an e-commerce logistics platform operating across over 30 European countries, for $10,000. The post provides contact details via a Session messenger address. No further details about the nature or extent of the access are disclosed.
    Date: 2026-05-11T17:07:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-packeta-ro-full-acces
    Screenshots:
    None
    Threat Actors: vegitaxi
    Victim Country: Romania
    Victim Industry: Logistics
    Victim Organization: Packeta
    Victim Site: packeta.ro
  254. Alleged data breach of egrar.sa (Saudi Arabia)
    Category: Data Breach
    Content: A threat actor is offering two database files (xlsx format) allegedly obtained from egrar.sa, a Saudi digital platform for professional advisory and accounting services. The first database contains admin names, emails, and mobile phones; the second contains approximately 3,048 customer records with similar fields. The actor provides screenshots and a CSV sample as proof.
    Date: 2026-05-11T17:06:30Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Saudi-Arabia-2DBs-from-egrar-sa–76183
    Screenshots:
    None
    Threat Actors: BigBrother
    Victim Country: Saudi Arabia
    Victim Industry: Finance
    Victim Organization: Egrar
    Victim Site: egrar.sa
  255. Website Defacement of Cafe Falcon by Tigris BD
    Category: Defacement
    Content: On May 12, 2026, the homepage of cafefalcon.com was defaced by a threat actor identified as Tigris BD. The attack targeted the sites index page and constitutes a homepage defacement. No specific motivation or proof of concept was disclosed in the available intelligence.
    Date: 2026-05-11T17:06:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919713
    Screenshots:
    None
    Threat Actors: Tigris BD
    Victim Country: Unknown
    Victim Industry: Food and Beverage / Hospitality
    Victim Organization: Cafe Falcon
    Victim Site: cafefalcon.com
  256. Alleged data breach of FamilyBox (TEALCA Group) exposing 1.1 million customer records
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from familybox.store, an online supermarket affiliated with Venezuelan logistics company TEALCA Group. The dataset purportedly contains 1.1 million rows of customer PII including full names, email addresses, phone numbers, physical addresses, and transaction amounts in both VES and USD. A CSV sample and screenshot are provided as proof of access.
    Date: 2026-05-11T17:05:56Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Venezuela-1-100-000-PII-from-familybox-store–76185
    Screenshots:
    None
    Threat Actors: BigBrother
    Victim Country: Venezuela
    Victim Industry: Retail
    Victim Organization: FamilyBox / TEALCA Group
    Victim Site: familybox.store
  257. Alleged data breach of Monstercars
    Category: Data Breach
    Content: A threat actor is selling an alleged database from monstercars.nl containing approximately 57,000 records. The dataset reportedly includes customer information, addresses, and order data. The seller accepts escrow or middleman transactions.
    Date: 2026-05-11T17:05:21Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-monstercars-nl-57K-Netherlands-DataBase
    Screenshots:
    None
    Threat Actors: wizard
    Victim Country: Netherlands
    Victim Industry: Retail
    Victim Organization: Monstercars
    Victim Site: monstercars.nl
  258. Sale of admin access to multiple Angolan government websites and webmail panels
    Category: Initial Access
    Content: A threat actor is offering admin access to multiple Angolan government websites and webmail panels, including claimed access to the Angolan police and military police. Access is priced at $20 per website panel and $15–$30 per webmail, with prices described as negotiable.
    Date: 2026-05-11T17:03:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-Admin-Access-to-multiple-government-websites-and-webmail-panels
    Screenshots:
    None
    Threat Actors: DuperKinger123
    Victim Country: Angola
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  259. Cyberangriff auf Baufirma Heberger – Schifferstadt
    Category: Cyber Attack
    Content: Lentreprise de construction Heberger, basée à Schifferstadt, a été victime dune cyberattaque la semaine dernière. Lincident, confirmé par une porte-parole de lentreprise, aurait eu lieu le jeudi 7 mai tôt le matin. Malgré des normes élevées en matière de sécurité informatique, lentreprise a été touchée par cette intrusion.
    Date: 2026-05-11T17:03:47Z
    Network: openweb
    Published URL: https://www.rheinpfalz.de/lokal/ludwigshafen_artikel,-cyberangriff-auf-baufirma-heberger-_arid,5889199.html
    Screenshots:
    None
    Threat Actors:
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Heberger
    Victim Site: heberger.com
  260. Sale of government and ministry email accounts across multiple countries
    Category: Initial Access
    Content: A threat actor is selling access to government webmail and ministry accounts across multiple countries including Angola, Tanzania, Zambia, Poland, Brazil, Colombia, Vietnam, and the United States. Offerings include admin-level access with the ability to create new government email addresses, priced between $5 and $100. Accounts span law enforcement, defense, economics, education, and criminal registry systems.
    Date: 2026-05-11T17:03:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-gov-mails-admin-ministry-accounts-for-sale
    Screenshots:
    None
    Threat Actors: limith
    Victim Country: Unknown
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  261. Sale of mobile and residential Android proxy service via dark forum
    Category: Services
    Content: A threat actor operating under the name LTeasy is advertising a commercial mobile and residential Android proxy service on a dark forum. The service offers rotating and sticky SOCKS5/HTTPS proxies across multiple global regions using real mobile devices on carriers such as Verizon, T-Mobile, and AT&T. Promotional discounts and an affiliate program are offered to forum members.
    Date: 2026-05-11T17:02:32Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-LTeasy-Mob-Resi-Android-Proxies-Worldwide-LTE-4G-5G-Wi-Fi-SOCK5-HTTPS-50-OFF
    Screenshots:
    None
    Threat Actors: LTeasy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  262. Sale of full access to 1,169 Australian websites
    Category: Initial Access
    Content: A threat actor is offering full administrative access to 1,169 Australian websites for $400, to be sold to a single buyer. Access is provided in url:user:pass format, with claimed access to databases, source code, and emails via the compromised panels. The seller is associated with the PwnerSec group on X (Twitter).
    Date: 2026-05-11T17:01:57Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-1169-Australian-websites-Full-Access
    Screenshots:
    None
    Threat Actors: NormalLeVrai
    Victim Country: Australia
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  263. Sale of activated Google Voice accounts
    Category: Services
    Content: A threat actor is offering activated and working Google Voice accounts for sale at $10 each. Contact is provided via Telegram. No details are given regarding the origin or quantity of the accounts.
    Date: 2026-05-11T17:01:19Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-activated-working-google-voice-account-s
    Screenshots:
    None
    Threat Actors: NovaV1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  264. Alleged sale of China citizens database with phone numbers and full names
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database of Chinese citizens containing phone numbers and full names, totaling 1.2 billion records. The data is distributed in RAR/TXT format with an uncompressed size of approximately 4.95 GB. Sample data includes Chinese mobile numbers paired with full names across multiple regions.
    Date: 2026-05-11T17:00:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-China-All-Citizens-Database-Phone-Full-Name-1-2-Billion-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: China
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  265. Alleged data breach of u-travel.hk (Hong Kong business commute and car rental service)
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from u-travel.hk, a Hong Kong-based business commute and car rental service. The dataset contains approximately 953,000 records including full names, phone numbers, Chinese name characters, gender, order amounts in HKD, order IDs, and transaction dates. Sample records indicate data spans 2024 and is provided in XLSX format (~81 MB).
    Date: 2026-05-11T17:00:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Hong-Kong-Business-Commute-Car-Rental-Leak-u-travel-hk-953-000
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: Hong Kong
    Victim Industry: Transportation
    Victim Organization: U-Travel
    Victim Site: u-travel.hk
  266. Alleged data breach of Indonesia population database
    Category: Data Breach
    Content: A threat actor is selling an alleged Indonesian population database containing 30 million records in CSV format, approximately 2.8 GB uncompressed. The dataset includes full names, phone numbers, dates of birth, sex, and residential addresses. The origin of the breach is unspecified, though the data appears to originate from a government or civil registration source.
    Date: 2026-05-11T16:59:29Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Indonesia-Population-Database-30-Million-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  267. Alleged data breach of Japan population database
    Category: Data Breach
    Content: A threat actor is selling an alleged database of 20 million records pertaining to the Japanese population. The dataset is offered in CSV format (~5 GB uncompressed) and includes fields such as a national ID, date of birth, full name, city, address, and phone number. The origin and source of the breach have not been disclosed.
    Date: 2026-05-11T16:58:55Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Japan-Population-Database-20-Million-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: Japan
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  268. Alleged data breach of Korean population records with 9 million individuals
    Category: Data Breach
    Content: A threat actor is selling an alleged Korean population database containing 9 million records in CSV format, approximately 3.4 GB uncompressed. The dataset includes full name, national ID number, sex, date of birth, phone number, email address, and residential address. The origin of the breach is unspecified; contact is provided via Telegram.
    Date: 2026-05-11T16:58:20Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Korea-Population-Database-9-Million-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: South Korea
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  269. Sale of cryptocurrency database leak bundle pack containing 21.2 million lines
    Category: Combo List
    Content: A threat actor is selling a bundle pack of approximately 21.2 million lines aggregated from multiple cryptocurrency-related sources, including email:password combos, email leads, and customer records with phone numbers. The bundle claims to include data associated with platforms such as Poloniex, Coinbase, Binance, Ledger, KuCoin, Localbitcoins, and others across mixed countries. The pack is offered in txt, rar, csv, and xlsx formats totaling approximately 3.7 GB.
    Date: 2026-05-11T16:57:46Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Crypto-Currency-Database-Leak-Bundle-Pack-21-2-Million-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  270. Alleged data breach of Taiwan health and insurance database
    Category: Data Breach
    Content: A threat actor is selling a CSV database purportedly containing 2.9 million records from Taiwans health, medical, and life insurance sector. The dataset is approximately 387 MB in size. Sample data is available to registered forum members upon reply or account upgrade.
    Date: 2026-05-11T16:57:13Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Taiwan-Health-Medical-Life-Insurance-Database-2-9-Million-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: Taiwan
    Victim Industry: Healthcare
    Victim Organization: Unknown
    Victim Site: Unknown
  271. Alleged data breach of Chinese shopping delivery address database
    Category: Data Breach
    Content: A threat actor is selling a database purportedly containing 810 million lines of Chinese shopping delivery address records. The dataset is approximately 18GB compressed and is offered in text format. The sellers identity and the source organization of the data are not disclosed.
    Date: 2026-05-11T16:56:39Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-China-Shopping-Delivery-Address-Database-810-Million-Lines
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: China
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  272. Alleged data leak of Chinese phone number and IMEI database
    Category: Data Leak
    Content: A threat actor is offering a dataset purportedly containing 1.12 billion lines of Chinese phone numbers paired with IMEI identifiers. The data is available in RAR, tar.gz, and TSV formats with an uncompressed size of approximately 10.2 GB. The origin of the data and the breached organization are not identified in the post.
    Date: 2026-05-11T16:56:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-China-Phone-IMEI-Leak-Database-1-12-Billion-Lines–75975
    Screenshots:
    None
    Threat Actors: MisterD
    Victim Country: China
    Victim Industry: Telecommunications
    Victim Organization: Unknown
    Victim Site: Unknown
  273. Sale of BLS International databases, source code, SSH keys, and biometric data
    Category: Data Breach
    Content: A threat actor is selling data allegedly exfiltrated from BLS International, an Indian visa and passport processing company. The offering includes up to 29 million database rows, backend source code, Amazon S3 bucket dumps, API and SMTP keys, biometric data (passport scans, liveness videos, facial and government documents), and MySQL root and SSH access to company servers, totaling 28 GB compressed.
    Date: 2026-05-11T16:55:22Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-BLS-INTERNATIONAL-DATABASES-Source-Codes-SSH-Private-Keys
    Screenshots:
    None
    Threat Actors: scatt3r
    Victim Country: India
    Victim Industry: Government
    Victim Organization: BLS International
    Victim Site: blsinternational.com
  274. Sale of alleged SAWTAD R&D archive including SAW sensor IP, patents, and internal documents
    Category: Data Breach
    Content: A threat actor is selling a 2.19 GB archive purportedly containing the full intellectual property of the SAW-TAD (Smart Absorbent Wireless Technology for Absorbent Devices) project, including R&D documentation, provisional patents, PCB/Gerber files, firmware, prototype test reports, signed NDAs, and patent attorney correspondence. The archive also allegedly includes documents from SPMet (Sociedade Portuguesa de Metrologia), including conference archives, financial reports, and council meeting mi
    Date: 2026-05-11T16:54:46Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-SAWTAD-Full-Archive-Leak-%E2%80%93-SAW-Sensor-Diaper-Tech-Metrology-Vault
    Screenshots:
    None
    Threat Actors: zestix
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: SAWTAD / SAW-TAD Project
    Victim Site: Unknown
  275. Sale of credentials lookup service from stealer log database
    Category: Services
    Content: A threat actor is offering a paid service to extract email:password credentials for specific websites, applications, or games from a self-described private stealer log database accumulated over seven years. The service is priced at $20 per request, with variable pricing based on volume and requirements. The actor claims global geographic coverage.
    Date: 2026-05-11T16:54:11Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-I-ll-get-your-request-link-from-the-email-pass-accounts-url-logins-access
    Screenshots:
    None
    Threat Actors: coloradoemails
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  276. Alleged data breach of Evalang
    Category: Data Breach
    Content: A threat actor is selling an alleged database attributed to Evalang, containing 3 million records — approximately 2.5 million French contacts and 500,000 international contacts. The seller references an external proof link as evidence of the breach.
    Date: 2026-05-11T16:53:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-FR-Ev-lang-3M
    Screenshots:
    None
    Threat Actors: 111grp
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Evalang
    Victim Site: Unknown
  277. Sale of fraudulent identity documents, PSD templates, and personal data scans
    Category: Carding
    Content: A threat actor operating as Kingscan is selling fraudulent and counterfeit identity documents including ID cards, drivers licenses, passports, and selfies, as well as editable PSD templates for document forgery. The seller claims to offer customized fake documents for over 60 countries within 2-3 hours of receiving personal details. Products also include bank statements, utility bills, SSNs, and certificates, marketed for use in identity fraud and KYC bypass.
    Date: 2026-05-11T16:53:02Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-High-Quality-ID-DL-Passports-Selfies-Scans-Bills-Certs-PSD-Templates
    Screenshots:
    None
    Threat Actors: Kingscan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  278. Sale of forged or stolen identity documents from over 200 countries
    Category: Services
    Content: A threat actor is selling identity documents including passports, drivers licenses, ID cards, and selfies from over 200 countries. The seller claims a stock of over 200,000 private documents available individually or as sets. Contact is offered via Telegram.
    Date: 2026-05-11T16:52:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-%E2%9C%85-BUY-DOCUMENTS-FROM-EVERY-COUNTRY%E2%9C%85-%E2%AD%90%E2%9A%A1-PASSPORT%E2%9A%A1-ID%E2%9A%A1-DL%E2%9A%A1-SELFIE%E2%9A%A1-%E2%AD%90
    Screenshots:
    None
    Threat Actors: Brazzers
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  279. Alleged sale of Chinese Peoples Liberation Army military documents and test data
    Category: Data Breach
    Content: A threat actor is offering for sale alleged data from multiple Chinese Peoples Liberation Army (PLA) entities, including the Cyberspace Force Technology Research Institute, Rocket Force, Joint Staff Intelligence Directorate, and several other military research institutes. The seller claims to possess test data and reports and is targeting think tanks and similar organizations as prospective buyers. Samples are offered to serious buyers; no specific record count or file size was disclosed.
    Date: 2026-05-11T16:51:37Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-CHINA-SECRET-MILITARY-Rocket-Force-Foreign-Affairs-Cyberforce-TEST-DATA-REPORTS
    Screenshots:
    None
    Threat Actors: mosad
    Victim Country: China
    Victim Industry: Government
    Victim Organization: Chinese Peoples Liberation Army
    Victim Site: Unknown
  280. Sale of 9,500 passport and national identity card documents from France and Turkey
    Category: Carding
    Content: A threat actor is offering for sale 9,542 passport and national identity card documents, primarily from France and Turkey, for $1,000. The dataset is approximately 4.01 GB compressed. The seller claims to provide samples and evidence via the Session messaging platform.
    Date: 2026-05-11T16:51:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-9500-Passport-and-National-Identity-Card
    Screenshots:
    None
    Threat Actors: NormalLeVrai
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  281. Sale of Streaming and Software Accounts via ACCOUNTS.CX Storefront
    Category: Services
    Content: A forum seller is advertising a commercial account-selling service at ACCOUNTS.CX offering accounts for Netflix, Adobe, ChatGPT, MAX, VPN, and other platforms with an auto-replace guarantee. The post includes extensive SEO tag spam related to Discord Nitro and other subscription services. The seller appears to be operating an automated storefront reselling compromised or unauthorized accounts.
    Date: 2026-05-11T16:50:23Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-%E2%AD%90-ACCOUNTS-CX-%E2%AD%90-AUTO-REPLACE-%E2%9C%85-%E2%9A%A1%EF%B8%8FNETFLIX-%E2%9A%A1ADOBE-%E2%9A%A1%EF%B8%8FGPT-%E2%9A%A1MAX-%E2%9A%A1VPN-%E2%9A%A1UPGRADES-MORE
    Screenshots:
    None
    Threat Actors: bl4cklak3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  282. Sale of multi-capability offensive tools and services including DDoS, vulnerability scanning, and RCE
    Category: Services
    Content: A threat actor is offering a bundle of offensive services and tools priced at $0.25, including DDoS attacks, SMS verification, vulnerability finding, RCE, bot finding, password cracking, and scanning. The post links to an external page at gta6.page, likely serving as a storefront or additional details page. No specific victim or target is identified.
    Date: 2026-05-11T16:49:42Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-DDoS-SMS-VERIFY-VULN-FINDER-RCE-BOT-FINDER-PASS-CRACK-SCANS-0-25
    Screenshots:
    None
    Threat Actors: c00lssh
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  283. Alleged data breach of Emergia Contact Center and Conalcréditos
    Category: Data Breach
    Content: Threat actors claiming collaboration between Petro_Escobar and NyxarGroup allege exfiltration of approximately 12 TB of data from Emergia Contact Center and its debt collection unit Conalcréditos, as well as Spain-based PLUS CONTACTO SERVICIOS INTEGRALES SL. The actors claim to have gained access by exploiting vulnerabilities in a perimeter Cisco ASA, pivoting through Fortinet infrastructure spanning Spain and Colombia, and ultimately gaining full domain control including GSuite and corporate em
    Date: 2026-05-11T16:47:24Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-CO-Emergia-CC-LEAK-12-TB
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Finance
    Victim Organization: Emergia Contact Center
    Victim Site: emergiacc.com
  284. Sale of Apple Business Manager corporate accounts with full admin access
    Category: Services
    Content: A threat actor is selling Apple Business Manager (ABM) company accounts from multiple regions including the US, Europe, Asia, and the Middle East. The accounts are advertised as verified company profiles with full admin access and ready for device enrollment and enterprise use. Pricing and availability are offered via Telegram.
    Date: 2026-05-11T16:46:50Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-ABM-for-sell-Apple
    Screenshots:
    None
    Threat Actors: Appledark
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  285. Alleged data breach of SmartQuick
    Category: Data Breach
    Content: Threat actors affiliated with NyxarGroup are offering for sale 2 TB of QA and web production data allegedly exfiltrated from SmartQuick, a Colombian logistics technology platform. The dataset reportedly includes client records containing names, ID numbers, phone numbers, addresses, email addresses, and GPS coordinates. Clients of the platform whose data may be exposed include major Colombian companies such as Accenture, Nestlé de Colombia, Cruz Verde, Petrobras, and others.
    Date: 2026-05-11T16:46:15Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-CO-SMARTQUICK-3-TB-LEAK
    Screenshots:
    None
    Threat Actors: Petro_Escobar
    Victim Country: Colombia
    Victim Industry: Technology
    Victim Organization: SmartQuick
    Victim Site: smartquick.com.co
  286. Alleged data leak of Hospital Clínica San Agustín patient records
    Category: Data Leak
    Content: A threat actor claims to have extracted PII for 170,000 patients and 44,000 laboratory test results from Hospital Clínica San Agustín in Ecuador approximately one month ago. The actor states they attempted to negotiate with the organization, which did not respond, and is now making the data available via hidden content on the forum. Sample data and a contact email are provided.
    Date: 2026-05-11T16:45:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-170k-pacientes-Ecuador-Hospital-Cl%C3%ADnica-San-Agust%C3%ADn
    Screenshots:
    None
    Threat Actors: Alameda_slim
    Victim Country: Ecuador
    Victim Industry: Healthcare
    Victim Organization: Hospital Clínica San Agustín
    Victim Site: hcsa.ec
  287. Alleged data breach of Polymarket
    Category: Data Breach
    Content: A threat actor is offering for sale a 2GB dataset allegedly extracted from Polymarket, a prediction market platform. The archive purportedly includes user interaction data, comments, event logs, gamma and liquidity metrics, and follower/wallet relationship records spanning 2025-2026. The seller is accepting offers in Monero or Bitcoin and claims to also possess the platforms source code.
    Date: 2026-05-11T16:44:59Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Polymarket-2GB-Comprehensive-Archive-Comments-Events-Gamma-Data
    Screenshots:
    None
    Threat Actors: BigDataSeller
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Polymarket
    Victim Site: polymarket.com
  288. Sale of Facebook session cookies targeting Vietnamese users
    Category: Logs
    Content: A threat actor is selling Facebook session cookies belonging to Vietnamese users for $5. The seller is seeking long-term business cooperation and can be contacted via Telegram.
    Date: 2026-05-11T16:44:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Facebook-cookies-for-sale-in-Vietnam
    Screenshots:
    None
    Threat Actors: lyheang
    Victim Country: Vietnam
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: facebook.com
  289. Sale of real-time order data from shopping websites in Hungary and neighboring countries
    Category: Data Breach
    Content: A threat actor is selling real-time order data allegedly sourced from e-commerce platforms operating in Hungary, Czech Republic, and Slovakia. The data includes customer names, email addresses, phone numbers, postal addresses, and order details. Sample records contain personally identifiable information for individual shoppers.
    Date: 2026-05-11T16:43:36Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Selling-Selling-real-time-order-data-from-shopping-websites-in-Hungary-Czech-Republic-Slova
    Screenshots:
    None
    Threat Actors: yijianqingan
    Victim Country: Hungary
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  290. Alleged data leak of IndoAmerican Seafoods database
    Category: Data Leak
    Content: A threat actor leaked a database allegedly obtained from indoamericanseafoods.com via SQL injection. The dump contains 19 participant records and 4 admin records including names, emails, phone numbers, addresses, and dates of birth. The data was made available for free download in CSV format with no password protection.
    Date: 2026-05-11T16:42:16Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Leak-IndoAmerican-Seafoods-Database-Peserta-Admin-19-records
    Screenshots:
    None
    Threat Actors: Y4nz404
    Victim Country: Indonesia
    Victim Industry: Food & Beverage
    Victim Organization: IndoAmerican Seafoods
    Victim Site: indoamericanseafoods.com
  291. Alleged data breach of Guatemalas Judiciary (OJ) criminal records database
    Category: Data Breach
    Content: A hacktivist group claiming affiliation with DIEHUNDEHACKER alleges to have compromised the Guatemalan Judiciarys systems and obtained approximately 13.5 million records, including criminal record certificates and access credentials to the portal. The group states they are motivated by hacktivism and information security advocacy, explicitly stating no financial motive. Sample attachments were shared as proof of the alleged breach.
    Date: 2026-05-11T16:41:40Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-DOCUMENTOS-BASE-DE-DATOS-ANTECEDENTES-PENALES-OJ-GUATEMALA-13-5MILLONES–76053
    Screenshots:
    None
    Threat Actors: DerArkiteck
    Victim Country: Guatemala
    Victim Industry: Government
    Victim Organization: Organismo Judicial (OJ) Guatemala
    Victim Site: oj.gob.gt
  292. Alleged data breach of NSBM Green University
    Category: Data Breach
    Content: A threat actor is selling an alleged database dump from NSBM Green University in Sri Lanka for $3,000 in Bitcoin. The dataset reportedly contains over 400 student records including Student ID numbers, personal email addresses, residential addresses, National Identity Card numbers, and encrypted passwords. Sample data was provided in the post to substantiate the claim.
    Date: 2026-05-11T16:41:05Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-SRI-LANKA-NSBM-GREEN-UNIVERSITY-FRESH-DATABASE-LEAK
    Screenshots:
    None
    Threat Actors: J0na255
    Victim Country: Sri Lanka
    Victim Industry: Education
    Victim Organization: NSBM Green University
    Victim Site: nsbm.ac.lk
  293. Alleged data breach of NSBM Green University
    Category: Data Leak
    Content: A threat actor has leaked records of 400+ students from NSBM Green University, a Sri Lankan higher education institution. The exposed data reportedly includes full names, NIC numbers, email addresses, physical addresses, and contact numbers. A sample of 30 student email addresses was shared as proof of the breach.
    Date: 2026-05-11T16:40:28Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-BREACH-LEAK-NSBM-Green-University-400-Student-Records-Exposed
    Screenshots:
    None
    Threat Actors: J0na255
    Victim Country: Sri Lanka
    Victim Industry: Education
    Victim Organization: NSBM Green University
    Victim Site: nsbm.ac.lk
  294. Alleged Initial Access to Indonesia Supreme Court Government Web Portal
    Category: Initial Access
    Content: A threat actor is freely sharing alleged administrator access credentials to the Indonesian Supreme Courts case portal (putusan.mahkamahagung.go.id), including a direct admin URL. The post also includes a sample database dump containing court case records with virtual account numbers, party names, and financial billing data. The access is being distributed at no cost, reportedly to build forum reputation.
    Date: 2026-05-11T16:39:52Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-%F0%9F%87%AE%F0%9F%87%A9-FREE-Mahkamah-Agung-RI-Supreme-Court-Admin-Access-Gov-WEBSITE
    Screenshots:
    None
    Threat Actors: ZvokxGustav
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Mahkamah Agung Republik Indonesia (Supreme Court of Indonesia)
    Victim Site: putusan.mahkamahagung.go.id
  295. Alleged data leak of Bolivian National Police personnel records
    Category: Data Leak
    Content: A threat actor leaked data allegedly belonging to the Bolivian National Police, including personnel records with fields such as full name, national ID number, address, date of birth, contact numbers, email addresses, blood type, rank, and unit assignment. A sample record was shared publicly alongside a download link. The data appears to originate from a police personnel management system.
    Date: 2026-05-11T16:39:18Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-BOLIVIA-POLICE-DATA
    Screenshots:
    None
    Threat Actors: Alz_157s
    Victim Country: Bolivia
    Victim Industry: Government
    Victim Organization: Bolivian National Police
    Victim Site: Unknown
  296. Alleged data leak of Interlab (30 Mexican laboratories)
    Category: Data Leak
    Content: A threat actor claims to have compromised a server belonging to Interlab (interlab.mx / biosystem.mx), a Mexican laboratory services company, and obtained data from 30 affiliated laboratories. After alleged failed ransom negotiations, the actor is freely distributing CSV files containing company and laboratory data to the forum community. The leaked content includes per-laboratory folders and company information files.
    Date: 2026-05-11T16:38:38Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-30-Mexican-labs-data
    Screenshots:
    None
    Threat Actors: Alameda_slim
    Victim Country: Mexico
    Victim Industry: Healthcare
    Victim Organization: Interlab
    Victim Site: interlab.mx
  297. Alleged data leak of Express Networks Ltd customer data
    Category: Data Leak
    Content: A threat actor is freely distributing alleged customer data from Express Networks Ltd, comprising approximately 5,000 rows. The leaked dataset includes extensive billing, account, network service, and personal information such as names, addresses, phone numbers, email addresses, dates of birth, IP addresses, MAC addresses, and financial billing details. The actor states the data is being shared publicly due to a broken agreement.
    Date: 2026-05-11T16:38:03Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Express-Networks-Ltd-Leaks-Download
    Screenshots:
    None
    Threat Actors: FOSGANK
    Victim Country: Unknown
    Victim Industry: Telecommunications
    Victim Organization: Express Networks Ltd
    Victim Site: Unknown
  298. Alleged data leak of Universidad Autónoma de Ciudad Juárez (UADEC) employee and student records
    Category: Data Leak
    Content: A threat actor is freely sharing two files allegedly containing student email addresses, enrollment numbers, and CURP identifiers, as well as employee information from a Mexican university. The post also includes apparent LDAP administrator credentials, claimed to allow creation and modification of university email account passwords.
    Date: 2026-05-11T16:37:25Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-Uadec-mail-data-for-free
    Screenshots:
    None
    Threat Actors: ModeZitraks
    Victim Country: Mexico
    Victim Industry: Education
    Victim Organization: Universidad Autónoma de Ciudad Juárez
    Victim Site: uadec.mx
  299. Alleged data leak of Mexicos Secretaria de Educacion Publica
    Category: Data Leak
    Content: A threat actor known as Alz_157s claims to have leaked data belonging to the Secretaria de Educacion Publica of Mexico, reportedly including personal information of underage and adult students, administrative and teaching staff, and guardians. The data is made available for free download on a darknet forum. The post does not specify the exact number of records or the nature of the data fields exposed.
    Date: 2026-05-11T16:36:48Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-MEXICO-SECRETARIA-DE-EDUCACION-PUBLICA
    Screenshots:
    None
    Threat Actors: Alz_157s
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Secretaria de Educacion Publica
    Victim Site: sep.gob.mx
  300. Alleged website defacements by Mr.PIMZZZXploit
    Category: Defacement
    Content: Threat actor Mr.PIMZZZXploit claims to have defaced multiple websites, primarily hosted on demowebsiteclient.com and related domains. A mirror link is provided at hack-db.org. The post includes 40+ URLs allegedly compromised.
    Date: 2026-05-11T16:36:13Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/908
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: demowebsiteclient.com
  301. Alleged data breach of DELKO.FR
    Category: Data Breach
    Content: A threat actor operating as lapsec_xd claims to be selling a scraped database from DELKO.FR containing approximately 3.2 million customer records. The exposed data includes names, email addresses, phone numbers, vehicle registration plates, appointment details, and service types. A price is available via a Telegram channel, and sample records are provided as proof.
    Date: 2026-05-11T16:36:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DELKO-FR-SCRAP-BY-LAPSEC
    Screenshots:
    None
    Threat Actors: lapsec_xd
    Victim Country: France
    Victim Industry: Retail
    Victim Organization: DELKO
    Victim Site: delko.fr
  302. Alleged data breach of Iran IRGC military personnel records
    Category: Data Breach
    Content: A threat actor operating under the alias MDGhost666 is offering for sale a database allegedly containing identity records of Iranian Islamic Revolutionary Guard Corps (IRGC) military personnel. The data purportedly includes full names, dates of birth, national IDs, birth certificate numbers, addresses, and phone numbers in TXT format. Sample records in Persian script were included in the post to substantiate the claim.
    Date: 2026-05-11T16:35:27Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-IRAN-IRGC-MILITARY-DB-2026
    Screenshots:
    None
    Threat Actors: MDGhost666
    Victim Country: Iran
    Victim Industry: Government
    Victim Organization: Islamic Revolutionary Guard Corps (IRGC)
    Victim Site: Unknown
  303. Purchase request for PayPal combo list targeting multiple countries
    Category: Combo List
    Content: A forum user is seeking to purchase PayPal-targeted combo lists for multiple countries including Germany, France, Switzerland, Italy, and others. The post is a buy request for credential lists intended for use against PayPal accounts.
    Date: 2026-05-11T16:28:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90Buying-Paypal-Combolist%E2%AD%90
    Screenshots:
    None
    Threat Actors: Maxbrth
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  304. Combo List of 1,218 Hotmail Credentials
    Category: Combo List
    Content: A combo list of 1,218 claimed valid Hotmail credentials is being shared on a paste forum. The content is gated behind registration or login. Credentials are marketed as valid access dated 10.05.2026.
    Date: 2026-05-11T16:28:26Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%8A1218-hotmail-valid-access-10-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  305. Combo List of 1,551 Hotmail Credentials
    Category: Combo List
    Content: A threat actor has shared a combo list of 1,551 purportedly valid Hotmail credentials, marketed with a validity date of May 10, 2026. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T16:28:05Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%8C%8A1551-hotmail-valid-access-10-05-2026
    Screenshots:
    None
    Threat Actors: SupportHotmail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  306. Sale of credential stuffing config and checker creation service
    Category: Services
    Content: A threat actor is offering a custom config and checker creation service supporting OpenBullet 2.0, SilverBullet, and custom Python/Go scripts. Pricing ranges from €20 to €60+ per config depending on target security level and concurrency requirements. Specialized builds include cookie checkers, captcha-solver integrations, and email protocol checkers.
    Date: 2026-05-11T16:27:53Z
    Network: openweb
    Published URL: https://patched.to/Thread-nova-config-checker-service
    Screenshots:
    None
    Threat Actors: UnrapedFigs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  307. Free South Korea email combo list (Batch 29/100)
    Category: Combo List
    Content: A threat actor is freely distributing a batch of South Korea-targeted email credentials, labeled as batch 29 of 100. The content is hidden behind a registration/login wall on the forum. No additional details regarding record count or data source are provided.
    Date: 2026-05-11T16:27:33Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-29-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  308. Free Hotmail combo list shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a Hotmail combo list on a cracking forum, linking to an external paste site. The post markets the credentials as premium hits suitable for credential stuffing against Hotmail accounts.
    Date: 2026-05-11T16:27:02Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1337x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292365
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  309. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list of 1,052 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits suitable for credential stuffing against Hotmail accounts.
    Date: 2026-05-11T16:26:46Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1052x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292374
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  310. AOL-targeted email:password combo list available on cracking forum
    Category: Combo List
    Content: A threat actor has shared an AOL-targeted email:password combo list on a cracking forum via an external paste link. The post markets the credentials as high quality and suitable for credential stuffing against AOL accounts.
    Date: 2026-05-11T16:26:42Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-AOL-TARGET-EMAILPASS-COMBOLIST-txt–2292394
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  311. Sale of email access combo list with 40,000 credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 40,000 email credentials, marketed as valid mail access. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T16:26:10Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-40K-GOOD-VALID-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: AlphaCloud1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  312. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor is distributing 1,220 alleged valid Hotmail credential hits on a cybercrime forum. The credentials are described as premium and sourced from a private cloud mix. Access to the list is gated behind forum registration or login.
    Date: 2026-05-11T16:25:44Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1220x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–203706
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  313. Sale of KYC-verified Coinbase accounts with authentication credentials
    Category: Carding
    Content: A threat actor is selling KYC-verified Coinbase accounts for $20 USD each, payable in Bitcoin. Each account includes access to an associated Proton email, Coinbase login credentials, and an authenticator setup key. Accounts are advertised as freshly verified and empty.
    Date: 2026-05-11T16:13:50Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-KYC-verified-coinbase-accounts
    Screenshots:
    None
    Threat Actors: unconcided
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: coinbase.com
  314. Alleged data breach of kamsparis.com
    Category: Data Breach
    Content: A threat actor is selling an alleged customer database from kamsparis.com containing 187,927 records. The dataset includes personally identifiable information such as full name, address, phone number, date of birth, and IBAN numbers. The seller is offering the data for $350 and claims it will be sold only once.
    Date: 2026-05-11T16:08:41Z
    Network: openweb
    Published URL: https://breached.st/threads/france-kamsparis-com-187-927.86998/unread
    Screenshots:
    None
    Threat Actors: moxzey
    Victim Country: France
    Victim Industry: Retail
    Victim Organization: Kams Paris
    Victim Site: kamsparis.com
  315. Request to purchase Shopline KYC or Cartpanda data
    Category: Carding
    Content: A forum user is seeking to purchase KYC data or account data related to Shopline or Cartpanda e-commerce platforms. The post directs interested parties to contact via Telegram. No further details on data volume or pricing are provided.
    Date: 2026-05-11T15:55:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Buying-Shopline-KYC-or-Cartpanda
    Screenshots:
    None
    Threat Actors: fancyshop
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  316. Sale of email:password combo list (mixed USA and Worldwide)
    Category: Combo List
    Content: A threat actor is selling a combo list of 595,000 email:password pairs described as mixed USA and Worldwide. The seller offers no refunds or replacements but allows testing prior to purchase.
    Date: 2026-05-11T15:55:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-WTS-GOOD-COMBOS-EMAIL-PASS–2091678
    Screenshots:
    None
    Threat Actors: Reoza
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  317. Combo List: Fresh Hotmail Credentials
    Category: Combo List
    Content: A threat actor is distributing a set of 1,985 Hotmail email and password combinations marketed as private and fresh. The credentials are shared via Telegram and posted on a public cracking forum.
    Date: 2026-05-11T15:54:49Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1985x-%E2%AD%90%E2%AD%90-FRESH-HQ-HOTMAIL-%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: KiwiShio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  318. Sale of Foot Locker gift cards at discounted rates
    Category: Carding
    Content: A threat actor is offering Foot Locker gift cards totaling up to $6,000 at a 60% discount via Telegram. The listing accepts a middleman (MM), suggesting fraudulently obtained gift cards being sold for profit.
    Date: 2026-05-11T15:54:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-60-OFF-SELLING-FOOTLOCKER-GIFTCARDS-UP-TO-%EF%B9%A96000-in-giftcards
    Screenshots:
    None
    Threat Actors: fancyshop
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Foot Locker
    Victim Site: footlocker.com
  319. Alleged credential logs targeting mo-on.cloud
    Category: Logs
    Content: A forum post by R0BIN1337 advertises URL:log:pass credentials associated with mo-on.cloud, dated May 26. The actual content is hidden behind a login/register wall, limiting visibility into the full scope of the data.
    Date: 2026-05-11T15:54:11Z
    Network: openweb
    Published URL: https://patched.to/Thread-url-log-pass-%F0%9F%94%92-may26-mo-on-cloud-799
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: mo-on.cloud
  320. Combo list hits distribution via private messaging
    Category: Combo List
    Content: A forum user is soliciting contact from individuals with credential stuffing hits, advertising a rich plan via Telegram. The post references hidden content with what appears to be a paste link, suggesting credential list sharing through private channels.
    Date: 2026-05-11T15:54:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-any-one-inboxing-hits-dm-me-rich-plan-%F0%9F%94%A5%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: Bazdawan
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  321. Sale of mixed mail combo list
    Category: Combo List
    Content: A mixed mail combo list is being shared on a cybercrime forum. The content is hidden behind a registration or login wall, limiting visibility into the specifics of the dataset. No further details regarding record count or targeted services are available from the post.
    Date: 2026-05-11T15:53:35Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-x9676-mixed-mail-combo
    Screenshots:
    None
    Threat Actors: RandomUpload
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  322. Alleged combo list of Bangladesh email:password credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 16,000 email:password pairs purportedly associated with Bangladesh-based accounts. The credentials are marketed as fresh and were made available via an external paste link.
    Date: 2026-05-11T15:53:30Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-16-K-%E2%9C%A6-Bangladesh-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-1-5-2026-%E2%9C%A6%E2%9C%A6–2292315
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  323. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as 1,030 Hotmail premium hits. The content is hidden behind a registration or login wall on the forum. No further details about the source of credentials are provided.
    Date: 2026-05-11T15:53:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85%E2%AD%901030x-hotmail-premium-hits%E2%9C%85%E2%AD%90
    Screenshots:
    None
    Threat Actors: Psyho70244
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  324. Sale of 10,000 mixed combo list targeting United States
    Category: Combo List
    Content: A threat actor shared a combo list of 10,000 mixed credentials via an external paste link on a cybercrime forum. The list is described as targeting United States-based accounts. No specific breached organization is identified.
    Date: 2026-05-11T15:53:06Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-10k-MIXED-GOOD-COMBO-USA–2292345
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  325. Combo List of Mixed Mail Credentials
    Category: Combo List
    Content: A user on a leak forum is distributing a mixed-mail combo list described as private and fresh, checked by the author. The content is hidden behind a registration or login wall, and no further details about record count or source are available.
    Date: 2026-05-11T15:52:20Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1MIX-MAIL%E2%9A%A1%E2%9A%A1PRIVATE%E2%9A%A1%E2%9A%A1FRESH%E2%9A%A1%E2%9A%A1CHEKED-BY-klyne05-%E2%9A%A1%E2%9A%A1–20414
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  326. Free mixed email combo list distribution
    Category: Combo List
    Content: A forum user is distributing a mixed email:password combo list described as private and fresh, checked by the poster. Content is hidden behind a like/registration gate on the forum.
    Date: 2026-05-11T15:52:14Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1MIX-MAIL%E2%9A%A1%E2%9A%A1PRIVATE%E2%9A%A1%E2%9A%A1FRESH%E2%9A%A1%E2%9A%A1CHEKED-BY-klyne05-%E2%9A%A1%E2%9A%A1–203698
    Screenshots:
    None
    Threat Actors: klyne05
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  327. Sale of UHQ mix combo list with valid Hotmail credentials
    Category: Combo List
    Content: A threat actor is offering a combo list marketed as UHQ Mix containing 1,899 claimed valid credentials, including Hotmail accounts. The content is hidden behind a registration or login wall and the seller directs interested parties to a Telegram handle for access.
    Date: 2026-05-11T15:51:48Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1899-Valid-UHQ-Mix-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  328. Combo list of 2.4K Hotmail credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 2,400 Hotmail credentials marketed as fresh and checked on May 11. The content is hidden behind a forum registration or login wall. The named service is a credential-stuffing target, not the breach source.
    Date: 2026-05-11T15:41:37Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-2-4K-Fresh-Hotmail-Hits-Just-Checked-11-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  329. Sale of Germany domain combo list with 376,124 lines
    Category: Combo List
    Content: A threat actor shared a combo list of 376,124 email and password pairs associated with German (.de) domain accounts on a public forum. The list is described as sourced from good leaks and is formatted as email:password credentials for credential stuffing use.
    Date: 2026-05-11T15:22:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-376-124-Lines-%E2%9C%85-Good-Leaks-De-Germany-Domain-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  330. Sale of Germany-targeted combo list with 570,027 lines
    Category: Combo List
    Content: A threat actor on a cracking forum is sharing a mixed-target combo list of 570,027 email:password lines associated with German users. The list is marketed as a Germany-focused credential set suitable for credential stuffing attacks. No specific victim organization is identified.
    Date: 2026-05-11T15:22:23Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-570-027-Lines-%E2%9C%85-DE-Germany-Mixed-Target-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  331. Germany domain combo list of 1,091,991 lines
    Category: Combo List
    Content: A combo list of approximately 1.09 million email:password lines targeting German (.de) domains was shared on a cracking forum. The list is described as sourced from good leaks and is formatted for credential stuffing use.
    Date: 2026-05-11T15:22:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-091-991-Lines-%E2%9C%85-Good-Leaks-De-Germany-Domain-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  332. Sale of Germany mixed target combo list with 1.13 million lines
    Category: Combo List
    Content: A threat actor is distributing a Germany-focused mixed target combo list containing over 1.13 million email:password lines. The post was shared on a public cracking forum. No specific victim organization is identified.
    Date: 2026-05-11T15:21:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-131-120-Lines-%E2%9C%85-DE-Germany-Mixed-Target-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  333. Italy email:password combo list of 10K credentials
    Category: Combo List
    Content: A threat actor has shared a combo list of approximately 10,000 email:password credential pairs targeting Italian users. The list is described as ultra-high quality (UHQ) and is being distributed freely on the forum.
    Date: 2026-05-11T15:21:07Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%90%E2%AD%90-10k-UHQ-ITALY-COMBO-EMAIL-PASS%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  334. Combo List targeting German shopping platforms (Payback, PayPal, Amazon)
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 500,000 email and password pairs purportedly targeting German users of Payback, PayPal, and Amazon. The list is shared freely via a download link on the forum. The actor is soliciting further requests from other members.
    Date: 2026-05-11T15:20:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Germany-DE-500K-Shopping-Targeted
    Screenshots:
    None
    Threat Actors: Immanuel_Kant
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  335. Sale of EDU private combo list
    Category: Combo List
    Content: A forum post advertises a private combo list targeting educational institutions (.edu accounts). No further details on record count or origin are available.
    Date: 2026-05-11T15:20:24Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-EDU-PRIVATE-COMBOL%C4%B0ST–2091990
    Screenshots:
    None
    Threat Actors: RobotxTR
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  336. Alleged Combo List targeting education domain accounts (131,488 lines)
    Category: Combo List
    Content: A threat actor is distributing a combo list containing 131,488 email:password lines targeting education (.edu) domain accounts. The list is described as sourced from good leaks and appears to be aggregated credentials intended for credential stuffing against educational institutions.
    Date: 2026-05-11T15:20:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-131-488-Lines-%E2%9C%85-Good-Leaks-Edu-education-Domain-Combolist
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  337. Sale of education sector combo list with 117,053 lines for .de domain
    Category: Combo List
    Content: A threat actor shared a combo list containing 117,053 email:password lines targeting education-sector accounts associated with .de domains. The list is marketed as high-quality and is likely intended for credential stuffing against educational institutions.
    Date: 2026-05-11T15:19:44Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-117-053-Lines-%E2%9C%85-HQ-Leaks-Edu-education-Combolist-de-Domain
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  338. Sale of discounted account upgrades and subscription services including Netflix and Steam
    Category: Services
    Content: A forum member is advertising a marketplace called CHEAPEAST MARKET offering discounted account upgrades and products for services including Netflix and Steam. The post promotes a discount code and directs users to an external website and Discord server. No breach or data leak is claimed.
    Date: 2026-05-11T15:19:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-%E2%AD%90-UPGRADE-ACCOUNTS-%E2%AD%90CHEAPEAST-MARKET-NETFLIX-STEAM-ETC-%E2%AD%90–2091117
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  339. Sale of upgraded and cracked accounts for streaming and gaming platforms
    Category: Services
    Content: A threat actor is advertising a marketplace selling upgraded and cracked accounts for platforms such as Netflix and Steam. The service is promoted with a discount code and references to vouches on Discord. No specific victim organization or breach is identified.
    Date: 2026-05-11T15:19:02Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Sellix-%E2%AD%90-UPGRADE-ACCOUNTS-%E2%AD%90CHEAPEAST-MARKET-NETFLIX-STEAM-ETC-%E2%AD%90–2091116
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  340. Purchase request for PayPal account data targeting multiple countries
    Category: Carding
    Content: A threat actor is soliciting PayPal account data for Germany, France, UK, Israel, and Switzerland. The post includes a contact Telegram handle and a hidden content link, suggesting a private negotiation for the purchase of compromised PayPal credentials.
    Date: 2026-05-11T15:18:33Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%90buying-paypal-data%E2%AD%90-301291
    Screenshots:
    None
    Threat Actors: Amaxgng
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: PayPal
    Victim Site: paypal.com
  341. Sale of 1,800 Hotmail account credentials
    Category: Combo List
    Content: A forum post advertises 1,800 Hotmail account credentials. The post appears to be sponsored by a proxy and SMS verification service. No further details about the data source or composition are provided.
    Date: 2026-05-11T15:17:57Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1800-Hotmail-Accounts–2292308
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  342. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor is sharing a combo list of 1,828 Hotmail credentials, described as an Access Vault. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T15:17:46Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-1828x-Hotmail-Access-Vault
    Screenshots:
    None
    Threat Actors: RyuuLord
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  343. Sale of mixed email combo list (X3800)
    Category: Combo List
    Content: A forum post advertises a mixed mail combo list of approximately 3,800 lines. The thread appears to be sponsored by a proxy and SMS verification service. No specific breach source or target service is identified.
    Date: 2026-05-11T15:17:37Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X3800-Mixed-Mail-Lines–2292309
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  344. Free Hotmail combo list with 4,330 credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 4,330 Hotmail credentials marketed as fresh. The content is hidden behind a registration or login requirement on the forum. Hotmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-11T15:17:24Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-4330x-FRESH-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Nulled07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  345. Sale of MIXMAIL combo list marketed as fresh UHQ credentials
    Category: Combo List
    Content: A threat actor is distributing a mixed-mail combo list containing approximately 2,700 credentials, marketed as fresh and high quality. The content is hidden behind a registration/login wall on the forum. The post references a Telegram channel associated with GoodTimes Cloud for distribution.
    Date: 2026-05-11T15:17:00Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%8E%9D-2700-%E2%8E%A0-MIXMAIL-FRESH-UHQ%E2%9C%A8GOODTIMES-CLOUD–20412
    Screenshots:
    None
    Threat Actors: Lexser
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  346. Hotmail combo list containing 8,000 credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a Hotmail-targeted combo list containing approximately 8,000 email:password pairs on a cybercrime forum. The content is hidden behind registration or login. The actor also advertises a shop (unique-combo.shop) offering combo lists for various countries and on request.
    Date: 2026-05-11T15:16:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-3-8000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  347. Sale of forum accounts for xss.ac and exploit.in
    Category: Services
    Content: A threat actor is offering pre-registered accounts on the cybercrime forums xss.ac and exploit.in for $100, undercutting the standard $200 registration fee. The seller claims to have existing old accounts available for purchase.
    Date: 2026-05-11T15:14:24Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Exploit-in-xss-ac-Acount-sale
    Screenshots:
    None
    Threat Actors: Darkode1
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  348. Mass Website Defacement of rapijatim.or.id by Irene (XmrAnonye.id)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as Irene operating under the team XmrAnonye.id conducted a mass defacement attack against rapijatim.or.id, a website associated with the Indonesian Citizens Radio Organization (RAPI) in East Java. The attacker defaced the site by deploying a custom defacement page at the path /hacked-by-irene on a Linux-based server. The incident was recorded as part of a broader mass defacement campaign, with a mirror archived at haxor.id.
    Date: 2026-05-11T15:07:35Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249157
    Screenshots:
    None
    Threat Actors: Irene, XmrAnonye.id
    Victim Country: Indonesia
    Victim Industry: Non-Profit / Association
    Victim Organization: RAPI Jawa Timur (Radio Antar Penduduk Indonesia – East Java)
    Victim Site: rapijatim.or.id
  349. Alleged data leak of City of Chicago Office user data
    Category: Data Leak
    Content: A threat actor has freely distributed a dataset allegedly containing information on over 100 users associated with the City of Chicago Office, including the mayor, former mayors, council members, and clerks. The data was shared via a Telegram link on the Breached forum.
    Date: 2026-05-11T15:00:55Z
    Network: openweb
    Published URL: https://breached.st/threads/leak-city-of-chicago-office-100-users-leaked-mayor-former-mayors-council-clerk-etc.86997/unread
    Screenshots:
    None
    Threat Actors: cc5ab
    Victim Country: United States
    Victim Industry: Government
    Victim Organization: City of Chicago
    Victim Site: chicago.gov
  350. Alleged distribution of stealer logs targeting Secret StarLink
    Category: Logs
    Content: A forum post by R0BIN1337 references stealer logs associated with Secret StarLink. No content is available to confirm the nature, scope, or authenticity of the data.
    Date: 2026-05-11T14:48:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Logs-Secret-StarLink
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Secret StarLink
    Victim Site: Unknown
  351. Alleged distribution of stealer logs (1.7GB)
    Category: Logs
    Content: A forum user shared a 1.7GB collection of stealer logs containing approximately 1,372 entries. No further details about the origin or content of the logs were provided in the post.
    Date: 2026-05-11T14:48:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Logs-1-7GB-Standart-1372x
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  352. Free distribution of stealer logs (10GB+)
    Category: Logs
    Content: A threat actor known as R0BIN1337 is freely distributing over 10GB of stealer logs on a cracking forum. The logs are hosted on SunCloud and shared with a password hint. No specific victim organization or country is identified.
    Date: 2026-05-11T14:47:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Logs-10GB-SunCloud
    Screenshots:
    None
    Threat Actors: R0BIN1337
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  353. Distribution of 2.6GB stealer log pack
    Category: Logs
    Content: A threat actor on Cracked.st is distributing a 2.6GB pack of stealer logs described as private. No further details about the contents, origin, or affected organizations are available from the post.
    Date: 2026-05-11T14:47:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-LOGS-2-6gb-private-pack
    Screenshots:
    None
    Threat Actors: theboxjon
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  354. Free distribution of RedLine stealer logs
    Category: Logs
    Content: A threat actor is freely distributing approximately 1GB of stealer logs purportedly collected via RedLine on 08-05-2026. The post references a private Telegram channel for additional content. The logs are described as fresh and unwrapped.
    Date: 2026-05-11T14:46:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%AD%90%E2%AD%901GB-FRESH-UPP-LOGS%E2%AD%90-FROM-REDLINE-08-05-2026-UNRAPPED%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: kingdevl10
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  355. Combo List: Germany mail access mix (4.1K credentials)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 4,100 Germany-based email credentials on a cracking forum. The post is marked as private data from the author and is offered for free.
    Date: 2026-05-11T14:46:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9D%84%EF%B8%8F4-1k-GERMANY-MAIL-ACCESS-MIX%E2%9D%84%EF%B8%8F-10-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  356. Combo list targeting orange.fr distributed on forum
    Category: Combo List
    Content: A threat actor shared a combo list of 5,433 credentials associated with orange.fr email addresses, marketed as high-quality and fresh. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T14:45:58Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-5433-orange-fr-hq-fresh-lines
    Screenshots:
    None
    Threat Actors: megatronishere
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  357. Combo List targeting South Africa
    Category: Combo List
    Content: A forum user posted what appears to be a combo list targeting South Africa in the Combolists section. No further details about record count, data source, or content were provided in the post.
    Date: 2026-05-11T14:45:48Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-SOUTH-AFRICA–2092345
    Screenshots:
    None
    Threat Actors: FlightUSA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  358. Combo List targeting interia.pl users
    Category: Combo List
    Content: A threat actor is sharing a combo list of 8,089 credential lines associated with interia.pl email addresses, marketed as high-quality and fresh. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T14:45:40Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-8089-interia-pl-hq-fresh-lines
    Screenshots:
    None
    Threat Actors: megatronishere
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  359. Sale of Yahoo Japan combo list with 11,776 credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 11,776 @yahoo.co.jp email credentials, marketed as high-quality and fresh. The content is gated behind forum registration or login.
    Date: 2026-05-11T14:45:09Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-11776-yahoo-co-jp-hq-fresh-lines
    Screenshots:
    None
    Threat Actors: megatronishere
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  360. Alleged data breach of Telegram with 30 million user records for sale
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database of 30 million Telegram users containing fields such as system number, first and last name, phone number, user ID, and nickname. A sample paste is provided as proof, with full data available via a Telegram contact. The origin of the data and method of acquisition are unspecified.
    Date: 2026-05-11T14:44:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-30M-DATABASE-USERS-PHONES-TELEGRAM
    Screenshots:
    None
    Threat Actors: Meowl
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Telegram
    Victim Site: telegram.org
  361. Sale of Hotmail combo list by NightFallCloud
    Category: Combo List
    Content: A threat actor operating as NightFallCloud is offering a Hotmail combo list marketed as fresh UHQ credentials, with 10,000 to 20,000 new lines reportedly added daily. The listing includes Hotmail combos and mixed credentials described as fresh. Content is gated behind registration or login on the forum.
    Date: 2026-05-11T14:44:52Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A1800-hotmail-uhq-nightfall-cloud
    Screenshots:
    None
    Threat Actors: NightFallCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  362. Combo List of 2,800 corporate email credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 2,800 corporate email access credentials. The content is gated behind registration or login. The post indicates the data is from private sources compiled by the author.
    Date: 2026-05-11T14:44:34Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%9A%B5%F0%9F%8F%BC2-8k-corp-mail-access-mix%F0%9F%9A%B5%F0%9F%8F%BC%E2%9C%A8-10-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  363. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,900 Hotmail email account credentials, described as old data and labeled VIP Cloud. The content is gated behind forum registration and distributed freely to members.
    Date: 2026-05-11T14:44:14Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%9A%B5%F0%9F%8F%BC1-9k-hotmail-mail-access%F0%9F%9A%B5%F0%9F%8F%BC%E2%9C%A8-10-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  364. Distribution of URL:Log:Pass combo list with 18.59 million records
    Category: Combo List
    Content: A threat actor shared a URL:LOG:PASS combo list containing approximately 18.59 million records via an external paste link. The list is marketed as UHQ (ultra-high quality) and hosted on daxus.pro. No specific victim organization is identified.
    Date: 2026-05-11T14:43:54Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-18-59-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F–2292299
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  365. Sénégal : le Trésor public signale un incident informatique
    Category: Cyber Attack
    Content: La Direction générale de la Comptabilité publique et du Trésor (DGCPT) a annoncé une perturbation de ses systèmes dinformation depuis le dimanche 10 mai 2026, suite à un incident non précisé. Cette panne survient quelques mois après une attaque de cyber-extorsion ayant touché la Direction générale des Impôts et des Domaines (DGID). Ces événements sinscrivent dans un contexte africain marqué par une augmentation des cybermenaces ciblant les institutions publiques.
    Date: 2026-05-11T14:43:41Z
    Network: openweb
    Published URL: https://fr.apanews.net/news/senegal-incident-technique-au-tresor-public/
    Screenshots:
    None
    Threat Actors:
    Victim Country: Sweden
    Victim Industry: Unknown
    Victim Organization: Direction générale de la Comptabilité publique et du Trésor
    Victim Site: sentresor.org
  366. Combo list targeting Polish accounts distributed on forum
    Category: Combo List
    Content: A combo list of approximately 688,000+ credentials allegedly associated with Poland was shared freely via an external paste link. The post was made on a known credential-sharing forum under the Dumps section.
    Date: 2026-05-11T14:43:38Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-688-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Poland-%E2%9C%AA-29-APR-2026-%E2%9C%AA–2292279
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  367. Sale of mixed mail combo list (X2600)
    Category: Combo List
    Content: A forum post in the cracking section advertises X2600 mixed mail lines, likely a combo list of email credentials. The thread is sponsored by a proxy and SMS verification service. No specific breach victim or data fields are identified.
    Date: 2026-05-11T14:43:33Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X2600-Mixed-Mail-Lines–2292306
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  368. Hotmail combo list with 1,944 credentials shared on forum
    Category: Combo List
    Content: A combo list of 1,944 Hotmail email and password pairs was shared on a darknet forum by user Stevee36. The content is gated behind registration or login. These credentials are harvested from various sources and are not indicative of a breach of Hotmail/Microsoft.
    Date: 2026-05-11T14:42:50Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1944-HQ-Hotmail-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  369. Alleged sale of Gmail credentials, LinkedIn cookies, and email:password combolists
    Category: Combo List
    Content: Threat actor advertising sale of credential lists including Gmail email:password combinations, Gmail cookies, and LinkedIn credentials with passwords. No pricing explicitly stated in this message but presented as a sales offering.
    Date: 2026-05-11T14:29:13Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79654
    Screenshots:
    None
    Threat Actors: best_
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  370. Combo List targeting Hotmail accounts for gaming and shopping services
    Category: Combo List
    Content: A threat actor shared a combo list containing 700,857 email:password lines targeting Hotmail accounts, marketed for credential stuffing against gaming and shopping platforms.
    Date: 2026-05-11T14:10:55Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-700-857-Lines-%E2%9C%85-Gaming-and-Shopping-Target-Hotmail
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  371. Combo List: 8+ Million URL:Log:Pass Lines Freely Shared (Part 332)
    Category: Combo List
    Content: A threat actor shared a combo list containing over 8 million URL:login:password credential pairs, distributed as part 332 of an ongoing free release series. The content is hidden behind registration or login on the forum.
    Date: 2026-05-11T14:10:49Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-332
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  372. Hotmail combo list shared on cracking forum
    Category: Combo List
    Content: A threat actor is distributing Hotmail credential hits via a Telegram channel and offering private combo lists for purchase. The post advertises both free drops and paid private access through a Telegram contact. No record count or sample data was provided in the post.
    Date: 2026-05-11T14:10:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9C%85-HQ-HOTMAIL-HIT-%E2%9C%85–2092330
    Screenshots:
    None
    Threat Actors: wasifurkchut
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  373. Sale of Hotmail combo list with 100 alleged pure hits
    Category: Combo List
    Content: A threat actor on a cybercrime forum is offering a combo list of approximately 100 Hotmail credentials, marketed as elite global hits with no junk. The content is hidden behind a registration or login wall, limiting further detail.
    Date: 2026-05-11T14:10:18Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1-0-1k-elite-global-hotmail-zero-junk-pure-hits-%E2%9A%A1-301254
    Screenshots:
    None
    Threat Actors: NokiaDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  374. Sale of gaming-targeted combo list with 2 million credentials
    Category: Combo List
    Content: A threat actor is offering a gaming-targeted combo list containing approximately 2 million credentials on a cybercrime forum. The content is hidden behind a registration or login requirement. No specific victim organization or platform is identified in the post.
    Date: 2026-05-11T14:10:00Z
    Network: openweb
    Published URL: https://patched.to/Thread-gaming-2m-gaming-targeted-good-combolist
    Screenshots:
    None
    Threat Actors: capitan911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  375. Sale of Hotmail combo list with 295K credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 295K Hotmail credentials described as UHQ and fresh. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T14:09:41Z
    Network: openweb
    Published URL: https://patched.to/Thread-legendary-295k-hotmail-uhq-fresh-combolist
    Screenshots:
    None
    Threat Actors: capitan911
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  376. Free distribution of cookies and session logs for Nike, Safeway, and other platforms
    Category: Logs
    Content: A threat actor has shared a paste link containing cookies for multiple platforms including Nike and Safeway. The post offers free access to session cookies for these services. No further details on record count or affected accounts are provided.
    Date: 2026-05-11T14:09:26Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-cookies-nike-safeway-more–2292238
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  377. Sale of German combo list with 165K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list purportedly containing 165,000 credentials associated with German users, marketed as high-quality and fresh. The content is gated behind registration or login on the forum.
    Date: 2026-05-11T14:09:10Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-165k-germany-hq-fresh-combolist
    Screenshots:
    None
    Threat Actors: megatronishere
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  378. Sale of 1,100 Hotmail account credentials
    Category: Combo List
    Content: A forum post advertises 1,100 Hotmail accounts, likely for credential stuffing or account takeover purposes. The post appears to be sponsored by a proxy and SMS verification service. No further details about the origin or content of the credentials are provided.
    Date: 2026-05-11T14:09:05Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1100-Hotmail-Accounts–2292245
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  379. Sale of Colombia UHQ combo list with 115,000 credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as 115,000 UHQ credentials associated with Colombian users. The content is gated behind registration or login on the forum. No specific breached organization is identified.
    Date: 2026-05-11T14:08:49Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-115k-colombia-uhq-combolist
    Screenshots:
    None
    Threat Actors: megatronishere
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  380. Sale of mixed email combo list (X500)
    Category: Combo List
    Content: A forum post in the cracking section offers a mixed mail combo list of 500 lines. The post is sponsored by Vaultproxies.net, a proxy and SMS verification service. No additional details about the credential source or targeted services are provided.
    Date: 2026-05-11T14:08:41Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X500-Mixed-Mail-Lines
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  381. Sale of 1,700 Hotmail account credentials
    Category: Combo List
    Content: A forum post advertises 1,700 Hotmail account credentials for cracking purposes. The thread is sponsored by a proxy and SMS verification service. No further details about the source or verification status of the credentials are provided.
    Date: 2026-05-11T14:08:17Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X1700-Hotmail-Accounts–2292259
    Screenshots:
    None
    Threat Actors: EarlHickey
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  382. Combo list of Greek email:password credentials freely shared
    Category: Combo List
    Content: A threat actor known as Fragtez leaked a combo list of approximately 75,000 Greek email:password pairs via an external paste service. The credentials are marketed as fresh and dated 27 April 2026.
    Date: 2026-05-11T14:08:06Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-75-K-%E2%9C%A6-Greece-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-27-4-2026-%E2%9C%A6%E2%9C%A6–2292248
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  383. Free Brazil email:password combo list
    Category: Combo List
    Content: A threat actor shared a Brazil-targeted email:password combo list via an external paste site. The post is categorized as a combo list intended for credential stuffing rather than a breach of a specific organization.
    Date: 2026-05-11T14:07:56Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HQ-BRAZIL-EMAILPASS-COMBOLIST-SHROUD20-txt–2292270
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  384. Sale of Hotmail credential combo list sample
    Category: Combo List
    Content: A threat actor shared a sample combo list of 1,315 Hotmail credentials on a cybercrime forum. The content is hidden behind a registration/login wall, suggesting it may be a teaser for a larger offering.
    Date: 2026-05-11T14:07:09Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-1315x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: HollowKnight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  385. Free Hotmail Combo List by Ebbicloud
    Category: Combo List
    Content: A threat actor known as Ebbicloud has shared a combo list of 1,188 Hotmail credentials via Pasteview. The post is categorized as UHQ (ultra-high quality), suggesting the credentials have been verified. This is a credential stuffing resource targeting Microsoft Hotmail accounts.
    Date: 2026-05-11T14:00:52Z
    Network: openweb
    Published URL: https://altenens.is/threads/1188x-uhq-hotmails_ebbi_cloud.2937909/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  386. Free Combo List of Hotmail Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 1,366 Hotmail credentials via Pasteview. The list is marketed as UHQ (ultra high quality) and distributed for free on a cybercrime forum.
    Date: 2026-05-11T14:00:25Z
    Network: openweb
    Published URL: https://altenens.is/threads/1366x-uhq-hotmails_-ebbi_cloud.2937910/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  387. Alleged data leak of Mansoura University (mans.edu.eg)
    Category: Data Leak
    Content: A threat actor operating under the handle INT3X has freely released a dataset allegedly containing 731 records from Mansoura University (mans.edu.eg). The leaked fields include full names, email addresses, telephone numbers, job titles, departments, and workplace affiliations. The actor states the data is being published for free after the university failed to respond to a prior disclosure.
    Date: 2026-05-11T13:52:07Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-EGY-Edu-eg-Full-Contact-Leaks-Mansoura-University
    Screenshots:
    None
    Threat Actors: INT3X
    Victim Country: Egypt
    Victim Industry: Education
    Victim Organization: Mansoura University
    Victim Site: mans.edu.eg
  388. Alleged data leak of MPR RI Socialization Board (Indonesia)
    Category: Data Leak
    Content: A threat actor operating under the handle SCTH (Sadboy Cyber Team Hacktivist Indonesia) claims to have leaked a database of 50,000 records belonging to the MPR RI (Peoples Consultative Assembly of Indonesia) Socialization Board. The post includes a download link for a sample and appears politically motivated, demanding the dismissal of the Secretary of the MPR RI Socialization Agency.
    Date: 2026-05-11T13:48:47Z
    Network: openweb
    Published URL: https://breached.st/threads/mpr-ri-socialization-board-indonesia.86995/unread
    Screenshots:
    None
    Threat Actors: SCTH
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: MPR RI Socialization Board
    Victim Site: Unknown
  389. 60K mixed mail access combo list
    Category: Combo List
    Content: A combo list of approximately 60,000 mixed mail access credentials has been shared on a cracking forum. No additional details are available from the post content.
    Date: 2026-05-11T13:34:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%9060K-MIXED-MAIL-ACCESS-%E2%AD%90
    Screenshots:
    None
    Threat Actors: Posts
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  390. Request to purchase EU PayPal credentials
    Category: Carding
    Content: A forum user is soliciting the purchase of PayPal account data targeting users in Germany, France, and the United Kingdom. The post requests contact via Telegram and does not specify volume or price.
    Date: 2026-05-11T13:34:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90BUYING-EU-Paypal-Data%E2%AD%90
    Screenshots:
    None
    Threat Actors: amaxgng
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  391. Hotmail combo list containing 8,000 credentials
    Category: Combo List
    Content: A combo list of 8,000 Hotmail email:password credentials was shared on a cracking forum. The list is marketed as unique and intended for credential stuffing use.
    Date: 2026-05-11T13:34:01Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Hotmail-Unique-Combo-2-8000
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  392. Sale of combo list mix targeting USA and Europe
    Category: Combo List
    Content: A threat actor is distributing a combo list marketed as country-specific credential hits from the USA and Europe. The content is hidden behind registration, and no further details on record count or targeted services are provided.
    Date: 2026-05-11T13:33:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%AD%90%EF%B8%8Fby-countries%E2%AD%90%EF%B8%8Fhits-mix-usa%E2%AD%90%EF%B8%8Feurope%E2%AD%90%EF%B8%8Fexclusive-combolist%E2%98%81%E2%AD%90%EF%B8%8F-300499
    Screenshots:
    None
    Threat Actors: hangover2055
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  393. Sale of account checker tool targeting Go3.lv with Cloudflare bypass
    Category: Combo List
    Content: A threat actor is selling a credential-checking tool targeting Go3.lv, featuring Cloudflare Bot Manager bypass, built-in AI captcha solvers with claimed 90% accuracy, and Oracle response leak exploitation. The tool is advertised as request-based, requiring only high-reputation proxies, and is being sold as a single copy with middleman accepted.
    Date: 2026-05-11T13:33:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Go3-lv-RegChecker-VM-CF-Bypassed-Inbuilt-captcha-Solver
    Screenshots:
    None
    Threat Actors: DataKernel
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  394. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum member is distributing a combo list described as fresh Hotmail credentials via a private Telegram channel. The content is hidden behind a registration/login gate. No record count or additional details are provided in the visible portion of the post.
    Date: 2026-05-11T13:33:25Z
    Network: openweb
    Published URL: https://patched.to/Thread-nova-%F0%9F%93%A2private-lines-hotmail%F0%9F%93%A2-%E2%9C%85cypher-cloud%E2%9C%85-%F0%9F%8C%AC%EF%B8%8Fhotmail-fresh%F0%9F%8C%AC%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Cypheer
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  395. Sale of discounted premium account upgrade services for multiple platforms
    Category: Services
    Content: A forum seller is offering discounted premium account upgrades for multiple platforms including LinkedIn, Coursera, Microsoft 365, Adobe Creative Cloud, Canva, Telegram, Bumble, CapCut, Grammarly, and Duolingo. Upgrades are applied to the buyers own account and are advertised as legal and safe. Services are offered at prices ranging from $6 to $90 depending on platform and subscription duration.
    Date: 2026-05-11T13:33:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90-CHEAPEST-LEGAL-UPGRADES-%E2%AD%90LINKEDIN%E2%9A%A1COURSERA%E2%9A%A1GRAMMERLY%E2%9A%A1MICROSOFT-365%E2%9A%A1CAPCUT%E2%9A%A1BUMBLE%E2%AD%90
    Screenshots:
    None
    Threat Actors: MINDHUNTER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  396. Request for PayPal credentials targeting Germany and France
    Category: Carding
    Content: A forum user is soliciting PayPal account data targeting users in Germany and France. The post does not offer data for sale but rather requests it from other forum members. No record count or specific data fields are mentioned.
    Date: 2026-05-11T13:32:53Z
    Network: openweb
    Published URL: https://patched.to/Thread-need-pp-data
    Screenshots:
    None
    Threat Actors: Amaxgng
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: PayPal
    Victim Site: paypal.com
  397. Sale of Hotmail credential combo list with 3,136 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as 3,136 premium Hotmail credential hits. The content is hidden behind a registration or login wall on the forum. These credentials are intended for use in credential stuffing against Hotmail/Outlook accounts.
    Date: 2026-05-11T13:32:22Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%9C-3136x-premium-hotmail-hits-%E2%9A%9C
    Screenshots:
    None
    Threat Actors: Anon75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  398. Free distribution of URL login credential logs
    Category: Combo List
    Content: A forum user is distributing URL:login:password credential lists, marketed as a new update. The content is gated behind registration or login. Further updates are indicated as forthcoming.
    Date: 2026-05-11T13:32:18Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-box-main-new-url-log-pass-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8Fpart-1-301234
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  399. Wanted: PayPal account data for Germany and France targets
    Category: Carding
    Content: A forum user is soliciting PayPal account data targeting users in Germany and France. The post requests contact via Telegram and links to hidden content, suggesting an ongoing transaction or further details behind a paywall.
    Date: 2026-05-11T13:32:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-buying-pp-data%E2%AD%90
    Screenshots:
    None
    Threat Actors: Amaxgng
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: PayPal
    Victim Site: paypal.com
  400. Hotmail credential combo list with 1,420 hits shared freely
    Category: Combo List
    Content: A threat actor shared a combo list of 1,420 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits and made available for free on the forum.
    Date: 2026-05-11T13:31:52Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1420x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292168
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  401. Sale of mixed valid mail access credentials
    Category: Combo List
    Content: A threat actor shared a list of approximately 13,300 mixed valid mail access credentials via an external paste link. The post is dated May 1st and markets the credentials as valid.
    Date: 2026-05-11T13:31:32Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-13-3K-%E2%9C%A8-Mix-%E2%9C%A8-Valid-Mail-Access-01-05–2292197
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  402. Combo list targeting Indonesia distributed on forum
    Category: Combo List
    Content: A combo list containing over 232,000 credential pairs, reportedly associated with Indonesian accounts, was freely shared on a cybercrime forum. The content was made available via an external paste link. No specific breached organization is identified.
    Date: 2026-05-11T13:31:13Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-232-K-Combo-%E2%9C%AA-Indonesia-%E2%9C%AA-9-MAY-2026-%E2%9C%AA–2292218
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  403. Sale or distribution of session cookies for Costco, Target, Shein, and other retailers
    Category: Logs
    Content: A threat actor shared a link allegedly containing session cookies for multiple retail platforms including Costco, Target, and Shein. The post provides no additional details on record volume or origin of the cookies.
    Date: 2026-05-11T13:31:09Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-cookies-costco-target-shein-more–2292217
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  404. Sale of Hotmail access combo list targeting USA, Europe, Asia, and Russia
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 800 Hotmail credentials sourced from users in the USA, Europe, Asia, and Russia. The content is hidden behind a reply gate on the forum. The list is marketed as valid for account access.
    Date: 2026-05-11T13:25:32Z
    Network: openweb
    Published URL: https://altenens.is/threads/800x-hotmail-access-combo-usa-europe-asia-russian.2937901/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  405. Mix mail combo list including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live credentials
    Category: Combo List
    Content: A threat actor shared a mixed mail combo list targeting multiple email providers including Hotmail, Outlook, AOL, GMX, Inbox, iCloud, and Live. The content is hidden behind a reply gate and distributed via Telegram. No record count was disclosed.
    Date: 2026-05-11T13:24:59Z
    Network: openweb
    Published URL: https://altenens.is/threads/mix-mail-combo-hotmail-outlook-aol-gmx-inbox-icloud-live-2026-5-8.2937903/unread
    Screenshots:
    None
    Threat Actors: Larry_Uchiha
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  406. Sale of 700 fresh Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is distributing a list of 700 Hotmail credentials marketed as fresh and valid. Access to the content is gated behind a reply requirement on the forum.
    Date: 2026-05-11T13:24:25Z
    Network: openweb
    Published URL: https://altenens.is/threads/sparkles-700x-fresh-hotmail-valid-sparkles.2937899/unread
    Screenshots:
    None
    Threat Actors: Sellix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  407. Combo List of 163K Email/Password Credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list containing 163,000 email and password pairs on a cybercrime forum. The content is gated behind registration or login. No specific breach source or target service is identified.
    Date: 2026-05-11T13:18:55Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-163K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  408. Combo List of 46K USA Email/Password Credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list containing approximately 46,000 email and password pairs purportedly associated with USA-based accounts. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T13:17:14Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-USA-46K-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  409. Combo List: 26K Mail Access Mix
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 26,000 mail access credentials, marketed as fully valid. The list is described as a mixed mail access collection dated May 11.
    Date: 2026-05-11T13:15:36Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-26K-Full-Valid-Mail-Access-Mix-11-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  410. Combo List of Mixed Email and Password Credentials
    Category: Combo List
    Content: A combo list of approximately 4,000 mixed email and password credential pairs is being shared on a cybercrime forum. The content is gated behind registration or login. No specific breach source or targeted service is identified.
    Date: 2026-05-11T13:15:12Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-4K-Mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  411. Combo List of 10K Mixed Email/Password Credentials
    Category: Combo List
    Content: A combo list containing 10,000 mixed email and password pairs has been shared on a cybercrime forum. The credentials are described as valid and are available to registered forum members behind a hidden content gate.
    Date: 2026-05-11T13:14:48Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-Combolist-10K-Mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  412. Alleged data leak of Department of Education (DepEd) Marinduque branch employee emails
    Category: Data Leak
    Content: A threat actor leaked a list of approximately 46 email addresses attributed to employees of the Department of Education (DepEd) Marinduque branch in the Philippines. The data includes official deped.gov.ph email addresses as well as some personal Gmail accounts. No passwords or additional personal data were included in the post.
    Date: 2026-05-11T13:07:59Z
    Network: openweb
    Published URL: https://breached.st/threads/deped-branch.86993/unread
    Screenshots:
    None
    Threat Actors: Z4ne0days
    Victim Country: Philippines
    Victim Industry: Government
    Victim Organization: Department of Education (DepEd)
    Victim Site: deped.gov.ph
  413. Alleged data breach of Elephant Insurance
    Category: Data Breach
    Content: A threat actor has leaked data allegedly sourced from Elephant Insurance, containing approximately 1.8 million unique email addresses from 2023. The sample includes full names, dates of birth, email addresses, phone numbers, physical addresses, drivers license numbers, payment card holder details, and hashed credentials. The dataset appears to combine multiple data types including personal, financial, and account records.
    Date: 2026-05-11T13:04:06Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Database-Elephant-insurance-data-2023
    Screenshots:
    None
    Threat Actors: [Mod] Tanaka
    Victim Country: United States
    Victim Industry: Finance
    Victim Organization: Elephant Insurance
    Victim Site: elephant.com
  414. Combo list targeting Taiwan distributed on forum
    Category: Combo List
    Content: A combo list containing over 36,000 credentials associated with Taiwan was freely shared on a nulled forum. The post includes a link to an external paste site hosting the credential list. No specific breached organization is identified.
    Date: 2026-05-11T12:51:15Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-36-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Taiwan-%E2%9C%AA-30-APR-2026-%E2%9C%AA–2292137
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  415. Free combo list of Hotmail credential hits
    Category: Combo List
    Content: A threat actor has shared a free combo list containing 2,056 alleged Hotmail credential hits via an external paste link. The post is categorized as a credential stuffing list targeting Hotmail accounts.
    Date: 2026-05-11T12:51:11Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-2056x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292158
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  416. Alleged data leak of CalendrIDEL French healthcare platform
    Category: Data Leak
    Content: A threat actor has leaked data allegedly sourced from CalendrIDEL, a French platform connecting independent nurses for replacements and collaborations. The leaked dataset contains approximately 1,400 records including email addresses, phone numbers, and usernames. The data was made available via an anonymous file-sharing link.
    Date: 2026-05-11T12:46:06Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-CalendrIDEL
    Screenshots:
    None
    Threat Actors: ridok61
    Victim Country: France
    Victim Industry: Healthcare
    Victim Organization: CalendrIDEL
    Victim Site: calendridel.fr
  417. Sale of 8.6K valid mix combo list
    Category: Combo List
    Content: A combo list advertised as containing 8.6K valid credential pairs was shared on BreachForums. The post is categorized as a mixed combo list with no further details available from the post content.
    Date: 2026-05-11T12:43:49Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-8-6K-valid-mix-combolist
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  418. Sale of Hotmail combo list with 9.1K valid credentials
    Category: Combo List
    Content: A threat actor is sharing a combo list of 9,100 valid Hotmail email and password pairs on a cybercrime forum. The content is gated behind registration or login. The credentials appear to be intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T12:42:23Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-9-1K-valid-combolist-hotmail
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  419. Combo list targeting Hotmail with 1.8K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 1,800 Hotmail credentials marketed as fresh mail access. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T12:41:58Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-1-8K-Hotmail-Fresh-Mail-Access-Juast-top-Quality-11-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  420. Sale of mixed email/password combo list with 11,700 credentials
    Category: Combo List
    Content: A threat actor shared a mixed email/password combo list containing approximately 11,700 credential pairs on a cybercrime forum. The content is hidden behind a registration or login wall, limiting public access. No specific target service or origin breach is identified.
    Date: 2026-05-11T12:40:18Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-11-7-combo-mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  421. Sale of mixed email/password combo list with 12.7 million records
    Category: Combo List
    Content: A forum post on BreachForums advertises a mixed email/password combo list containing approximately 12.7 million credential pairs. No additional details about the source, targeted services, or pricing are available from the post content.
    Date: 2026-05-11T12:39:54Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-12-7-combo-mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  422. 18K Mixed Email/Password Combo List
    Category: Combo List
    Content: A threat actor is sharing a combo list containing 18,000 mixed email and password credential pairs. The content is hidden behind a registration or login requirement on the forum. No specific breach source or target service is identified.
    Date: 2026-05-11T12:38:28Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-18K-combo-mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  423. 200K Mixed Email/Password Combo List
    Category: Combo List
    Content: A combo list containing 200,000 mixed email and password credential pairs is being shared on a cybercrime forum. The content is gated behind registration or login. No specific breached organization or target service is identified.
    Date: 2026-05-11T12:38:04Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-200K-combo-mixed-Email-Pass
    Screenshots:
    None
    Threat Actors: mindreading
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  424. Sale of FuboTV credential-stuffing config with full capture
    Category: Combo List
    Content: A threat actor is selling an OpenBullet 2 (OB2) config targeting FuboTV accounts, priced at $150. The config is advertised with full capture capabilities including plan, billing cycle, add-ons, and other account details. High proxy quality is required for operation.
    Date: 2026-05-11T12:13:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-FuboTv-Config-w-Full-Capture-150-OB2
    Screenshots:
    None
    Threat Actors: 1999Dragon
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  425. Sale of custom-name KYC-verified accounts for crypto and financial platforms
    Category: Services
    Content: A threat actor is selling custom-name KYC-verified accounts for numerous cryptocurrency and financial platforms including Bitget, KuCoin, Kraken, Bybit, Bitvavo, Crypto.com, Bitpanda, and others. The seller claims to create fraudulent identity documents and complete KYC verification on the buyers behalf using a supplied name and surname, with delivery in 1–48 hours. Prices range from approximately 60€ to 1,250€ per account depending on platform and IBAN country.
    Date: 2026-05-11T12:13:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-SELL-CUSTOM-NAME-BITGET-KUCOIN-KRAKEN-BYBIT-BITVAVO-CRYPTO-COM-BITPANDA
    Screenshots:
    None
    Threat Actors: Rasselkyc
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  426. Sale of cryptocurrency cashout method
    Category: Carding
    Content: A forum user is offering a cryptocurrency cashout method for $600, framed as an educational guide covering Bitcoin, Ethereum, and Litecoin wallet recovery, private key management, and seed phrase analysis. Despite disclaimers of legality and educational intent, the post is listed in a cracking forum and advertises methods for accessing inactive or abandoned crypto wallets. The content is consistent with illicit cryptocurrency cashout or wallet-cracking tradecraft.
    Date: 2026-05-11T12:13:08Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-600-Crypto-Cashout-2026-Working-Method
    Screenshots:
    None
    Threat Actors: ZamanX
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  427. Sale of Silent Doc Exploit Framework Targeting Office Documents
    Category: Malware
    Content: A threat actor is offering a tool called Silent Doc Exploit 2026, described as an exploit framework that injects hidden malicious code into Word/Office documents for silent execution. The tool claims to support delivery of RATs, keyloggers, and crypto miners without user awareness, with remote command-and-control capability. A download link and VirusTotal scan result are referenced in the post.
    Date: 2026-05-11T12:12:00Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Silent-Doc-Exploit-2026
    Screenshots:
    None
    Threat Actors: RaoX78
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  428. Sale of Russian email account combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 1,200 Russian email account credentials, marketed as fully valid mail access. The list is dated 11.05 and posted in the combolists section of a cybercrime forum.
    Date: 2026-05-11T12:11:03Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-1-2K-Russian-Full-Valid-Mail-Access-11-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  429. Free combo list of 2.8K Chinese email credentials
    Category: Logs
    Content: A threat actor shared a combo list containing approximately 2,800 Chinese email credentials, marketed as fresh and dated 11.05. The list is available via a hidden link requiring forum registration to access.
    Date: 2026-05-11T11:54:41Z
    Network: openweb
    Published URL: https://xforums.st/threads/2-8k-china-fresh-mail-access-11-05.613698/
    Screenshots:
    None
    Threat Actors: MegaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  430. Free release of 35.5 million URL:login:password logs
    Category: Logs
    Content: A threat actor is distributing a collection of 35.5 million URL:login:password log entries, marketed as fresh and high-quality stealer log output. The post encourages users to claim valid credentials before others and advertises premium unwrapped bases via Telegram.
    Date: 2026-05-11T11:40:50Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-35-5-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  431. Free release of 20.3 million URL:login:password combo list
    Category: Logs
    Content: A threat actor on Cracked.st has freely shared a collection of 20.3 million URL:login:password log entries, marketed as fresh and high-quality. The post promotes the content as suitable for credential stuffing across multiple services and advertises additional unwrapped bases available via Telegram.
    Date: 2026-05-11T11:40:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-20-3-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  432. Free distribution of 39.9 million URL:Login:Password log credentials
    Category: Logs
    Content: A threat actor on Cracked.st is freely distributing a dataset claimed to contain 39.9 million URL:login:password entries described as fresh UHQ stealer logs. The post markets the credentials as valid hits and promotes additional unwrapped bases available via Telegram or the forum.
    Date: 2026-05-11T11:40:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-39-9-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  433. Combo List targeting Gmail accounts — Asia region
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 50,000 credential pairs targeting Gmail accounts sourced from Asia. The content is gated behind registration or login on the forum. No breach of a specific organization is claimed.
    Date: 2026-05-11T11:39:56Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%8F%AE-asia-gmail-50k-private-lines-%E2%80%94-%F0%9F%8F%AE
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  434. Free release of 12.3 million URL:log:pass combo list
    Category: Logs
    Content: A threat actor on Cracked.st has made available a collection of 12.3 million URL:log:pass entries, described as fresh UHQ stealer log output. The post encourages users to claim valid hits and advertises unwrapped bases available via Telegram or forum contact.
    Date: 2026-05-11T11:39:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-12-3-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8–2092293
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  435. Combo list targeting cloud and mail services
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as targeting cloud and mail services. The content is hidden behind a registration or login wall, limiting visibility into specifics. No record count or targeted service details are disclosed in the visible portion of the post.
    Date: 2026-05-11T11:39:41Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E3%80%90-%F0%9F%94%A5-private-cloud-%E2%80%A2-mail-lines-%F0%9F%94%A5-%E3%80%91
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  436. Free distribution of 25.3 million URL:login:password stealer logs
    Category: Logs
    Content: A threat actor on Cracked.st is freely distributing a collection of 25.3 million URL:login:password entries described as UHQ (ultra-high quality) stealer log output. The post markets the credentials as fresh and working, and directs users to Telegram or the forum for access to higher-quality unwrapped bases.
    Date: 2026-05-11T11:39:32Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-25-3-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  437. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A forum user is sharing a private combo list of approximately 3,000 Hotmail credentials. The content is gated behind registration or login on the forum. No details about data origin or verification status are available.
    Date: 2026-05-11T11:39:22Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5%F0%9F%94%A5%F0%9F%94%A5-hotmail-%E2%80%A2-private-x3000-%F0%9F%94%A5%F0%9F%94%A5%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  438. Free release of 12.5 million URL:Log:Pass combo list
    Category: Logs
    Content: A threat actor on Cracked.st has shared a collection of 12.5 million URL:log:pass entries, described as fresh and high-quality stealer log output. The post encourages users to claim valid hits and offers unwrapped bases for sale via Telegram or the forum.
    Date: 2026-05-11T11:39:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-12-5-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8–2092292
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  439. Free release of 15.1 million URL:log:pass credential combo list
    Category: Logs
    Content: A threat actor on Cracked.st has freely shared a collection of 15.1 million URL:log:pass entries described as fresh UHQ stealer log output. The post markets the credentials as valid hits and promotes additional unwrapped bases available via Telegram or the forum.
    Date: 2026-05-11T11:38:55Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-15-1-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  440. Gmail combo list with 2,840 credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list advertised as exclusive Gmail credentials, described as fresh. The content is hidden behind a registration/login wall on the forum. The listed count is 2,840 credential pairs.
    Date: 2026-05-11T11:38:51Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%92%8E-gmail-exclusive-%E2%80%94-fresh-only-2840x%F0%9F%92%8E
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  441. Alleged leak of 31.7 million URL:login:password stealer logs
    Category: Logs
    Content: A threat actor on Cracked.st is distributing a dataset of 31.7 million URL:login:password entries described as fresh, high-quality stealer log outputs. The post markets the content as UHQ ULP logs with working credentials and directs users to Telegram for access to additional unwrapped bases.
    Date: 2026-05-11T11:38:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-31-7-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  442. Combo List targeting Hotmail EU/US accounts
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 802 Hotmail credentials targeting EU and US accounts on a cybercrime forum. The content is restricted to registered members only. The post is labeled private only, suggesting exclusive or limited distribution.
    Date: 2026-05-11T11:38:21Z
    Network: openweb
    Published URL: https://patched.to/Thread-802x-%E2%97%8F%E2%80%94-hotmail-eu-us-%E2%80%94-private-only-%E2%80%94%E2%97%8F
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  443. Free release of 31.5 million URL:log:pass credential logs
    Category: Logs
    Content: A threat actor on a cracking forum is distributing a collection of 31.5 million URL:login:password log entries, marketed as fresh and high-quality stealer log output. The post advertises the content as free and encourages users to collect valid hits before others. The actor also promotes private, unwrapped database sales via Telegram or the forum.
    Date: 2026-05-11T11:38:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-31-5-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8–2092298
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  444. Yahoo combo list shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list marketed as a high-quality Yahoo private mix on a cybercrime forum. The content is hidden behind registration or login, limiting visibility into record count or data specifics. Credentials are intended for use in credential stuffing against Yahoo accounts.
    Date: 2026-05-11T11:38:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-yahoo-%E2%80%A2-private-mix-%E2%80%A2-hq-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  445. Free distribution of 26.4 million URL:login:password stealer logs
    Category: Logs
    Content: A threat actor on Cracked.st is freely distributing a collection of 26.4 million URL:login:password log entries, marketed as fresh and high-quality stealer log output. The post encourages users to claim valid hits quickly and advertises premium unwrapped bases available via Telegram or the forum.
    Date: 2026-05-11T11:37:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%9C%A8-26-4-MILLION-URL-LOG-PASS-%E2%9C%A8-PRIVATE-%E2%9C%A8-BEST-FOR-EVERYTHING-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  446. Combo list of fresh email credentials targeting USA and EU regions
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 50,000 email credentials described as fresh, targeting USA and EU regions. The content is gated behind registration or login on the forum.
    Date: 2026-05-11T11:37:46Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9D%84%EF%B8%8F-fresh-mail-%E2%80%94-usa-eu-%E2%80%94-50k%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  447. Sale of Hotmail-targeted combo list containing 1.7 million credentials
    Category: Combo List
    Content: A threat actor on Cracked.st is distributing a combo list of approximately 1.7 million email:password lines targeting Hotmail accounts. The list is marketed as a social-target combolist, likely intended for credential stuffing against Hotmail/Microsoft services.
    Date: 2026-05-11T11:37:23Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-745-047-Lines-%E2%9C%85-Social-Target-Combolist-Hotmail
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  448. Mix mail access combo list with 14.5K credentials
    Category: Combo List
    Content: A threat actor shared a mixed email access combo list containing approximately 14,500 credential pairs on a combolist forum. The content is gated behind registration or login. No specific targeted service or organization is identified.
    Date: 2026-05-11T11:37:16Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-14-5k%F0%9F%90%88%E2%80%8D%E2%AC%9Bmix-mail%F0%9F%90%88%E2%80%8D%E2%AC%9Baccess%F0%9F%90%88%E2%80%8D%E2%AC%9B
    Screenshots:
    None
    Threat Actors: MeiMisaki
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  449. Combo List: Gmail/Mix private lines
    Category: Combo List
    Content: A forum member is sharing a combo list described as private lines containing Gmail and mixed credentials. The content is hidden behind a registration/login wall, limiting visibility into specifics such as record count or credential types.
    Date: 2026-05-11T11:36:59Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%94%EF%B8%8F-private-lines-%E2%80%94-gmail-mix-%E2%9A%94%EF%B8%8F
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  450. Sale of Binance.com credential validator and checking service
    Category: Combo List
    Content: A threat actor is selling credential checker tools targeting Binance.com, capable of validating email and phone number combinations at 2,000+ CPM without CAPTCHA. The seller also offers a checking-as-a-service option, pricing combo list validation at $12 per 10,000 to $800 per 1 million entries.
    Date: 2026-05-11T11:36:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Selling-Binance-com-Validators
    Screenshots:
    None
    Threat Actors: fleahub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  451. Combo List of 98K Gmail Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 98,000 Gmail credential lines, marketed as high quality. The content is hidden behind a login/registration wall on the forum.
    Date: 2026-05-11T11:36:42Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%96%AC%E2%96%AC%E2%96%AC-%E2%97%8F-98k-gmail-hq-lines-%E2%97%8F-%E2%96%AC%E2%96%AC%E2%96%AC
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  452. Combo List targeting Hotmail with 14K USA credentials
    Category: Combo List
    Content: A threat actor shared what is described as a high-quality Hotmail combo list containing approximately 14,000 US-based credentials. The content is gated behind registration or login on the forum. The listed service (Hotmail) is a credential-stuffing target, not the breach source.
    Date: 2026-05-11T11:36:23Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8-hq-hotmail-%E2%80%94-private-cloud-%E2%9C%A8-14k-usa-%F0%9F%94%A5
    Screenshots:
    None
    Threat Actors: BreachLeak
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  453. Free combo list of mixed email credentials with keyword targets
    Category: Combo List
    Content: A threat actor on DemonForums is distributing a free combo list containing 3,259 mixed email and password credentials. The post also offers a separate download of keyword-targeted credential sets. No specific breach source or victim organization is identified.
    Date: 2026-05-11T11:35:42Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-3259x-HQ-MIXED-MAILS-%E2%9D%84%E2%9D%84-KEYWORD-TARGETS
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  454. Website Redefacement of Flying Eagle Skates by DimasHxR
    Category: Defacement
    Content: The website of Flying Eagle Skates, a sporting goods brand operating under a .eu domain, was defaced by the threat actor DimasHxR on May 11, 2026. This incident is classified as a redefacement, indicating the site had been previously compromised by the same or another attacker. No team affiliation, stated motive, or technical server details were disclosed in connection with this attack.
    Date: 2026-05-11T11:35:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919704
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: European Union
    Victim Industry: Retail / Sporting Goods
    Victim Organization: Flying Eagle Skates
    Victim Site: www.flyingeagleskates.eu
  455. Free combo list of 3.7K mixed email credentials with keyword targets
    Category: Combo List
    Content: A threat actor on DemonForums has distributed a combo list of approximately 3,700 mixed email credentials described as fresh and high quality. The post also includes associated keyword targets, suggesting use for credential stuffing campaigns.
    Date: 2026-05-11T11:35:04Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1-3-7k-FRESH-HQ-MIX-MAILS-%E2%9A%A1-KEYWORD-TARGETS
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  456. Sale of Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 1,910 Hotmail credentials, marketed as private and fresh. The content is hidden behind a registration/login wall on the forum.
    Date: 2026-05-11T11:34:59Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-1910x-%E2%AD%90%E2%AD%90-FRESH-HQ-HOTMAIL-%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: KiwiShioo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  457. Sale of Hotmail credential hits combo list
    Category: Combo List
    Content: A forum post advertises 540 Hotmail credential hits as hidden content requiring registration or login to access. The credentials are marketed as verified hits for Hotmail accounts. No further details about origin or data composition are provided.
    Date: 2026-05-11T11:34:34Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-540x-HOTMAIL-HITS
    Screenshots:
    None
    Threat Actors: MeiMisakix
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  458. Hotmail combo list shared on forum
    Category: Combo List
    Content: A threat actor shared a Hotmail combo list containing approximately 8,000 email:password pairs as hidden content on a dark web forum. The post advertises a shop (unique-combo.shop) offering combo lists for various countries and on request.
    Date: 2026-05-11T11:34:20Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-Unique-Combo-1-8000–203680
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  459. Alleged data breach of BBVA Bancomer Bank
    Category: Data Breach
    Content: A threat actor with the handle xyph0rix has posted on Breachforums regarding a database breach of BBVA Bancomer Bank. The post includes links to the threat actors profile and a dedicated thread discussing the breach.
    Date: 2026-05-11T11:19:02Z
    Network: telegram
    Published URL: https://t.me/Xyph0rix/341
    Screenshots:
    None
    Threat Actors: xyph0rix
    Victim Country: Mexico
    Victim Industry: Financial Services/Banking
    Victim Organization: BBVA Bancomer
    Victim Site: bbva.com.mx
  460. Alleged data leak of BBVA Bancomer Bank
    Category: Data Leak
    Content: A threat actor on a public forum is offering a free download of an alleged database attributed to BBVA Bancomer, a major Mexican bank. No details regarding the number of records, data fields, or method of acquisition were provided in the post.
    Date: 2026-05-11T11:18:38Z
    Network: openweb
    Published URL: https://breached.st/threads/database-bbva-bancomer-bank.86991/unread
    Screenshots:
    None
    Threat Actors: Xyph0rix
    Victim Country: Mexico
    Victim Industry: Finance
    Victim Organization: BBVA Bancomer
    Victim Site: bbvabancomer.com
  461. Combo List targeting gaming services
    Category: Combo List
    Content: A combo list of 4.6 million email:password lines targeting gaming services was shared on a cracking forum. No additional details are available from the post content.
    Date: 2026-05-11T11:06:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-4-6M-LINES-COMBO-GAMING
    Screenshots:
    None
    Threat Actors: Nuttela
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  462. Combo List targeting Gmail gaming accounts with 1.5 million credentials
    Category: Combo List
    Content: A threat actor is freely distributing a combo list of approximately 1.5 million Gmail credentials targeted at gaming accounts. The list is advertised as gaming-targeted and is being shared on a public forum. The actor has indicated willingness to fulfill additional combo list requests.
    Date: 2026-05-11T11:05:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Gmail-com-Gaming-Targeted-1-5M
    Screenshots:
    None
    Threat Actors: Immanuel_Kant
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  463. Combo List: 3.2 million UHQ Gmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 3.2 million Gmail credentials, marketed as ultra-high quality and fresh. The post is sponsored by a credential-stuffing tool service. Gmail is the credential-stuffing target, not the breach victim.
    Date: 2026-05-11T11:04:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-3-2M-UHQ-GMAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  464. Sale of Hotmail credential combo list with 5,000 hits
    Category: Combo List
    Content: A threat actor is distributing a combo list of 5,000 Hotmail credentials marketed as hits. The post was shared on a public cracking forum and includes a download link.
    Date: 2026-05-11T11:03:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%905000%E2%AD%90HOTMAIL%E2%AD%90HITS%E2%AD%90
    Screenshots:
    None
    Threat Actors: tihyy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  465. EU Hotmail combo list offered on forum
    Category: Combo List
    Content: A threat actor is offering a combo list of approximately 100 EU Hotmail credentials, marketed as private and untouched. The content is gated behind registration or login on the forum.
    Date: 2026-05-11T11:03:10Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%94%A5-0-1k-fresh-eu-hotmail-100-private-untouched-no-recycle-%F0%9F%94%A5-301202
    Screenshots:
    None
    Threat Actors: BedrockDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  466. Service request for social media account banning, unbanning, and claiming on Instagram, TikTok, and X
    Category: Services
    Content: A forum user is seeking individuals with tools or skills to ban, unban, and claim accounts on Instagram, TikTok, and X (Twitter) on behalf of a paying client. The post mentions a large database available for use and offers a referral fee for introductions to capable operators. Copyright/DMCA (CPR) strike capabilities are listed as a bonus.
    Date: 2026-05-11T11:03:06Z
    Network: openweb
    Published URL: https://cracked.st/Thread-TIME-TO-MAKE-SOME-INSTANT-MONEY-BAN-UNBAN-IG-TIK-TOK-X
    Screenshots:
    None
    Threat Actors: Dil8ert
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  467. Sale of 2.9K mixed mail access combo list
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 2,900 mixed mail access credentials on a cybercrime forum. The content is hidden behind a registration or login wall, limiting visibility into specifics. The list is attributed to the user Kommander0 and dated May 11.
    Date: 2026-05-11T11:02:36Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-2-9k-mix-mail-access-by-kommander0-11-05
    Screenshots:
    None
    Threat Actors: AnticaCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  468. Mix mail combo list with 3,970 credentials
    Category: Combo List
    Content: A threat actor shared a mixed mail combo list containing approximately 3,970 email and password combinations. The content is hidden behind a forum registration or login requirement. No specific targeted organization or service is identified.
    Date: 2026-05-11T11:01:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3970x-MIX-MAIL
    Screenshots:
    None
    Threat Actors: NotSellerXd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  469. Free combo list of mixed email credentials
    Category: Combo List
    Content: A threat actor has freely distributed a combo list containing 3,564 mixed email credentials on a public forum. The list is described as premium mixed mail credentials available for download.
    Date: 2026-05-11T11:01:33Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%E2%9D%84-3564x-PREMIUM-MIXED-MAILS-%E2%9D%84%E2%9D%84
    Screenshots:
    None
    Threat Actors: He_Cloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  470. Sale of alleged eToro database with 2 million records
    Category: Data Breach
    Content: A threat actor is selling an alleged database belonging to eToro, a global retail investment platform. The post claims the dataset contains 2 million records and directs interested buyers to contact via Telegram. No further details on data fields or breach origin are provided.
    Date: 2026-05-11T10:57:24Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-Global-investor-Etoro-Database-2M
    Screenshots:
    None
    Threat Actors: Mikhel
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: eToro
    Victim Site: etoro.com
  471. Website Defacement of Wild Devil Baits by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a subdirectory of wilddevilbaits.de, a German fishing bait and tackle retailer. The attack targeted a specific media/custom path rather than the homepage and was carried out as a single, non-mass defacement. No specific motive or team affiliation was disclosed by the attacker.
    Date: 2026-05-11T10:56:27Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919641
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Germany
    Victim Industry: Retail / Outdoor Sports & Fishing
    Victim Organization: Wild Devil Baits
    Victim Site: wilddevilbaits.de
  472. Website Defacement of inbyo.eu by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a media/customer address directory on the website inbyo.eu, a likely e-commerce or retail platform registered under the .eu top-level domain. The attack was a targeted single-site defacement, not part of a mass or redefacement campaign. Technical details such as the server software and attack vector were not disclosed.
    Date: 2026-05-11T10:55:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919589
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: European Union
    Victim Industry: E-commerce / Retail
    Victim Organization: Inbyo
    Victim Site: inbyo.eu
  473. Website Defacement of Supermercado Boinelore by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a subdirectory of the Brazilian supermarket website supermercadoboinelore.com.br. The attack was a targeted single-site defacement with no team affiliation reported. No specific motivation or server details were disclosed for this incident.
    Date: 2026-05-11T10:54:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919633
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Retail / Grocery
    Victim Organization: Supermercado Boinelore
    Victim Site: supermercadoboinelore.com.br
  474. Website Defacement of Brazilian Beach Tennis Retailer by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, threat actor DimasHxR defaced the Brazilian online beach tennis retail store lojadebeachtennis.com.br. The attack targeted a media directory path and was carried out as a single, non-mass defacement with no stated motive. The incident was documented and mirrored by zone-xsec.com.
    Date: 2026-05-11T10:54:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919598
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Brazil
    Victim Industry: Retail / Sports & Recreation
    Victim Organization: Loja de Beach Tennis
    Victim Site: lojadebeachtennis.com.br
  475. Website Defacement of Liguori.org by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the website liguori.org, associated with Liguori Publications, a Catholic religious publishing organization, was defaced by a threat actor operating under the alias DimasHxR. The attack targeted a subdirectory of the site and was carried out as a single, non-mass defacement. No specific motive or team affiliation was disclosed.
    Date: 2026-05-11T10:53:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919595
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United States
    Victim Industry: Religious / Non-Profit
    Victim Organization: Liguori Publications
    Victim Site: liguori.org
  476. Alleged Planned Leak of Pakistan Intelligence Bureau and ISI Classified Data
    Category: Data Leak
    Content: Threat actor claims to have access to confidential and top-secret files from Pakistans Intelligence Bureau Division (IBD), Intelligence Bureau Headquarters (IBHQ), and Inter-Service Intelligence (ISI). Actor announces plans to leak this classified material and references Pakistan nuclear data. A paid version of agobub tool is mentioned as the distribution mechanism.
    Date: 2026-05-11T10:52:44Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3413
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Pakistan
    Victim Industry: Government/Intelligence
    Victim Organization: Pakistan Intelligence Bureau, Inter-Service Intelligence (ISI)
    Victim Site: Unknown
  477. Website Defacement of Zipflux by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a media-related page on zipflux.io, targeting a subdirectory associated with customer address data. The attack was a single targeted defacement, not part of a mass or redefacement campaign. Technical details such as server software and IP address remain unknown.
    Date: 2026-05-11T10:52:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919645
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology / Media
    Victim Organization: Zipflux
    Victim Site: zipflux.io
  478. Alleged sale of mail access credentials and combolists across multiple countries
    Category: Combo List
    Content: Threat actor operating under handle @DataxLogs is advertising mail access availability for multiple countries (FR, BE, AU, CA, UK, US, NL, PL, DE, JP). Post indicates availability of combolists, configs, scripts, tools, and hits. Requests available upon contact.
    Date: 2026-05-11T10:52:29Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79543
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  479. Website Defacement of Juntame by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a media or customer address-related page on juntame.eu, a domain registered under the European Union (.eu) TLD. The defacement was a targeted, single-site incident with no affiliation to a known hacking team. No specific motivation or server details were disclosed in the available intelligence.
    Date: 2026-05-11T10:51:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919594
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: European Union
    Victim Industry: Unknown
    Victim Organization: Juntame
    Victim Site: juntame.eu
  480. Website Defacement of Topmarks.ca by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a subdirectory of topmarks.ca, a Canadian website. The attack targeted a media/customer path and was a single, non-mass defacement with no stated motivation recorded. No team affiliation was associated with the attacker.
    Date: 2026-05-11T10:51:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919634
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Canada
    Victim Industry: Unknown
    Victim Organization: Topmarks
    Victim Site: topmarks.ca
  481. Website Defacement of Intempo Distribution by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the attacker known as DimasHxR defaced a subdirectory of intempodistribution.it, an Italian distribution companys website. The incident was a targeted, non-mass defacement affecting a specific media path rather than the homepage. No team affiliation, stated motive, or technical details regarding the server environment were disclosed.
    Date: 2026-05-11T10:50:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919590
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Distribution / Logistics
    Victim Organization: Intempo Distribution
    Victim Site: intempodistribution.it
  482. Website Defacement of Nefertari Body Care by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, threat actor DimasHxR defaced the website of Nefertari Body Care, a personal care or cosmetics-related business. The attack targeted a subdirectory of the domain and was carried out as a single, non-mass defacement with no affiliated team. No specific motive or server details were disclosed.
    Date: 2026-05-11T10:49:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919615
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Health & Beauty / Personal Care
    Victim Organization: Nefertari Body Care
    Victim Site: nefertaribodycare.com
  483. Website Defacement of Manage My Groceries by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the Canadian grocery management website managemygroceries.ca was defaced by a threat actor operating under the alias DimasHxR. The attack targeted a subdirectory within the sites public media folder and was carried out as a single, non-mass defacement with no affiliated team. No specific motivation or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T10:49:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919604
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Canada
    Victim Industry: Retail / E-Commerce
    Victim Organization: Manage My Groceries
    Victim Site: managemygroceries.ca
  484. Website Defacement of MyCharger.am by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the Armenian website mycharger.am was defaced by the threat actor DimasHxR acting independently without a known team affiliation. The attack targeted a media/customer directory path and was not classified as a mass or home page defacement. Technical details such as server software and attack vector were not disclosed in the available intelligence.
    Date: 2026-05-11T10:48:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919613
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Armenia
    Victim Industry: E-Commerce / Retail
    Victim Organization: MyCharger
    Victim Site: mycharger.am
  485. Website Defacement of MDReastStore by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, threat actor DimasHxR defaced the website mdreaststore.com, targeting a file within the public media directory. The defacement was a targeted single-site attack with no team affiliation reported. No specific motive or server details were disclosed in connection with the incident.
    Date: 2026-05-11T10:47:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919611
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: E-Commerce / Retail
    Victim Organization: MDReast Store
    Victim Site: mdreaststore.com
  486. Website Defacement of Homemade.it by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the Italian website homemade.it was defaced by threat actor DimasHxR acting as an individual without team affiliation. The attack targeted a media/customer directory path on the site. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T10:46:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919642
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Italy
    Victim Industry: Food & Beverage / E-commerce
    Victim Organization: Homemade
    Victim Site: www.homemade.it
  487. Website Defacement of iamshubham.live by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a subdirectory of the personal website iamshubham.live, targeting a media/customer path. The attack was a targeted single-site defacement with no team affiliation reported. Server and infrastructure details were not disclosed, and no specific motivation was recorded for the incident.
    Date: 2026-05-11T10:46:06Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919588
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Personal/Blog
    Victim Organization: Shubham (Personal Website)
    Victim Site: iamshubham.live
  488. Alleged IDOR Vulnerability in Ledger Payment Gateway with Exploitation Script
    Category: Vulnerability
    Content: A vulnerability researcher claiming to represent @xorcat is offering sale of an IDOR (Insecure Direct Object Reference) vulnerability discovered in Ledgers payment gateway. The vulnerability allegedly allows free access to personal information of users registered within the last six months. A ready-made live extraction script is being offered for $15,000. The seller is restricting sales to decisive and reliable people on a first-come, first-served basis.
    Date: 2026-05-11T10:45:28Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3410
    Screenshots:
    None
    Threat Actors: xorcat
    Victim Country: Unknown
    Victim Industry: Financial Technology / Cryptocurrency
    Victim Organization: Ledger
    Victim Site: ledger.com
  489. Website Defacement of reyjayon.com by DimasHxR
    Category: Defacement
    Content: A threat actor identified as DimasHxR defaced a subpage of reyjayon.com, targeting a media/customer directory path on May 11, 2026. The attack was not classified as a mass or home page defacement, suggesting a targeted intrusion into a specific web directory. No team affiliation, motive, or server details were disclosed in connection with this incident.
    Date: 2026-05-11T10:45:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919625
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Reyjayon
    Victim Site: reyjayon.com
  490. Website Defacement of Riemenenco by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the attacker known as DimasHxR defaced a subdirectory of the Dutch website riemenenco.nl. The defacement targeted a media/custom path and was not classified as a mass or home page defacement. No team affiliation, motive, or technical details regarding the server environment were disclosed.
    Date: 2026-05-11T10:44:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919644
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Netherlands
    Victim Industry: Manufacturing / Industrial
    Victim Organization: Riemenenco
    Victim Site: www.riemenenco.nl
  491. Website Defacement of Equipster by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as DimasHxR defaced a media/customer directory page on equipster.eu, a European equipment-related website. The attack was a targeted single-page defacement, not classified as a mass or home page defacement. No specific motive, proof of concept, or team affiliation was disclosed in connection with this incident.
    Date: 2026-05-11T10:43:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919583
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: European Union
    Victim Industry: E-commerce / Equipment Retail
    Victim Organization: Equipster
    Victim Site: equipster.eu
  492. Website Defacement of Parasartfever.com by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the website parasartfever.com was defaced by the threat actor DimasHxR operating without a known affiliated team. The attacker targeted a subdirectory of the site, suggesting exploitation of a vulnerable web component or CMS media path. No specific motive or additional technical indicators were disclosed for this incident.
    Date: 2026-05-11T10:43:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919621
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Arts and Entertainment
    Victim Organization: Paras Art Fever
    Victim Site: parasartfever.com
  493. Website Defacement of Liquidalo by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the threat actor DimasHxR defaced a media/customer directory page on liquidalo.pe, a Peruvian e-commerce or retail website. The attack targeted a subdirectory rather than the homepage and was conducted without affiliation to a known hacking team. No specific motive or technical details were disclosed.
    Date: 2026-05-11T10:42:21Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919596
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Peru
    Victim Industry: E-commerce / Retail
    Victim Organization: Liquidalo
    Victim Site: liquidalo.pe
  494. Website Defacement of Fama Tools by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, threat actor DimasHxR defaced a media/customer address page on fama.tools, a technology tools platform. The attack was an individual, targeted defacement and not part of a mass defacement campaign. Technical details regarding the server environment and attacker motivation were not disclosed.
    Date: 2026-05-11T10:41:41Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919585
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Technology / Software Tools
    Victim Organization: Fama Tools
    Victim Site: fama.tools
  495. Website Defacement of Henima.sk by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the attacker known as DimasHxR defaced a page on henima.sk, a Slovak website, targeting a file path under the public media customer directory. The incident was a single targeted defacement with no team affiliation reported and no specific motivation disclosed. Server and infrastructure details were not available at the time of reporting.
    Date: 2026-05-11T10:40:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919587
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Slovakia
    Victim Industry: Unknown
    Victim Organization: Henima
    Victim Site: henima.sk
  496. Website Defacement of Phoenix Music by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, the attacker known as DimasHxR defaced a page on phoenixmusic.us, a music-related website based in the United States. The attack targeted a specific media/customer directory path rather than the homepage, indicating a targeted subdirectory defacement. The attacker operated independently without a known team affiliation.
    Date: 2026-05-11T10:40:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919623
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: United States
    Victim Industry: Entertainment / Music
    Victim Organization: Phoenix Music
    Victim Site: phoenixmusic.us
  497. Website Defacement of Jungleeny.com by DimasHxR
    Category: Defacement
    Content: On May 11, 2026, a threat actor operating under the alias DimasHxR defaced a media/customer subdirectory of jungleeny.com. The attacker acted independently without affiliation to a known group or team. No specific motive or technical details regarding the server environment were disclosed in connection with this incident.
    Date: 2026-05-11T10:39:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919593
    Screenshots:
    None
    Threat Actors: DimasHxR
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Jungleeny
    Victim Site: jungleeny.com
  498. Sale of discounted Hostinger Business Plan hosting accounts
    Category: Services
    Content: A forum seller is offering Hostinger Business Plan 1-year hosting accounts for $50, significantly below the listed retail price. The accounts include 50-website hosting, NVMe storage, AI tools, and other premium features, activated via email. The discounted pricing suggests these may be unauthorized, resold, or otherwise illicitly obtained accounts.
    Date: 2026-05-11T10:35:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%AD%90%E2%AD%90%E2%AD%90Hostinger-Business-Plan-%E2%80%93-1-Year-Premium-Hosting-Available-50%E2%9C%A8%E2%9C%A8%E2%9C%A8
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  499. Sale of Disney+ Premium accounts with 6-month warranty
    Category: Carding
    Content: A threat actor is selling Disney+ Premium accounts at $20 each, providing email and password credentials with a claimed 6-month warranty and replacement guarantee. The accounts are likely obtained through credential stuffing or carding activity targeting the Disney+ platform.
    Date: 2026-05-11T10:34:45Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%AD%90%E2%AD%90%E2%AD%90DISNEY-PLUS-PREMIUM-WARRANTY-6-MONTHS-20-%E2%9A%A1%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  500. Sale of Grammarly Pro subscription upgrade service
    Category: Services
    Content: A forum seller is offering Grammarly Pro (Premium) subscription upgrades on buyers own accounts for $30 per month. The upgrade is described as being completed via Grammarly Team, suggesting unauthorized or fraudulently obtained subscription access. A one-month warranty and renewal option are included.
    Date: 2026-05-11T10:34:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%9A%A1%E2%9A%A1%E2%9A%A1Grammarly-Pro-Subscription-On-Your-Own-Account-30-%E2%AD%90%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  501. Sale of Cursor Pro annual subscription access
    Category: Services
    Content: A forum user is offering one-year access to Cursor Pro, an AI-powered coding assistant, for $140. The listing advertises full pro-level features including autocomplete, AI test generation, and security flaw detection. Payment is accepted via cryptocurrency including BTC, LTC, and USDT.
    Date: 2026-05-11T10:33:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%9A%A1%E2%9A%A1%E2%9A%A1Cursor-Pro-%E2%80%93-1-Year-Access-for-Just-140-Full-AI-Coding-Power-140%E2%AD%90%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  502. Sale of social media follower and engagement boosting services across multiple platforms
    Category: Services
    Content: A threat actor is offering social media growth services including followers, likes, views, and subscribers across platforms such as TikTok, Instagram, Facebook, Twitter, YouTube, and Telegram. Payment is accepted via cryptocurrency and PayPal. The seller also advertises account upgrade services for platforms including Netflix, Spotify, and Canva.
    Date: 2026-05-11T10:33:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%AD%90subscribers-all-platform-%E2%9C%85TikTok-%E2%9C%85Instagram-%E2%9C%85-Facebook-%E2%9C%85Twitter-%E2%9C%85Telegram-%E2%AD%90
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  503. Sale of Speechify Premium accounts on cracking forum
    Category: Services
    Content: A threat actor is selling Speechify Premium 1-year access accounts on a cracking forum for $50, advertised as activating directly to the buyers email. The accounts are likely sourced from credential stuffing or unauthorized access, offered at a significant discount from the official price of approximately $139/year.
    Date: 2026-05-11T10:33:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%9C%A8%E2%9C%A8%E2%9C%A8Speechify-Premium-%E2%80%93-1-Year-Access-Available-Activation-directly-on-your-mail%E2%9A%A1%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  504. Sale of unauthorized Lovable Dev Pro premium subscription access
    Category: Services
    Content: A threat actor is selling purported Lovable Dev Pro premium subscription access at discounted rates, offering 1-year or 1-month plans significantly below official pricing. The seller claims instant activation and describes the offering as a genuine official subscription, suggesting resale of compromised or fraudulently obtained accounts.
    Date: 2026-05-11T10:32:49Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%9C%A8%E2%9C%A8%E2%9C%A8Lovable-Dev-Pro-%E2%80%93-1-Year-Premium-Access-Now-Available-%E2%9A%A1%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Technology
    Victim Organization: Lovable
    Victim Site: lovable.dev
  505. Free combo list distribution: URL:Log:Pass — 8+ million lines (Part 331)
    Category: Combo List
    Content: A threat actor on a cybercrime forum is freely distributing a URL:Log:Pass combo list containing over 8 million lines, labeled as Part 331 of an ongoing series. The content is gated behind forum registration or login. No specific victim organization is identified.
    Date: 2026-05-11T10:32:27Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-331
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  506. Free South Korea email combo list (Batch 35/100)
    Category: Combo List
    Content: A threat actor is freely distributing a South Korea email list as part of an ongoing batch series (batch 35 of 100). The content is hidden behind a registration/login wall. No further details on record count or data fields are provided.
    Date: 2026-05-11T10:32:10Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-35-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  507. Alleged purchase and resale of stolen Cursor AI account credentials
    Category: Logs
    Content: Threat actor actively purchasing large volumes of Cursor AI (cursor.com/cursor.ai) authentication cookies from Pro and Ultra subscription accounts at $2.5-$5 per cookie. Operating automated credential verification and payment system via Telegram bot (@cursorchecker_bot) to facilitate rapid processing of stolen account access tokens.
    Date: 2026-05-11T10:31:29Z
    Network: telegram
    Published URL: https://t.me/c/1397463379/11278
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Unknown
    Victim Industry: Software/AI Development Tools
    Victim Organization: Cursor AI
    Victim Site: cursor.com, cursor.ai
  508. Sale of fraudulent shipping scans and FTID boxing service for refund fraud
    Category: Services
    Content: A threat actor operating as Fuzzy is selling fraudulent shipping scans (UPS, FedEx, USPS) and an FTID boxing service designed to facilitate refund fraud against retailers and couriers. The service covers USA, Canada, and worldwide shipments, offering fabricated tracking events such as lost-in-transit, damage reports, and return-to-sender scans. Customers are directed to order via a dedicated website or Telegram/Signal channels.
    Date: 2026-05-11T10:30:17Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-OPEN-24-7-FUZZY-S-FTID-BOXING-SCANS-SERVICE-UPS-FEDEX-USPS-USA-WORLDWIDE
    Screenshots:
    None
    Threat Actors: Fuzzy
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  509. Sale of high-quality Forex and Crypto leads with full contact details
    Category: Services
    Content: A forum seller is offering Forex and Crypto leads for sale, purportedly sourced from major platforms including Binance, Coinbase, eToro, and others. Each lead includes full contact details such as name, email, phone, platform, and traffic source, filtered by high-interest actions like sign-ups, KYC, and trading activity. The leads are marketed toward affiliate networks, call centers, brokers, and fintech products across multiple global regions.
    Date: 2026-05-11T10:28:01Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SELLING-High-Quality-Leads-for-Forex-Crypto
    Screenshots:
    None
    Threat Actors: pm_rasel
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  510. Free combo list targeting Hotmail accounts (50K credentials)
    Category: Combo List
    Content: A threat actor shared a combo list of 50,000 Hotmail credentials, marketed as fresh, via a Pasteview link on a public forum. The credentials are likely intended for use in credential stuffing attacks against Hotmail/Outlook accounts.
    Date: 2026-05-11T10:24:30Z
    Network: openweb
    Published URL: https://altenens.is/threads/50k-fresh-hotmail-txt.2937822/unread
    Screenshots:
    None
    Threat Actors: Vekko
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  511. Sale of fraudulent transfer services and stolen payment cards
    Category: Carding
    Content: A threat actor is advertising fraudulent money transfer services across multiple platforms including CashApp, PayPal, Apple Pay, Revolut, Zelle, and Chime. The post also offers VBV and non-VBV credit and debit cards with balances ranging from $1,000 to $10,000 for $35 each, marketed for use in online payments, shopping, and phone orders. Free replacements are offered for non-functional cards, with payment accepted in cryptocurrency or USDT.
    Date: 2026-05-11T10:14:41Z
    Network: openweb
    Published URL: https://altenens.is/threads/all-your-legit-and-trusted-transfer-flips-to-all-countries-here-only-takes-1-5-minutes-to-receive-your-funds-mrgins-cashapp-transfer-mil0rld-pay.2937824/unread
    Screenshots:
    None
    Threat Actors: Heats
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  512. Alleged sale of Hotmail credential combolists and private cloud access
    Category: Combo List
    Content: Seller offering private cloud Hotmail UHQ (ultra high quality) credentials and combolists for multiple countries including DE, FR, IT, BR, UK, US, JP, PL, RU, ES, NL, MX, CA, SP, SG. Also advertising access to premium Hotmail data and country-specific datasets with associated platform credentials (Walmart, eBay, Kleinanzeigen, Uber, Poshmark, Depop). Targeting serious buyers only with keyword checking capability.
    Date: 2026-05-11T09:59:41Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79530
    Screenshots:
    None
    Threat Actors: Wěilóng
    Victim Country: Unknown
    Victim Industry: Technology, E-commerce, Ride-sharing
    Victim Organization: Unknown
    Victim Site: hotmail.com, walmart.com, ebay.com, kleinanzeigen.de, uber.com, poshmark.com, depop.com
  513. Combo List: 55K Germany email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 55,000 email:password credentials purportedly associated with German email accounts, marketed as valid. The post was made on a public cracking forum with no additional context available.
    Date: 2026-05-11T09:58:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-55K-Germany-Jyst-Valid-Mail-Access-11-05
    Screenshots:
    None
    Threat Actors: GoldenMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  514. Sale of 731K cryptocurrency platform combo list targeting Binance, Stripe, Venmo, and PayPal
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 731,000 email:password pairs marketed as high-quality private lines for use against cryptocurrency and payment platforms including Binance, Stripe, Venmo, and PayPal. The post advertises the credentials as suitable for credential stuffing against these services.
    Date: 2026-05-11T09:58:24Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%8E%9D-731K-CRYPTO%E2%8E%A0%E2%9A%A1100-PRIVATE-LINES%E2%9A%A1HIGH-QUALITY-COMBO%E2%9A%A1BINANCE-STRIPE-VENMO-PAYPAL%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  515. Sale of 1.2M Hotmail combo list
    Category: Combo List
    Content: A threat actor is offering for sale a claimed 1.2 million Hotmail email:password combo list via Telegram. The actor also advertises a Telegram group distributing free combo lists.
    Date: 2026-05-11T09:57:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-2M-HQ-HOTMAIL-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  516. Sale of 4.1 million Gmail combo list
    Category: Combo List
    Content: A threat actor is offering for sale a Gmail combo list containing 4.1 million email:password pairs, marketed as high quality. The seller directs prospective buyers to contact them via Telegram and also advertises a Telegram group where free combo lists are distributed.
    Date: 2026-05-11T09:57:38Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-4-1M-HQ-GMAIL-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  517. Combo List of 749K Cryptocurrency-Related Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 749,000 email:password pairs purportedly sourced from a private base and marketed as usable for cryptocurrency-related credential stuffing. The post advertises the list as suitable for multiple purposes.
    Date: 2026-05-11T09:57:15Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9A%A1749K-CRYPTO%E2%9A%A1PRIVATE-BASE-GOOD-ON-ANYTHING-YOU-NEED%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  518. Combo List: 519 Valid Hotmail Credentials Shared
    Category: Combo List
    Content: A threat actor is sharing 519 allegedly valid Hotmail email account credentials. The content is hidden behind a registration or login wall on the forum. These credentials appear to be marketed as fully valid mail access.
    Date: 2026-05-11T09:57:05Z
    Network: openweb
    Published URL: https://patched.to/Thread-519-full-valid-hotmail-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  519. Combo List: 4K Mixed Mail Access Credentials
    Category: Combo List
    Content: A combo list of approximately 4,000 mixed mail access credentials was shared on a cracking forum. The post appears to contain email account credentials potentially usable for credential stuffing or account takeover. No additional details are available from the post content.
    Date: 2026-05-11T09:56:50Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%904K-MIXED-MAIL-ACCESS-%E2%AD%90–2092270
    Screenshots:
    None
    Threat Actors: Posts
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  520. Sale of mixed mail access combo list
    Category: Combo List
    Content: A forum user is offering a combo list of 2,030 purportedly valid mixed mail access credentials. The content is hidden behind a registration or login wall, limiting further details. The credentials appear to cover multiple mail providers.
    Date: 2026-05-11T09:56:35Z
    Network: openweb
    Published URL: https://patched.to/Thread-2030-full-valid-mix-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  521. Free combo list of 5,229 mixed mail access credentials
    Category: Combo List
    Content: A forum user shared a combo list of 5,229 reportedly valid mixed email account credentials. The post is categorized as mail access credentials, suggesting they may be usable for account takeover. No additional details are available from the post content.
    Date: 2026-05-11T09:56:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-5229-FULL-VALID-MIX-MAIL-ACCESS
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  522. Combo List: 538 Valid Hotmail Credentials Shared
    Category: Combo List
    Content: A forum user shared a combo list of 538 allegedly valid Hotmail email account credentials. The content is gated behind registration or login on the forum. These credentials are marketed as fully valid mail access.
    Date: 2026-05-11T09:56:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-538-full-valid-hotmail-mail-access-301186
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  523. Combo List: Hotmail credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a list of 1,290 allegedly valid Hotmail email account credentials. The content is hidden behind a registration/login wall on the forum. These credentials appear intended for account takeover or further exploitation.
    Date: 2026-05-11T09:56:05Z
    Network: openweb
    Published URL: https://patched.to/Thread-1290-full-valid-hotmail-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  524. Sale of automated trading bot service
    Category: Services
    Content: A forum user operating under the alias Shield is advertising an automated trading bot claimed to generate approximately $50 per day. The seller directs interested buyers to contact them via Telegram. No specific victim organization or malicious activity is described.
    Date: 2026-05-11T09:56:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-Advance-Trading-Bot-2026-By-Shield-Sit-and-earn
    Screenshots:
    None
    Threat Actors: Shield
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  525. Combo List: Mixed Email Access Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 4,565 purportedly valid mixed email access credentials. The content is hidden behind a registration or login requirement on the forum.
    Date: 2026-05-11T09:55:44Z
    Network: openweb
    Published URL: https://patched.to/Thread-4565-full-valid-mix-mail-access
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  526. Sale of premium IPTV subscription service with discount offer
    Category: Services
    Content: A forum user is advertising a premium IPTV service called IPTVAL, offering 100K–200K+ movies and shows across all languages. A 30% discount is promoted for forum members using the code patched30. The post does not involve any breach, leak, or malicious activity.
    Date: 2026-05-11T09:55:17Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%AD%9030-off%E2%AD%90iptv%E2%AD%90premium-iptv-with-100k-200k-movies-shows-%E2%AD%90all-languages
    Screenshots:
    None
    Threat Actors: Crackhed01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  527. Combo List: Alleged Hotmail Valid Mail Access
    Category: Combo List
    Content: A threat actor is distributing a combo list of 1,181 alleged fully valid Hotmail mail access credentials. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T09:55:13Z
    Network: openweb
    Published URL: https://patched.to/Thread-1181-full-valid-hotmail-mail-access-301190
    Screenshots:
    None
    Threat Actors: GoldMailAccs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  528. Combo List: Hotmail mail access credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 944 Hotmail mail access credentials, described as old data. The content is gated behind forum registration or login.
    Date: 2026-05-11T09:54:54Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%9A%B5%F0%9F%8F%BCx944-hotmail-mail-access%F0%9F%9A%B5%F0%9F%8F%BC%E2%9C%A8-10-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  529. Alleged data leak of US individuals with income and financial data (2018 collection)
    Category: Data Leak
    Content: A threat actor shared a dataset purportedly containing personal and financial information on US individuals from 2018, including full names, addresses, phone numbers, income ranges, credit ratings, net worth estimates, home ownership status, and in some cases email addresses. The data is made available on a breach forum behind a registration/login gate. The original source of the data is not identified.
    Date: 2026-05-11T09:53:25Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-COLLECTION-Repost-US-People-With-Good-Income-2018
    Screenshots:
    None
    Threat Actors: BitBandit
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  530. Alleged breach of Bangladesh Navy (bnhoc.navy.mil.bd)
    Category: Cyber Attack
    Content: Threat actors claiming to have breached Bangladesh Navys official domain (bnhoc.navy.mil.bd). Post includes proof-of-compromise link and attributes the breach to a coalition of threat groups (TAI, KCD, HCG). Actors identify as JORD4N and ALPHA O2.
    Date: 2026-05-11T09:50:45Z
    Network: telegram
    Published URL: https://t.me/hind_cyber_ghost/103
    Screenshots:
    None
    Threat Actors: HIND CYBER GHOST
    Victim Country: Bangladesh
    Victim Industry: Military/Defense
    Victim Organization: Bangladesh Navy
    Victim Site: bnhoc.navy.mil.bd
  531. Alleged stolen credit card marketplace and credential database sales
    Category: Combo List
    Content: Multiple threat actors advertising stolen payment card services and credential databases. Pepecard operates as a card store claiming to offer 100,000+ valid cards daily (US/Canada/UK/Global) with 75-95% validity rates at $1-$1.50 per card. 9Check.me provides CVV validation services. Separate actor offering fresh database dumps containing credentials from eBay, Offerup, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, and webmail accounts across multiple countries.
    Date: 2026-05-11T09:50:05Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79505
    Screenshots:
    None
    Threat Actors: Pepecard
    Victim Country: United States, Canada, United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, Italy
    Victim Industry: Financial Services, E-commerce, Payment Processing
    Victim Organization: Unknown
    Victim Site: Unknown
  532. Alleged data leak of Canadian contacts from Apollo
    Category: Data Leak
    Content: A threat actor has shared what appears to be a subset of Canadian contacts sourced from the Apollo data leak, made available via a Mediafire link. The post does not specify the number of records included.
    Date: 2026-05-11T09:47:25Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-CANADIAN-CONTACTS-FROM-APPOLO-LEAK
    Screenshots:
    None
    Threat Actors: courtika
    Victim Country: Canada
    Victim Industry: Technology
    Victim Organization: Apollo
    Victim Site: apollo.io
  533. Alleged data breach of esky.com exposing Delta Airlines Brazilian traveler data
    Category: Data Breach
    Content: A threat actor is offering for sale an alleged database from esky.com containing 10.3 million records of Delta Airlines Brazilian travelers. The data purportedly includes date of birth, gender, full name, city, address, email, and phone number in CSV format. The post is attributed to The BlackH4t MD-Ghost.
    Date: 2026-05-11T09:36:24Z
    Network: openweb
    Published URL: https://breached.st/threads/10-3m-esky-com-delta-airlines-br-travelers-poland-2026.86990/unread
    Screenshots:
    None
    Threat Actors: MDGhost
    Victim Country: Poland
    Victim Industry: Travel
    Victim Organization: eSky
    Victim Site: esky.com
  534. Germany domain combo list with 563,110 lines
    Category: Combo List
    Content: A combo list of 563,110 email:password lines targeting German (.de) domains was shared on a cracking forum. The list is marketed as high quality and contains credentials associated with German email accounts.
    Date: 2026-05-11T09:22:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-563-110-Lines-%E2%9C%85-HQ-Leaks-Germany-Combolist-de-Domain
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  535. Sale of Japan email combo list with 1.9K valid credentials
    Category: Combo List
    Content: A threat actor is offering a combo list of 1,900 Japan-based email credentials marketed as valid. The post was shared on a public cracking forum and appears to target Japanese email accounts.
    Date: 2026-05-11T09:22:29Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-9K-Japan-Valid-Mail-Access
    Screenshots:
    None
    Threat Actors: GoldenMail
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  536. Combo List: 1,000 US Mail Access Credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 1,000 US-based mail access credentials, marketed as top quality. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T09:22:00Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-1k-just-usa-mail-access-just-top-quality-11-05
    Screenshots:
    None
    Threat Actors: MonnarhTeam
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  537. Combo list of Hotmail credentials shared
    Category: Combo List
    Content: A threat actor shared a combo list of 1,341 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits, suggesting they have been verified against Hotmail accounts.
    Date: 2026-05-11T09:21:28Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1341x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2292113
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  538. Sale of mail credential checking tool (Hackus Mail Checker 2.3)
    Category: Combo List
    Content: A forum user shared a link to Hackus Mail Checker 2.3, a credential-checking tool distributed via an external paste service. The tool appears designed for credential stuffing or account validation against mail services.
    Date: 2026-05-11T09:21:24Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-HACKUS-MAIL-CHECKER-2-3–2292103
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  539. Free combo list with 3,035 mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 3,035 mixed credentials, marketed as fresh. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T09:20:51Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-3035x-FRESH-MIX-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Nulled07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  540. Alleged source code leak of Claude Code
    Category: Data Leak
    Content: A forum user claims to have leaked the source code of Claude Code, allegedly exfiltrated on March 31, 2026, and shared a GitHub link. The poster warns that the shared code is infected and advises running it only within a virtual machine, suggesting the link may distribute malware. The legitimacy of this claim has not been verified.
    Date: 2026-05-11T09:15:20Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-SOURCE-CODE-Claude-code-source-code
    Screenshots:
    None
    Threat Actors: sacage_x64
    Victim Country: United States
    Victim Industry: Technology
    Victim Organization: Anthropic
    Victim Site: anthropic.com
  541. Sale of German email combo list (55K credentials)
    Category: Combo List
    Content: A threat actor is offering a combo list of 55,000 German email access credentials, marketed as valid as of May 11. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T09:06:53Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-55K-Germay-Fresh-Mail-Access-Just-valid-11-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  542. Sale of Yahoo combo list with 2.1 million credentials
    Category: Combo List
    Content: A threat actor is selling a Yahoo-targeted combo list containing 2.1 million email:password pairs, marketed as high quality. The seller also advertises free combo lists via a Telegram group.
    Date: 2026-05-11T08:50:11Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-2-1M-HQ-YAHOO-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  543. Sale of Chatprd Pro subscription accounts on cracking forum
    Category: Services
    Content: A forum seller is offering Chatprd Pro 1-year subscriptions for $25, delivered via coupon code. The listing includes access to premium AI models and integrations. The seller accepts middleman (MM) arrangements and provides Telegram-based proof and vouches.
    Date: 2026-05-11T08:49:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Chatprd-Pro-1-Year
    Screenshots:
    None
    Threat Actors: MarshallDark
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  544. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 597 Hotmail email and password pairs, described as old data. The credentials are marketed for mail access and distributed freely on a cracking forum.
    Date: 2026-05-11T08:49:49Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9D%84%EF%B8%8FX597-HOTMAIL-MAIL-ACCESS%E2%9D%84%EF%B8%8F-10-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  545. Sale of discounted Gumloop Pro subscription access
    Category: Services
    Content: A forum user is selling Gumloop 1-year Pro plan access with 20k+ credits/month for $55, delivered via coupon code. The offering includes unlimited seats, concurrent runs, and agent interactions. This appears to be a resale of discounted or unauthorized subscription access to the Gumloop AI automation platform.
    Date: 2026-05-11T08:49:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Gumloop-1-Year-Pro-20k-Credits
    Screenshots:
    None
    Threat Actors: MarshallDark
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  546. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,200 Hotmail email account credentials, described as VIP Cloud access. The content is hidden behind a registration/login requirement on the forum.
    Date: 2026-05-11T08:49:07Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%A8%F0%9F%9A%B5%F0%9F%8F%BC1-2k-hotmail-mail-access%F0%9F%9A%B5%F0%9F%8F%BC%E2%9C%A8-10-05
    Screenshots:
    None
    Threat Actors: TraxGod
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  547. Sale of Hotmail credential combo list with 2,136 hits
    Category: Combo List
    Content: A threat actor is sharing a combo list of 2,136 Hotmail credential hits on a cybercrime forum. The content is gated behind registration or login. No additional details about data origin or fields are available from the post.
    Date: 2026-05-11T08:48:51Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9A%9C-2136x-premium-hotmail-hits-%E2%9A%9C
    Screenshots:
    None
    Threat Actors: Anon75
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  548. Sale of 1.4 million European combo list
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 1.4 million credential pairs targeting European users. The list was made available via an external paste link on a public forum.
    Date: 2026-05-11T08:48:47Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-1-4M-EUROPA-COMBO–2292050
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  549. Free combo list of 10,000 US email credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing 10,000 US-based email credentials via an external paste link. The post is categorized as a combo list as it contains email credentials sourced from multiple breaches, not tied to a single organization.
    Date: 2026-05-11T08:48:25Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-10k-USA-GOOD-MAILS-COMBO–2292083
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  550. Free combo list of mixed email credentials
    Category: Combo List
    Content: A threat actor has freely distributed a combo list of 3,937 mixed email credentials on a cracking forum. The post links to an external paste site hosting the credential data. No specific victim organization or breach source is identified.
    Date: 2026-05-11T08:48:13Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-3937x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F–2292074
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  551. Alleged data leak of Indonesia Supreme Court BNI Virtual Account data with admin access
    Category: Data Leak
    Content: A threat actor is freely distributing data allegedly obtained from the Indonesia Supreme Courts case management system, including BNI virtual account numbers linked to legal cases and associated court fees. The post also claims admin access to the courts portal. The leaked dataset includes case agenda numbers, petitioner names, virtual account numbers, payment status, and case cost amounts.
    Date: 2026-05-11T08:43:22Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DATABASE-FREE-Indonesia-Supreme-Court-BNI-Virtual-Account-Data-Admin-Acces
    Screenshots:
    None
    Threat Actors: Zvok
    Victim Country: Indonesia
    Victim Industry: Government
    Victim Organization: Mahkamah Agung Republik Indonesia (Supreme Court)
    Victim Site: putusan.mahkamahagung.go.id
  552. Alleged sale of stolen credit card data and compromised databases (UK, DE, JP, NL, BR, PL, ES, US, IT)
    Category: Combo List
    Content: Threat actor offering fresh stolen databases and credit card data from multiple countries including UK, Germany, Japan, Netherlands, Brazil, Poland, Spain, US, and Italy. Claims to have access to compromised accounts from platforms including eBay, OfferUp, PSN, Booking, Uber, Poshmark, Alibaba, Walmart, Amazon, Mercari, Kleinanzeigen, and webmail services. Seller claims to operate a private cloud infrastructure and offers keyword-based searching. Pricing structure mentioned: US cards at $1, international cards at $1.50 with 75-95% validity guarantee.
    Date: 2026-05-11T08:17:44Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79469
    Screenshots:
    None
    Threat Actors: Num
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy
    Victim Industry: E-commerce, Payment Processing, Email Services, Travel, Social Commerce
    Victim Organization: Unknown
    Victim Site: Unknown
  553. Sale or distribution of CV template pack on cracking forum
    Category: Alert
    Content: A forum post on a cracking forum shares a link to an external paste site advertising a collection of professional CV templates in multiple languages. The content does not appear to constitute a direct cyber threat and may be spam or unrelated material posted in a cracking context.
    Date: 2026-05-11T08:17:25Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-Ultimate-Professional-CV-Template-Pack-all-languages–2292041
    Screenshots:
    None
    Threat Actors: Fragtez
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  554. Combo List of Hotmail credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of 1,913 claimed valid Hotmail credentials. The post advertises the credentials as premium hits and references private cloud access. Content is hidden behind forum registration or login.
    Date: 2026-05-11T08:16:44Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1913-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaaxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  555. Free distribution of Hotmail credential hits combo list
    Category: Combo List
    Content: A threat actor shared 1,913 alleged valid Hotmail credential hits on a darknet forum. The content is gated behind registration or login and promoted via a Telegram handle. The post markets the credentials as premium and sourced from a private cloud mix.
    Date: 2026-05-11T08:16:36Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1913-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F
    Screenshots:
    None
    Threat Actors: alphaxdd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  556. Hotmail credential combo list sample (1,435 entries)
    Category: Combo List
    Content: A threat actor shared a sample combo list containing 1,435 Hotmail email and password pairs on a criminal forum. The content is gated behind registration or login. This is a credential stuffing resource, not a breach of the Hotmail service itself.
    Date: 2026-05-11T08:16:12Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-1435x-SAMPLE-HOTMAIL-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: HollowKnight
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  557. Alleged breach of Federal Investigation Agency (FIA) Pakistan government systems
    Category: Cyber Attack
    Content: Threat actor claims to have compromised fia.gov.pk (Federal Investigation Agency Pakistan) and shared screenshots demonstrating access to internal systems with data deletion capabilities. Actor threatens to release additional data including intelligence-related information.
    Date: 2026-05-11T08:10:09Z
    Network: telegram
    Published URL: https://t.me/c/3793980891/3406
    Screenshots:
    None
    Threat Actors: Unknown
    Victim Country: Pakistan
    Victim Industry: Government/Law Enforcement
    Victim Organization: Federal Investigation Agency (FIA)
    Victim Site: fia.gov.pk
  558. Alleged sale of phishing kit and credential harvesting tools by DataxLogs
    Category: Phishing
    Content: Threat actor operating under handle @DataxLogs is advertising the sale of phishing configuration tools including Silverbullet and Openbullet 2 with APIs for web, Android, and iOS platforms. The service includes captcha bypass capabilities (hCaptcha, Cloudflare, Captcha V2/V3, etc.) designed to automate credential harvesting and account compromise attacks.
    Date: 2026-05-11T08:07:04Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79474
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  559. Combo list of 3.3K Hotmail credentials shared on forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 3,300 Hotmail email account credentials, marketed as fresh and high quality. The content is hidden behind a forum registration or login wall.
    Date: 2026-05-11T08:06:54Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-3-3K-Hotmail-Frersh-Mail-Access-Top-Quality-11-05
    Screenshots:
    None
    Threat Actors: MegaCloudShop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  560. Website Defacement of xacgdh.com by Vazzle07
    Category: Defacement
    Content: On May 11, 2026, the website xacgdh.com was defaced by a threat actor operating under the handle Vazzle07, targeting the file path /env.php. The attack was a single, non-mass defacement with no affiliated team claimed. No specific motive or additional technical details regarding the server environment were disclosed.
    Date: 2026-05-11T07:49:58Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919546
    Screenshots:
    None
    Threat Actors: Vazzle07
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: xacgdh.com
  561. Sale of Cisco CCNA exam vouchers and account upgrade services
    Category: Services
    Content: A forum seller is offering Cisco CCNA exam vouchers for sale via cryptocurrency and PayPal. The seller also advertises account upgrade services for platforms including Spotify, Netflix, Canva, and others. The post claims vouchers are genuine and sourced directly from an instructor.
    Date: 2026-05-11T07:44:47Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%AD%90%E2%AD%90%E2%AD%90-CCNA-CiscoExam-NetworkingCertification-CiscoVoucher-LearnNetworking-CCNA
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  562. Sale of mixed corporate domain combo list
    Category: Combo List
    Content: A combo list containing 110,244 mixed corporate domain email and password combinations has been shared on a cybercrime forum. The post is categorized as a credential list targeting corporate domain accounts. No additional details are available from the post content.
    Date: 2026-05-11T07:44:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-110-244-Mixed-Corp-Domain
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  563. Sale of discounted Capsolver and CapMonster API keys
    Category: Services
    Content: A threat actor is selling discounted API keys for Capsolver and CapMonster CAPTCHA-solving services, claiming the keys do not belong to them. The keys are offered at $7.50 each or $12.50 for both, suggesting unauthorized resale of third-party accounts.
    Date: 2026-05-11T07:44:27Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-SELL-CAPMONSTER-CAPSOLVER-API-KEY–2092241
    Screenshots:
    None
    Threat Actors: BlazeAmor
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  564. Sale of Hotmail combo list with 10,000 credentials
    Category: Combo List
    Content: A threat actor is advertising a combo list of 10,000 Hotmail/Outlook/Live/MSN email:password credentials marketed as fresh and high hit rate. The listing claims daily drops of 2–4 files covering US, EU, FR, DE, and IT regions. Access is offered via a Telegram channel.
    Date: 2026-05-11T07:44:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-10k-HOTMAIL–2092242
    Screenshots:
    None
    Threat Actors: joye
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  565. Sale of Cisco CCNA exam vouchers
    Category: Services
    Content: A forum user is offering Cisco CCNA exam vouchers for sale at $220. The post appears to be a commercial service listing for discounted certification exam access.
    Date: 2026-05-11T07:44:07Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-%E2%AD%90%E2%AD%90%E2%AD%90Cisco-s-ccna-exams-voucher-220
    Screenshots:
    None
    Threat Actors: wavesub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  566. Combo list of Hotmail and mixed credentials offered on forum
    Category: Combo List
    Content: A threat actor is distributing a combo list of Hotmail and mixed credentials, claiming the content was dropped in a private Telegram channel 24 hours prior. The content is hidden behind a forum registration wall. The actor references a Telegram channel with over 2,000 members.
    Date: 2026-05-11T07:43:40Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%B4%EF%B8%8F-hq-fresh-hotmails-mix-%E2%9C%B4%EF%B8%8F-dropped-in-private-channel-24h-ago-%F0%9F%94%A5%F0%9F%94%A5-301162
    Screenshots:
    None
    Threat Actors: nikyofficial
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  567. Sale of Hotmail combo list with alleged fresh hits
    Category: Combo List
    Content: A threat actor is advertising a combo list of approximately 10,000 Hotmail, Outlook, Live, and MSN credentials marketed as fresh daily hits with a high hit rate. The list is claimed to target users across the US, EU, France, Germany, and Italy. Access is offered via a Telegram channel with 2–4 file drops daily.
    Date: 2026-05-11T07:42:49Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Hotmail-10k-Premium-Mail-Access-Fresh-Hits
    Screenshots:
    None
    Threat Actors: mailcombo01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  568. Sale of mixed email combo list with 30K fresh hits
    Category: Combo List
    Content: A threat actor is advertising a combo list of approximately 30,000 email credentials targeting Hotmail, Outlook, Live, and MSN accounts across US and EU regions. The credentials are marketed as fresh with a high hit rate, distributed in daily drops of 2–4 files via a Telegram channel.
    Date: 2026-05-11T07:42:26Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-Mix-30k-Premium-Mail-Access-Fresh-Hits
    Screenshots:
    None
    Threat Actors: mailcombo01
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  569. Alleged data breach of Yemen infrastructure
    Category: Data Breach
    Content: A forum post titled Public Disclosure & Data Auction – The Yemen Infrastructure Breach claims a breach of Yemen-related infrastructure, with data allegedly being auctioned. No further details are available as the post content is empty.
    Date: 2026-05-11T07:39:52Z
    Network: openweb
    Published URL: https://xforums.st/threads/public-disclosure-data-auction-the-yemen-infrastructure-breach.613690/
    Screenshots:
    None
    Threat Actors: S4uD1Pwnz
    Victim Country: Yemen
    Victim Industry: Government
    Victim Organization: Unknown
    Victim Site: Unknown
  570. Website Defacement of theciso.org by chinafans (0xteam)
    Category: Defacement
    Content: The website theciso.org, associated with cybersecurity and CISO (Chief Information Security Officer) community resources, was defaced by threat actor chinafans operating under the group 0xteam on May 11, 2026. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted content modification rather than a full site takeover. No specific motive or additional technical details were disclosed in connection with the incident.
    Date: 2026-05-11T07:32:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919537
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Cybersecurity / Information Security
    Victim Organization: The CISO
    Victim Site: theciso.org
  571. Website Defacement of 24by7homebids.com by chinafans (0xteam)
    Category: Defacement
    Content: The website 24by7homebids.com, a real estate or home bidding platform, was defaced by a threat actor operating under the alias chinafans, affiliated with the group 0xteam. The defacement was recorded on May 11, 2026, with a mirror of the defaced page archived at zone-xsec.com. The incident was a singular, targeted defacement rather than a mass or repeat defacement campaign.
    Date: 2026-05-11T07:31:01Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919514
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Real Estate
    Victim Organization: 24by7 Home Bids
    Victim Site: 24by7homebids.com
  572. Website Defacement of ScoreEdge by chinafans (0xteam)
    Category: Defacement
    Content: The website scoreedge.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 11, 2026. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-11T07:30:17Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919516
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: ScoreEdge
    Victim Site: scoreedge.com
  573. Website Defacement of Usine à Histoires by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the Canadian website usineahistoires.ca was defaced by threat actor chinafans, operating under the group 0xteam. The defacement targeted a specific text file path (/0x.txt) and was recorded as a single, non-mass defacement incident. No specific motivation or server details were disclosed.
    Date: 2026-05-11T07:29:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919526
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Canada
    Victim Industry: Entertainment / Media
    Victim Organization: Usine à Histoires
    Victim Site: usineahistoires.ca
  574. Website Defacement of Academicosbrasil.com by chinafans (0xteam)
    Category: Defacement
    Content: The website academicosbrasil.com, a Brazilian academic platform, was defaced by threat actor chinafans operating under the team 0xteam on May 11, 2026. The attacker placed a defacement file at the path /0x.txt on the target server. The incident was a standalone, non-mass defacement with no stated motivation recorded.
    Date: 2026-05-11T07:28:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919498
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Education
    Victim Organization: Academicos Brasil
    Victim Site: academicosbrasil.com
  575. Website Defacement of laboregen.com by chinafans (0xteam)
    Category: Defacement
    Content: The website laboregen.com was defaced by a threat actor using the handle chinafans, affiliated with the group 0xteam. The defacement was recorded on May 11, 2026, with a mirror of the defaced page archived at zone-xsec.com. No additional details regarding the server environment, attacker motivation, or victim country were disclosed.
    Date: 2026-05-11T07:26:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919521
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Laboregen
    Victim Site: laboregen.com
  576. Website Defacement of Baguio Transient by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website baguiotransient.net, associated with a transient accommodation service in Baguio, Philippines, was defaced by a threat actor using the handle chinafans operating under the group 0xteam. The defacement was a targeted, single-site intrusion with no indication of mass or repeat defacement activity. The incident was documented and mirrored by zone-xsec.com.
    Date: 2026-05-11T07:25:52Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919528
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Philippines
    Victim Industry: Hospitality / Short-Term Rentals
    Victim Organization: Baguio Transient
    Victim Site: baguiotransient.net
  577. Website Defacement of Kara Short Rents by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website karashortrents.com, a short-term rental service. The attack was a targeted single-site defacement, with the defaced content hosted at the path /0x.txt, consistent with the groups naming conventions. No specific motivation or technical details were disclosed.
    Date: 2026-05-11T07:25:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919518
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Real Estate / Short-Term Rentals
    Victim Organization: Kara Short Rents
    Victim Site: karashortrents.com
  578. Alleged data leak of Vodafone by LAPSUS group
    Category: Data Leak
    Content: A threat actor claims to be distributing a full infrastructure and GitHub repository dump of Vodafone, attributed to the LAPSUS group. The archive is made available via an external file-sharing link. The post provides no further details on the scope or authenticity of the alleged leak.
    Date: 2026-05-11T07:24:50Z
    Network: openweb
    Published URL: https://breached.st/threads/lapsus-vodafone-full-leak-may-2026.86989/unread
    Screenshots:
    None
    Threat Actors: jeanboelard
    Victim Country: Unknown
    Victim Industry: Telecommunications
    Victim Organization: Vodafone
    Victim Site: vodafone.com
  579. Website Defacement of Fenepay by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the payment platform Fenepay was defaced by threat actor chinafans operating under the group 0xteam. The defacement was a targeted single-site attack, with the defaced content hosted at fenepay.com/0x.txt. No specific motive or vulnerability details were disclosed.
    Date: 2026-05-11T07:24:29Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919540
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Financial Services / Payment Processing
    Victim Organization: Fenepay
    Victim Site: fenepay.com
  580. Website Defacement of GS Auto Transport by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, threat actor chinafans operating under the group 0xteam defaced the website of GS Auto Transport, an auto transport/logistics company. The defacement was a targeted single-site attack, with the defaced content hosted at gsautotransport.com/0x.txt. No specific motive or vulnerability details were disclosed.
    Date: 2026-05-11T07:23:48Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919519
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Transportation & Logistics
    Victim Organization: GS Auto Transport
    Victim Site: gsautotransport.com
  581. Website Defacement of DuBois College by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website duboiscollege.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a text file on the colleges web server. The incident was a single-target defacement with no indication of mass or repeated compromise.
    Date: 2026-05-11T07:23:03Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919529
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Education
    Victim Organization: DuBois College
    Victim Site: duboiscollege.com
  582. Website Defacement of Clear Sky Farms by chinafans (0xteam)
    Category: Defacement
    Content: The website clearskyfarms.com was defaced by threat actor chinafans operating under the group 0xteam on May 11, 2026. The defacement targeted a page at the path /0x.txt, consistent with the teams naming convention. This was a singular, targeted defacement rather than a mass or home page defacement event.
    Date: 2026-05-11T07:22:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919508
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Agriculture
    Victim Organization: Clear Sky Farms
    Victim Site: clearskyfarms.com
  583. Website Defacement of ChinaLamp.org by Vazzle07
    Category: Defacement
    Content: On May 11, 2026, the threat actor Vazzle07 defaced the website www.chinalamp.org by compromising the file env.php. The attack was a targeted single-site defacement with no team affiliation reported. The victim appears to be a Chinese lighting or lamp manufacturing organization, and no specific motive or exploit details were disclosed.
    Date: 2026-05-11T07:21:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919545
    Screenshots:
    None
    Threat Actors: Vazzle07
    Victim Country: China
    Victim Industry: Manufacturing / Lighting
    Victim Organization: China Lamp
    Victim Site: www.chinalamp.org
  584. Website Defacement of Google Business Profile Ranking Service by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as chinafans, affiliated with 0xteam, defaced the website rankmygooglebusinessprofile.co, a digital marketing or SEO-related service. The incident was a targeted single-site defacement, not part of a mass defacement campaign. No specific motive or server details were disclosed.
    Date: 2026-05-11T07:20:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919497
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Digital Marketing / SEO Services
    Victim Organization: Rank My Google Business Profile
    Victim Site: rankmygooglebusinessprofile.co
  585. Website Defacement of matriart.es by chinafans (0xteam)
    Category: Defacement
    Content: The website matriart.es was defaced by a threat actor known as chinafans, operating under the group 0xteam, on May 11, 2026. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was recorded and mirrored by zone-xsec.com under mirror ID 919523.
    Date: 2026-05-11T07:19:51Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919523
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Spain
    Victim Industry: Arts and Culture
    Victim Organization: Matriart
    Victim Site: matriart.es
  586. Website Defacement of CBK Industries by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website cbkindustries.com was defaced by threat actor chinafans operating under the group 0xteam. The attack targeted a specific file path (/0x.txt) on the domain, consistent with a standard web defacement operation. The incident was not classified as a mass or home page defacement, suggesting a targeted file-level intrusion.
    Date: 2026-05-11T07:19:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919515
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Industrial/Manufacturing
    Victim Organization: CBK Industries
    Victim Site: cbkindustries.com
  587. Website Defacement of bluelane.video by chinafans (0xteam)
    Category: Defacement
    Content: A threat actor identified as chinafans, operating under the group 0xteam, defaced the website bluelane.video on May 11, 2026. The defacement targeted a video-related media platform, with the attacker leaving a text file at the path /0x.txt as evidence of compromise. The incident was a single targeted defacement rather than a mass or home page defacement.
    Date: 2026-05-11T07:18:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919517
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Media/Entertainment
    Victim Organization: Blue Lane Video
    Victim Site: bluelane.video
  588. Website Defacement of Pillar3 by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website pillar3.co by altering a publicly accessible text file at the path /0x.txt. The defacement appears to be a targeted, non-mass incident with no prior redefacement history recorded. Technical details regarding the server environment and attack vector remain unknown.
    Date: 2026-05-11T07:17:36Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919499
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Pillar3
    Victim Site: pillar3.co
  589. Website Defacement of eBuyDepot by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the e-commerce website ebuydepot.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement was a targeted single-site attack, leaving a text-based payload at the path /0x.txt. No specific motivation or exploitation method was publicly disclosed for this incident.
    Date: 2026-05-11T07:16:43Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919509
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: E-Commerce / Retail
    Victim Organization: eBuyDepot
    Victim Site: ebuydepot.com
  590. Website Defacement of b-dream.top by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xteam, defaced the website b-dream.top on May 11, 2026. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. No additional details regarding the victim organization, motive, or attack vector were disclosed.
    Date: 2026-05-11T07:16:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919536
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: b-dream.top
  591. Website Defacement of Cyber Future Dialogue by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as chinafans operating under the group 0xteam defaced the website cyberfuturedialogue.org, targeting a platform likely associated with cyber policy and international dialogue. The defacement was a singular targeted incident, not a mass or home page defacement, with the malicious content hosted at the path /0x.txt. The incident was mirrored and recorded by zone-xsec.com under mirror ID 919495.
    Date: 2026-05-11T07:15:20Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919495
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology / Policy / Think Tank
    Victim Organization: Cyber Future Dialogue
    Victim Site: cyberfuturedialogue.org
  592. Website Defacement of vikngo.com by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the group 0xteam, defaced the website vikngo.com on May 11, 2026. The defacement was a targeted, single-site incident rather than a mass or redefacement campaign. No specific motive or server details were disclosed in connection with this attack.
    Date: 2026-05-11T07:14:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919511
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: vikngo.com
  593. Website Defacement of youiht.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website youiht.com by uploading a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no additional technical indicators such as server software or IP address recorded. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-11T07:13:55Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919535
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: youiht.com
  594. Website Defacement of rsaif.ai by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website rsaif.ai by uploading a defacement file at the path /0x.txt. The incident was a targeted, non-mass defacement affecting a single AI-related domain. No specific motive or server details were disclosed.
    Date: 2026-05-11T07:13:09Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919501
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Technology / Artificial Intelligence
    Victim Organization: Rsaif AI
    Victim Site: rsaif.ai
  595. Sale of Gmail combo list by D4rkNetHub
    Category: Combo List
    Content: A threat actor operating under the alias D4rkNetHub is offering a combo list of over 100,000 Gmail credentials on a cracking forum. No additional details are available from the post content.
    Date: 2026-05-11T07:10:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-100k-GMAIL-GOODS-D4RKNETHUB-7–2092231
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  596. Germany Mixed Target Combo List (722K Lines)
    Category: Combo List
    Content: A combo list of 722,208 email:password lines targeting German (.de) accounts across mixed services was shared on a cybercrime forum. The list is marketed as a mixed-target credential set for use in credential stuffing attacks.
    Date: 2026-05-11T07:10:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-722-208-Lines-%E2%9C%85-Germany-de-Combolist-Mixed-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  597. Free USA combo list with 680K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 680,000 email and password combinations purportedly sourced from United States users. The post markets the credentials as fresh and previously unused. No specific breached organization is identified.
    Date: 2026-05-11T07:10:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-680K-USA-COMBOLIST-%E2%9C%94%EF%B8%8F-UNRAPED-AND-FRESH-LINES-%E2%9C%94%EF%B8%8FSEXY-BASE
    Screenshots:
    None
    Threat Actors: AstroBella
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  598. Alleged sale of fraudulent US drivers licenses and identity documents
    Category: Initial Access
    Content: Threat actor offering counterfeit US drivers licenses (front and back) with optional SSN information at $5 per unit with minimum order of 10 pieces. Also offering paid instruction on obtaining fraudulent IDs, drivers licenses, SSNs, and bank checks.
    Date: 2026-05-11T07:09:47Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79453
    Screenshots:
    None
    Threat Actors: Benjamin
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  599. USA combo list of 496K credentials freely shared
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 496,000 email and password combinations purportedly sourced from United States users. The post markets the credentials as fresh and previously unused. No specific breached organization is identified.
    Date: 2026-05-11T07:09:35Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-496K-USA-COMBOLIST-%E2%9C%94%EF%B8%8F-UNRAPED-AND-FRESH-LINES-%E2%9C%94%EF%B8%8FSEXY-BASE
    Screenshots:
    None
    Threat Actors: AstroBella
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  600. Free combo list distribution: HQ Mix
    Category: Combo List
    Content: A forum user distributed a combo list of 1,483 credentials marketed as high quality. The content is hidden behind a registration or login wall on the forum. No specific breach victim or targeted service is identified.
    Date: 2026-05-11T07:08:12Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-Leak-%E2%9A%A1%E2%9A%A1-X1483-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: stevee
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  601. Sale of HQ Mix combo list
    Category: Combo List
    Content: A combo list advertised as HQ Mix containing approximately 1,483 email:password credential pairs has been shared on a public forum. The content is hidden behind registration or login, suggesting distribution to forum members. No specific breach source or targeted service is identified.
    Date: 2026-05-11T07:08:08Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1483-HQ-Mix-%E2%9A%A1%E2%9A%A1-BY-Stevee36-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: erwinn91
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  602. Alleged data breach of Delko.fr
    Category: Data Breach
    Content: A threat actor operating under the name LAPSEC claims to have breached Delko.fr, a French retailer, allegedly compromising data on 3.5 million customers. The actor is offering the database for sale via Telegram. No sample data was provided in the post.
    Date: 2026-05-11T07:04:30Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DELKO-FR-BREACH-BY-LAPSEC
    Screenshots:
    None
    Threat Actors: lapsussgroups
    Victim Country: France
    Victim Industry: Retail
    Victim Organization: Delko
    Victim Site: delko.fr
  603. Website Defacement of cliente1.qar.cl by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced a file hosted on the Chilean domain cliente1.qar.cl. The defacement targeted a specific text file (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was recorded as a single, non-mass defacement event.
    Date: 2026-05-11T07:00:45Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919453
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Chile
    Victim Industry: Unknown
    Victim Organization: QAR
    Victim Site: cliente1.qar.cl
  604. Website Defacement of Alpine Camping by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website alpinecamping.com was defaced by threat actor chinafans operating under the team 0xteam. The attacker uploaded a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated compromise.
    Date: 2026-05-11T06:59:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919481
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Outdoor Recreation / Retail
    Victim Organization: Alpine Camping
    Victim Site: alpinecamping.com
  605. Website Defacement of rodztinttouch.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website rodztinttouch.com by uploading a file at the path /0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity. Server and infrastructure details were not disclosed in the available data.
    Date: 2026-05-11T06:59:12Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919477
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Rodztint Touch
    Victim Site: rodztinttouch.com
  606. Website Defacement of Saulhauls.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website saulhauls.com was defaced by a threat actor identified as chinafans, operating under the group 0xteam. The defacement was a targeted single-site incident, with the defaced content hosted at saulhauls.com/0x.txt. No additional technical indicators such as server software or IP address were recorded for this incident.
    Date: 2026-05-11T06:58:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919447
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Transportation / Logistics
    Victim Organization: Saul Hauls
    Victim Site: saulhauls.com
  607. Website Defacement of My Heart Funerals by chinafans (0xteam)
    Category: Defacement
    Content: The website myheartfunerals.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 11, 2026. The defacement was a targeted single-site compromise, with the attacker leaving a marker at the path /0x.txt. No specific motivation or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T06:57:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919485
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Funeral Services
    Victim Organization: My Heart Funerals
    Victim Site: myheartfunerals.com
  608. Website Defacement of griplinestrap.com by chinafans (0xteam)
    Category: Defacement
    Content: The website griplinestrap.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 11, 2026. The defacement was a targeted single-site attack, leaving a text file (0x.txt) as evidence of the intrusion. No specific motive or technical details regarding the server infrastructure were disclosed.
    Date: 2026-05-11T06:57:00Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919476
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Griplinestrap
    Victim Site: griplinestrap.com
  609. Website Defacement of Poty Ambiental by chinafans (0xteam)
    Category: Defacement
    Content: The Brazilian environmental services website potyambiental.com.br was defaced by threat actor chinafans operating under the group 0xteam on May 11, 2026. The defacement was a targeted, non-mass attack affecting a specific page on the domain. The incident was recorded and mirrored by zone-xsec.com under mirror ID 919463.
    Date: 2026-05-11T06:56:13Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919463
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Environmental Services
    Victim Organization: Poty Ambiental
    Victim Site: potyambiental.com.br
  610. Website Defacement of kimsaidit.com by chinafans of 0xteam
    Category: Defacement
    Content: On May 11, 2026, the website kimsaidit.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The attacker left a defacement file at the path /0x.txt. No specific motive, server details, or additional technical indicators were disclosed in connection with this incident.
    Date: 2026-05-11T06:55:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919472
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Kim Said It
    Victim Site: kimsaidit.com
  611. Mass Website Defacement of inej.net by XYZ (Alpha Wolf Team)
    Category: Defacement
    Content: On May 11, 2026, threat actor XYZ operating under the Alpha Wolf team conducted a mass defacement attack targeting inej.net, hosted on a Linux-based server. The incident was classified as a mass defacement, suggesting multiple sites may have been compromised as part of the same campaign. A mirror of the defacement has been archived at haxor.id.
    Date: 2026-05-11T06:54:46Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249149
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: inej.net
  612. Website Defacement of Hutchison Machining by chinafans (0xteam)
    Category: Defacement
    Content: The website hutchisonmachining.com was defaced by threat actor chinafans, operating under the group 0xteam, on May 11, 2026. The defacement targeted a specific file path (/0x.txt) on the machining companys web server. This was a single, non-mass defacement incident with a mirror archived at zone-xsec.com.
    Date: 2026-05-11T06:54:10Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919480
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Manufacturing
    Victim Organization: Hutchison Machining
    Victim Site: hutchisonmachining.com
  613. Website Defacement of Industrial City Inc by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website industrialcityinc.com was defaced by threat actor chinafans, operating under the group 0xteam. The attacker uploaded a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity.
    Date: 2026-05-11T06:53:23Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919484
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Industrial/Manufacturing
    Victim Organization: Industrial City Inc
    Victim Site: industrialcityinc.com
  614. Mass Defacement of mallas.inej.net by XYZ (Alpha Wolf Team)
    Category: Defacement
    Content: On May 11, 2026, threat actor XYZ operating under the team name Alpha Wolf conducted a mass defacement attack against mallas.inej.net, a subdomain associated with an educational institution likely linked to INEJ. The attack targeted a Linux-based server and was confirmed as part of a broader mass defacement campaign. A mirror of the defacement was archived at haxor.id.
    Date: 2026-05-11T06:52:43Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249150
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Unknown
    Victim Industry: Education
    Victim Organization: Instituto Nacional de Educación para Jóvenes y Adultos (INEJ)
    Victim Site: mallas.inej.net
  615. Website Defacement of Eco Building Technology Firm by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor operating under the handle chinafans, affiliated with 0xteam, defaced a German eco building technology website. The targeted domain is a Punycode-encoded German domain representing eco-gebäudetechnik.de, suggesting a small to mid-sized building services or energy efficiency company. The incident was a single targeted defacement, not part of a mass defacement campaign.
    Date: 2026-05-11T06:51:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919466
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Germany
    Victim Industry: Construction / Building Technology
    Victim Organization: Eco Gebäudetechnik
    Victim Site: xn--eco-gebudetechnik-wqb.de
  616. Website Defacement of Bayside Cabinetry by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, threat actor chinafans operating under the group 0xteam defaced the website of Bayside Cabinetry, a cabinetry and home improvement business. The attack was a targeted single-site defacement, leaving a text-based payload at a specific URL path. No technical server details were disclosed in the available intelligence.
    Date: 2026-05-11T06:50:42Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919455
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Manufacturing / Home Improvement
    Victim Organization: Bayside Cabinetry
    Victim Site: baysidecabinetry.com
  617. Website Defacement of Independent Energy by chinafans (0xteam)
    Category: Defacement
    Content: The threat actor chinafans, operating under the team name 0xteam, defaced the website of Independent Energy (independentenergy.co) on May 11, 2026. The defacement was a targeted single-site intrusion, leaving a text-based proof of compromise at the path /0x.txt. No specific motivation or server details were disclosed in connection with this incident.
    Date: 2026-05-11T06:50:02Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919469
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Energy
    Victim Organization: Independent Energy
    Victim Site: independentenergy.co
  618. Website Defacement of jobjoe.nl by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website jobjoe.nl, a Dutch job services platform, was defaced by a threat actor known as chinafans operating under the group 0xteam. The attacker published a defacement file at jobjoe.nl/0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated compromise.
    Date: 2026-05-11T06:49:14Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919467
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Netherlands
    Victim Industry: Employment / Job Services
    Victim Organization: JobJoe
    Victim Site: jobjoe.nl
  619. Website Defacement of Apadana TPC by XYZ (Alpha Wolf)
    Category: Defacement
    Content: On May 11, 2026, the Iranian technology company Apadana TPC had its homepage defaced by a threat actor identified as XYZ, operating under the team name Alpha Wolf. The attack targeted the main homepage of the domain apadanatpc.ir and was not part of a mass defacement campaign. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-11T06:48:35Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919494
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Iran
    Victim Industry: Technology
    Victim Organization: Apadana TPC
    Victim Site: apadanatpc.ir
  620. Website Defacement of Apadana TPC by XYZ (Alpha Wolf)
    Category: Defacement
    Content: On May 11, 2026, the Iranian technology company Apadana TPC had its website defaced by a threat actor identified as XYZ, affiliated with the group Alpha Wolf. The defacement targeted the domain apadanatpc.ir and was recorded as a singular, non-mass defacement incident. A mirror of the defaced page was archived at haxor.id.
    Date: 2026-05-11T06:47:38Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249156
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Iran
    Victim Industry: Technology
    Victim Organization: Apadana TPC
    Victim Site: apadanatpc.ir
  621. Website defacement of INEJ Reporteria by XYZ (Alpha Wolf)
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as XYZ, affiliated with the group Alpha Wolf, defaced a subdomain of the Nicaraguan Instituto Nacional de Estadísticas y Censos (INEJ) at reporteria.inej.net. The attack targeted a Linux-based server hosting the organizations reporting platform. The incident was recorded as a single, non-mass defacement with a mirror archived at haxor.id.
    Date: 2026-05-11T06:46:58Z
    Network: openweb
    Published URL: https://haxor.id/archive/mirror/249148
    Screenshots:
    None
    Threat Actors: XYZ, Alpha wolf
    Victim Country: Nicaragua
    Victim Industry: Government / Public Institution
    Victim Organization: Instituto Nacional de Estadísticas y Censos (INEJ)
    Victim Site: reporteria.inej.net
  622. Website Defacement of Sip and Squeeze Straw by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website sipandsqueezestraw.com was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was a targeted, single-site intrusion with no indication of mass or repeated defacement activity. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-11T06:46:16Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919479
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Retail / Consumer Goods
    Victim Organization: Sip and Squeeze Straw
    Victim Site: sipandsqueezestraw.com
  623. Website defacement of TheDistriHub by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website thedistrihub.com was defaced by threat actor chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. No specific motive or exploitation method was disclosed in the available data.
    Date: 2026-05-11T06:45:31Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919465
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Distribution/Logistics
    Victim Organization: TheDistriHub
    Victim Site: thedistrihub.com
  624. Website Defacement of NAO Services by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website naoservices.co.uk was defaced by threat actor chinafans operating under the group 0xteam. The defacement targeted a UK-based services organization and was recorded as a single, non-mass defacement incident. A mirror of the defacement was archived at zone-xsec.com.
    Date: 2026-05-11T06:44:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919470
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United Kingdom
    Victim Industry: Technology Services
    Victim Organization: NAO Services
    Victim Site: naoservices.co.uk
  625. Website Defacement of Books by Gayle Wilson by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website booksbygaylewilson.com was defaced by a threat actor known as chinafans, operating under the team 0xteam. The defacement targeted a page on the domain associated with an author or book retailer, likely Gayle Wilson. This was a single targeted defacement, not part of a mass or repeated defacement campaign.
    Date: 2026-05-11T06:44:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919483
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Publishing / Retail
    Victim Organization: Books by Gayle Wilson
    Victim Site: booksbygaylewilson.com
  626. Website Defacement of tricacxm.com by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website tricacxm.com was defaced by a threat actor operating under the handle chinafans, affiliated with the hacking group 0xteam. The defacement was a targeted, non-mass incident affecting a single page (0x.txt) on the domain. No specific motive or additional technical details were disclosed in connection with the attack.
    Date: 2026-05-11T06:38:07Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919397
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: tricacxm.com
  627. Website Defacement of spiriting.co.il by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Israeli website spiriting.co.il by uploading a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity.
    Date: 2026-05-11T06:37:15Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919422
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Israel
    Victim Industry: Unknown
    Victim Organization: Spiriting
    Victim Site: spiriting.co.il
  628. Website defacement of nogravity.cy by chinafans of 0xteam
    Category: Defacement
    Content: On May 11, 2026, the website nogravity.cy was defaced by threat actor chinafans, affiliated with the hacking group 0xteam. The defacement targeted a specific file path (0x.txt) on the Cypriot domain and was neither a mass nor redefacement incident. No specific motivation or server details were disclosed.
    Date: 2026-05-11T06:36:26Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919415
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Cyprus
    Victim Industry: Unknown
    Victim Organization: No Gravity
    Victim Site: nogravity.cy
  629. Website Defacement of MarketGo Agency by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the team 0xteam, defaced the website of MarketGo Agency by uploading a defacement file at marketgo.agency/0x.txt. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity. The attack details, including the server infrastructure and specific exploit method, remain unknown.
    Date: 2026-05-11T06:35:39Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919413
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Marketing / Digital Agency
    Victim Organization: MarketGo Agency
    Victim Site: marketgo.agency
  630. Website Defacement of Thiet Ke Cua by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the Vietnamese website thietkecua.com, a domain associated with door design or construction services. The defacement was a targeted, single-site incident with no indication of mass or repeated defacement activity.
    Date: 2026-05-11T06:34:56Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919418
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Vietnam
    Victim Industry: Construction / Interior Design
    Victim Organization: Thiet Ke Cua
    Victim Site: thietkecua.com
  631. Website Defacement of ekonomemk.sk by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as chinafans, operating under the group 0xteam, defaced the Slovak website ekonomemk.sk by placing a defacement file at the path /0x.txt. The incident was a targeted single-site defacement with no indicators of mass or repeated defacement activity. The mirror of the defacement was archived via zone-xsec.com.
    Date: 2026-05-11T06:34:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919395
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Slovakia
    Victim Industry: Unknown
    Victim Organization: Ekonomemk
    Victim Site: ekonomemk.sk
  632. Website Defacement of nahsprado.com.br by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the Brazilian website nahsprado.com.br was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement was a targeted single-site attack, with a mirror of the defaced content archived at zone-xsec.com. No additional details regarding the attackers motive or server infrastructure were disclosed.
    Date: 2026-05-11T06:33:30Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919409
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Brazil
    Victim Industry: Unknown
    Victim Organization: Nahs Prado
    Victim Site: nahsprado.com.br
  633. Website Defacement of SmartphoneFixpoint by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website smartphonefixpoint.nl, a smartphone repair service based in the Netherlands, was defaced by threat actor chinafans operating under the group 0xteam. The defacement was a targeted, non-mass incident affecting a specific file path on the domain. A mirror of the defaced content was archived via zone-xsec.com.
    Date: 2026-05-11T06:32:46Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919412
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Netherlands
    Victim Industry: Electronics Repair / Consumer Technology Services
    Victim Organization: SmartphoneFixpoint
    Victim Site: smartphonefixpoint.nl
  634. Website Defacement of NNB Nutrition by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website nnbnutrition.com was defaced by threat actor chinafans operating under the group 0xteam. The attacker uploaded a defacement file at the path /0x.txt. This was a targeted single-site defacement with no indication of mass or repeated compromise.
    Date: 2026-05-11T06:31:57Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919411
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: United States
    Victim Industry: Health & Nutrition / Food Supplements
    Victim Organization: NNB Nutrition
    Victim Site: nnbnutrition.com
  635. Website Defacement of anatex.org by chinafans (0xteam)
    Category: Defacement
    Content: The website anatex.org was defaced by threat actor chinafans, operating under the group 0xteam, on May 11, 2026. The defacement targeted a specific text file path (/0x.txt) on the domain, a common technique used to mark a successful intrusion. No server details, motivation, or proof-of-concept information were disclosed alongside the incident.
    Date: 2026-05-11T06:31:04Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919421
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Anatex
    Victim Site: anatex.org
  636. Website Defacement of MamaMaters by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website mamamatters.com was defaced by threat actor chinafans operating under the team 0xteam. The attacker uploaded a defacement file (0x.txt) to the target domain. The incident was a targeted, non-mass defacement with no prior redefacement history recorded.
    Date: 2026-05-11T06:30:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919423
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Health & Wellness / Parenting
    Victim Organization: Mama Matters
    Victim Site: mamamatters.com
  637. Website Defacement of specialfishies.org by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website specialfishies.org was defaced by a threat actor using the handle chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the homepage, indicating a targeted file-level intrusion. The incident was recorded and mirrored by zone-xsec.com under mirror ID 919393.
    Date: 2026-05-11T06:29:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919393
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Special Fishies
    Victim Site: specialfishies.org
  638. Website Defacement of Rainbow Graphics by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, operating under the group 0xteam, defaced the website rainbowgraphics.xyz. The incident was a targeted single-site defacement, with a mirror of the defaced page archived at zone-xsec.com. No specific motivation or technical exploitation details were disclosed.
    Date: 2026-05-11T06:28:32Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919406
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Graphics / Creative Services
    Victim Organization: Rainbow Graphics
    Victim Site: rainbowgraphics.xyz
  639. Website Defacement of Goram Laboratorios by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website goramlaboratorios.com was defaced by a threat actor known as chinafans, operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the homepage, suggesting a targeted file-level intrusion. The incident was catalogued by zone-xsec.com and is classified as a single, non-mass defacement event.
    Date: 2026-05-11T06:27:49Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919417
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Unknown
    Victim Industry: Healthcare / Laboratories
    Victim Organization: Goram Laboratorios
    Victim Site: goramlaboratorios.com
  640. Website Defacement of winmex.site by chinafans (0xteam)
    Category: Defacement
    Content: The website winmex.site was defaced by threat actor chinafans, operating under the group 0xteam, on May 11, 2026. The defacement was recorded at a specific text file path (0x.txt), suggesting a targeted file-level intrusion. The incident was neither a mass defacement nor a redefacement, indicating a singular targeted attack against this domain.
    Date: 2026-05-11T06:26:53Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919403
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Mexico
    Victim Industry: Unknown
    Victim Organization: Winmex
    Victim Site: winmex.site
  641. Website Defacement of Tico y Rico Monteverde by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the website ticoyricomonteverde.com was defaced by threat actor chinafans operating under the group 0xteam. The defacement targeted a specific file path (0x.txt) rather than the homepage, suggesting a targeted file-level intrusion. No mass or redefacement indicators were noted, and server details remain unknown.
    Date: 2026-05-11T06:26:11Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919419
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Costa Rica
    Victim Industry: Hospitality / Food & Beverage
    Victim Organization: Tico y Rico Monteverde
    Victim Site: ticoyricomonteverde.com
  642. Website Defacement of Marmoles Bamar by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as chinafans, affiliated with 0xteam, defaced the website of Marmoles Bamar, a marble/stone materials company likely based in Spain. The defacement was a targeted, single-site compromise and does not appear to be part of a mass defacement campaign. A mirror of the defacement was archived via zone-xsec.com.
    Date: 2026-05-11T06:25:22Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919399
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Spain
    Victim Industry: Construction and Building Materials
    Victim Organization: Marmoles Bamar
    Victim Site: marmolesbamar.com
  643. Website Defacement of Servitex by chinafans (0xteam)
    Category: Defacement
    Content: On May 11, 2026, the Colombian website servitex.com.co was defaced by threat actor chinafans operating under the group 0xteam. The attacker planted a defacement file at the path /0x.txt on the target server. The incident was catalogued as a single, targeted defacement with no indication of mass or repeated compromise.
    Date: 2026-05-11T06:24:34Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919400
    Screenshots:
    None
    Threat Actors: chinafans, 0xteam
    Victim Country: Colombia
    Victim Industry: Textile / Manufacturing
    Victim Organization: Servitex
    Victim Site: servitex.com.co
  644. Sale of Spanish financial records containing IBAN data
    Category: Data Breach
    Content: A threat actor is offering for sale a dataset of Spanish individuals containing personally identifiable and financial information, including full names, city, phone number, IBAN number, and bank name. The post includes a sample image and directs interested buyers to a Telegram contact. The breached source organization is not identified.
    Date: 2026-05-11T06:22:36Z
    Network: openweb
    Published URL: https://altenens.is/threads/spain-with-iban-data.2937763/unread
    Screenshots:
    None
    Threat Actors: saref43135
    Victim Country: Spain
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  645. Alleged data breach of Tuttur.com
    Category: Data Breach
    Content: A threat actor is advertising what they claim to be betting user data from the Turkish platform Tuttur.com. A sample image is provided, with further details available via Telegram. No record count or specific data fields are disclosed in the post.
    Date: 2026-05-11T06:22:09Z
    Network: openweb
    Published URL: https://altenens.is/threads/turkey-betting-data-tuttur-com.2937764/unread
    Screenshots:
    None
    Threat Actors: bahisow611
    Victim Country: Turkey
    Victim Industry: Gambling
    Victim Organization: Tuttur
    Victim Site: tuttur.com
  646. Alleged sale of Germany high income database
    Category: Data Breach
    Content: A threat actor is advertising a alleged high income database purportedly containing personal data of individuals in Germany. The seller directs interested parties to a Telegram account for additional details. No specific organization, record count, or data fields are disclosed in the post.
    Date: 2026-05-11T06:21:42Z
    Network: openweb
    Published URL: https://altenens.is/threads/germany-high-income-database.2937765/unread
    Screenshots:
    None
    Threat Actors: yenos68928
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  647. Website Defacement of JP Industries by INDOHAXSEC Member RAZOR
    Category: Defacement
    Content: A threat actor operating under the alias ./RAZOR, affiliated with the Indonesian hacktivist group INDOHAXSEC, defaced a specific page on the JP Industries website (jpindustries.co.in/verify.php) on May 11, 2026. The attack targeted an Indian industrial company and was a targeted single-page defacement rather than a mass or home page defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-11T06:18:24Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919392
    Screenshots:
    None
    Threat Actors: ./RAZOR, INDOHAXSEC
    Victim Country: India
    Victim Industry: Manufacturing / Industrial
    Victim Organization: JP Industries
    Victim Site: jpindustries.co.in
  648. Airbnb reviews removal service offered on forum
    Category: Services
    Content: A forum user is offering a paid service to remove negative reviews from Airbnb listings, advertising bulk orders and middleman support. Contact is facilitated via Telegram. No specific victim organization or data compromise is involved.
    Date: 2026-05-11T06:04:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90Airbnb-Reviews-Removal%E2%AD%90%E2%80%BC%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Slowredd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  649. Alleged data breach of Lookiero personal shopping platform
    Category: Data Breach
    Content: A threat actor is offering a database allegedly containing 4.9 million records from Lookiero, a personal shopping platform. The exposed fields include usernames, email addresses, full names, physical addresses, postal codes, phone numbers, country codes, and account creation dates. The actor is directing interested parties to a Telegram contact for further details.
    Date: 2026-05-11T05:55:01Z
    Network: openweb
    Published URL: https://altenens.is/threads/4-9-million-lookiero-com-personal-shopping-platform-customers-data.2937760/unread
    Screenshots:
    None
    Threat Actors: xakoji3864
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Lookiero
    Victim Site: lookiero.com
  650. Alleged data leak of RENIEC — 31 million Peruvian citizens personal records
    Category: Data Leak
    Content: A threat actor has shared what is claimed to be a 10GB database dump from RENIEC, Perus national civil registry, allegedly containing records on 31 million citizens. The dataset includes full names, dates of birth, addresses, marital status, gender, phone numbers, and financial fields such as salary and credit. The post directs interested parties to a Telegram contact for further information.
    Date: 2026-05-11T05:54:24Z
    Network: openweb
    Published URL: https://altenens.is/threads/reniec-10gb-leaked-31-million-peru-citizens-data.2937761/unread
    Screenshots:
    None
    Threat Actors: ritok33000
    Victim Country: Peru
    Victim Industry: Government
    Victim Organization: RENIEC
    Victim Site: reniec.gob.pe
  651. Sale of alleged identity documents and personal data including SSNs, drivers licenses, and passports
    Category: Carding
    Content: A forum thread advertises the sale of identity documents and personal data including drivers licenses, SSNs, passports, combo lists, email databases, and business entity information (LLC, EIN, LTD). No post content was available to confirm details of the offering.
    Date: 2026-05-11T05:50:53Z
    Network: openweb
    Published URL: https://xforums.st/threads/drivers-license-ssn-passports-combo-emails-databases-llc-ein-ltd.613689/
    Screenshots:
    None
    Threat Actors: jannat123
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  652. Free combo list of mixed email credentials with 2FA accounts
    Category: Combo List
    Content: A threat actor on Cracked.st shared a combo list described as Valid Mail FA Private Mixed, suggesting the list contains verified email credentials including accounts with two-factor authentication enabled. The post offers the content as a free release framed as a form of community support.
    Date: 2026-05-11T05:35:26Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-Valid-Mail-FA-Private-Mixed–2092227
    Screenshots:
    None
    Threat Actors: Phantom4T
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  653. Germany mail:pass combo list with 100,872 lines
    Category: Combo List
    Content: A combo list of 100,872 email:password lines targeting German mail accounts was shared on a cracking forum. The post is marketed as unique credentials for 2026. No further details are available from the post content.
    Date: 2026-05-11T05:35:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-100872-LINES-GERMANY-MAILPASS-2026-UNIQUE-COMBO–2092228
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  654. Social media content and account removal service offered on cybercrime forum
    Category: Services
    Content: A threat actor is advertising an Instagram and Facebook account and content removal service starting at $35, with bulk pricing available. The service claims to remove posts, reels, stories, highlights, and entire accounts, marketed for reputation protection and handling impersonation. The operator directs potential clients to contact via Telegram.
    Date: 2026-05-11T05:34:24Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%9C%EF%B8%8F-instagram-facebook-account-removal-very-very-cheap-%E2%9A%9C%EF%B8%8F
    Screenshots:
    None
    Threat Actors: FADEDME
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  655. Sale of HQ mixed mail access combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 700 mixed mail access credentials marketed as high quality. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T05:34:19Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-7k-hq-mixed-mail-access-combolist-301154
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  656. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 8,000 Hotmail credentials marketed as high-quality hits. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T05:34:01Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%E2%9C%85-8k-hq-hotmail-hit-%E2%9C%85-301152
    Screenshots:
    None
    Threat Actors: RetroCloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  657. Free distribution of URL:Log:Pass combo list with 8+ million lines
    Category: Combo List
    Content: A threat actor shared a URL:Log:Pass combo list containing over 8 million lines on a cybercrime forum. The content is gated behind registration or login and distributed free of charge. No specific victim organization or country is identified.
    Date: 2026-05-11T05:33:41Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-url-log-pass-free-best-lines-8-million-lines-part-330
    Screenshots:
    None
    Threat Actors: lexityfr
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  658. Combo list targeting Spain distributed on forum
    Category: Combo List
    Content: A combo list containing over 524,000 credentials associated with Spanish accounts was freely shared on a hacking forum. The list was posted with a link to an external paste service. No specific breached organization is identified.
    Date: 2026-05-11T05:33:37Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-524-K-Combo-%E2%9C%AA-Spain-%E2%9C%AA-6-MAY-2026-%E2%9C%AA–2291961
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  659. Free release of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor has freely distributed a combo list containing 1,158 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits and are likely intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T05:33:09Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1158x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2291992
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  660. Free combo list of 4,229 mixed mail hits
    Category: Combo List
    Content: A user on a cracking forum has freely shared a combo list of 4,229 mixed email credentials via an external paste link. The list is marketed as premium hits across multiple mail providers.
    Date: 2026-05-11T05:33:05Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-4229x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F–2291952
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  661. Alleged data breach of Sirun (斯润) Technology companies in China
    Category: Data Breach
    Content: A threat actor identifying as SnowSoul is selling approximately 2GB of data allegedly exfiltrated from two affiliated Chinese technology companies — Sirun Hefei Technology Co. Ltd. and Sirun Tianlang (Beijing) Technology Co. Ltd. The data reportedly includes spreadsheets with bill of materials, personnel lists, production orders, procurement records, invoice lists, and financial balance data spanning 2021–2024. The asking price is $2,000 USD, with download links provided.
    Date: 2026-05-11T05:17:03Z
    Network: openweb
    Published URL: https://breached.st/threads/chinese-data-zhong-guo-shu-ju-snowsoul-id-1314.86988/unread
    Screenshots:
    None
    Threat Actors: 元帅*
    Victim Country: China
    Victim Industry: Technology
    Victim Organization: 斯润合肥科技有限公司 / 斯润天朗(北京)科技有限公司
    Victim Site: Unknown
  662. Free distribution of stealer logs (ULP format, 0.5 GB)
    Category: Logs
    Content: A threat actor on a darknet forum is distributing approximately 0.5 GB of compressed stealer logs in ULP (URL:Login:Password) format. The logs are described as fresh and high quality. Access requires replying to the thread or upgrading the posters account tier.
    Date: 2026-05-11T05:12:34Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-%E2%9C%AA-0-5-GB-%E2%9C%AA-CLOUD-S-%E2%9C%AA-ULP-LOG-S-%E2%9C%AA
    Screenshots:
    None
    Threat Actors: thejackal101
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  663. Sale of premium AI service accounts including ChatGPT Pro and Claude Max
    Category: Services
    Content: A forum seller is advertising discounted ChatGPT Pro and Claude Max premium accounts for sale. No further details are available as the post content is empty.
    Date: 2026-05-11T05:03:00Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%E2%9C%A8-Cheap-%E2%9C%A8-CHATGPT-PRO-%C2%A0%C2%A0%C2%A0-CLAUDE-MAX-PREMIUM-AI-ACCOUNTS%E2%9C%A8-AFFORDABLE-PRICE-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: cheapAi007
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  664. Sale of combo list targeting European and German shopping services
    Category: Combo List
    Content: A combo list of approximately 823,205 email:password lines is being shared, marketed as targeting European and German shopping services. No further details about the source or specific targeted platforms were provided in the post.
    Date: 2026-05-11T05:02:01Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-823-205-Lines-%E2%9C%85-Europa-Germany-Shopping-Target
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  665. Alleged defacement of michael.tapley.demowebsiteclient.com by Mr.PIMZZZXploit
    Category: Defacement
    Content: Website defacement claimed by threat actor Mr.PIMZZZXploit. The compromised site is michael.tapley.demowebsiteclient.com with a mirror link provided at hack-db.org/mirror/128530.
    Date: 2026-05-11T05:01:31Z
    Network: telegram
    Published URL: https://t.me/c/3865526389/903
    Screenshots:
    None
    Threat Actors: Mr.PIMZZZXploit
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: michael.tapley.demowebsiteclient.com
    Victim Site: michael.tapley.demowebsiteclient.com
  666. Social media post removal service advertised on cybercrime forum
    Category: Services
    Content: A forum user is advertising a social media post removal service targeting Instagram and Facebook, claiming to use copyright mechanisms to remove content. Pricing starts at $20 per post removal, with bulk pricing available at $1,500 for 100 removals. The seller claims fast turnaround and accepts middleman arrangements.
    Date: 2026-05-11T05:01:25Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%9C%EF%B8%8F-cheapest-post-removals-here-only-%E2%9A%9C%EF%B8%8F
    Screenshots:
    None
    Threat Actors: FADEDME
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  667. Service offering Instagram and TikTok account ban attacks
    Category: Services
    Content: A threat actor is advertising a service to send bans against Instagram and TikTok accounts, claiming a turnaround time of 0-48 hours and a 100% success rate. The service is offered starting at $200 per ban, with middleman accepted, and contact provided via Telegram.
    Date: 2026-05-11T05:01:06Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%9C%EF%B8%8Fsend-instagram-bans-tiktok-also-giving-in-the-cheapest-price%E2%9A%9C%EF%B8%8F
    Screenshots:
    None
    Threat Actors: FADEDME
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  668. Social media account unban and recovery service advertised on forum
    Category: Services
    Content: A threat actor operating under the alias FADEDME is advertising a service for social media account recovery, including copyright unbans and disabled account reinstatement. The seller claims 25+ successful unbans delivered overnight and markets the service to potential resellers. Contact is offered via Telegram.
    Date: 2026-05-11T05:00:34Z
    Network: openweb
    Published URL: https://patched.to/Thread-%E2%9A%9C%EF%B8%8F-copyright-unbans-welcome-resellers-%E2%9A%9C%EF%B8%8F
    Screenshots:
    None
    Threat Actors: FADEDME
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  669. Social media account unban and recovery service offered on forum
    Category: Services
    Content: A forum user is advertising an account recovery and unban service, claiming to handle copyright-related bans and disabled accounts. The seller claims 25+ successful unbans delivered and markets the service to resellers. Contact is provided via Telegram.
    Date: 2026-05-11T05:00:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%9C%EF%B8%8FCOPYRIGHT-UNBANS-WELCOME-RESELLERS%E2%9A%9C%EF%B8%8F
    Screenshots:
    None
    Threat Actors: trustedi
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  670. Combo List of Nigerian email:password credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list of approximately 16,000 email:password pairs allegedly associated with Nigerian users, marketed as fresh and dated May 5, 2026. The credentials were made available via an external paste link on a public forum.
    Date: 2026-05-11T04:59:47Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-16-K-%E2%9C%A6-Nigeria-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-5-5-2026-%E2%9C%A6%E2%9C%A6–2291904
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  671. Sale of ULP combo list with 22.52 million records
    Category: Combo List
    Content: A threat actor is distributing a URL:Login:Password (ULP) combo list containing approximately 22.52 million records, marketed as UHQ (ultra-high quality). The list is hosted on an external paste site and shared on a cracking forum.
    Date: 2026-05-11T04:59:38Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-22-52-M-%E2%9C%85-ULP-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F–2291895
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  672. Alleged data leak of Poder Judicial del Estado de Tabasco, Mexico
    Category: Data Leak
    Content: A threat actor known as hackstage claims to have leaked a database belonging to the judicial administration body of the state of Tabasco, Mexico. The leaked data allegedly includes personal information of employees such as names, CURP, RFC, institutional and personal email addresses, phone numbers, marital status, and country. Approximately 11,741 worker records are reportedly exposed and have been made available via a public file-sharing link.
    Date: 2026-05-11T04:37:17Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-DATABASE-PODER-JUDICIAL-DEL-ESTADO-DE-TABSACO-MEXICO
    Screenshots:
    None
    Threat Actors: hackstage
    Victim Country: Mexico
    Victim Industry: Government
    Victim Organization: Poder Judicial del Estado de Tabasco
    Victim Site: Unknown
  673. Alleged data leak of 140,000 French mobile numbers
    Category: Data Leak
    Content: A threat actor shared a file via MediaFire containing approximately 140,000 French mobile phone numbers. No victim organization or source of the data was identified in the post.
    Date: 2026-05-11T04:36:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-140k-french-mobile-number
    Screenshots:
    None
    Threat Actors: courtika
    Victim Country: France
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  674. Alleged data leak of Pakistani teachers data from educational board
    Category: Data Leak
    Content: A threat actor leaked data purportedly belonging to over 3,000 Pakistani teachers sourced from an educational board. The dataset allegedly includes names, contact information, roll numbers, and institute affiliations spanning 320+ institutions. The data was made available via a public file-sharing link.
    Date: 2026-05-11T04:35:06Z
    Network: openweb
    Published URL: https://darkforums.su/Thread-Document-3k-Pakistani-Teachers-Data
    Screenshots:
    None
    Threat Actors: GH051
    Victim Country: Pakistan
    Victim Industry: Education
    Victim Organization: Unknown
    Victim Site: Unknown
  675. Combo List targeting mixed domain shopping services
    Category: Combo List
    Content: A combo list of approximately 1.47 million email:password credentials is being shared, marketed as targeting mixed domain shopping services. No additional details are available from the post content.
    Date: 2026-05-11T04:27:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-476-571-%E2%AD%90%EF%B8%8F-Mixed-Domain-Shopping-target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Retail
    Victim Organization: Unknown
    Victim Site: Unknown
  676. Sale of marketplace services including configs, proxies, checkers, and cracked accounts
    Category: Services
    Content: A threat actor is advertising a Telegram-based marketplace offering config tools, automation, proxies, checkers, captcha solving, and cracked account sellers. The platform is marketed toward vendors and buyers seeking cybercrime-related tools and services. No specific victim organization or breach is referenced.
    Date: 2026-05-11T04:27:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1-%E2%9A%A1-High-quality-marketplace-built-for-serious-buy
    Screenshots:
    None
    Threat Actors: Forge_mp
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  677. Free South Korea Email Combo List (Batch 34/100)
    Category: Combo List
    Content: A threat actor is distributing a free South Korean email list as part of a series (batch 34 of 100). The content is gated behind registration or login on the forum. No record count or specific targeted service was mentioned.
    Date: 2026-05-11T04:26:57Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-free-premium-south-korea-email-list-batch-34-100
    Screenshots:
    None
    Threat Actors: emaildbpro
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  678. France combo list with 153.3K credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list of approximately 153,300 French email credentials via an external paste link. The post is categorized under the Dumps forum section and marketed as mail access credentials.
    Date: 2026-05-11T04:26:46Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-153-3k-FRANCE-COMBO-MAILS-ACCESS–2291874
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  679. Website Defacement of Ugandan Catholics Online by Y4NZ404
    Category: Defacement
    Content: On May 11, 2026, a threat actor operating under the alias Y4NZ404, acting as a solo operator, defaced the WordPress-based website of Ugandan Catholics Online. The attack targeted a specific page within the site rather than the homepage. No specific motive or technical details were disclosed in association with this incident.
    Date: 2026-05-11T04:03:54Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919390
    Screenshots:
    None
    Threat Actors: Y4NZ404, SOLO
    Victim Country: Uganda
    Victim Industry: Religious Organization
    Victim Organization: Ugandan Catholics Online
    Victim Site: ugandancatholicsonline.com
  680. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is sharing a combo list of 615 alleged valid Hotmail credentials on a public forum. The content is gated behind a registration/login wall with an external paste link provided.
    Date: 2026-05-11T03:58:49Z
    Network: openweb
    Published URL: https://patched.to/Thread-615x-vailds-hotmails-by-nova
    Screenshots:
    None
    Threat Actors: maska1235
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  681. Combo List: HQ Hotmail Mail Access Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 600 Hotmail credentials marketed as high quality mail access. The content is hidden behind a registration or login wall on the forum. No breach of Microsoft or Hotmail is implied; the credentials are intended for credential stuffing against Hotmail accounts.
    Date: 2026-05-11T03:58:30Z
    Network: openweb
    Published URL: https://patched.to/Thread-0-6k-hq-hotmail-mail-access-combolist-301143
    Screenshots:
    None
    Threat Actors: liamgoat
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  682. Free release of 955K Germany mixed combo list
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 955,000 credential pairs purportedly associated with German users. The list is described as a mixed combo and has been made available via an external paste link.
    Date: 2026-05-11T03:57:59Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-955k-GERMANY-GOOD-MIXED-COMBO–2291823
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  683. Sale of compromised Papa Johns accounts with stored rewards
    Category: Combo List
    Content: A threat actor is sharing four compromised Papa Johns accounts, each with $5 or more in stored rewards, as part of a self-described daily free drops series on a cracking forum. The accounts appear to be the result of credential stuffing against the Papa Johns platform.
    Date: 2026-05-11T03:57:43Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%80%BC%EF%B8%8F-DAILY-FREE-DROPS-4X-Papa-John-s-5-Reward%E2%80%BC%EF%B8%8F–2291814
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  684. Combo list of Hotmail credentials distributed
    Category: Combo List
    Content: A threat actor shared a combo list of 2,254 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits and are likely intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T03:57:39Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-2254x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2291845
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  685. Sale of Hotmail credential combo list by D4rkNetHub
    Category: Combo List
    Content: A threat actor operating under the handle D4rkNetHub is offering a combo list of 3,594 Hotmail credentials on a dark web forum. The credentials are available via a paid cloud subscription service with tiers ranging from $10 for a 3-day trial to $50 for 30-day access. The actor also promotes a shop at darknethub.top and a Telegram channel for transactions.
    Date: 2026-05-11T03:56:57Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-3-594-Good-HOTMAIL-GOODS-D4RKNETHUB-CLOUD
    Screenshots:
    None
    Threat Actors: D4rkNetHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  686. Free combo list of 300K US email:password credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 300,000 US email and password credentials, marketed as 2026 data and described as UHQ (ultra-high quality) suitable for credential stuffing across multiple targets. The list was distributed freely on a cracking forum.
    Date: 2026-05-11T03:29:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-300K-NEW-DATA-USA-UHQ-DROP-WORK-FOR-ALL-TARGETS-FROM-POLINGDBS–2091727
    Screenshots:
    None
    Threat Actors: polingdbs
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  687. Sale of URL:Log:Pass combo list with 24.79 million records
    Category: Combo List
    Content: A threat actor operating under the handle DaxusHub is offering a URL:LOG:PASS combo list containing approximately 24.79 million records, marketed as UHQ (ultra-high quality). The post directs users to a Telegram channel for additional offerings.
    Date: 2026-05-11T03:29:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-24-79-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: DaxusHub
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  688. Free combo list of 3,627 mixed mail credentials
    Category: Combo List
    Content: A threat actor shared a free combo list of 3,627 mixed mail credentials via an external paste link. The post was made on a cracking forum and markets the credentials as premium hits.
    Date: 2026-05-11T03:26:51Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-3627x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F–2291784
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  689. Sale of stealer logs containing URL:Log:Pass credentials (21.24 million records)
    Category: Logs
    Content: A threat actor operating under the alias Daxus is offering a URL:LOG:PASS dataset containing approximately 21.24 million records, advertised as UHQ (ultra-high quality) stealer log output. The dataset is available via the actors commercial platform at daxus.pro and associated Telegram channels.
    Date: 2026-05-11T03:26:44Z
    Network: openweb
    Published URL: https://leakforum.io/Thread-%E2%AD%90%EF%B8%8FURL-LOG-PASS-21-24-M-%E2%9C%85-DAXUS-PRO-UHQ-%E2%AD%90%EF%B8%8F
    Screenshots:
    None
    Threat Actors: Daxus
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  690. Service offering KYC/AML bypass and frozen crypto account unblocking
    Category: Services
    Content: A seller operating since 2013 is advertising a service to unblock frozen cryptocurrency wallets and exchange accounts, bypassing KYC and AML checks. The service works on a percentage-of-recovered-balance model, accepts cases involving balances of $3,000 or more, and claims to assist with documentation to pass identity and compliance checks. The operator excludes CIS/Russian banks and payment systems from their scope.
    Date: 2026-05-11T03:07:56Z
    Network: openweb
    Published URL: https://spear.cx/Thread-Unblocking-wallets-crypto-exchanges-we-will-fix-KYC-AML
    Screenshots:
    None
    Threat Actors: LibrePass
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  691. Combo List targeting cryptocurrency services (Gmail)
    Category: Combo List
    Content: A combo list of approximately 1.21 million email:password lines is being shared, marketed as targeting cryptocurrency services and sourced from Gmail accounts. The credentials are intended for credential stuffing against crypto platforms. No additional details are available from the post content.
    Date: 2026-05-11T02:56:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-1-210-729-Lines-%E2%9C%85-Crypto-target-Combolist-Gmail
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  692. Combo list of Netherlands email:password credentials freely distributed
    Category: Combo List
    Content: A threat actor distributed a combo list of approximately 319,000 email:password pairs purportedly associated with Netherlands-based accounts. The credentials are marketed as fresh and were made available via an external paste link.
    Date: 2026-05-11T02:56:04Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-319-K-%E2%9C%A6-Netherlands-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-29-4-2026-%E2%9C%A6%E2%9C%A6–2291736
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  693. Free 90K EDU combo list for Office365 SMTP credential stuffing
    Category: Combo List
    Content: A threat actor has shared a combo list of approximately 90,000 education-sector credentials marketed for use against Office365 SMTP services. The list was made available via an external paste link on a cracking forum.
    Date: 2026-05-11T02:55:50Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-90K-EDU-COMBOLIST-FOR-OFFICE365-SMTP-S-SHROUDZERO-txt–2291755
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  694. Free combo list targeting Mexico
    Category: Combo List
    Content: A combo list containing over 150,000 credentials targeting Mexico-based accounts was freely shared via an external paste link. The post provides no further details about the source or nature of the credentials.
    Date: 2026-05-11T02:55:47Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%AA-150-K-Combo-%E2%9C%AA-Elite-Cloud1-%E2%9C%AA-Mexico-%E2%9C%AA-22-APR-2026-%E2%9C%AA–2291764
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  695. Sale of Hotmail credential combo list
    Category: Combo List
    Content: A threat actor is offering a combo list of 1,474 alleged valid Hotmail credentials marketed as UHQ (ultra-high quality). The post references private cloud storage for distribution and directs interested parties to a Telegram contact for access.
    Date: 2026-05-11T02:55:02Z
    Network: openweb
    Published URL: https://demonforums.net/Thread-Email-Pass-%E2%9A%A1%E2%9A%A1-X1474-Valid-UHQ-Hotmail-%E2%9A%A1%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Roronoa044
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  696. Hotmail combo list with 7.6K credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 7,600 Hotmail credentials, marketed as valid and private. The post is dated 11.05.2026 and requires a forum reply to access the download link.
    Date: 2026-05-11T02:54:11Z
    Network: openweb
    Published URL: https://altenens.is/threads/7-6k-high-voltagehotmailhigh-voltagevalid-mail-access-11-05.2937724/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  697. Alleged sale of stolen credential databases and credit card data across multiple countries
    Category: Combo List
    Content: Threat actor operating carding and credential trafficking service. Offering fresh database access to compromised accounts across UK, DE, JP, NL, BR, PL, ES, US, IT and other countries. Claims to have stolen credentials for eBay, Uber, PSN, Booking, Amazon, Walmart, Mercari, and other platforms. Also operating Pepecard – a credit card trafficking service selling stolen US/Canada/UK/Global payment cards at $1-$1.50 per card with 75-95% validity rates.
    Date: 2026-05-11T02:51:08Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79332
    Screenshots:
    None
    Threat Actors: Pepecard
    Victim Country: United Kingdom, Germany, Japan, Netherlands, Brazil, Poland, Spain, United States, Italy, Canada
    Victim Industry: Multiple (e-commerce, payment, gaming, travel)
    Victim Organization: Unknown
    Victim Site: Unknown
  698. Sale of cloned payment cards, bank logs, and fraudulent transfer services
    Category: Carding
    Content: A threat actor is selling cloned prepaid and credit/debit cards, bank logs, and linkable debit cards for use on platforms such as CashApp, PayPal, Apple Pay, Zelle, and Venmo. Pricing ranges from $20 to $450 depending on the product and associated balance. The seller also advertises fraudulent online money transfers across multiple payment platforms with claimed no-chargeback guarantees.
    Date: 2026-05-11T02:46:18Z
    Network: openweb
    Published URL: https://altenens.is/threads/fresh-prepaid-linkable-debits-available-instock-for-cashapp-applepay-paypal-skrill-zelle-venmo-etc-and-they-really-hitting-lit-asf-clone-card.2937731/unread
    Screenshots:
    None
    Threat Actors: Okash
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  699. Alleged sale of access to private cloud database with stolen Hotmail credentials and company datasets
    Category: Initial Access
    Content: Threat actor offering sale of access to a private cloud database containing high-quality Hotmail credentials and country-specific datasets. Claims to have data from multiple regions (FR, IT, BR, UK, US, JP, PL, RU, ES, MX, CA, SG) and mentions associated data from Walmart, eBay, Kleinanzeigen, Uber, and Poshmark.
    Date: 2026-05-11T02:27:54Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79324
    Screenshots:
    None
    Threat Actors: Yhōu
    Victim Country: Unknown
    Victim Industry: Technology, E-commerce, Ride-sharing, Social Commerce
    Victim Organization: Hotmail, Walmart, eBay, Uber, Poshmark, Kleinanzeigen
    Victim Site: Unknown
  700. Alleged sale of stolen payment card data and private cloud database access with Hotmail credentials
    Category: Combo List
    Content: Multiple threat actors advertising the sale of stolen payment card data (Pepecard and AllCards services offering 100k+ cards daily at $1-3 per valid card) and access to private cloud databases containing compromised Hotmail credentials and geo-specific personal data from major platforms (Walmart, eBay, Uber, Poshmark) across multiple countries.
    Date: 2026-05-11T02:18:18Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79303
    Screenshots:
    None
    Threat Actors: Pepecard
    Victim Country: United States
    Victim Industry: Financial Services, E-commerce, Technology
    Victim Organization: Unknown
    Victim Site: Unknown
  701. Sale of URL:login:password combo list
    Category: Combo List
    Content: A forum user posted what appears to be a URL:login:password combo list labeled as Part 5, dated May 2026. No additional details are available due to absent post content.
    Date: 2026-05-11T02:17:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-5
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  702. Free distribution of URL:login:password combo list
    Category: Combo List
    Content: A threat actor shared a URL:login:password combo list as a free release, labeled as Part 7 of an ongoing series. The post indicates further updates are planned. No specific victim organization or record count was disclosed.
    Date: 2026-05-11T02:16:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-7
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  703. Free distribution of URL:login:password combo list
    Category: Combo List
    Content: A threat actor on Cracked.st is distributing a URL:login:password combo list labeled as a new update (Part 6). The post offers credentials in URL-login-password format with more updates promised. No specific victim organization or record count is disclosed.
    Date: 2026-05-11T02:15:39Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-6
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  704. Distribution of URL:login:password combo list (Part 8)
    Category: Combo List
    Content: A threat actor distributed a URL:login:password combo list on a cybercrime forum, marketed as a new update (Part 8 in an ongoing series). No specific victim organization or record count was disclosed. Further updates were advertised by the author.
    Date: 2026-05-11T02:15:21Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-8
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  705. Free Hotmail combo list containing 1.8K credentials
    Category: Combo List
    Content: A threat actor shared a free combo list of approximately 1,800 Hotmail email credentials on a public forum. The data is described as old and marketed as mail access. This is a credential stuffing list, not a breach of Hotmail or Microsoft infrastructure.
    Date: 2026-05-11T02:15:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%88%EF%B8%8F1-8k-HOTMAIL-MAIL-ACCESS%E2%9C%88%EF%B8%8F-08-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  706. Combo List of 1.2K USA email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 1,200 mixed US email credentials on a cracking forum. The post is marked as old data from the actors private collection. No specific breached organization is identified.
    Date: 2026-05-11T02:14:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8%E2%9A%9C%EF%B8%8F1-2k-USA-MAIL-ACCESS-MIX%E2%9A%9C%EF%B8%8F%E2%9C%A8-09-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: United States
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  707. Sale of paste-sharing platform MySnippet.dev including source code, server, database, and domain
    Category: Services
    Content: A forum user is selling the MySnippet.dev paste-sharing platform as a complete package, including full source code, EU server with 11 months remaining, domain with 7 months remaining, and associated database. The listing includes 300 active users, 1,400+ pastes, and community channels with 150+ combined members, with the seller claiming prior monthly revenue of approximately $1,300.
    Date: 2026-05-11T02:14:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-SELLING-MYSNIPPET-DEV-FULL-SOURCE-SERVER-DATABASE-DOMAIN
    Screenshots:
    None
    Threat Actors: CaesarJulius
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  708. Sale of handmade financial accounts including Stripe, Bunq, Wise, and Venmo
    Category: Services
    Content: A threat actor is advertising handmade financial accounts for Stripe, Bunq, Wise, and Venmo, claiming worldwide availability. The accounts appear to be freshly created (not stolen) and are offered for sale on a cracking forum. No further details are available as the post content is empty.
    Date: 2026-05-11T02:14:09Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1-1-WORLDWIDE-OPEN-UPS-%E2%AD%90-HANDMADE-ACCOUNTS-STRIPE-BUNQ-WISE-%E2%AD%90-VENMO-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: Geminate
    Victim Country: Unknown
    Victim Industry: Finance
    Victim Organization: Unknown
    Victim Site: Unknown
  709. Combo List of 20K Hotmail credentials shared on cracking forum
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 20,000 Hotmail credentials marketed as valid mail access. The list was posted freely on a cracking forum and appears to be intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T02:14:04Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-20K-%E2%9C%A8-HOTMAIL-MIX-VALID-MAIL-ACCESS-%E2%9C%A8–2091910
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  710. Combo List targeting France
    Category: Combo List
    Content: A user on a cracking forum shared what appears to be a French email:password combo list. The post requests that users do not leech, suggesting it is a free share. No further details about record count or data source are provided.
    Date: 2026-05-11T02:13:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-FRANCE–2091013
    Screenshots:
    None
    Threat Actors: FlightUSA
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  711. Sale of URL login credential combo list
    Category: Combo List
    Content: A threat actor is distributing a URL:login:password combo list described as a new update (Part 9). The post offers minimal details but indicates more updates are forthcoming. The credentials appear to be compiled from multiple sources and are not tied to a single breached organization.
    Date: 2026-05-11T02:13:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-9
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  712. Free combo list of Hotmail credential hits
    Category: Combo List
    Content: A threat actor shared a combo list of 1,716 alleged Hotmail credential hits via an external paste link. The credentials are marketed as premium hits, suggesting they have been tested and verified against Hotmail accounts.
    Date: 2026-05-11T02:12:46Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1716x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2291646
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  713. Free combo list of 4,212 mixed mail credentials
    Category: Combo List
    Content: A threat actor shared a free combo list containing 4,212 mixed email credentials on a cracking forum. The list is described as premium mix mail hits and was made available via an external paste link.
    Date: 2026-05-11T02:12:24Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-4212x-PREMIUM-MIX-MAIL-HITS%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F–2291667
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  714. Free Hotmail credential combo list with 1,120 hits
    Category: Combo List
    Content: A threat actor shared a free combo list of 1,120 Hotmail credential hits via an external paste link. The credentials are marketed as premium hits suitable for credential stuffing against Hotmail accounts.
    Date: 2026-05-11T02:12:10Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F-1120x-PREMIUM-HOTMAIL-HITS-%E2%9D%84%EF%B8%8F%E2%9D%84%EF%B8%8F–2291698
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  715. Free combo list targeting Germany
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 9,700 credential pairs via an external paste link. The list is described as mixed and marketed as valid, targeting German accounts.
    Date: 2026-05-11T02:12:04Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-9-7k-MIXED-GOOD-COMBO-VALIDITY-GERMANY–2291676
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  716. Sale of mixed email combo list with 64.3K credentials
    Category: Combo List
    Content: A threat actor is distributing a mixed email access combo list containing 64,300 credentials, marketed as valid and private. The list is dated May 11, 2026, and is available via a reply-gated download on the forum.
    Date: 2026-05-11T02:08:39Z
    Network: openweb
    Published URL: https://altenens.is/threads/64-3k-sparkles-mix-sparkles-valid-mail-access-11-05.2937689/unread
    Screenshots:
    None
    Threat Actors: redcloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  717. Alleged Cisco Secure Firewall Management Center RCE Vulnerability (CVE-2026-20131)
    Category: Vulnerability
    Content: A post shares details of CVE-2026-20131, a claimed critical vulnerability in Cisco Secure Firewall Management Center (FMC) Software. The flaw allegedly allows an unauthenticated remote attacker to execute arbitrary Java code as root via insecure deserialization of a user-supplied Java byte stream. A GitHub repository purportedly containing a PoC exploit is linked.
    Date: 2026-05-11T01:59:25Z
    Network: openweb
    Published URL: https://breachforums.rs/Thread-DOCUMENTS-Cisco-Secure-Firewall-Management-Center-vulnerability
    Screenshots:
    None
    Threat Actors: DirtyEra
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Cisco
    Victim Site: cisco.com
  718. Alleged sale of mail access credentials and combo lists across multiple countries
    Category: Logs
    Content: Threat actor offering mail access credentials and combo lists (configs, scripts, tools, hits) for multiple countries including FR, BE, AU, CA, UK, US, NL, PL, DE, and JP. Service advertised through @DataxLogs channel with request-based availability.
    Date: 2026-05-11T01:52:46Z
    Network: telegram
    Published URL: https://t.me/c/2613583520/79287
    Screenshots:
    None
    Threat Actors: DataxLogs
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  719. Combo List of Italian email credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 3,000 Italian email and password pairs, marketed as mail access credentials. The post was shared on a public cracking forum and labeled as private data from the author.
    Date: 2026-05-11T01:17:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%88%EF%B8%8F3-0k-ITALY-MAIL-ACCESS-MIX%E2%9C%88%EF%B8%8F-08-05
    Screenshots:
    None
    Threat Actors: SecureTrax
    Victim Country: Italy
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  720. Distribution of URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor on Cracked.st is distributing a URL:login:password combo list, posted as part of an ongoing series of updates. No specific victim organization or record count is disclosed.
    Date: 2026-05-11T01:17:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAON-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-1
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  721. Alleged corporate email credential combo list with 75,818 lines
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 75,818 email and password pairs purportedly sourced from corporate accounts. The list is advertised as a 2026 leak. No further details are available from the post content.
    Date: 2026-05-11T01:16:53Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-75-818-Lines-%E2%9C%85-Corp-mail-pass-Leaks-2026
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  722. Distribution of URL:login:password combo list
    Category: Combo List
    Content: A threat actor distributed a URL:login:password combo list on a cracking forum, marketed as a new update with more updates promised. The post offers no details on record count or targeted services.
    Date: 2026-05-11T01:16:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-2
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  723. Sale of URL:login:password combo list
    Category: Combo List
    Content: A threat actor is distributing a URL:login:password combo list labeled as a new update (Part 3), posted on a combolist forum. The post advertises further updates and requests community support. No specific victim organization or record count is mentioned.
    Date: 2026-05-11T01:16:03Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-3
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  724. Free distribution of stealer logs (500 records)
    Category: Logs
    Content: A threat actor operating as KURZL0GS shared a batch of 500 stealer log records on a cracking forum. The logs are described as fresh and were made available for free.
    Date: 2026-05-11T01:15:42Z
    Network: openweb
    Published URL: https://cracked.st/Thread-9-MAY-FRESH-L0GS-KURZL0GS-500PCS
    Screenshots:
    None
    Threat Actors: KURZL0GS
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  725. Free distribution of URL:login:password combo list
    Category: Combo List
    Content: A threat actor on Cracked.st is freely distributing a URL:login:password combo list described as a new update (Part 4). The post offers no details on record count or targeted services. Further updates are promised by the author.
    Date: 2026-05-11T01:15:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8F-BOX-MAIN-NEW-URL-LOG-PASS-11-05-26%E2%9A%A1%EF%B8%8F%E2%9A%A1%EF%B8%8FPART-4
    Screenshots:
    None
    Threat Actors: BOXOWNER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  726. Germany mail:pass combo list with 100,725 lines
    Category: Combo List
    Content: A combo list advertised as containing 100,725 German email:password pairs was shared on a cracking forum. The list is marketed as unique and formatted as mail:pass credentials.
    Date: 2026-05-11T01:15:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-100725-LINES-GERMANY-MAILPASS-2026-UNIQUE-COMBO–2092183
    Screenshots:
    None
    Threat Actors: UniqueCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  727. Free release of 10 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor operating under the alias ImLupin has freely distributed a combo list containing 10 million URL:login:password credential pairs, marketed as high quality and fresh as of May 2026. The list was shared on a public forum in exchange for reputation points and engagement.
    Date: 2026-05-11T01:15:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-LUPIN-ULP-10-000-000-URL-LOGIN-PASS-HIGH-QUALITY-100-FRESH-05-10-2026
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  728. Sale of Hotmail combo list targeting gaming services
    Category: Combo List
    Content: A combo list containing approximately 375,365 Hotmail credentials (hotmail.com, .fr, .es) is being shared on a cracking forum, marketed as targeting gaming services. The list consists of email:password pairs intended for credential stuffing against gaming platforms.
    Date: 2026-05-11T01:14:58Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-375-365-hotmail-com-fr-es-Gaming-Target-Combolist
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  729. Sale of private URL:Log:Pass (ULP) and Mail:Pass credential cloud service
    Category: Services
    Content: A threat actor operating as Raven Cloud is selling subscription-based access to private URL:Log:Pass (ULP) and Mail:Pass credential feeds sourced from paid log clouds, live traffic, and own traffic. Subscription tiers range from $10 for a one-day test to $600 for lifetime access. The service advertises antipublic, deduplicated credential lines and also offers a free weekly materials channel via Telegram.
    Date: 2026-05-11T01:14:33Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Supreme-RAVEN-CLOUD-Private-URL-LOG-PASS-ULP-Cloud
    Screenshots:
    None
    Threat Actors: Werajii
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  730. Sale of handmade financial account creation and KYC verification services
    Category: Services
    Content: A threat actor is offering account creation and KYC verification services for financial platforms including PayPal, KuCoin, Wise, and Airwallex. The seller advertises handmade accounts with bank verification capabilities. These services are marketed to forum members seeking fraudulent or anonymized access to financial platforms.
    Date: 2026-05-11T01:14:10Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90-GLOBAL-OPEN-UP-SERVICES-%E2%9A%A1-HANDMADE-ACCOUNTS-%E2%9A%A1-PAYPAL-%E2%80%A2-KUCOIN-%E2%80%A2-WISE-%E2%80%A2-AIRWALLEX-%E2%AD%90
    Screenshots:
    None
    Threat Actors: Geminate
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  731. Free combo list: mixed email:password credentials
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 400 mixed email:password credential pairs on a public forum. The content is gated behind registration or login. No specific victim organization is identified.
    Date: 2026-05-11T01:14:04Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%92%A0-0-4k-elite-mixed-email-pass-nokia-cloud-premier-drop-%F0%9F%92%A0
    Screenshots:
    None
    Threat Actors: NokiaDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  732. Combo List targeting Hotmail accounts
    Category: Combo List
    Content: A threat actor is sharing a combo list of approximately 100 Hotmail credentials, marketed as fresh, private, and non-recycled. The content is hidden behind a registration or login wall on the forum.
    Date: 2026-05-11T01:13:38Z
    Network: openweb
    Published URL: https://patched.to/Thread-file-upload-%F0%9F%9B%A1%EF%B8%8F-0-1k-fresh-secure-hotmail-100-private-encrypted-no-recycle-%F0%9F%9B%A1%EF%B8%8F
    Screenshots:
    None
    Threat Actors: NokiaDB
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  733. Hotmail combo list with 7.1K credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 7.1K Hotmail credentials via an external paste link, marketed as valid mail access. The list is freely distributed and appears intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T01:13:13Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-7-1K-%E2%9A%A1Hotmail%E2%9A%A1Valid-Mail-Access-06-05–2291517
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  734. Free combo list of 2,000 private mail credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list of approximately 2,000 email credentials via an external paste site. The post markets these as fully valid and sourced from private mail accounts. No specific victim organization or country is identified.
    Date: 2026-05-11T01:12:54Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-2k-FULL-VALID-COMBO-PRIVATE-MAILS-ACCESS–2291546
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  735. Neptune RAT Special Edition malware shared on hacking forum
    Category: Malware
    Content: A forum post shares a link to Neptune RAT Special Edition, a remote access trojan (RAT), via an external paste service. The post appears to distribute or discuss the malware within a cracking/hacking forum context.
    Date: 2026-05-11T01:12:50Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-Neptune-RAT-Special-Edition-Rising-discussions-on-hacking-forums–2291508
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  736. Combo List of Denmark email:password credentials
    Category: Combo List
    Content: A threat actor has freely shared a combo list containing over 33,000 Denmark-based email:password credential pairs. The list is marketed as fresh, dated 9-5-2026, and distributed via an external paste service.
    Date: 2026-05-11T01:12:32Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-33-K-%E2%9C%A6-Denmark-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6-9-5-2026-%E2%9C%A6%E2%9C%A6–2291567
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  737. Combo list of mixed mail lines distributed freely
    Category: Combo List
    Content: A threat actor shared a combo list described as X700 Mixed Mail Lines via an external paste link. The post offers no additional details regarding the source, format, or volume of the credentials.
    Date: 2026-05-11T01:12:29Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-X700-Mixed-Mail-Lines–2291587
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  738. New Zealand email:password combo list freely distributed
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 29,000 email:password credential pairs purportedly associated with New Zealand users. The list was made available for free via an external paste link and is marketed as fresh, dated April 29, 2026.
    Date: 2026-05-11T01:12:14Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9C%A6%E2%9C%A6-29-K-%E2%9C%A6-New-Zealand-%E2%9C%A6Email-Pass%E2%9C%A6FRESH%E2%9C%A6Maxi-Leaks%E2%9C%A6-29-4-2026-%E2%9C%A6%E2%9C%A6–2291596
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  739. Distribution of URL:Log:Pass combo list
    Category: Combo List
    Content: A threat actor shared a URL:LOG:PASS combo list containing approximately 5.7 million credential pairs via an external paste link. The list is marketed as private and UHQ (ultra-high quality). No specific victim organization is identified.
    Date: 2026-05-11T01:12:10Z
    Network: openweb
    Published URL: https://nulledbb.com/thread-%E2%9A%A1-5-7M-URL-LOG-PASS-PRIVATE-UHQ-08-02-2025%E2%9A%A1–2291616
    Screenshots:
    None
    Threat Actors: Magites
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  740. Website Defacement of Willa Pod Jarzabami by Inside Alone7 (Hidden Cyber Crime)
    Category: Defacement
    Content: On May 11, 2026, a threat actor known as Inside Alone7, operating under the group Hidden Cyber Crime, defaced the website of Willa Pod Jarzabami, a Polish hospitality establishment. The attack was a targeted single-site defacement, not classified as mass or home page defacement. The incident was archived and mirrored via zone-xsec.com.
    Date: 2026-05-11T01:09:40Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919382
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Poland
    Victim Industry: Hospitality / Tourism
    Victim Organization: Willa Pod Jarzabami
    Victim Site: www.willapodjarzabami.pl
  741. Website Defacement of kjliderwroblowka.pl by Inside Alone7 of Hidden Cyber Crime
    Category: Defacement
    Content: On May 11, 2026, a threat actor operating under the handle Inside Alone7, affiliated with the group Hidden Cyber Crime, defaced a file on the Polish website kjliderwroblowka.pl. The incident targeted a specific text file (1000.txt) rather than the sites homepage, indicating a targeted file-level defacement. The attack was neither a mass defacement nor a redefacement, and server details remain unknown.
    Date: 2026-05-11T01:08:05Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919383
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Poland
    Victim Industry: Unknown
    Victim Organization: Kjlider Wróblówka
    Victim Site: kjliderwroblowka.pl
  742. Website Defacement of TFP Medical Packaging by Hidden Cyber Crime (Inside Alone7)
    Category: Defacement
    Content: On May 11, 2026, a threat actor operating under the alias Inside Alone7, affiliated with the group Hidden Cyber Crime, defaced the website of TFP Medical Packaging, a company operating in the medical packaging sector. The incident was a targeted single-site defacement with no indication of mass or repeated defacement activity. The attack details, including the server environment and attacker motivation, remain undisclosed.
    Date: 2026-05-11T01:05:59Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919389
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Healthcare / Medical Packaging
    Victim Organization: TFP Medical Packaging
    Victim Site: tfp-medicalpackaging.com
  743. Website Defacement of Bus Stop Solutions by Inside Alone7 (Hidden Cyber Crime)
    Category: Defacement
    Content: On May 11, 2026, a threat actor identified as Inside Alone7, affiliated with the group Hidden Cyber Crime, defaced a page on the website www.busstopsolutions.com. The incident was a targeted single-page defacement rather than a mass or home page defacement. No specific motive or technical details regarding the server environment were disclosed.
    Date: 2026-05-11T01:04:47Z
    Network: openweb
    Published URL: https://zone-xsec.com/mirror/id/919388
    Screenshots:
    None
    Threat Actors: Inside Alone7, Hidden Cyber Crime
    Victim Country: Unknown
    Victim Industry: Transportation / Infrastructure Solutions
    Victim Organization: Bus Stop Solutions
    Victim Site: www.busstopsolutions.com
  744. Free combo list of 4,927 UHQ mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 4,927 UHQ mixed credentials via Pasteview. The list is described as ultra-high quality and is being distributed freely on the forum.
    Date: 2026-05-11T01:01:34Z
    Network: openweb
    Published URL: https://altenens.is/threads/4927x-uhq-mix_-ebbi_cloud.2937651/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  745. Free combo list of 4,997 UHQ mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 4,997 UHQ (ultra-high quality) mixed credentials via Pasteview. The list is described as mixed, indicating credentials span multiple services or platforms.
    Date: 2026-05-11T01:01:06Z
    Network: openweb
    Published URL: https://altenens.is/threads/4997x-uhq-mix_-ebbi_cloud.2937652/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  746. Free combo list of 10,015 mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 10,015 mixed credentials via Pasteview. The list is described as UHQ (ultra-high quality) and is being distributed for free on a cybercrime forum.
    Date: 2026-05-11T01:00:37Z
    Network: openweb
    Published URL: https://altenens.is/threads/10015x-uhq-mix_-ebbi_cloud.2937653/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  747. Free combo list of 11,752 UHQ mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 11,752 mixed credentials via Pasteview. The list is marketed as ultra-high quality (UHQ) and is freely distributed on the forum.
    Date: 2026-05-11T01:00:10Z
    Network: openweb
    Published URL: https://altenens.is/threads/11752x-uhq-mix_-ebbi_cloud.2937654/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  748. Free combo list of 13,030 UHQ mixed credentials
    Category: Combo List
    Content: A threat actor shared a combo list of 13,030 UHQ mixed credentials via Pasteview. The list is marketed as high quality and appears to target multiple services. No specific victim organization is identified.
    Date: 2026-05-11T00:59:44Z
    Network: openweb
    Published URL: https://altenens.is/threads/13030x-uhq-mix_-ebbi_cloud.2937655/unread
    Screenshots:
    None
    Threat Actors: Ebbicloud
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  749. Sale of combo list targeting Java accounts
    Category: Combo List
    Content: A threat actor shared a set of 25 Java account credentials via an external paste link. The post directs users to a Telegram channel for future drops.
    Date: 2026-05-11T00:45:33Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74865/
    Screenshots:
    None
    Threat Actors: kivaaq
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  750. Sale of balance-related combo list or credential drops
    Category: Combo List
    Content: A forum user shared an external link and Telegram channel advertising balance drops, likely referring to credentials or accounts with associated balances. No further details about the content, volume, or target service are provided in the post.
    Date: 2026-05-11T00:44:59Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74868/
    Screenshots:
    None
    Threat Actors: kivaaq
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  751. Sale of cPanel credentials shared freely on cracking forum
    Category: Combo List
    Content: A threat actor shared a collection of cPanel credentials via an external paste service on a cracking forum. The post promotes a Telegram channel associated with the actor. No specific victim organizations or record counts were disclosed.
    Date: 2026-05-11T00:44:11Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74873/
    Screenshots:
    None
    Threat Actors: 1VOID032
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  752. Free release of Laravel and SMTP login credentials combo list
    Category: Combo List
    Content: A threat actor shared a combo list containing Laravel and SMTP login credentials via an external paste link. The content was distributed freely alongside a Telegram channel. No specific victim organization or record count was disclosed.
    Date: 2026-05-11T00:43:36Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74875/
    Screenshots:
    None
    Threat Actors: 1VOID032
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  753. Sale of mixed streaming service combo list (12 million records)
    Category: Combo List
    Content: A threat actor is offering a mixed streaming service combo list containing approximately 12 million credential pairs via a Telegram channel. The post advertises free combo lists and tools through associated Telegram groups. No specific breached organization is identified; the credentials are intended for credential stuffing against streaming platforms.
    Date: 2026-05-11T00:39:50Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74896/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  754. Sale of mixed combo list with 1,608 entries
    Category: Combo List
    Content: A threat actor is selling a mixed combo list containing 1,608 credential entries, with tiered subscription pricing ranging from $3 for a 24-hour trial to $100 for three months. A partial free download is advertised via Telegram and an external paste service.
    Date: 2026-05-11T00:39:28Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74897/
    Screenshots:
    None
    Threat Actors: snowstormxd
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  755. Sale of 11 million mixed-country combo list
    Category: Combo List
    Content: A threat actor is offering an 11 million mixed-country combo list, directing interested parties to a Telegram channel for access. The post advertises both free combos and free programs via separate Telegram groups.
    Date: 2026-05-11T00:38:53Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74901/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  756. Combo List: 4 million mixed mail:pass credentials offered for free
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 4 million mixed mail:password credentials, marketed as fresh. The credentials are being shared freely via Telegram channels and groups operated by the actor.
    Date: 2026-05-11T00:38:32Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74902/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  757. Sale of mail:pass combo lists for multiple countries
    Category: Combo List
    Content: A threat actor is offering mail:pass combo lists targeting users from multiple countries including Ireland, Thailand, Vietnam, Indonesia, Pakistan, Afghanistan, South Africa, Morocco, Algeria, Tunisia, Georgia, Armenia, Uzbekistan, and Turkmenistan. The credentials are being distributed via Telegram channels and advertised on a cracking forum.
    Date: 2026-05-11T00:37:51Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74904/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  758. Sale of combo list targeting unspecified service
    Category: Combo List
    Content: A threat actor operating under the alias CODER is advertising combo lists via Telegram channels, offering both free and paid credentials. No specific target service, record count, or data details are disclosed in the post.
    Date: 2026-05-11T00:36:46Z
    Network: openweb
    Published URL: https://crackingx.com/threads/74910/
    Screenshots:
    None
    Threat Actors: CODER
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  759. Sale of 9.8M username:login:password combo list targeting multiple countries
    Category: Combo List
    Content: A threat actor is offering for sale a combo list of approximately 9.8 million username:login:password credentials, marketed as private and high quality. The list is advertised as targeting users from the USA, UK, Germany, Poland, and other European countries.
    Date: 2026-05-11T00:18:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E2%8E%9D-9-8M-U-L-P-%E2%8E%A0%E2%9A%A1100-PRIVATE%E2%9A%A1HIGH-QUALITY-LOGS%E2%9A%A1COUNTRY-TARGET-USA-UK-DE-PL-EUROPE-ETC%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  760. Free distribution of stealer logs (1.3GB)
    Category: Logs
    Content: A threat actor on Cracked.st is freely distributing 1.3GB of stealer logs described as full logs. No specific victim organization or country is identified in the post.
    Date: 2026-05-11T00:18:31Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-1-3GB-%E2%AD%90%EF%B8%8F-STEALER-LOGS-FULL-LOGS-%E2%AD%90%EF%B8%8F–2092140
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  761. Free release of 60 million URL:Login:Password combo list
    Category: Combo List
    Content: A threat actor has shared a combo list containing approximately 60 million URL:login:password credential pairs. The post markets the list as high quality. No specific victim organization or breach source is identified.
    Date: 2026-05-11T00:17:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-60M-%E2%9A%A1-URL-LOGIN-PASS-HQ-%E2%9A%A1
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  762. Combo List of 11.8 million credentials freely shared on cracking forum
    Category: Combo List
    Content: A threat actor known as MetaCloud3 shared a combo list of 11.8 million URL:login:password (ULP) credential pairs on a cracking forum, marketed as private and fresh. The post claims the lines are of good quality. No specific victim organization is identified.
    Date: 2026-05-11T00:16:40Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-%E3%80%8C11-8-MILLIONS-%E3%80%8D%E2%9A%A1-ULP%E2%9A%A1-100-PRIVATE-LINES-%E2%9A%A1-FRESH-%E2%9A%A1GOOD-QUALITY%E2%9A%A1
    Screenshots:
    None
    Threat Actors: MetaCloud3
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  763. Large-scale combo list distribution of 511 GB ULP credential lines
    Category: Combo List
    Content: A threat actor shared a 511 GB collection of URL:Login:Password (ULP) credential lines, claimed to be previously unreleased and unused. The dataset was made available for free on a cybercrime forum.
    Date: 2026-05-11T00:16:12Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Other-511-GB-PRIVATE-ULP-LINES-NEVER-SEEN-NOT-RAPED–2092171
    Screenshots:
    None
    Threat Actors: Vaksen
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  764. Italy combo list of 10,000 credentials
    Category: Combo List
    Content: A threat actor has shared a combo list of 10,000 email:password credentials purportedly sourced from Italian users, dated May 9, 2026. The list is marketed as UHQ (ultra-high quality) and was posted for free on a public forum.
    Date: 2026-05-11T00:14:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-10k-UHQ-ITALY-COMBO-9-MAY-2026
    Screenshots:
    None
    Threat Actors: Antaksio
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  765. Sale of mixed-country combo list targeting social media platforms
    Category: Combo List
    Content: A combo list containing approximately 894,550 email:password credential pairs targeting social media platforms has been posted on a cracking forum. The list is described as mixed-country in origin. No further details are available from the post content.
    Date: 2026-05-11T00:13:37Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-894-550-%E2%9A%A1-Mixed-Country-Social-Target
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  766. Free distribution of 4.5 million email:password combo list
    Category: Combo List
    Content: A threat actor on a cracking forum is distributing a combo list of approximately 4.5 million email:password pairs, marketed as fresh and high quality. The post encourages users to claim valid hits before others and references additional private bases available via Telegram.
    Date: 2026-05-11T00:12:18Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8-4-5MILLION-EMAIL-PASS-FRESH-BASE-%E2%80%93-UHQ-PRIVATE-DATA
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  767. Free distribution of 4.7 million email and password combo list
    Category: Combo List
    Content: A threat actor on a cracking forum has shared a combo list purportedly containing 4.7 million email and password pairs, marketed as fresh and high quality. The post encourages users to claim valid hits before others and directs interested parties to contact the author via Telegram or the forum for additional unreleased bases.
    Date: 2026-05-11T00:11:51Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8-4-7MILLION-EMAIL-PASS-FRESH-BASE-%E2%80%93-UHQ-PRIVATE-DATA
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  768. Free distribution of 7.9 million email and password combo list
    Category: Combo List
    Content: A threat actor on a cracking forum has shared a combo list containing approximately 7.9 million email and password pairs, marketed as fresh and high quality. The credentials are distributed freely and are intended for credential stuffing or account takeover activity.
    Date: 2026-05-11T00:11:08Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8-7-9MILLION-EMAIL-PASS-FRESH-BASE-%E2%80%93-UHQ-PRIVATE-DATA
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  769. Free distribution of 8 million email:password combo list
    Category: Combo List
    Content: A threat actor is distributing a combo list containing approximately 8 million email and password pairs, marketed as fresh and high quality. The post encourages users to claim credentials before others and advertises additional private bases available via Telegram or the forum.
    Date: 2026-05-11T00:10:46Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%9C%A8-8MILLION-EMAIL-PASS-FRESH-BASE-%E2%80%93-UHQ-PRIVATE-DATA
    Screenshots:
    None
    Threat Actors: ZoneX404
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  770. Combo List of 396,051 lines targeting social and shopping platforms
    Category: Combo List
    Content: A combo list containing 396,051 email:password lines has been shared on a cracking forum, marketed as suitable for credential stuffing against social media and shopping platforms. The post is attributed to the user HqComboSpace and references 2026 leaks.
    Date: 2026-05-11T00:10:22Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-396-051-Lines-%E2%9C%85-Goods-For-Social-and-Shopping-Target-LEaks-2026
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  771. Sale of 43.9K email combo list marketed for mail access
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 43,900 email:password pairs marketed for mail account access. The post was made on a public cracking forum. No additional details about the source or targeted services are available.
    Date: 2026-05-11T00:09:52Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-43-9k-COMBO-GOOD-FOR-MAILS-ACCESS
    Screenshots:
    None
    Threat Actors: comboroboa
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  772. Sale of 650K HQ Mix Email:Pass Combo List
    Category: Combo List
    Content: A threat actor is offering a combo list of 650,000 email:password credential pairs for sale via Telegram. The actor also advertises free combo lists through a Telegram group.
    Date: 2026-05-11T00:09:17Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-650K-HQ-MIX-DATA-1-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  773. Sale of 780K Gmail email:password combo list
    Category: Combo List
    Content: A threat actor is offering for sale a combo list of 780,000 Gmail email:password pairs via Telegram. The post advertises high-quality databases for purchase and also promotes a Telegram group offering free combo lists.
    Date: 2026-05-11T00:08:57Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-780K-HQ-GMAIL-1-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  774. Sale of mixed email credential combo list with 30K valid hits
    Category: Combo List
    Content: A threat actor is distributing a mixed email credential combo list claiming 30,000 valid hits. The post promotes a private channel for additional content and markets the credentials as verified. No specific victim organization or country is identified.
    Date: 2026-05-11T00:08:34Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%90%E2%AD%9030K-MIX-MAIL-ACCES-FULL-VALID-HITS%E2%AD%90-PRIVATE-UNRAPPED-DATA-%E2%AD%90%E2%AD%90–2092117
    Screenshots:
    None
    Threat Actors: kingdevl10
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  775. Sale of 480K Yahoo email:password combo list
    Category: Combo List
    Content: A threat actor is offering for sale a combo list of 480,000 Yahoo email and password pairs, marketed as high quality. The seller directs interested buyers to contact via Telegram and also advertises a Telegram group for free combo distributions.
    Date: 2026-05-11T00:08:05Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-480K-HQ-YAHOO-1-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  776. Sale of Hotmail email:password combo list
    Category: Combo List
    Content: A threat actor is selling a combo list of 425,000 Hotmail email:password pairs, marketed as high quality. The actor directs interested buyers to contact them via Telegram and also advertises free combo lists through a Telegram group.
    Date: 2026-05-11T00:07:43Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-425K-HQ-HOTMAIL-1-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  777. Hotmail combo list with 5.7K credentials distributed on cracking forum
    Category: Combo List
    Content: A threat actor is distributing a combo list of 5,700 Hotmail credentials marketed as fresh valid hits. The post directs users to a private channel via Telegram for access to additional data. Content is offered freely in exchange for engagement (likes/reputation).
    Date: 2026-05-11T00:07:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-%E2%AD%90%E2%AD%905-7K-FRESH-HOTMAIL-VALID-HITS-ONLY-%E2%AD%90-PRIVATE-UNRAPPED-DATA-%E2%AD%90%E2%AD%90
    Screenshots:
    None
    Threat Actors: kingdevl10
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  778. Combo List of 4,000 Hotmail valid credentials
    Category: Combo List
    Content: A threat actor shared a combo list of over 4,000 Hotmail valid credentials. The post claims the list contains working email and password pairs dated October 5th.
    Date: 2026-05-11T00:06:36Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-4-000-HOTMAIL-VALIDS-05-10
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  779. Combo List: 130K UHQ Mixed Mail Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list advertised as containing 130,000 mixed mail credentials marketed as fresh and high quality. The post is sponsored by slateaio.com. No specific breach source or victim organization is identified.
    Date: 2026-05-11T00:06:13Z
    Network: openweb
    Published URL: https://cracked.st/Thread-130K-UHQ-MIXED-MAIL-COMBO-FRESH
    Screenshots:
    None
    Threat Actors: Vows
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  780. Sale of 2.9 million mix data combo list
    Category: Combo List
    Content: A threat actor is offering a mixed combo list of 2.9 million email:password credentials for sale via Telegram, while also advertising free combos through a Telegram group.
    Date: 2026-05-11T00:05:41Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-2-9M-MIX-DATA-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  781. Combo List: 40,000 United States SUHQ Mail:Password Credentials
    Category: Combo List
    Content: A threat actor is distributing a combo list of approximately 40,000 mail:password credential pairs described as SUHQ (Super Ultra High Quality) sourced from United States users.
    Date: 2026-05-11T00:05:19Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-40-000-SUHQ-UNITED-STATES-DATA-MAIL-PASSWORD
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  782. Mixed Country Combo List
    Category: Combo List
    Content: A combo list containing approximately 100,271 email and password pairs from mixed countries is being shared on the forum. The list is marketed as corporate credentials.
    Date: 2026-05-11T00:04:56Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-100-271-%E2%AD%90%EF%B8%8F-Mixed-Country-Corp
    Screenshots:
    None
    Threat Actors: AiCombo
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  783. Sale of Outlook combo list with 64K credentials
    Category: Combo List
    Content: A threat actor is offering for sale a combo list of 64,000 purported Outlook email:password credentials via Telegram. The actor also advertises a Telegram group distributing free combo lists.
    Date: 2026-05-11T00:04:25Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-64K-HQ-OUTLOOK-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  784. Sale of Gmail email:password combo list (780K records)
    Category: Combo List
    Content: A threat actor is selling a combo list marketed as 780K high-quality Gmail email:password credentials. The actor directs interested buyers to a Telegram channel and also advertises free combo lists via the same channel.
    Date: 2026-05-11T00:03:54Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-780K-HQ-GMAIL-2-Email-Pass-Combolists
    Screenshots:
    None
    Threat Actors: Orthorons
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  785. Alleged combo list of German mixed-domain credentials (293,404 lines)
    Category: Combo List
    Content: A threat actor shared a combo list containing 293,404 email:password lines described as Germany mixed-domain leaks. The list was posted on a public combolist forum and appears to aggregate credentials from multiple sources.
    Date: 2026-05-11T00:03:30Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-293-404-Lines-%E2%9C%85-Germany-Mixed-Domain-leaks
    Screenshots:
    None
    Threat Actors: HqComboSpace
    Victim Country: Germany
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  786. Combo List: UK Mail:Password credentials (15,000 records)
    Category: Combo List
    Content: A threat actor shared a combo list of approximately 15,000 UK email:password pairs, marketed as SUHQ (Super Ultra High Quality). The list was distributed freely on the forum.
    Date: 2026-05-11T00:03:01Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-15-000-SUHQ-UNITED-KINGDOM-DATA-MAIL-PASSWORD
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  787. Combo List: 25,000 Canada MAIL:PASSWORD credentials shared freely
    Category: Combo List
    Content: A threat actor shared a combo list of over 25,000 Canadian email:password pairs on a public forum. The credentials are marketed as super ultra high quality (SUHQ). No specific breached organization is identified.
    Date: 2026-05-11T00:02:16Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-25-000-SUHQ-CANADA-DATA-MAIL-PASSWORD
    Screenshots:
    None
    Threat Actors: ImLupin
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  788. Free Hotmail combo list with 60K credentials
    Category: Combo List
    Content: A threat actor shared a combo list containing approximately 60,000 Hotmail credentials described as valid mail access. The list is offered for free on a cracking forum. Content appears to be a mix of email and password pairs intended for credential stuffing.
    Date: 2026-05-11T00:01:20Z
    Network: openweb
    Published URL: https://cracked.st/Thread-Email-Pass-60K-%E2%9C%A8-HOTMAIL-MIX-VALID-MAIL-ACCESS-%E2%9C%A8
    Screenshots:
    None
    Threat Actors: DevelMakss
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown
  789. Sale of compromised streaming service accounts including Netflix, Disney+, and others
    Category: Services
    Content: A threat actor is offering compromised or unauthorized premium streaming accounts for sale, including Netflix, Disney+, YouTube, HBO Max, Crunchyroll, IPTV, F1 TV, Deezer, and X Premium. The seller advertises cheap prices, instant delivery, and yearly plans. Contact is facilitated via Telegram and Discord.
    Date: 2026-05-11T00:00:14Z
    Network: openweb
    Published URL: https://cracked.st/Thread-%E2%AD%90-STREAMING-HUB-%E2%AD%90-TRUSTED-SELLER-%E2%9C%85-%E2%9A%A1NETFLIX-%E2%9A%A1MAX-%E2%9A%A1PRIME-%E2%9A%A1DISNEY-%E2%9A%A1IPTV-MORE
    Screenshots:
    None
    Threat Actors: A_W_Shop
    Victim Country: Unknown
    Victim Industry: Unknown
    Victim Organization: Unknown
    Victim Site: Unknown